CN105760519B - Cluster file system and file lock distribution method thereof - Google Patents

Cluster file system and file lock distribution method thereof Download PDF

Info

Publication number
CN105760519B
CN105760519B CN201610108914.9A CN201610108914A CN105760519B CN 105760519 B CN105760519 B CN 105760519B CN 201610108914 A CN201610108914 A CN 201610108914A CN 105760519 B CN105760519 B CN 105760519B
Authority
CN
China
Prior art keywords
file
file lock
locking
client
lock
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610108914.9A
Other languages
Chinese (zh)
Other versions
CN105760519A (en
Inventor
王晓强
贾德明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shandong whale shark Information Technology Co.,Ltd.
Original Assignee
Perabytes Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Perabytes Technology Co ltd filed Critical Perabytes Technology Co ltd
Priority to CN201610108914.9A priority Critical patent/CN105760519B/en
Publication of CN105760519A publication Critical patent/CN105760519A/en
Application granted granted Critical
Publication of CN105760519B publication Critical patent/CN105760519B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/18File system types
    • G06F16/182Distributed file systems
    • G06F16/1824Distributed file systems implemented using Network-attached Storage [NAS] architecture
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/17Details of further file system functions
    • G06F16/176Support for shared access to files; File sharing support
    • G06F16/1767Concurrency control, e.g. optimistic or pessimistic approaches
    • G06F16/1774Locking methods, e.g. locking methods for file systems allowing shared and concurrent access to files

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Data Mining & Analysis (AREA)
  • Databases & Information Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The invention discloses a cluster file system and a file lock distribution method thereof, wherein the cluster file system comprises: the agent module acquires a file lock for a file from the file lock module and receives a plurality of first locking requests of a plurality of service clients for the file; establishing a waiting queue for the first locking requests according to a time sequence, sequentially responding to the first locking requests according to the sequence of the waiting queue, and distributing the file lock to a corresponding service client for holding; when all the service clients do not hold the file lock any more, the waiting queue is empty, and a new first locking request is not received within a subsequent preset time, releasing the file lock; under the state that the agent module does not hold the file lock, the file lock module receives a second locking request from the repair client and distributes the file lock to the repair client for holding; the invention ensures that the front-end service is not influenced when the data is repaired, ensures the performance of the front-end service, fully reuses and utilizes hardware resources and reduces the cost of users.

