SlideShare a Scribd company logo
1 of 49
Cloud Monitoring Overview
Ramkumar Lakshminarayanan
 Interoperability means easy migration and integration
of applications and data between different vendors’
clouds. Owing to different hypervisors (KVM, Hyper-V,
ESX, ESXi), VM technologies, storage, configuring
operating systems, various security standards and
management interfaces, many cloud systems are not
interoperable.
Interoperability
 Many enterprises want interoperability between their
inhouse infrastructure and the cloud. The issue of
interoperability need to be addressed to allow
applications to be ported between clouds, or use
multiple cloud multiple cloud infrastructures, before
critical business applications are delivered from the
cloud. Most clouds are completely opaque to their
users .
Interoperability
 Most of the time, users are fine until there is access
issue.
 In such situations, frustration increase exponentially
with time, partly because of the opacity.
 We need monitoring solution to avoid frustration.
Interoperability
 Data migration between data centers or cloud
systems are important concerns of taxonomy.
 While migrating data, some considerations should be
taken into account like no data loss, availability,
scalability, cost-efficiency, and load balancing.
 User should be able to move their data and
applications any time from one to anther seamlessly,
without any one vendor controlling it.
Data Migration
 Seamless transfer, as in mobile communication, is
required cloud computing to work.
 Many enterprises do not move their mission critical
data and applications to the cloud because of vendor
lock-in, security, governance, and many more
complications.
Data Migration
 The management services contain deployment,
monitoring, reporting, service-level agreement, and
metering billing. We discuss these in detail.
Management Services
 To reduce the complexity and administrative burden
across the cloud deployment, we need the
automation process life cycle.
 RightScale Cloud Management Platform addresses
three stages of the cloud application deployment
lifecycle, namely design, manage, and deploy.
Deployment and Configuration
 Tools such as cfengine, Chef from Opscode-chef,
rPath, and Puppet are available as configuration
management frameworks.
 These tools help software developers and engineers
to manage server and application configuration by
writing code, rather than running commands by hand.
Deployment and Configuration
 Developing, testing, debugging, and studying the
performance of cloud systems is quite complex.
 Management cost increases significantly as the
number of sites increases.
 To address such problems, we need monitoring and
reporting mechanisms.
 Monitoring basically monitor the SLA lifecycle. It also
determines when an SLA completes and reports to
the building service.
 There are some services that monitor the cloud and
reports to the billing services.
Monitoring and Reporting
 There are some services that monitor the cloud
systems and produce health reports such as Hyperic
HQ.
 Hyperic lets sysadmins find, fix and prevent
performance problems in custom web apps, whether
running on physical, virtual, or cloud infrastructure.
2.3.5.2 Monitoring and Reporting
 Users always want stable and reliable system
service. Cloud architecture is considered to be
highly available, up and running 24 h X 7 days.
 Many cloud service providers have made huge
investments to make their system reliable.
However, most cloud vendors today do not
provide high availability assurance.
 If a service goes down, for whatever reason, what
can a user do? How can users access their
documents stored in the cloud?
 In such a case, the provider should pay a fine to
the consumer as compensation to meet SLAs.
Service-Level Agreements (SLAs)
Management
 An SLA specifies the measurement, evaluation, and
reporting of the agreed service level standards such
as:
Service-Level Agreements (SLAs)
Management
 Currently, Amazon offers a “99.9% Monthly Uptime
Percentage” SLA for Simple Storage Service
(Amazon S3) and credit is limited to 10%.
 Amazon credits 25% of charges if the availability
drops is limited to 10%.
 Amazon credits 25% of charges if the availability
drops below 99.0%, whereas 3Tear Virtual Private
Data Center (VPDC) service will include a 99.999%
availability SLA that is supposed to help assure
customers about putting mission-critical apps and
services in the cloud.
Service-Level Agreements (SLAs)
Management
 Transparent metering and billing will increase the
trust level of users towards cloud services.
 Pay-as-you-go subscription or pay-as-you-consume
model of billing and metering are popular for cloud.
 This service gets the status of the SLA, and invokes
the credit service, which debits the user credit card or
account and informs the user.
Metering and Billing
 There are many pricing strategies such as RAM
hours, CPU Capacity, Bandwidth
