SlideShare a Scribd company logo
1 of 32
Download to read offline
Bare Metal Container
Open Source Summit Japan’17
2017/June/1
1
National Institute of Advanced Industrial
Science and Technology(AIST)
Kuniyasu Suzaki
Contents
• Background of BMC
– Drawbacks of container, general kernel, and accounting.
• What is BMC?
• Current implementation
• Evaluation
• Extension
– NVIDIA Docker, Moby, Intel Clear Container, etc.
• Conclusions
2
Background of BMC 1/3
Drawback of Container
• Container technology (Docker) becomes popular.
– Docker offers an environment to customize an application easily.
– It looks like to be good for an application, but it is a server centric.
• It does not allow to change the kernel.
– Kernel options passed through /sys are not effective.
• Some applications cannot run on Docker.
– DPDK on Docker does not work on some machines, because it
depends on “igb_uio” and “rte_kni” kernel modules.
• Some provider offers the kernel which can treat DPDK on Docker,
but it is case by case solution. It is not fundamental solution.
3
Background of BMC 1/3
Drawback of Container
• Container technology (Docker) becomes popular.
– Docker offers an environment to customize an application easily.
– It looks like to be good for an application, but it is a server centric.
• It does not allow to change the kernel.
– Kernel options passed through /sys are not effective.
• Some applications cannot run on Docker.
– DPDK on Docker does not work on some machines, because it
depends on “igb_uio” and “rte_kni” kernel modules.
• Some provider offers the kernel which can treat DPDK on Docker,
but it is case by case solution. It is not fundamental solution.
4
Container is a jail for a kernel optimizer.
Background of BMC 1/3
Drawback of Container
• Container technology (Docker) becomes popular.
– Docker offers an environment to customize an application easily.
– It looks like to be good for an application, but it is a server centric.
• It does not allow to change the kernel.
– Kernel options passed through /sys are not effective.
• Some applications cannot run on Docker.
– DPDK on Docker does not work on some machines, because it
depends on “igb_uio” and “rte_kni” kernel modules.
• Some provider offers the kernel which can treat DPDK on Docker,
but it is case by case solution. It is not fundamental solution.
5
Container is a jail for a kernel optimizer.
HPC users want to optimize the kernel for their
applications. Kernel is a servant.
Container way is not fit for them.
Background of BMC 2/3
General kernel leads weak performance
• Arrakis[OSDI’14] showed that nearly 70% of network latency
was spent in the network stack in a Linux kernel.
• Many DB applications (e.g., Oracle, MongoDB) reduce the
performance by THP (Transparent Huge Pages) which is
enabled on most Linux distributions.
6
Background of BMC 2/3
General kernel leads weak performance
• Arrakis[OSDI’14] showed that nearly 70% of network latency
was spent in the network stack in a Linux kernel.
• Many DB applications (e.g., Oracle, MongoDB) reduce the
performance by THP (Transparent Huge Pages) which is
enabled on most Linux distributions.
7
It is not fundamental solution.
HPC users want to optimize the kernel for their
applications. Kernel is a servant.
Background of BMC 3/3
Power consumption for each application
• Current power measurement is coarse.
– Power Usage Effectiveness: PUE only shows usage of data-center
scale.
– Current power consumption is theme for vender and administrators
• Users have no incentive for low power, even if they make a
low power application.
– Current accounting is based on time consumption.
8
Background of BMC 3/3
Power consumption for each application
• Current power measurement is coarse.
– Power Usage Effectiveness: PUE only shows usage of data-center
scale.
– Current power consumption is theme for vender and administrators
• Users have no incentive for low power, even if they make a
low power application.
– Current accounting is based on time consumption.
9
There is no good method to measure power
consumption “for an application”.
No accounting which considers power consumption.
What is BMC?
• BMC(Bare-Metal Container) runs a container (Docker) image
with a suitable Linux kernel on a remote physical machine.
– Application on Container can change kernel settings and machine
which fit for it. BMC extracts the full performance.
– On BMC, the power on the machine is almost used for the application.
• BMC tells the power usage on each machine architecture. Users can
know which architecture is good for their application.
10
BMC offers incentives for an application to
customize kernel and select machine architecture
What is BMC?
• BMC(Bare-Metal Container) runs a container (Docker) image
with a suitable Linux kernel on a remote physical machine.
– Application on Container can change kernel settings and machine
which fit for it. BMC extracts the full performance.
– On BMC, the power on the machine is almost used for the application.
• BMC tells the power usage on each machine architecture. Users can
know which architecture is good for their application.
11
BMC offers incentives for an application to
customize kernel and select machine architecture
machine
kernel
container manager
Server Centric Architecture
Traditional Style
(Ex: container)
Invoke app.
Power always up
Admin’s
Space
User’s
Space
app
container
app
container
app
container
Comparison
Pros:
• Multi Tenant (high CPU utilization)
Cons:
• Kernel is not replaced.
• No information of power consumption
Pros:
• Apps select a kernel & hardware (low power to high spec).
• Apps occupy the machine and extract the performance.
Cons:
• Set up overhead (Rebooting)
Boot the kernel & app.
BMC
machine machine machine
kernel
app
container
kernel kernel
Application Centric Architecture
Select a kernel
Select a physical
machine
BMC manager
Remote Machine
management
(WOL, AMT, IPMI)
network
bootloader
network
bootloader
network
bootloader
Power frequently up/down
app
container
app
container
Node-1
Docker
Hub
BMC
Hub
BMC Manager
client
BMC Command
#bmc run “Docker-img” “kernel” “initrd” “app and argument”
HTTPS (apache)
iPXE script
kernel & initrd
kernel & initrd
IP address
(bmc-ID)
NFS mount or download to RAM FS
docker image
Docker Image
ssh
ssh pub-key
cloud-init
+ bmc tools (heatbeat)
+ sshd
+ ssh pub-key
iPXE
Power On (WOL, AMT, IPMI)
Download iPXE script
Download kernel & initrd
NFS mount or download to RAM FS
request ssh connection
①
②③
④
⑤
Power Off (shutdown command, AMT, IPMI)
⑥
⑦
⑧
iPXE
Kernel & initrd
(IP3)
(MAC or IP1)
(IP2)
(Linux or IP1)
Procedure to execute BMC command
Remote Machine Boot Procedure
1. Power-on a node machine with Remote Machine
Management (WOL, Intel AMT, IPMI)
2. Network Boot Loader (iPXE)
– Get kernel and intird from a HTTP/HTTPS server.
3. The downloaded initrd mounts a Docker image.
• NFS mode
• RAM FS mode
4. Boot procedure in a Docker image
– Fortunately, Docker image keeps boot procedure.
5. SSH is connected from BMC command
– Run an application.
14
Remote Machine Management
