Automatic Application Deployment in the Cloud: from Practice to Theory and Back

Size: px
Start display at page:

Download "Automatic Application Deployment in the Cloud: from Practice to Theory and Back"

Transcription

1 Automatic Application Deployment in the Cloud: from Practice to Theory and Back Gianluigi Zavattaro University of Bologna - Italy FoCUS research team INRIA - France Based on joint work with: T.A. Lascu, J. Mauro Univ. of Bologna - Italy R. Di Cosmo, S. Zacchiroli, J. Zwolakowski Univ. Paris Diderot - France A. Eiche Mandriva SA - France

2 Cloud applications u Cloud computing offers the possibility to build sophisticated software systems on virtualized infrastructures at a fraction of the time / cost necessary just few years ago u We can give a look at Juju to have an idea of how cloud applications can be easily deployed nowadays

3 Cloud application management is any way a complex task u Even if tool-supported, the cloud application operator must decide: n which software components to select n the overall application architecture n the order of the configuration actions n

4 The challenge u Understand how much of the operator s activities can be automatised: n selection of the software components (selected from appropriate repositories) n synthesis of the overall architecture n planning of the configuration actions to be executed to realize the expected architecture n

5 Our current practical results u Definition of a language for describing component s repositories { "states": [ { "provide": {}, "require": {}, "initial": true, "name": "Installed", "successors": [ "Template" ] }, { "provide": {}, "require": {}, "successors": [ "Configured" ], "name": "Template" }, { "provide": {}, "require": { "@Haproxy/Active/add_database": 1 }, "successors": [ "Active" ], "name": "Configured" }, { "provide": {}, "require": { "@Haproxy/Active/add_database": 1, "@Httpd/Active/start": 1, "@Httpd/Configured/get_document_root": 1 }, "successors": [ "ActiveWithNfs" ], }, "name": "Active" } { "provide": { "@Wordpress/ActiveWithNfs/get_website": 1000 }, "require": { "@Haproxy/Active/add_database": 1, "@Httpd/Active/start": 1, "@Httpd/Configured/get_document_root": 1, "@Nfs_client/Active/mount": 1 }, "name": "ActiveWithNfs" } ], "name": "Wordpress"

6 Our current practical results u Definition of a language for describing component s @Httpd/Configured/get_document_root Configured Template Installed Legend Component State Initial State Require Port Provide Port

7 Our current practical results u Realization of a tool for component s selection and architecture synthesis debian3@aeiche.innovation.mandriva.com @Wordpress/ActiveWithNfs/get_website mbs1@aeiche.innovation.mandriva.com [mbs] mbs0@aeiche.innovation.mandriva.com [mbs] debian1@aeiche.innovation.mandriva.com [debian] mbs3@aeiche.innovation.mandriva.com @Nfs_server/Active/get_dir mbs2@aeiche.innovation.mandriva.com [mbs] debian2@aeiche.innovation.mandriva.com [debian]

8 Our current practical results u Realization of a tool for component s selection and architecture synthesis

9 Our current practical results u Realization of a tool for planning the configuration actions to be executed GALERA-1 WORDPRESS-2 GALERA-3 GALERA-2 WORDPRESS-1 galera-1 (C,Repositories) wordpress-2 (C,Installed) galera-3 (C,Repositories) galera-2 (C,Repositories) wordpress-1 (C,Installed) HTTPD-1 HTTPD-2 galera-1 (Repositories,Installed) wordpress-2 (Installed,Template) httpd-1 (C,Installed) galera-3 (Repositories,Installed) galera-2 (Repositories,Installed) wordpress-1 (Installed,Template) httpd-2 (C,Installed) NFS_SERVER-1 galera-1 (Installed,Configured) wordpress-2 (Template,Configured) httpd-1 (Installed,Configured) galera-3 (Installed,Configured) galera-2 (Installed,Configured) wordpress-1 (Template,Configured) httpd-2 (Installed,Configured) HAPROXY-2 HAPROXY-1 haproxy-2 (C,Installed) galera-1 (Configured,Active) wordpress-2 httpd-1 (Configured,Active) galera-3 (Configured,Active) galera-2 (Configured,Active) haproxy-1 (C,Installed) wordpress-1 httpd-2 (Configured,Active) VARNISH-1 NFS_CLIENT-2 NFS_CLIENT-1 haproxy-2 (Installed,Configured) galera-1 (Active,D) varnish-1 (C,Installed) wordpress-2 (Active,ActiveWithNfs) httpd-1 (Active,D) galera-3 (Active,D) galera-2 (Active,D) haproxy-1 (Installed,Configured) wordpress-1 (Active,ActiveWithNfs) httpd-2 (Active,D) nfs_client-2 (C,Installed) nfs_server-1 (Configured,Active) varnish-1 (Installed,Configured) haproxy-1 (Configured,Active) wordpress-1 (ActiveWithNfs,D) nfs_client-2 (Installed,Active) nfs_server-1 (Active,D) haproxy-2 (Active,D) varnish-1 (Configured,Active.ActiveSysD) haproxy-1 (Active,D) nfs_client-2 (Active,D) varnish-1 (Active.ActiveSysD,Active) varnish-1 (Active,D)

10 Structure of the talk u Formalizing the deployment problem u Decidability/complexity results u Fully automatic deployment (without capacity constraints and conflicts) u Constraints and conflicts strike back u Conclusion and Open issues u Related work

11 Component types u A component has provide and require ports u A component has an internal state machine u Ports are active or inactive according to the current internal state Provide ports Require ports

12 Example: the Wordpress component @Httpd/Configured/get_document_root Legend Template Component Installed wordpress State Initial State Require Port Provide Port

13 Conflicts u Conflicts are expressed as special ports n The apache web server is in conflict with the lighttpd web server

14 Capacity constraints u Provide (resp. require) ports could have an associated upper (resp. lower) bound to the number of connections wordpress 3 mysql 2 wordpress 2 loadbalancer wordpress mysql varnish mysql

15 Configurations u Component instances, with a current build. In the kerberos case, krb5 is built in the first stage state, missing and out the complementary generation of the krb5-ldapprovide/require package. Then ports openldap connected can be built directly by bindings into its normal build satisfying ing between the tified by id 1 and tified by id 2 ; tate of the commore than one ponents. For inonfiguration dete the resources apache2, a), and three new comy. All these new e initial state for mponents can be ge(a, uninst, inst) int, to be able n Example: build into its Kerberos normal stage. This with process ldap wouldsupport be modeled in Aeolus as depicted in Fig. 2. Debian (example of circular dependency) the mysql inst its dependencies. Once openldap is built, krb5 can also be

16 Configurations u Component instances, with a current state, and complementary provide/require ports connected by bindings 2 mysql loadbalancer varnish 2 wordpress wordpress wordpress wordpress 3 mysql 3 mysql 2 mysql 2 mysql mysql wordpress mysql mysql

17 Formalizing the deployment problem

18 Formalizing the deployment problem

19 Formalizing the deployment problem

20 Deployment problem u Input: n A set of component types (called Universe) n One target component type-state pair u Output: n Yes, if there exists a deployment plan n No, otherwise Deployment plan: a sequence of actions leading to a final configuration containing at least one component of the given target type, in the given target state

