CN108366087A - A kind of ISCSI service implementing methods and device based on distributed file system - Google Patents
A kind of ISCSI service implementing methods and device based on distributed file system Download PDFInfo
- Publication number
- CN108366087A CN108366087A CN201711427584.0A CN201711427584A CN108366087A CN 108366087 A CN108366087 A CN 108366087A CN 201711427584 A CN201711427584 A CN 201711427584A CN 108366087 A CN108366087 A CN 108366087A
- Authority
- CN
- China
- Prior art keywords
- iscsi
- target
- initiator
- available
- iscsi target
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1001—Protocols in which an application is distributed across nodes in the network for accessing one among a plurality of replicated servers
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/10—File systems; File servers
- G06F16/17—Details of further file system functions
- G06F16/176—Support for shared access to files; File sharing support
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/10—File systems; File servers
- G06F16/18—File system types
- G06F16/182—Distributed file systems
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1097—Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/14—Session management
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Data Mining & Analysis (AREA)
- Databases & Information Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
The present invention provides a kind of ISCSI service implementing methods and device based on distributed file system, the distributed file system includes management node and back end, and multiple ISCSI Target are disposed on each back end;This method is applied to the management node, including:Safeguard that one includes that the Target of the ISCSI Target information on all back end shares list;When ISCSI Initiator start, Target is shared into the corresponding all available ISCSI Target of ISCSI Initiator described in list and is supplied to the ISCSI Initiator, is connected so that the ISCSI Initiator are established with any available ISCSI Target;Receive the reading and writing data request from the ISCSI Initiator of any available ISCSI Target forwardings, operation is written and read to the back end in distributed file system based on reading and writing data request, and read-write operation result is returned to the ISCSI Initiator by any available ISCSI Target.
Description
Technical field
The present invention relates to computer memory technical field, more particularly to a kind of ISCSI clothes based on distributed file system
Pragmatic existing method and apparatus.
Background technology
Cloud storage is in new concept cloud computing (cloud computing) conceptive extension and developed.
Cloud storage is a kind of framework, refer to by functions such as cluster application, grid or distributed file systems, will be a large amount of in network
Various types of storage device gathers collaborative work by application software, common externally to provide data storage and business
One system of access function.
ISCSI is a serious achievement of SCSI over IP, be one for hardware device use can be in IP agreement
Upper layer operation SCSI command collection.Briefly, ISCSI may be implemented to run SCSI protocol on ip networks, can
It is routed on such as high speed gigabit Ethernet.SAN (Storage Area Network) is in order to carry SCSI protocol
High bandwidth, generally take optical-fibre channel realize networking, directly contribute in this way cost of implementation costliness.In order to reduce networking cost,
Protect most of client in the existing investment of IP network simultaneously, industry is dedicated to the research to SCSI over IP agreements.
Invention content
In view of this, the purpose of the present invention is to provide a kind of, the ISCSI based on distributed file system services realization side
Method and device can reduce the networking cost of distributed file system.
In order to achieve the above object, the present invention provides following technical solutions:
A kind of ISCSI service implementing methods based on distributed file system, the distributed file system include management
Node and back end dispose multiple ISCSI Target on each back end;This method is applied to the management node, packet
It includes:
Safeguard that one includes that the Target of the ISCSI Target information on all back end shares list;
When ISCSI Initiator start, Target is shared into the corresponding institutes of ISCSI Initiator described in list
There are available ISCSI Target to be supplied to the ISCSI Initiator, so that the ISCSI Initiator can be used with any
ISCSI Target establish connection;
The reading and writing data from the ISCSI Initiator for receiving any available ISCSI Target forwardings is asked
It asks, operation is written and read to the back end in distributed file system based on reading and writing data request, and by described any
ISCSI Target can be used to return to read-write operation result to the ISCSI Initiator.
A kind of ISCSI service realization devices based on distributed file system, the distributed file system includes management
Node and back end dispose multiple ISCSI Target on each back end;The device is applied to the management node, packet
It includes:Maintenance unit, connection control unit, read-write control unit;
The maintenance unit, for safeguarding that one includes that the Target of the ISCSI Target information on all back end is total to
Enjoy list;
The connection control unit, for when ISCSI Initiator start, Target to be shared described in list
The corresponding all available ISCSI Target of ISCSI Initiator are supplied to the ISCSI Initiator, so that described
ISCSI Initiator are established with any available ISCSI Target and are connected;
The read-write control unit comes from the ISCSI for receive any available ISCSI Target forwarding
The reading and writing data of Initiator is asked, and is read the back end in distributed file system based on reading and writing data request
Write operation, and read-write operation result is returned to the ISCSI Initiator by any available ISCSI Target.
