skip to main content
research-article

Towards VM Consolidation Using a Hierarchy of Idle States

Published:14 March 2015Publication History
Skip Abstract Section

Abstract

Typical VM consolidation approaches re-pack VMs into fewer physical machines, resulting in energy and cost savings [13, 19, 23, 40]. Recent work has explored a just-in time approach to VM consolidation by transitioning VMsto an inactive state when idle and activating them on the arrival of client requests[17, 21]. This leads to increased VM density at the cost of an increase in client request latency (called miss penalty). The VM density so obtained, although greater, is still limited by the number of VMs that can be hosted in the one inactive state. If idle VMs were hosted in multiple inactive states, VM density can be increased further while ensuring small miss penalties. However, VMs in different inactive states have different capacities, activation times, and resource requirements.

Therefore, a key question is: How should VMs be transitioned between different states to minimize the expected miss penalty? This paper explores the hosting of idle VMs in a hierarchy of multiple such inactive states, and studies the effect of different idle VMmanagement policies on VMdensity and miss penalties. We formulate a mathematical model for the problem, and provide a theoretical lower bound on the miss penalty. Using an off-the-shelf virtualization solution (LXC [2]), we demonstrate how the required model parameters can be obtained. We evaluate a variety of policies and quantify their miss penalties for different VM densities. We observe that some policies consolidate up to 550 VMs per machine with average miss penalties smaller than 1 ms.

