SlideShare una empresa de Scribd logo
1 de 4
Descargar para leer sin conexión
Building Toward an Open and Extensible
          Autonomous Computing Platform Utilizing Existing Technologies




                            Third IEEE WoWMoM Workshop on
                  Autonomic and Opportunistic Communications (AOC 2009)
                           June 15, 2009 - Island of Kos (Greece)
                                http://cnd.iit.cnr.it/aoc2009/




                                         Phil Cryer
                                      www.philcryer.com

                     Missouri Botanical Garden - Saint Louis, Missouri, USA
                                        www.mobot.org


Phil Cryer 2009                                                               Page 1
Abstract                                                    1993, and is known and respected for focusing on
Today's continuously growing amount of data, paired         stability and security, while being known for strict
with the expanding hardware requirements such stores        adherence to free software philosophies. It also offers
demand, stresses currently overwhelmed information          the Debian package management utility, APT[2], which
technology staff, as their responsibilities multiply with   can be automated to take care of basic tasks in terms of
every new server. There is a real need for autonomous       checking for security updates, and automatically
computing systems that can look after themselves and        resolving dependencies when applying such updates.
demand far less human intervention than previously          The abilities of APT are key in providing a secure
required. While complete autonomous computing               autonomous system, as any security updates can be
systems are being theorized about, much of its promise      applied automatically, with notification emailed to an
can be realized today by using multiple, existing open      administrator. Additionally, Debian is the basis of one
source software applications, a basis that allows for the   of the most popular Linux distribution today, Ubuntu
ultimate in flexibility and customization. Building a       Linux[3], which is quickly becoming one of the most
distributed system using autonomous computing allows        used Linux distribution, a commentary to its quality
for an administration protocol which provides true          and flexibility.
opportunistic communication between autonomous
nodes, as any of them could serve as authoritative, or
querying members, depending on their current                Implementation and Installation
knowledge of required tasks. All of which allows us to      When considering software it is critically important to
provide an open and extensible autonomous computing         understand how the software will be implemented so
platform utilizing existing technologies.                   that automating the install, and eventual updates, is
                                                            possible. This step allows a disaster recovery plan that
                                                            causes the shortest amount of downtime, and reduces
Network Topology                                            the need for support staff to manually re-install the
When building an open, autonomous computing                 system. The Debian distribution has a specialized tool
environment, an overall architecture plan is the first      to take care of this exact task, which is called
step to decide upon. Since a star, ring or tree network     preseed[4]. Using preseed it is possible to have an
topology all leave you with a single point of failure,      installation procedure that automatically downloads
utilizing a distributed architecture network should be      and installs of the operating system, after being booted
considered at this time, since it solves many issues, and   off a standard USB thumbdrive. Using this not only
best supports the autonomous computing ideal. Even if       insures that only what is needed is installed, but also
there are only two system nodes, it is highly preferable    that only the latest, and most secure, versions of
to have them both taking care of each other rather than     software are applied. Examples of this have reduced
administrating both manually. Identically created           base installation time 20 minutes or less[5]. Post install
system nodes can pass along commands to allow its           scripts can extend this functionality, allowing the
autonomy to be passed along to others in the group.         system to automatically set up networking, needed
Nodes are able to then able to contribute at various        services and limits to conform with standards chosen
levels depending on which tier of authorization they are    by the administrator. For example, it's beneficial to
assigned to, and can adapt and change as instructions       have a new system ping a central server so that it can
cascade through the group. Being cognizant of the fact      understand the network topography and global
that both budget and information technology groups are      location, using global locating software GeoIP[6] and
being strained as requirements for systems increase, a      Internet Traffic Report[7] for future monitoring and
distributed administration environment is the best way      global network trending. Having a new system perform
to combat both factors.                                     this type of 'lint test' would provide it with crucial
                                                            information that it can use in the future.

Operating System Software
While many different Linux distributions could be           Shared System Administration
used, I highly recommend standardizing on the Debian        During setup it is simple to install and instruct scripts
GNU/Linux[1] distribution. It is one of the oldest          not only to take care of the local system, but of remote
Linux distributions, having been launched in August         systems as well. Two main functions of this

