Discovering configuration templates of virtualized tenant networks in multi-tenancy datacenters via graph-mining

Multi-tenant datacenter networking, with which multiple customer (tenant) networks are virtualized over a single shared physical infrastructure, is cost-effective but poses significant costs on manual configuration. Such tasks would be alleviated with configuration templates, whereas a crucial difficulty stems from creating appropriate (i.e., reusable) ones. In this work, we propose a graph-based method of mining configurations of existing tenants to extract their recurrent patterns that would be used as reusable templates for upcoming tenants. The effectiveness of the proposed method is demonstrated with actual configuration files obtained from a business datacenter network.

[1]  Jeffrey C. Mogul,et al.  NetLord: a scalable multi-tenant network architecture for virtualized datacenters , 2011, SIGCOMM.

[2]  Mischa Schwartz,et al.  ACM SIGCOMM computer communication review , 2001, CCRV.

[3]  David A. Maltz,et al.  Unraveling the Complexity of Network Management , 2009, NSDI.

[4]  David A. Maltz,et al.  Mining policies from enterprise network configuration , 2009, IMC '09.

[5]  Albert G. Greenberg,et al.  The cutting EDGE of IP router configuration , 2004, Comput. Commun. Rev..

[6]  Albert G. Greenberg,et al.  Routing design in operational networks: a look from the inside , 2004, SIGCOMM '04.

[7]  O. Bonaventure,et al.  Towards validated network configurations with NCGuard , 2008, 2008 IEEE Internet Network Management Workshop (INM).

[8]  Franck Le,et al.  Shedding light on the glue logic of the internet routing architecture , 2008, SIGCOMM '08.

[9]  Aditya Akella,et al.  Demystifying configuration challenges and trade-offs in network-based ISP services , 2011, SIGCOMM.

[10]  Aled Edwards,et al.  Diverter: a new approach to networking within virtualized infrastructures , 2009, WREN '09.

[11]  Nick Feamster,et al.  The evolution of network configuration: a tale of two campuses , 2011, IMC '11.

[12]  Anil K. Jain,et al.  Data clustering: a review , 1999, CSUR.

[13]  Anja Feldmann,et al.  IP network configuration for intradomain traffic engineering , 2001, IEEE Netw..

[14]  Albert G. Greenberg,et al.  Configuration management at massive scale: system design and experience , 2007, IEEE Journal on Selected Areas in Communications.

[15]  David Plonka,et al.  An Analysis of Network Configuration Artifacts , 2009, LISA.

[16]  Subhabrata Sen,et al.  Extracting Network-Wide Correlated Changes from Longitudinal Configuration Data , 2009, PAM.

[17]  Carsten Lund,et al.  Modeling and understanding end-to-end class of service policies in operational networks , 2009, SIGCOMM '09.

[18]  Jennifer Rexford,et al.  Automated provisioning of BGP customers , 2003, IEEE Netw..

[19]  Xuelong Li,et al.  A survey of graph edit distance , 2010, Pattern Analysis and Applications.