21 een the id 1 and id 2 ; the comhan one. For intion deesources,a), and ew comese new l state for ts can be inst, inst) be able ysql inst Deployment problem: example build. In the kerberos case, krb5 is built in the first stage u missing Consider out the the generation problem of the krb5-ldap of installing package. Then openldap kerberos can bewith built directly ldap intosupport its normal build in satisfying Debian its dependencies. Once openldap is built, krb5 can also be build into its normal stage. This process would be modeled in Aeolus as depicted in Fig. 2. n Universe: packages krb5 and openldap n Target: krb5 in normal state

22 een the id 1 and id 2 ; the comhan one. For intion deesources,a), and ew comese new l state for ts can be inst, inst) be able ysql inst Deployment problem: example build. In the kerberos case, krb5 is built in the first stage missing out the generation of the krb5-ldap package. Then new(k:krb5),new(o:openldap), openldap can be built directly into its normal build satisfying statechange(k,uninst,stage1), its dependencies. Once openldap is built, krb5 can also be bind(libkrb5-dev,o,k),statechange(o,uninst,normal), build into its normal stage. This process would be modeled bind(libldap2-dev,k,o), Aeolus as depicted Fig. 2. statechange(k,stage1,normal) u Deployment plan: k o

23 Structure of the talk u Formalizing the deployment problem u Decidability/complexity results u Fully automatic deployment (without capacity constraints and conflicts) u Constraints and conflicts strike back u Conclusion and Open issues u Related work

24 Summary of decidability/complexity results Component model Deployment is Full component model Undecidable [SEFM12] No capacity constraints Ackermann-hard [ICALP13,I&C14] No capacity constraints, No conflicts Quadratic [SEFM12]

25 Quadratic algorithm without constraints and conflicts [SEFM12] u Forward reachability algorithm n all reachable states computed by saturation Algorithm 1 Checking achievability in the Aeolus model function Achievability(U, T, q) absconf := { T, T.init T U} provport := T,q absconf {dom(t.p(q ))} repeat new := { T,q T,q absconf, (q,q ) T.trans}\absConf newport := T,q new {dom(t.p(q ))} while T,q new. dom(t.r(q )) provport newport do new := new \{ T,q } newport := T,q new {dom(t.p(q ))} end while absconf := absconf new provport := provport newport until new = if T,q absconf then return true else return false end if end function

26 issing out the generation of the krb5-ldap package. Then penldap Example: can be built directly into its normal build satisfying ts dependencies. Once openldap is built, krb5 can also be uild into its normal stage. This process would be modeled in eolus as depicted in Fig. 2. the kerberos case-study a pyramid of levels of component-states having arrows or arcs between two consecutive levels as the one in Fig. 3. Initial states New states ig. 2: Representation of the krb5 and openldap components. All reachable. Reachability analysis The first step in the proposed technique checks if the the esired states target state can be reached. To do so all reachable tates are computed, for each of the component types in the iven universe. In the following we use the pair T,q to enote a Automatic component Application type Deployment T and one in the ofcloud its state q. An increasing sequence of sets of component-state pairs

27 Lesson learned from the foundational study Deployment can be reasonably fully automatised if we do not consider capacity constraints and conflicts

28 Structure of the talk u Formalizing the deployment problem u Decidability/complexity results u Fully automatic deployment (without capacity constraints and conflicts) u Constraints and conflicts strike back u Conclusion and Open issues u Related work

29 Fully automated deployment (no capacity, no conflicts) [ICTAI13] or. 3. u Use the graph of the reachability algorithm bottom-up from the target state n select the bindings (red arrows) n select the predecessors (black arrows) (a) ple. (b)

30 we at es he m ate in he Fully automated deployment (no capacity, no conflicts) (a) replacing z,x,y with z,x,y where z,x,y is a delete action or it is the the first statechange reaching a state y that does not provide r. After applying these relaxations we obtain the final version of abstract plan that, for the kerberos case, is the one depicted in Fig. 6. (b) Time g. 4: Generation of abstract plan for the kerberos example. te, get component-state pair at the bottom of the pyramid. om to the bottom level we then proceed upward selecting the mponents he that are used to deploy the selected componentte pairs at the lower level. To do so, for every selected on mponent at level i + 1, we select at level i one of its edecessors (i.e. a component-state pair connected via the Fig. Automatic 6: Abstract Application plan Deployment for the kerberos in the Cloud example after relaxation. arrow) or a copy (i.e. a component-state pair connected [ICTAI13] u Generate an abstract plan (one component for each maximal path) Arrows represent a precedence relation: blue: start requirement red: end requirement

31 Fully automated deployment we at es he m ate in he te, to he on en (no capacity, no conflicts) u Plan as a topological visit until target: new(k:krb5),new(o:openldap), statechange(k,uninst,stage1), bind(libkrb5-dev,o,k),statechange(o,uninst,normal), bind(libldap2-dev,k,o), statechange(k,stage1,normal) replacing z,x,y with z,x,y where z,x,y is a delete action or it is the the first statechange reaching a state y that does not provide r. After applying these relaxations we obtain the final version of abstract plan that, for the kerberos case, is the one depicted in Fig. 6. Time [ICTAI13] Arrows represent a precedence relation: blue: start requirement red: end requirement Fig. Automatic 6: Abstract Application plan Deployment for the kerberos in the Cloud example after relaxation.

32 Fully automated deployment (no capacity, no conflicts) [ICTAI13] u Problem: cycles could forbid the topological visit u Example: krb5 in normal requires an openldap in uninst state

33 Fully automated deployment (no capacity, no conflicts) kerberos example in which the component type krb5 in normal state requires not only one openldap in normal state, but also one in uninst state. In thisu case The the target abstract plan state will be as in Fig. 7 (note the addition of the pair of arcs labeled with cannot be visited! uninst). [ICTAI13] Fig. 7: Abstract plan for the modified kerberos example. th d n 9 th im th o n in f F h th n w

34 this is not possible because in the same phase of the plan the instance is required to change its internal state. This problem can be solved by means of instance duplication: an additional component instance is deployed in such a way that the new instance can continue providing the required interface during Fully automated deployment (no capacity, no conflicts) that specific phase of the plan. The application of instance duplication to the abstract plan in Fig. 7 is reported in Fig. 8, where we add a new instance y of type openldap that does not proceed further than state uninst. This new resource is used to satisfy the requirement uninst of z. Notice that the topological visit until the target node z, stage1, normal becomes now possible. [ICTAI13] u Solution: component duplication Fig. 8: Abstract plan in Fig. 7 after duplication of instance w. reachability dependencie nodes at a lo In the con very importa developing l change and, Since 1998, defined for in order to a This languag Our tool to validate o do so we ha problem int into one PD to state cha only when t required inte unbind actio

35 Structure of the talk u Formalizing the deployment problem u Decidability/complexity results u Fully automatic deployment (without capacity constraints and conflicts) u Constraints and conflicts strike back u Conclusion and Open issues u Related work

36 Capacity constraints and conflicts strike back [ASE14,CONCUR15] u We have investigated the problem of synthesising the final configuration n considering capacity constraints and conflicts but... n abstracting away from the internal configuration automata u Idea for computing the final configuration: n first perform component selection n and then establish the bindings