Phil Cryer 2009                                                                                                 Page 2
administration are keeping the system configured and it watch permissions it even allows it to perform basic
up to date with security releases, while also ensuring intrusion detection duties, and its abilities are not
the system and services are available.                    confined to local systems, it can just as easily monitor
                                                          remote systems, allowing for an external view of other
                                                          server's processes. Having used monit for years, I can
Shared System Administration - Configuration attest to its abilities, and often when using monit in
The distributed configuration application Puppet[8] concert with the above mentioned apticron I can go
helps to accomplish the goal of a hands-off, automated months without having to touch a production system
infrastructure. Created by a former developer of since I know if there is any issues thanks to these two,
Cfengine[9], which is an earlier configuration simple applications.
application, its features are an improvement over
previous systems, with simplicity and flexibility over a
variety of platforms its focus. With Puppet a network Distributed                                           Data
with two nodes, or hundreds of nodes, would act There are a number of distributed filesystems in use,
exactly the same, it keeps all systems in sync. Utilizing and by utilizing them a system becomes more
scripts, that it refers to as recipes, Puppet is able to autonomous since its data may be spread across
handle changes to configurations, packages, multiple systems, thus making its existence far less
applications, whenever they are needed. While Debian important that if it held all of the data. Examples of
itself will take care of log rotation and other core these systems range from a few nodes, to thousands of
system duties, another crucial aspect of keeping Debian nodes in a cluster. One of the highest profile systems is
systems up to date with security releases is by using a called Hadoop[12], which is a distributed computing
wrapper for APT called apticron[10]. This works via system used by Yahoo, which includes a distributed
cron, which Debian runs automatically at predefined filesystem called Hadoop Distributed File System
intervals, and when run will update the system's current (HDFS)[13]. This is referred to as an open source clone
cache of files and available updates. By setting the of Google File System (GFS)[14], which is Google's
configuration file sources.list to only monitor security similar, proprietary effort. HDFS is designed to scale to
updates, apticron can notify an administrator by email petabytes of storage, and run on top of the fileystems of
or SMS when there is a security update available. the underlying operating systems. This lack of any
Since Debian's security history has been excellent, I exotic requirements further puts it in the autonomous
have no problem setting apticron to automatically camp; it can be run across a variety of platforms, and
install any security updates as soon as it finds them, again, with data spread across so many nodes, the
thus allowing for a hands off, autonomously updating original node is not important for the integrity of the
system that alerts me after it performs such an action. data to remain constant. Other examples of distributed
With this method in place, any security issues on a files systems that are ready for large scale use are
Debian system will likely be updated by the time most GlusterFS[15] and Lustre[16], which was recently
hear of the vulnerability.                                acquired by Sun Microsystems[17].


Shared System Administration - Monitoring                  Hardware
System monitoring is provided by monit[11], which is       A final key consideration when building an
a utility for managing and monitoring, processes, files,   autonomous system is to consider the hardware, and
directories and file-systems on a UNIX system,             the impact of the server when it is taken out of the
designed as an autonomous system that does not             group of servers. For this application, standard x86 or
depend on plugins nor any special libraries to run.        x86_64 bit servers with standard PCI, AGP and SATA
Once configured monit can monitor and manage               interfaces become quite attractive. Not only are the
distributed computer systems, conduct automatic            prices for such systems far less than proprietary UNIX
maintenance and repair and execute meaningful causal       servers, another big benefit about staying with generic,
actions in error situations. Basically monit will watch    off the shelf x86 PC hardware is that any information
processes, check system resources and react                technology department, even a very small one, will be
accordingly when something amiss is found, and alert       comfortable swapping out components if they ever
an administrator that it has taken action. When having     need to, with basic parts you can buy anywhere, or

Phil Cryer 2009                                                                                              Page 3
order online. These are all common pieces of hardware,
easy to replace in every way.                               [8] Puppet, The Puppet framework provides a means to
                                                            describe IT infrastructure as policy, execute that policy
                                                            to build services then audit and enforce ongoing
Conclusion                                                  changes             to             the            policy,
While there are plenty of theories that one day might http://reductivelabs.com/products/puppet
make complete autonomous computing a reality, it's
important to understand what can already be [9] Cfengine, Cfengine is a policy-based configuration
accomplished today. Using multiple, existing open management system, http://www.cfengine.org
source software applications, allows for the ultimate in
flexibility, and is ideal to design and build a system that [10] Apticron, Automatic package update nagging with
many autonomous configurations.            All of which apticron, www.debian-administration.org/articles/491
provides an open and extensible autonomous
computing platform utilizing existing technologies.         [11] Monit, Monit is a utility for managing and
                                                            monitoring, processes, files, directories and file-
                                                            systems on a UNIX system, http://mmonit.com/monit/
References
[1] Debian GNU/Linux, An operating system (OS) for [12] Hadoop, Hadoop is a free Java software
your    computer     using the    Linux    kernel, framework that supports data intensive distributed
http://www.debian.org/                             applications, http://hadoop.apache.org/core

[2] Apt HOWTO, This document intends to provide the   [13] Hadoop Distributed File System (HDFS), Hadoop
user with a good understanding of the workings of the Distributed File System (HDFS), is an open source
Debian     package    management      utility,  APT,  Java product similar to GFS. It is designed to scale to
http://www.debian.org/doc/manuals/apt-howto/          petabytes of storage, and run on top of the fileystems of
                                                      the        underlying           operating        systems,
[3] Ubuntu Linux, Ubuntu is a community developed,    http://hadoop.apache.org/core
Linux-based operating system that is perfect for
laptops, desktops and servers, http://www.ubuntu.com/ [14] Google File System (GFS), Google File System
                                                      (GFS) is a proprietary distributed file system
[4] Preseed, Contents of an example preconfiguration developed by Google Inc. for its own use. It is designed
file                    for                   Debian, to provide efficient, reliable access to data using large
http://www.debian.org/releases/lenny/example-         clusters         of         commodity          hardware,
preseed.txt                                           http://en.wikipedia.org/wiki/Google_File_System

