SlideShare a Scribd company logo
NICTA Copyright 2012 From imagination to impact
POD-Diagnosis: Error Detection
and Diagnosis of Sporadic
Operations on Cloud Applications
Dr. Liming Zhu
Liming.Zhu@nicta.com.au
Principal Researcher, NICTA/UNSW
April, 2014 at Berkeley AMPLab
NICTA Copyright 2012 From imagination to impact
Outline
• Dependable Cloud Operation
• Approach: Process-Oriented Dependability (POD)
– POD-Diagnosis
– Undo/Recovery Planning using AI Planning
– Modeling and Analysis using DTMC
• Connections with AMPLab BDAS
2
NICTA Copyright 2012 From imagination to impact
Dependable Cloud Operation: Motivation
• Sporadic operations cause most outages
– Deployment, reconfiguration, (rolling) upgrade, rollback…
• as opposed to normal operations
– DevOps-related: continuous integration/deploy/delivery
• Etsy.com: 25 full deployments per day at 10 commits per deploy
– Other drivers: resource sharing, micro services/partition
migration, backup/recovery, auto-mitigation itself…
• Limited control & visibility during sporadic operation
– Heavy reliance on Cloud APIs
– Limited visibility and exception handling capabilities
3
NICTA Copyright 2012 From imagination to impact
Dependable Cloud Operation: Challenges
• Our Context
– Large-scale web/enterprise operation in Cloud
– Distributed data analytics in Cloud (Hadoop/Spark)
• Goal: detect, diagnose and react to errors
occurring during a sporadic cloud operation
• Challenges
1. Anomaly detection during sporadic operations
2. Undo/Recovery planning for recovery
3. Modelling and analysis of sporadic operation
4
NICTA Copyright 2012 From imagination to impact
Sporadic Operation Example: Rolling Upgrade
Update Auto-Scaling
Group (ASG)
Remove & Deregister
Old Instances from ELB
Wait for ASG to Start
New Instances
Terminate Old Instances
Register New Instances
with ELB
Sort Instances
Stop
Start
- Have 100 servers in cloud with
version 1 software
- Upgrade 10 servers at a time to
version 2 software
- No downtime or redundancy cost
- Potentially take a long time to
complete with errors during the
operation with other interfering
operations
5
NICTA Copyright 2012 From imagination to impact
Challenge 1: Anomaly Detection
• Traditional anomaly-based error detection is
designed for “normal operation”
– significant false positives OR disable all monitoring
during sporadic operation
• Continuous changes to the production systems
– From months at scheduled downtime to hours at all times
– Multiple operations at the same time
• Quality of automation scripts + human
– fully testing the operation (scripts + human) in uncertain
cloud environment is very difficult
6
NICTA Copyright 2012 From imagination to impact
Our Approach: Use Process Context
• Offline: treat an operation as a process
– Process discovered automatically from logs/scripts
• Clustering of log lines and process mining
– Intermediary step outcomes specified as assertions
• Online: use process context
– Process context: process/instance/step ids, expected states…
– Errors detected by examining logs and monitoring data
• Assertions evaluations integration with monitoring facilities
• Compliance checking against expected processes using logs
– Detected errors are further diagnosed for (root) causes
• Examining a fault tree to locate potential root causes
• Performing more diagnostic tests and on-demand assertions
X. Xu, L Zhu, et. al. "POD-Diagnosis: Error Diagnosis of Sporadic Operations on Cloud Applications,” 44nd Annual
IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2014. 7
NICTA Copyright 2012 From imagination to impact
Example: Rolling Upgrade Using Asgard
Read by
Operator
Process
Mining
Service
Controls
Outputs Create SnapshotCheck AZs
Create instance
from snapshot
Create AMI from
instance
Evaluate AMI
Discovered
Model
Asgard Log dataLog dataGenerates
Offline
Online
8
NICTA Copyright 2012 From imagination to impact
Process Mining Service: how it works
• Process Mining: Discovery
1. Collect the logs (using Logstash)
2. Filter the logs
3. Calculating string distance
(Levenshtein distance) between
each pair of log lines
4. Cluster the log lines
5. Look at the dendrogram to
decide on threshold
6. Name & combine clusters
7. Derive regular expressions for the
clusters
8. Classify the log lines using the
regular expressions and cluster
names
9. Import altered log into process
mining tools
10. Apply different process discovery
algorithms
11. If anything requires changes, go
back to the respective steps and
redo from there
9
NICTA Copyright 2012 From imagination to impact
POD-Detection: Error Detection
Error Detection Service has two
methods for detecting errors:
• Assertion Checking
• Conformance Checking
10
NICTA Copyright 2012 From imagination to impact
Assertion Checking: how it works
Log line:
Assertions:
11
NICTA Copyright 2012 From imagination to impact
Assertion Checking: how it works
Log line:
• Remove ...
