CN108366087A - A kind of ISCSI service implementing methods and device based on distributed file system - Google Patents

A kind of ISCSI service implementing methods and device based on distributed file system Download PDF

Info

Publication number
CN108366087A
CN108366087A CN201711427584.0A CN201711427584A CN108366087A CN 108366087 A CN108366087 A CN 108366087A CN 201711427584 A CN201711427584 A CN 201711427584A CN 108366087 A CN108366087 A CN 108366087A
Authority
CN
China
Prior art keywords
iscsi
target
initiator
available
iscsi target
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201711427584.0A
Other languages
Chinese (zh)
Other versions
CN108366087B (en
Inventor
柯江灵
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
UIT STORAGE TECHNOLOGY (SHENZHEN) Co Ltd
Original Assignee
UIT STORAGE TECHNOLOGY (SHENZHEN) Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by UIT STORAGE TECHNOLOGY (SHENZHEN) Co Ltd filed Critical UIT STORAGE TECHNOLOGY (SHENZHEN) Co Ltd
Priority to CN201711427584.0A priority Critical patent/CN108366087B/en
Publication of CN108366087A publication Critical patent/CN108366087A/en
Application granted granted Critical
Publication of CN108366087B publication Critical patent/CN108366087B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1001Protocols in which an application is distributed across nodes in the network for accessing one among a plurality of replicated servers
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/17Details of further file system functions
    • G06F16/176Support for shared access to files; File sharing support
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/18File system types
    • G06F16/182Distributed file systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/14Session management

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Mining & Analysis (AREA)
  • Databases & Information Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The present invention provides a kind of ISCSI service implementing methods and device based on distributed file system, the distributed file system includes management node and back end, and multiple ISCSI Target are disposed on each back end;This method is applied to the management node, including:Safeguard that one includes that the Target of the ISCSI Target information on all back end shares list;When ISCSI Initiator start, Target is shared into the corresponding all available ISCSI Target of ISCSI Initiator described in list and is supplied to the ISCSI Initiator, is connected so that the ISCSI Initiator are established with any available ISCSI Target;Receive the reading and writing data request from the ISCSI Initiator of any available ISCSI Target forwardings, operation is written and read to the back end in distributed file system based on reading and writing data request, and read-write operation result is returned to the ISCSI Initiator by any available ISCSI Target.