[5] Aaron Toponce, Automating Debian/Ubuntu                [15] GlusterFS, GlusterFS can scale to multiple Peta
Installs                 With                Preseed,      bytes and 100s of GB/s throughput, can sustain 1 GB/s
http://pthree.org/2008/05/20/automating-debianubuntu-      per storage brick over Infiniband RDMA and can self-
installs-with-preseedanother                               heal itself on the fly, http://www.gluster.org/

[6] GeoIP, GeoIP provides businesses with a non-           [16] Lustre, Lustre is a scalable, secure, robust, highly-
invasive way to determine geographical and other           available cluster file system. It is designed, developed
information about their Internet visitors in real-time,    and maintained by Sun Microsystems, Inc.,
http://www.maxmind.com/app/ip-location                     http://lustre.org

[7] Internet Traffic Report, The Internet Traffic Report [17] Sun Microsystems, Software company producing
monitors the flow of data around the world, Java and Solaris Operating System for Sun Hardware,
http://www.internettrafficreport.com/main.htm            http://sun.com




Phil Cryer 2009                                                                                                Page 4

Más contenido relacionado

La actualidad más candente

Linux Administrator - The Linux Course on Eduonix
Linux Administrator - The Linux Course on EduonixLinux Administrator - The Linux Course on Eduonix
Linux Administrator - The Linux Course on EduonixPaddy Lock
 
Raspberry pi introduction
Raspberry pi introductionRaspberry pi introduction
Raspberry pi introductionLusiana Diyan
 
Linux fundamentals
Linux fundamentalsLinux fundamentals
Linux fundamentalsRaghu nath
 
Linux Presentation
Linux PresentationLinux Presentation
Linux Presentationnishantsri
 
Ganesh naik linux_kernel_internals
Ganesh naik linux_kernel_internalsGanesh naik linux_kernel_internals
Ganesh naik linux_kernel_internalsGanesh Naik
 
Linux command ppt
Linux command pptLinux command ppt
Linux command pptkalyanineve
 
The basic concept of Linux FIleSystem
The basic concept of Linux FIleSystemThe basic concept of Linux FIleSystem
The basic concept of Linux FIleSystemHungWei Chiu
 
Linux basics part 1
Linux basics part 1Linux basics part 1
Linux basics part 1Lilesh Pathe
 
Linux beginner's Workshop
Linux beginner's WorkshopLinux beginner's Workshop
Linux beginner's Workshopfutureshocked
 
Introduction to linux at Introductory Bioinformatics Workshop
Introduction to linux at Introductory Bioinformatics WorkshopIntroduction to linux at Introductory Bioinformatics Workshop
Introduction to linux at Introductory Bioinformatics WorkshopSetor Amuzu
 
Linux Memory Analysis with Volatility
Linux Memory Analysis with VolatilityLinux Memory Analysis with Volatility
Linux Memory Analysis with VolatilityAndrew Case
 
Workshop - Linux Memory Analysis with Volatility
Workshop - Linux Memory Analysis with VolatilityWorkshop - Linux Memory Analysis with Volatility
Workshop - Linux Memory Analysis with VolatilityAndrew Case
 
Introduction to linux
Introduction to linuxIntroduction to linux
Introduction to linuxPrasanth V
 

La actualidad más candente (19)

Introduction to UNIX
Introduction to UNIXIntroduction to UNIX
Introduction to UNIX
 
Linux Administrator - The Linux Course on Eduonix
Linux Administrator - The Linux Course on EduonixLinux Administrator - The Linux Course on Eduonix
Linux Administrator - The Linux Course on Eduonix
 
Raspberry pi introduction
Raspberry pi introductionRaspberry pi introduction
Raspberry pi introduction
 
4. linux file systems
4. linux file systems4. linux file systems
4. linux file systems
 
Linux fundamentals
Linux fundamentalsLinux fundamentals
Linux fundamentals
 
RHEL6 - Rh124
RHEL6 - Rh124RHEL6 - Rh124
RHEL6 - Rh124
 
Linux
LinuxLinux
Linux
 
Linux Presentation
Linux PresentationLinux Presentation
Linux Presentation
 
Linux in Urdu
 Linux in Urdu  Linux in Urdu
Linux in Urdu
 
Ganesh naik linux_kernel_internals
Ganesh naik linux_kernel_internalsGanesh naik linux_kernel_internals
Ganesh naik linux_kernel_internals
 