(Inbound/Outbound Data Transfer), Storage
(gigabytes of data), Software (License Fee), and
Subscription-Based Pricing.
 There are some interesting new billing models
such GoGrid prepaid cloud hosting plan and IDC
cloud billing research, which are great examples
of moving cloud pricing models towards telecom
models.
Metering and Billing
 Self-service application provisioning enables
application developers to set up application
infrastructure, such as Java application servers,
database, and messaging servers, without any
help or assistance from infrastructure teams.
 Self-service application provisioning hides the
complexity of the enterprise cloud from
application developers and empower them to set
up and configure complex application
infrastructure with the click of a button.
Provisioning
 By building a self-service portal for on-demand
provisioning, we can reduce process overheads.
 Provisioning can help to manage resource
management, workload management, and
autorecovery and task and process automation.
Provisioning
 Cloud Providers provides security by
 Certifications and Accreditations.
 Physical Security.
 Secure Services.
 Data Privacy.
Security
 Corporate information is not only a competitive asset,
but it often contains information of consumers and
employees that in the wrong hands, could create a
civil liability and possibly criminal charges.
 The key challenges of cloud security are performance,
risk management, governance, design, and
deployability.
Security
 Customers who worry about the privacy of their
information should encrypt their data before moving
it to the cloud.
 The provider should provide the utilities to simplify
the process of encrypting the files and storing them in
the cloud; similarly, for retrieval decryption will need.
 Cloud provider use the Advanced Encryption
Standard (AES) that may be AES-128, AES-192, or AES-
256.
Encryption/Decryption
 Federation is the act of combining data or identities
across multiple systems. Federation can be done by a
cloud provider or by a cloud broker.
 Each user can subscribe to a portal and be given an
access card, which will be used to identify the
subscriber at this particular portal or other portal in
collaboration.
Privacy and Federated Identity
 In public cloud, safeguards must be placed on
machines to ensure proper authentication and
authorization.
 Within the private cloud environment, one can track,
pinpoint, control, and manage users who try to access
machines with improper credential.
 Single sign-on is the basic requirement for a customer
who accesses multiple cloud services.
Authorization and Authentication
 In case of failure, there will be a hot backup instance
of the application, which is ready to take over without
disruption.
 Cloud computing outages extend into the more
refined version of cloud service platform. Some
outages have been quite lengthy.
Fault Tolerance
 The major problem for cloud computing is how to
minimize outage/failover to provide reliable services.
 It is important to adopt the well-known Recovery-
Oriented Computing (ROC) paradigm in large data
center.
 Google uses Google File System (GFS) or distributed
disk storage; every piece of data is replicated three
times. If one machine dies, a master redistributes the
data to a new server.
Fault Tolerance
 This section provides a technical comparison of several
technologies and cloud providers. Table 2.2-2.3 compare
between different infrastructure technologies and solution
providers such as Amazon Web Service (AWS), GoGrid,
Flexiscale, and Moso.
Classification and Comparison between
Cloud Computing Ecosystems
Classification and Comparison between
Cloud Computing Ecosystems
Classification and Comparison between
Cloud Computing Ecosystems
 Tables 2.4-2.6 compares different SaaS and PaaS service
providers such as Google AppEngine (GAE), GigaSpace,
Azure, RightScale, SunCloud, and Salesforce.com (SFDC)
2.4 Classification and Comparison
between Cloud Computing Ecosystems
2.4 Classification and Comparison
between Cloud Computing Ecosystems
Classification and Comparison between
Cloud Computing Ecosystems
Classification and Comparison between
Cloud Computing Ecosystems
 Similarly, Tables 2.7-2.8 compare open source cloud-based
services like Eucalyptus, Open Nebula, Nimbus, and Enomaly.
Classification and Comparison between
Cloud Computing Ecosystems
2.4 Classification and Comparison
between Cloud Computing Ecosystems
Classification and Comparison between
Cloud Computing Ecosystems
 In EC2 architecture, users are able to monitor and
control their applications as an instance but not as a
service.
 To achieve manageability, the following capabilities
are required: application-defined SLAs, such as
workload capacity and concurrent computational
tasks, dynamic provision of additional services to
handle additional workload.
 AWS is becoming popular as a de facto standard;
many cloud systems are using a similar API.
