Timely long tail identification through agent based monitoring and analytics

Garraghan, Peter and Ouyang, Xue and Townend, Paul and Xu, Jie (2015) Timely long tail identification through agent based monitoring and analytics. In: 2015 IEEE 18th International Symposium on Real-Time Distributed Computing :. IEEE, pp. 19-26. ISBN 9781479987818

[thumbnail of Longtail identification]
Preview
PDF (Longtail identification)
Longtail_identification.pdf - Accepted Version
Available under License Creative Commons Attribution.

Download (481kB)

Abstract

The increasing complexity and scale of distributed systems has resulted in the manifestation of emergent behavior which substantially affects overall system performance. A significant emergent property is that of the "Long Tail", whereby a small proportion of task stragglers significantly impact job execution completion times. To mitigate such behavior, straggling tasks occurring within the system need to be accurately identified in a timely manner. However, current approaches focus on mitigation rather than identification, which typically identify stragglers too late in the execution lifecycle. This paper presents a method and tool to identify Long Tail behavior within distributed systems in a timely manner, through a combination of online and offline analytics. This is achieved through historical analysis to profile and model task execution patterns, which then inform online analytic agents that monitor task execution at runtime. Furthermore, we provide an empirical analysis of two large-scale production Cloud data enters that demonstrate the challenge of data skew within modern distributed systems, this analysis shows that approximately 5% of task stragglers caused by data skew impact 50% of the total jobs for batch processes. Our results demonstrate that our approach is capable of identifying task stragglers less than 11% into their execution lifecycle with 98% accuracy, signifying significant improvement over current state-of-the-art practice and enables far more effective mitigation strategies in large-scale distributed systems worldwide.

Item Type:
Contribution in Book/Report/Proceedings
Additional Information:
© 2015, IEEE. Uploaded in accordance with the publisher's self-archiving policy. Personal use of this material is permitted. Permission from IEEE must be obtained for all other users, including reprinting/ republishing this material for advertising or promotional purposes, creating new collective works for resale or redistribution to servers or lists, or reuse of any copyrighted components of this work in other works.
ID Code:
82347
Deposited By:
Deposited On:
21 Oct 2016 15:36
Refereed?:
Yes
Published?:
Published
Last Modified:
11 Apr 2024 23:39