Description

A kind of ISCSI service implementing methods and device based on distributed file system
Technical field
The present invention relates to computer memory technical field, more particularly to a kind of ISCSI clothes based on distributed file system Pragmatic existing method and apparatus.
Background technology
Cloud storage is in new concept cloud computing (cloud computing) conceptive extension and developed. Cloud storage is a kind of framework, refer to by functions such as cluster application, grid or distributed file systems, will be a large amount of in network Various types of storage device gathers collaborative work by application software, common externally to provide data storage and business One system of access function.
ISCSI is a serious achievement of SCSI over IP, be one for hardware device use can be in IP agreement Upper layer operation SCSI command collection.Briefly, ISCSI may be implemented to run SCSI protocol on ip networks, can It is routed on such as high speed gigabit Ethernet.SAN (Storage Area Network) is in order to carry SCSI protocol High bandwidth, generally take optical-fibre channel realize networking, directly contribute in this way cost of implementation costliness.In order to reduce networking cost, Protect most of client in the existing investment of IP network simultaneously, industry is dedicated to the research to SCSI over IP agreements.
Invention content
In view of this, the purpose of the present invention is to provide a kind of, the ISCSI based on distributed file system services realization side Method and device can reduce the networking cost of distributed file system.
In order to achieve the above object, the present invention provides following technical solutions:
A kind of ISCSI service implementing methods based on distributed file system, the distributed file system include management Node and back end dispose multiple ISCSI Target on each back end;This method is applied to the management node, packet It includes:
Safeguard that one includes that the Target of the ISCSI Target information on all back end shares list;
When ISCSI Initiator start, Target is shared into the corresponding institutes of ISCSI Initiator described in list There are available ISCSI Target to be supplied to the ISCSI Initiator, so that the ISCSI Initiator can be used with any ISCSI Target establish connection;
The reading and writing data from the ISCSI Initiator for receiving any available ISCSI Target forwardings is asked It asks, operation is written and read to the back end in distributed file system based on reading and writing data request, and by described any ISCSI Target can be used to return to read-write operation result to the ISCSI Initiator.
A kind of ISCSI service realization devices based on distributed file system, the distributed file system includes management Node and back end dispose multiple ISCSI Target on each back end;The device is applied to the management node, packet It includes:Maintenance unit, connection control unit, read-write control unit;
The maintenance unit, for safeguarding that one includes that the Target of the ISCSI Target information on all back end is total to Enjoy list;
The connection control unit, for when ISCSI Initiator start, Target to be shared described in list The corresponding all available ISCSI Target of ISCSI Initiator are supplied to the ISCSI Initiator, so that described ISCSI Initiator are established with any available ISCSI Target and are connected;
The read-write control unit comes from the ISCSI for receive any available ISCSI Target forwarding The reading and writing data of Initiator is asked, and is read the back end in distributed file system based on reading and writing data request Write operation, and read-write operation result is returned to the ISCSI Initiator by any available ISCSI Target.
As can be seen from the above technical solution, it in the present invention, can be disposed in each back end of distributed file system Multiple ISCSI target carry out the connection status of each ISCSI target by the management node in distributed file system Target share directories are monitored and are updated to, so that management node can be determined respectively based on above-mentioned Target share directories The available ISCSI target of ISCSI Initiator are realized logical between ISCSI Initiator and ISCSI target Fuse tube is managed.The present invention can effectively reduce the networking cost of distributed file system.
Description of the drawings
Fig. 1 is ISCSI service architecture schematic diagram of the embodiment of the present invention based on distributed file system
Fig. 2 is ISCSI service implementing method flow chart of the embodiment of the present invention based on distributed file system;
Fig. 3 is the structural schematic diagram of ISCSI service realization device of the embodiment of the present invention based on distributed file system.
Specific implementation mode
In order to make the purpose , technical scheme and advantage of the present invention be clearer, below in conjunction with the accompanying drawings and according to embodiment, Technical scheme of the present invention is described in detail.
It is ISCSI service architecture schematic diagram of the embodiment of the present invention based on distributed file system referring to Fig. 1, Fig. 1, such as schemes Shown in 1, distributed file system includes management node and back end, ISCSI Initiator (ISCSI starters) deployment The client of all kinds of operating system platforms except distributed file system;ISCSI target are then deployed in distributed document On the back end of system, and multiple ISCSI target (ISCSI object machines) can be disposed on each back end.
In service architecture shown in Fig. 1, management node is responsible for relevant configuration and the management of ISCSI Initiator, and The management communicated between ISCSI Initiator and ISCSI target.
The realization of the present invention is described in detail with reference to specific embodiment.
It is ISCSI service implementing method flow chart of the embodiment of the present invention based on distributed file system referring to Fig. 2, Fig. 2, This method is applied to the management node of distributed file system, specifically includes following steps:
Step 101 safeguards that one includes that the Target of the ISCSI Target information on all back end shares list.
Target shares in list, and ISCSI Target information includes the connection status of ISCSI Target.