Eucalyptus is an open-source implementation of the
AWS APIs.
Cloud Computing Infrastructure Technology
and Solution Provider
 The biggest concern of current cloud computing
system is auditing of the security controls and
mechanism in terms of user level.
 Amazon S3 lacks in access control that support
delegation and auditing, and makes implicit trust
assumptions between S3 and client.
 Amazon’s work towards Statement on Auditing
Standard No. 70: Service Organizations, Type II
(SAS70 type II) certification may be helpful for those
concerned with widely varying levels of security
competency.
Cloud Computing Infrastructure Technology
and Solution Provider
 Google App Engine (GAE) provides a useful basis for
people useful basis for people and companies to
make web application from scratch without needing
to worry about infrastructure.
 GAE provides for automatic scaling and load
balancing.
Cloud Computing PaaS and SaaS Provider
 GigaSpaces use an In-Memory Data-Grid (IMDG)
technique to manage state data in a database,
which bridges the bottleneck of scalability.
 It provides all the basic features of a high-end
Data Grid as well as unique features, such as
continuous query and seamless integration with
external data sources, and makes it extremely
easy to deploy, modify, and ensure high
availability for applications running on Amazon
EC2.
Cloud Computing PaaS and SaaS Provider
 GIgaSpaces’s Space-Based Architecture (SBA)
approaches are based on the Tuple Space model that
can meet the challenge of running low-latency
transactional applications in a highly distributed
environment such as Amazon EC2.
Cloud Computing PaaS and SaaS Provider
 The role of open source cloud computing is to build
mechanisms around digital identify management,
and outline technological building blocks that are
needed for controllable trust and identity verification.
 Nimbus supports the OASIS WSRF standard that
defines a framework and uses we services to model
and access stateful resources.
 Enomaly cloud is focusing on the issue of
interoperability, which is essential for enterprise
cloud system. Most of the open source clouds are
providing IaaS.
Open Source Based Cloud Computing
Services
 There are some issues related to mechanism such as
security, privacy, (erosion of) data integrity, load
balancing, interoperability, and scalable storage.
 Cloud computing services often provide common
business applications online that are accessed from a
web browser, while the software and data are stored
on the servers.
Comments on Issues and Opportunities
 Transmitting huge volumes of multimedia data across
clouds will continue to be a challenge, and needs
further research.
 Discovery and composition of the services between
multiple clouds is also a promising arena for
enterprise cloud.
Comments on Issues and Opportunities
 As the user requirement changes, functionality and
privacy requirements may change, and so privacy
requirements need to be reassessed at regular
intervals.
 Policy design dynamic privacy design pattern may be
a better technique for cloud computing.
 Cloud computing bring some novel attacks that have
not figured in much of security discussion to date.
Comments on Issues and Opportunities
 Amazon AWS Import/Export support importing
and exporting data into and out of Amazon S3
buckets in the USA, but leaves complication in
migration of data between clouds.
 A major challenge of moving applications to the
cloud is the need to master multiple
programming language and operating
environment.
2. 6 Comments on Issues and
Opportunities
 Special attention is needed for government
agencies to integrate their data from tradition to
PaaS, a need to learn some new programming
models residing in the cloud.
 Interoperability is another important issue for
cloud. There is a need for data access
interoperability, which is a unique programming
interface to access diverse database (such as
JDBS, ODBC, Ado.NET).
 There are lots of standardization issues; in the
race to standardization, many organization and
forums are working, but need to leverage the
collaboration and discussion between them.
Comments on Issues and Opportunities
 Armbrust et al. also identified many issues for
future research. There are some complications
with current programming frameworks and
programming languages for cloud computing
such as Google AppEngine with its SQL-like
syntax called “GQL”. Select statements in GQL
can be performed on one table only.
 GQL does not support a join statement. The cloud
developers will need more flexible query-oriented
and API-oriented programming in future.
Comments on Issues and Opportunities
 The complexity will be there for developers to apply
the disciplines of development across multiple
platform technologies and computational models.
The alignment of user needs with business strategy is
also a challenging job for CIOs.
Comments on Issues and Opportunities
 Questions ?