Assertions:
• i has been de-registered
from ELB
• i has been removed from
ASG
• there is 1 less instance of v1
12
NICTA Copyright 2012 From imagination to impact
Assertion Checking: how it works
Log line:
• Remove ...
• Terminate ...
Assertions:
• i successfully terminated
13
NICTA Copyright 2012 From imagination to impact
Assertion Checking: how it works
Log line:
• Remove ...
• Terminate ...
• Wait ...
Assertions:
• Next log line should appear
within 17m35s (95 percentile)
14
NICTA Copyright 2012 From imagination to impact
Assertion Checking: how it works
Log line:
• Remove ...
• Terminate ...
• Wait ...
• New instance ...
Assertions:
• i„ successfully launched
15
NICTA Copyright 2012 From imagination to impact
Conformance Checking: how it works
Log lines:
16
NICTA Copyright 2012 From imagination to impact
Conformance Checking: how it works
Log lines:
• Remove ...
17
NICTA Copyright 2012 From imagination to impact
Conformance Checking: how it works
Log lines:
• Remove ...
• Terminate ...
18
NICTA Copyright 2012 From imagination to impact
Conformance Checking: how it works
Log lines:
• Remove ...
• Terminate ...
• Wait ...
19
NICTA Copyright 2012 From imagination to impact
Conformance Checking: how it works
Log lines:
• Remove ...
• Terminate ...
• Wait ...
• Terminate ...???
20
NICTA Copyright 2012 From imagination to impact
POD-Diagnosis: how it works
• Fault trees are built as
knowledge base
• Process context used for fault
tree pruning
• On-demand diagnosis tests
to locate the (root) causes
21
NICTA Copyright 2012 From imagination to impact
Evaluation: POD-Detection/Diagnosis
• Experiments
– Rolling upgrade of 100+ node cluster in AWS
• Fault injection+ confounding processes: random kill, scaling-in..
• Detected errors
– Assertion checking: known errors and global errors
• Examples: key management, launch configuration, images…
– Compliance checking: unknown errors
• skipping activities or undone activities
• Time and precision
– Compared with Asgard/Monitoring internal mechanisms
• Detected more errors earlier
– Diagnosis: limited to known causes in the fault tree
• 95 percentile less than 4s; accuracy ranges 80%~100%
22
NICTA Copyright 2012 From imagination to impact
Evaluation: POD-Detection/Diagnosis
23
NICTA Copyright 2012 From imagination to impact
Other Related Research
Challenges
1. Anomaly detection during sporadic operations
2. Undo/Recovery planning
3. Modelling and analysis of sporadic operation
24
NICTA Copyright 2012 From imagination to impact
Challenge 2: Undo/Recovery Planning
S1 S2
Serr
A certain
step
Reparation
Compensation Undo
Parameterizable Redo
Alternative
Checkpoint-base Undo
Previous states
… ... S0S-i
25
NICTA Copyright 2012 From imagination to impact
Undo/Undoability Approach in a Nutshell
• Goal: undo support for
“indirect control” setting
– Problem 1: some actions are
irreversible, e.g., delete
– Problem 2: undo ≠ copy back
previous state of memory
• Have to call the right actions on the
right resources in the right order
– Problem 3: partly irreversible
operations, e.g. on Amazon WS:
• Stopping a machine disassociates an
elastic IP address (if any), and
releases internal IP / public DNS
• Starting the machine isn‟t undo:
elastic IP is dangling, internal IP /
public DNS / timestamps are different
• Solution components:
 Replace “do” with “pseudo-do”
 Undo System based on AI Planning
• Outcome: sequence of undo actions
 Undoability Checking:
• Is the operation I‟m about to execute
undoable?
