This page is here to collect together proceedings from sessions as part of the 'Cloud Infrastructure' track at the Natty UDS in Orlando, Florida.

Please add proceedings by doing the following:

Thanks!

Proceedings

Bootstrap puppet from deployment service (for UEC and more)

cloud-server-n-install-bootstrap-puppet

Eucalyptus next steps

How can Ubuntu use awstrial

Improvements to the Ubuntu Cloud Images

cloud-server-n-cloud-images

Installation service for physical nodes deployments (UEC and more)

cloud-server-n-install-service

On-going maintainance with puppet (for UEC and more)

cloud-server-n-config-mgmt-with-puppet

Openstack packaging

Components of OpenStack NOVA:

Issues to handle off line:

Rebundling and other cloud utilities

UEC EC2 compatibility

Monitoring probes and alerting service (for UEC and more)

cloud-server-n-monitoring-alerting

Actions:

Web scale enhancements

cloud-server-n-webscale-tech

Hadoop packaging

CDH 3 will be used as the fundations for Ubuntu. Cloudera packages will be reviewed and tested.

Ubuntu desktop cloud images

In order to get fully supportable "Ubuntu" images into main, we'll need the following actions.

In order to have a very slick user demo, we have to:

Handle virtual networking in the cloud

Openstack gap analysis

http://wiki.openstack.org/Nova/EucalyptusFeatureComparison

Two areas not already on upstream roadmap:

Chuck's daily picks:

Distributed logging

Use rsyslog as the fundation for building distributed logging.

Application checkpoint/restart

Application checkpoint/restart in linux (linux-cr.org) provides the ability to checkpoint, restart, and migrate application and system containers. This provides a very lightweight mechanism for load-balancing in the cloud.

Actions:

UEC Web interface

Make LXC ready for production

Conclusions:

Containerize ptrace/kill

The security team has an interest in smarter ptrace controls, however these do not mesh with this work. They want to mostly prevent ptrace, but allow ptrace_traceme (ab)use by/for debuggers, tracers, and fault handlers. Containers will prevent tasks inside the container from allowing ptrace by a task outside the container. User namespaces would likely be too coarse-grained, globbing together an entire KDE or wine session, allowing all tasks in one such session to ptrace each other.

However, the containerization of kill and ptrace are deemed 'a good thing.' Kees recommends pushing the patchset.

UEC QA for Natty

Containers in UEC

Use cases:

ACTION: (chuck) Code and test patches for Eucalyptus. This involves both adding LXC as a target and adding the parametric data that would allow the scheduler to select targets that can run the image.

ACTION: For UEC code and test the patches.

ACTION: Investigate increasing the UEC VM-per-processor setting to some default value > 1

ACTION: (serge) Work with platform team to make a stock ubuntu image work in containers

ACTION: investigate whether any UEC changes are needed to terminate a libvirt-lxc instance (by kill -9'ing the init)

KVM/Libvirt hypervisor work

actions:

Non-kvm qemu for arm-on-x86 testing was brought up, but it was felt not worth doing. Upstream (Peter Smile :) needs to do work to merge Nokia's qemu-omap tree into upstream, at which point we can package it. QEMU on arm is not interesting. KVM on arm will become interesting in a few years. Xen was brought up. We have DomU support, and kernel team only wants to support Dom0 if it gets pushed upstream.

Cloud-init / cloud-config improvements

Automated server testing

Topics for discussion:

* Automated Server ISO Testing (http://launchpad.net/ubuntu-server-iso-testing)
  * Achievements to-date
    * Automation of ISO testing in Maverick.
       (12 test cases/2 architectures)
    * Control through ec2 hosted Hudson.
       (Automated triggering based on daily CD images)
       (Automated collation of test results)
  * Current challenges:
    * Test execution overhead and concurrency.
    * Lack of dedicated hardware.
  * Current state of project
    * Not packaged for Ubuntu so not that accessible
    * Codebase needs tidy + full documentation
  * Next Steps:
    * General tidyup of project and codebase
    * Packaging for Ubuntu to ease adoption
    * Release 1.0, comms to potential adopters to provide physical resources.

* Automated EC2 AMI Testing using existing framework + Hudson

* Automated package testing using puppet, kvm etc... for UEC, Hadoop and any other moderately complex stack.

        Use Case:
                * New kerberos infrastructure - how do we test.
                        * Setup multiple instances
                        * puppet + required virtual machines/physical machines
                        * google summer of code - puppet to manage libvirt.
                        
                        1) Hudson creates instances - config into CouchDB?
                        2) Puppet configures instances
                        
                        3) Setup checkpoint
                        
                        4) Execute tests
                        5) Hudson Teardown
                        
                        * Potential to re-use for UEC burn testing.
                        
                        Test Data:
                                puppet recipes.
                                test data.
                                actual tests.
                                encapsulate current QA regression tests.
                                
                        * Current regression does not alway leave working infrastructure
                        * Triggered on presense of new version of package in archive.

* Continuous performance non-regression testing

* Requirements to production-ise
        * Hudson into the data centre -> appropriate Hudson packaging required for IS support
        * Single server required for deployment of ISO testing.

Actions:

Deferred:

UEC Image Store Requirements

Enterprise needs

ISV needs

ISP needs

Other needs

UDSProceedings/N/CloudInfrastructure (last edited 2010-11-16 22:10:36 by 99-156-85-10)