Dogfooding: use IBM Cloud services to monitor IBM Cloud infrastructure

07/13/2019
by   William Pourmajidi, et al.
0

The stability and performance of Cloud platforms are essential as they directly impact customers' satisfaction. Cloud service providers use Cloud monitoring tools to ensure that rendered services match the quality of service requirements indicated in established contracts such as service-level agreements. Given the enormous number of resources that need to be monitored, highly scalable and capable monitoring tools are designed and implemented by Cloud service providers such as Amazon, Google, IBM, and Microsoft. Cloud monitoring tools monitor millions of virtual and physical resources and continuously generate logs for each one of them. Considering that logs magnify any technical issue, they can be used for disaster detection, prevention, and recovery. However, logs are useless if they are not assessed and analyzed promptly. Thus, we argue that the scale of Cloud-generated logs makes it impossible for DevOps teams to analyze them effectively. This implies that one needs to automate the process of monitoring and analysis (e.g., using machine learning and artificial intelligence). If the automation will witness an anomaly in the logs — it will alert DevOps staff. The automatic anomaly detectors require a reliable and scalable platform for gathering, filtering, and transforming the logs, executing the detector models, and sending out the alerts to the DevOps staff. In this work, we report on implementing a prototype of such a platform based on the 7-layered architecture pattern, which leverages micro-service principles to distribute tasks among highly scalable, resources-efficient modules. The modules interact with each other via an instance of the Publish-Subscribe architectural pattern. The platform is deployed on the IBM Cloud service infrastructure and is used to detect anomalies in logs emitted by the IBM Cloud services, hence the dogfooding.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
10/21/2020

Anomaly Detection in a Large-scale Cloud Platform

Cloud computing is ubiquitous: more and more companies are moving the wo...
research
12/24/2019

An Analisys of Application Logs with Splunk : developing an App for the synthetic analysis of data and security incidents

The present work aims to enhance the application logs of an hypothetical...
research
05/22/2018

Logchain: Blockchain-assisted Log Storage

During the normal operation of a Cloud solution, no one usually pays att...
research
07/31/2023

AMOE: a Tool to Automatically Extract and Assess Organizational Evidence for Continuous Cloud Audit

The recent spread of cloud services has enabled many companies to take a...
research
08/11/2020

Study on State-of-the-art Cloud Services Integration Capabilities with Autonomous Ground Vehicles

Computing and intelligence are substantial requirements for the accurate...
research
12/28/2017

Reliable Messaging to Millions of Users with MigratoryData

Web-based notification services are used by a large range of businesses ...
research
04/24/2023

Automatisation de la structuration des logs pour le Cloud Computing

Logs are a fundamental component of modern computer systems. They enable...

Please sign up or login with your details

Forgot password? Click here to reset