Professional Documents
Culture Documents
The Introduction to SLA (Service Level Agreement) Management in the context of cloud computing provides a comprehensive overview of how service providers approach and manage SLAs. Here are the key points
from the document:
1. Early Days of Web-Application Deployment: Initially, the focus was on server provisioning to meet peak load demands of web applications. These applications were hosted on dedicated servers within enterprise-
owned server rooms. The main service-level objectives (SLOs) were response time and throughput of the application end-user requests
The activity of determining the number of servers and their capacity that could satisfactorily serve the application end-user requests at peak loads is called capacity planning
Newer challenges such as application performance isolation and security guarantees have emerged and needed to be addressed. Performance isolation implies that one application should not steal the resources
being utilized by other co-located applications.
Virtualization technologies have been proposed to overcome the above challenges. The ASPs could exploit the containerization features of virtualization technologies to provide performance isolation and guarantee
data security to different co-hosted applications [2, 3]. The applications, instead of being hosted on the physical machines, can be encapsulated using virtual machines. These virtual machines are then mapped to the
physical machines. System resource allocation to these virtual machines can be made in two modes: (1) conserving and (2) nonconserving.
- In the conserving mode, a virtual machine demanding more system resources (CPU and memory) than the specified quota cannot be allocated the spare resources that are remain un-utilized by the other co-
hosted virtual machines.
- In the nonconserving mode the spare resources that are not utilized by the co -hosted virtual machines can be used by the virtual machine needing the extra amount of resource. If the resource requirements of
a virtual machine cannot be fulfilled from the current physical host, then the virtual machine can be migrated to another phy sical machine capable of fulfilling the additional resource requirements.
In summary, the Introduction to SLA Management outlines the evolution from traditional web application hosting to modern cloud computing paradigms, emphasizing the role of SLAs in ensuring service quality and
efficiency. It highlights the challenges and solutions encountered in this transition, including the adoption of virtualization and the emergence of MSPs.
2. Load Balancing
Objective: To distribute incoming requests across a set of physical machines, each hosting an application replica, to evenly spread the load.
Process:
The load balancing algorithm operates on a front-end node (physical machine) that interfaces with clients, receives incoming requests, and then distributes these requests to different physical machines
(back-end nodes) for execution.
Categories of Load Balancing Algorithms:
- Class-agnostic: This type doesn't consider the nature of the request or the type of client.
- Class-aware: This type inspects the type of client making the request and/or the type of service requested before deciding which back-end node should service the request.
3. Admission Control
Role: Plays a crucial role in deciding which requests should be admitted into the application server, especially during heavy loads.
Objective: To select a subset of incoming requests that ensures high overall pay-off during overload situations.
Types of Admission Control Mechanisms:
- Request-based Algorithms: Reject new requests if servers are at capacity, possibly impacting multi-request client sessions.
- Session-based Algorithms: Focus on completing longer sessions; new sessions might be rejected.
QoS-aware Control Mechanisms: These depend on the user type or the nature of the request, prioritizing high-priority users or less resource-intensive requests during overload.
The section on "Types of SLA" in the provided document outlines two primary types of Service Level Agreements (SLAs) in the context of application hosting. Here is a detailed explanation of these types:
Infrastructure SLA:
Definition and Scope: Infrastructure SLA focuses on the guarantees provided by the infrastructure provider regarding the availability of the infrastructure. This includes server machine power, network connectivity, and similar aspects.
Application Management: In this model, enterprises manage their applications that are deployed on server machines. The machines are leased to the customers and are isolated from machines of other customers.
Service-Level Guarantees: A practical example of service-level guarantees offered by infrastructure providers includes hardware availability, power availability, data center network availability, backbone network availability, service credit for
unavailability, outage notification guarantee, internet latency guarantee, and packet loss guarantee. Specific metrics like 99% uptime in a calendar month for hardware availability or 99.999% of the time in a calendar month for backbone
network availability are often used to quantify these guarantees.
Key Contractual Elements: The document provides a table (Table 16.2) that lists these key contractual elements, including the specific standards or benchmarks for each.
Application SLA:
Definition and Scope: Application SLA pertains to the application co-location hosting model where server capacity is allocated based on the resource demands of the applications.
Resource Allocation: Service providers in this model are flexible in allocating and de-allocating computing resources among co-located applications.
Service Provider's Responsibility: Service providers are responsible for meeting the customer's application Service Level Objectives (SLOs).
Examples of Service-Level Objectives: This might include web site response time, latency of the web server, and latency of the database. For instance, an SLO might state a maximum website response time of 3.5 seconds per user request.
Penalties for SLA Breach: There can be stipulations for penalties in case of SLA breaches, such as a financial penalty for every minute the SLO is breached.
Flexibility and Customization: Customers and service providers can mutually agree upon a set of SLAs with different performance and cost structures. Customers have the flexibility to choose from these agreed SLAs and can switch between
different SLAs at runtime.
From the SLA perspective there are multiple challenges for provisioning the infrastructure on demand. These challenges are as follows:
a. The application is a black box to the MSP and the MSP has virtually no
knowledge about the application runtime characteristics. Therefore, the
MSP needs to determine the right amount of computing resources
required for different components of an application at various
workloads.
d. The risk of capacity planning is with the service provider instead of the
customer. If every customer decides to select the highest grade of SLA
simultaneously, there may not be a sufficient number of servers for
provisioning and meeting the SLA obligations of all the customers.
Contract Definition:
- Service providers use standard templates to define service offerings and corresponding SLAs.
- These offerings form a service catalog.
- Individual SLAs for enterprises are created by customizing these base SLA templates.
Negotiation:
- After a customer identifies a suitable service provider, the SLA terms and conditions are mutually agreed upon.
- This agreement is essential before finalizing the hosting arrangement.
- For standard packaged applications offered as a service, this process might be automated.
- For customized applications on cloud platforms, this is a manual process.
- Service providers analyze the application's scalability and performance before finalizing the SLA.
- The end of this phase sees the SLA being mutually agreed and signed off.
- SLA negotiation may involve the WS-negotiation specification.
Operationalization:
- This phase includes SLA monitoring, accounting, and enforcement.
- Monitoring:
SLA monitoring involves measuring parameter values and calculating the metrics defined as a part of SLA and determining the deviations. On identifying the
deviations, the concerned parties are notified. SLA accounting involves capturing and archiving the SLA adherence for compliance.
- Accounting:
As part of accounting, the application’s actual performance and the performance guaranteed as a part of SLA is reported. Apart from the frequency and the duration
of the SLA breach, it should also provide the penalties paid for each SLA violation.
- Enforcement:
SLA enforcement involves taking appropriate action when the runtime monitoring detects a SLA violation. Such actions could be notifying the concerned parties,
charging the penalties besides other things. The different policies can be expressed using a subset of the Common Information Model (CIM). The CIM model is an open
standard that allows expressing managed elements of data center via relationships and common objects.
- De-commissioning:
- This phase is about terminating all activities under an SLA when the hosting relationship ends.
- The SLA outlines terms and conditions for contract termination and specifies situations for legally ending the service provider-consumer relationship.
Decommisioning:
- involves termination of all activities performed under a particular SLA when the hosting relationship between the service provider and the service consumer has
ended.
- SLA specifies the terms and conditions of contract termination and specifies situations under which the relationship between a service provider and a service
consumer can be considered to be legally ended.