37 Component selection [CONCUR15] u Component selection is NP-complete but we can use Contraint Solving technology

38 Bindings establishment [CONCUR15] u Bindings decided as solution of a max-flow problem

39 Structure of the talk u Formalizing the deployment problem u Decidability/complexity results u Fully automatic deployment (without capacity constraints and conflicts) u Constraints and conflicts strike back u Conclusion and Open issues u Related work

40 Putting everything together: Aeolus Blender [ICSOC15] u Armonic: library of components u Zephyrus: synthesis of the final architecture u Metis: plan the configuration actions

41 Reconfiguration vs. Deployment u Reconfiguration problem: n same as deployment, but with non empty initial configuration n reconfiguration is already PSpace-complete without capacity constraints and conflicts [MFCS15] u Open issue: n Find further restrictions to the model that make reconfiguration tractable (seems very useful in practice)

42 Other open issues u In real systems there is a flow of configuration data among components: n Room for name-passing models? u Hierarchical modeling (administrative domains, cloud providers, geographical areas, ): n Room for ambient-like models? u QoS and resource consumption: n Room for quantitative models?

43 Structure of the talk u Formalizing the deployment problem u Decidability/complexity results u Fully automatic deployment (without capacity constraints and conflicts) u Constraints and conflicts strike back u Conclusion and Open issues u Related work

44 Related work u TOSCA [OASIS standard 2013] n Language for topologies and deployment plans

45 Related work Figure 6: Life-cycle of a node u CloudMF { "id" : "SensApp", "retrieval" : "wget -P ~ war; wget -P ~ sh ; wget -P ~ sh", "deployment" : "deploysensapp.sh", "start" : "startsensapp.sh", "requires" : [ { "id" : "JettyCapability", "isoptional" : false }, { "id" : "MongoDBCapability", "isoptional" : false } ], "inputs" : [ { "id" : "RESTChannel", "portnumber" : "8080", "isremote" : true } ], "provides" : [ { "id" : "RESTServer", "portnumber" : "8080" } ] } Automatic ] Application Deployment in the Cloud Changing the status of an artefact encompasses adapting all its de pendencies accordingly. The resources that can be associated to a artefact type can be annotated with commands describing how t move from one state to another. [J.Ferry et al. - NordiCloud13] n Similar language for component description ()%*( Listing 4: An example of a node instance from a C "nodeinstances"!"#$#%& : '#"%& [ /"#"*$%&& ] { "id" : "smallgnulinux1",!"#"$%&''() "type" : "SmallGNULinux", "provides" : [ { "id" : "ssh1", } ] #"*$%&&%$#+"-.%#& #"*$%&& /"#"*$%&& "type" : "SSH" } *"$%&''() 1+".#,/)( *$%)$#",-())+) 200,0 An artefact instance represents an instance of a co +,"-#./0() application on a specific virtual machine (e.g., an ())+) Jetty container and 1+".#,/)( of the SENSAPP server deploye machine above). *$+0 *$%)$ Listing 5: 1/""#". Examples of artefact instances fro JSON "artefactinstances" : [ { Figure "id" 7: : "jetty1", Life-cycle of an application

46 } var cpus as 1..4; var memory as int; ject, and is Automatic not shared Application between Deployment different in the instances Cloud of Mawe always wanted ws1 to run on m1 we would al ous work, before discussing the implications and directions for future work. var machine as r abstract class Rol to write: } 2 Modelling with ConfSolve Related work var m0 as Machine; class WebServer ex ConfSolve provides the user with Which an is object-oriented an example of an equality var port constraint. as 0..6 In which m0 is a Machine object declarative in thelanguage, global scope, with with a Java-like Constraints: syntax, which Constraints adheres cpus, to several an integer key subrange; principles: } are expressions whi members os, an enumeration; u ConfSolve [J.A.Hewson, P.Anderson, hold in A.D.Gordon any solution to the - LISA12] model. For example and memory, an unbounded integer. 1. Order never matters. Declaration ducing and a database-server usage can oc- role which can be either Member variables may also declare objects, allowing or master, and must be peered References: with another slave Asso the nesting of child objects within a parent object. For elled using referenc example, we could add a network interface to the machine definition: enum DatabaseRole { Master, Consider Slave an } objects elsewhere i instanc n Object-oriented cur in any orderlanguage with no difference for inservices meaning. and ter, as appropriate: machines 2. Everything is an expression, except declarations. 3. All classes are equal: there are no built-in classes n Type system with special for meanings checking such asconfiguration Machine or File. correctness class Machine { class DatabaseServer extends Variables and Classes: A ConfSolve model consists var ws1 Role as { WebServ... var role as DatabaseRole; of a global scope in which strongly-typed variables, n Constraint solver for var en0 as NetworkInterface; classes, and enumerations may be declared. For example, a simple placement machine may of be defined as: machine was declar In the previous decl } // slave or master automatic var peer as ref DatabaseServer; contains a referenc class NetworkInterface services on machines enum { OperatingSystem { Windows, UNIX, OSX } refer to m0, as it is t var subnet as 0..3; // the peer cannot be itself clared. The solver w } peer!= this; class Machine { a reference to any in var os as OperatingSystem; // a master s peer mustwe bealways a slave, wanted w An instance of NetworkInterface var cpus will as be created 1..4; whenever a Machine is instantiated. varthe memory lifetime as int; of the Net- role!= peer.role; // and a slave s peer must to write: be a master workinterface instance is} tied to that of its parent ob- } ws1.machine = m1; var m0 as Machine; ws1.machine = m1;

47 Related work u Engage [J.Fischer, R.Majumdar, S.Esmaeilsabzali - PLDI12] n Architectural specification in terms of inside / peer / environment relationships n Automata with resource lifecycle and transient dependencies n Assumption on acyclic relationships (to always guarantee topological visit) uninstalled Figure 5 shows the dependencies generated when partial instantiation specification [ active] of Figure 2. We h resource install instances that were start restart present in the specificat inside inside Server running inside server, inside and an instance openmrs for inside RS application running inside tomcat. In particular, the t have to explicitly give JDK the other JRE dependencies on Java MySQL env env peers. The partial installation specification may also define ndividual Tomcat configuration portinside properties. In Open our example, MRS me and os user name properties have been assigned ssigned configuration properties will take the default ed infigure the associated 5:HypergraphforpartialinstallationspecificationinFigure 2 Automatic resource Application types. Deployment in the Cloud figuration engine takes this partial installation. specifiinactive active Lemma uninstall 1. Let R be a stop set of well-formed resourc a partial install specification. [ inactive] Then procedure G creates a directed hypergraph G = (V, E), such th resource Figure 3: instance Resource driver r I, forwehaver Tomcat V, and for instance r V, either CONCUR'15 r I- or there is some res r I that is transitively dependent on the key