Description

Cluster file system and file lock distribution method thereof
Technical Field
The present invention relates to the field of data processing technologies, and in particular, to a cluster file system and a file lock allocation method thereof.
Background
The cluster file system is a file system which runs on a plurality of computers and is communicated with each other in a certain mode so as to integrate and virtualize all storage space resources in a cluster and provide file access service for the outside. The method is different from the purposes of local file systems such as NTFS, EXT and the like, wherein the former is used for expandability, and the latter is operated in a single machine environment and is used for purely managing mapping between blocks and files and file attributes. The cluster file system has the characteristic of high availability, namely that the cluster file system can still provide normal file access within a certain limit when suffering from human misoperation, natural fault and the like, copy or erasure technology is generally adopted to protect data, and data synchronization is required after disaster redundant data is degraded; in the process of file access and data synchronous repair, a file lock mechanism is applied, that is, a file can only be accessed by a user with a file lock.
When the existing cluster file system performs data restoration of files, data restoration and front-end services are generally physically isolated by dividing network segments, although bandwidth conflict of front-end service data is eliminated, process pressure conflict between the front-end services and the data restoration cannot be avoided, so that read-write requests of the front-end services can be affected during the data restoration, and a user needs to add a physical link for the data restoration with low probability, so that hardware cost and management operation cost are increased undoubtedly.
Disclosure of Invention
In view of the above, an object of the present invention is to provide a cluster file system and a file lock allocation method thereof, so that a front-end service is not affected when data is repaired, the performance of the front-end service is ensured, the high availability characteristic of the cluster file system is reflected, hardware resources are fully reused, and further, user cost is reduced.
Based on the above object, the present invention provides a file lock allocation method for a cluster file system, where the cluster file system includes: a file lock module and an agent module; the method comprises the following steps:
the agent module acquires a file lock for a file from the file lock module and receives a plurality of first locking requests of a plurality of service clients for the file;
the agent module establishes a waiting queue for the first locking requests according to a time sequence, sequentially responds to the first locking requests according to the sequence of the waiting queue, and distributes the file lock to a corresponding service client for holding;
the agent module monitors the state of the file lock, and releases the file lock when all the service clients do not hold the file lock any more, the waiting queue is empty and a new first locking request is not received in the subsequent preset time;
and under the state that the agent module does not hold the file lock, the file lock module receives a second locking request from the repair client and distributes the file lock to the repair client for holding.
Preferably, after the file lock module allocates the file lock to the repair client for holding, the method further includes the following steps:
and the file lock module monitors the progress of file repair of the file lock held by the repair client, and when the repair data reaches a preset word length, the repair client releases the file lock held by the repair client.
Preferably, the preset word length is 128 k.
Preferably, the proxy module establishes a waiting queue for the first locking requests according to a time sequence, sequentially responds to the first locking requests according to the sequence of the waiting queue, and allocates the file lock to a corresponding service client for holding, and then further includes:
the agent module judges whether a locking interval of a service client currently holding a file lock conflicts with a locking interval required by a next first locking request in the waiting queue, and if so, the next first locking request is kept in the waiting queue; and if not, responding to the next first locking request.
Preferably, the preset time period is as follows: 0-10 s.
In another aspect, the present invention further provides a cluster file system applying the method as described in any one of the above, including a file lock module for allocating a file lock, further including:
the proxy module is used for acquiring a file lock of a file from the file lock module and receiving a plurality of first locking requests of a plurality of service clients to the file; establishing a waiting queue for the first locking requests according to a time sequence, sequentially responding to the first locking requests according to the sequence of the waiting queue, and distributing the file lock to a corresponding service client for holding; monitoring the state of a file lock, and releasing the file lock when all business clients do not hold the file lock any more, the waiting queue is empty and a new first locking request is not received within a subsequent preset time;
the file lock module is further used for receiving a second locking request from the repair client under the state that the agent module does not hold the file lock, and distributing the file lock to the repair client for holding.
Preferably, the file lock module is further configured to: and monitoring the progress of file repair of the file lock held by the repair client, and when the repair data reaches a preset word length, enabling the repair client to release the file lock held by the repair client.
Preferably, the preset word length is 128 k.
Preferably, the agent module is further configured to: judging whether a locking interval of a service client currently holding a file lock conflicts with a locking interval required by a next first locking request in the waiting queue, if so, keeping the next first locking request in the waiting queue; and if not, responding to the next first locking request.
Preferably, the preset time period is as follows: 0-10 s.
As can be seen from the above description, the cluster file system and the file lock allocation method thereof according to the present invention logically isolate the front-end service process from the data repair process, so that the front-end service is not affected during data repair, and specifically have the following advantages:
(1) when the front-end service client has an access request, the back-end data synchronous repair waits.
(2) The method and the system ensure the safety of the service data, reduce the influence of data synchronization on the front-end service, and reduce the hardware cost and the operation management cost.
(3) The back end can automatically utilize the idle time period of the front end access or the time period with smaller access pressure to carry out data synchronous restoration, and the time window of the data synchronous restoration is shortened as much as possible while the front end service is not influenced, thereby improving the data safety.
