CN107818035B - NPIV authenticity verification method based on multi-control MCS system - Google Patents

NPIV authenticity verification method based on multi-control MCS system Download PDF

Info

Publication number
CN107818035B
CN107818035B CN201711027386.5A CN201711027386A CN107818035B CN 107818035 B CN107818035 B CN 107818035B CN 201711027386 A CN201711027386 A CN 201711027386A CN 107818035 B CN107818035 B CN 107818035B
Authority
CN
China
Prior art keywords
state
npiv
storage system
server
function
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201711027386.5A
Other languages
Chinese (zh)
Other versions
CN107818035A (en
Inventor
李顺歌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Suzhou Inspur Intelligent Technology Co Ltd
Original Assignee
Suzhou Inspur Intelligent Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Suzhou Inspur Intelligent Technology Co Ltd filed Critical Suzhou Inspur Intelligent Technology Co Ltd
Priority to CN201711027386.5A priority Critical patent/CN107818035B/en
Publication of CN107818035A publication Critical patent/CN107818035A/en
Application granted granted Critical
Publication of CN107818035B publication Critical patent/CN107818035B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/3003Monitoring arrangements specially adapted to the computing system or computing system component being monitored
    • G06F11/3041Monitoring arrangements specially adapted to the computing system or computing system component being monitored where the computing system component is an input/output interface
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/3003Monitoring arrangements specially adapted to the computing system or computing system component being monitored
    • G06F11/3006Monitoring arrangements specially adapted to the computing system or computing system component being monitored where the computing system is distributed, e.g. networked systems, clusters, multiprocessor systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computing Systems (AREA)
  • Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Mathematical Physics (AREA)
  • Quality & Reliability (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)
  • Debugging And Monitoring (AREA)

Abstract

The invention discloses an NPIV authenticity verification method based on a multi-control MCS system, and relates to the field of virtual verification of a port of a storage system; on a server, carrying out long-time IO stream transmission on a storage disk, simultaneously opening an NPIV function of a switch, repeatedly switching the state of the NPIV function on a storage system, trying to switch any node into a service state or an off-line state aiming at each state of the NPIV function on the storage system, and simultaneously observing whether the state of the IO stream is stable, whether the multipath state of the server is normal or not and whether a virtual port among multiple controllers on the storage system can normally drift or not; the method can focus on the running state of the IO stream in the system through the drift results of the physical port and the virtual port among the multiple controllers, verify the authenticity of the stored NPIV and fill the blank of the authenticity testing method of the stored NPIV, and has the advantages of simple and effective implementation and high reliability.