More Related Content

What's hot

Cloud computing
Cloud computingCloud computing
Cloud computing
sfu-kras
 
Analyst paper: Private Clouds Float with IBM Systems and Software
Analyst paper: Private Clouds Float with IBM Systems and SoftwareAnalyst paper: Private Clouds Float with IBM Systems and Software
Analyst paper: Private Clouds Float with IBM Systems and Software
IBM India Smarter Computing
 
Cloud Computing
 Cloud Computing Cloud Computing
Cloud Computing
Abdul Aslam
 
A revolution in information technology cloud computing.
A revolution in information technology   cloud computing.A revolution in information technology   cloud computing.
A revolution in information technology cloud computing.
Minor33
 

What's hot (20)

Cloud Services: Types of Cloud
Cloud Services: Types of CloudCloud Services: Types of Cloud
Cloud Services: Types of Cloud
 
Cc unit 4 updated version
Cc unit 4 updated versionCc unit 4 updated version
Cc unit 4 updated version
 
Unit 5
Unit 5Unit 5
Unit 5
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
DAM 2018 Review, What's next 2019 ?
DAM 2018 Review, What's next 2019 ?DAM 2018 Review, What's next 2019 ?
DAM 2018 Review, What's next 2019 ?
 
Cloud Computing: A study of cloud architecture and its patterns
Cloud Computing: A study of cloud architecture and its patternsCloud Computing: A study of cloud architecture and its patterns
Cloud Computing: A study of cloud architecture and its patterns
 
CLOUD COMPUTING: SECURITY ISSUES AND CHALLENGES
CLOUD COMPUTING: SECURITY ISSUES AND CHALLENGESCLOUD COMPUTING: SECURITY ISSUES AND CHALLENGES
CLOUD COMPUTING: SECURITY ISSUES AND CHALLENGES
 
Cloud Computing-notes.doc
Cloud Computing-notes.docCloud Computing-notes.doc
Cloud Computing-notes.doc
 
Analyst paper: Private Clouds Float with IBM Systems and Software
Analyst paper: Private Clouds Float with IBM Systems and SoftwareAnalyst paper: Private Clouds Float with IBM Systems and Software
Analyst paper: Private Clouds Float with IBM Systems and Software
 
Cloud Management Mechanisms
Cloud Management MechanismsCloud Management Mechanisms
Cloud Management Mechanisms
 
The Jamcracker Platform - Cloud Services Governance and Management for the En...
The Jamcracker Platform - Cloud Services Governance and Management for the En...The Jamcracker Platform - Cloud Services Governance and Management for the En...
The Jamcracker Platform - Cloud Services Governance and Management for the En...
 
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARINGSURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING
 
A Short Appraisal on Cloud Computing
A Short Appraisal on Cloud ComputingA Short Appraisal on Cloud Computing
A Short Appraisal on Cloud Computing
 
Multi Cloud Architecture Approach
Multi Cloud Architecture ApproachMulti Cloud Architecture Approach
Multi Cloud Architecture Approach
 
Cloud Computing
 Cloud Computing Cloud Computing
Cloud Computing
 
Cloud Computing
 Cloud Computing Cloud Computing
Cloud Computing
 
Cloud Computing Risk Management (IIA Webinar)
Cloud Computing Risk Management (IIA Webinar)Cloud Computing Risk Management (IIA Webinar)
Cloud Computing Risk Management (IIA Webinar)
 
A revolution in information technology cloud computing.
A revolution in information technology   cloud computing.A revolution in information technology   cloud computing.
A revolution in information technology cloud computing.
 
Collaborating Using Cloud Services
Collaborating Using Cloud ServicesCollaborating Using Cloud Services
Collaborating Using Cloud Services
 
A Review on Data Protection of Cloud Computing Security, Benefits, Risks and ...
A Review on Data Protection of Cloud Computing Security, Benefits, Risks and ...A Review on Data Protection of Cloud Computing Security, Benefits, Risks and ...
A Review on Data Protection of Cloud Computing Security, Benefits, Risks and ...
 

Viewers also liked

Monitoring applications on cloud - Indicthreads cloud computing conference 2011
Monitoring applications on cloud - Indicthreads cloud computing conference 2011Monitoring applications on cloud - Indicthreads cloud computing conference 2011
Monitoring applications on cloud - Indicthreads cloud computing conference 2011
IndicThreads
 

Viewers also liked (13)

Introduction to Allmon (0.1.0) - a generic performance and availability monit...
Introduction to Allmon (0.1.0) - a generic performance and availability monit...Introduction to Allmon (0.1.0) - a generic performance and availability monit...
Introduction to Allmon (0.1.0) - a generic performance and availability monit...
 
Fluentd
FluentdFluentd
Fluentd
 
Monitis: All-in-One Systems Monitoring from the Cloud
Monitis: All-in-One Systems Monitoring from the CloudMonitis: All-in-One Systems Monitoring from the Cloud
Monitis: All-in-One Systems Monitoring from the Cloud
 
Monitoring applications on cloud - Indicthreads cloud computing conference 2011
Monitoring applications on cloud - Indicthreads cloud computing conference 2011Monitoring applications on cloud - Indicthreads cloud computing conference 2011
Monitoring applications on cloud - Indicthreads cloud computing conference 2011
 
Performance Monitoring in the Cloud - Gluecon 2011
Performance Monitoring in the Cloud - Gluecon 2011Performance Monitoring in the Cloud - Gluecon 2011
Performance Monitoring in the Cloud - Gluecon 2011
 
Webinar Monitoring in era of cloud computing
Webinar Monitoring in era of cloud computingWebinar Monitoring in era of cloud computing
Webinar Monitoring in era of cloud computing
 
High-Availability Infrastructure in the Cloud - Evan Cooke - Web 2.0 Expo NYC...
High-Availability Infrastructure in the Cloud - Evan Cooke - Web 2.0 Expo NYC...High-Availability Infrastructure in the Cloud - Evan Cooke - Web 2.0 Expo NYC...
High-Availability Infrastructure in the Cloud - Evan Cooke - Web 2.0 Expo NYC...
 