(4) Professional engineers are not needed to intervene, and the operation and maintenance cost is reduced.
(5) The data synchronization repair can be logically isolated from the front-end service, and the influence of IO conflict on the performance of the front-end service is avoided.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
FIG. 1 is a flowchart of a file lock allocation method of a cluster file system according to an embodiment of the present invention;
fig. 2 is a schematic structural diagram of a cluster file system according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention is described in further detail below with reference to specific embodiments and the accompanying drawings.
It should be noted that all expressions using "first" and "second" in the embodiments of the present invention are used for distinguishing two entities with the same name but different names or different parameters, and it should be noted that "first" and "second" are merely for convenience of description and should not be construed as limitations of the embodiments of the present invention, and they are not described in any more detail in the following embodiments.
The embodiment of the invention provides a cluster file system and a file lock distribution method thereof. The existing cluster file system generally comprises a file lock module used for distributing file locks, and specifically distributes the file locks to corresponding client sides for holding according to the locking requests of the client sides for certain files; after the client finishes the predetermined work, the file lock is released, and the file lock can be distributed to other clients. In the embodiment of the present invention, the file locks used may be read-write locks or mutual exclusion locks, and the use of different types of file locks does not affect the technical effect of the implementation of the present invention, and the specific functions of the above-mentioned types of file locks are the prior art, and are not described in detail in the specification. The clients generally include a service client and a repair client. The service client is generally positioned at the front end of the system, is used by a user and carries out a front-end service process through the service client; the repair client is generally located at the back end of the system, and is used for performing a data repair process of the file.
In this embodiment, the cluster file system includes: the file locking module and the proxy module. Wherein, the file lock module is the same as the prior art, and the user distributes the file lock; the proxy module is a proprietary module of the present invention, and is used for performing distribution management on a locking request (in this embodiment, a first locking request) from a service client. Specifically, the file lock allocation method for the cluster file system in this embodiment includes the following steps:
the agent module acquires a file lock for a file from the file lock module and receives a plurality of first locking requests of a plurality of service clients for the file;
the agent module establishes a waiting queue for the first locking requests according to a time sequence, sequentially responds to the first locking requests according to the sequence of the waiting queue, and distributes the file lock to a corresponding service client for holding;
the agent module monitors the state of the file lock, and releases the file lock when all the service clients do not hold the file lock any more, the waiting queue is empty and a new first locking request is not received in the subsequent preset time;
and under the state that the agent module does not hold the file lock, the file lock module receives a second locking request from the repair client and distributes the file lock to the repair client for holding.
It can be seen from the foregoing embodiments that, in the file lock allocation method for a cluster file system according to the present invention, a first locking request from a service client and a second locking request from a self-repair client are logically isolated, so that the priority of the first locking request is higher than that of the second locking request; in effect, when the front-end service has an access request, the data synchronous repair process can avoid; if the front end has no service access, the back end data synchronous repair process can be almost performed as full as possible. Furthermore, through the setting of the preset duration, the locking priority of the service client and the repair client is flexibly adjusted, and the synchronization speed of the repair client is controlled, so that the repair client can multiplex a physical link, and the user cost is saved. In addition, the method of the invention can also be applied to various data protection algorithms, such as redundant copies, erasure code technology and the like; but also other backend synchronization requirements such as hierarchical storage, data rebalancing, etc.
Referring to fig. 1, a flowchart of a file lock allocation method of a cluster file system according to an embodiment of the present invention is shown.
As a more specific embodiment, the file lock allocation method of the cluster file system includes the following steps:
step 101, the agent module obtains a file lock for a file from the file lock module and receives a plurality of first locking requests from a plurality of service clients for the file.
For a certain file in the cluster file system, the locking request of the service client for the file generally refers to a locking request for different data intervals of the file sent by the same service client and a locking request for the file sent by different service clients, and the locking request is referred to as a first locking request in this embodiment.
In this step, the agent module first obtains the file lock from the file lock module. And under the state that the agent module holds the file lock, first locking requests from the service client are all sent to the agent module for processing.
102, the agent module establishes a waiting queue for the first locking requests according to a time sequence, responds to the first locking requests in sequence according to the waiting queue, and allocates the file lock to a corresponding service client for holding.
For the received first locking requests, a waiting queue is firstly established according to the time sequence of the first locking requests, and the first locking requests are sequentially arranged in the waiting queue according to the time sequence from early to late. And then, sequentially responding according to a plurality of first locking requests in the waiting queue, and further distributing the file lock to the corresponding business client to hold. That is, after the current service client that holds the file lock completes the work and releases the file lock, the file lock does not provide equal acquisition opportunities to all other locking request issuing ends, but the file lock is allocated to the next service client that issues the first locking request in the waiting queue according to the waiting queue.
103, the agent module judges whether a locking interval of the current business client holding the file lock conflicts with a locking interval required by the next first locking request in the waiting queue, if yes, step 104 is executed; if not, go to step 105.
