Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/1346256.1346272acmconferencesArticle/Chapter ViewAbstractPublication PagesveeConference Proceedingsconference-collections
research-article

Opening black boxes: using semantic information to combat virtual machine image sprawl

Published: 05 March 2008 Publication History
  • Get Citation Alerts
  • Abstract

    Virtual-machine images are currently distributed as disk-image files, which are files that mirror the content of physical disks. This format is convenient for the virtual machine monitors that execute these images. However, it is not well-suited for administering images because storing images as disk-image files forces administrators to maintain the software on images with the same tools that they use to maintain the software on physical machines. Already, these tools cannot cope with "physical server sprawl"; in the future, because images can be snapshotted and cloned easily, enterprises that migrate from physical machines to images will need tools that scale to cope with the larger problem of "virtual-machine image sprawl.
    To address this problem, this paper proposes the Mirage image format (MIF), a new storage format that exposes the rich semantic information currently buried in disk-image files. Disk-image files contain a mapping from file name to file content (and file metadata). MIF decouples this mapping into a manifest that maps file names to content descriptors (and file metadata) and a store that holds the content. Each image has its own manifest and a store may contain content for many images. As with disk-image files, images in MIF fully encapsulate application state including all software dependences. In addition, conversion between MIF and traditional disk-image formats is easy.
    This paper shows, through examples, that MIF makes some typical software management tasks--inventory control, customized deployment, and image update--faster and easier. The general technique is to operate on manifests instead of on content whenever possible. These tasks can be performed without starting images and, because manifests are simpler and orders of magnitude smaller than disk-image files, without accessing large amounts of data.

    References

    [1]
    B. Alpern, J. Auerbach, V. Bala, T. Frauenhofer, T. Mummert, and M. Pigott. PDS: a virtual execution environment for software deployment. In Proceedings of the First ACM/USENIX International Conference on Virtual Execution Environments (VEE'05), pages 175--185, Chicago, IL, USA, June 2005.
    [2]
    M. Burgess. A tiny overview of cfengine: Convergent maintenance agent. In Proceedings of the First International Workshop on Multi-Agent and Robotic Systems (MARS/ICINCO), Barcelona, Spain, Sept. 2005.
    [3]
    R. Chandra, N. Zeldovich, C. Sapuntzakis, and M.S. Lam. The collective: A cache-based system management architecture. In Proceedings of the Second Symposium on Networked Systems Design and Implementation (NSDI'05), pages 259--272, Boston, MA, USA, May 2005.
    [4]
    Comprehensive Perl Archive Network. http://www.cpan.org/, Jan. 2008.
    [5]
    P. Deutsch. GZIP file format specification version 4.3. RFC 1952, Internet Engineering Task Force, May 1996.
    [6]
    E. Dolstra and A. Hemel. Purely functional system configuration management. In Proceedings of the Eleventh Workshop on Hot Topics in Operating Systems (HOTOS XI), San Diego, California, USA, May 2007. USENIX.
    [7]
    IBM. IBM Tivoli License Compliance Manager. http://www.ibm.com/software/tivoli/products/license-mgr/, Jan. 2008.
    [8]
    D. Lutterkort and M. McLouglin. Manageable virtual appliances. In Proceedings of the 2007 Ottawa Linux Symposium, pages 293--302, Ottawa, Ontario, Canada, June 2007.
    [9]
    moka5. Engine. http://www.moka5.com/, Jan. 2008.
    [10]
    A. Muthitacharoen, B. Chen, and D. Mazieres. A low-bandwidth network file system. In Proceedings of the Eighteenth ACM Symposium on Operating Systems Principles (SOSP'01), pages 174--187, Banff, Alberta, Canada, Oct. 2001.
    [11]
    National Institute of Standards and Technology. FIPS PUB 180-1: Secure Hash Standard. Apr. 1995. Supersedes FIPS PUB 180 1993 May 11.
    [12]
    K. Park, S. Ihm, M. Bowman, and V.S. Pai. Supporting practical content-addressable caching with czip compression. In Proceedings of the 2007 USENIX Annual Technical Conference (USENIX'07), pages 185--198, Santa Clara, CA, USA, June 2007.
    [13]
    B. Pfaff, T. Garfinkel, and M. Rosenblum. Virtualization aware file systems: getting beyond the limitations of virtual disks. In Proceedings of the Third Symposium on Networked Systems Design and Implementation (NSDI'06), pages 353--356, San Jose, CA, USA, May 2006.
    [14]
    S. Quinlan and S. Dorward. Venti: A new approach to archival storage. In Proceedings of the First USENIX conference on File and Storage Technologies (FAST'02), Monterey, California, USA, Jan. 2002.
    [15]
    Reductive Labs, LLC. Puppet. http://reductivelabs.com/trac/puppet/, Jan. 2008.
    [16]
    rPath. rBuilder. http://www.rpath.com/rbuilder/, Jan. 2008.
    [17]
    C. Sapuntzakis, D. Brumley, R. Chandra, N. Zeldovich, J. Chow, M.S. Lam, and M. Rosenblum. Virtual appliances for deploying and maintaining software. In Proceedings of the Seventeenth Large Installation Systems Administration Conference (LISA'03), pages 181--194, San Diego, CA, USA, Oct. 2003.
    [18]
    Software in the Public Interest. Debian: The universal operating system. http://www.debian.org/, Jan. 2008.
    [19]
    Strace, version 4.5.8. http://sourceforge.net/projects/strace/.
    [20]
    S. Tang, Y. Chen, and Z. Zhang. Machine bank: Own your virtual personal computer. In Proceedings of the Twenty--first IEEE International Parallel and Distributed Processing Symposium (IPDPS '07), pages 1--10, Long Beach, California, USA, Mar. 2007.
    [21]
    T.Y. Ts'o and S. Tweedie. Planned extensions to the linux ext2/ext3 filesystem. In Proceedings of the USENIX 2002 Annual Technical Conference, Freenix Track (FREENIX '02), pages 235--244, Monterey, California, USA, June 2002.
    [22]
    VMware. Lab Manager. http://www.vmware.com/products/labmanager/, Jan. 2008.

