Soroban: Attributing Latency in Virtualized Environments
نویسندگان
چکیده
Applications executing on a hypervisor or in a container experience a lack of performance isolation from other services executing on shared resources. Latencysensitive applications executing in the cloud therefore have highly-variable response times, yet attributing the additional latency caused by virtualization overheads on individual requests is an unsolved problem. We present Soroban, a framework for attributing latency to either the cloud provider or their customer. Soroban allows developers to instrument applications, such as web servers to determine, for each request, how much of the latency is due to the cloud provider, and how much is due to the consumer’s application or service. With this support Soroban enables cloud-providers to provision based on acceptable-latencies, adopt finegrained charging levels that reflect latency demands of users and attribute performance anomalies to either the cloud provider or their consumer. We apply Soroban to a HTTP server and show that it identifies when the cause of latency is due to a provider-induced activity, such as underprovisioning a host, or due to the software run by the customer.
منابع مشابه
On Disk I/O Scheduling in Virtual Machines
Disk I/O schedulers are an essential part of most modern operating systems, with objectives such as improving disk utilization, and achieving better application performance and performance isolation. Current scheduler designs for OSs are based heavily on assumptions made about the latency characteristics of the underlying disk technology like electromechanical disks, flash storage, etc. In virt...
متن کاملSPECweb2005 Performance: ESX Server 3.5
VMware ESX Server 3.5 is designed for high performance. With a number of optimizations for superior performance, even the most I/O‐intensive applications perform well when deployed on VMware Infrastructure 3. In this paper we compare the performance of a virtual machine to that of a similarly configured native machine using the industry standard SPECweb2005 workload. In our virtualized tests we...
متن کاملOn Benchmarking Intrusion Detection Systems in Virtualized Environments
Modern intrusion detection systems (IDSes) for virtualized environments are deployed in the virtualization layer with components inside the virtual machine monitor (VMM) and the trusted host virtual machine (VM). Such IDSes can monitor at the same time the network and host activities of all guest VMs running on top of a VMM being isolated from malicious users of these VMs. We refer to IDSes for...
متن کاملXen2MX: High-performance communication in virtualized environments
Cloud computing infrastructures provide vast processing power and host a diverse set of computing workloads, ranging from service-oriented deployments to HighPerformance Computing (HPC) applications. As HPC applications scale to a large number of VMs, providing near-native network I/O performance to each peer VM is an important challenge. In this paper we present Xen2MX, a paravirtual interconn...
متن کاملSecure Hypervisors
Nowadays, more and more companies tend to use virtual machines instead of physically separated machines as platform for their IT services. This reduces the hardware costs and also simplifies the management of the IT infrastructure. However, virtualized environments do, in contrast to popular belief, not necessarily increase the security of a system. Actually, virtualized environments face the s...
متن کامل