XtreemOS IP project is funded by the European Commission under contract IST-FP6-033576 Overview of...

45
Managed by XtreemOS IP project is funded by the European Commission under contract IST-FP6-033576 Overview of XtreemOS Christine Morin XtreemOS scientific coordinator [email protected] Phenix Workshop, Rennes December 07, 2006

Transcript of XtreemOS IP project is funded by the European Commission under contract IST-FP6-033576 Overview of...

Managed by

XtreemOS IP project is funded by the European Commission under contract IST-FP6-033576

Overview of XtreemOS

Christine Morin

XtreemOS scientific [email protected]

Phenix Workshop, Rennes

December 07, 2006

Overview of XtreemOS - Phenix Workshop, December 7, 2006 2

Grid Environment & VO

WAN

VO2

VO1

• Multiple users from different institutions

• Multiple geographicallydistributed resources in different administrative domains

• Large scale• Uncountable number of resources

• Dynamicity• VO, users, resources

Overview of XtreemOS - Phenix Workshop, December 7, 2006 3

State of the Art

Current OS are not Grid-aware & not VO-aware A variety of Grid middleware & Toolkits for Grid

Computing• Resource management • Changing interfaces• Security pitfalls• Complexity for users, programmers & administrators

Overview of XtreemOS - Phenix Workshop, December 7, 2006 4

XtreemOS Objectives

Design & implement a reference open source Grid operating system based on Linux

– Native support for virtual organizations

Validate the XtreemOS Grid OS with a set of real use cases on a large Grid testbed

Promote XtreemOS software in the Linux community and create communities of users and developers

Overview of XtreemOS - Phenix Workshop, December 7, 2006 5

XtreemOS Research Challenges

Identify fundamental functionalities to be embedded in Linux for secure application execution in Grids

Build a set of scalable self-healing OS services for secure resource management in very large dynamic grids

Provide a simple Grid API compliant with Posix while adding new functionality and supporting Grid-aware applications

Aggregate cluster resources into powerful grid nodes by integrating single system image mechanisms in Linux

Build an XtreemOS flavour for mobile devices enabling ubiquitous access to grid resources

Overview of XtreemOS - Phenix Workshop, December 7, 2006 6

Linux LinuxLinuxLinux

ComputerComputer ComputerComputer

XtreemOS

Application Middleware

Appli Appli Appli

XtreemOS Flavours

PC Federation of PCs

– Cluster Mobile device

– PDA– Mobile phone

Overview of XtreemOS - Phenix Workshop, December 7, 2006 7

XtreemOS Architecture

Business Applications Scientific Applications

XtreemOS API

VO & Security Data ManagementApplication Management

Infrastructure for Highly Available and Scalable Services

Linux-XOS: Grid-enabled Linux Operating System

Linux-XOS for PCLinux-XOS for

ClusterLinux-XOS for Mobile Devices

Overview of XtreemOS - Phenix Workshop, December 7, 2006 8

XtreemOS UseCases

14 applications– Simulation applications (aerospace, energy)– Business applications– Bioinformatics application– Virtual reality application– Finance application– Telecom application

Overview of XtreemOS - Phenix Workshop, December 7, 2006 9

XtreemOS & Linux

Acceptance in the Linux community is key for the success of the XtreemOS project

– Packaging for multiple Linux distributions Mandriva Linux

Red Flag Linux

Debian

– Integration in OSCAR

– Get XtreemOS patches accepted in Linux OS

Overview of XtreemOS - Phenix Workshop, December 7, 2006 10

XtreemOS Project Phases

Phase 1 (M1-M6)– Specification of XtreemOS

Phase 2 (M7-M18)– Design and implementation of XtreemOS basic version– Preliminary experiments with LinuxSSI

Phase 3 (M19-M24)– Integration of all XtreemOS components– Delivery of first XtreemOS prototype

Phase 4 (M25-M48)– Evaluation with real use cases– Design and implementation of advanced features of