Scaling Twilio - Evan Cooke - Twilio Conference 2011
Scaling Twilio - Evan Cooke - Twilio Conference 2011Scaling Twilio - Evan Cooke - Twilio Conference 2011
Scaling Twilio - Evan Cooke - Twilio Conference 2011
 
How to monitor NGINX
How to monitor NGINXHow to monitor NGINX
How to monitor NGINX
 
Dll injection
Dll injectionDll injection
Dll injection
 
extreme Programming
extreme Programmingextreme Programming
extreme Programming
 
Lessons I Learned While Scaling to 5000 Puppet Agents
Lessons I Learned While Scaling to 5000 Puppet AgentsLessons I Learned While Scaling to 5000 Puppet Agents
Lessons I Learned While Scaling to 5000 Puppet Agents
 
MySQL High Availability Solutions - Feb 2015 webinar
MySQL High Availability Solutions - Feb 2015 webinarMySQL High Availability Solutions - Feb 2015 webinar
MySQL High Availability Solutions - Feb 2015 webinar
 

Similar to Cloud monitoring overview

Security for Effective Data Storage in Multi Clouds
Security for Effective Data Storage in Multi CloudsSecurity for Effective Data Storage in Multi Clouds
Security for Effective Data Storage in Multi Clouds
Editor IJCATR
 
Cloud services.pdf
Cloud services.pdfCloud services.pdf
Cloud services.pdf
Asif Ali
 
Cscc cloud-customer-architecture-for-e commerce
Cscc cloud-customer-architecture-for-e commerceCscc cloud-customer-architecture-for-e commerce
Cscc cloud-customer-architecture-for-e commerce
r_arorabms
 

Similar to Cloud monitoring overview (20)

Cloud monitoring overview
Cloud monitoring overviewCloud monitoring overview
Cloud monitoring overview
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud Ecosystems A Perspective
Cloud Ecosystems A PerspectiveCloud Ecosystems A Perspective
Cloud Ecosystems A Perspective
 
An Intro to Cloud Computing
An Intro to Cloud ComputingAn Intro to Cloud Computing
An Intro to Cloud Computing
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challenges
 
Security for Effective Data Storage in Multi Clouds
Security for Effective Data Storage in Multi CloudsSecurity for Effective Data Storage in Multi Clouds
Security for Effective Data Storage in Multi Clouds
 
Cloud Computing – Opportunities, Definitions, Options, and Risks (Part-1)
Cloud Computing – Opportunities, Definitions, Options, and Risks (Part-1)Cloud Computing – Opportunities, Definitions, Options, and Risks (Part-1)
Cloud Computing – Opportunities, Definitions, Options, and Risks (Part-1)
 
A Novel Computing Paradigm for Data Protection in Cloud Computing
A Novel Computing Paradigm for Data Protection in Cloud ComputingA Novel Computing Paradigm for Data Protection in Cloud Computing
A Novel Computing Paradigm for Data Protection in Cloud Computing
 
Cloud services.pdf
Cloud services.pdfCloud services.pdf
Cloud services.pdf
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
DEVELOPING APPLICATION FOR CLOUD – A PROGRAMMER’S PERSPECTIVE
DEVELOPING APPLICATION FOR CLOUD – A PROGRAMMER’S PERSPECTIVEDEVELOPING APPLICATION FOR CLOUD – A PROGRAMMER’S PERSPECTIVE
DEVELOPING APPLICATION FOR CLOUD – A PROGRAMMER’S PERSPECTIVE
 
How Cloud Infrastructure Automation Benefits Organizations.pdf
How Cloud Infrastructure Automation Benefits Organizations.pdfHow Cloud Infrastructure Automation Benefits Organizations.pdf
How Cloud Infrastructure Automation Benefits Organizations.pdf
 
Cloud computing and migration strategies to cloud
Cloud computing and migration strategies to cloudCloud computing and migration strategies to cloud
Cloud computing and migration strategies to cloud
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Cloud Computing Networks
Cloud Computing NetworksCloud Computing Networks
Cloud Computing Networks
 
Cscc cloud-customer-architecture-for-e commerce
Cscc cloud-customer-architecture-for-e commerceCscc cloud-customer-architecture-for-e commerce
Cscc cloud-customer-architecture-for-e commerce
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Issues in cloud computing
Issues in cloud computingIssues in cloud computing
Issues in cloud computing
 
SECURING THE CLOUD DATA LAKES
SECURING THE CLOUD DATA LAKESSECURING THE CLOUD DATA LAKES
SECURING THE CLOUD DATA LAKES
 
Welcome to the Cloud!
Welcome to the Cloud!Welcome to the Cloud!
Welcome to the Cloud!
 