The connection status of ISCSI Target and ISCSI Initiator includes following several:
1, it has connected:ISCSI Target have built up with an ISCSI Initiator and connect.
2, positive connection:ISCSI Target are being established with an ISCSI Initiator and are being connect.
3, it is not connected with:ISCSI Target are not yet established with any ISCSI Initiator and are connected.
4, not running:ISCSI Target are not actuated, cannot establish and connect with ISCSI Initiator.
It, can be by monitoring the connection status of the ISCSI Target on all back end and being updated in the present embodiment The method that the Target shares list realizes the updating maintenance to sharing list, specifically, each ISCSI on back end Target can periodically report the connection state information of itself, only can also report itself when itself connection status changes Connection state information.Management node receives the connection state information that each ISCSI Target are reported, and according to the company received It meets state information updating Target and shares list.
Step 202, when ISCSI Initiator start, Target is shared into ISCSI Initiator described in list Corresponding all available ISCSI Target are supplied to the ISCSI Initiator so that the ISCSI Initiator with Any available ISCSI Target establish connection.
In existing realization, after ISCSI Initiator start, need to establish connection with an ISCSI Target, it Afterwards, user can just be written and read ISCSI Target by ISCSI Initiator, to realize to distributed storage system The data access of system.
In the present invention, the specific ISCSI on corresponding specific data node is configured for each ISCSI Initiator Target.The corresponding specific data nodes of the ISCSI Initiator can be any data section on distributed management system Point, specific ISCSI Target refer to the not connected ISCSI Target of one on the specific data node.In practical realization In, it can be according to certain rule, such as start time order and function, to all not connected ISCSI on the specific data node Target is ranked up, and the first ISCSI Target of sorting determine the specific ISCSI Target.
It should be noted that the specific ISCSI Target on the corresponding specific data node of each ISCSI Initiator It may be the same or different.Specifically determined by user configuration.
Specific ISCSI Target that can be on its corresponding specific data node after ISCSI Initiator startups are sent out The first Target is sent to ask;After the specific ISCSI Target receive the first Target requests, generates the 2nd Target and ask It asks, the ISCSI Initiator carried during the first Target is asked are carried in the 2nd Target requests and are sent to Management node;After what management saved receives the 2nd Target requests, it can be arranged according to the 2nd Target requests and Target are shared Table determines the corresponding all available ISCSI Target of the ISCSI Initiator, and all available ISCSI Target are returned Return the described specific ISCSI Target;All available ISCSI Target are returned to this by the specific ISCSI Target again ISCSI Initiator, to which user can select to determine the ISCSI Initiator are built with which available ISCSI Target Vertical connection.
Therefore, in this step 202, it is corresponding all available that Target is shared into ISCSI Initiator described in list ISCSI Target are supplied to the ISCSI Initiator, specifically include:
Receive the 2nd Target requests that the specific ISCSI Target of the ISCSI Initiator are sent;This second Target requests are after the specific ISCSI Target receive the first Target requests that the ISCSI Initiator are sent It generates;
According to the 2nd Target requests and the shared lists of Target determine the ISCSI Initiator it is corresponding it is all can With ISCSI Target, all available ISCSI Target are returned into the described specific ISCSI Target, by the specific ISCSI All available ISCSI Target are returned to the ISCSI Initiator by Target.
In practical implementations, before ISCSI Target are without the broken connection with a certain ISCSI Initiator, He cannot establish a connection with the ISCSI Target at ISCSI Initiator namely ISCSI Initiator and ISCSI Target is one-to-one correspondence.
Therefore, for ISCSI Target, if its connection status is above-mentioned 1st connection status (having connected), Other than having established a connection ISCSI Initiator, does not allow it to be established again with other ISCSI Initiator and connect; Its connection status is above-mentioned 2nd connection status (positive connection), then other than card establishes a connection ISCSI Initiator, Do not allow it to establish with other ISCSI Initiator again to connect.In addition, if the connection status of ISCSI Target is above-mentioned 4th kind of connection status (not actuated) does not allow it to be established with any ISCSI Initiator yet and connects then before it is activated It connects.
It follows that after ISCSI Initiator start, can only select and the ISCSI Target in not-connected status Connection is established, namely:It is that not connected Target shares list that only Target, which shares connection status in list, to the ISCSI Initiator is available.
However, ISCSI Initiator are not that can establish to connect with any not connected ISCSI Target , each ISCSI Target itself, which also have, accesses limitation, only part ISCSI Initiator is allowed to establish a connection, To ensure data safety.
To achieve the goals above, in the present embodiment, management node can be that each ISCSI Target configurations are visited in advance Ask that permission, the access rights include IP address range limitation;The IP address range is limited to an IP address set, as long as The IP address of ISCSI Initiator is fallen into the IP address set, then does not allow to access the ISCSI Target.Therefore, respectively The IP address range of ISCSI Target defines forbids access the ISCSI Target by which ISCSI Initiator, Management node in the available ISCSI Target for determining a certain ISCSI Initiator needs that the ISCSI will be forbidden All ISCSI Target that Initiator is accessed are got rid of except available ISCSI Target..