XtreemOS– Public releases

Overview of XtreemOS - Phenix Workshop, December 7, 2006 11

XtreemOS Sub-projects

SP1 - Project Management

SP2 - Linux for Virtual Organizations

SP3 - Grid Support for Linux

SP4 - Software integration, packaging, experimentation & validation

SP5 - Communication, dissemination, exploitation & training

XtreemOS

SP4SP4

SP2 SP3

Overview of XtreemOS - Phenix Workshop, December 7, 2006 12

VO and Security Management

Business Applications Scientific Applications

XtreemOS API

VO & Security Data ManagementApplication Management

Infrastructure for Highly Available and Scalable Services

Linux-XOS: Grid-enabled Linux Operating System

Linux-XOS for PCLinux-XOS for

ClusterLinux-XOS for Mobile Devices

Overview of XtreemOS - Phenix Workshop, December 7, 2006 13

VO & Security Management

A VO can be seen as a temporary or permanent coalition of geographically dispersed entities (individuals, groups, organizational units or entire organizations) that pool resources, capabilities and information to achieve common objectives.– Legal or contractual arrangements between

entities– Resources can be physical equipment or other

capabilities such as knowledge, information or data

Overview of XtreemOS - Phenix Workshop, December 7, 2006 14

Some Lessons from the State of the Art

Open issues– Scalability of in-the-large VO management

• Short-lived VOs

– Ease of management of VO and VO identities– Security and VO policy enforcement at the

node and site level

Overview of XtreemOS - Phenix Workshop, December 7, 2006 15

VO & Security Management

Key components of VO– Owner/administrator of the VO– A set of participating users in different

participating domains– A set of participating resources in different

participating domains– A set of roles which users/resources can play

in the VO– A set of rules/policies on resource availability

and access control– An (renewable) expiry time of the VO

Overview of XtreemOS - Phenix Workshop, December 7, 2006 16

VO Lifecycle VO identification

– Identify and name VO candidates VO formation

– Creation and configuration of the VO according to the anticipated roles of members

VO operation– Members should be identified for effectively logging and auditing– The VO should be able to classify the resources to different access

control level for effective management VO evolution

– Managing change in participating entities or in their condition of use

– Members can be added and linked into a VO by authorization– Users can be classified at different levels with associated operation

rights VO dissolution

– Non persistent information should be deleted, credentials reclaimed and user and resource providers notified

– Should take place after all activities finished

Overview of XtreemOS - Phenix Workshop, December 7, 2006 17

VO Management

Two levels– VO level (administration)

• Performed by XtreemOS-G services Distributed information management for membership tracking

and accounting of users and resources

– Node level• Performed by XtreemOS-F• Add mechanisms to Linux OS for recognizing, controlling,

and enforcing usage of global Grid entities Grid identity management Resource access granting and accounting VO policy checking, auditing and enforcing

Overview of XtreemOS - Phenix Workshop, December 7, 2006 18

Node Level VO Management

Minimal with respect to changes to the kernel code to reduce pressure to get VO related changes accepted in Linux community– Keep changes localized in dynamically loadable kernel

modules Features

– PAM-plug-in based authentication– Static and dynamic identity mapping to local user/group ids– Kernel level key retention mechanisms– ACL mechanisms

• Flexible, secure, efficient and easily sustainable from the software engineering point of view VO model

Investigation of synergies with existing security enhancement for Linux– Linux Security Module (LSM)