More from Dr. Ramkumar Lakshminarayanan

More from Dr. Ramkumar Lakshminarayanan (20)

IT security awareness
IT security awarenessIT security awareness
IT security awareness
 
Basics of IT security
Basics of IT securityBasics of IT security
Basics of IT security
 
IT Security Awareness Posters
IT Security Awareness PostersIT Security Awareness Posters
IT Security Awareness Posters
 
Normalisation revision
Normalisation revisionNormalisation revision
Normalisation revision
 
Windows mobile programming
Windows mobile programmingWindows mobile programming
Windows mobile programming
 
Concurrency control
Concurrency controlConcurrency control
Concurrency control
 
Web technology today
Web technology todayWeb technology today
Web technology today
 
Php Tutorial
Php TutorialPhp Tutorial
Php Tutorial
 
Phonegap for Android
Phonegap for AndroidPhonegap for Android
Phonegap for Android
 
Create and Sell Android App (in tamil)
Create and Sell Android App (in tamil)Create and Sell Android App (in tamil)
Create and Sell Android App (in tamil)
 
Android app - Creating Live Wallpaper (tamil)
Android app - Creating Live Wallpaper (tamil)Android app - Creating Live Wallpaper (tamil)
Android app - Creating Live Wallpaper (tamil)
 
Android Tips (Tamil)
Android Tips (Tamil)Android Tips (Tamil)
Android Tips (Tamil)
 
Android Animation (in tamil)
Android Animation (in tamil)Android Animation (in tamil)
Android Animation (in tamil)
 
Creating List in Android App (in tamil)
Creating List in Android App (in tamil)Creating List in Android App (in tamil)
Creating List in Android App (in tamil)
 
Single Touch event view in Android (in tamil)
Single Touch event view in Android (in tamil)Single Touch event view in Android (in tamil)
Single Touch event view in Android (in tamil)
 
Android Application using seekbar (in tamil)
Android Application using seekbar (in tamil)Android Application using seekbar (in tamil)
Android Application using seekbar (in tamil)
 
Rating Bar in Android Example
Rating Bar in Android ExampleRating Bar in Android Example
Rating Bar in Android Example
 
Creating Image Gallery - Android app (in tamil)
Creating Image Gallery - Android app (in tamil)Creating Image Gallery - Android app (in tamil)
Creating Image Gallery - Android app (in tamil)
 
Create Android App using web view (in tamil)
Create Android App using web view (in tamil)Create Android App using web view (in tamil)
Create Android App using web view (in tamil)
 
Hardware Interface in Android (in tamil)
Hardware Interface in Android (in tamil)Hardware Interface in Android (in tamil)
Hardware Interface in Android (in tamil)
 