In this step, under the condition that one service client currently holds the file lock, it is further determined whether a locking interval required by a next first locking request in the waiting queue conflicts with a locking interval of the service client currently holding the file lock. The locking interval refers to a file interval which is required to be locked by a first locking request sent by different service clients, and the conflict existing in the locking interval refers to the overlapping part existing in the locking intervals of the two business clients; the fact that the locking intervals are not in conflict means that the locking intervals of the two business clients are not in overlapped parts, and under the condition that the locking intervals are not in overlapped parts, the file locks can be simultaneously distributed to the corresponding two business clients to be held at the same time, and when the two business clients finish respective file data access work, conflict cannot be generated.
Step 104, keeping the next first locking request in the waiting queue.
And when the locking interval of the service client currently holding the file lock conflicts with the locking area required by the next first locking request in the waiting queue, keeping the next first locking request in the waiting queue, and after the service client currently holding the file lock releases the file lock, distributing the file lock to the service client sending the next first locking request in the waiting queue.
And step 105, responding to the next first locking request.
And when the locking interval of the service client currently holding the file lock does not conflict with the locking interval required by the next first locking request in the waiting queue, responding to the next first locking request in the waiting queue, and simultaneously distributing the file lock to the service client sending the next first locking request.
And 106, monitoring the state of the file lock by the agent module, and releasing the file lock when all the service clients do not hold the file lock any more, the waiting queue is empty and a new first locking request is not received in the subsequent preset time.
In this step, the state of the file lock is continuously monitored, and when it is monitored that the file locks held by all the service clients are released and the waiting queue is empty, the file lock is further released when it is continuously monitored that a new first locking request is received and added to the waiting queue within a subsequent preset time period. Specifically, the selectable range of the preset duration is as follows: 0-10 s; the preferred preset duration is set to 1 s.
And step 107, in the state that the agent module does not hold the file lock, the file lock module receives a second locking request from the repair client and distributes the file lock to the repair client for holding.
After the file lock is released by the agent module, the file lock module can receive and respond to a second locking request from the repair client, the file lock is distributed to the repair client to hold according to the second locking request, and the data synchronization repair of the file is started after the repair client holds the file lock.
Step 108, the file lock module monitors the progress of file repair of the file lock held by the repair client, and when the repair data reaches a preset word length, the repair client releases the file lock held by the repair client.
In the process that a file lock is distributed to a repair client to hold, and the repair client holds the file lock to perform data synchronous repair on the file, the progress of file repair of the file lock held by the repair client is monitored, and when the repair data reaches a preset word length, an instruction is immediately sent out to enable the repair client to release the file lock held by the repair client. Preferably, the preset word length is 128 k.
Through the step, the time length for the file lock held by the repair client to carry out data synchronous repair is limited, and when the repair client wants to continue data synchronous repair, the second locking request needs to be sent again, so that the file lock is held by the service client as much as possible, and service data processing is preferably carried out.
Fig. 2 is a schematic diagram of a cluster file system according to an embodiment of the present invention.
On the other hand, the embodiment of the present invention further provides a cluster file system, where the cluster file system applies the file lock allocation method described in the above embodiment. The cluster file system includes, in addition to a file lock module 201 for allocating file locks: the agent module 202.
In this embodiment, the agent module 202 is configured to obtain a file lock for a file from the file lock module 201 and receive a plurality of first locking requests for the file from a plurality of service clients 203; establishing a waiting queue for the first locking requests according to a time sequence, sequentially responding to the first locking requests according to the sequence of the waiting queue, and distributing the file lock to a corresponding service client 203 for holding; monitoring the state of the file lock, and releasing the file lock when all the service clients 203 do not hold the file lock any more, the waiting queue is empty and a new first locking request is not received within a subsequent preset time;
in addition, in this embodiment, the file lock module 201 is further configured to receive a second locking request from the repairing client 204 in a state that the proxy module 202 does not hold a file lock, and allocate the file lock to the repairing client 204.
In a preferred embodiment, the file lock module 201 is further configured to: monitoring the progress of file repair of the file lock held by the repair client 204, and when the repair data reaches a preset word length, enabling the repair client 204 to release the file lock held by the repair client 204. Wherein the preset word length is 128 k.
In a preferred embodiment, the agent module 202 is further configured to: judging whether a locking interval of the service client 203 currently holding the file lock conflicts with a locking interval required by the next first locking request in the waiting queue, if so, keeping the next first locking request in the waiting queue; and if not, responding to the next first locking request. Wherein the preset duration is: 0-10 s; preferably, the preset time period is 1 s.
Those of ordinary skill in the art will understand that: the discussion of any embodiment above is meant to be exemplary only, and is not intended to intimate that the scope of the disclosure, including the claims, is limited to these examples; within the idea of the invention, also features in the above embodiments or in different embodiments may be combined, steps may be implemented in any order, and there are many other variations of the different aspects of the invention as described above, which are not provided in detail for the sake of brevity. Therefore, any omissions, modifications, substitutions, improvements and the like that may be made without departing from the spirit and principles of the invention are intended to be included within the scope of the invention.