WOL Intel AMT IPMI
Protocol
Magic Packet
(MAC address)
HTTPS
(IP address)
RMPC
(IP address)
Power-On ✔ ✔ ✔
Power-Off × ✔ ✔
Security × Password Password
Comment
Most PCs
have WOL.
High level Intel
machine
Server Machine
(Slow BIOS)
15
Network Boot Loader
• PXE is the most famous, but it is limited for LAN, because
it depends on “magic packet” of Layer 2.
• BMC uses iPXE which download “kernel” and “initrd” from
HTTP/HTTPS.
• The iPXE downloads kernel and initrd.
16
#!ipxe
ifopen net0
set net0/ip 192.168.0.101
set net0/netmask 255.255.255.0
set net0/gateway 192.168.0.1
set dns 192.168.0.1
:loop
chain http://192.168.0.200/cgi-bin/baremetal.ipxe || goto waiting
exit
:waiting
sleep 1
goto loop
– iPXE is custimzed by its
scripting language. BMC
uses it.
How to boot OS (Linux)
• The downloaded “initrd” is customized to mount an Docker
image. It offers 2 mount methods.
– NFS mode
• Download necessary data only and fast boot, but it needs to download data to
run applications after boot.
– RAMFS mode
• Download full Docker image and slow boot, but application runs fast after boot.
• Boot procedure in the Docker image.
– An Docker image keeps boot procedure for each application because each
application package designed to include them.
– BMC utilizes these boot procedures to rum daemons, such as the SSH,
because an application in the Docker image is executed by remote
procedure calls from BMC manager.
17
Power Consumption
• Each node has power meter “WattChecker”.
• WattChecker measures power consumption from the
power-on caused by WOL,AMT, or IPMI.
• BMC manager keeps the log of the power
consumption.
• The log is used for power accounting.
• It is coarse, but it shows affinity between application
and architecture.
18
Current Implementation
• Current BMC Manager is implemented with shell script.
– 4, 500 LOC.
• Power consumed on each node is measured by
WattChecker.
• We have tried several machines as BMC nodes.
– From Atom to Xeon.
– Application can select machine considering power
consumption.
19
Spec of Test Machines
Remote
machine
manage
ment
CPU,Core/thread,
Clock (Burst time),
Power
Logical
performance
GFLOPS
(Burst time)
Issue
date
Memory NIC
(queue)
Low Power
Intel NUC 5CPYH
WOL Celeron (N3050),2/2, 1.6
(2.16)GHz,8W
6.4
(8.6)
2015 8GB RealTek r8169
(1)
NotePC
Lenovo ThinkPAD
T430s
Intel AMT i7 (3520M)2/4,
2.9(3.6)GHz, 35W
46.4
(57.6)
2012 16GB
Intel e1000
(1)
DesktopPC
Dell Optiplex 960
Intel AMT Core 2Quad (Q9400)
4 /4, 2.66GHz,95W
42.656 2008 16GB
Intel e1000
(1)
Server
Dell PowerEdge
T410
IPMI Xeon (X5650)
6/12,2.66(3.06)GHz,95W
63.984
(73.44)
2010 8GB
Broadcom
NeXtreme II(8)
20
Boot performance (overhead)
21
Network PowerTime
NFSRamFS
• They are BMC’s overhead.
• The performance improved by optimization must surpass the overhead.
Time(s) Power (j) Traffic (MB)
NFS mode
Celeron 35.4 242 49.5
Core2
Quad
28.1 1,773 49.3
I7 20.9 481 49.1
Xeon 92.6 9,932 49.8
RAMFS mode
Celeron 55.6 402 92.9
Core2
Quad
40.0 2,493 92.8
i7 34.3 775 92.8
Xeon 102.7 11,015 92.6
46 times
oo
Tested Application and Optimization
• This presentation shows the result of Matrix
multiplication with/without Hyper Threading.
– The experiment measured the time for 10 times of matrix
multiplications on OpenBlas optimized for each machine.
22
Application Optimization
Matrix Multiplication with
OpenBlas
Hyper Threading off
Redis benchmark Transparent Huge Pages off
Apache benchmark Receive Flow Steering off
Performance Difference
10 times of matrix multiplications [12800:12800]
on OpenBlas optimized for each machine. .
23
() shows the rate from logical performance
• The results show no hyper threading is better.
• Xeon shows the best performance, but i7 shows cost effective.
Time (s) Power (j) GFLOPS Power/(GFLOPS*time)
Celeron 12,783.8 125,084
2.99
(34.7%)
3.27
Core2Quad 1,060.2 140,346
39.8
(93.3%)
3.32
i7
HTT-on
961.4 55,315
43.8
(76.0%)
1.31
i7
HTT-off
827.1 45,364
50.9
(88.4%)
1.08
Xeon
HTT-on
945.6 211,908
44.6
(60.7%)
5.02
Xeon
HTT-off
698.9 151,760
60.5
(82.4%)
3.59
Celeron
(Atom Core)
is not cost
effective
CPU.
Performance improvement which compensates
the boot overhead
Boot
overhead
Improvement
at [6400:6400]
Improvement
at [12800:12800]
Time (sec)
i7 35.4 15.9 134.3
Xeon 108.0 29.8 246.7
Power (joule)
i7 1,805.3 1,150 9,951
Xeon 11,274.5 6,792 60,148
24
• Overheads caused by booting were compensated before
[12800:12800].
BMC Extension
• NVIDIA-Docker
• Moby
• Intel Clear Containers
• OSes for Container
25
Extension for “NVIDIA-Docker”
• NVIDIA-Docker runs CUDA applications.
– It manages CUDA and driver of NVIDIA GPU.
• A suitable CUDA is added Docker image
automatically.
• So, users do not need to install CUDA.
– Users don’t need to care about CUDA version.
• BMC is now customizing to add CUDA
which matches to NVIDIA-driver.
– The target is TensorFlow on NVIDIA-Docker.
• https://hub.docker.com/r/tensorflow/
26
Moby
• Moby is a framework to assemble container systems.
• Moby allows to run “redis” container without Docker!
– Why do we need “containerd” and “LinuxKit”?
– Redis should run on native Linux kernel?
27
https://www.slideshare.net/Docker/dockercon-2017-general-session-day-1-solomon-hykes-75362520
Moby
• Moby is a framework to assemble container systems.
• Moby allows to run “redis” container without Dock!
– Why do we need “containerd” and “LinuxKit”?
– Redis should run on native Linux kernel?
28
https://www.slideshare.net/Docker/dockercon-2017-general-session-day-1-solomon-hykes-75362520
iPXE
Normal Linux
“RedisOS”
on normal Linux
BMC
Intel Clear Container
• Intel Clear Container is a counter-thesis of container. It
encourages to use virtualization (Intel VT).
– Intel insists that Intel VT and Linux’s boot (< 200ms!) are fast.
Why don’t you use virtualization? Virtualization offers stronger
isolation.
• BMC’ s offers counter-thesis against Intel Clear Container.
– If Linux’s boot is fast, why don’t you use native Linux?
– BMC offers more flexibility of kernel customization.
29
Current BMC target
• Many Docker OSes are proposed.
–CoreOS
–RancherOS
–Snappy Ubuntu Core
–RedHat Project Atomic
–Mesosphere DC/OS
–VMware Photon
• BMC can use these Linux kernels.
–BMC only requires kernel and container image.
30
Related works
• Triton [Joyent’s product]
– Triton = Docker + SmartOS.
• In order to optimize, user needs to customize SmarOS.
• LinuxBIOS/BProc Cluster[HPCS’02]
– Testbed for kernel test. It is not so easy to implement because it
requires to replace BIOS.
• SLURM[ICDCN’14]
– Measure power consumption for an application. It depends on
function to measure power (Intel RAPL: Running Average Power
Limit, or CRAY machine).
31
Conclusions
• BMC (Bare-Metal Container) runs a container
(Docker) image with a suitable Linux kernel
on a remote physical machine.
• The overhead of BMC was compensated by
the improved performance of applications.
• Official HP: http://www.itri.aist.go.jp/cpc/research/bmc/
• Docker Image for BMC manager:
https://hub.docker.com/r/baremetalcontainer/
• Source Code: https://github.com/baremetalcontainer
32