Description

NPIV authenticity verification method based on multi-control MCS system
Technical Field
The invention discloses an NPIV authenticity verification method, relates to the field of virtual verification of ports of storage systems, and particularly relates to an NPIV authenticity verification method based on a multi-control MCS system.
Background
With the advent of the big data age, data has become the most important wealth for businesses, institutions, and individuals. Data concentration becomes a trend, and more enterprises select to build a cloud storage system or directly migrate data to a cloud. As a result, the storage system is convenient and has higher requirements for stability and reliability.
At present, most of storage systems adopt a multi-controller redundancy mode, and the safety and reliability of the systems are improved. However, when one node in the multi-control storage system is down, the server will report a large amount of abnormal logs of port down and WWPN switching. The storage system may also be in a degraded state and performance may degrade under high load. The extremely poor experience is brought to the user, and the acceptance of the user to the product is reduced. When a node is down, the WWPN of the virtual port is automatically migrated to other nodes, a host end cannot sense the function, a multicast path cannot be changed, and the influence of storage faults on IO of the host is reduced. However, currently, there is no method for verifying the authenticity of the NPIV function, so as to verify the validity and reliability of the NPIV function, therefore, the present invention provides a method for verifying the authenticity of the NPIV based on a multi-control MCS system, and a system composed of the multi-control MCS system, a switch and a server, wherein the method focuses on the operating state of IO streams in the system, verifies the authenticity of the stored NPIV, and fills the blank of the method for testing the authenticity of the stored NPIV through the drift of physical ports and virtual ports among multiple controllers.
NPIV is called N-Port ID Virtualization, which is the Fabric ID obtained after the N Port logs into the Fabric network. The NPIV is a technology at the host end, has a fiber channel function, and enables an N port on a physical HBA card at the host end to virtualize a plurality of WWPNs, so that the physical HBA card at the host can register the own WWPN into a Fabric network and then register the virtualized WWPN into the network, and thus a plurality of N-PortIDs are obtained on one N port.
The multi-control MCS System, a multiple Controller System, and the multi-Controller System have the characteristics of low cost, expandability, high performance, easy use, fault tolerance, load balance and the like.
Disclosure of Invention
Aiming at the requirements and the defects of the prior art development, the invention provides an NPIV authenticity verification method based on a multi-control MCS system.
An NPIV authenticity verification method based on a multi-control MCS system, which deploys a verification environment, connects a storage system and a server through a switch,
on the server, long-time IO stream transmission is carried out on the storage disk, the NPIV function of the switch is opened at the same time, the state of the NPIV function on the storage system is repeatedly switched,
aiming at each state of NPIV function on the storage system, any node is tried to be switched into a service state or an off-line state, and whether the state of an IO stream is stable or not, whether the multipath state of a server is normal or not and whether a virtual port among multiple controllers on the storage system can drift normally or not are observed.
The method repeatedly switches between the enabling, transition and disabling states of the NPIV function on the storage system.
The method directly switches any node into a service state or an offline state through a web or a command line aiming at each state of the NPIV function on the storage system.
The method utilizes the IOmeter, pdtest or vdbech to observe whether the state of the IO stream is stable or not, whether the multipath state of the server is normal or not and whether the virtual ports among the multiple controllers on the storage system can drift normally or not.
An NPIV authenticity verification system based on a multi-control MCS system comprises a storage system, a server and a switch, wherein the storage system is connected with the server through the switch, a verification environment is deployed, long-time IO stream transmission is carried out on a storage disk on the server, an NPIV function of the switch is opened, and the state of the NPIV function on the storage system is repeatedly switched,
aiming at each state of NPIV function on the storage system, any node is tried to be switched into a service state or an off-line state, and whether the state of an IO stream is stable or not, whether the multipath state of a server is normal or not and whether a virtual port among multiple controllers on the storage system can drift normally or not are observed.
The system repeatedly switches between the enabling, transition and disabling states of the NPIV function on the storage system.
The system directly switches any node into a service state or an offline state through a web or a command line aiming at each state of the NPIV function on the storage system.
Compared with the prior art, the invention has the beneficial effects that:
the invention provides a NPIV authenticity verification method based on a multi-control MCS system, based on a system consisting of the multi-control MCS system, a switch and a server, on the server, carrying out long-time IO stream transmission on a storage disk, simultaneously opening an NPIV function of the switch, repeatedly switching the state of the NPIV function on the storage system, trying to switch any node into a service state or an off-line state aiming at each state of the NPIV function on the storage system, and simultaneously observing whether the state of the IO stream is stable, whether the multipath state of the server is normal or not, and whether a virtual port among multiple controllers on the storage system can normally drift or not; the method can focus on the running state of the IO stream in the system through the drift results of the physical port and the virtual port among the multiple controllers, verify the authenticity of the stored NPIV and fill the blank of the authenticity testing method of the stored NPIV, and has the advantages of simple and effective implementation and high reliability.
Drawings
FIG. 1 is a block diagram of the system deployment of the present invention;
FIG. 2 is a schematic flow chart of the method of the present invention.
Detailed Description
The invention provides an NPIV authenticity verification method based on a multi-control MCS system, which deploys a verification environment, connects a storage system and a server through a switch,
on the server, long-time IO stream transmission is carried out on the storage disk, the NPIV function of the switch is opened at the same time, the state of the NPIV function on the storage system is repeatedly switched,
aiming at each state of NPIV function on the storage system, any node is tried to be switched into a service state or an off-line state, and whether the state of an IO stream is stable or not, whether the multipath state of a server is normal or not and whether a virtual port among multiple controllers on the storage system can drift normally or not are observed.
Meanwhile, an NPIV authenticity verification system based on the multi-control MCS system corresponding to the method is provided.
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention is further described in detail with reference to specific embodiments below.
By utilizing the method of the invention, in the deployment verification environment, the storage system is connected with the NF5270M4 server through an FS5800 switch,
on an NF5270M4 server, carrying out IO stream transmission on a storage disk for a certain time according to actual conditions, simultaneously opening the NPIV function of an FS5800 switch, and repeatedly switching between enabling, transition and disabling states of the NPIV function on a storage system;
for each state of the NPIV function on the storage system, any node is directly switched into a service state or an off-line state through a web or a command line, and meanwhile, an IOmeter tool is used for observing whether the state of an IO stream is stable, whether the multipath state of a server is normal or not and whether a virtual port among multiple controllers on the storage system can drift normally or not.
After three times of verification, the verification results are the same as the following results:
IO flow: no interruption, no error;
multipath of the server: the state is normal, the path is normal, and the number of the multiple paths of the disk of the transition state server is doubled;
and (3) storing: starting: in the node service state, the virtual port is migrated to other control nodes;
and (3) transition: in the node service state, the virtual port is migrated to other control nodes;
and (3) disabling: and the node service state is realized, no virtual port exists, and no drift occurs.
The result can be observed by using pdtest or vdbech tools, and the verification result shows that the NPIV function on the storage system is normally effective.
The above is only one of the specific implementations of the present disclosure, and the verification process of the present disclosure can be adjusted according to actual situations without departing from the technical solution of the present disclosure.