48 Mentioned publications u u u u u u u [SEFM12] R. Di Cosmo, S. Zacchiroli, G. Zavattaro. Towards a Formal Component Model for the Cloud. Proc. of SEFM 12: LNCS 7504, Springer. [ICALP13] R. Di Cosmo, J. Mauro, S. Zacchiroli, G. Zavattaro. Component Reconfiguration in the Presence of Conflicts. Proc. of ICALP 13: LNCS 7966, Springer. [ICTAI13] T. A. Lascu, J. Mauro, G. Zavattaro. A Planning Tool Supporting the Deployment of Cloud Applications. Proc. of ICTAI 13: IEEE Press. [I&C14] R. Di Cosmo, J. Mauro, S. Zacchiroli, G. Zavattaro. Aeolus: A component model for the cloud. Information and Computation, 239: (2014). [MFCS15] J. Mauro, G. Zavattaro. On the Complexity of Reconfiguration in Systems with Legacy Components. Proc. of MFCS 15: LNCS 9234, Springer. [ASE14] R. Di Cosmo, M. Lienhardt, R. Treinen, S. Zacchiroli, J. Zwolakowski, A. Eiche, A. Agahi. Automated synthesis and deployment of cloud applications. Proc. of ASE 14: ACM Press. [ICSOC15] R. Di Cosmo, A. Eiche, J. Mauro, S. Zacchiroli, G. Zavattaro, J. Zwolakowski. Automatic Deployment of Services in the Cloud with Aeolus Blender. Proc. of ICSOC 15, to appear, Springer.

Aeolus: Mastering the Complexity of Cloud Application Deployment

Aeolus: Mastering the Complexity of Cloud Application Deployment Aeolus: Mastering the Complexity of Cloud Application Deployment Gianluigi Zavattaro University of Bologna - Italy FoCUS research team INRIA - France Based on joint work with: Tudor A. Lascu and Jacopo

More information

Automatic Application Deployment in the Cloud: from Practice to Theory and Back

Automatic Application Deployment in the Cloud: from Practice to Theory and Back Automatic Application Deployment in the Cloud: from Practice to Theory and Back Roberto Di Cosmo 2, Michael Lienhardt 1, Jacopo Mauro 1, Stefano Zacchiroli 2, Gianluigi Zavattaro 1, and Jakub Zwolakowski

More information

Towards a Deployment System for Cloud Applications

Towards a Deployment System for Cloud Applications Towards a Deployment System for Cloud Applications Ruici Luo 1,3, Wei Ye 2,3, and Shikun Zhang 2,3 1 School of Electronics Engineering and Computer Science, Peking University, China 2 National Engineering

More information

Winery A Modeling Tool for TOSCA-based Cloud Applications

Winery A Modeling Tool for TOSCA-based Cloud Applications Institute of Architecture of Application Systems Winery A Modeling Tool for TOSCA-based Cloud Applications Oliver Kopp 1,2, Tobias Binz 2, Uwe Breitenbücher 2, and Frank Leymann 2 1 IPVS, 2 IAAS, University

More information

On the Integration of Automatic Deployment into the ABS Modeling Language

On the Integration of Automatic Deployment into the ABS Modeling Language On the Integration of Automatic Deployment into the ABS Modeling Language Stijn De Gouw, Michael Lienhardt, Jacopo Mauro, Behrooz Nobakht, Gianluigi Zavattaro To cite this version: Stijn De Gouw, Michael

More information

Planning Configuration Relocation on the BonFIRE Infrastructure

Planning Configuration Relocation on the BonFIRE Infrastructure Planning Configuration Relocation on the BonFIRE Infrastructure Herry Herry and Paul Anderson School of Informatics, University of Edinburgh Edinburgh, UK h.herry@sms.ed.ac.uk, dcspaul@ed.ac.uk Abstract

More information

Introduction to CloudScript

Introduction to CloudScript Introduction to CloudScript A NephoScale Whitepaper Authors: Nick Peterson, Alan Meadows Date: 2012-07-06 CloudScript is a build language for the cloud. It is a simple Domain Specific Language (DSL) that

More information

C2C: An Automated Deployment Framework for Distributed Applications on Multi-Clouds

C2C: An Automated Deployment Framework for Distributed Applications on Multi-Clouds C2C: An Automated Deployment Framework for Distributed Applications on Multi-Clouds Flora Karniavoura, Antonis Papaioannou, and Kostas Magoutis Institute of Computer Science (ICS) Foundation for Research

More information

How To Set Up An Intellicus Cluster And Load Balancing On Ubuntu 8.1.2.2 (Windows) With A Cluster And Report Server (Windows And Ubuntu) On A Server (Amd64) On An Ubuntu Server

How To Set Up An Intellicus Cluster And Load Balancing On Ubuntu 8.1.2.2 (Windows) With A Cluster And Report Server (Windows And Ubuntu) On A Server (Amd64) On An Ubuntu Server Intellicus Cluster and Load Balancing (Windows) Intellicus Enterprise Reporting and BI Platform Intellicus Technologies info@intellicus.com www.intellicus.com Copyright 2014 Intellicus Technologies This

More information

Intellicus Cluster and Load Balancing (Windows) Version: 7.3

Intellicus Cluster and Load Balancing (Windows) Version: 7.3 Intellicus Cluster and Load Balancing (Windows) Version: 7.3 Copyright 2015 Intellicus Technologies This document and its content is copyrighted material of Intellicus Technologies. The content may not

More information

<Insert Picture Here> Introducing Hudson. Winston Prakash. Click to edit Master subtitle style

<Insert Picture Here> Introducing Hudson. Winston Prakash. Click to edit Master subtitle style Introducing Hudson Click to edit Master subtitle style Winston Prakash What is Hudson? Hudson is an open source continuous integration (CI) server. A CI server can do various tasks

More information

CHAPTER 1 - JAVA EE OVERVIEW FOR ADMINISTRATORS

CHAPTER 1 - JAVA EE OVERVIEW FOR ADMINISTRATORS CHAPTER 1 - JAVA EE OVERVIEW FOR ADMINISTRATORS Java EE Components Java EE Vendor Specifications Containers Java EE Blueprint Services JDBC Data Sources Java Naming and Directory Interface Java Message

More information

CatDV Pro Workgroup Serve r

CatDV Pro Workgroup Serve r Architectural Overview CatDV Pro Workgroup Server Square Box Systems Ltd May 2003 The CatDV Pro client application is a standalone desktop application, providing video logging and media cataloging capability

More information

Portal Factory 1.0 - CMIS Connector Module documentation

Portal Factory 1.0 - CMIS Connector Module documentation DOCUMENTATION Portal Factory 1.0 - CMIS Connector Module documentation Rooted in Open Source CMS, Jahia s Digital Industrialization paradigm is about streamlining Enterprise digital projects across channels

More information

Create WebLogic Cluster application... 2. Prerequisites... 2. From Application director import-export service... 2

Create WebLogic Cluster application... 2. Prerequisites... 2. From Application director import-export service... 2 Table of Contents Create WebLogic Cluster application... 2 Prerequisites... 2 From Application director import-export service... 2 Deploy the WebLogic Server 12c Cluster application... 5 Method - 1: From

More information

Attack Graph Techniques

Attack Graph Techniques Chapter 2 Attack Graph Techniques 2.1 An example scenario Modern attack-graph techniques can automatically discover all possible ways an attacker can compromise an enterprise network by analyzing configuration

More information

WEBAPP PATTERN FOR APACHE TOMCAT - USER GUIDE

WEBAPP PATTERN FOR APACHE TOMCAT - USER GUIDE WEBAPP PATTERN FOR APACHE TOMCAT - USER GUIDE Contents 1. Pattern Overview... 3 Features 3 Getting started with the Web Application Pattern... 3 Accepting the Web Application Pattern license agreement...