Therefore, above-mentioned that the ISCSI Initiator couple are determined according to the 2nd Target requests and the shared lists of Target The method of all available ISCSI Target answered is specifically as follows:List, which is shared, for Target is in the every of not-connected status A ISCSI Target, judge the ISCSI Initiator that the 2nd Target request carries IP address whether position Within the IP address range limitation of the ISCSI Target, if it is, determining that the ISCSI Target are not the ISCSI The available ISCSI Initiator of Initiator, otherwise, it determines the ISCSI Target are the ISCSI Initiator ISCSI Initiator can be used.
In practical applications, management node can also support chap certifications.
In one embodiment of the invention, it has been pre-configured with that each ISCSI Target are corresponding to be used in management node The username and password of chap certifications;In addition also it is that each ISCSI Target configure chap authentication marks and are issued to this in advance ISCSI Target;The chap authentication marks are including needing certification and not needing certification.
Target is shared the corresponding all available ISCSI Target of ISCSI Initiator in list and carried by management node After supplying the ISCSI Initiator, user can select one of them available ISCSI Target, the ISCSI Initiator sends connection request to the ISCSI Target;After the ISCSI Target receive connection request, to this ISCSI Initiator send chap certification requests;User inputs the ISCSI in ISCSI Initiator operation interfaces The corresponding username and passwords for chap certifications of Target, the ISCSI Initiator correspond to the ISCSI Target For chap certifications username and password carrying the ISCSI Target are returned in chap authentication responses;The ISCSI The chap authentication responses are forwarded to management node by Target, the management node user name carried in the chap authentication responses and Password is compared with the preconfigured corresponding username and passwords for chap certifications of the ISCSI Target, if phase Together, then chap certifications success, return authentication success message give the ISCSI Target, to the ISCSI Target and are somebody's turn to do ISCSI Initiator continue to execute subsequent connection flow, if it is not the same, then return authentication failed message gives the ISCSI Target connects to which the ISCSI Target refusals are established with the ISCSI Initiator.
Step 203, the number from the ISCSI Initiator for receiving any available ISCSI Target forwardings According to read-write requests, operation is written and read to the back end in distributed file system based on reading and writing data request, and pass through Any available ISCSI Target return to read-write operation result to the ISCSI Initiator.
After ISCSI Initiator and ISCSI Target establish connection, ISCSI Initiator can be to the ISCSI Target transmission data read-write requests, to realize the access to back end.
In the embodiment of the present invention, when ISCSI Target receive the request of the reading and writing data from ISCSI Initiator Afterwards, reading and writing data request is sent to management node, back end is written and read according to reading and writing data request by management node Operation, and return to read-write operation as a result, read-write operation result is returned to ISCSI Initiator by ISCSI Target, to Complete the reading and writing data request of ISCSI Initiator.
It should be noted that reading and writing data request includes actually data read request and data write request, if it is data Read request, then management node need to carry out read operation to back end, if it is data write request, then management node needs logarithm Write operation is carried out according to node.Either back end execution read operation or write operation are required to sentence before execution Whether disconnected ISCSI Initiator have corresponding access limit to ISCSI Target, if without corresponding access rights, It then can directly return and forbid accessing, read operation or write operation no longer are executed to back end, if there is corresponding access limit, Read operation or write operation then are executed to back end.
Therefore, it asks to carry out the back end in distributed file system based on the reading and writing data described in this step 203 The method of read-write operation is specifically as follows:
If reading and writing data request is read request, if the ISCSI Initiator are to any available ISCSI Target has read right, then read operation is carried out to the back end in distributed file system based on the read request, if described ISCSI Initiator do not have read right to any available ISCSI Target, then generate and be used as read-write operation result Misread false information;
If reading and writing data request is write request, if the ISCSI Initiator are to any available ISCSI Target has write permission, then write operation is carried out to the back end in distributed file system based on the write request, if described ISCSI Initiator do not have write permission to any available ISCSI Target, then generate and be used as read-write operation result Wrongly write false information.
In practical implementations, the management node of distributed file system can have multiple, one of to be used as main management section Point, other management nodes are as backup management node.In the case of main management node non-failure, executed by main management node The various functions that management node executes in the embodiment of the present invention shown in Fig. 2 are stated, it, can be from standby management when main management node failure One is selected in node as new main management node, takes over the main management node of failure.
To the embodiment of the present invention, the ISCSI service implementing methods based on distributed file system have carried out specifically above Bright, the present invention also provides a kind of, and the ISCSI based on distributed file system services realization device, is carried out below in conjunction with Fig. 3 detailed It describes in detail bright.
It is the structure that ISCSI of the embodiment of the present invention based on distributed file system services realization device referring to Fig. 3, Fig. 3 Schematic diagram, the distributed file system include management node and back end, and multiple ISCSI are disposed on each back end Target;As shown in figure 3, the device is applied to the management node, including:Maintenance unit 301, is read connection control unit 302 Write control unit 303;Wherein,
Maintenance unit 301, for safeguarding that one includes that the Target of the ISCSI Target information on all back end is total to Enjoy list;
