LISA21 - Re-imagining Management Methods for Distributed and Clustered Systems with Kraken/Layercake
Re-imagining Management Methods for Distributed and Clustered Systems with Kraken/Layercake
J. Lowell Wofford, Kevin Pelzel, and Travis Cotton, Los Alamos National Laboratory
The overarching design of cluster system management stacks has not changed in decades. Most existing tooling works the same: set up netboot, configure some system ""images,"" power on, and hope for the best. This set-it-and-leave-it approach is inadequate as systems grow in size and complexity. Modern systems need robust ways to automate systems management and enforce system states over time.
We have been rethinking the tooling for clustered systems. We introduce a new framework for distributed system automation, ""Kraken,"" as well as a Kraken-based provisioning toolkit, ""Layercake."" Together they provide distributed, stateful provisioning and automation across clustered systems. Immediate advantages include: scalably and reliably initializing clusters from bare metal; self-healing capabilities for (some) failures; continuous system state enforcement; automated changes to configurations, personalities, and node images (often in microseconds); all while being declarative, idempotent, modular & extensible. We will present both the Kraken/Layercake tooling and outline the core design principles.
View the full LISA21 program at https://www.usenix.org/conference/lisa21/program
Видео LISA21 - Re-imagining Management Methods for Distributed and Clustered Systems with Kraken/Layercake канала USENIX
J. Lowell Wofford, Kevin Pelzel, and Travis Cotton, Los Alamos National Laboratory
The overarching design of cluster system management stacks has not changed in decades. Most existing tooling works the same: set up netboot, configure some system ""images,"" power on, and hope for the best. This set-it-and-leave-it approach is inadequate as systems grow in size and complexity. Modern systems need robust ways to automate systems management and enforce system states over time.
We have been rethinking the tooling for clustered systems. We introduce a new framework for distributed system automation, ""Kraken,"" as well as a Kraken-based provisioning toolkit, ""Layercake."" Together they provide distributed, stateful provisioning and automation across clustered systems. Immediate advantages include: scalably and reliably initializing clusters from bare metal; self-healing capabilities for (some) failures; continuous system state enforcement; automated changes to configurations, personalities, and node images (often in microseconds); all while being declarative, idempotent, modular & extensible. We will present both the Kraken/Layercake tooling and outline the core design principles.
View the full LISA21 program at https://www.usenix.org/conference/lisa21/program
Видео LISA21 - Re-imagining Management Methods for Distributed and Clustered Systems with Kraken/Layercake канала USENIX
Показать
Комментарии отсутствуют
Информация о видео
Другие видео канала
LISA17 - Scalability Is Quantifiable: The Universal Scalability LawLISA21 - Why You Should Burn Down Your DatacenterMy First Petabyte: Now What?SREcon16 - Performance Checklists for SREsWhat is IoT? Understanding IoT Protocols, Clients and ManagementUSENIX Security '17 - Differential Privacy: From Theory to DeploymentLISA14 - Open Compute Project and the Changing Data CenterBECOME SUCCESSFUL AT WORK | How to handle Stress and Anxiety at Work (Consulting Insights)USENIX ATC '17: Performance Superpowers with Enhanced BPFLISA14 - "You Code Like a Sysadmin"—Software Development for the Non-DeveloperUSENIX Security '14 - Peeking into Your App without Actually Seeing It: UI State InferenceA Study of Practical DeduplicationUSENIX Security '14 - Never Been KIST: Tor’s Congestion Management Blossoms with Kernel-InformedUSENIX Security '14 - iSeeYou: Disabling the MacBook Webcam Indicator LEDThe Most Successful People Explain Why a College Degree is USELESSThere is No Algorithm for Truth - with Tom ScottUSENIX Security '14 - Size Does Matter: Why Using Gadget-Chain Length to Prevent Code-Reuse AttacksLISA14 - I Am SysAdmin (And So Can You!)USENIX Security '14 - ROP is Still Dangerous: Breaking Modern Defenses