More information

How To Test Your Web Site On Wapt On A Pc Or Mac Or Mac (Or Mac) On A Mac Or Ipad Or Ipa (Or Ipa) On Pc Or Ipam (Or Pc Or Pc) On An Ip

How To Test Your Web Site On Wapt On A Pc Or Mac Or Mac (Or Mac) On A Mac Or Ipad Or Ipa (Or Ipa) On Pc Or Ipam (Or Pc Or Pc) On An Ip Load testing with WAPT: Quick Start Guide This document describes step by step how to create a simple typical test for a web application, execute it and interpret the results. A brief insight is provided

More information

Simba XMLA Provider for Oracle OLAP 2.0. Linux Administration Guide. Simba Technologies Inc. April 23, 2013

Simba XMLA Provider for Oracle OLAP 2.0. Linux Administration Guide. Simba Technologies Inc. April 23, 2013 Simba XMLA Provider for Oracle OLAP 2.0 April 23, 2013 Simba Technologies Inc. Copyright 2013 Simba Technologies Inc. All Rights Reserved. Information in this document is subject to change without notice.

More information

Building a Continuous Integration Pipeline with Docker

Building a Continuous Integration Pipeline with Docker Building a Continuous Integration Pipeline with Docker August 2015 Table of Contents Overview 3 Architectural Overview and Required Components 3 Architectural Components 3 Workflow 4 Environment Prerequisites

More information

User Guide. version 1.0

User Guide. version 1.0 User Guide version 1.0 December 16, 2010 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations. Kaseya's IT Automation

More information

Oracle WebLogic Server 11g Administration

Oracle WebLogic Server 11g Administration Oracle WebLogic Server 11g Administration This course is designed to provide instruction and hands-on practice in installing and configuring Oracle WebLogic Server 11g. These tasks include starting and

More information

Web development... the server side (of the force)

Web development... the server side (of the force) Web development... the server side (of the force) Fabien POULARD Document under license Creative Commons Attribution Share Alike 2.5 http://www.creativecommons.org/learnmore Web development... the server

More information

Dynamic Resource allocation in Cloud

Dynamic Resource allocation in Cloud Dynamic Resource allocation in Cloud ABSTRACT: Cloud computing allows business customers to scale up and down their resource usage based on needs. Many of the touted gains in the cloud model come from

More information

Chapter 1 - Web Server Management and Cluster Topology

Chapter 1 - Web Server Management and Cluster Topology Objectives At the end of this chapter, participants will be able to understand: Web server management options provided by Network Deployment Clustered Application Servers Cluster creation and management

More information

HP OO 10.X - SiteScope Monitoring Templates

HP OO 10.X - SiteScope Monitoring Templates HP OO Community Guides HP OO 10.X - SiteScope Monitoring Templates As with any application continuous automated monitoring is key. Monitoring is important in order to quickly identify potential issues,

More information

User Guide. version 1.2

User Guide. version 1.2 Network Discovery User Guide version 1.2 February 15, 2012 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations. Kaseya's

More information

PTC Integrity Eclipse and IBM Rational Development Platform Guide

PTC Integrity Eclipse and IBM Rational Development Platform Guide PTC Integrity Eclipse and IBM Rational Development Platform Guide The PTC Integrity integration with Eclipse Platform and the IBM Rational Software Development Platform series allows you to access Integrity

More information

AklaBox. The Ultimate Document Platform for your Cloud Infrastructure. Installation Guideline

AklaBox. The Ultimate Document Platform for your Cloud Infrastructure. Installation Guideline AklaBox The Ultimate Document Platform for your Cloud Infrastructure Installation Guideline Contents Introduction... 3 Environment pre-requisite for Java... 3 About this documentation... 3 Pre-requisites...

More information

IBM SPSS Collaboration and Deployment Services Version 6 Release 0. Single Sign-On Services Developer's Guide

IBM SPSS Collaboration and Deployment Services Version 6 Release 0. Single Sign-On Services Developer's Guide IBM SPSS Collaboration and Deployment Services Version 6 Release 0 Single Sign-On Services Developer's Guide Note Before using this information and the product it supports, read the information in Notices

More information

Infrastructure as a Service (IaaS)

Infrastructure as a Service (IaaS) Infrastructure as a Service (IaaS) (ENCS 691K Chapter 4) Roch Glitho, PhD Associate Professor and Canada Research Chair My URL - http://users.encs.concordia.ca/~glitho/ References 1. R. Moreno et al.,

More information

Bootstrapping Software Distributions

Bootstrapping Software Distributions Bootstrapping Software Distributions Pietro Abate 1 Johannes Schauer 2 1 Univ Paris Diderot, PPS, UMR 7126, Paris, France 2 Jacobs University Bremen, College Ring 3, MB670, 28759 Bremen CBSE 2013 P. Abate,

More information

Java, PHP & Ruby - Cloud Hosting

Java, PHP & Ruby - Cloud Hosting Java, PHP & Ruby - Cloud Hosting NO LOCK-IN No technical lock-in and no binding contract. We believe in open standards without any technical lock-ins. We think that Open source provides flexibility and

More information

NS DISCOVER 4.0 ADMINISTRATOR S GUIDE. July, 2015. Version 4.0

NS DISCOVER 4.0 ADMINISTRATOR S GUIDE. July, 2015. Version 4.0 NS DISCOVER 4.0 ADMINISTRATOR S GUIDE July, 2015 Version 4.0 TABLE OF CONTENTS 1 General Information... 4 1.1 Objective... 4 1.2 New 4.0 Features Improvements... 4 1.3 Migrating from 3.x to 4.x... 5 2

More information

How To Install An Aneka Cloud On A Windows 7 Computer (For Free)

How To Install An Aneka Cloud On A Windows 7 Computer (For Free) MANJRASOFT PTY LTD Aneka 3.0 Manjrasoft 5/13/2013 This document describes in detail the steps involved in installing and configuring an Aneka Cloud. It covers the prerequisites for the installation, the

More information

24x7 Scheduler Multi-platform Edition 5.2

24x7 Scheduler Multi-platform Edition 5.2 24x7 Scheduler Multi-platform Edition 5.2 Installing and Using 24x7 Web-Based Management Console with Apache Tomcat web server Copyright SoftTree Technologies, Inc. 2004-2014 All rights reserved Table

More information

Magento Search Extension TECHNICAL DOCUMENTATION

Magento Search Extension TECHNICAL DOCUMENTATION CHAPTER 1... 3 1. INSTALLING PREREQUISITES AND THE MODULE (APACHE SOLR)... 3 1.1 Installation of the search server... 3 1.2 Configure the search server for usage with the search module... 7 Deploy the

More information

Fermilab Central Web Service Site Owner User Manual. DocDB: CS-doc-5372

Fermilab Central Web Service Site Owner User Manual. DocDB: CS-doc-5372 Fermilab Central Web Service Site Owner User Manual DocDB: CS-doc-5372 1 Table of Contents DocDB: CS-doc-5372... 1 1. Role Definitions... 3 2. Site Owner Responsibilities... 3 3. Tier1 websites and Tier2

More information

A Model-driven Approach to Predictive Non Functional Analysis of Component-based Systems

A Model-driven Approach to Predictive Non Functional Analysis of Component-based Systems A Model-driven Approach to Predictive Non Functional Analysis of Component-based Systems Vincenzo Grassi Università di Roma Tor Vergata, Italy Raffaela Mirandola {vgrassi, mirandola}@info.uniroma2.it Abstract.