Control unit 302 is connected, for when ISCSI Initiator start, Target to be shared described in list The corresponding all available ISCSI Target of ISCSI Initiator are supplied to the ISCSI Initiator, so that described ISCSI Initiator are established with any available ISCSI Target and are connected;
Read-write control unit 303 comes from the ISCSI for receive any available ISCSI Target forwarding The reading and writing data of Initiator is asked, and is read the back end in distributed file system based on reading and writing data request Write operation, and read-write operation result is returned to the ISCSI Initiator by any available ISCSI Target.
In Fig. 3 shown devices,
The ISCSI Target information includes the connection status of ISCSI Target;
The maintenance unit 301 safeguards that one includes that the Target of the ISCSI Target information on all back end is total to When enjoying list, it is used for:It monitors the connection status of the ISCSI Target on all back end and is updated to the Target and share List.
In Fig. 3 shown devices,
The maintenance unit 301 is used for when monitoring the connection status of the ISCSI Target on all back end:It connects Receive the connection state information that each ISCSI Target are periodically reported or reported when itself connection status changes.
Fig. 3 shown devices further include dispensing unit 304;
The dispensing unit 304, for configuring the spy on corresponding specific data node for each ISCSI Initiator Determine ISCSI Target;
The connection control unit 302, by Target share ISCSI Initiator described in list it is corresponding it is all can The ISCSI Initiator are supplied to ISCSI Target, including:
Receive the 2nd Target requests that the specific ISCSI Target of the ISCSI Initiator are sent;This second Target requests are after the specific ISCSI Target receive the first Target requests that the ISCSI Initiator are sent It generates;
According to the 2nd Target requests and the shared lists of Target determine the ISCSI Initiator it is corresponding it is all can With ISCSI Target, all available ISCSI Target are returned into the described specific ISCSI Target, by the specific ISCSI All available ISCSI Target are returned to the ISCSI Initiator by Target.
In Fig. 3 shown devices,
The connection status includes:It has connected, just connect, being not connected with, not running;
The dispensing unit 304, is used for:It is each ISCSI Target configuration access permissions, the access rights in advance It is limited including IP address range;The IP address range is limited to an IP address set;
The first Target requests carry the IP address of the ISCSI Initiator;
The 2nd Target requests that the specific ISCSI Target of the ISCSI Initiator are generated carry described first The IP address for the ISCSI Initiator that Target requests carry;
The connection control unit 302 shares list according to the 2nd Target requests and Target and determines the ISCSI When the corresponding all available ISCSI Target of Initiator, it is used for:List, which is shared, for Target is in not-connected status Each ISCSI Target, judge the ISCSI Initiator of the 2nd Target requests carrying IP address whether Within the IP address range limitation of the ISCSI Target, if it is, determining that the ISCSI Target are not described The available ISCSI Initiator of ISCSI Initiator, otherwise, it determines the ISCSI Target are the ISCSI The available ISCSI Initiator of Initiator.
In Fig. 3 shown devices,
The access rights further include chap authentication marks;The chap authentication marks include needing certification and need not recognizing Card;
The dispensing unit 304, for being pre-configured with the corresponding users for chap certifications of each ISCSI Target Name and password;
The connection control unit 302 is established with any available ISCSI Target in the ISCSI Initiator and is connected During connecing, if any available ISCSI Target need certification, any available ISCSI is received The chap authentication responses from the ISCSI Initiator of Target forwardings, if the use that the chap authentication responses carry Name in an account book and password are corresponding identical for the username and password of chap certifications as any available ISCSI Target, then to Any available ISCSI Target send chap certification success messages, so as to pass through any available ISCSI Target It subsequently is connect flow with ISCSI Initiator execution, otherwise, chap is sent to any available ISCSI Target Authentification failure message, so that any available ISCSI Target refusals are established with the ISCSI Initiator and connected;Its In, the chap authentication responses are that the ISCSI Initiator are asked to any available ISCSI Target transmissions connection It asks, and after receiving the chap certification requests that any available ISCSI Target are returned, is sent to any available ISCSI Target's.
In Fig. 3 shown devices,
The dispensing unit 304, for being pre-configured with readings of each ISCSI Initiator to each ISCSI Target Write permission, the access limit include read right and write permission;
The reading and writing data request is read request or write request;
The read-write control unit 304, based on the reading and writing data request to the back end in distributed file system into When row read-write operation, it is used for:
If reading and writing data request is read request, if the ISCSI Initiator are to any available ISCSI Target has read right, then read operation is carried out to the back end in distributed file system based on the read request, if described ISCSI Initiator do not have read right to any available ISCSI Target, then generate and be used as read-write operation result Misread false information;
If reading and writing data request is write request, if the ISCSI Initiator are to any available ISCSI Target has write permission, then write operation is carried out to the back end in distributed file system based on the write request, if described ISCSI Initiator do not have write permission to any available ISCSI Target, then generate and be used as read-write operation result Wrongly write false information.
The foregoing is merely illustrative of the preferred embodiments of the present invention, is not intended to limit the invention, all essences in the present invention With within principle, any modification, equivalent substitution, improvement and etc. done should be included within the scope of protection of the invention god.