Cloud monitoring overview

  • 2.  Interoperability means easy migration and integration of applications and data between different vendors’ clouds. Owing to different hypervisors (KVM, Hyper-V, ESX, ESXi), VM technologies, storage, configuring operating systems, various security standards and management interfaces, many cloud systems are not interoperable. Interoperability
  • 3.  Many enterprises want interoperability between their inhouse infrastructure and the cloud. The issue of interoperability need to be addressed to allow applications to be ported between clouds, or use multiple cloud multiple cloud infrastructures, before critical business applications are delivered from the cloud. Most clouds are completely opaque to their users . Interoperability
  • 4.  Most of the time, users are fine until there is access issue.  In such situations, frustration increase exponentially with time, partly because of the opacity.  We need monitoring solution to avoid frustration. Interoperability
  • 5.  Data migration between data centers or cloud systems are important concerns of taxonomy.  While migrating data, some considerations should be taken into account like no data loss, availability, scalability, cost-efficiency, and load balancing.  User should be able to move their data and applications any time from one to anther seamlessly, without any one vendor controlling it. Data Migration
  • 6.  Seamless transfer, as in mobile communication, is required cloud computing to work.  Many enterprises do not move their mission critical data and applications to the cloud because of vendor lock-in, security, governance, and many more complications. Data Migration
  • 7.  The management services contain deployment, monitoring, reporting, service-level agreement, and metering billing. We discuss these in detail. Management Services
  • 8.  To reduce the complexity and administrative burden across the cloud deployment, we need the automation process life cycle.  RightScale Cloud Management Platform addresses three stages of the cloud application deployment lifecycle, namely design, manage, and deploy. Deployment and Configuration
  • 9.  Tools such as cfengine, Chef from Opscode-chef, rPath, and Puppet are available as configuration management frameworks.  These tools help software developers and engineers to manage server and application configuration by writing code, rather than running commands by hand. Deployment and Configuration
  • 10.  Developing, testing, debugging, and studying the performance of cloud systems is quite complex.  Management cost increases significantly as the number of sites increases.  To address such problems, we need monitoring and reporting mechanisms.  Monitoring basically monitor the SLA lifecycle. It also determines when an SLA completes and reports to the building service.  There are some services that monitor the cloud and reports to the billing services. Monitoring and Reporting
  • 11.  There are some services that monitor the cloud systems and produce health reports such as Hyperic HQ.  Hyperic lets sysadmins find, fix and prevent performance problems in custom web apps, whether running on physical, virtual, or cloud infrastructure. 2.3.5.2 Monitoring and Reporting
  • 12.  Users always want stable and reliable system service. Cloud architecture is considered to be highly available, up and running 24 h X 7 days.  Many cloud service providers have made huge investments to make their system reliable. However, most cloud vendors today do not provide high availability assurance.  If a service goes down, for whatever reason, what can a user do? How can users access their documents stored in the cloud?  In such a case, the provider should pay a fine to the consumer as compensation to meet SLAs. Service-Level Agreements (SLAs) Management
  • 13.  An SLA specifies the measurement, evaluation, and reporting of the agreed service level standards such as: Service-Level Agreements (SLAs) Management
  • 14.  Currently, Amazon offers a “99.9% Monthly Uptime Percentage” SLA for Simple Storage Service (Amazon S3) and credit is limited to 10%.  Amazon credits 25% of charges if the availability drops is limited to 10%.  Amazon credits 25% of charges if the availability drops below 99.0%, whereas 3Tear Virtual Private Data Center (VPDC) service will include a 99.999% availability SLA that is supposed to help assure customers about putting mission-critical apps and services in the cloud. Service-Level Agreements (SLAs) Management
  • 15.  Transparent metering and billing will increase the trust level of users towards cloud services.  Pay-as-you-go subscription or pay-as-you-consume model of billing and metering are popular for cloud.  This service gets the status of the SLA, and invokes the credit service, which debits the user credit card or account and informs the user. Metering and Billing
  • 16.  There are many pricing strategies such as RAM hours, CPU Capacity, Bandwidth (Inbound/Outbound Data Transfer), Storage (gigabytes of data), Software (License Fee), and Subscription-Based Pricing.  There are some interesting new billing models such GoGrid prepaid cloud hosting plan and IDC cloud billing research, which are great examples of moving cloud pricing models towards telecom models. Metering and Billing
  • 17.  Self-service application provisioning enables application developers to set up application infrastructure, such as Java application servers, database, and messaging servers, without any help or assistance from infrastructure teams.  Self-service application provisioning hides the complexity of the enterprise cloud from application developers and empower them to set up and configure complex application infrastructure with the click of a button. Provisioning
  • 18.  By building a self-service portal for on-demand provisioning, we can reduce process overheads.  Provisioning can help to manage resource management, workload management, and autorecovery and task and process automation. Provisioning
  • 19.  Cloud Providers provides security by  Certifications and Accreditations.  Physical Security.  Secure Services.  Data Privacy. Security
  • 20.  Corporate information is not only a competitive asset, but it often contains information of consumers and employees that in the wrong hands, could create a civil liability and possibly criminal charges.  The key challenges of cloud security are performance, risk management, governance, design, and deployability. Security
  • 21.  Customers who worry about the privacy of their information should encrypt their data before moving it to the cloud.  The provider should provide the utilities to simplify the process of encrypting the files and storing them in the cloud; similarly, for retrieval decryption will need.  Cloud provider use the Advanced Encryption Standard (AES) that may be AES-128, AES-192, or AES- 256. Encryption/Decryption
  • 22.  Federation is the act of combining data or identities across multiple systems. Federation can be done by a cloud provider or by a cloud broker.  Each user can subscribe to a portal and be given an access card, which will be used to identify the subscriber at this particular portal or other portal in collaboration. Privacy and Federated Identity
  • 23.  In public cloud, safeguards must be placed on machines to ensure proper authentication and authorization.  Within the private cloud environment, one can track, pinpoint, control, and manage users who try to access machines with improper credential.  Single sign-on is the basic requirement for a customer who accesses multiple cloud services. Authorization and Authentication