Claims (8)

1. A file lock allocation method of a cluster file system is characterized in that the cluster file system comprises the following steps: the system comprises a file lock module used for distributing file locks, and an agent module used for distributing and managing a first locking request from a service client; the method comprises the following steps:
the agent module acquires a file lock for a file from the file lock module and receives a plurality of first locking requests of a plurality of service clients for the file;
the agent module establishes a waiting queue for the first locking requests according to a time sequence, sequentially responds to the first locking requests according to the sequence of the waiting queue, and distributes the file lock to a corresponding service client for holding;
the agent module monitors the state of the file lock, and releases the file lock when all the service clients do not hold the file lock any more, the waiting queue is empty and a new first locking request is not received in the subsequent preset time;
under the state that the agent module does not hold the file lock, the file lock module receives a second locking request from a repair client and distributes the file lock to the repair client;
after the file lock module allocates a file lock to the repair client for holding, the method further comprises the following steps:
and the file lock module monitors the progress of file repair of the file lock held by the repair client, and when the repair data reaches a preset word length, the repair client releases the file lock held by the repair client.
2. The method of claim 1, wherein the predetermined word size is 128 k.
3. The method according to claim 1, wherein the agent module establishes a waiting queue for the first locking requests according to a time sequence, sequentially responds to the first locking requests according to the sequence of the waiting queue, and after allocating the file lock to a corresponding service client for holding, further comprises:
the agent module judges whether a locking interval of a service client currently holding a file lock conflicts with a locking interval required by a next first locking request in the waiting queue, and if so, the next first locking request is kept in the waiting queue; and if not, responding to the next first locking request.
4. The method of claim 1, wherein the preset duration is: 0-10 s.
5. A cluster file system applying the method of any one of claims 1 to 4, comprising a file lock module for assigning a file lock, further comprising:
the proxy module is used for acquiring a file lock of a file from the file lock module and receiving a plurality of first locking requests of a plurality of service clients to the file; establishing a waiting queue for the first locking requests according to a time sequence, sequentially responding to the first locking requests according to the sequence of the waiting queue, and distributing the file lock to a corresponding service client for holding; monitoring the state of a file lock, and releasing the file lock when all business clients do not hold the file lock any more, the waiting queue is empty and a new first locking request is not received within a subsequent preset time;
the file lock module is further used for receiving a second locking request from the repair client under the state that the agent module does not hold the file lock, and distributing the file lock to the repair client;
the file lock module is further to: and monitoring the progress of file repair of the file lock held by the repair client, and when the repair data reaches a preset word length, enabling the repair client to release the file lock held by the repair client.
6. The clustered file system of claim 5 wherein the preset word size is 128 k.
7. The clustered file system of claim 5, wherein the proxy module is further configured to: judging whether a locking interval of a service client currently holding a file lock conflicts with a locking interval required by a next first locking request in the waiting queue, if so, keeping the next first locking request in the waiting queue; and if not, responding to the next first locking request.
8. The clustered file system of claim 5 wherein the preset duration is: 0-10 s.
CN201610108914.9A 2016-02-26 2016-02-26 Cluster file system and file lock distribution method thereof Active CN105760519B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610108914.9A CN105760519B (en) 2016-02-26 2016-02-26 Cluster file system and file lock distribution method thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610108914.9A CN105760519B (en) 2016-02-26 2016-02-26 Cluster file system and file lock distribution method thereof

Publications (2)

Publication Number Publication Date
CN105760519A CN105760519A (en) 2016-07-13
CN105760519B true CN105760519B (en) 2020-08-28

Family

ID=56331374

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610108914.9A Active CN105760519B (en) 2016-02-26 2016-02-26 Cluster file system and file lock distribution method thereof

Country Status (1)

Country Link
CN (1) CN105760519B (en)

Families Citing this family (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107181789A (en) * 2017-03-31 2017-09-19 北京奇艺世纪科技有限公司 A kind of distributed lock implementation method and device
CN107016094B (en) * 2017-04-06 2020-11-17 深圳创维-Rgb电子有限公司 Project shared file multi-person collaborative development method, device and system
CN107423454B (en) * 2017-09-22 2021-01-12 苏州浪潮智能科技有限公司 Method, device and equipment for processing file lock in distributed file system
CN110008031B (en) * 2018-01-05 2022-04-15 北京金山云网络技术有限公司 Device operation method, cluster system, electronic device and readable storage medium
CN110968563B (en) * 2018-09-29 2023-11-17 华为技术有限公司 Data storage method, metadata server and client
CN109408477A (en) * 2018-10-09 2019-03-01 郑州云海信息技术有限公司 A kind of method, system and associated component that setting group document is locked
CN109412891B (en) * 2018-10-19 2022-04-22 郑州云海信息技术有限公司 Method and device for detecting client state
CN109743366B (en) * 2018-12-21 2022-04-05 苏宁易购集团股份有限公司 Resource locking method, device and system for multi-living scene
CN113760369A (en) * 2020-09-29 2021-12-07 北京沃东天骏信息技术有限公司 Concurrent thread processing method, concurrent thread processing device, electronic equipment and storage medium
CN114116639B (en) * 2022-01-27 2022-04-29 苏州浪潮智能科技有限公司 Method, device, equipment and medium for setting cluster file lock