Claims (14)

1. a kind of ISCSI service implementing methods based on distributed file system, which is characterized in that the distributed file system Including management node and back end, multiple ISCSI Target are disposed on each back end;This method is applied to the pipe Node is managed, including:
Safeguard that one includes that the Target of the ISCSI Target information on all back end shares list;
When ISCSI Initiator start, by Target share ISCSI Initiator described in list it is corresponding it is all can The ISCSI Initiator are supplied to ISCSI Target, so that the ISCSI Initiator can be used with any ISCSI Target establish connection;
The reading and writing data request from the ISCSI Initiator of any available ISCSI Target forwardings is received, Operation is written and read to the back end in distributed file system based on reading and writing data request, and by described any available ISCSI Target return to read-write operation result to the ISCSI Initiator.
2. according to the method described in claim 1, it is characterized in that,
The ISCSI Target information includes the connection status of ISCSI Target;
Safeguard that one includes that the method for the shared lists of Target of the ISCSI Target information on all back end is:Monitoring institute There is the connection status of the ISCSI Target on back end and be updated to the Target and shares list.
3. according to the method described in claim 2, it is characterized in that,
The method for monitoring the connection status of the ISCSI Target on all back end is:Receive each ISCSI Target periods The connection state information that property is reported or reported when itself connection status changes.
4. according to the method described in claim 2, it is characterized in that,
The specific ISCSI Target on corresponding specific data node are configured for each ISCSI Initiator;
By Target share the corresponding all available ISCSI Target of ISCSI Initiator described in list be supplied to it is described ISCSI Initiator, including:
Receive the 2nd Target requests that the specific ISCSI Target of the ISCSI Initiator are sent;This second Target requests are after the specific ISCSI Target receive the first Target requests that the ISCSI Initiator are sent It generates;
List is shared with Target determine that the ISCSI Initiator are corresponding all available according to the 2nd Target requests All available ISCSI Target are returned to the described specific ISCSI Target, by the specific ISCSI by ISCSI Target All available ISCSI Target are returned to the ISCSI Initiator by Target.
5. according to the method described in claim 4, it is characterized in that,
The connection status includes:It has connected, just connect, being not connected with, not running;
It is each ISCSI Target configuration access permissions in advance, the access rights include IP address range limitation;The IP Address range is limited to an IP address set;
The first Target requests carry the IP address of the ISCSI Initiator;
The 2nd Target requests that the specific ISCSI Target of the ISCSI Initiator are generated carry described first The IP address for the ISCSI Initiator that Target requests carry;
List is shared with Target determine that the ISCSI Initiator are corresponding all available according to the 2nd Target requests The method of ISCSI Target is:Each ISCSI Target that list is in not-connected status are shared for Target, are judged Whether the IP address for the ISCSI Initiator that the 2nd Target requests carry is located at the IP of the ISCSI Target Within address range limitation, if it is, determining that the ISCSI Target are not the available of the ISCSI Initiator ISCSI Initiator, otherwise, it determines the ISCSI Target are the available ISCSI of the ISCSI Initiator Initiator。
6. according to the method described in claim 5, it is characterized in that,
The access rights further include chap authentication marks;The chap authentication marks are including needing certification and not needing certification;
It is pre-configured with the corresponding username and passwords for chap certifications of each ISCSI Target;
During the ISCSI Initiator and any available ISCSI Target are established and connected, if described any Certification can be needed with ISCSI Target, then receive any available ISCSI Target forwardings comes from the ISCSI The chap authentication responses of Initiator, if the username and password that carries of the chap authentication responses with it is described any available The corresponding username and passwords for chap certifications of ISCSI Target are identical, then to any available ISCSI Target Chap certification success messages are sent, so as to be held by any available ISCSI Target and ISCSI Initiator Otherwise the follow-up connection flow of row sends chap authentification failure message, so that described to any available ISCSI Target One available ISCSI Target refusals are established with the ISCSI Initiator to be connected;Wherein, the chap authentication responses are institutes It states ISCSI Initiator and sends connection request to any available ISCSI Target, and receive described any available After the chap certification requests that ISCSI Target are returned, it is sent to any available ISCSI Target's.
7. according to the method described in claim 6, it is characterized in that,
It is pre-configured with access limits of each ISCSI Initiator to each ISCSI Target, the access limit includes Read right and write permission;
The reading and writing data request is read request or write request;
Based on the reading and writing data request operation is written and read to the back end in distributed file system method be:
If reading and writing data request is read request, if the ISCSI Initiator are to any available ISCSI Target has read right, then read operation is carried out to the back end in distributed file system based on the read request, if described ISCSI Initiator do not have read right to any available ISCSI Target, then generate and be used as read-write operation result Misread false information;
If reading and writing data request is write request, if the ISCSI Initiator are to any available ISCSI Target has write permission, then write operation is carried out to the back end in distributed file system based on the write request, if described ISCSI Initiator do not have write permission to any available ISCSI Target, then generate and be used as read-write operation result Wrongly write false information.
8. a kind of ISCSI based on distributed file system services realization device, which is characterized in that the distributed file system Including management node and back end, multiple ISCSI Target are disposed on each back end;The device is applied to the pipe Node is managed, including:Maintenance unit, connection control unit, read-write control unit;