More information

OpenTOSCA Release v1.1. Contact: info@opentosca.org Documentation Version: March 11, 2014 Current version: http://files.opentosca.

OpenTOSCA Release v1.1. Contact: info@opentosca.org Documentation Version: March 11, 2014 Current version: http://files.opentosca. OpenTOSCA Release v1.1 Contact: info@opentosca.org Documentation Version: March 11, 2014 Current version: http://files.opentosca.de NOTICE This work has been supported by the Federal Ministry of Economics

More information

Install guide for Websphere 7.0

Install guide for Websphere 7.0 DOCUMENTATION Install guide for Websphere 7.0 Jahia EE v6.6.1.0 Jahia s next-generation, open source CMS stems from a widely acknowledged vision of enterprise application convergence web, document, search,

More information

CHAPTER 7 SSL CONFIGURATION AND TESTING

CHAPTER 7 SSL CONFIGURATION AND TESTING CHAPTER 7 SSL CONFIGURATION AND TESTING 7.1 Configuration and Testing of SSL Nowadays, it s very big challenge to handle the enterprise applications as they are much complex and it is a very sensitive

More information

Smart Queue Scheduling for QoS Spring 2001 Final Report

Smart Queue Scheduling for QoS Spring 2001 Final Report ENSC 833-3: NETWORK PROTOCOLS AND PERFORMANCE CMPT 885-3: SPECIAL TOPICS: HIGH-PERFORMANCE NETWORKS Smart Queue Scheduling for QoS Spring 2001 Final Report By Haijing Fang(hfanga@sfu.ca) & Liu Tang(llt@sfu.ca)

More information

SNMP and Web-based Load Cluster Management System

SNMP and Web-based Load Cluster Management System and Web-based Load Cluster Management System Myungsup Kim and J. Won-Ki Hong Distributed Processing & Network Management Lab. Dept. of Computer Science and Engineering, Pohang Korea Tel: +82-54-279-5654

More information

Automatic Configuration of Slave Nameservers (BIND 9.7.2 only)

Automatic Configuration of Slave Nameservers (BIND 9.7.2 only) DNSSHIM 1 DNSSHIM is an open-source software that implements the Domain Name Name System (DNS) protocol for the Internet. Its main feature is to work as a Hidden Master nameserver, that is, provide information

More information

How To Monitor A Server With Zabbix

How To Monitor A Server With Zabbix & JavaEE Platform Monitoring A Good Match? Company Facts Jesta Digital is a leading global provider of next generation entertainment content and services for the digital consumer. subsidiary of Jesta Group,

More information

docs.hortonworks.com

docs.hortonworks.com docs.hortonworks.com : Security Administration Tools Guide Copyright 2012-2014 Hortonworks, Inc. Some rights reserved. The, powered by Apache Hadoop, is a massively scalable and 100% open source platform

More information

1 How to install CQ5 with an Application Server

1 How to install CQ5 with an Application Server 1 How to install CQ5 with an Application Server Contents 1.1. WebSphere v6.1... 1 1.2. WebLogic v10.3... 3 1.3. Tomcat v6... 6 1.4. JBoss v4... 8 1.5. Generic Procedures... 10 The following sections detail

More information

See the installation page http://wiki.wocommunity.org/display/documentation/deploying+on+linux

See the installation page http://wiki.wocommunity.org/display/documentation/deploying+on+linux Linux Installation See the installation page http://wiki.wocommunity.org/display/documentation/deploying+on+linux Added goodies (project Wonder) Install couple of more goodies from Wonder. I Installed

More information

SSL CONFIGURATION GUIDE

SSL CONFIGURATION GUIDE HYPERION RELEASE 9.3.1 SSL CONFIGURATION GUIDE CONTENTS IN BRIEF About This Document... 2 Assumptions... 2 Information Sources... 2 Identifying SSL Points for Hyperion Products... 4 Common Activities...

More information

Synchronizer Installation

Synchronizer Installation Synchronizer Installation Synchronizer Installation Synchronizer Installation This document provides instructions for installing Synchronizer. Synchronizer performs all the administrative tasks for XenClient

More information

Using LDAP Authentication in a PowerCenter Domain

Using LDAP Authentication in a PowerCenter Domain Using LDAP Authentication in a PowerCenter Domain 2008 Informatica Corporation Overview LDAP user accounts can access PowerCenter applications. To provide LDAP user accounts access to the PowerCenter applications,

More information

OW2 migration to Xsalto

OW2 migration to Xsalto OW2 migration to Xsalto 10 th july 2007 Armel Lannois Table of Content ObjectWeb architecture overview Actual OW2 Servers overview Problems Opportunities OW2 architecture Migration plan Tasks 2 ObjectWeb

More information

Integrated Billing Solutions with HP CSA 4.00

Integrated Billing Solutions with HP CSA 4.00 Technical white paper Integrated Billing Solutions with HP CSA 4.00 Table of Contents Introduction... 2 Part 1. HP CSA Concepts... 2 Part 2. Billable Service Conditions... 4 Part 3. Billable Intervals...

More information

Tivoli Endpoint Manager for Remote Control Version 8 Release 2. User s Guide

Tivoli Endpoint Manager for Remote Control Version 8 Release 2. User s Guide Tivoli Endpoint Manager for Remote Control Version 8 Release 2 User s Guide Tivoli Endpoint Manager for Remote Control Version 8 Release 2 User s Guide Note Before using this information and the product

More information

Formal Verification Problems in a Bigdata World: Towards a Mighty Synergy

Formal Verification Problems in a Bigdata World: Towards a Mighty Synergy Dept. of Computer Science Formal Verification Problems in a Bigdata World: Towards a Mighty Synergy Matteo Camilli matteo.camilli@unimi.it http://camilli.di.unimi.it ICSE 2014 Hyderabad, India June 3,

More information

Content Server Installation Guide

Content Server Installation Guide Content Server Installation Guide Version 5.3 SP3 July 2006 Copyright 1994-2006 EMC Corporation. All rights reserved. Table of Contents Preface... 11 Chapter 1 Server Installation Quick Start... 13 Installing

More information

IaaS Cloud Architectures: Virtualized Data Centers to Federated Cloud Infrastructures

IaaS Cloud Architectures: Virtualized Data Centers to Federated Cloud Infrastructures IaaS Cloud Architectures: Virtualized Data Centers to Federated Cloud Infrastructures Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF Introduction

More information

WebSphere Business Monitor V7.0: Clustering Single cluster deployment environment pattern

