EUCALYPTUS An Elastic Utility Computing Architecture
EUCALYPTUS Elastic Utility Computing Architecture for Linking Your Programs To Useful Systems is an opensource software infrastructure for implementing 'cloud computing' on clusters. At the moment, Eucalyptus depends on an open source cluster management software package called Rocks. Rocks is to clusters what Debian, Red Hat, Ubuntu, etc. are to individual Linux machines. It's a packaging and deployment tool. Need to be using Rocks to manage the software on your clusters. [3] It can be used like AppEngine's clientside tool.[3] One of the uses for Eucalyptus is to make Amazon cheaper and easier by testing code locally without out having to deploy into Amazon all the time. [4] A first class Cloud Management Infrastructure is not part of Eucalyptus because it is not part of Amazon's API. Eucalyptus is adding some higher level management tools, but they will be pretty basic. [4]
1. It is modular and extensible, implemented entirely using opensource web service tools. 2. It is interfacecompatible with Amazon EC2 and uses the EC2 tools directly. 3. Version 1.0 implements the EC2 features with the exception of static IPsaddress (planned for a later release) 4. It installs automatically as part of a Rocks 5 installation.
Listed below are some main details. [1]
Web services based implementation of elastic/utility/cloud computing infrastructure
Interface compatible with EC2
Works with commandline tools from Amazon w/o modification.
Enables leverage of emerging EC2 valueadded service venues (e.g. Rightscale).
Functions as a software overlay
E.g. the “Linux Experience”.
Not a designed as a replacement technology for EC2 or any other cloud service Extensibility
Allow the environment to be set up and tested before it is instantiated in a forfee environment.
Provide a basic software development platform for the open source community
“Tech Preview” using local machines with local system administration support.
Provide a debugging and development platform for EC2 (and other clouds)
Models of service provisioning, scheduling, SLA formulation, hyper visor portability and feature enhancement, etc.
Experimentation vehicle prior to buying commercial services
Existing installation should not be violated (too much).
Foster research in elastic/cloud/utility computing
Linux image hosting ala Amazon.
Simple architecture and open internal APIs.
Clientside interface
Amazon’s EC2 interface and functionality (familiar and testable).
Networking
Virtual private network per cloud.
Must function as an overlay, cannot supplant local networking.
Security Must be compatible with local security policies.
Packaging, installation, maintenance System administration staff is an important constituency for uptake.
Version 1.0 Interface is based on Amazon’s published WSDL 2008 compliant except for
“Availability” zones correspond to individual clusters.
Static IP address assignment.
Security groups.
Uses the EC2 commandline tools downloaded from Amazon.
REST interface.
S3 support/emulation: not yet, but on its way
Images accessed by file system name instead of S3 handle for the moment.
Unless user wants to use the actual S3 and pay for the egress charges.
System administration is different
Eucalyptus defines its own Cloud Admin. Tool set for user accounting and cloud management.
Eucalyptus does not assume that all worker nodes will have publicly routable IP addresses.
Each cloud allocation will have one or more public IP addresses.
All cloud images have access to a private network interface.
Two types of networks internal to a cloud allocation Virtual private network
Uses VDE interfaced to Xen and VLANs set up dynamically.
Substantial performance hit within a cluster.
Allows a cloud allocation to span clusters.
Highperformance private network (availability zone).
Bypasses VDE and uses local cluster network for each allocation.
Runs at “native” network speed (I.e. with Xen).
Cloud allocations cannot span clusters.
Availability zone approach fits with Amazon’s high level semantics
All Eucalyptus components use WSsecurity for authentication
Encryption of intercomponent communication is not enabled by default
configuration option.
Ssh key generation and installation ala EC2 is implemented
Cloud controller generates the public/private key pairs and installs them.
User signup is web based
User specifies a password and submits signup request.
Cert is generated but withheld until admin. Approves request.
User gains access to cert through passwordprotected web page.
Similar to EC2 model without the credit cards.
Version 1.0: Rocks “Roll” per cluster
Requires Rock V (the most current release) for Xen support.
Onebutton install.
If you know what you are doing, RPMs can be extracted and installed manually.
Multiple clusters requires a configuration file edit at Version 1.0.
Multicluster configuration tools ala Rocks not readily available.
Requires Xen version 3.1 to be installed and functioning.
Does not require modification to dom0.
Does require Xenbridge (not an IP tables approach yet).
All needed packages are bundled in the roll.
Rev. 1.0 is not smart enough to determine if local versions of the dependencies will work or not. Full version (minus images) is 55 MB.
Integration with Rightscale
REST interface has been tested with Rightscale GEMS.
Few details to work out yet should be available soon.
Some other vendors under consideration.
VMWare
VMWare as a hosting facility for Xen.
Initial test version works
Packaging and deployment probably at version 1.2.
Control of VMWarehosted images
Planned for version 2.0.
IP Tables and DNS
Studying the engineering effort now (versions 1.2, 1.3 or 2.0).
References: [1]:http://eucalyptus.cs.ucsb.edu/ [2]:http://en.oreilly.com/velocity2008/public/schedule/detail/4743 [3]:http://ostatic.com/blog/eucalyptusanunsungopensourceinfrastructureforcloud computing [4]:http://highscalability.com/eucalyptusreadybeyourprivatecloud