Linux command ppt
Linux command pptLinux command ppt
Linux command ppt
 
The basic concept of Linux FIleSystem
The basic concept of Linux FIleSystemThe basic concept of Linux FIleSystem
The basic concept of Linux FIleSystem
 
Linux basics part 1
Linux basics part 1Linux basics part 1
Linux basics part 1
 
Linux beginner's Workshop
Linux beginner's WorkshopLinux beginner's Workshop
Linux beginner's Workshop
 
Introduction to linux at Introductory Bioinformatics Workshop
Introduction to linux at Introductory Bioinformatics WorkshopIntroduction to linux at Introductory Bioinformatics Workshop
Introduction to linux at Introductory Bioinformatics Workshop
 
Linux Memory Analysis with Volatility
Linux Memory Analysis with VolatilityLinux Memory Analysis with Volatility
Linux Memory Analysis with Volatility
 
Workshop - Linux Memory Analysis with Volatility
Workshop - Linux Memory Analysis with VolatilityWorkshop - Linux Memory Analysis with Volatility
Workshop - Linux Memory Analysis with Volatility
 
Linux
Linux Linux
Linux
 
Introduction to linux
Introduction to linuxIntroduction to linux
Introduction to linux
 

Similar a Building Toward an Open and Extensible Autonomous Computing Platform Utilizing Existing Technologies

Factors Affecting the System Safety || Linux
Factors Affecting the System Safety || LinuxFactors Affecting the System Safety || Linux
Factors Affecting the System Safety || LinuxZain Abid
 
Ap 06 4_10_simek
Ap 06 4_10_simekAp 06 4_10_simek
Ap 06 4_10_simekNguyen Vinh
 
IRJET- An Efficient Hardware-Oriented Runtime Approach for Stack-Based Softwa...
IRJET- An Efficient Hardware-Oriented Runtime Approach for Stack-Based Softwa...IRJET- An Efficient Hardware-Oriented Runtime Approach for Stack-Based Softwa...
IRJET- An Efficient Hardware-Oriented Runtime Approach for Stack-Based Softwa...IRJET Journal
 
A cloud environment for backup and data storage
A cloud environment for backup and data storageA cloud environment for backup and data storage
A cloud environment for backup and data storageIGEEKS TECHNOLOGIES
 
A cloud enviroment for backup and data storage
A cloud enviroment for backup and data storageA cloud enviroment for backup and data storage
A cloud enviroment for backup and data storageIGEEKS TECHNOLOGIES
 
A framework for optimization of the boot time on embedded linux environment w...
A framework for optimization of the boot time on embedded linux environment w...A framework for optimization of the boot time on embedded linux environment w...
A framework for optimization of the boot time on embedded linux environment w...BouchraBourass
 
Linux and Java - Understanding and Troubleshooting
Linux and Java - Understanding and TroubleshootingLinux and Java - Understanding and Troubleshooting
Linux and Java - Understanding and TroubleshootingJérôme Kehrli
 
CSI-503 - 11.Distributed Operating System
CSI-503 - 11.Distributed Operating SystemCSI-503 - 11.Distributed Operating System
CSI-503 - 11.Distributed Operating Systemghayour abbas
 
Деградация производительности при использовании FUSE
Деградация производительности при использовании FUSEДеградация производительности при использовании FUSE
Деградация производительности при использовании FUSEAnatol Alizar
 
Seeing O S Processes To Improve Dependability And Safety
Seeing  O S  Processes To  Improve  Dependability And  SafetySeeing  O S  Processes To  Improve  Dependability And  Safety
Seeing O S Processes To Improve Dependability And Safetyalanocu
 
Cs seminar 20070426
Cs seminar 20070426Cs seminar 20070426
Cs seminar 20070426Todd Deshane
 
Characteristics of a network operating system
Characteristics of a network operating systemCharacteristics of a network operating system
Characteristics of a network operating systemRon McGary
 
Operating system by aman kr kushwaha
Operating system by aman kr kushwahaOperating system by aman kr kushwaha
Operating system by aman kr kushwahaAMAN KUMAR KUSHWAHA
 

Similar a Building Toward an Open and Extensible Autonomous Computing Platform Utilizing Existing Technologies (20)

Factors Affecting the System Safety || Linux
Factors Affecting the System Safety || LinuxFactors Affecting the System Safety || Linux
Factors Affecting the System Safety || Linux
 
Desktop support qua
Desktop support quaDesktop support qua
Desktop support qua
 
Desktop support qua
Desktop support quaDesktop support qua
Desktop support qua
 
Ap 06 4_10_simek
Ap 06 4_10_simekAp 06 4_10_simek
Ap 06 4_10_simek
 
IRJET- An Efficient Hardware-Oriented Runtime Approach for Stack-Based Softwa...
IRJET- An Efficient Hardware-Oriented Runtime Approach for Stack-Based Softwa...IRJET- An Efficient Hardware-Oriented Runtime Approach for Stack-Based Softwa...
IRJET- An Efficient Hardware-Oriented Runtime Approach for Stack-Based Softwa...
 
