Skip to main content

The core python package for MLSysOps Agents Framework.

Project description

MLSysOps Framework

XMPP Service Configuration

This project uses the XMPP (Extensible Messaging and Presence Protocol) service for communication between agents. The XMPP service is powered by an ejabberd container, which we have set up for easy deployment and automatic configuration.

kubectl create configmap ejaberd-config --from-file=ejabberd.yml -n mlsysops-framework

Prerequisites

Before running the XMPP service, ensure you have the following installed on your system:

How It Works

The XMPP service is managed through a Docker container running ejabberd. We've provided an automatic configuration process that simplifies setup on any host machine.

Setup Instructions

To set up and run the XMPP service, follow these steps:

  1. Ensures that you have all the necessary packages installed

    Install the libraries of the requirements.txt file

    pip install -r requirements.txt
    
  2. Set the IP Address of the Host

    • Open the .env file in the root directory.
    • Set the IP_SEL environment variable to the IP address of the host machine where the service will run.

    Example .env file:

    IP_SEL=10.96.82.195

  3. Configure ejabberd

    • After setting the IP address in the .env file, run the configuration script to update the ejabberd.yml file with the IP address provided in the .env file.
    • This script will automatically configure the XMPP service for you.

    Command to run the script:

    python config_script.py
    
  4. Run the XMPP Service

    Once the configuration is complete, you can start the XMPP service using Docker Compose.

    Run the following command to start up the service:

    docker-compose up -d
    

    During the setup process, an admin user will be automatically registered with a default password. If the process completes successfully, the console output should show the following confirmation message:

    User admin@10.96.82.195 successfully registered
    

    This confirms that the admin user has been correctly registered in the XMPP service.

  5. Agent connection test

    This repository contains a simple example to test the connection between an agent and an XMPP service using a DummyAgent. The goal is to ensure that the agent can successfully authenticate and communicate with the XMPP server.

    • Ensure that the host machine running the test script has network connectivity to the XMPP server. You can check this by pinging the server:

    • Configure the agent using the following Python code snippet. Please double check that you are using the admin user and the IP address previously configured.

      dummy = DummyAgent("admin@10.96.82.195", "1234")
      
    • Run the script, If the connection succeeds, you will see the following message printed in the console:

      Hello World! I'm agent admin@10.96.82.195
      
  6. Agent registration

    To register the agents that will be supported by the XMPP service, you can use the user_reg.py script. This script reads usernames and passwords from the users.txt file and registers the users on the XMPP service.

    Once the XMPP service is up and running, simply execute the script to create and register the JIDs (Jabber IDs) that the agents will use for communication.

    The format of the users.txt needs to be as follows:

       agentid1,password1
       agentid2,password2
    

Following the previous steps, an agent can be instantiated to communicate with any other agent in the framework through the XMPP service


Node Agent

In this use case, the node agent is responsible for gathering telemetry data from the application running on the node. This includes monitoring the application's behavior as well as collecting CPU and memory metrics from the node itself. Using this information, the agent performs a machine learning (ML) model inference to predict the application's future behavior. The prediction results are then sent to the cluster agent, which uses this data to make decisions.

The node agent uses OpenTelemetry (OTEL) to collect performance data from both the node and the application. Additionally, the agent uses OTEL to share the inference results with the cluster agent for further processing.

Configuring the Node Agent Install OpenTelemetry: First, install the OTEL library, which is required for telemetry collection and data exchange.

        pip install -r requirements.txt

Set Up OTEL Variables: You need to configure the necessary OTEL environment variables as follows:

        TELEMETRY_ENDPOINT="172.25.27.228:4317" to push
        LOCAL_OTEL_ENDPOINT="http://172.25.27.228:9999/metrics"

Configure Agent Information, providing the following information in the environment configuration:

    NODE_NAME=node                   
    NODE_PASSWORD=1234
    CLUSTER_NAME=cluster                        
    EJABBERD_DOMAIN=10.96.82.195        
                      
  • Node agent name: The name of the agent running on the node.
  • Agent password: The password of the node agent.
  • Cluster agent name: The cluster agent to which the node agent will be subscribed.
  • XMPP domain: The domain of the XMPP service used for communication.
  • Note: is worth to say that the jids need to be previously registered as in the previous steps.

Once the environment is set up, you can run the node agent to start collecting telemetry and performing ML inferences.

N_agent.service file is also provide to run the agent script as a daemon in linux systems.

Project status

Testing phase.


Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

mlsysops-0.1.2.tar.gz (58.9 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

mlsysops-0.1.2-py3-none-any.whl (91.6 kB view details)

Uploaded Python 3

File details

Details for the file mlsysops-0.1.2.tar.gz.

File metadata

  • Download URL: mlsysops-0.1.2.tar.gz
  • Upload date:
  • Size: 58.9 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.1.0 CPython/3.12.9

File hashes

Hashes for mlsysops-0.1.2.tar.gz
Algorithm Hash digest
SHA256 1b20d822eef6f92f26ce13631a617170aa36b38b4672de0c13821001f1ca54fe
MD5 f9c55b6f92c6bcad5d90f635af399b90
BLAKE2b-256 c00baa733950a5b490b9408024173b5d1c4c8d32c5af10e19e00212222c10471

See more details on using hashes here.

File details

Details for the file mlsysops-0.1.2-py3-none-any.whl.

File metadata

  • Download URL: mlsysops-0.1.2-py3-none-any.whl
  • Upload date:
  • Size: 91.6 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.1.0 CPython/3.12.9

File hashes

Hashes for mlsysops-0.1.2-py3-none-any.whl
Algorithm Hash digest
SHA256 a638f693e2749060d5c053bb774e688e0061f672f9fa4197f2c2043f443f19a3
MD5 8c84cab57192843530768b13c5aa3251
BLAKE2b-256 c75afd167384d90358829fd50d2785e3cc18d889d600fb8729d425a71a61f69f

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page