References

  1. Docker: An Open Platform for Distributed Applications for Developers and Sysadmins. http://www.docker.com.Google ScholarGoogle Scholar
  2. Linux Containers. http://lxc.sourceforge.net/.Google ScholarGoogle Scholar
  3. OpenVZ. http://openvz.org.Google ScholarGoogle Scholar
  4. VMSim. http://github.com/rayman7718/VMSim.Google ScholarGoogle Scholar
  5. Linux vServer. http://linux-vserver.org.Google ScholarGoogle Scholar
  6. O. Agmon Ben-Yehuda, M. Ben-Yehuda, A. Schuster, and D. Tsafrir. The Resource-as-a-Service (RaaS) cloud. In USENIX HotCloud, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. A. V. Aho, P. J. Denning, and J. D. Ullman. Principles of Optimal Page Replacement. Journal of the ACM (JACM), 1971. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. M. F. Arlitt and C. L. Williamson. Web Server Workload Characterization: The Search for Invariants. In ACM SIGMETRICS Performance Evaluation Review, 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. L. A. Belady. A Study of Replacement Algorithms for a Virtual-storage Computer. IBM Systems Journal, 1966. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. A. B. Brush, E. Filippov, D. Huang, J. Jung, R. Mahajan, F. Martinez, K. Mazhar, A. Phanishayee, A. Samuel, J. Scott, and R. P. Singh. Lab of Things: A Platform for Conducting Studies with Connected Devices in Multiple Homes. In ACM UbiComp 2013, Adjunct Proceedings, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. R. Cáceres, L. Cox, H. Lim, A. Shakimov, and A. Varshavsky. Virtual Individual Servers as Privacy-Preserving Proxies for Mobile Devices. In Proc. of ACM MobiHeld, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. E. G. Coffman, Jr. and P. J. Denning. Operating Systems Theory. Prentice Hall Professional Technical Reference, 1973. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. A. Corradi, M. Fanelli, and L. Foschini. VM Consolidation: A Real Case Based on OpenStack Cloud. Future Generation Computer Systems, 2014.Google ScholarGoogle ScholarCross RefCross Ref
  14. C. Elsmore, A. Madhavapeddy, I. Leslie, and A. Chaudhry. Confidential Carbon Commuting. In Proc. of the First Workshop on Measurement, Privacy, and Mobility, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. B. S. Gill. On Multi-level Exclusive Caching: Offline Optimality and Why Promotions are Better Than Demotions. In Proc. of USENIX FAST, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. T. Gupta, R. P. Singh, A. Phanishayee, J. Jung, and R. Mahajan. Bolt: A Storage System for Connected Homes. In Proc. of NSDI, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. K. Ha, P. Pillai, W. Richter, Y. Abe, and M. Satyanarayanan. Just-in-time Provisioning for Cyber Foraging. In Proc. of ACM MobiSys, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. J. Hizver and T.-c. Chiueh. Real-time Deep Virtual Machine Introspection and its Applications. In Proc. of ACM VEE, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. B. Jennings and R. Stadler. Resource Management in Clouds: Survey and Research Challenges. Journal of Network and Systems Management, 2014.Google ScholarGoogle Scholar
  20. J. Kannan, P. Maniatis, and B.-G. Chun. A Data Capsule Framework For Web Services: Providing Flexible Data Access Control To Users. CoRR, 2010.Google ScholarGoogle Scholar
  21. T. Knauth and C. Fetzer. DreamServer: Truly On-Demand Cloud Services. In Proc. of SYSTOR, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. T. Knauth and C. Fetzer. Fast Virtual Machine Resume for Agile Cloud Services. In Proc. of IEEE ICCGC, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. S. Lee, R. Panigrahy, V. Prabhakaran, V. Ramasubramanian, K. Talwar, L. Uyeda, and U.Wieder. Validating Heuristics for Virtual Machines Consolidation. Microsoft Research, MSRTR-2011-9, 2011.Google ScholarGoogle Scholar
  24. P. B. Menage. Adding Generic Process Containers to the Linux Kernel. In Ottawa Linux Symposium, 2007.Google ScholarGoogle Scholar
  25. R. Mortier, C. Greenhalgh, D. McAuley, A. Spence, A. Madhavapeddy, J. Crowcroft, and S. Hand. The Personal Container, or Your Life in Bits. Digital Futures, 2010.Google ScholarGoogle Scholar
  26. B. Newton, K. Jeffay, and J. Aikat. The Continued Evolution of Web Traffic. In IEEE MASCOTS, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. P. Padala, X. Zhu, Z. Wang, S. Singhal, and K. G. Shin. Performance Evaluation of Virtualization Technologies for Server Consolidation. HP Labs Technical Report, 2007.Google ScholarGoogle Scholar
  28. M. Satyanarayanan, P. Bahl, R. Caceres, and N. Davies. The Case for VM-Based Cloudlets in Mobile Computing. IEEE Pervasive Computing, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. A. Shakimov, H. Lim, R. Caceres, L. Cox, K. Li, D. Liu, and A. Varshavsky. Vis-a-Vis: Privacy-preserving Online Social Networking via Virtual Individual Servers. In Proc. of COMSNETS, 2011.Google ScholarGoogle Scholar
  30. A. Shakimov, A. Varshavsky, L. P. Cox, and R. Cáres. Privacy, Cost, and Availability Tradeoffs in Decentralized OSNs. In Proc. of ACM WOSN, 2009, . Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. R. P. Singh, S. Keshav, and T. Brecht. A Cloud-Based Consumer-centric Architecture for Energy Data Analytics. In Proc. of ACM e-Energy, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. R. P. Singh, T. Brecht, and S. Keshav. IP Address Multiplexing for VEEs. ACM SIGCOMM CCR, April 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. S. Soltesz, H. Pötzl, M. E. Fiuczynski, A. Bavier, and L. Peterson. Container-based Operating System Virtualization: A Scalable, High-performance Alternative to Hypervisors. In Proc. of ACM EuroSys 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. K. S. Trivedi. Prepaging and Applications to Array Algorithms. IEEE Transactions on Computers, 1976. Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. K. Wang, J. Rao, and C.-Z. Xu. Rethink the Virtual Machine Template. In Proc. of ACM VEE 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. T. M. Wong and J. Wilkes. My Cache Or Yours?: Making Storage More Exclusive. In USENIX ATC, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. T. Wood, P. Shenoy, A. Venkataramani, and M. Yousif. Blackbox and Gray-box Strategies for Virtual Machine Migration. In Proc. of NSDI 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. I. Zhang, A. Garthwaite, Y. Baskakov, and K. C. Barr. Fast Restore of Checkpointed Memory Using Working Set Estimation. In Proc. of ACM VEE, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. I. Zhang, T. Denniston, Y. Baskakov, and A. Garthwaite. Optimizing VM Checkpointing for Restore Performance in VMware ESXi. In Proc. of USENIX ATC, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  40. Q. Zhang, L. Cheng, and R. Boutaba. Cloud Computing: State-of-the-Art and Research Challenges. Journal of Internet Services and Applications, 2010.Google ScholarGoogle Scholar
  41. J. Zhu, Z. Jiang, and Z. Xiao. Twinkle: A Fast Resource Provisioning Mechanism for Internet Services. In Proc. of IEEE INFOCOM, 2011.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Towards VM Consolidation Using a Hierarchy of Idle States

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in

    Full Access

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader
    About Cookies On This Site

    We use cookies to ensure that we give you the best experience on our website.

    Learn more

    Got it!