As can be seen from the above technical solution, it in the present invention, can be disposed in each back end of distributed file system
Multiple ISCSI target carry out the connection status of each ISCSI target by the management node in distributed file system
Target share directories are monitored and are updated to, so that management node can be determined respectively based on above-mentioned Target share directories
The available ISCSI target of ISCSI Initiator are realized logical between ISCSI Initiator and ISCSI target
Fuse tube is managed.The present invention can effectively reduce the networking cost of distributed file system.
Description of the drawings
Fig. 1 is ISCSI service architecture schematic diagram of the embodiment of the present invention based on distributed file system
Fig. 2 is ISCSI service implementing method flow chart of the embodiment of the present invention based on distributed file system;
Fig. 3 is the structural schematic diagram of ISCSI service realization device of the embodiment of the present invention based on distributed file system.
Specific implementation mode
In order to make the purpose , technical scheme and advantage of the present invention be clearer, below in conjunction with the accompanying drawings and according to embodiment,
Technical scheme of the present invention is described in detail.
It is ISCSI service architecture schematic diagram of the embodiment of the present invention based on distributed file system referring to Fig. 1, Fig. 1, such as schemes
Shown in 1, distributed file system includes management node and back end, ISCSI Initiator (ISCSI starters) deployment
The client of all kinds of operating system platforms except distributed file system;ISCSI target are then deployed in distributed document
On the back end of system, and multiple ISCSI target (ISCSI object machines) can be disposed on each back end.
In service architecture shown in Fig. 1, management node is responsible for relevant configuration and the management of ISCSI Initiator, and
The management communicated between ISCSI Initiator and ISCSI target.
The realization of the present invention is described in detail with reference to specific embodiment.
It is ISCSI service implementing method flow chart of the embodiment of the present invention based on distributed file system referring to Fig. 2, Fig. 2,
This method is applied to the management node of distributed file system, specifically includes following steps:
Step 101 safeguards that one includes that the Target of the ISCSI Target information on all back end shares list.
Target shares in list, and ISCSI Target information includes the connection status of ISCSI Target.
The connection status of ISCSI Target and ISCSI Initiator includes following several:
1, it has connected:ISCSI Target have built up with an ISCSI Initiator and connect.
2, positive connection:ISCSI Target are being established with an ISCSI Initiator and are being connect.
3, it is not connected with:ISCSI Target are not yet established with any ISCSI Initiator and are connected.
4, not running:ISCSI Target are not actuated, cannot establish and connect with ISCSI Initiator.
It, can be by monitoring the connection status of the ISCSI Target on all back end and being updated in the present embodiment
The method that the Target shares list realizes the updating maintenance to sharing list, specifically, each ISCSI on back end
Target can periodically report the connection state information of itself, only can also report itself when itself connection status changes
Connection state information.Management node receives the connection state information that each ISCSI Target are reported, and according to the company received
It meets state information updating Target and shares list.
Step 202, when ISCSI Initiator start, Target is shared into ISCSI Initiator described in list
Corresponding all available ISCSI Target are supplied to the ISCSI Initiator so that the ISCSI Initiator with
Any available ISCSI Target establish connection.
In existing realization, after ISCSI Initiator start, need to establish connection with an ISCSI Target, it
Afterwards, user can just be written and read ISCSI Target by ISCSI Initiator, to realize to distributed storage system
The data access of system.
In the present invention, the specific ISCSI on corresponding specific data node is configured for each ISCSI Initiator
Target.The corresponding specific data nodes of the ISCSI Initiator can be any data section on distributed management system
Point, specific ISCSI Target refer to the not connected ISCSI Target of one on the specific data node.In practical realization
In, it can be according to certain rule, such as start time order and function, to all not connected ISCSI on the specific data node
Target is ranked up, and the first ISCSI Target of sorting determine the specific ISCSI Target.
It should be noted that the specific ISCSI Target on the corresponding specific data node of each ISCSI Initiator
It may be the same or different.Specifically determined by user configuration.
Specific ISCSI Target that can be on its corresponding specific data node after ISCSI Initiator startups are sent out
The first Target is sent to ask;After the specific ISCSI Target receive the first Target requests, generates the 2nd Target and ask
It asks, the ISCSI Initiator carried during the first Target is asked are carried in the 2nd Target requests and are sent to
Management node;After what management saved receives the 2nd Target requests, it can be arranged according to the 2nd Target requests and Target are shared
Table determines the corresponding all available ISCSI Target of the ISCSI Initiator, and all available ISCSI Target are returned
Return the described specific ISCSI Target;All available ISCSI Target are returned to this by the specific ISCSI Target again
ISCSI Initiator, to which user can select to determine the ISCSI Initiator are built with which available ISCSI Target
Vertical connection.