• Learn which aspects can be fully undone
for each operation (whole domain)
• If not, can we abstract / change so that
undoability is given?
 Projection (of a domain)
26
Ingo Weber et. al. Supporting undoability in systems operations. In USENIX LISA'13: Large Installation System
Administration Conference, Washington, DC, USA, November 2013.
NICTA Copyright 2012 From imagination to impact
Undoability Checking Approach
Operation(s) to execute
(e.g., script, command)
Resources and
properties required
to be undoable
Define
Tool user
(e.g., sys admin)
Tool provider
Full domain model
(e.g., AWS)
Projection
Specification
Generate
Undoability CheckerDefine
Apply
Projection
Generate
Projected
domain
model
Per operation:
Generate pre and
post-states
Check undoability per
pre-post state pair
Undoability (yes/no)
List of causes if not
undoable
Result
Feedback
For each
pair: call
AI Planner
27
NICTA Copyright 2012 From imagination to impact
Challenge 3: Modeling and Analysis
• Approach: Model as stochastic processes
– Discrete/Continuous Markov Chain (DTMC/CTMC)
• Forward states: net successful operations
• Backward states: failure or deliberate rollback/undo
• A family of g-k chains with different parameters
– g: rolling-upgrade wave granularity. k: no. of failure/rollback per wave
Daniel Sun & L Zhu, et. al. ” Understanding Rolling Upgrade” 33th International Symposium on Reliable Distributed
Systems (SRDS), 2014 (submitted)
28
NICTA Copyright 2012 From imagination to impact
Model used for
Predictions
- e.g. completion time,
failure rate impact
Optimization and Decision
Problems
- e.g. when to activate new
versions to guarantee a
99.99% success
29
NICTA Copyright 2012 From imagination to impact
Connection with AMPLab BDAS
30
NICTA Copyright 2012 From imagination to impact
Projects Related to BDAS (1/2)
1. Log/Metrics analysis in POD-Diagnosis
– Currently using Spark/MLBase
– Voluminous log/events into Spark Streaming
2. Dependable deployment/operation of BDAS
– POD applied to Hadoop before, maybe BDAS?
3. Multi-level granularity access for data analytics
– Australian Urban Research Infrastructure Network (AURIN)
• Portal to provide transport-related data to international researchers
• Cluster sharing for in-portal pre-processing and analytics
• de-anonymization concerns and different views for the same data
– Evaluating how BDAS can support this
31
NICTA Copyright 2012 From imagination to impact
Projects Related to BDAS (2/2)
Redacted
4. Data scientist workflow and local exploration
5. Distributed machine learning
32
NICTA Copyright 2012 From imagination to impact
Team Acknowledgement
• Researchers
– Len Bass
– Alan Fekete
– Anna Liu
– Daniel Sun
– Hiroshi Wada
– Ingo Weber
– Sherry Xu
– Liming Zhu
• Engineers
– Adnene Guabtni
– Chao Li
• Students
– Amer Abdalamer
– Ahmed Alqahtani
– Mostafa Farshchi
– Min Fu
– Jin Li
– Matthew Sladescu
– Donna Xu
– DongYao Wu
33

More Related Content

PDF
How to Monitoring the SRE Golden Signals (E-Book)
PPTX
DockerCon SF 2019 - Observability Workshop
PPTX
DockerCon SF 2019 - TDD is Dead
PDF
BlueHat v18 || Crafting synthetic attack examples from past cyber-attacks for...