More Related Content

What's hot

Cache Consistency – Requirements and its packet processing Performance implic...
Cache Consistency – Requirements and its packet processing Performance implic...Cache Consistency – Requirements and its packet processing Performance implic...
Cache Consistency – Requirements and its packet processing Performance implic...Michelle Holley
 
Fosdem 18: Securing embedded Systems using Virtualization
Fosdem 18: Securing embedded Systems using VirtualizationFosdem 18: Securing embedded Systems using Virtualization
Fosdem 18: Securing embedded Systems using VirtualizationThe Linux Foundation
 
ProjectVault[VivekKumar_CS-C_6Sem_MIT].pptx
ProjectVault[VivekKumar_CS-C_6Sem_MIT].pptxProjectVault[VivekKumar_CS-C_6Sem_MIT].pptx
ProjectVault[VivekKumar_CS-C_6Sem_MIT].pptxVivek Kumar
 
F9: A Secure and Efficient Microkernel Built for Deeply Embedded Systems
F9: A Secure and Efficient Microkernel Built for Deeply Embedded SystemsF9: A Secure and Efficient Microkernel Built for Deeply Embedded Systems
F9: A Secure and Efficient Microkernel Built for Deeply Embedded SystemsNational Cheng Kung University
 
Platform Security Summit 18: Xen Security Weather Report 2018
Platform Security Summit 18: Xen Security Weather Report 2018Platform Security Summit 18: Xen Security Weather Report 2018
Platform Security Summit 18: Xen Security Weather Report 2018The Linux Foundation
 
Using Embedded Linux for Infrastructure Systems
Using Embedded Linux for Infrastructure SystemsUsing Embedded Linux for Infrastructure Systems
Using Embedded Linux for Infrastructure SystemsYoshitake Kobayashi
 
Introduction to Microkernels
Introduction to MicrokernelsIntroduction to Microkernels
Introduction to MicrokernelsVasily Sartakov
 
Microkernel-based operating system development
Microkernel-based operating system developmentMicrokernel-based operating system development
Microkernel-based operating system developmentSenko Rašić
 
Introduction To SPOT
Introduction To SPOTIntroduction To SPOT
Introduction To SPOTpauldeng
 
A tour of F9 microkernel and BitSec hypervisor
A tour of F9 microkernel and BitSec hypervisorA tour of F9 microkernel and BitSec hypervisor
A tour of F9 microkernel and BitSec hypervisorLouie Lu
 
3rd Generation Intel® Xeon® Scalable Processor - Achieving 1 Tbps IPsec with ...
3rd Generation Intel® Xeon® Scalable Processor - Achieving 1 Tbps IPsec with ...3rd Generation Intel® Xeon® Scalable Processor - Achieving 1 Tbps IPsec with ...
3rd Generation Intel® Xeon® Scalable Processor - Achieving 1 Tbps IPsec with ...DESMOND YUEN
 
BSides Algiers - Linux Kernel and Recent Security Protections - Djallal Harouni
BSides Algiers - Linux Kernel and Recent Security Protections - Djallal HarouniBSides Algiers - Linux Kernel and Recent Security Protections - Djallal Harouni
BSides Algiers - Linux Kernel and Recent Security Protections - Djallal HarouniShellmates
 

What's hot (20)

Cache Consistency – Requirements and its packet processing Performance implic...
Cache Consistency – Requirements and its packet processing Performance implic...Cache Consistency – Requirements and its packet processing Performance implic...
Cache Consistency – Requirements and its packet processing Performance implic...
 
Fosdem 18: Securing embedded Systems using Virtualization
Fosdem 18: Securing embedded Systems using VirtualizationFosdem 18: Securing embedded Systems using Virtualization
Fosdem 18: Securing embedded Systems using Virtualization
 
Hints for L4 Microkernel
Hints for L4 MicrokernelHints for L4 Microkernel
Hints for L4 Microkernel
 
ProjectVault[VivekKumar_CS-C_6Sem_MIT].pptx
ProjectVault[VivekKumar_CS-C_6Sem_MIT].pptxProjectVault[VivekKumar_CS-C_6Sem_MIT].pptx
ProjectVault[VivekKumar_CS-C_6Sem_MIT].pptx
 
Making Linux do Hard Real-time
Making Linux do Hard Real-timeMaking Linux do Hard Real-time
Making Linux do Hard Real-time
 
F9: A Secure and Efficient Microkernel Built for Deeply Embedded Systems
F9: A Secure and Efficient Microkernel Built for Deeply Embedded SystemsF9: A Secure and Efficient Microkernel Built for Deeply Embedded Systems
F9: A Secure and Efficient Microkernel Built for Deeply Embedded Systems
 
Platform Security Summit 18: Xen Security Weather Report 2018
Platform Security Summit 18: Xen Security Weather Report 2018Platform Security Summit 18: Xen Security Weather Report 2018
Platform Security Summit 18: Xen Security Weather Report 2018
 
Using Embedded Linux for Infrastructure Systems
Using Embedded Linux for Infrastructure SystemsUsing Embedded Linux for Infrastructure Systems
Using Embedded Linux for Infrastructure Systems
 
Introduction to Microkernels
Introduction to MicrokernelsIntroduction to Microkernels
Introduction to Microkernels
 
Microkernel-based operating system development
Microkernel-based operating system developmentMicrokernel-based operating system development
Microkernel-based operating system development
 
Introduction To SPOT
Introduction To SPOTIntroduction To SPOT
Introduction To SPOT
 
Faults inside System Software
Faults inside System SoftwareFaults inside System Software
Faults inside System Software
 
Microkernel design
Microkernel designMicrokernel design
Microkernel design
 
A tour of F9 microkernel and BitSec hypervisor
A tour of F9 microkernel and BitSec hypervisorA tour of F9 microkernel and BitSec hypervisor
A tour of F9 microkernel and BitSec hypervisor
 
3rd Generation Intel® Xeon® Scalable Processor - Achieving 1 Tbps IPsec with ...
3rd Generation Intel® Xeon® Scalable Processor - Achieving 1 Tbps IPsec with ...3rd Generation Intel® Xeon® Scalable Processor - Achieving 1 Tbps IPsec with ...
3rd Generation Intel® Xeon® Scalable Processor - Achieving 1 Tbps IPsec with ...
 
