Infrastructure-as-Code for Data-Intensive Architectures: A Model-Driven Development Approach

被引:14
|
作者
Artac, Matej [2 ]
Borovsak, Tadej [2 ]
Di Nitto, Elisabetta [1 ]
Guerriero, Michele [1 ]
Perez-Palacin, Diego [3 ]
Tamburri, Damian Andrew [1 ]
机构
[1] Politecn Milan, DEIB, DEEPSE Grp, Milan, Italy
[2] XLAB, Ljubljana, Slovenia
[3] Linnaeus Univ, Comp Sci Dept, Vaxjo, Sweden
关键词
DevOps; Big Data; Model-Driven Engineering; Cloud; Infrastructure-as-Code; TOSCA;
D O I
10.1109/ICSA.2018.00025
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
As part of the DevOps tactics, Infrastructure-as-Code (IaC) provides the ability to create, configure, and manage complex infrastructures by means of executable code. Writing IaC, however, is not an easy task, since it requires blending different infrastructure programming languages and abstractions, each specialized on a particular aspect of infrastructure creation, configuration, and management. Moreover, the more the architectures become large and complex (e.g. Data-Intensive or Microservice-based architectures), the more dire the need of IaC becomes. The goal of this paper is to exploit Model-Driven Engineering (MDE) to create language-agnostic models that are then automatically transformed into IaC. We focus on the domain of Data-Intensive Applications as these typically exploit complex infrastructures which demand sophisticated and fine-grained configuration and re-configuration - we show that, through our approach, called DICER, it is possible to create complex IaC with significant amounts of time savings, both in IaC design as well as deployment and re-deployment times.
引用
收藏
页码:156 / 165
页数:10
相关论文
共 50 条
  • [1] Model-driven development of complex and data-intensive integration processes
    Boehm, Matthias
    Habich, Dirk
    Lehner, Wolfgang
    Wloka, Uwe
    MODEL-BASED SOFTWARE AND DATA INTEGRATION, 2008, 8 : 31 - +
  • [2] Model-driven data-intensive Enterprise Information Systems
    Zdravkovic, Milan
    Jardim-Goncalves, Ricardo
    ENTERPRISE INFORMATION SYSTEMS, 2018, 12 (8-9) : 910 - 914
  • [3] Managing the evolution of data-intensive Web applications by model-driven techniques
    Antonio Cicchetti
    Davide Di Ruscio
    Ludovico Iovino
    Alfonso Pierantonio
    Software & Systems Modeling, 2013, 12 : 53 - 83
  • [4] Model-driven Engineering IDE for Quality Assessment of Data-intensive Applications
    Gil, Marc
    Joubert, Christophe
    Torres, Ismael
    ICPE'17: COMPANION OF THE 2017 ACM/SPEC INTERNATIONAL CONFERENCE ON PERFORMANCE ENGINEERING, 2017, : 173 - 174
  • [5] Managing the evolution of data-intensive Web applications by model-driven techniques
    Cicchetti, Antonio
    Di Ruscio, Davide
    Iovino, Ludovico
    Pierantonio, Alfonso
    SOFTWARE AND SYSTEMS MODELING, 2013, 12 (01): : 53 - 83
  • [6] Model-driven Development of Safety Architectures
    Denney, Ewen
    Pai, Ganesh
    Whiteside, Iain
    2017 ACM/IEEE 20TH INTERNATIONAL CONFERENCE ON MODEL DRIVEN ENGINEERING LANGUAGES AND SYSTEMS (MODELS 2017), 2017, : 156 - 166
  • [7] DOML: A New Modelling Approach to Infrastructure-as-Code
    Chiari, Michele
    Xiang, Bin
    Nedeltcheva, Galia Novakova
    Di Nitto, Elisabetta
    Blasi, Lorenzo
    Benedetto, Debora
    Niculut, Laurentiu
    ADVANCED INFORMATION SYSTEMS ENGINEERING, CAISE 2023, 2023, 13901 : 297 - 313
  • [8] DOML: A new modeling approach to Infrastructure-as-Code☆
    Chiari, Michele
    Xiang, Bin
    Canzoneri, Sergio
    Nedeltcheva, Galia Novakova
    Di Nitto, Elisabetta
    Blasi, Lorenzo
    Benedetto, Debora
    Niculut, Laurentiu
    Skof, Igor
    INFORMATION SYSTEMS, 2024, 125
  • [9] A Survey on Infrastructure-as-Code Solutions for Cloud Development
    Teppan, Hakon
    Fla, Lars Halvdan
    Jaatun, Martin Gilje
    2022 IEEE INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGY AND SCIENCE (CLOUDCOM 2022), 2022, : 60 - 65
  • [10] A Model-driven Approach for Securing Software Architectures
    Neri, Mario Arrigoni
    Guarnieri, Marco
    Magri, Eros
    Mutti, Simone
    Paraboschi, Stefano
    PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY (SECRYPT 2013), 2013, : 595 - 602