PDF
Usage aspects techniques for enterprise forensics data analytics tools
PPTX
Virtual Data : Eliminating the data constraint in Application Development
PDF
Visualizing Systems with Statemaps
PPTX
Challenges in Practicing High Frequency Releases in Cloud Environments
How to Monitoring the SRE Golden Signals (E-Book)
DockerCon SF 2019 - Observability Workshop
DockerCon SF 2019 - TDD is Dead
BlueHat v18 || Crafting synthetic attack examples from past cyber-attacks for...
Usage aspects techniques for enterprise forensics data analytics tools
Virtual Data : Eliminating the data constraint in Application Development
Visualizing Systems with Statemaps
Challenges in Practicing High Frequency Releases in Cloud Environments

Similar to POD-Diagnosis: Error Detection and Diagnosis of Sporadic Operations on Cloud Applications (20)

PPTX
Dependable Operation - Performance Management and Capacity Planning Under Con...
PDF
Eliciting Operations Requirements for Applications
PPT
Modelling and Analysing Operation Processes for Dependability
PPT
Dependable Operations
PPTX
Architectural Tactics for Large Scale Systems
PDF
Error in hadoop
PDF
Automatic Undo for Cloud Management via AI Planning
PDF
Supporting Undoability in System Operations @ LISA2013
PPTX
Supporting operations personnel a software engineers perspective
PPT
Cloud API Issues: an Empirical Study and Impact
PDF
Dev ops for software architects
PDF
Deployability
PPTX
Chaos Engineering: Why Breaking Things Should Be Practised.
PPTX
The quality attribute of upgradability
PDF
Behavioral Analytics and Blockchain Applications – a Reliability View. Keynot...
PPTX
WICSA 2012 tutorial
PDF
Detection as Code, Automation, and Testing: The Key to Unlocking the Power of...
PDF
Adaptive Computing Using PlateSpin Orchestrate
PPTX
Keynote - Chaos Engineering: Why breaking things should be practiced
PPTX
Virtual Flink Forward 2020: Lessons learned on Apache Flink application avail...
Dependable Operation - Performance Management and Capacity Planning Under Con...
Eliciting Operations Requirements for Applications
Modelling and Analysing Operation Processes for Dependability
Dependable Operations
Architectural Tactics for Large Scale Systems
Error in hadoop
Automatic Undo for Cloud Management via AI Planning
Supporting Undoability in System Operations @ LISA2013
Supporting operations personnel a software engineers perspective
Cloud API Issues: an Empirical Study and Impact
Dev ops for software architects
Deployability
Chaos Engineering: Why Breaking Things Should Be Practised.
The quality attribute of upgradability
Behavioral Analytics and Blockchain Applications – a Reliability View. Keynot...
WICSA 2012 tutorial
Detection as Code, Automation, and Testing: The Key to Unlocking the Power of...
Adaptive Computing Using PlateSpin Orchestrate
Keynote - Chaos Engineering: Why breaking things should be practiced
Virtual Flink Forward 2020: Lessons learned on Apache Flink application avail...
Ad

More from Liming Zhu (19)

PPTX
AI Transformation A Clash with Human Expertise
PDF
Deciphering AI: Human Expertise in the Age of Evolving AI
PDF
GenAI in Research with Responsible AI
PDF
AI Unveiled: From Current State to Future Frontiers
PDF
Software Architecture for Foundation Model-Based Systems
PDF
AI Transformation
PDF
Generative-AI-in-enterprise-20230615.pdf
PDF
Trends & Innovation in Cyber and Digitaltech
PPTX
Responsible/Trustworthy AI in the Era of Foundation Models
PDF
ICSE23 Keynote: Software Engineering as the Linchpin of Responsible AI
PDF
International Cooperation for Research on Privacy and Data Protection - Austr...