CSEC630 individaul assign
CSEC630 individaul assignCSEC630 individaul assign
CSEC630 individaul assign
 
A cloud environment for backup and data storage
A cloud environment for backup and data storageA cloud environment for backup and data storage
A cloud environment for backup and data storage
 
A cloud enviroment for backup and data storage
A cloud enviroment for backup and data storageA cloud enviroment for backup and data storage
A cloud enviroment for backup and data storage
 
A framework for optimization of the boot time on embedded linux environment w...
A framework for optimization of the boot time on embedded linux environment w...A framework for optimization of the boot time on embedded linux environment w...
A framework for optimization of the boot time on embedded linux environment w...
 
System structure
System structureSystem structure
System structure
 
Linux and Java - Understanding and Troubleshooting
Linux and Java - Understanding and TroubleshootingLinux and Java - Understanding and Troubleshooting
Linux and Java - Understanding and Troubleshooting
 
CSI-503 - 11.Distributed Operating System
CSI-503 - 11.Distributed Operating SystemCSI-503 - 11.Distributed Operating System
CSI-503 - 11.Distributed Operating System
 
Windows vs linuxe
Windows vs linuxeWindows vs linuxe
Windows vs linuxe
 
Деградация производительности при использовании FUSE
Деградация производительности при использовании FUSEДеградация производительности при использовании FUSE
Деградация производительности при использовании FUSE
 
Linux Class 1 Reasons to use linux
Linux Class 1 Reasons to use linux Linux Class 1 Reasons to use linux
Linux Class 1 Reasons to use linux
 
Seeing O S Processes To Improve Dependability And Safety
Seeing  O S  Processes To  Improve  Dependability And  SafetySeeing  O S  Processes To  Improve  Dependability And  Safety
Seeing O S Processes To Improve Dependability And Safety
 
Cs seminar 20070426
Cs seminar 20070426Cs seminar 20070426
Cs seminar 20070426
 
Lesson 2
Lesson 2Lesson 2
Lesson 2
 
Characteristics of a network operating system
Characteristics of a network operating systemCharacteristics of a network operating system
Characteristics of a network operating system
 
Operating system by aman kr kushwaha
Operating system by aman kr kushwahaOperating system by aman kr kushwaha
Operating system by aman kr kushwaha
 

Más de Phil Cryer

Getting started with Mantl
Getting started with MantlGetting started with Mantl
Getting started with MantlPhil Cryer
 
Pets versus Cattle: servers evolved
Pets versus Cattle: servers evolvedPets versus Cattle: servers evolved
Pets versus Cattle: servers evolvedPhil Cryer
 
Moving towards unified logging
Moving towards unified loggingMoving towards unified logging
Moving towards unified loggingPhil Cryer
 
What if Petraeus Was a Hacker?
What if Petraeus Was a Hacker?What if Petraeus Was a Hacker?
What if Petraeus Was a Hacker?Phil Cryer
 
What if Petraeus was a hacker? Email privacy for the rest of us
What if Petraeus was a hacker? Email privacy for the rest of usWhat if Petraeus was a hacker? Email privacy for the rest of us
What if Petraeus was a hacker? Email privacy for the rest of usPhil Cryer
 
Online privacy concerns (and what we can do about it)
Online privacy concerns (and what we can do about it)Online privacy concerns (and what we can do about it)
Online privacy concerns (and what we can do about it)Phil Cryer
 
Online Privacy in the Year of the Dragon
Online Privacy in the Year of the DragonOnline Privacy in the Year of the Dragon
Online Privacy in the Year of the DragonPhil Cryer
 
Is your data secure? privacy and trust in the social web
Is your data secure?  privacy and trust in the social webIs your data secure?  privacy and trust in the social web
Is your data secure? privacy and trust in the social webPhil Cryer
 
Adoption of Persistent Identifiers for Biodiversity Informatics
Adoption of Persistent Identifiers for Biodiversity InformaticsAdoption of Persistent Identifiers for Biodiversity Informatics
Adoption of Persistent Identifiers for Biodiversity InformaticsPhil Cryer
 
Data hosting infrastructure for primary biodiversity data
Data hosting infrastructure for primary biodiversity dataData hosting infrastructure for primary biodiversity data
Data hosting infrastructure for primary biodiversity dataPhil Cryer
 
GBIF (Global Biodiversity Information Facility) Position Paper: Data Hosting ...
GBIF (Global Biodiversity Information Facility) Position Paper: Data Hosting ...GBIF (Global Biodiversity Information Facility) Position Paper: Data Hosting ...
GBIF (Global Biodiversity Information Facility) Position Paper: Data Hosting ...Phil Cryer
 
Biodiversity Heritiage Library: progress and process
Biodiversity Heritiage Library: progress and processBiodiversity Heritiage Library: progress and process
Biodiversity Heritiage Library: progress and processPhil Cryer
 