Claims (7)

1. A NPIV authenticity verification method based on a multi-controller MCS system is characterized in that a verification environment is deployed, a storage system based on the multi-controller MCS and a server are connected through a switch,
on the server, IO stream transmission is carried out on the storage disk for a certain time, simultaneously NPIV function of the switch is opened, and the state of the NPIV function on the storage system is repeatedly switched,
aiming at each state of NPIV function on the storage system, any node is tried to be switched into a service state or an off-line state, and whether the state of an IO stream is stable, whether the multipath state of a server is normal and whether virtual ports among multiple controllers on the storage system can drift normally are observed.
2. The method of claim 1, wherein the switching between the enabled, transitional, and disabled states of the NPIV function on the storage system is repeated.
3. A method according to claim 1 or 2, characterized by switching directly either node into service state or offline state for each state of NPIV functions on the storage system via web or command line.
4. The method of claim 3, wherein the IOmeter, pdtest or vdbech is used to observe whether the status of the IO stream is stable, whether the multipath status of the server is normal, and whether the virtual ports between the multiple controllers on the storage system can drift normally.
5. An NPIV authenticity verification system based on a multi-controller MCS system is characterized by comprising a storage system based on the multi-controller MCS, a server and a switch, wherein the storage system is connected with the server through the switch, a verification environment is deployed, long-time IO stream transmission is carried out on a storage disk on the server, the NPIV function of the switch is opened, and the state of the NPIV function on the storage system is repeatedly switched,
aiming at each state of NPIV function on the storage system, any node is tried to be switched into a service state or an off-line state, and whether the state of an IO stream is stable, whether the multipath state of a server is normal and whether virtual ports among multiple controllers on the storage system can drift normally are observed.
6. The system of claim 5, wherein the switching between the enabled, transitional, and disabled states of the NPIV function on the storage system is repeated.
7. The system according to claim 5 or 6, characterized in that for each state of the NPIV function on the storage system either node is directly switched to the service state or to the offline state via the web or command line.
CN201711027386.5A 2017-10-27 2017-10-27 NPIV authenticity verification method based on multi-control MCS system Active CN107818035B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711027386.5A CN107818035B (en) 2017-10-27 2017-10-27 NPIV authenticity verification method based on multi-control MCS system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711027386.5A CN107818035B (en) 2017-10-27 2017-10-27 NPIV authenticity verification method based on multi-control MCS system

Publications (2)

Publication Number Publication Date
CN107818035A CN107818035A (en) 2018-03-20
CN107818035B true CN107818035B (en) 2020-09-22

Family

ID=61603992

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711027386.5A Active CN107818035B (en) 2017-10-27 2017-10-27 NPIV authenticity verification method based on multi-control MCS system

Country Status (1)

Country Link
CN (1) CN107818035B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107911247A (en) * 2017-11-27 2018-04-13 郑州云海信息技术有限公司 A kind of NPIV implementation methods based on more control MCS systems
CN109358990A (en) * 2018-11-01 2019-02-19 郑州云海信息技术有限公司 Information transferring method, device and storage medium in a kind of more control systems