Therefore, in this step 202, it is corresponding all available that Target is shared into ISCSI Initiator described in list
ISCSI Target are supplied to the ISCSI Initiator, specifically include:
Receive the 2nd Target requests that the specific ISCSI Target of the ISCSI Initiator are sent;This second
Target requests are after the specific ISCSI Target receive the first Target requests that the ISCSI Initiator are sent
It generates;
According to the 2nd Target requests and the shared lists of Target determine the ISCSI Initiator it is corresponding it is all can
With ISCSI Target, all available ISCSI Target are returned into the described specific ISCSI Target, by the specific ISCSI
All available ISCSI Target are returned to the ISCSI Initiator by Target.
In practical implementations, before ISCSI Target are without the broken connection with a certain ISCSI Initiator,
He cannot establish a connection with the ISCSI Target at ISCSI Initiator namely ISCSI Initiator and ISCSI
Target is one-to-one correspondence.
Therefore, for ISCSI Target, if its connection status is above-mentioned 1st connection status (having connected),
Other than having established a connection ISCSI Initiator, does not allow it to be established again with other ISCSI Initiator and connect;
Its connection status is above-mentioned 2nd connection status (positive connection), then other than card establishes a connection ISCSI Initiator,
Do not allow it to establish with other ISCSI Initiator again to connect.In addition, if the connection status of ISCSI Target is above-mentioned
4th kind of connection status (not actuated) does not allow it to be established with any ISCSI Initiator yet and connects then before it is activated
It connects.
It follows that after ISCSI Initiator start, can only select and the ISCSI Target in not-connected status
Connection is established, namely:It is that not connected Target shares list that only Target, which shares connection status in list, to the ISCSI
Initiator is available.
However, ISCSI Initiator are not that can establish to connect with any not connected ISCSI Target
, each ISCSI Target itself, which also have, accesses limitation, only part ISCSI Initiator is allowed to establish a connection,
To ensure data safety.
To achieve the goals above, in the present embodiment, management node can be that each ISCSI Target configurations are visited in advance
Ask that permission, the access rights include IP address range limitation;The IP address range is limited to an IP address set, as long as
The IP address of ISCSI Initiator is fallen into the IP address set, then does not allow to access the ISCSI Target.Therefore, respectively
The IP address range of ISCSI Target defines forbids access the ISCSI Target by which ISCSI Initiator,
Management node in the available ISCSI Target for determining a certain ISCSI Initiator needs that the ISCSI will be forbidden
All ISCSI Target that Initiator is accessed are got rid of except available ISCSI Target..
Therefore, above-mentioned that the ISCSI Initiator couple are determined according to the 2nd Target requests and the shared lists of Target
The method of all available ISCSI Target answered is specifically as follows:List, which is shared, for Target is in the every of not-connected status
A ISCSI Target, judge the ISCSI Initiator that the 2nd Target request carries IP address whether position
Within the IP address range limitation of the ISCSI Target, if it is, determining that the ISCSI Target are not the ISCSI
The available ISCSI Initiator of Initiator, otherwise, it determines the ISCSI Target are the ISCSI Initiator
ISCSI Initiator can be used.
In practical applications, management node can also support chap certifications.
In one embodiment of the invention, it has been pre-configured with that each ISCSI Target are corresponding to be used in management node
The username and password of chap certifications;In addition also it is that each ISCSI Target configure chap authentication marks and are issued to this in advance
ISCSI Target;The chap authentication marks are including needing certification and not needing certification.
Target is shared the corresponding all available ISCSI Target of ISCSI Initiator in list and carried by management node
After supplying the ISCSI Initiator, user can select one of them available ISCSI Target, the ISCSI
Initiator sends connection request to the ISCSI Target;After the ISCSI Target receive connection request, to this
ISCSI Initiator send chap certification requests;User inputs the ISCSI in ISCSI Initiator operation interfaces
The corresponding username and passwords for chap certifications of Target, the ISCSI Initiator correspond to the ISCSI Target
For chap certifications username and password carrying the ISCSI Target are returned in chap authentication responses;The ISCSI
The chap authentication responses are forwarded to management node by Target, the management node user name carried in the chap authentication responses and
Password is compared with the preconfigured corresponding username and passwords for chap certifications of the ISCSI Target, if phase
Together, then chap certifications success, return authentication success message give the ISCSI Target, to the ISCSI Target and are somebody's turn to do
ISCSI Initiator continue to execute subsequent connection flow, if it is not the same, then return authentication failed message gives the ISCSI
Target connects to which the ISCSI Target refusals are established with the ISCSI Initiator.
Step 203, the number from the ISCSI Initiator for receiving any available ISCSI Target forwardings
According to read-write requests, operation is written and read to the back end in distributed file system based on reading and writing data request, and pass through
Any available ISCSI Target return to read-write operation result to the ISCSI Initiator.