Storing and distributing data
Storing and distributing dataStoring and distributing data
Storing and distributing dataPhil Cryer
 
BHL hardware architecture - storage and clusters
BHL hardware architecture - storage and clustersBHL hardware architecture - storage and clusters
BHL hardware architecture - storage and clustersPhil Cryer
 
Building A Scalable Open Source Storage Solution
Building A Scalable Open Source Storage SolutionBuilding A Scalable Open Source Storage Solution
Building A Scalable Open Source Storage SolutionPhil Cryer
 
Biodiversity Heritage Library Articles Demo
Biodiversity Heritage Library Articles DemoBiodiversity Heritage Library Articles Demo
Biodiversity Heritage Library Articles DemoPhil Cryer
 
Using Fedora Commons To Create A Persistent Archive
Using Fedora Commons To Create A Persistent ArchiveUsing Fedora Commons To Create A Persistent Archive
Using Fedora Commons To Create A Persistent ArchivePhil Cryer
 

Más de Phil Cryer (17)

Getting started with Mantl
Getting started with MantlGetting started with Mantl
Getting started with Mantl
 
Pets versus Cattle: servers evolved
Pets versus Cattle: servers evolvedPets versus Cattle: servers evolved
Pets versus Cattle: servers evolved
 
Moving towards unified logging
Moving towards unified loggingMoving towards unified logging
Moving towards unified logging
 
What if Petraeus Was a Hacker?
What if Petraeus Was a Hacker?What if Petraeus Was a Hacker?
What if Petraeus Was a Hacker?
 
What if Petraeus was a hacker? Email privacy for the rest of us
What if Petraeus was a hacker? Email privacy for the rest of usWhat if Petraeus was a hacker? Email privacy for the rest of us
What if Petraeus was a hacker? Email privacy for the rest of us
 
Online privacy concerns (and what we can do about it)
Online privacy concerns (and what we can do about it)Online privacy concerns (and what we can do about it)
Online privacy concerns (and what we can do about it)
 
Online Privacy in the Year of the Dragon
Online Privacy in the Year of the DragonOnline Privacy in the Year of the Dragon
Online Privacy in the Year of the Dragon
 
Is your data secure? privacy and trust in the social web
Is your data secure?  privacy and trust in the social webIs your data secure?  privacy and trust in the social web
Is your data secure? privacy and trust in the social web
 
Adoption of Persistent Identifiers for Biodiversity Informatics
Adoption of Persistent Identifiers for Biodiversity InformaticsAdoption of Persistent Identifiers for Biodiversity Informatics
Adoption of Persistent Identifiers for Biodiversity Informatics
 
Data hosting infrastructure for primary biodiversity data
Data hosting infrastructure for primary biodiversity dataData hosting infrastructure for primary biodiversity data
Data hosting infrastructure for primary biodiversity data
 
GBIF (Global Biodiversity Information Facility) Position Paper: Data Hosting ...
GBIF (Global Biodiversity Information Facility) Position Paper: Data Hosting ...GBIF (Global Biodiversity Information Facility) Position Paper: Data Hosting ...
GBIF (Global Biodiversity Information Facility) Position Paper: Data Hosting ...
 
Biodiversity Heritiage Library: progress and process
Biodiversity Heritiage Library: progress and processBiodiversity Heritiage Library: progress and process
Biodiversity Heritiage Library: progress and process
 
Storing and distributing data
Storing and distributing dataStoring and distributing data
Storing and distributing data
 
BHL hardware architecture - storage and clusters
BHL hardware architecture - storage and clustersBHL hardware architecture - storage and clusters
BHL hardware architecture - storage and clusters
 
Building A Scalable Open Source Storage Solution
Building A Scalable Open Source Storage SolutionBuilding A Scalable Open Source Storage Solution
Building A Scalable Open Source Storage Solution
 
Biodiversity Heritage Library Articles Demo
Biodiversity Heritage Library Articles DemoBiodiversity Heritage Library Articles Demo
Biodiversity Heritage Library Articles Demo
 
Using Fedora Commons To Create A Persistent Archive
Using Fedora Commons To Create A Persistent ArchiveUsing Fedora Commons To Create A Persistent Archive
Using Fedora Commons To Create A Persistent Archive
 

Último

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 

Último (20)

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 

Building Toward an Open and Extensible Autonomous Computing Platform Utilizing Existing Technologies