PDF
RegTech for IR - Opportunities and Lessons
PDF
Emerging Technologies in Data Sharing and Analytics at Data61
PDF
Responsible AI The Australian Approach
PDF
Distributed Trust Architecture: The New Reality of ML-based Systems
PDF
Distributed Trust Architecture: The New Foundation of Everything
PDF
Cyber technologies for SME growth – Barriers and Solutions
PDF
Emerging Technologies in Synthetic Representation and Digital Twin
PDF
Responsible AI & Cybersecurity: A tale of two technology risks
AI Transformation A Clash with Human Expertise
Deciphering AI: Human Expertise in the Age of Evolving AI
GenAI in Research with Responsible AI
AI Unveiled: From Current State to Future Frontiers
Software Architecture for Foundation Model-Based Systems
AI Transformation
Generative-AI-in-enterprise-20230615.pdf
Trends & Innovation in Cyber and Digitaltech
Responsible/Trustworthy AI in the Era of Foundation Models
ICSE23 Keynote: Software Engineering as the Linchpin of Responsible AI
International Cooperation for Research on Privacy and Data Protection - Austr...
RegTech for IR - Opportunities and Lessons
Emerging Technologies in Data Sharing and Analytics at Data61
Responsible AI The Australian Approach
Distributed Trust Architecture: The New Reality of ML-based Systems
Distributed Trust Architecture: The New Foundation of Everything
Cyber technologies for SME growth – Barriers and Solutions
Emerging Technologies in Synthetic Representation and Digital Twin
Responsible AI & Cybersecurity: A tale of two technology risks
Ad

Recently uploaded (20)

PDF
Nekopoi APK 2025 free lastest update
PPTX
Agentic AI Use Case- Contract Lifecycle Management (CLM).pptx
PPTX
L1 - Introduction to python Backend.pptx
PDF
Digital Strategies for Manufacturing Companies
PDF
Design an Analysis of Algorithms I-SECS-1021-03
PDF
Design an Analysis of Algorithms II-SECS-1021-03
PPTX
Oracle E-Business Suite: A Comprehensive Guide for Modern Enterprises
PDF
PTS Company Brochure 2025 (1).pdf.......
PPTX
ISO 45001 Occupational Health and Safety Management System
PPTX
Operating system designcfffgfgggggggvggggggggg
PDF
System and Network Administration Chapter 2
PDF
How to Migrate SBCGlobal Email to Yahoo Easily
PDF
medical staffing services at VALiNTRY
PPTX
history of c programming in notes for students .pptx
PDF
Internet Downloader Manager (IDM) Crack 6.42 Build 42 Updates Latest 2025
PDF
System and Network Administraation Chapter 3
PDF
Wondershare Filmora 15 Crack With Activation Key [2025
PPTX
Transform Your Business with a Software ERP System
PDF
2025 Textile ERP Trends: SAP, Odoo & Oracle
PDF
Flood Susceptibility Mapping Using Image-Based 2D-CNN Deep Learnin. Overview ...
Nekopoi APK 2025 free lastest update
Agentic AI Use Case- Contract Lifecycle Management (CLM).pptx
L1 - Introduction to python Backend.pptx
Digital Strategies for Manufacturing Companies
Design an Analysis of Algorithms I-SECS-1021-03
Design an Analysis of Algorithms II-SECS-1021-03
Oracle E-Business Suite: A Comprehensive Guide for Modern Enterprises
PTS Company Brochure 2025 (1).pdf.......