• Refinement of access control and enforcement mechanisms

Overview of XtreemOS - Phenix Workshop, December 7, 2006 19

Infrastructure for Highly Available and Scalable Services

Business Applications Scientific Applications

XtreemOS API

VO & Security Data ManagementApplication Management

Infrastructure for Highly Available and Scalable Services

Linux-XOS: Grid-enabled Linux Operating System

Linux-XOS for PCLinux-XOS for

ClusterLinux-XOS for Mobile Devices

Overview of XtreemOS - Phenix Workshop, December 7, 2006 20

Infrastructure for Highly Available and Scalable Grid Services

Grid – Very large number of nodes that are distributed world-

wide– Dynamicity: nodes join, leave, fail

Applications– Standalone (interact only with the user that launched

them)– Services (present an interface to the outside world and

can be invoked)• System level functionalities• Application-level functionalities

Targets of the infrastructure– XtreemOS-G services– Application-level services

Overview of XtreemOS - Phenix Workshop, December 7, 2006 21

Infrastructure for Highly Available and Scalable Grid Services

Management of collections of nodes

Overview of XtreemOS - Phenix Workshop, December 7, 2006 22

Infrastructure for Highly Available and Scalable Grid Services

Toolbox– Facilities to construct structured collections

• Application initialization• DHT, N-dimensional matrix, ranked nodes

– Distributed servers• Present a single stable address to the external world

hiding the internal organization of the service– Virtual nodes

• Fault tolerant groups of nodes capable of taking over each other’s tasks

– Publish/Subscribe • Useful for applications and also to build structured

collections• Fully decentralized implementation

– Directory service• Node monitoring and failure detection• Adapt to the dynamicity of the monitored attributes

Overview of XtreemOS - Phenix Workshop, December 7, 2006 23

Application Management

Business Applications Scientific Applications

XtreemOS API

VO & Security Data ManagementApplication Management

Infrastructure for Highly Available and Scalable Services

Linux-XOS: Grid-enabled Linux Operating System

Linux-XOS for PCLinux-XOS for

ClusterLinux-XOS for Mobile Devices

Overview of XtreemOS - Phenix Workshop, December 7, 2006 24

Application Management

Entities taking part in job execution– Job

• One or more processes that collaborate to achieve a common goal• Resource allocation unit

– Resources• Physical or virtual component of limited availability within a

computer system Have static and dynamic characteristics

Application execution management– Job submission and scheduling– Job and resource control– Job and resource monitoring

Overview of XtreemOS - Phenix Workshop, December 7, 2006 25

Application Life Cycle

Overview of XtreemOS - Phenix Workshop, December 7, 2006 26

Application Execution Management

AEM is generic and flexible as much as possible– Does not target specific users or types of jobs

AEM allows users to exploit advantages of executing a job in a Grid AEM provides an easy to use job submission, control and monitoring

interface– Unix-like submission (with default description of requirements)– Batch-like submission

• Requirements• Hints (additional information optionally provided by users)

– Adaptive and accurate monitoring AEM deals with Grid dynamicity

– Job migration and checkpointing– Hide failures and changes as much as possible to users

Overview of XtreemOS - Phenix Workshop, December 7, 2006 27

Application Execution Management

AEM has to guarantee access to authorized resources and their limited utilization

– Jobs executed in the context of a grid user and a VO

– Rely on VO and security management services (WP2.1, WP3.5) Scalability and fault tolerance taken into account in the design of AEM

– Most of AEM services are in the scope of a job which is suitable for scalability• JExecMng and jMonitor could potentially have to manage hundreds of nodes

– JobDirectory and jController need to be fault tolerant

– WP3.2 services will be used as appropriate• Resource discovery• Distributed servers

Tight integration with the Linux OS

– Enforcement in the usage of agreed resources (quota, access control)• Job-id to be known by XtreemOS-F

– Users will have more information and control on how their jobs are running • Performance metrics, occurred errors, exit status, …

AEM provides a basic set of system-level functionalities

– Users may rely on user-level services (eg. workflow manager, SAGA runtime)

Overview of XtreemOS - Phenix Workshop, December 7, 2006 28

Data management

Business Applications Scientific Applications

XtreemOS API

VO & Security Data ManagementApplication Management

Infrastructure for Highly Available and Scalable Services

Linux-XOS: Grid-enabled Linux Operating System

Linux-XOS for PCLinux-XOS for

ClusterLinux-XOS for Mobile Devices

Overview of XtreemOS - Phenix Workshop, December 7, 2006 29

Data Management

XtreemFS– Federated object-based file system for Grid environments

• Centralised metadata servers replaced by a federation of metadata servers

Independence of participating organizations while maintaining a global view of the system