  • 24.  In case of failure, there will be a hot backup instance of the application, which is ready to take over without disruption.  Cloud computing outages extend into the more refined version of cloud service platform. Some outages have been quite lengthy. Fault Tolerance
  • 25.  The major problem for cloud computing is how to minimize outage/failover to provide reliable services.  It is important to adopt the well-known Recovery- Oriented Computing (ROC) paradigm in large data center.  Google uses Google File System (GFS) or distributed disk storage; every piece of data is replicated three times. If one machine dies, a master redistributes the data to a new server. Fault Tolerance
  • 26.  This section provides a technical comparison of several technologies and cloud providers. Table 2.2-2.3 compare between different infrastructure technologies and solution providers such as Amazon Web Service (AWS), GoGrid, Flexiscale, and Moso. Classification and Comparison between Cloud Computing Ecosystems
  • 27. Classification and Comparison between Cloud Computing Ecosystems
  • 28. Classification and Comparison between Cloud Computing Ecosystems
  • 29.  Tables 2.4-2.6 compares different SaaS and PaaS service providers such as Google AppEngine (GAE), GigaSpace, Azure, RightScale, SunCloud, and Salesforce.com (SFDC) 2.4 Classification and Comparison between Cloud Computing Ecosystems
  • 30. 2.4 Classification and Comparison between Cloud Computing Ecosystems
  • 31. Classification and Comparison between Cloud Computing Ecosystems
  • 32. Classification and Comparison between Cloud Computing Ecosystems
  • 33.  Similarly, Tables 2.7-2.8 compare open source cloud-based services like Eucalyptus, Open Nebula, Nimbus, and Enomaly. Classification and Comparison between Cloud Computing Ecosystems
  • 34. 2.4 Classification and Comparison between Cloud Computing Ecosystems
  • 35. Classification and Comparison between Cloud Computing Ecosystems
  • 36.  In EC2 architecture, users are able to monitor and control their applications as an instance but not as a service.  To achieve manageability, the following capabilities are required: application-defined SLAs, such as workload capacity and concurrent computational tasks, dynamic provision of additional services to handle additional workload.  AWS is becoming popular as a de facto standard; many cloud systems are using a similar API. Eucalyptus is an open-source implementation of the AWS APIs. Cloud Computing Infrastructure Technology and Solution Provider
  • 37.  The biggest concern of current cloud computing system is auditing of the security controls and mechanism in terms of user level.  Amazon S3 lacks in access control that support delegation and auditing, and makes implicit trust assumptions between S3 and client.  Amazon’s work towards Statement on Auditing Standard No. 70: Service Organizations, Type II (SAS70 type II) certification may be helpful for those concerned with widely varying levels of security competency. Cloud Computing Infrastructure Technology and Solution Provider
  • 38.  Google App Engine (GAE) provides a useful basis for people useful basis for people and companies to make web application from scratch without needing to worry about infrastructure.  GAE provides for automatic scaling and load balancing. Cloud Computing PaaS and SaaS Provider
  • 39.  GigaSpaces use an In-Memory Data-Grid (IMDG) technique to manage state data in a database, which bridges the bottleneck of scalability.  It provides all the basic features of a high-end Data Grid as well as unique features, such as continuous query and seamless integration with external data sources, and makes it extremely easy to deploy, modify, and ensure high availability for applications running on Amazon EC2. Cloud Computing PaaS and SaaS Provider
  • 40.  GIgaSpaces’s Space-Based Architecture (SBA) approaches are based on the Tuple Space model that can meet the challenge of running low-latency transactional applications in a highly distributed environment such as Amazon EC2. Cloud Computing PaaS and SaaS Provider
  • 41.  The role of open source cloud computing is to build mechanisms around digital identify management, and outline technological building blocks that are needed for controllable trust and identity verification.  Nimbus supports the OASIS WSRF standard that defines a framework and uses we services to model and access stateful resources.  Enomaly cloud is focusing on the issue of interoperability, which is essential for enterprise cloud system. Most of the open source clouds are providing IaaS. Open Source Based Cloud Computing Services
  • 42.  There are some issues related to mechanism such as security, privacy, (erosion of) data integrity, load balancing, interoperability, and scalable storage.  Cloud computing services often provide common business applications online that are accessed from a web browser, while the software and data are stored on the servers. Comments on Issues and Opportunities
  • 43.  Transmitting huge volumes of multimedia data across clouds will continue to be a challenge, and needs further research.  Discovery and composition of the services between multiple clouds is also a promising arena for enterprise cloud. Comments on Issues and Opportunities
  • 44.  As the user requirement changes, functionality and privacy requirements may change, and so privacy requirements need to be reassessed at regular intervals.  Policy design dynamic privacy design pattern may be a better technique for cloud computing.  Cloud computing bring some novel attacks that have not figured in much of security discussion to date. Comments on Issues and Opportunities
  • 45.  Amazon AWS Import/Export support importing and exporting data into and out of Amazon S3 buckets in the USA, but leaves complication in migration of data between clouds.  A major challenge of moving applications to the cloud is the need to master multiple programming language and operating environment. 2. 6 Comments on Issues and Opportunities
  • 46.  Special attention is needed for government agencies to integrate their data from tradition to PaaS, a need to learn some new programming models residing in the cloud.  Interoperability is another important issue for cloud. There is a need for data access interoperability, which is a unique programming interface to access diverse database (such as JDBS, ODBC, Ado.NET).  There are lots of standardization issues; in the race to standardization, many organization and forums are working, but need to leverage the collaboration and discussion between them. Comments on Issues and Opportunities
  • 47.  Armbrust et al. also identified many issues for future research. There are some complications with current programming frameworks and programming languages for cloud computing such as Google AppEngine with its SQL-like syntax called “GQL”. Select statements in GQL can be performed on one table only.  GQL does not support a join statement. The cloud developers will need more flexible query-oriented and API-oriented programming in future. Comments on Issues and Opportunities
  • 48.  The complexity will be there for developers to apply the disciplines of development across multiple platform technologies and computational models. The alignment of user needs with business strategy is also a challenging job for CIOs. Comments on Issues and Opportunities