Fingerprinting the Datacenter
-
Upload
chester-tyler -
Category
Documents
-
view
14 -
download
0
description
Transcript of Fingerprinting the Datacenter
Fingerprinting the Fingerprinting the DatacenterDatacenter
OffenseOffense
Mykell Miller, Gautam BhawsarMykell Miller, Gautam Bhawsar
Crisis DetectionCrisis Detection
Why don’t you detect unidentified crises?Why don’t you detect unidentified crises? How severe is each crisis?How severe is each crisis?
May affect recovery methodMay affect recovery method May affect detection probability and methodMay affect detection probability and method Useful for operators to knowUseful for operators to know
Fingerprints are averaged over epochs in Fingerprints are averaged over epochs in the crisisthe crisis Everywhere else you use the medianEverywhere else you use the median
Time to identificationTime to identification
What are you doing for 10 minutes?What are you doing for 10 minutes? Why have the time between epochs be Why have the time between epochs be
15 minutes?15 minutes? Will shorter lead to more accurate or quicker Will shorter lead to more accurate or quicker
identification?identification?
Data CenterData Center
What is the configuration?What is the configuration? Fat tree, etc.Fat tree, etc.
What kind of servers?What kind of servers? Type of servers affects type and frequency Type of servers affects type and frequency
of crisesof crises
Using only WindowsUsing only Windows Study cannot be applied to other OSStudy cannot be applied to other OS
Data SetData Set
Only 19 examplesOnly 19 examples 8 types of crises had only 1 instance each8 types of crises had only 1 instance each Training set of only 5 examplesTraining set of only 5 examples
No statistics on the user application No statistics on the user application being runbeing run Don’t know if it’s representativeDon’t know if it’s representative