WebSphere Business Monitor V7.0: Clustering Single cluster deployment environment pattern Copyright IBM Corporation 2010 All rights reserved WebSphere Business Monitor V7.0: Clustering Single cluster deployment environment pattern What this exercise is about... 2 Exercise requirements... 2

More information

Understanding Infrastructure as Code. By Michael Wittig and Andreas Wittig

Understanding Infrastructure as Code. By Michael Wittig and Andreas Wittig Understanding Infrastructure as Code By Michael Wittig and Andreas Wittig In this article, excerpted from Amazon Web Service in Action, we will explain Infrastructure as Code. Infrastructure as Code describes

More information

Intellicus Enterprise Reporting and BI Platform

Intellicus Enterprise Reporting and BI Platform Intellicus Cluster and Load Balancing (Windows) Intellicus Enterprise Reporting and BI Platform Intellicus Technologies info@intellicus.com www.intellicus.com Copyright 2014 Intellicus Technologies This

More information

Load testing with. WAPT Cloud. Quick Start Guide

Load testing with. WAPT Cloud. Quick Start Guide Load testing with WAPT Cloud Quick Start Guide This document describes step by step how to create a simple typical test for a web application, execute it and interpret the results. 2007-2015 SoftLogica

More information

Creating Basic Custom Monitoring Dashboards Antonio Mangiacotti, Stefania Oliverio & Randy Allen

Creating Basic Custom Monitoring Dashboards Antonio Mangiacotti, Stefania Oliverio & Randy Allen Creating Basic Custom Monitoring Dashboards by Antonio Mangiacotti, Stefania Oliverio & Randy Allen v1.1 Introduction With the release of IBM Tivoli Monitoring 6.3 and IBM Dashboard Application Services

More information

EQUELLA. Clustering Configuration Guide. Version 6.0

EQUELLA. Clustering Configuration Guide. Version 6.0 EQUELLA Clustering Configuration Guide Version 6.0 Document History Document No. Reviewed Finalised Published 1 17/10/2012 17/10/2012 17/10/2012 October 2012 edition. Information in this document may change

More information

IBM Cloud Manager with OpenStack

IBM Cloud Manager with OpenStack IBM Cloud Manager with OpenStack Download Trial Guide Cloud Solutions Team: Cloud Solutions Beta cloudbta@us.ibm.com Page 1 Table of Contents Chapter 1: Introduction...3 Development cycle release scope...3

More information

AT&T CLOUD SERVICES. AT&T Synaptic Compute as a Service SM : How to Get Started. Version 2.0 January 2012

AT&T CLOUD SERVICES. AT&T Synaptic Compute as a Service SM : How to Get Started. Version 2.0 January 2012 Version 2.0 January 2012 AT&T CLOUD SERVICES AT&T Synaptic Compute as a Service SM : How to Get Started 2012 AT&T Intellectual Property. All rights reserved. Notice Copyright AT&T Intellectual Property.

More information

Command-Line Tool for View Manager View Manager 4.0

Command-Line Tool for View Manager View Manager 4.0 Technical Note Command-Line Tool for View Manager View Manager 4.0 The Command Line Tool for View Manager is a utility provided with the View Manager application that allows you to carry out administrative

More information

Central Web Service Linux WordPress SaaS Architecture Design

Central Web Service Linux WordPress SaaS Architecture Design Central Web Service Linux WordPress SaaS Architecture Design Table of Contents Support Staff... 2 System Design... 3 WordPress SaaS Architecture Design Document... 3 Server Layout... 3 Access Zones...

More information

IBM SmartCloud Workload Automation - Software as a Service. Agent Installation and Uninstallation Messages

IBM SmartCloud Workload Automation - Software as a Service. Agent Installation and Uninstallation Messages IBM SmartCloud Workload Automation - Software as a Service Agent Installation and Uninstallation Messages IBM SmartCloud Workload Automation - Software as a Service Agent Installation and Uninstallation

More information

HP Asset Manager. Software version: 5.20. Integration with software distribution and configuration management tools

HP Asset Manager. Software version: 5.20. Integration with software distribution and configuration management tools HP Asset Manager Software version: 5.20 Integration with software distribution and configuration management tools Document Release Date: 01 October 2009 Software Release Date: October 2009 Legal Notices

More information

MyOra 3.0. User Guide. SQL Tool for Oracle. Jayam Systems, LLC

MyOra 3.0. User Guide. SQL Tool for Oracle. Jayam Systems, LLC MyOra 3.0 SQL Tool for Oracle User Guide Jayam Systems, LLC Contents Features... 4 Connecting to the Database... 5 Login... 5 Login History... 6 Connection Indicator... 6 Closing the Connection... 7 SQL

More information

McAfee Network Threat Response (NTR) 4.0

McAfee Network Threat Response (NTR) 4.0 McAfee Network Threat Response (NTR) 4.0 Configuring Automated Reporting and Alerting Automated reporting is supported with introduction of NTR 4.0 and designed to send automated reports via existing SMTP

More information

CA Performance Center

CA Performance Center CA Performance Center Single Sign-On User Guide 2.4 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is

More information

System Center Configuration Manager 2007

System Center Configuration Manager 2007 System Center Configuration Manager 2007 Software Distribution Guide Friday, 26 February 2010 Version 1.0.0.0 Baseline Prepared by Microsoft Copyright This document and/or software ( this Content ) has

More information

Web Development on the SOEN 6011 Server

Web Development on the SOEN 6011 Server Web Development on the SOEN 6011 Server Stephen Barret October 30, 2007 Introduction Systems structured around Fowler s patterns of Enterprise Application Architecture (EAA) require a multi-tiered environment

More information

AppStack Technology Overview Model-Driven Application Management for the Cloud

AppStack Technology Overview Model-Driven Application Management for the Cloud AppStack Technology Overview Model-Driven Application Management for the Cloud Accelerating Application Time-to-Market The last several years have seen a rapid adoption for public and private cloud infrastructure

More information

Lego4TOSCA: Composable Building Blocks for Cloud Applications

Lego4TOSCA: Composable Building Blocks for Cloud Applications Institute of Architecture of Application Systems Lego4TOSCA: Composable Building Blocks for Cloud Applications Florian Haupt, Frank Leymann, Alexander Nowak, Sebastian Wagner Institute of Architecture

More information

CA Spectrum and CA Service Desk

CA Spectrum and CA Service Desk CA Spectrum and CA Service Desk Integration Guide CA Spectrum 9.4 / CA Service Desk r12 and later This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter

More information

A Characterization Taxonomy for Integrated Management of Modeling and Simulation Tools

A Characterization Taxonomy for Integrated Management of Modeling and Simulation Tools A Characterization Taxonomy for Integrated Management of Modeling and Simulation Tools Bobby Hartway AEgis Technologies Group 631 Discovery Drive Huntsville, AL 35806 256-922-0802 bhartway@aegistg.com

More information

HAProxy. Ryan O'Hara Principal Software Engineer, Red Hat September 17, 2014. 1 HAProxy

HAProxy. Ryan O'Hara Principal Software Engineer, Red Hat September 17, 2014. 1 HAProxy HAProxy Ryan O'Hara Principal Software Engineer, Red Hat September 17, 2014 1 HAProxy HAProxy Overview Capabilities Configuration OpenStack HA Neutron LBaaS Resources Questions 2 HAProxy Overview Load