• Designed with wide-area networks in mind File replication Location and access management based on an intelligent monitoring

serviceo Access pattern-aware replication

• Semantic naming and advanced query functions to allow users to find data in huge archives

– Object Sharing Service (OSS)• Inter-process communication via volatile memory, mapped files,

dynamically allocated objects and grid pipes

Overview of XtreemOS - Phenix Workshop, December 7, 2006 30

XtreemFS Components Object Storage Device (OSD)

– Data access in the file system• Read/write access, concurrency control

– Object-based storage interface to hide complexity of underlying block-based storage mechanisms

Metadata and Replica Catalogue (MRC)– Maintenance of all file system metadata

• Posix metadata• Extended (user defined) metadata• Information on replica locations

Replica Management Service (RMS)– Decides when replicas have to be replicated and with what

distribution among OSD – Replica removal

Client– Hosts running the access layer (file system adapter or XtreemFS

library)• Linux traditional file system interface for transparent access to MRC,

OSD, RMS• Native XtreemFS interface

Overview of XtreemOS - Phenix Workshop, December 7, 2006 31

Overview of XtreemOS - Phenix Workshop, December 7, 2006 32

Object Storage Device (OSD)

Container of objects– Reliably store and retrieve data from physical media– Security enforcement for access to stored objects

• Capabilities built by MRC and received with each request

– Multi-object files• Striping and/or replication• Each file replica has its own striping policy

– Transactional files• Changes performed on a local copy (and not forwarded to

other OSD) and committed or rolled back at some time

Overview of XtreemOS - Phenix Workshop, December 7, 2006 33

Replica Management Service (RMS)

Take care of autonomous creation and deletion of replicas Replication policies

– Must satisfy security needs and comply with local regulations• Countries, real organization, VO, racks in a data centre

Replica creation– Gathering information from other services to decide when and

where to create a replica• Each time a file is open

RMS is contacted to see if a better replica should be createdo Decision depends on the file size, OSD availabilityo A client may start accessing a “bad replica” during the creation of a new one

• MRC may keep track of opens to predict future access from the previous ones

• AEM can inform RMS that a job is about to start its execution RMS can anticipate the creation of a new replica before the job execution

Removing “obsolete” replicas– Lack of free space, file or replica very seldom used, close

replicas not anymore useful, …– A replica can be removed at any time even while being used

Overview of XtreemOS - Phenix Workshop, December 7, 2006 34

MetaData and Replica Catalogue (MRC)

MRC – Acts logically as one service but will be composed of replicated

service instances to improve availability and performance– Access control management

• Support of a variety of policies• Volume ACL

Data model– Hierarchical directory structure and/or extended metadata– Core abstraction for controlling access to file metadata and file data is

the volume– Files can be copied between volumes and links to files in other

volumes can be created Internal architecture

– Exactly one meta object per physical object on a storage device To what extend it is possible to decouple system components

while preserving a global view to the system

Overview of XtreemOS - Phenix Workshop, December 7, 2006 35

Object Sharing Service (OSS)

Inter-process communication via volatile memory, mapped files, dynamically allocated objects and grid pipes– All components designed to be scalable and fault

tolerant to deal with the dynamic behaviour of the Grid Features

– Management of shared objects containing references– Object access detection

• Page based

– Object access monitoring to control false sharing and object replicas

– Object consistency management• Strict, weak and transactional memory consistency models