ISO 45001 Occupational Health and Safety Management System
Operating system designcfffgfgggggggvggggggggg
System and Network Administration Chapter 2
How to Migrate SBCGlobal Email to Yahoo Easily
medical staffing services at VALiNTRY
history of c programming in notes for students .pptx
Internet Downloader Manager (IDM) Crack 6.42 Build 42 Updates Latest 2025
System and Network Administraation Chapter 3
Wondershare Filmora 15 Crack With Activation Key [2025
Transform Your Business with a Software ERP System
2025 Textile ERP Trends: SAP, Odoo & Oracle
Flood Susceptibility Mapping Using Image-Based 2D-CNN Deep Learnin. Overview ...

POD-Diagnosis: Error Detection and Diagnosis of Sporadic Operations on Cloud Applications

  • 1. NICTA Copyright 2012 From imagination to impact POD-Diagnosis: Error Detection and Diagnosis of Sporadic Operations on Cloud Applications Dr. Liming Zhu Liming.Zhu@nicta.com.au Principal Researcher, NICTA/UNSW April, 2014 at Berkeley AMPLab
  • 2. NICTA Copyright 2012 From imagination to impact Outline • Dependable Cloud Operation • Approach: Process-Oriented Dependability (POD) – POD-Diagnosis – Undo/Recovery Planning using AI Planning – Modeling and Analysis using DTMC • Connections with AMPLab BDAS 2
  • 3. NICTA Copyright 2012 From imagination to impact Dependable Cloud Operation: Motivation • Sporadic operations cause most outages – Deployment, reconfiguration, (rolling) upgrade, rollback… • as opposed to normal operations – DevOps-related: continuous integration/deploy/delivery • Etsy.com: 25 full deployments per day at 10 commits per deploy – Other drivers: resource sharing, micro services/partition migration, backup/recovery, auto-mitigation itself… • Limited control & visibility during sporadic operation – Heavy reliance on Cloud APIs – Limited visibility and exception handling capabilities 3
  • 4. NICTA Copyright 2012 From imagination to impact Dependable Cloud Operation: Challenges • Our Context – Large-scale web/enterprise operation in Cloud – Distributed data analytics in Cloud (Hadoop/Spark) • Goal: detect, diagnose and react to errors occurring during a sporadic cloud operation • Challenges 1. Anomaly detection during sporadic operations 2. Undo/Recovery planning for recovery 3. Modelling and analysis of sporadic operation 4
  • 5. NICTA Copyright 2012 From imagination to impact Sporadic Operation Example: Rolling Upgrade Update Auto-Scaling Group (ASG) Remove & Deregister Old Instances from ELB Wait for ASG to Start New Instances Terminate Old Instances Register New Instances with ELB Sort Instances Stop Start - Have 100 servers in cloud with version 1 software - Upgrade 10 servers at a time to version 2 software - No downtime or redundancy cost - Potentially take a long time to complete with errors during the operation with other interfering operations 5
  • 6. NICTA Copyright 2012 From imagination to impact Challenge 1: Anomaly Detection • Traditional anomaly-based error detection is designed for “normal operation” – significant false positives OR disable all monitoring during sporadic operation • Continuous changes to the production systems – From months at scheduled downtime to hours at all times – Multiple operations at the same time • Quality of automation scripts + human – fully testing the operation (scripts + human) in uncertain cloud environment is very difficult 6
  • 7. NICTA Copyright 2012 From imagination to impact Our Approach: Use Process Context • Offline: treat an operation as a process – Process discovered automatically from logs/scripts • Clustering of log lines and process mining – Intermediary step outcomes specified as assertions • Online: use process context – Process context: process/instance/step ids, expected states… – Errors detected by examining logs and monitoring data • Assertions evaluations integration with monitoring facilities • Compliance checking against expected processes using logs – Detected errors are further diagnosed for (root) causes • Examining a fault tree to locate potential root causes • Performing more diagnostic tests and on-demand assertions X. Xu, L Zhu, et. al. "POD-Diagnosis: Error Diagnosis of Sporadic Operations on Cloud Applications,” 44nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2014. 7