L4 Microkernel :: Design Overview
L4 Microkernel :: Design OverviewL4 Microkernel :: Design Overview
L4 Microkernel :: Design Overview
 
Unix v6 Internals
Unix v6 InternalsUnix v6 Internals
Unix v6 Internals
 
Microkernel Evolution
Microkernel EvolutionMicrokernel Evolution
Microkernel Evolution
 
Priority Inversion on Mars
Priority Inversion on MarsPriority Inversion on Mars
Priority Inversion on Mars
 
BSides Algiers - Linux Kernel and Recent Security Protections - Djallal Harouni
BSides Algiers - Linux Kernel and Recent Security Protections - Djallal HarouniBSides Algiers - Linux Kernel and Recent Security Protections - Djallal Harouni
BSides Algiers - Linux Kernel and Recent Security Protections - Djallal Harouni
 

Similar to BMC: Bare Metal Container @Open Source Summit Japan 2017

[Draft] Fast Prototyping with DPDK and eBPF in Containernet
[Draft] Fast Prototyping with DPDK and eBPF in Containernet[Draft] Fast Prototyping with DPDK and eBPF in Containernet
[Draft] Fast Prototyping with DPDK and eBPF in ContainernetAndrew Wang
 
Docker and kubernetes
Docker and kubernetesDocker and kubernetes
Docker and kubernetesDongwon Kim
 
Introductio to Docker and usage in HPC applications
Introductio to Docker and usage in HPC applicationsIntroductio to Docker and usage in HPC applications
Introductio to Docker and usage in HPC applicationsRichie Varghese
 
“Parallelizing Machine Learning Applications in the Cloud with Kubernetes: A ...
“Parallelizing Machine Learning Applications in the Cloud with Kubernetes: A ...“Parallelizing Machine Learning Applications in the Cloud with Kubernetes: A ...
“Parallelizing Machine Learning Applications in the Cloud with Kubernetes: A ...Edge AI and Vision Alliance
 
IBM MQ in containers MQTC 2017
IBM MQ in containers MQTC 2017IBM MQ in containers MQTC 2017
IBM MQ in containers MQTC 2017Robert Parker
 
Method of NUMA-Aware Resource Management for Kubernetes 5G NFV Cluster
Method of NUMA-Aware Resource Management for Kubernetes 5G NFV ClusterMethod of NUMA-Aware Resource Management for Kubernetes 5G NFV Cluster
Method of NUMA-Aware Resource Management for Kubernetes 5G NFV Clusterbyonggon chun
 
Basics of micro controllers for biginners
Basics of  micro controllers for biginnersBasics of  micro controllers for biginners
Basics of micro controllers for biginnersGerwin Makanyanga
 
Bare-metal, Docker Containers, and Virtualization: The Growing Choices for Cl...
Bare-metal, Docker Containers, and Virtualization: The Growing Choices for Cl...Bare-metal, Docker Containers, and Virtualization: The Growing Choices for Cl...
Bare-metal, Docker Containers, and Virtualization: The Growing Choices for Cl...Odinot Stanislas
 
DPDK Integration: A Product's Journey - Roger B. Melton
DPDK Integration: A Product's Journey - Roger B. MeltonDPDK Integration: A Product's Journey - Roger B. Melton
DPDK Integration: A Product's Journey - Roger B. Meltonharryvanhaaren
 
OSDC 2018 | Three years running containers with Kubernetes in Production by T...
OSDC 2018 | Three years running containers with Kubernetes in Production by T...OSDC 2018 | Three years running containers with Kubernetes in Production by T...
OSDC 2018 | Three years running containers with Kubernetes in Production by T...NETWAYS
 
Latest (storage IO) patterns for cloud-native applications
Latest (storage IO) patterns for cloud-native applications Latest (storage IO) patterns for cloud-native applications
Latest (storage IO) patterns for cloud-native applications OpenEBS
 
414: Build an agile CI/CD Pipeline for application integration
414: Build an agile CI/CD Pipeline for application integration414: Build an agile CI/CD Pipeline for application integration
414: Build an agile CI/CD Pipeline for application integrationTrevor Dolby
 
Enabling Cognitive Workloads on the Cloud: GPUs with Mesos, Docker and Marath...
Enabling Cognitive Workloads on the Cloud: GPUs with Mesos, Docker and Marath...Enabling Cognitive Workloads on the Cloud: GPUs with Mesos, Docker and Marath...
Enabling Cognitive Workloads on the Cloud: GPUs with Mesos, Docker and Marath...Indrajit Poddar
 
Multi-threaded Performance Pitfalls
Multi-threaded Performance PitfallsMulti-threaded Performance Pitfalls
Multi-threaded Performance PitfallsCiaran McHale
 
WebCamp 2016: DevOps. Николай Дойков: Опыт создания клауда для потокового вид...
WebCamp 2016: DevOps. Николай Дойков: Опыт создания клауда для потокового вид...WebCamp 2016: DevOps. Николай Дойков: Опыт создания клауда для потокового вид...
WebCamp 2016: DevOps. Николай Дойков: Опыт создания клауда для потокового вид...WebCamp
 
booting-booster-final-20160420-0700
booting-booster-final-20160420-0700booting-booster-final-20160420-0700
booting-booster-final-20160420-0700Samsung Electronics
 
Containerizing GPU Applications with Docker for Scaling to the Cloud
Containerizing GPU Applications with Docker for Scaling to the CloudContainerizing GPU Applications with Docker for Scaling to the Cloud
Containerizing GPU Applications with Docker for Scaling to the CloudSubbu Rama
 
Deep Dive on Delivering Amazon EC2 Instance Performance
Deep Dive on Delivering Amazon EC2 Instance PerformanceDeep Dive on Delivering Amazon EC2 Instance Performance
Deep Dive on Delivering Amazon EC2 Instance PerformanceAmazon Web Services
 
(CMP402) Amazon EC2 Instances Deep Dive
(CMP402) Amazon EC2 Instances Deep Dive(CMP402) Amazon EC2 Instances Deep Dive
(CMP402) Amazon EC2 Instances Deep DiveAmazon Web Services
 

Similar to BMC: Bare Metal Container @Open Source Summit Japan 2017 (20)

[Draft] Fast Prototyping with DPDK and eBPF in Containernet
[Draft] Fast Prototyping with DPDK and eBPF in Containernet[Draft] Fast Prototyping with DPDK and eBPF in Containernet
[Draft] Fast Prototyping with DPDK and eBPF in Containernet
 
docker
dockerdocker
docker
 
Docker and kubernetes
Docker and kubernetesDocker and kubernetes
Docker and kubernetes
 
Introductio to Docker and usage in HPC applications
Introductio to Docker and usage in HPC applicationsIntroductio to Docker and usage in HPC applications
Introductio to Docker and usage in HPC applications
 
“Parallelizing Machine Learning Applications in the Cloud with Kubernetes: A ...
“Parallelizing Machine Learning Applications in the Cloud with Kubernetes: A ...“Parallelizing Machine Learning Applications in the Cloud with Kubernetes: A ...
“Parallelizing Machine Learning Applications in the Cloud with Kubernetes: A ...
 
IBM MQ in containers MQTC 2017
IBM MQ in containers MQTC 2017IBM MQ in containers MQTC 2017
IBM MQ in containers MQTC 2017
 
Method of NUMA-Aware Resource Management for Kubernetes 5G NFV Cluster
Method of NUMA-Aware Resource Management for Kubernetes 5G NFV ClusterMethod of NUMA-Aware Resource Management for Kubernetes 5G NFV Cluster
Method of NUMA-Aware Resource Management for Kubernetes 5G NFV Cluster
 
Basics of micro controllers for biginners
Basics of  micro controllers for biginnersBasics of  micro controllers for biginners
Basics of micro controllers for biginners
 
Bare-metal, Docker Containers, and Virtualization: The Growing Choices for Cl...
Bare-metal, Docker Containers, and Virtualization: The Growing Choices for Cl...Bare-metal, Docker Containers, and Virtualization: The Growing Choices for Cl...
Bare-metal, Docker Containers, and Virtualization: The Growing Choices for Cl...
 