Overview of XtreemOS - Phenix Workshop, December 7, 2006 36

LinuxSSI: Linux-XOS for Clusters

Business Applications Scientific Applications

XtreemOS API

VO & Security Data ManagementApplication Management

Infrastructure for Highly Available and Scalable Services

Linux-XOS: Grid-enabled Linux Operating System

Linux-XOS for PCLinux-XOS for

ClusterLinux-XOS for Mobile Devices

Overview of XtreemOS - Phenix Workshop, December 7, 2006 37

LinuxSSI: XtreemOS-F Cluster Flavour

LinuxSSI will leverage Kerrighed SSI OS for clusters

Four work directions for LinuxSSI– Scalability to hundreds of processors– LinuxSSI file system– Automatic reconfiguration of LinuxSSI– Checkpoint/restart mechanisms for parallel

applications– Customizable scheduler

Overview of XtreemOS - Phenix Workshop, December 7, 2006 38

Scalability & Reconfiguration Management

Scalability to hundreds of processors– Removing hard limits on the amount of nodes– Evaluating the scalability of Kerrighed internal

algorithms Automatic reconfiguration of LinuxSSI

– Node addition, eviction or failure management– Leverage the existing mechanisms provided by

Kerrighed in the HotPlug module

Overview of XtreemOS - Phenix Workshop, December 7, 2006 39

LinuxSSI File System

LinuxSSI file system– Exploitation of the disks attached to cluster

nodes• Single name space (root file system)• Policies for placing/replicating data on disk• Efficient parallel accesses to large data volumes

– Performance as a primary target in LinuxSSI basic version

– LinuxSSI file system should not fail in the event of failures

• Better support to failures in the advanced version of LinuxSSI

Overview of XtreemOS - Phenix Workshop, December 7, 2006 40

Checkpoint/Restart in LinuxSSI

Checkpoint and restart of parallel application units in a cluster

– Shared memory and message-passing programming models will be supported

– Checkpointer multi-level architecture• Kernel checkpointer

Process/thread checkpointing

Based on Kerrighed mechanisms

Transparent or application-aware checkpointing

• System checkpointer Application unit checkpointing (inside a cluster)

Coordination of thread/process checkpoints for parallel applications

Configurable service

• Grid checkpointer Application checkpointing (an application may span multiple Grid nodes)

Coordination of application unit checkpoints for an application comprising of multiple units

Overview of XtreemOS - Phenix Workshop, December 7, 2006 41

Customizable Scheduler

Customizable scheduler– Long-term scheduler

• Application admission in the cluster (job queuing system)

– Load balancing scheduler• Balance the current workload between cluster nodes

Long-term scheduler– DRMAA standard interface– Adapted to take advantage of the SSI “virtual multiprocessor”– Resource sharing (a CPU may not be dedicated to a single application)– Advanced monitoring capabilities

Load balancing scheduler– Policy customization

• Multilevel architecture (probes, analyzers, decision-making)

– Self adaptation of policy based on the current state of the cluster– Advanced policies

• Shared memory, IPC Interaction with the Grid level services when needed

Overview of XtreemOS - Phenix Workshop, December 7, 2006 42

From LinuxSSI to LinuxSSI-XOS

Virtual organization support– Support of the kernel key retention system

• Impact on the Ghost module

– XtreemOS-G services will run as a single instance on a LinuxSSI cluster

• Example: daemons in charge of mapping global user, VO and group identities onto the Linux UID/GID

Overview of XtreemOS - Phenix Workshop, December 7, 2006 43

XtreemOS Consortium

19 partners

– 1 public financial institution as coordinator

– 9 research centers & universities

– 9 industrial partners• 4 SME

8 countries

– Europe• France, Germany, Italy, Slovenia, Spain, The Netherlands, UK

– China

Overview of XtreemOS - Phenix Workshop, December 7, 2006 44

XtreemOS Partners

Overview of XtreemOS - Phenix Workshop, December 7, 2006 45

Fact Sheet

Start date– June 1st, 2006

Duration– 4 years

Budget– Approx. 30 Meuros– EC funding 14.2

Meuros Website

– http://www.xtreemos.eu

Administrative and financial coordinator

– CDC, Jean-Noël Forget Scientific and technical staff

– More than 100 persons