Computer Science ›› 2017, Vol. 44 ›› Issue (1): 7-12, 36.doi: 10.11896/j.issn.1002-137X.2017.01.002

Previous Articles     Next Articles

SHMA:Monitoring Architecture for Clouds

CHEN Lin, YING Shi and JIA Xiang-yang   

  • Online:2018-11-13 Published:2018-11-13

Abstract: Monitoring plays a significant role in ensuring the availability of cloud computing,because of the complex architecture of cloud and the unpredictability of workload.It provides the real-time monitoring data,the status of the running system,and helps to discover the defects and optimize system performance.However,due to the heterogeneity of cloud,the resources on cloud are often dynamic,diverse and enormous scale,which bring about a great challenge for cloud monitoring.To solve this problem,we proposed a scalable and hierarchical monitoring architecture for clouds (SHMA).SHMA uses microservices to create each independent component of the scalable monitoring system.It realizes the goal of offering cloud providers and cloud consumers to have an overview of the resources on three levels of clouds,including the runtime information of application services,middleware and infrastructure.Finally,we used a case of comprehensive disaster reduction system on CloudStack to evaluate the effectiveness of the architecture.

Key words: Cloud monitoring,Microservices,Scalable,Hierarchical

[1] MELL P,GRANCE T.The NIST definition of cloud computing[J].NationalInstitute of Standards and Technology,2009,53(6):50.
[2] NAMIOT D,SNEPS-SNEPPE M.On micro-services architecture[J].International Journal of Open Information Technologies,2014,2(9):24-27.
[3] THONES J.Microservices[J].Software,IEEE,2015,32(1):116-116.
[4] POVEDANO-MOLINA J,LOPEZ-VEGA J M,LOPEZ-SOLER J M,et al.DARGOS:A highly adaptable and scalable monitoring architecture for multi-tenant Clouds[J].Future Generation Computer Systems,2013,29(8):2041-2056.
[5] ANDREOZZI S,DE BORTOLI N,FANTINEL S,et al.Grid-ICE:a monitoring service for Grid systems[J].Future Generation Computer Systems,2005,21(4):559-571.
[6] HUANG H,WANG L.P&P:A Combined Push-Pull Model for Resource Monitoring in Cloud Computing Environment[C]∥ 2010 IEEE 3rd International Conference on Cloud Computing.IEEE Computer Society,2010:260-267.
[7] HAN H,KIM S,JUNG H,et al.A RESTful approach to the management of cloud infrastructure[C]∥IEEE International Conference on Cloud Computing,2009(CLOUD’09).IEEE,2009:139-142.
[8] RAK M,VENTICINQUE S,MHR T,et al.Cloud application monitoring:The mOSAIC approach[C]∥2011 IEEE Third International Conference on Cloud Computing Technology and Scien-ce (CloudCom).IEEE,2011:758-763.
[9] KATSAROS G,KOUSIOURIS G,G OGOUVITIS S V,et al.A Self-adaptive hierarchical monitoring mechanism for Clouds[J].Journal of Systems and Software,2012,85(5):1029-1041.
[10] KATSAROS G,SUBIRATS J,FIT J O,et al.A service framework for energy-aware monitoring and VM management in Clouds[J].Future Generation Computer Systems,2013,29(8):2077-2091.
[11] HOU Yong-dong,WANG Jing,ZHAO Zhuo-feng,et al.A scalable and Integrated Cloud Platform Monitoring Mechanism[J].Journal of Chinese Computer Systems,2014,35(9):2024-2028.(in Chinese) 侯永东,王菁,赵卓峰,等.一种可扩展集成化的云平台监控机制[J].小型微型计算机系统,2014,35(9):2024-2028.
[12] MASSIE M L,CHUN B N,CULLER D E.The ganglia distributed monitoring system:design,implementation,and experience[J].Parallel Computing,2004,30(7):817-840.
[13] The Ganglia Project,Ganglia monitoring service,2012.http://www.ganglia.info.
[14] Nagios Enterprises LLC,Nagios-the industry standard in IT infrastructure monitoring,2012.http://www.nagios.org.
[15] http://www.zabbix.com/.
[16] http://www.monitis.com/.
[17] LIU Z H,HAMMERSCHMIDT B,M CMAHON D.JSON data management:supporting schema-less development in RDBMS[C]∥Proceedings of the 2014 ACM SIGMOD International Conference on Management of Data.ACM,2014:1247-1258.
[18] KIMELFELD B,SENELLART P.Probabilistic XML:Modelsand complexity[M]∥Advances in Probabilistic Databases for Uncertain Information Management.Springer Berlin Heidelberg,2013:39-66.
[19] REDDY P,RAJAMANI L.Performance comparison of different operating systems in the private cloud with KVM hypervisor using SIGAR framework[C]∥2015 International Conference on Communication,Information & Computing Technology (ICCICT).IEEE,2015:1-6.
[20] REDDY P,RAJAMANI L.Virtualization overhead findings of four hypervisors in the CloudStack with SIGAR[C]∥2014 Fourth World Congress on Information and Communication Technologies (WICT).IEEE,2014:140-145.
[21] MUNOZ F,BAUDRY B,DELAMARE R,et al.Usage andTestability of AOP:an empirical study of AspectJ[J].Information and Software Technology,2013,55(2):252-266.
[22] ZHENG Xiao,LUO Jun-zhou,CAO Jiu-xin,et al.A Publish/Subscribe Based Information Dissemination Model for QoS of Web Services[J].Journal of Computer Research and Development,2010,47(6):1088-1097.(in Chinese) 郑啸,罗军舟,曹玖新,等.基于发布/订阅机制的 Web 服务 QoS 信息分发模型[J].计算机研究与发展,2010,47(6):1088-1097.
[23] KAFKA A.A high-throughput,distributed messaging system.http://kafka.apache.org/desigh.html .