    Cited By

    View all
    • (2023)Landlord: Coordinating Dynamic Software Environments to Reduce Container SprawlIEEE Transactions on Parallel and Distributed Systems10.1109/TPDS.2023.324159834:5(1376-1389)Online publication date: May-2023
    • (2020)Solving the Container Explosion Problem for Distributed High Throughput Computing2020 IEEE International Parallel and Distributed Processing Symposium (IPDPS)10.1109/IPDPS47924.2020.00048(388-398)Online publication date: May-2020
    • (2019)An Exhaustive Survey on Security Concerns and Solutions at Different Components of VirtualizationACM Computing Surveys10.1145/328730652:1(1-38)Online publication date: 13-Feb-2019
    • Show More Cited By

    Index Terms

    1. Opening black boxes: using semantic information to combat virtual machine image sprawl

        Recommendations

        Comments

        Information & Contributors

        Information

        Published In

        cover image ACM Conferences
        VEE '08: Proceedings of the fourth ACM SIGPLAN/SIGOPS international conference on Virtual execution environments
        March 2008
        190 pages
        ISBN:9781595937964
        DOI:10.1145/1346256
        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Sponsors

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        Published: 05 March 2008

        Permissions

        Request permissions for this article.

        Check for updates

        Author Tags

        1. deployment
        2. installation
        3. management
        4. virtualization

        Qualifiers

        • Research-article

        Conference

        VEE '08

        Acceptance Rates

        VEE '08 Paper Acceptance Rate 18 of 57 submissions, 32%;
        Overall Acceptance Rate 80 of 235 submissions, 34%

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • Downloads (Last 12 months)12
        • Downloads (Last 6 weeks)0
        Reflects downloads up to 10 Aug 2024

        Other Metrics

        Citations

        Cited By

        View all
        • (2023)Landlord: Coordinating Dynamic Software Environments to Reduce Container SprawlIEEE Transactions on Parallel and Distributed Systems10.1109/TPDS.2023.324159834:5(1376-1389)Online publication date: May-2023
        • (2020)Solving the Container Explosion Problem for Distributed High Throughput Computing2020 IEEE International Parallel and Distributed Processing Symposium (IPDPS)10.1109/IPDPS47924.2020.00048(388-398)Online publication date: May-2020
        • (2019)An Exhaustive Survey on Security Concerns and Solutions at Different Components of VirtualizationACM Computing Surveys10.1145/328730652:1(1-38)Online publication date: 13-Feb-2019
        • (2019)Towards Declarative and Data-Centric Virtual Machine Image Management in IaaS CloudsIEEE Transactions on Cloud Computing10.1109/TCC.2017.27280667:4(1124-1138)Online publication date: 1-Oct-2019
        • (2019)Semantics-Aware Virtual Machine Image Management in IaaS Clouds2019 IEEE International Parallel and Distributed Processing Symposium (IPDPS)10.1109/IPDPS.2019.00052(418-427)Online publication date: May-2019
        • (2018)Trusted VM‐vTPM Live Migration Protocol in CloudsCloud Computing and Virtualization10.1002/9781119488149.ch8(121-135)Online publication date: 25-Mar-2018
        • (2017)A Study of Security Vulnerabilities on Docker HubProceedings of the Seventh ACM on Conference on Data and Application Security and Privacy10.1145/3029806.3029832(269-280)Online publication date: 22-Mar-2017
        • (2016)Using hints to improve inline block-layer deduplicationProceedings of the 14th Usenix Conference on File and Storage Technologies10.5555/2930583.2930607(315-322)Online publication date: 22-Feb-2016
        • (2016)Decentralised Repositories for Transparent and Efficient Virtual Machine OperationsDeveloping Interoperable and Federated Cloud Architecture10.4018/978-1-5225-0153-4.ch007(170-219)Online publication date: 2016
        • (2016)Automated system change discovery and management in the cloudIBM Journal of Research and Development10.1147/JRD.2015.251181160:2-3(2:1-2:10)Online publication date: 1-Mar-2016
        • Show More Cited By

        View Options

        Get Access

        Login options

        View options

        PDF

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        Media

        Figures

        Other

        Tables

        Share

        Share

        Share this Publication link

        Share on social media