  • 8. NICTA Copyright 2012 From imagination to impact Example: Rolling Upgrade Using Asgard Read by Operator Process Mining Service Controls Outputs Create SnapshotCheck AZs Create instance from snapshot Create AMI from instance Evaluate AMI Discovered Model Asgard Log dataLog dataGenerates Offline Online 8
  • 9. NICTA Copyright 2012 From imagination to impact Process Mining Service: how it works • Process Mining: Discovery 1. Collect the logs (using Logstash) 2. Filter the logs 3. Calculating string distance (Levenshtein distance) between each pair of log lines 4. Cluster the log lines 5. Look at the dendrogram to decide on threshold 6. Name & combine clusters 7. Derive regular expressions for the clusters 8. Classify the log lines using the regular expressions and cluster names 9. Import altered log into process mining tools 10. Apply different process discovery algorithms 11. If anything requires changes, go back to the respective steps and redo from there 9
  • 10. NICTA Copyright 2012 From imagination to impact POD-Detection: Error Detection Error Detection Service has two methods for detecting errors: • Assertion Checking • Conformance Checking 10
  • 11. NICTA Copyright 2012 From imagination to impact Assertion Checking: how it works Log line: Assertions: 11
  • 12. NICTA Copyright 2012 From imagination to impact Assertion Checking: how it works Log line: • Remove ... Assertions: • i has been de-registered from ELB • i has been removed from ASG • there is 1 less instance of v1 12
  • 13. NICTA Copyright 2012 From imagination to impact Assertion Checking: how it works Log line: • Remove ... • Terminate ... Assertions: • i successfully terminated 13
  • 14. NICTA Copyright 2012 From imagination to impact Assertion Checking: how it works Log line: • Remove ... • Terminate ... • Wait ... Assertions: • Next log line should appear within 17m35s (95 percentile) 14
  • 15. NICTA Copyright 2012 From imagination to impact Assertion Checking: how it works Log line: • Remove ... • Terminate ... • Wait ... • New instance ... Assertions: • i„ successfully launched 15
  • 16. NICTA Copyright 2012 From imagination to impact Conformance Checking: how it works Log lines: 16
  • 17. NICTA Copyright 2012 From imagination to impact Conformance Checking: how it works Log lines: • Remove ... 17
  • 18. NICTA Copyright 2012 From imagination to impact Conformance Checking: how it works Log lines: • Remove ... • Terminate ... 18
  • 19. NICTA Copyright 2012 From imagination to impact Conformance Checking: how it works Log lines: • Remove ... • Terminate ... • Wait ... 19
  • 20. NICTA Copyright 2012 From imagination to impact Conformance Checking: how it works Log lines: • Remove ... • Terminate ... • Wait ... • Terminate ...??? 20
  • 21. NICTA Copyright 2012 From imagination to impact POD-Diagnosis: how it works • Fault trees are built as knowledge base • Process context used for fault tree pruning • On-demand diagnosis tests to locate the (root) causes 21
  • 22. NICTA Copyright 2012 From imagination to impact Evaluation: POD-Detection/Diagnosis • Experiments – Rolling upgrade of 100+ node cluster in AWS • Fault injection+ confounding processes: random kill, scaling-in.. • Detected errors – Assertion checking: known errors and global errors • Examples: key management, launch configuration, images… – Compliance checking: unknown errors • skipping activities or undone activities • Time and precision – Compared with Asgard/Monitoring internal mechanisms • Detected more errors earlier – Diagnosis: limited to known causes in the fault tree • 95 percentile less than 4s; accuracy ranges 80%~100% 22
  • 23. NICTA Copyright 2012 From imagination to impact Evaluation: POD-Detection/Diagnosis 23
  • 24. NICTA Copyright 2012 From imagination to impact Other Related Research Challenges 1. Anomaly detection during sporadic operations 2. Undo/Recovery planning 3. Modelling and analysis of sporadic operation 24
