Abstract
The container virtualization on the Kubernetes platform brings challenges that need to be addressed when a production or test load is running across the cluster. If applications running in containers are spread across the Kubernetes cluster, resource usage may be inefficient across the environment, which may result in overloading of individual nodes and inefficient load on others. One area where inefficiencies may occur is the load on network lines and network communications. This article discusses two algorithms and approaches that can be applied to the Kubernetes platform while helping to manage network traffic and lines across the cluster, which can make the cluster components more efficient. Both algorithms collect the monitored data from the cluster, but each one the data collected behaves differently, and data transformation and analysis takes place in another part of the system. The first algorithm is an agent-based algorithm that collects and performs basic data analysis and is capable of responding to detected information. The second is the algorithm that collects the data into the central element of the system and then analyzes it and, based on the information obtained, controls the individual components of the cluster.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Apache Mesos. http://mesos.apache.org/. Last Accessed 2 July 2018
Chi, Y., Jiang, T., Li, X., Gao, C.: Design and implementation of cloud platform intrusion prevention system based on SDN. In: 2017 IEEE 2nd International Conference on Big Data Analysis (ICBDA), pp. 847–852. IEEE, Beijing, China (2017)
Datadog. https://www.datadoghq.com/. Last Accessed 2 July 2018
Depren, O., Topallar, M., Anarim, E., Ciliz, M.: An intelligent intrusion detection system (IDS) for anomaly and misuse detection in computer networks. Exp. Syst. Appl. 29(4), 713–722 (2005)
Docker - build, ship, and run any app, anywhere. https://www.docker.com/. Last Accessed 2 July 2018
Google/cadvisor: analyzes resource usage and performance characteristics of running containers. https://github.com/google/cadvisor. Last Accessed 2 July 2018
Grafana - the open platform for analytics and monitoring. https://grafana.com/. Last Accessed 2 July 2018
Grossmann, M., Klug, C.: Monitoring container services at the network edge. In: 2017 Proceedings of the 29th International Teletraffic Congress (ITC 29), vol. 1, pp. 130–133. IEEE, Genoa, Italy (2017)
Horalek, J., Sobeslav, V.: Analysis of the use of system resources for cloud data security. In: 15th International Conference on Mobile Web and Intelligent Information Systems, MobiWis 2018, Barcelona. Lecture Notes in Computer Science, vol. 10995, pp 101–111. Springer, Berlin (2018)
InfluxData (InfluxDB) - time series database monitoring and analytics. https://www.influxdata.com/. Last Accessed 2 July 2018
Komarek, A., Pavlik, J., Mercl, L., Sobeslav, V.: Hardware layer of ambient intelligence environment implementation. In: Computational Collective Intelligence. ICCCI 2017. Lecture Notes in Computer Science, vol. 10449, pp. 325–334. Springer, Nicosia (2017)
kubernetes/heapster: compute resource usage analysis and monitoring of container clusters. https://github.com/kubernetes/heapster. Last Accessed 2 July 2018
Kubernetes - production-grade container orchestration. https://www.kubernetes.io/. Last Accessed 2 July 2018
Lin, S.-W., Ying, K.-C., Lee, C.-Y., Lee, Z.-J.: An intelligent algorithm with feature selection and decision rules applied to anomaly intrusion detection. Appl. Soft Comput. 12(10), 99–110 (2016)
LogicMonitor: SaaS-based performance monitoring platform. https://www.logicmonitor.com/. Last Accessed 1 April 2018
Mercl, L., Pavlik, J.: The comparison of container orchestrators. In: Third International Congress on Information and Communication Technology, ICICT 2018, London. Advances in Intelligent Systems and Computing, vol. 797, pp. 677–685. Springer, Singapore (2018)
Modi, C., Patel, D., Borisaniya, B., Patel, H., Patel, A., Rajarajan, M.: A survey of intrusion detection techniques in Cloud. J. Netw. Comput. Appl. 36(1), 42–157 (2013)
Nagios - The industry standard In IT infrastructure monitoring. https://nagios.org/, Last Accessed 1 April 2018
New Relic: digital performance monitoring and management. https://newrelic.com/. Last Accessed 2 July 2018
OpenNMS. https://www.opennms.org/. Last Accessed 2 July 2018
Prometheus - monitoring system; time series database. https://prometheus.io/. Last Accessed 2 July 2018
PRTG network monitor. https://www.paessler.com/prtg. Last Accessed 2 July 2018
Roshan, S., Miche, Y., Akusok, A., Lendasse, A.: Adaptive and online network intrusion detection system using clustering and extreme learning machines. J. Frankl. Inst.-Eng. Appl. Math. 4, 1752–1779 (2018)
Sohal, A.S., Sandhu, R., Sood, S.K., Chang, V.: A cybersecurity framework to identify malicious edge device in fog computing and cloud-of-things environments. Comput. Secur. 74, 340–354 (2018)
Sysdig: kubernetes and docker monitoring, container security and more. https://www.sysdig.com/. Last Accessed 2 July 2018
Tsai, P.-H., Hong, H.-J., Cheng, A.-C., Hsu, C.-H.: Distributed analytics in fog computing platforms using tensorflow and kubernetes. In: 19th Asia-Pacific Network Operations and Management Symposium: Managing a World of Things, APNOMS 2017, pp. 145–150. IEEE, Seoul; South Korea (2017)
Vieira, K., Schulter, A., Westphall, C.B., Westphall, C.M.: Intrusion detection for grid and cloud computing. IT Prof. 12(4), 38–43 (2010)
Weave Scopu. https://www.weave.works/. Last Accessed 2 July 2018
Zabbix - The enterprise-class open source network monitoring solution. https://www.zabbix.com/. Last Accessed 2 July 2018
Zhang, Y., Wang, L., Sun, W., Green, R.C., Alam, M.: Distributed intrusion detection system in a multi-layer network architecture of smart grids. IEEE Trans. Smart Grid 2(4), 796–808 (2011)
Acknowledgements
This work and the contribution were supported by a Specific Research Project, Faculty of Informatics and Management, University of Hradec Kralove, Czech Republic.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Mercl, L., Sobeslav, V., Mikulecky, P. (2020). Design of Reactive Systems for Control Network Traffic on the Kubernetes Platform. In: Huk, M., Maleszka, M., Szczerbicki, E. (eds) Intelligent Information and Database Systems: Recent Developments. ACIIDS 2019. Studies in Computational Intelligence, vol 830. Springer, Cham. https://doi.org/10.1007/978-3-030-14132-5_33
Download citation
DOI: https://doi.org/10.1007/978-3-030-14132-5_33
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-14131-8
Online ISBN: 978-3-030-14132-5
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)