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101944953A (en) * 2010-09-26 2011-01-12 浪潮(北京)电子信息产业有限公司 Method and device for transmitting data in optical network
CN103414588A (en) * 2013-08-12 2013-11-27 深圳市华为技术软件有限公司 VTL backup method and VTL nodes
CN103561128A (en) * 2013-11-04 2014-02-05 福建星网锐捷网络有限公司 FC ID recycling method and network equipment
CN104484293A (en) * 2014-11-20 2015-04-01 浪潮(北京)电子信息产业有限公司 Method and apparatus for implementing front-end protocol in multi-control storage system
CN106888111A (en) * 2016-12-30 2017-06-23 北京同有飞骥科技股份有限公司 A kind of method of solution dual computer group FC SAN switchings

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP4620776B2 (en) * 2005-07-01 2011-01-26 インターナショナル・ビジネス・マシーンズ・コーポレーション Method and system for managing virtual instances of physical ports attached to a network

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101944953A (en) * 2010-09-26 2011-01-12 浪潮(北京)电子信息产业有限公司 Method and device for transmitting data in optical network
CN103414588A (en) * 2013-08-12 2013-11-27 深圳市华为技术软件有限公司 VTL backup method and VTL nodes
CN103561128A (en) * 2013-11-04 2014-02-05 福建星网锐捷网络有限公司 FC ID recycling method and network equipment
CN104484293A (en) * 2014-11-20 2015-04-01 浪潮(北京)电子信息产业有限公司 Method and apparatus for implementing front-end protocol in multi-control storage system
CN106888111A (en) * 2016-12-30 2017-06-23 北京同有飞骥科技股份有限公司 A kind of method of solution dual computer group FC SAN switchings

Also Published As

Publication number Publication date
CN107818035A (en) 2018-03-20

Similar Documents

Publication Publication Date Title
US10606496B1 (en) Host device with multi-path layer implementing automatic standby setting for active-active configuration
US8644132B2 (en) Maintaining a communication path from a host to a storage subsystem in a network
CN105511805B (en) The data processing method and device of cluster file system
Rehman et al. Fault-tolerance in the scope of software-defined networking (sdn)
US9298566B2 (en) Automatic cluster-based failover handling
CN111917846A (en) Kafka cluster switching method, device and system, electronic equipment and readable storage medium
CN106888111B (en) A method of solving dual computer group FC-SAN switching
CN107818035B (en) NPIV authenticity verification method based on multi-control MCS system
CN103746884A (en) Method and system for testing flow through switchboard
CN109120522B (en) Multipath state monitoring method and device
CN103944750A (en) Method and device for processing bonded network card faults
CN103139033A (en) Primary device redundancy switching method of single main communication control bus
CN101471830A (en) Method for accessing remote logic equipment through multiple routes in Linux system
US20090265577A1 (en) Method of managing paths for an externally-connected storage system and method of detecting a fault site
CA3214690A1 (en) Passive optical network for utility infrastructure resiliency
CN107704354B (en) Test method for port virtualization of multi-control storage system
CN111130917B (en) Line testing method, device and system
US9400605B2 (en) Efficient management of a virtual tape library cluster
US20090296697A1 (en) Method for verifying shared state synchronization of redundant modules in a high availability network switch
CN108268210B (en) Information processing method, computing node and storage node
CN107911247A (en) A kind of NPIV implementation methods based on more control MCS systems
CN113014451B (en) System and method for testing redundancy reliability of dual-core local area network
KR101335615B1 (en) Network control device
US9876874B2 (en) Network selecting apparatus and operating method thereof
CN102413047A (en) Three-layer network device and route distribution method of same

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20200821

Address after: 215100 No. 1 Guanpu Road, Guoxiang Street, Wuzhong Economic Development Zone, Suzhou City, Jiangsu Province

Applicant after: SUZHOU LANGCHAO INTELLIGENT TECHNOLOGY Co.,Ltd.

Address before: 450000 Henan province Zheng Dong New District of Zhengzhou City Xinyi Road No. 278 16 floor room 1601

Applicant before: ZHENGZHOU YUNHAI INFORMATION TECHNOLOGY Co.,Ltd.

GR01 Patent grant
GR01 Patent grant