5
Fingerprinting the Fingerprinting the Datacenter Datacenter Offense Offense Mykell Miller, Gautam Mykell Miller, Gautam Bhawsar Bhawsar

Fingerprinting the Datacenter

Embed Size (px)

DESCRIPTION

Fingerprinting the Datacenter. Offense Mykell Miller, Gautam Bhawsar. Crisis Detection. Why don’t you detect unidentified crises? How severe is each crisis? May affect recovery method May affect detection probability and method Useful for operators to know - PowerPoint PPT Presentation

Citation preview

Page 1: Fingerprinting the Datacenter

Fingerprinting the Fingerprinting the DatacenterDatacenter

OffenseOffense

Mykell Miller, Gautam BhawsarMykell Miller, Gautam Bhawsar

Page 2: Fingerprinting the Datacenter

Crisis DetectionCrisis Detection

Why don’t you detect unidentified crises?Why don’t you detect unidentified crises? How severe is each crisis?How severe is each crisis?

May affect recovery methodMay affect recovery method May affect detection probability and methodMay affect detection probability and method Useful for operators to knowUseful for operators to know

Fingerprints are averaged over epochs in Fingerprints are averaged over epochs in the crisisthe crisis Everywhere else you use the medianEverywhere else you use the median

Page 3: Fingerprinting the Datacenter

Time to identificationTime to identification

What are you doing for 10 minutes?What are you doing for 10 minutes? Why have the time between epochs be Why have the time between epochs be

15 minutes?15 minutes? Will shorter lead to more accurate or quicker Will shorter lead to more accurate or quicker

identification?identification?

Page 4: Fingerprinting the Datacenter

Data CenterData Center

What is the configuration?What is the configuration? Fat tree, etc.Fat tree, etc.

What kind of servers?What kind of servers? Type of servers affects type and frequency Type of servers affects type and frequency

of crisesof crises

Using only WindowsUsing only Windows Study cannot be applied to other OSStudy cannot be applied to other OS

Page 5: Fingerprinting the Datacenter

Data SetData Set

Only 19 examplesOnly 19 examples 8 types of crises had only 1 instance each8 types of crises had only 1 instance each Training set of only 5 examplesTraining set of only 5 examples

No statistics on the user application No statistics on the user application being runbeing run Don’t know if it’s representativeDon’t know if it’s representative