LinuxCon Japan is the premiere Linux conference in Asia that brings together a unique blend of core developers, administrators, users, community managers and industry experts.
CloudOpen Japan is a conference celebrating and exploring the open source projects, technologies and companies who make up the cloud. It’s built on a belief that open works: for users, for industry and for technology.
Nested Virtualization was once considered as a research project, but we are seeing real demands for it, even in the cloud. Without nested virtualization, hardware virtualization is not enabled in the cloud. As Linux is required to run in virtualization as the default deployment for IT and the cloud, the virtualization feature such as KVM or Xen is required to be available and optimized in guests as well. For example, the Android emulator wouldnât provide practical performance on a Linux VM without nested virtualization. In this talk, we discuss use cases, characteristics of nested virtualization, and optimizations using new hardware virtualization features, such as
"VMCS shadowing".
The expected audience is developers interested in new technologies for virtualization and the cloud. They will learn about use cases, latest status, and how nested virtualization is becoming real.
In a virtualization system, problems like I/O and scheduling delay sometimes occur on guests because those operations of guests and the host will compete by sharing I/O devices or CPU cores. But if you just look into only guest's trace data, it will be difficult to analyze the problems. So, we are developing "Integrated trace" system which allows us to analyze trace data of all guests and a host by merging data in chronological order. Our proposal is to use TSC for merging and the concept was reviewed by the community, and we found that there are two problems: TSC offset changing and difference of TSC between multiple CPUs.
In this presentation, we report current status of Integrated trace, share the problems using TSC in detail, and explain how to approach for that. This presentation will be a help for troubleshooting on virtualized mission-critical systems or cloud systems.
In virtual environment, many guests are running on one hypervisor and reliability of KVM hypervisor is really important. One of the key features is "hardware error handling." In order to minimize area of influence when hardware error, such as Machine Check, is detected, isolating hardware with a failure, shutting down only affected guest, are required. As for hardware error handling of Linux, there are three key features: pre-failure detection, failure isolation, continuity after isolation. These features are generally implemented in upstream kernel, however some important issues are still unresolved.
This presentation will show the current implementation of the three key features, detail of unresolved issues, and current activities to solve those issues will be explained. Target audience is kernel developers who are interested in reliability of virtual environment.
On this talk we are going to discuss what has changed on KVM migration since LinuxCon2012.
Migration thread
We discuss the work of moving the execution of outgoing live migration to a separate dedicated thread. Using a separate thread for live migration reduces contention with the IO thread and vcpus: higher throughput and more reliable downtime. Move migration to use synchronous IO.
Block Migration
Now we can migrate storage, independently of how we are handling migration itself.
Migration performance on large guests
What is on the pipeline?
Building up cloud infrasturacture is a challenging work. You need to have number of system resource and install appropriate software stuck for each resources. Crowbar is making this easy. By using Crowbar, you can simply discover resource and configure software stack to setup cloud. This talk will show basics of crowbar and latest information. Target audience is IT people who want to use OpenSTack/Hadoop by using easy install tool.
This tutorial will include:
The target audience should have a background in devops, with a basic working knowledge of Linux and Python. Attendees can expect to walk away with a good grasp of the OpenStack cloud and cloud architectures.
In 2013, the Xen Hypervisor will be 10 years old: when Xen was designed, we anticipated a world, which now is known as cloud computing. Today, Xen powers the largest clouds in production and is the basis for several commercial virtualization products. In this talk we will give on overview of Xen and related projects, cover hot developments in the Xen community and outline what comes next.
The talk is intended for users and developers that are familiar with virtualization: no deep knowledge is required. We will start with an architectural overview and cover topics such as: Xen and Linux, how to secure your cloud using disaggregation, SELinux and XSM/FLASK, the evolution of Paravirtualization, Xen on ARM and common challenges for open source hypervisors. We will explore the potential of Open Mirage for testing hypervisors. The talk will conclude with an outlook to the future of Xen.
Introduction to OpenStack and why it matters
Cloud computing presents a key paradigm shift for how systems are built, deployed and operated.
OpenStack:
- is leading the way to open cloud computing
- has become the operating system for the cloud and won the race to become the standard
- is one of the most high-profile open source projects today and creating thousands of IT Jobs
"No one gets fired for choosing OpenStack" :-) Even IBM makes a big bet on OpenStack and so should you!
audience: anyone interested in cloud and future IT trends
1. CloudStack overview
CloudStack is the software to build IaaS cloud. CloudStack controls servers (multi hypervisors), network and storage and provide self-service portal to end user.
2. CloudStack Networking architecture
- Advanced Network
- Basic Network
- CloudStack Network Design
3. Inside of CloudStack Virtual Router
4. CloudStack SDN approach
CloudStack will provide the SDN controller inside of management server to control Open vSwtich.
5. CloudStack Network ecosystem
- Introduce OpenFlow switch and controller vendor like Midokura, Stratosphere, Nicira and others CloudStack can control.
- Introduce L4-7 cloud networking like NetScaler, Juniper and etc CloudStack can control.
6. Wrap-up
Target audience:
1. System administrator that is trying to build private and public cloud in service provider, university and enterprise.
2. Individual engineers who are interested in cloud.
Ryu is an open-sourced network operating system licensed under Apache License v2. The project URL is http://osrg.github.com/ryu/ . Ryu aims to provide logically centralized control and well defined API that makes it easy for cloud operators to implement network management applications on top of the Ryu. Currently, Ryu supports OpenFlow protocol to control the network devices. Ryu plugin for OpenStack was merged into Quantum. You can create tens of thousands of isolated virtual networks without using VLAN. The project goal is to develop an OSS network operating system that has high quality enough for use in large production environment in code qualify/functionality/usability. This talk is intended for cloud operators and developers. Audience
members will learn Ryu desgin and how to manage network with Ryu. We expect that the audience is familiar with network.
Ganeti is a software developed at Google which can be used to manage physical hardware in order to host virtualization workloads. It is used worldwide to manage infrastructures, host customer machines, and provide IaaS clouds.
In this talk we'll introduce the Ganeti platform, and see how it can be used, how it is evolving and how to deploy it in your infrastructure.
OpenStack is the open source cloud platform. The OpenStack community releases a new version every six months, and the OpenStack APIs are increasing version by version. Now OpenStack has hundreds of its API.
In each API, it should be checked out all parameters of API in terms of acceptable types, minimum and maximum length and ranges. However, not all the parameters are completely checked out. By such situation, many API operations run without parameter check.
For this problem, I'd like to propose the API validation framework. The framework requires the definition of all API parameters, and it checks parameters by the definition before each API operation runs. If parameters are invalid, the framework will return errors on unified manner.
The purpose of this talk is to introduce the API validation framework. This talk is targeted for people who is interested in developing OpenStack.