DPDK Integration: A Product's Journey - Roger B. Melton
DPDK Integration: A Product's Journey - Roger B. MeltonDPDK Integration: A Product's Journey - Roger B. Melton
DPDK Integration: A Product's Journey - Roger B. Melton
 
OSDC 2018 | Three years running containers with Kubernetes in Production by T...
OSDC 2018 | Three years running containers with Kubernetes in Production by T...OSDC 2018 | Three years running containers with Kubernetes in Production by T...
OSDC 2018 | Three years running containers with Kubernetes in Production by T...
 
Latest (storage IO) patterns for cloud-native applications
Latest (storage IO) patterns for cloud-native applications Latest (storage IO) patterns for cloud-native applications
Latest (storage IO) patterns for cloud-native applications
 
414: Build an agile CI/CD Pipeline for application integration
414: Build an agile CI/CD Pipeline for application integration414: Build an agile CI/CD Pipeline for application integration
414: Build an agile CI/CD Pipeline for application integration
 
Enabling Cognitive Workloads on the Cloud: GPUs with Mesos, Docker and Marath...
Enabling Cognitive Workloads on the Cloud: GPUs with Mesos, Docker and Marath...Enabling Cognitive Workloads on the Cloud: GPUs with Mesos, Docker and Marath...
Enabling Cognitive Workloads on the Cloud: GPUs with Mesos, Docker and Marath...
 
Multi-threaded Performance Pitfalls
Multi-threaded Performance PitfallsMulti-threaded Performance Pitfalls
Multi-threaded Performance Pitfalls
 
WebCamp 2016: DevOps. Николай Дойков: Опыт создания клауда для потокового вид...
WebCamp 2016: DevOps. Николай Дойков: Опыт создания клауда для потокового вид...WebCamp 2016: DevOps. Николай Дойков: Опыт создания клауда для потокового вид...
WebCamp 2016: DevOps. Николай Дойков: Опыт создания клауда для потокового вид...
 
booting-booster-final-20160420-0700
booting-booster-final-20160420-0700booting-booster-final-20160420-0700
booting-booster-final-20160420-0700
 
Containerizing GPU Applications with Docker for Scaling to the Cloud
Containerizing GPU Applications with Docker for Scaling to the CloudContainerizing GPU Applications with Docker for Scaling to the Cloud
Containerizing GPU Applications with Docker for Scaling to the Cloud
 
Deep Dive on Delivering Amazon EC2 Instance Performance
Deep Dive on Delivering Amazon EC2 Instance PerformanceDeep Dive on Delivering Amazon EC2 Instance Performance
Deep Dive on Delivering Amazon EC2 Instance Performance
 
(CMP402) Amazon EC2 Instances Deep Dive
(CMP402) Amazon EC2 Instances Deep Dive(CMP402) Amazon EC2 Instances Deep Dive
(CMP402) Amazon EC2 Instances Deep Dive
 

More from Kuniyasu Suzaki

RISC-Vのセキュリティ技術(TEE, Root of Trust, Remote Attestation)
RISC-Vのセキュリティ技術(TEE, Root of Trust, Remote Attestation)RISC-Vのセキュリティ技術(TEE, Root of Trust, Remote Attestation)
RISC-Vのセキュリティ技術(TEE, Root of Trust, Remote Attestation)Kuniyasu Suzaki
 
遠隔デバイスとの信頼を築くための技術とその標準(TEEP RATS)
遠隔デバイスとの信頼を築くための技術とその標準(TEEP RATS)遠隔デバイスとの信頼を築くための技術とその標準(TEEP RATS)
遠隔デバイスとの信頼を築くための技術とその標準(TEEP RATS)Kuniyasu Suzaki
 
IETF111 RATS: Remote Attestation ProcedureS 報告
IETF111 RATS: Remote Attestation ProcedureS 報告IETF111 RATS: Remote Attestation ProcedureS 報告
IETF111 RATS: Remote Attestation ProcedureS 報告Kuniyasu Suzaki
 
Slide presented at FIT 2021 Top Conference (Reboot Oriented IoT, ACSAC2021)
Slide presented at FIT 2021 Top Conference  (Reboot Oriented IoT, ACSAC2021)Slide presented at FIT 2021 Top Conference  (Reboot Oriented IoT, ACSAC2021)
Slide presented at FIT 2021 Top Conference (Reboot Oriented IoT, ACSAC2021)Kuniyasu Suzaki
 
ACSAC2020 "Return-Oriented IoT" by Kuniyasu Suzaki
ACSAC2020 "Return-Oriented IoT" by Kuniyasu SuzakiACSAC2020 "Return-Oriented IoT" by Kuniyasu Suzaki
ACSAC2020 "Return-Oriented IoT" by Kuniyasu SuzakiKuniyasu Suzaki
 
TEE (Trusted Execution Environment)は第二の仮想化技術になるか?
TEE (Trusted Execution Environment)は第二の仮想化技術になるか?TEE (Trusted Execution Environment)は第二の仮想化技術になるか?
TEE (Trusted Execution Environment)は第二の仮想化技術になるか?Kuniyasu Suzaki
 
3種類のTEE比較(Intel SGX, ARM TrustZone, RISC-V Keystone)
3種類のTEE比較(Intel SGX, ARM TrustZone, RISC-V Keystone)3種類のTEE比較(Intel SGX, ARM TrustZone, RISC-V Keystone)
3種類のTEE比較(Intel SGX, ARM TrustZone, RISC-V Keystone)Kuniyasu Suzaki
 
Hardware-assisted Isolated Execution Environment to run trusted OS and applic...
Hardware-assisted Isolated Execution Environment to run trusted OS and applic...Hardware-assisted Isolated Execution Environment to run trusted OS and applic...
Hardware-assisted Isolated Execution Environment to run trusted OS and applic...Kuniyasu Suzaki
 
RISC-V-Day-Tokyo2018-suzaki
RISC-V-Day-Tokyo2018-suzakiRISC-V-Day-Tokyo2018-suzaki
RISC-V-Day-Tokyo2018-suzakiKuniyasu Suzaki
 
USENIX NSDI17 Memory Disaggregation
USENIX NSDI17 Memory DisaggregationUSENIX NSDI17 Memory Disaggregation
USENIX NSDI17 Memory DisaggregationKuniyasu Suzaki
 
Io t security-suzki-20170224
Io t security-suzki-20170224Io t security-suzki-20170224
Io t security-suzki-20170224Kuniyasu Suzaki
 
Kernel Memory Protection by an Insertable Hypervisor which has VM Introspec...
Kernel Memory Protection by an Insertable Hypervisor which has VM Introspec...Kernel Memory Protection by an Insertable Hypervisor which has VM Introspec...
Kernel Memory Protection by an Insertable Hypervisor which has VM Introspec...Kuniyasu Suzaki
 
Report for S4x14 (SCADA Security Scientific Symposium 2014)
Report for S4x14 (SCADA Security Scientific Symposium 2014)Report for S4x14 (SCADA Security Scientific Symposium 2014)
Report for S4x14 (SCADA Security Scientific Symposium 2014)Kuniyasu Suzaki
 