The maintenance unit, for safeguarding that one includes the shared row of Target of the ISCSI Target information on all back end Table;
The connection control unit, for when ISCSI Initiator start, Target to be shared ISCSI described in list The corresponding all available ISCSI Target of Initiator are supplied to the ISCSI Initiator, so that the ISCSI Initiator is established with any available ISCSI Target and is connected;
The read-write control unit comes from the ISCSI for receive any available ISCSI Target forwarding The reading and writing data of Initiator is asked, and is read the back end in distributed file system based on reading and writing data request Write operation, and read-write operation result is returned to the ISCSI Initiator by any available ISCSI Target.
9. device according to claim 8, which is characterized in that
The ISCSI Target information includes the connection status of ISCSI Target;
The maintenance unit safeguards that one includes that the Target of the ISCSI Target information on all back end shares list When, it is used for:It monitors the connection status of the ISCSI Target on all back end and is updated to the Target and share list.
10. device according to claim 9, which is characterized in that
The maintenance unit is used for when monitoring the connection status of the ISCSI Target on all back end:It receives each The connection state information that ISCSI Target are periodically reported or reported when itself connection status changes.
11. device according to claim 9, which is characterized in that the device further includes dispensing unit;
The dispensing unit, for configuring the specific ISCSI on corresponding specific data node for each ISCSI Initiator Target;
Target is shared the corresponding all available ISCSI of ISCSI Initiator described in list by the connection control unit Target is supplied to the ISCSI Initiator, including:
Receive the 2nd Target requests that the specific ISCSI Target of the ISCSI Initiator are sent;This second Target requests are after the specific ISCSI Target receive the first Target requests that the ISCSI Initiator are sent It generates;
List is shared with Target determine that the ISCSI Initiator are corresponding all available according to the 2nd Target requests All available ISCSI Target are returned to the described specific ISCSI Target, by the specific ISCSI by ISCSI Target All available ISCSI Target are returned to the ISCSI Initiator by Target.
12. according to the devices described in claim 11, which is characterized in that
The connection status includes:It has connected, just connect, being not connected with, not running;
The dispensing unit, is used for:It is each ISCSI Target configuration access permissions in advance, the access rights include IP Location scope limitation;The IP address range is limited to an IP address set;
The first Target requests carry the IP address of the ISCSI Initiator;
The 2nd Target requests that the specific ISCSI Target of the ISCSI Initiator are generated carry described first The IP address for the ISCSI Initiator that Target requests carry;
The connection control unit shares list according to the 2nd Target requests and Target and determines the ISCSI When the corresponding all available ISCSI Target of Initiator, it is used for:List, which is shared, for Target is in not-connected status Each ISCSI Target, judge the ISCSI Initiator of the 2nd Target requests carrying IP address whether Within the IP address range limitation of the ISCSI Target, if it is, determining that the ISCSI Target are not described The available ISCSI Initiator of ISCSI Initiator, otherwise, it determines the ISCSI Target are the ISCSI The available ISCSI Initiator of Initiator.
13. device according to claim 12, which is characterized in that
The access rights further include chap authentication marks;The chap authentication marks are including needing certification and not needing certification;
The dispensing unit, for being pre-configured with corresponding user names for chap certifications of each ISCSI Target and close Code;
The connection control unit establishes the mistake of connection in the ISCSI Initiator with any available ISCSI Target Cheng Zhong receives any available ISCSI Target forwardings if any available ISCSI Target need certification The chap authentication responses from the ISCSI Initiator, if the chap authentication responses carry username and password With any available ISCSI Target it is corresponding for the username and password of chap certifications it is identical, then to it is described it is any can Send chap certification success messages with ISCSI Target so that by any available ISCSI Target with it is described ISCSI Initiator execute follow-up connection flow, otherwise, send chap certifications to any available ISCSI Target and lose Message is lost, so that any available ISCSI Target refusals are established with the ISCSI Initiator and connected;Wherein, institute Stating chap authentication responses, to be the ISCSI Initiator send connection request to any available ISCSI Target, and After receiving the chap certification requests that any available ISCSI Target are returned, it is sent to any available ISCSI Target's.
14. device according to claim 13, which is characterized in that
The dispensing unit, the access limit for being pre-configured with each ISCSI Initiator to each ISCSI Target, The access limit includes read right and write permission;
The reading and writing data request is read request or write request;
The read-write control unit is written and read behaviour based on reading and writing data request to the back end in distributed file system When making, it is used for:
If reading and writing data request is read request, if the ISCSI Initiator are to any available ISCSI Target has read right, then read operation is carried out to the back end in distributed file system based on the read request, if described ISCSI Initiator do not have read right to any available ISCSI Target, then generate and be used as read-write operation result Misread false information;
If reading and writing data request is write request, if the ISCSI Initiator are to any available ISCSI Target has write permission, then write operation is carried out to the back end in distributed file system based on the write request, if described ISCSI Initiator do not have write permission to any available ISCSI Target, then generate and be used as read-write operation result Wrongly write false information.
CN201711427584.0A 2017-12-26 2017-12-26 ISCSI service realization method and device based on distributed file system Active CN108366087B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711427584.0A CN108366087B (en) 2017-12-26 2017-12-26 ISCSI service realization method and device based on distributed file system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711427584.0A CN108366087B (en) 2017-12-26 2017-12-26 ISCSI service realization method and device based on distributed file system