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103488526A (en) * 2013-09-02 2014-01-01 用友软件股份有限公司 System and method for locking business resource in distributed system
CN103514298A (en) * 2013-10-16 2014-01-15 浪潮(北京)电子信息产业有限公司 Method for achieving file lock and metadata server
CN103795801A (en) * 2014-02-12 2014-05-14 浪潮电子信息产业股份有限公司 Metadata group design method based on real-time application group

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5828876A (en) * 1996-07-31 1998-10-27 Ncr Corporation File system for a clustered processing system
CN100432940C (en) * 2006-10-19 2008-11-12 华为技术有限公司 Method for distributing shared resource lock in computer cluster system and cluster system
CN104484236B (en) * 2014-11-28 2017-11-03 曙光云计算集团有限公司 A kind of HA accesses adaptive method

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103488526A (en) * 2013-09-02 2014-01-01 用友软件股份有限公司 System and method for locking business resource in distributed system
CN103514298A (en) * 2013-10-16 2014-01-15 浪潮(北京)电子信息产业有限公司 Method for achieving file lock and metadata server
CN103795801A (en) * 2014-02-12 2014-05-14 浪潮电子信息产业股份有限公司 Metadata group design method based on real-time application group

Also Published As

Publication number Publication date
CN105760519A (en) 2016-07-13

Similar Documents

Publication Publication Date Title
CN105760519B (en) Cluster file system and file lock distribution method thereof
US9189268B2 (en) Limiting simultaneous data transfers and efficient throttle management
EP3567829B1 (en) Resource management method and apparatus
CN110941481A (en) Resource scheduling method, device and system
JP5510556B2 (en) Method and system for managing virtual machine storage space and physical hosts
US8352434B2 (en) Performing scheduled backups of a backup node associated with a plurality of agent nodes
US8850156B2 (en) Method and system for managing virtual machine storage space and physical host
US10778750B2 (en) Server computer management system for supporting highly available virtual desktops of multiple different tenants
US9319281B2 (en) Resource management method, resource management device, and program product
US11888933B2 (en) Cloud service processing method and device, cloud server, cloud service system and storage medium
US20130282795A1 (en) Method And Apparatus for Web Based Storage On Demand
US9104501B2 (en) Preparing parallel tasks to use a synchronization register
KR101714412B1 (en) Method and apparatus for organizing database system in cloud environment
CN111694658A (en) CPU resource allocation method, device, electronic equipment and storage medium
US7219345B2 (en) System and method for terminating processes in a distributed computing system
CN108352995B (en) SMB service fault processing method and storage device
WO2018010603A1 (en) Storage mode upgrade method, apparatus and system based on video cloud storage system
CN110046138B (en) iSCSI target multi-instance processing method and distributed storage system
CN114172903B (en) Node capacity expansion method, device, equipment and medium of slm scheduling system
CN111857548B (en) Data reading method, device and system
CN116112499B (en) Construction method of data acquisition system and data acquisition method
CN117668010A (en) Task processing method, electronic device and storage medium
US20230393882A1 (en) Management of virtual machine shutdowns in a computing environment based on resource locks
CN117993922A (en) Method and device for determining ticket number and electronic equipment
CN110737489A (en) intelligent high-performance computing centers

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20210902

Address after: 271024 Taishan science and Technology Industrial Park, high tech Zone, Tai'an City, Shandong Province

Patentee after: Shandong whale shark Information Technology Co.,Ltd.

Address before: 100195 Room 101, 1st floor, building 31, yuquanhuigu, No.3 minzhuang Road, Yuquanshan, Haidian District, Beijing

Patentee before: PERABYTES TECHNOLOGY Co.,Ltd.

TR01 Transfer of patent right