OSセキュリティチュートリアル
OSセキュリティチュートリアルOSセキュリティチュートリアル
OSセキュリティチュートリアルKuniyasu Suzaki
 
Nested Virtual Machines and Proxies
Nested Virtual Machines and Proxies Nested Virtual Machines and Proxies
Nested Virtual Machines and Proxies Kuniyasu Suzaki
 
Bitvisorをベースとした既存Windowsのドライバメモリ保護
Bitvisorをベースとした既存Windowsのドライバメモリ保護Bitvisorをベースとした既存Windowsのドライバメモリ保護
Bitvisorをベースとした既存Windowsのドライバメモリ保護Kuniyasu Suzaki
 
Security on cloud storage and IaaS (NSC: Taiwan - JST: Japan workshop)
Security on cloud storage and IaaS (NSC: Taiwan - JST: Japan workshop)Security on cloud storage and IaaS (NSC: Taiwan - JST: Japan workshop)
Security on cloud storage and IaaS (NSC: Taiwan - JST: Japan workshop)Kuniyasu Suzaki
 
仮想化技術によるマルウェア対策とその問題点
仮想化技術によるマルウェア対策とその問題点仮想化技術によるマルウェア対策とその問題点
仮想化技術によるマルウェア対策とその問題点Kuniyasu Suzaki
 
Technology Used in Virtual Machine (Jan 2008)
Technology Used in Virtual Machine (Jan 2008)Technology Used in Virtual Machine (Jan 2008)
Technology Used in Virtual Machine (Jan 2008)Kuniyasu Suzaki
 
EuroSec2012 "Effects of Memory Randomization, Sanitization and Page Cache on ...
EuroSec2012 "Effects of Memory Randomization, Sanitization and Page Cache on ...EuroSec2012 "Effects of Memory Randomization, Sanitization and Page Cache on ...
EuroSec2012 "Effects of Memory Randomization, Sanitization and Page Cache on ...Kuniyasu Suzaki
 

More from Kuniyasu Suzaki (20)

RISC-Vのセキュリティ技術(TEE, Root of Trust, Remote Attestation)
RISC-Vのセキュリティ技術(TEE, Root of Trust, Remote Attestation)RISC-Vのセキュリティ技術(TEE, Root of Trust, Remote Attestation)
RISC-Vのセキュリティ技術(TEE, Root of Trust, Remote Attestation)
 
遠隔デバイスとの信頼を築くための技術とその標準(TEEP RATS)
遠隔デバイスとの信頼を築くための技術とその標準(TEEP RATS)遠隔デバイスとの信頼を築くための技術とその標準(TEEP RATS)
遠隔デバイスとの信頼を築くための技術とその標準(TEEP RATS)
 
IETF111 RATS: Remote Attestation ProcedureS 報告
IETF111 RATS: Remote Attestation ProcedureS 報告IETF111 RATS: Remote Attestation ProcedureS 報告
IETF111 RATS: Remote Attestation ProcedureS 報告
 
Slide presented at FIT 2021 Top Conference (Reboot Oriented IoT, ACSAC2021)
Slide presented at FIT 2021 Top Conference  (Reboot Oriented IoT, ACSAC2021)Slide presented at FIT 2021 Top Conference  (Reboot Oriented IoT, ACSAC2021)
Slide presented at FIT 2021 Top Conference (Reboot Oriented IoT, ACSAC2021)
 
ACSAC2020 "Return-Oriented IoT" by Kuniyasu Suzaki
ACSAC2020 "Return-Oriented IoT" by Kuniyasu SuzakiACSAC2020 "Return-Oriented IoT" by Kuniyasu Suzaki
ACSAC2020 "Return-Oriented IoT" by Kuniyasu Suzaki
 
TEE (Trusted Execution Environment)は第二の仮想化技術になるか?
TEE (Trusted Execution Environment)は第二の仮想化技術になるか?TEE (Trusted Execution Environment)は第二の仮想化技術になるか?
TEE (Trusted Execution Environment)は第二の仮想化技術になるか?
 
3種類のTEE比較(Intel SGX, ARM TrustZone, RISC-V Keystone)
3種類のTEE比較(Intel SGX, ARM TrustZone, RISC-V Keystone)3種類のTEE比較(Intel SGX, ARM TrustZone, RISC-V Keystone)
3種類のTEE比較(Intel SGX, ARM TrustZone, RISC-V Keystone)
 
Hardware-assisted Isolated Execution Environment to run trusted OS and applic...
Hardware-assisted Isolated Execution Environment to run trusted OS and applic...Hardware-assisted Isolated Execution Environment to run trusted OS and applic...
Hardware-assisted Isolated Execution Environment to run trusted OS and applic...
 
RISC-V-Day-Tokyo2018-suzaki
RISC-V-Day-Tokyo2018-suzakiRISC-V-Day-Tokyo2018-suzaki
RISC-V-Day-Tokyo2018-suzaki
 
USENIX NSDI17 Memory Disaggregation
USENIX NSDI17 Memory DisaggregationUSENIX NSDI17 Memory Disaggregation
USENIX NSDI17 Memory Disaggregation
 
Io t security-suzki-20170224
Io t security-suzki-20170224Io t security-suzki-20170224
Io t security-suzki-20170224
 
Kernel Memory Protection by an Insertable Hypervisor which has VM Introspec...
Kernel Memory Protection by an Insertable Hypervisor which has VM Introspec...Kernel Memory Protection by an Insertable Hypervisor which has VM Introspec...
Kernel Memory Protection by an Insertable Hypervisor which has VM Introspec...
 
Report for S4x14 (SCADA Security Scientific Symposium 2014)
Report for S4x14 (SCADA Security Scientific Symposium 2014)Report for S4x14 (SCADA Security Scientific Symposium 2014)
Report for S4x14 (SCADA Security Scientific Symposium 2014)
 
OSセキュリティチュートリアル
OSセキュリティチュートリアルOSセキュリティチュートリアル
OSセキュリティチュートリアル
 
Nested Virtual Machines and Proxies
Nested Virtual Machines and Proxies Nested Virtual Machines and Proxies
Nested Virtual Machines and Proxies
 
Bitvisorをベースとした既存Windowsのドライバメモリ保護
Bitvisorをベースとした既存Windowsのドライバメモリ保護Bitvisorをベースとした既存Windowsのドライバメモリ保護
Bitvisorをベースとした既存Windowsのドライバメモリ保護
 
Security on cloud storage and IaaS (NSC: Taiwan - JST: Japan workshop)
Security on cloud storage and IaaS (NSC: Taiwan - JST: Japan workshop)Security on cloud storage and IaaS (NSC: Taiwan - JST: Japan workshop)
Security on cloud storage and IaaS (NSC: Taiwan - JST: Japan workshop)
 
仮想化技術によるマルウェア対策とその問題点
仮想化技術によるマルウェア対策とその問題点仮想化技術によるマルウェア対策とその問題点
仮想化技術によるマルウェア対策とその問題点
 
Technology Used in Virtual Machine (Jan 2008)
Technology Used in Virtual Machine (Jan 2008)Technology Used in Virtual Machine (Jan 2008)
Technology Used in Virtual Machine (Jan 2008)
 
EuroSec2012 "Effects of Memory Randomization, Sanitization and Page Cache on ...
EuroSec2012 "Effects of Memory Randomization, Sanitization and Page Cache on ...EuroSec2012 "Effects of Memory Randomization, Sanitization and Page Cache on ...
EuroSec2012 "Effects of Memory Randomization, Sanitization and Page Cache on ...
 