  • 1. Building Toward an Open and Extensible Autonomous Computing Platform Utilizing Existing Technologies Third IEEE WoWMoM Workshop on Autonomic and Opportunistic Communications (AOC 2009) June 15, 2009 - Island of Kos (Greece) http://cnd.iit.cnr.it/aoc2009/ Phil Cryer www.philcryer.com Missouri Botanical Garden - Saint Louis, Missouri, USA www.mobot.org Phil Cryer 2009 Page 1
  • 2. Abstract 1993, and is known and respected for focusing on Today's continuously growing amount of data, paired stability and security, while being known for strict with the expanding hardware requirements such stores adherence to free software philosophies. It also offers demand, stresses currently overwhelmed information the Debian package management utility, APT[2], which technology staff, as their responsibilities multiply with can be automated to take care of basic tasks in terms of every new server. There is a real need for autonomous checking for security updates, and automatically computing systems that can look after themselves and resolving dependencies when applying such updates. demand far less human intervention than previously The abilities of APT are key in providing a secure required. While complete autonomous computing autonomous system, as any security updates can be systems are being theorized about, much of its promise applied automatically, with notification emailed to an can be realized today by using multiple, existing open administrator. Additionally, Debian is the basis of one source software applications, a basis that allows for the of the most popular Linux distribution today, Ubuntu ultimate in flexibility and customization. Building a Linux[3], which is quickly becoming one of the most distributed system using autonomous computing allows used Linux distribution, a commentary to its quality for an administration protocol which provides true and flexibility. opportunistic communication between autonomous nodes, as any of them could serve as authoritative, or querying members, depending on their current Implementation and Installation knowledge of required tasks. All of which allows us to When considering software it is critically important to provide an open and extensible autonomous computing understand how the software will be implemented so platform utilizing existing technologies. that automating the install, and eventual updates, is possible. This step allows a disaster recovery plan that causes the shortest amount of downtime, and reduces Network Topology the need for support staff to manually re-install the When building an open, autonomous computing system. The Debian distribution has a specialized tool environment, an overall architecture plan is the first to take care of this exact task, which is called step to decide upon. Since a star, ring or tree network preseed[4]. Using preseed it is possible to have an topology all leave you with a single point of failure, installation procedure that automatically downloads utilizing a distributed architecture network should be and installs of the operating system, after being booted considered at this time, since it solves many issues, and off a standard USB thumbdrive. Using this not only best supports the autonomous computing ideal. Even if insures that only what is needed is installed, but also there are only two system nodes, it is highly preferable that only the latest, and most secure, versions of to have them both taking care of each other rather than software are applied. Examples of this have reduced administrating both manually. Identically created base installation time 20 minutes or less[5]. Post install system nodes can pass along commands to allow its scripts can extend this functionality, allowing the autonomy to be passed along to others in the group. system to automatically set up networking, needed Nodes are able to then able to contribute at various services and limits to conform with standards chosen levels depending on which tier of authorization they are by the administrator. For example, it's beneficial to assigned to, and can adapt and change as instructions have a new system ping a central server so that it can cascade through the group. Being cognizant of the fact understand the network topography and global that both budget and information technology groups are location, using global locating software GeoIP[6] and being strained as requirements for systems increase, a Internet Traffic Report[7] for future monitoring and distributed administration environment is the best way global network trending. Having a new system perform to combat both factors. this type of 'lint test' would provide it with crucial information that it can use in the future. Operating System Software While many different Linux distributions could be Shared System Administration used, I highly recommend standardizing on the Debian During setup it is simple to install and instruct scripts GNU/Linux[1] distribution. It is one of the oldest not only to take care of the local system, but of remote Linux distributions, having been launched in August systems as well. Two main functions of this Phil Cryer 2009 Page 2
  • 3. administration are keeping the system configured and it watch permissions it even allows it to perform basic up to date with security releases, while also ensuring intrusion detection duties, and its abilities are not the system and services are available. confined to local systems, it can just as easily monitor remote systems, allowing for an external view of other server's processes. Having used monit for years, I can Shared System Administration - Configuration attest to its abilities, and often when using monit in The distributed configuration application Puppet[8] concert with the above mentioned apticron I can go helps to accomplish the goal of a hands-off, automated months without having to touch a production system infrastructure. Created by a former developer of since I know if there is any issues thanks to these two, Cfengine[9], which is an earlier configuration simple applications. application, its features are an improvement over previous systems, with simplicity and flexibility over a variety of platforms its focus. With Puppet a network Distributed Data with two nodes, or hundreds of nodes, would act There are a number of distributed filesystems in use, exactly the same, it keeps all systems in sync. Utilizing and by utilizing them a system becomes more scripts, that it refers to as recipes, Puppet is able to autonomous since its data may be spread across handle changes to configurations, packages, multiple systems, thus making its existence far less applications, whenever they are needed. While Debian