More information

Configuration & Build Management

Configuration & Build Management Object-Oriented Software Engineering Using UML, Patterns, and Java Configuration & Build Management Outline of the Lecture Purpose of Software Configuration Management (SCM) Some Terminology Software Configuration

More information

OASIS TOSCA. Introduction and Overview. Thomas Spatzier, IBM (thomas.spatzier@de.ibm.com)

OASIS TOSCA. Introduction and Overview. Thomas Spatzier, IBM (thomas.spatzier@de.ibm.com) OASIS TOSA Introduction and Overview Thomas Spatzier, IBM (thomas.spatzier@de.ibm.com) Agenda TOSA Overview and Examples TOSA oncepts Explained TOSA advanced Features 2 Motivation for TOSA Even simple

More information

Comodo Certificate Manager Version 5.4

Comodo Certificate Manager Version 5.4 Comodo Certificate Manager Version 5.4 Comodo Certificate Authority Proxy Server Architectural Overview Guide Version 5.4.031816 Comodo CA Limited 3rd Floor, 26 Office Village, Exchange Quay, Trafford

More information

Contents. System Development Models and Methods. Design Abstraction and Views. Synthesis. Control/Data-Flow Models. System Synthesis Models

Contents. System Development Models and Methods. Design Abstraction and Views. Synthesis. Control/Data-Flow Models. System Synthesis Models System Development Models and Methods Dipl.-Inf. Mirko Caspar Version: 10.02.L.r-1.0-100929 Contents HW/SW Codesign Process Design Abstraction and Views Synthesis Control/Data-Flow Models System Synthesis

More information

LOAD BALANCING TECHNIQUES FOR RELEASE 11i AND RELEASE 12 E-BUSINESS ENVIRONMENTS

LOAD BALANCING TECHNIQUES FOR RELEASE 11i AND RELEASE 12 E-BUSINESS ENVIRONMENTS LOAD BALANCING TECHNIQUES FOR RELEASE 11i AND RELEASE 12 E-BUSINESS ENVIRONMENTS Venkat Perumal IT Convergence Introduction Any application server based on a certain CPU, memory and other configurations

More information

TOSCA Interoperability Demonstration

TOSCA Interoperability Demonstration Topology and Orchestration Specification for Cloud Applications (TOSCA) Standard TOSCA Interoperability Demonstration Participating Companies: Join the TOSCA Technical Committee www.oasis-open.org, join@oasis-open.org

More information

Nimsoft Monitor Compatibility Matrix October 17, 2013

Nimsoft Monitor Compatibility Matrix October 17, 2013 Nimsoft Monitor Compatibility Matrix October 17, 2013 1 Nimsoft Monitor Compatibility Matrix Legal Notices Copyright 2013, CA. All rights reserved. Warranty The material contained in this document is provided

More information

OASIS TOSCA. Introduction and Overview

OASIS TOSCA. Introduction and Overview OASIS TOSA Introduction and Overview Frank Leymann, IBM & U of Stuttgart (Leymann@iaas.uni-stuttgart.de Thomas Spatzier, IBM (thomas.spatzier@de.ibm.com) Agenda TOSA Overview and Examples TOSA oncepts

More information

Forward proxy server vs reverse proxy server

Forward proxy server vs reverse proxy server Using a reverse proxy server for TAD4D/LMT Intended audience The intended recipient of this document is a TAD4D/LMT administrator and the staff responsible for the configuration of TAD4D/LMT agents. Purpose

More information

1. Introduction 2. Getting Started 3. Scenario 1 - Non-Replicated Cluster 4. Scenario 2 - Replicated Cluster 5. Conclusion

1. Introduction 2. Getting Started 3. Scenario 1 - Non-Replicated Cluster 4. Scenario 2 - Replicated Cluster 5. Conclusion 1. Introduction... 1 1.1. Non-Replicated Cluster... 1 1.2. Replicated Cluster... 2 1.3. Mixing Both Options... 3 2. Getting Started... 5 3. Scenario 1 - Non-Replicated Cluster... 6 3.1. JOSSO Agent Configuration...

More information

Integrating Red Hat Enterprise Linux 6 with Microsoft Active Directory Presentation

Integrating Red Hat Enterprise Linux 6 with Microsoft Active Directory Presentation Integrating Red Hat Enterprise Linux 6 with Microsoft Active Directory Presentation Agenda Overview Components Considerations Configurations Futures Summary What is needed? Thorough understanding components,

More information

WebSphere Business Monitor V7.0 Configuring a remote CEI server

WebSphere Business Monitor V7.0 Configuring a remote CEI server Copyright IBM Corporation 2010 All rights reserved WebSphere Business Monitor V7.0 What this exercise is about... 2 Lab requirements... 2 What you should be able to do... 2 Introduction... 3 Part 1: Install

More information

Chapter 2: Getting Started

Chapter 2: Getting Started Chapter 2: Getting Started Once Partek Flow is installed, Chapter 2 will take the user to the next stage and describes the user interface and, of note, defines a number of terms required to understand

More information

Software Configuration Management. Addendum zu Kapitel 13

Software Configuration Management. Addendum zu Kapitel 13 Software Configuration Management Addendum zu Kapitel 13 Outline Purpose of Software Configuration Management (SCM) Motivation: Why software configuration management? Definition: What is software configuration

More information

Configuration Manager

Configuration Manager After you have installed Unified Intelligent Contact Management (Unified ICM) and have it running, use the to view and update the configuration information in the Unified ICM database. The configuration

More information

Meta-Model specification V2 D602.012

Meta-Model specification V2 D602.012 PROPRIETARY RIGHTS STATEMENT THIS DOCUMENT CONTAINS INFORMATION, WHICH IS PROPRIETARY TO THE CRYSTAL CONSORTIUM. NEITHER THIS DOCUMENT NOR THE INFORMATION CONTAINED HEREIN SHALL BE USED, DUPLICATED OR

More information

Automated Validation & Verification of Software Paper Presentation

Automated Validation & Verification of Software Paper Presentation Regression Test Selection for Java Software Salvador Valencia Rodríguez Automated Validation & Verification of Software Paper Presentation Paper authors Mary Jean Harrold James A. Jones Tongyu Li Donglin

More information

Subversion Server for Windows

Subversion Server for Windows Subversion Server for Windows VisualSVN Team VisualSVN Server: Subversion Server for Windows VisualSVN Team Copyright 2005-2008 VisualSVN Team Windows is a registered trademark of Microsoft Corporation.

More information

Robust Reconfiguration of Cloud Applications

Robust Reconfiguration of Cloud Applications Robust Reconfiguration of Cloud Applications Francisco Durán University of Málaga, Spain duran@uma.es Gwen Salaün University of Grenoble Alpes, Inria, LIG, CNRS, France gwen.salaun@imag.fr ABSTRACT Cloud

More information

Introduction to XML Applications

Introduction to XML Applications EMC White Paper Introduction to XML Applications Umair Nauman Abstract: This document provides an overview of XML Applications. This is not a comprehensive guide to XML Applications and is intended for

More information