Recently uploaded

Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 

Recently uploaded (20)

Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 

BMC: Bare Metal Container @Open Source Summit Japan 2017

  • 1. Bare Metal Container Open Source Summit Japan’17 2017/June/1 1 National Institute of Advanced Industrial Science and Technology(AIST) Kuniyasu Suzaki
  • 2. Contents • Background of BMC – Drawbacks of container, general kernel, and accounting. • What is BMC? • Current implementation • Evaluation • Extension – NVIDIA Docker, Moby, Intel Clear Container, etc. • Conclusions 2
  • 3. Background of BMC 1/3 Drawback of Container • Container technology (Docker) becomes popular. – Docker offers an environment to customize an application easily. – It looks like to be good for an application, but it is a server centric. • It does not allow to change the kernel. – Kernel options passed through /sys are not effective. • Some applications cannot run on Docker. – DPDK on Docker does not work on some machines, because it depends on “igb_uio” and “rte_kni” kernel modules. • Some provider offers the kernel which can treat DPDK on Docker, but it is case by case solution. It is not fundamental solution. 3
  • 4. Background of BMC 1/3 Drawback of Container • Container technology (Docker) becomes popular. – Docker offers an environment to customize an application easily. – It looks like to be good for an application, but it is a server centric. • It does not allow to change the kernel. – Kernel options passed through /sys are not effective. • Some applications cannot run on Docker. – DPDK on Docker does not work on some machines, because it depends on “igb_uio” and “rte_kni” kernel modules. • Some provider offers the kernel which can treat DPDK on Docker, but it is case by case solution. It is not fundamental solution. 4 Container is a jail for a kernel optimizer.
  • 5. Background of BMC 1/3 Drawback of Container • Container technology (Docker) becomes popular. – Docker offers an environment to customize an application easily. – It looks like to be good for an application, but it is a server centric. • It does not allow to change the kernel. – Kernel options passed through /sys are not effective. • Some applications cannot run on Docker. – DPDK on Docker does not work on some machines, because it depends on “igb_uio” and “rte_kni” kernel modules. • Some provider offers the kernel which can treat DPDK on Docker, but it is case by case solution. It is not fundamental solution. 5 Container is a jail for a kernel optimizer. HPC users want to optimize the kernel for their applications. Kernel is a servant. Container way is not fit for them.
  • 6. Background of BMC 2/3 General kernel leads weak performance • Arrakis[OSDI’14] showed that nearly 70% of network latency was spent in the network stack in a Linux kernel. • Many DB applications (e.g., Oracle, MongoDB) reduce the performance by THP (Transparent Huge Pages) which is enabled on most Linux distributions. 6
  • 7. Background of BMC 2/3 General kernel leads weak performance • Arrakis[OSDI’14] showed that nearly 70% of network latency was spent in the network stack in a Linux kernel. • Many DB applications (e.g., Oracle, MongoDB) reduce the performance by THP (Transparent Huge Pages) which is enabled on most Linux distributions. 7 It is not fundamental solution. HPC users want to optimize the kernel for their applications. Kernel is a servant.
  • 8. Background of BMC 3/3 Power consumption for each application • Current power measurement is coarse. – Power Usage Effectiveness: PUE only shows usage of data-center scale. – Current power consumption is theme for vender and administrators • Users have no incentive for low power, even if they make a low power application. – Current accounting is based on time consumption. 8
  • 9. Background of BMC 3/3 Power consumption for each application • Current power measurement is coarse. – Power Usage Effectiveness: PUE only shows usage of data-center scale. – Current power consumption is theme for vender and administrators • Users have no incentive for low power, even if they make a low power application. – Current accounting is based on time consumption. 9 There is no good method to measure power consumption “for an application”. No accounting which considers power consumption.
  • 10. What is BMC? • BMC(Bare-Metal Container) runs a container (Docker) image with a suitable Linux kernel on a remote physical machine. – Application on Container can change kernel settings and machine which fit for it. BMC extracts the full performance. – On BMC, the power on the machine is almost used for the application. • BMC tells the power usage on each machine architecture. Users can know which architecture is good for their application. 10 BMC offers incentives for an application to customize kernel and select machine architecture
  • 11. What is BMC? • BMC(Bare-Metal Container) runs a container (Docker) image with a suitable Linux kernel on a remote physical machine. – Application on Container can change kernel settings and machine which fit for it. BMC extracts the full performance. – On BMC, the power on the machine is almost used for the application. • BMC tells the power usage on each machine architecture. Users can know which architecture is good for their application. 11 BMC offers incentives for an application to customize kernel and select machine architecture
  • 12. machine kernel container manager Server Centric Architecture Traditional Style (Ex: container) Invoke app. Power always up Admin’s Space User’s Space app container app container app container Comparison Pros: • Multi Tenant (high CPU utilization) Cons: • Kernel is not replaced. • No information of power consumption Pros: • Apps select a kernel & hardware (low power to high spec). • Apps occupy the machine and extract the performance. Cons: • Set up overhead (Rebooting) Boot the kernel & app. BMC machine machine machine kernel app container kernel kernel Application Centric Architecture Select a kernel Select a physical machine BMC manager Remote Machine management (WOL, AMT, IPMI) network bootloader network bootloader network bootloader Power frequently up/down app container app container
  • 13. Node-1 Docker Hub BMC Hub BMC Manager client BMC Command #bmc run “Docker-img” “kernel” “initrd” “app and argument” HTTPS (apache) iPXE script kernel & initrd kernel & initrd IP address (bmc-ID) NFS mount or download to RAM FS docker image Docker Image ssh ssh pub-key cloud-init + bmc tools (heatbeat) + sshd + ssh pub-key iPXE Power On (WOL, AMT, IPMI) Download iPXE script Download kernel & initrd NFS mount or download to RAM FS request ssh connection ① ②③ ④ ⑤ Power Off (shutdown command, AMT, IPMI) ⑥ ⑦ ⑧ iPXE Kernel & initrd (IP3) (MAC or IP1) (IP2) (Linux or IP1) Procedure to execute BMC command
  • 14. Remote Machine Boot Procedure 1. Power-on a node machine with Remote Machine Management (WOL, Intel AMT, IPMI) 2. Network Boot Loader (iPXE) – Get kernel and intird from a HTTP/HTTPS server. 3. The downloaded initrd mounts a Docker image. • NFS mode • RAM FS mode 4. Boot procedure in a Docker image – Fortunately, Docker image keeps boot procedure. 5. SSH is connected from BMC command – Run an application. 14
