An Execution Fingerprint Dictionary for HPC Application Recognition

09/10/2021
by   Thomas Jakobsche, et al.
0

Applications running on HPC systems waste time and energy if they: (a) use resources inefficiently, (b) deviate from allocation purpose (e.g. cryptocurrency mining), or (c) encounter errors and failures. It is important to know which applications are running on the system, how they use the system, and whether they have been executed before. To recognize known applications during execution on a noisy system, we draw inspiration from the way Shazam recognizes known songs playing in a crowded bar. Our contribution is an Execution Fingerprint Dictionary (EFD) that stores execution fingerprints of system metrics (keys) linked to application and input size information (values) as key-value pairs for application recognition. Related work often relies on extensive system monitoring (many system metrics collected over large time windows) and employs machine learning methods to identify applications. Our solution only uses the first 2 minutes and a single system metric to achieve F-scores above 95 percent, providing comparable results to related work but with a fraction of the necessary data and a straightforward mechanism of recognition.

READ FULL TEXT

page 1

page 2

page 3

page 4

09/13/2020

Analyzing Performance Properties Collected by the PerSyst Scalable HPC Monitoring Tool

The ability to understand how a scientific application is executed on a ...
01/20/2023

ARcode: HPC Application Recognition Through Image-encoded Monitoring Data

Knowing HPC applications of jobs and analyzing their performance behavio...
01/12/2018

Effect of Meltdown and Spectre Patches on the Performance of HPC Applications

In this work we examine how the updates addressing Meltdown and Spectre ...
05/06/2020

Catch Me If You Can: Using Power Analysis to Identify HPC Activity

Monitoring users on large computing platforms such as high performance c...
06/10/2019

LASSi: Metric based I/O analytics for HPC

LASSi is a tool aimed at analyzing application usage and contention caus...
11/01/2017

Determination of Checkpointing Intervals for Malleable Applications

Selecting optimal intervals of checkpointing an application is important...

Please sign up or login with your details

Forgot password? Click here to reset