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
[1] LEI Li-hui and WANG Jing. Parallelization of LTL Model Checking Based on Possibility Measure[J]. Computer Science, 2018, 45(4): 71 -75, 88 .
[2] XIA Qing-xun and ZHUANG Yi. Remote Attestation Mechanism Based on Locality Principle[J]. Computer Science, 2018, 45(4): 148 -151, 162 .
[3] LI Bai-shen, LI Ling-zhi, SUN Yong and ZHU Yan-qin. Intranet Defense Algorithm Based on Pseudo Boosting Decision Tree[J]. Computer Science, 2018, 45(4): 157 -162 .
[4] WANG Huan, ZHANG Yun-feng and ZHANG Yan. Rapid Decision Method for Repairing Sequence Based on CFDs[J]. Computer Science, 2018, 45(3): 311 -316 .
[5] SUN Qi, JIN Yan, HE Kun and XU Ling-xuan. Hybrid Evolutionary Algorithm for Solving Mixed Capacitated General Routing Problem[J]. Computer Science, 2018, 45(4): 76 -82 .
[6] ZHANG Jia-nan and XIAO Ming-yu. Approximation Algorithm for Weighted Mixed Domination Problem[J]. Computer Science, 2018, 45(4): 83 -88 .
[7] WU Jian-hui, HUANG Zhong-xiang, LI Wu, WU Jian-hui, PENG Xin and ZHANG Sheng. Robustness Optimization of Sequence Decision in Urban Road Construction[J]. Computer Science, 2018, 45(4): 89 -93 .
[8] LIU Qin. Study on Data Quality Based on Constraint in Computer Forensics[J]. Computer Science, 2018, 45(4): 169 -172 .
[9] ZHONG Fei and YANG Bin. License Plate Detection Based on Principal Component Analysis Network[J]. Computer Science, 2018, 45(3): 268 -273 .
[10] SHI Wen-jun, WU Ji-gang and LUO Yu-chun. Fast and Efficient Scheduling Algorithms for Mobile Cloud Offloading[J]. Computer Science, 2018, 45(4): 94 -99, 116 .