  • 15. Remote Machine Management WOL Intel AMT IPMI Protocol Magic Packet (MAC address) HTTPS (IP address) RMPC (IP address) Power-On ✔ ✔ ✔ Power-Off × ✔ ✔ Security × Password Password Comment Most PCs have WOL. High level Intel machine Server Machine (Slow BIOS) 15
  • 16. Network Boot Loader • PXE is the most famous, but it is limited for LAN, because it depends on “magic packet” of Layer 2. • BMC uses iPXE which download “kernel” and “initrd” from HTTP/HTTPS. • The iPXE downloads kernel and initrd. 16 #!ipxe ifopen net0 set net0/ip 192.168.0.101 set net0/netmask 255.255.255.0 set net0/gateway 192.168.0.1 set dns 192.168.0.1 :loop chain http://192.168.0.200/cgi-bin/baremetal.ipxe || goto waiting exit :waiting sleep 1 goto loop – iPXE is custimzed by its scripting language. BMC uses it.
  • 17. How to boot OS (Linux) • The downloaded “initrd” is customized to mount an Docker image. It offers 2 mount methods. – NFS mode • Download necessary data only and fast boot, but it needs to download data to run applications after boot. – RAMFS mode • Download full Docker image and slow boot, but application runs fast after boot. • Boot procedure in the Docker image. – An Docker image keeps boot procedure for each application because each application package designed to include them. – BMC utilizes these boot procedures to rum daemons, such as the SSH, because an application in the Docker image is executed by remote procedure calls from BMC manager. 17
  • 18. Power Consumption • Each node has power meter “WattChecker”. • WattChecker measures power consumption from the power-on caused by WOL,AMT, or IPMI. • BMC manager keeps the log of the power consumption. • The log is used for power accounting. • It is coarse, but it shows affinity between application and architecture. 18
  • 19. Current Implementation • Current BMC Manager is implemented with shell script. – 4, 500 LOC. • Power consumed on each node is measured by WattChecker. • We have tried several machines as BMC nodes. – From Atom to Xeon. – Application can select machine considering power consumption. 19
  • 20. Spec of Test Machines Remote machine manage ment CPU,Core/thread, Clock (Burst time), Power Logical performance GFLOPS (Burst time) Issue date Memory NIC (queue) Low Power Intel NUC 5CPYH WOL Celeron (N3050),2/2, 1.6 (2.16)GHz,8W 6.4 (8.6) 2015 8GB RealTek r8169 (1) NotePC Lenovo ThinkPAD T430s Intel AMT i7 (3520M)2/4, 2.9(3.6)GHz, 35W 46.4 (57.6) 2012 16GB Intel e1000 (1) DesktopPC Dell Optiplex 960 Intel AMT Core 2Quad (Q9400) 4 /4, 2.66GHz,95W 42.656 2008 16GB Intel e1000 (1) Server Dell PowerEdge T410 IPMI Xeon (X5650) 6/12,2.66(3.06)GHz,95W 63.984 (73.44) 2010 8GB Broadcom NeXtreme II(8) 20
  • 21. Boot performance (overhead) 21 Network PowerTime NFSRamFS • They are BMC’s overhead. • The performance improved by optimization must surpass the overhead. Time(s) Power (j) Traffic (MB) NFS mode Celeron 35.4 242 49.5 Core2 Quad 28.1 1,773 49.3 I7 20.9 481 49.1 Xeon 92.6 9,932 49.8 RAMFS mode Celeron 55.6 402 92.9 Core2 Quad 40.0 2,493 92.8 i7 34.3 775 92.8 Xeon 102.7 11,015 92.6 46 times oo
  • 22. Tested Application and Optimization • This presentation shows the result of Matrix multiplication with/without Hyper Threading. – The experiment measured the time for 10 times of matrix multiplications on OpenBlas optimized for each machine. 22 Application Optimization Matrix Multiplication with OpenBlas Hyper Threading off Redis benchmark Transparent Huge Pages off Apache benchmark Receive Flow Steering off
  • 23. Performance Difference 10 times of matrix multiplications [12800:12800] on OpenBlas optimized for each machine. . 23 () shows the rate from logical performance • The results show no hyper threading is better. • Xeon shows the best performance, but i7 shows cost effective. Time (s) Power (j) GFLOPS Power/(GFLOPS*time) Celeron 12,783.8 125,084 2.99 (34.7%) 3.27 Core2Quad 1,060.2 140,346 39.8 (93.3%) 3.32 i7 HTT-on 961.4 55,315 43.8 (76.0%) 1.31 i7 HTT-off 827.1 45,364 50.9 (88.4%) 1.08 Xeon HTT-on 945.6 211,908 44.6 (60.7%) 5.02 Xeon HTT-off 698.9 151,760 60.5 (82.4%) 3.59 Celeron (Atom Core) is not cost effective CPU.
  • 24. Performance improvement which compensates the boot overhead Boot overhead Improvement at [6400:6400] Improvement at [12800:12800] Time (sec) i7 35.4 15.9 134.3 Xeon 108.0 29.8 246.7 Power (joule) i7 1,805.3 1,150 9,951 Xeon 11,274.5 6,792 60,148 24 • Overheads caused by booting were compensated before [12800:12800].
  • 25. BMC Extension • NVIDIA-Docker • Moby • Intel Clear Containers • OSes for Container 25
  • 26. Extension for “NVIDIA-Docker” • NVIDIA-Docker runs CUDA applications. – It manages CUDA and driver of NVIDIA GPU. • A suitable CUDA is added Docker image automatically. • So, users do not need to install CUDA. – Users don’t need to care about CUDA version. • BMC is now customizing to add CUDA which matches to NVIDIA-driver. – The target is TensorFlow on NVIDIA-Docker. • https://hub.docker.com/r/tensorflow/ 26
  • 27. Moby • Moby is a framework to assemble container systems. • Moby allows to run “redis” container without Docker! – Why do we need “containerd” and “LinuxKit”? – Redis should run on native Linux kernel? 27 https://www.slideshare.net/Docker/dockercon-2017-general-session-day-1-solomon-hykes-75362520
  • 28. Moby • Moby is a framework to assemble container systems. • Moby allows to run “redis” container without Dock! – Why do we need “containerd” and “LinuxKit”? – Redis should run on native Linux kernel? 28 https://www.slideshare.net/Docker/dockercon-2017-general-session-day-1-solomon-hykes-75362520 iPXE Normal Linux “RedisOS” on normal Linux BMC
  • 29. Intel Clear Container • Intel Clear Container is a counter-thesis of container. It encourages to use virtualization (Intel VT). – Intel insists that Intel VT and Linux’s boot (< 200ms!) are fast. Why don’t you use virtualization? Virtualization offers stronger isolation. • BMC’ s offers counter-thesis against Intel Clear Container. – If Linux’s boot is fast, why don’t you use native Linux? – BMC offers more flexibility of kernel customization. 29
  • 30. Current BMC target • Many Docker OSes are proposed. –CoreOS –RancherOS –Snappy Ubuntu Core –RedHat Project Atomic –Mesosphere DC/OS –VMware Photon • BMC can use these Linux kernels. –BMC only requires kernel and container image. 30
  • 31. Related works • Triton [Joyent’s product] – Triton = Docker + SmartOS. • In order to optimize, user needs to customize SmarOS. • LinuxBIOS/BProc Cluster[HPCS’02] – Testbed for kernel test. It is not so easy to implement because it requires to replace BIOS. • SLURM[ICDCN’14] – Measure power consumption for an application. It depends on function to measure power (Intel RAPL: Running Average Power Limit, or CRAY machine). 31
  • 32. Conclusions • BMC (Bare-Metal Container) runs a container (Docker) image with a suitable Linux kernel on a remote physical machine. • The overhead of BMC was compensated by the improved performance of applications. • Official HP: http://www.itri.aist.go.jp/cpc/research/bmc/ • Docker Image for BMC manager: https://hub.docker.com/r/baremetalcontainer/ • Source Code: https://github.com/baremetalcontainer 32