Publications (2)

Publication Number Publication Date
CN108366087A true CN108366087A (en) 2018-08-03
CN108366087B CN108366087B (en) 2021-03-05

Family

ID=63010193

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711427584.0A Active CN108366087B (en) 2017-12-26 2017-12-26 ISCSI service realization method and device based on distributed file system

Country Status (1)

Country Link
CN (1) CN108366087B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109600436A (en) * 2018-12-10 2019-04-09 浪潮电子信息产业股份有限公司 A kind of distribution iscsi service implementing method, system and relevant apparatus
CN109981768A (en) * 2019-03-21 2019-07-05 上海霄云信息科技有限公司 I/o multipath planning method and equipment in distributed network storage system
CN110059056A (en) * 2019-04-18 2019-07-26 北京思特奇信息技术股份有限公司 The distributed system read/writable detection method of multinode multifile, device, equipment

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060109850A1 (en) * 2004-11-24 2006-05-25 Hitachi, Ltd. IP-SAN network access control list generating method and access control list setup method
CN101115009A (en) * 2007-08-31 2008-01-30 杭州华三通信技术有限公司 Storage resource access control method, storage control system and applied host machine
CN101621526A (en) * 2009-08-20 2010-01-06 杭州华三通信技术有限公司 iSCSI method and apparatus for preventing useless connection from occupying system resources
CN101808119A (en) * 2010-03-04 2010-08-18 杭州华三通信技术有限公司 Method and equipment for multiple storage array load balancing
CN102012933A (en) * 2010-12-02 2011-04-13 清华大学 Distributed file system and method for storing data and providing services by utilizing same
CN102111436A (en) * 2010-12-20 2011-06-29 深圳市创新科信息技术有限公司 Storage device and method for accessing storage device through internet small computer system interface (iSCSI)

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060109850A1 (en) * 2004-11-24 2006-05-25 Hitachi, Ltd. IP-SAN network access control list generating method and access control list setup method
CN101115009A (en) * 2007-08-31 2008-01-30 杭州华三通信技术有限公司 Storage resource access control method, storage control system and applied host machine
CN101621526A (en) * 2009-08-20 2010-01-06 杭州华三通信技术有限公司 iSCSI method and apparatus for preventing useless connection from occupying system resources
CN101808119A (en) * 2010-03-04 2010-08-18 杭州华三通信技术有限公司 Method and equipment for multiple storage array load balancing
CN102012933A (en) * 2010-12-02 2011-04-13 清华大学 Distributed file system and method for storing data and providing services by utilizing same
CN102111436A (en) * 2010-12-20 2011-06-29 深圳市创新科信息技术有限公司 Storage device and method for accessing storage device through internet small computer system interface (iSCSI)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109600436A (en) * 2018-12-10 2019-04-09 浪潮电子信息产业股份有限公司 A kind of distribution iscsi service implementing method, system and relevant apparatus
CN109600436B (en) * 2018-12-10 2021-06-29 浪潮电子信息产业股份有限公司 Distributed iscsi service implementation method, system and related device
CN109981768A (en) * 2019-03-21 2019-07-05 上海霄云信息科技有限公司 I/o multipath planning method and equipment in distributed network storage system
CN109981768B (en) * 2019-03-21 2021-12-07 上海霄云信息科技有限公司 IO multi-path planning method and device in distributed network storage system
CN110059056A (en) * 2019-04-18 2019-07-26 北京思特奇信息技术股份有限公司 The distributed system read/writable detection method of multinode multifile, device, equipment

Also Published As

Publication number Publication date
CN108366087B (en) 2021-03-05

Similar Documents

Publication Publication Date Title
CN105511805B (en) The data processing method and device of cluster file system
CN102947797B (en) The online service using directory feature extending transversely accesses and controls
US7649854B2 (en) System and method for providing channels in application servers and transaction-based systems
Insights New Questions
US20020083146A1 (en) Data model for automated server configuration
US9298936B2 (en) Issuing security commands to a client device
US8341705B2 (en) Method, apparatus, and computer product for managing operation
CN103731413B (en) A kind of method for handling abnormal login
CN101217368A (en) A network logging on system and the corresponding configuration method and methods for logging on the application system
CN105718785A (en) Authentication-Free Configuration For Service Controllers
CN106789153A (en) The log recording of self adaptation by all kinds of means of Internet of things system terminal device, output intent and system
CN104901923A (en) Virtual machine access device and method
US11245577B2 (en) Template-based onboarding of internet-connectible devices
JP4721082B1 (en) VPN connection system
CN108366087A (en) A kind of ISCSI service implementing methods and device based on distributed file system
JP2013187707A (en) Host provision system and communication control method
CN107566195A (en) Mirror image warehouse processing method and system
CN112099913A (en) Method for realizing safety isolation of virtual machine based on OpenStack
CN102291239B (en) Remote authentication method, system, agent component and authentication servers
CN101505221B (en) Network guide system and unit storage unit access method
KR20080077966A (en) Method and system for registering a distributed service site
CN102694667A (en) Method supporting user autonomous deployment of network and system thereof
KR102094315B1 (en) Network Separation System Based On Access Point Allocation Per Account
CN111818081A (en) Virtual encryption machine management method and device, computer equipment and storage medium
CN202309766U (en) Online service system based on activity catalog verification

Legal Events

Date Code Title Description
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: 518057 Shenzhen Software Park, No. 9, 501, 502, Science and Technology Middle Road, Nanshan District, Shenzhen City, Guangdong Province

Applicant after: Shenzhen Innovation Technology Co., Ltd.

Address before: 518057 Shenzhen Software Park, No. 9, 501, 502, Science and Technology Middle Road, Nanshan District, Shenzhen City, Guangdong Province

Applicant before: UIT Storage Technology (Shenzhen) Co., Ltd.

CB02 Change of applicant information
GR01 Patent grant
GR01 Patent grant