important that if it held all of the data. Examples of itself will take care of log rotation and other core these systems range from a few nodes, to thousands of system duties, another crucial aspect of keeping Debian nodes in a cluster. One of the highest profile systems is systems up to date with security releases is by using a called Hadoop[12], which is a distributed computing wrapper for APT called apticron[10]. This works via system used by Yahoo, which includes a distributed cron, which Debian runs automatically at predefined filesystem called Hadoop Distributed File System intervals, and when run will update the system's current (HDFS)[13]. This is referred to as an open source clone cache of files and available updates. By setting the of Google File System (GFS)[14], which is Google's configuration file sources.list to only monitor security similar, proprietary effort. HDFS is designed to scale to updates, apticron can notify an administrator by email petabytes of storage, and run on top of the fileystems of or SMS when there is a security update available. the underlying operating systems. This lack of any Since Debian's security history has been excellent, I exotic requirements further puts it in the autonomous have no problem setting apticron to automatically camp; it can be run across a variety of platforms, and install any security updates as soon as it finds them, again, with data spread across so many nodes, the thus allowing for a hands off, autonomously updating original node is not important for the integrity of the system that alerts me after it performs such an action. data to remain constant. Other examples of distributed With this method in place, any security issues on a files systems that are ready for large scale use are Debian system will likely be updated by the time most GlusterFS[15] and Lustre[16], which was recently hear of the vulnerability. acquired by Sun Microsystems[17]. Shared System Administration - Monitoring Hardware System monitoring is provided by monit[11], which is A final key consideration when building an a utility for managing and monitoring, processes, files, autonomous system is to consider the hardware, and directories and file-systems on a UNIX system, the impact of the server when it is taken out of the designed as an autonomous system that does not group of servers. For this application, standard x86 or depend on plugins nor any special libraries to run. x86_64 bit servers with standard PCI, AGP and SATA Once configured monit can monitor and manage interfaces become quite attractive. Not only are the distributed computer systems, conduct automatic prices for such systems far less than proprietary UNIX maintenance and repair and execute meaningful causal servers, another big benefit about staying with generic, actions in error situations. Basically monit will watch off the shelf x86 PC hardware is that any information processes, check system resources and react technology department, even a very small one, will be accordingly when something amiss is found, and alert comfortable swapping out components if they ever an administrator that it has taken action. When having need to, with basic parts you can buy anywhere, or Phil Cryer 2009 Page 3
  • 4. order online. These are all common pieces of hardware, easy to replace in every way. [8] Puppet, The Puppet framework provides a means to describe IT infrastructure as policy, execute that policy to build services then audit and enforce ongoing Conclusion changes to the policy, While there are plenty of theories that one day might http://reductivelabs.com/products/puppet make complete autonomous computing a reality, it's important to understand what can already be [9] Cfengine, Cfengine is a policy-based configuration accomplished today. Using multiple, existing open management system, http://www.cfengine.org source software applications, allows for the ultimate in flexibility, and is ideal to design and build a system that [10] Apticron, Automatic package update nagging with many autonomous configurations. All of which apticron, www.debian-administration.org/articles/491 provides an open and extensible autonomous computing platform utilizing existing technologies. [11] Monit, Monit is a utility for managing and monitoring, processes, files, directories and file- systems on a UNIX system, http://mmonit.com/monit/ References [1] Debian GNU/Linux, An operating system (OS) for [12] Hadoop, Hadoop is a free Java software your computer using the Linux kernel, framework that supports data intensive distributed http://www.debian.org/ applications, http://hadoop.apache.org/core [2] Apt HOWTO, This document intends to provide the [13] Hadoop Distributed File System (HDFS), Hadoop user with a good understanding of the workings of the Distributed File System (HDFS), is an open source Debian package management utility, APT, Java product similar to GFS. It is designed to scale to http://www.debian.org/doc/manuals/apt-howto/ petabytes of storage, and run on top of the fileystems of the underlying operating systems, [3] Ubuntu Linux, Ubuntu is a community developed, http://hadoop.apache.org/core Linux-based operating system that is perfect for laptops, desktops and servers, http://www.ubuntu.com/ [14] Google File System (GFS), Google File System (GFS) is a proprietary distributed file system [4] Preseed, Contents of an example preconfiguration developed by Google Inc. for its own use. It is designed file for Debian, to provide efficient, reliable access to data using large http://www.debian.org/releases/lenny/example- clusters of commodity hardware, preseed.txt http://en.wikipedia.org/wiki/Google_File_System [5] Aaron Toponce, Automating Debian/Ubuntu [15] GlusterFS, GlusterFS can scale to multiple Peta Installs With Preseed, bytes and 100s of GB/s throughput, can sustain 1 GB/s http://pthree.org/2008/05/20/automating-debianubuntu- per storage brick over Infiniband RDMA and can self- installs-with-preseedanother heal itself on the fly, http://www.gluster.org/ [6] GeoIP, GeoIP provides businesses with a non- [16] Lustre, Lustre is a scalable, secure, robust, highly- invasive way to determine geographical and other available cluster file system. It is designed, developed information about their Internet visitors in real-time, and maintained by Sun Microsystems, Inc., http://www.maxmind.com/app/ip-location http://lustre.org [7] Internet Traffic Report, The Internet Traffic Report [17] Sun Microsystems, Software company producing monitors the flow of data around the world, Java and Solaris Operating System for Sun Hardware, http://www.internettrafficreport.com/main.htm http://sun.com Phil Cryer 2009 Page 4