2015 15th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing 2015
DOI: 10.1109/ccgrid.2015.26
|View full text |Cite
|
Sign up to set email alerts
|

ProRenaTa: Proactive and Reactive Tuning to Scale a Distributed Storage System

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
13
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
3
2
1

Relationship

3
3

Authors

Journals

citations
Cited by 13 publications
(21 citation statements)
references
References 15 publications
0
13
0
Order By: Relevance
“…Service Level Agreement (SLA) cannot be guaranteed on reactive policies since the actions are only activated after recording an observation, while SLA are more likely to be achieved in proactive policies which predict workload needs in advance [65]. The robust of proactive policies are associated with the quality of the historic data and the accuracy of the corresponding model.…”
Section: Policy-based Efficient Storage Systemsmentioning
confidence: 99%
See 1 more Smart Citation
“…Service Level Agreement (SLA) cannot be guaranteed on reactive policies since the actions are only activated after recording an observation, while SLA are more likely to be achieved in proactive policies which predict workload needs in advance [65]. The robust of proactive policies are associated with the quality of the historic data and the accuracy of the corresponding model.…”
Section: Policy-based Efficient Storage Systemsmentioning
confidence: 99%
“…For example, IF <Condition: Storage available capacity = X > AND < Goal desired = capacity > T HEN < PolicyAction: Compressions = TRUE > is a reactive policy. Typically, SLA cannot be guaranteed on reactive policies, since the actions are only activated after recording an observation, while an SLA is more likely to be achieved in proactive policies that predict workload needs an advance [65]. It is impotent to be able to design robust proactive policies that can achieve desired goals.…”
Section: Policy-based Storage Managementmentioning
confidence: 99%
“…Although we found this isolation acceptable in terms of security and privacy, we identified resource isolation and admission control as an area of improvement to ensure the quality of the services provided (see Section 2). We did research and proposed solutions [28,29,53] for performance isolation, including resource prioritisation and pinning, elastic resource provisioning, reactive tuning, and admission control, but any of these are included yet in our software. Given the wide range of essential and optional software and services (IaaS, PaaS, and SaaS) for a decentralised CC, Cloudy can have a similar role in terms of standardisation and unification at the cloud infrastructure and service level as the guifi.net website has had at the network infrastructure level.…”
Section: Cloudy Software For User Devicesmentioning
confidence: 99%
“…It is non-trivial to build an accurate and efficient elasticity controller. Recent works have been focusing on improving the accuracy of elasticity controllers by building different control models with various monitored/controlled metrics [1][2][3][4][5][6][7][8]. However, none of the works have considered the practical usefulness of an elasticity controller, which involves the following challenges.…”
Section: Introductionmentioning
confidence: 99%
“…Additionally, a generic workload prediction module is also integrated to facilitate the decision making of OnlineElast-Man. It allows OnlineElastMan to scale the storage system well in advance to prevent SLO violations caused on workload increase and scaling overhead [7]. Specifically, the prediction module aggregates multiple prediction algorithms and chooses the most appropriate prediction algorithm based on the current workload pattern using a weight majority selection algorithm.…”
Section: Introductionmentioning
confidence: 99%