  • 25. NICTA Copyright 2012 From imagination to impact Challenge 2: Undo/Recovery Planning S1 S2 Serr A certain step Reparation Compensation Undo Parameterizable Redo Alternative Checkpoint-base Undo Previous states … ... S0S-i 25
  • 26. NICTA Copyright 2012 From imagination to impact Undo/Undoability Approach in a Nutshell • Goal: undo support for “indirect control” setting – Problem 1: some actions are irreversible, e.g., delete – Problem 2: undo ≠ copy back previous state of memory • Have to call the right actions on the right resources in the right order – Problem 3: partly irreversible operations, e.g. on Amazon WS: • Stopping a machine disassociates an elastic IP address (if any), and releases internal IP / public DNS • Starting the machine isn‟t undo: elastic IP is dangling, internal IP / public DNS / timestamps are different • Solution components:  Replace “do” with “pseudo-do”  Undo System based on AI Planning • Outcome: sequence of undo actions  Undoability Checking: • Is the operation I‟m about to execute undoable? • Learn which aspects can be fully undone for each operation (whole domain) • If not, can we abstract / change so that undoability is given?  Projection (of a domain) 26 Ingo Weber et. al. Supporting undoability in systems operations. In USENIX LISA'13: Large Installation System Administration Conference, Washington, DC, USA, November 2013.
  • 27. NICTA Copyright 2012 From imagination to impact Undoability Checking Approach Operation(s) to execute (e.g., script, command) Resources and properties required to be undoable Define Tool user (e.g., sys admin) Tool provider Full domain model (e.g., AWS) Projection Specification Generate Undoability CheckerDefine Apply Projection Generate Projected domain model Per operation: Generate pre and post-states Check undoability per pre-post state pair Undoability (yes/no) List of causes if not undoable Result Feedback For each pair: call AI Planner 27
  • 28. NICTA Copyright 2012 From imagination to impact Challenge 3: Modeling and Analysis • Approach: Model as stochastic processes – Discrete/Continuous Markov Chain (DTMC/CTMC) • Forward states: net successful operations • Backward states: failure or deliberate rollback/undo • A family of g-k chains with different parameters – g: rolling-upgrade wave granularity. k: no. of failure/rollback per wave Daniel Sun & L Zhu, et. al. ” Understanding Rolling Upgrade” 33th International Symposium on Reliable Distributed Systems (SRDS), 2014 (submitted) 28
  • 29. NICTA Copyright 2012 From imagination to impact Model used for Predictions - e.g. completion time, failure rate impact Optimization and Decision Problems - e.g. when to activate new versions to guarantee a 99.99% success 29
  • 30. NICTA Copyright 2012 From imagination to impact Connection with AMPLab BDAS 30
  • 31. NICTA Copyright 2012 From imagination to impact Projects Related to BDAS (1/2) 1. Log/Metrics analysis in POD-Diagnosis – Currently using Spark/MLBase – Voluminous log/events into Spark Streaming 2. Dependable deployment/operation of BDAS – POD applied to Hadoop before, maybe BDAS? 3. Multi-level granularity access for data analytics – Australian Urban Research Infrastructure Network (AURIN) • Portal to provide transport-related data to international researchers • Cluster sharing for in-portal pre-processing and analytics • de-anonymization concerns and different views for the same data – Evaluating how BDAS can support this 31
  • 32. NICTA Copyright 2012 From imagination to impact Projects Related to BDAS (2/2) Redacted 4. Data scientist workflow and local exploration 5. Distributed machine learning 32
  • 33. NICTA Copyright 2012 From imagination to impact Team Acknowledgement • Researchers – Len Bass – Alan Fekete – Anna Liu – Daniel Sun – Hiroshi Wada – Ingo Weber – Sherry Xu – Liming Zhu • Engineers – Adnene Guabtni – Chao Li • Students – Amer Abdalamer – Ahmed Alqahtani – Mostafa Farshchi – Min Fu – Jin Li – Matthew Sladescu – Donna Xu – DongYao Wu 33