After ISCSI Initiator and ISCSI Target establish connection, ISCSI Initiator can be to the ISCSI
Target transmission data read-write requests, to realize the access to back end.
In the embodiment of the present invention, when ISCSI Target receive the request of the reading and writing data from ISCSI Initiator
Afterwards, reading and writing data request is sent to management node, back end is written and read according to reading and writing data request by management node
Operation, and return to read-write operation as a result, read-write operation result is returned to ISCSI Initiator by ISCSI Target, to
Complete the reading and writing data request of ISCSI Initiator.
It should be noted that reading and writing data request includes actually data read request and data write request, if it is data
Read request, then management node need to carry out read operation to back end, if it is data write request, then management node needs logarithm
Write operation is carried out according to node.Either back end execution read operation or write operation are required to sentence before execution
Whether disconnected ISCSI Initiator have corresponding access limit to ISCSI Target, if without corresponding access rights,
It then can directly return and forbid accessing, read operation or write operation no longer are executed to back end, if there is corresponding access limit,
Read operation or write operation then are executed to back end.
Therefore, it asks to carry out the back end in distributed file system based on the reading and writing data described in this step 203
The method of read-write operation is specifically as follows:
If reading and writing data request is read request, if the ISCSI Initiator are to any available ISCSI
Target has read right, then read operation is carried out to the back end in distributed file system based on the read request, if described
ISCSI Initiator do not have read right to any available ISCSI Target, then generate and be used as read-write operation result
Misread false information;
If reading and writing data request is write request, if the ISCSI Initiator are to any available ISCSI
Target has write permission, then write operation is carried out to the back end in distributed file system based on the write request, if described
ISCSI Initiator do not have write permission to any available ISCSI Target, then generate and be used as read-write operation result
Wrongly write false information.
In practical implementations, the management node of distributed file system can have multiple, one of to be used as main management section
Point, other management nodes are as backup management node.In the case of main management node non-failure, executed by main management node
The various functions that management node executes in the embodiment of the present invention shown in Fig. 2 are stated, it, can be from standby management when main management node failure
One is selected in node as new main management node, takes over the main management node of failure.
To the embodiment of the present invention, the ISCSI service implementing methods based on distributed file system have carried out specifically above
Bright, the present invention also provides a kind of, and the ISCSI based on distributed file system services realization device, is carried out below in conjunction with Fig. 3 detailed
It describes in detail bright.
It is the structure that ISCSI of the embodiment of the present invention based on distributed file system services realization device referring to Fig. 3, Fig. 3
Schematic diagram, the distributed file system include management node and back end, and multiple ISCSI are disposed on each back end
Target;As shown in figure 3, the device is applied to the management node, including:Maintenance unit 301, is read connection control unit 302
Write control unit 303;Wherein,
Maintenance unit 301, for safeguarding that one includes that the Target of the ISCSI Target information on all back end is total to
Enjoy list;
Control unit 302 is connected, for when ISCSI Initiator start, Target to be shared described in list
The corresponding all available ISCSI Target of ISCSI Initiator are supplied to the ISCSI Initiator, so that described
ISCSI Initiator are established with any available ISCSI Target and are connected;
Read-write control unit 303 comes from the ISCSI for receive any available ISCSI Target forwarding
The reading and writing data of Initiator is asked, and is read the back end in distributed file system based on reading and writing data request
Write operation, and read-write operation result is returned to the ISCSI Initiator by any available ISCSI Target.
In Fig. 3 shown devices,
The ISCSI Target information includes the connection status of ISCSI Target;
The maintenance unit 301 safeguards that one includes that the Target of the ISCSI Target information on all back end is total to
When enjoying list, it is used for:It monitors the connection status of the ISCSI Target on all back end and is updated to the Target and share
List.
In Fig. 3 shown devices,
The maintenance unit 301 is used for when monitoring the connection status of the ISCSI Target on all back end:It connects
Receive the connection state information that each ISCSI Target are periodically reported or reported when itself connection status changes.
Fig. 3 shown devices further include dispensing unit 304;
The dispensing unit 304, for configuring the spy on corresponding specific data node for each ISCSI Initiator
Determine ISCSI Target;
The connection control unit 302, by Target share ISCSI Initiator described in list it is corresponding it is all can
The ISCSI Initiator are supplied to ISCSI Target, including:
Receive the 2nd Target requests that the specific ISCSI Target of the ISCSI Initiator are sent;This second
Target requests are after the specific ISCSI Target receive the first Target requests that the ISCSI Initiator are sent
It generates;
According to the 2nd Target requests and the shared lists of Target determine the ISCSI Initiator it is corresponding it is all can
With ISCSI Target, all available ISCSI Target are returned into the described specific ISCSI Target, by the specific ISCSI
All available ISCSI Target are returned to the ISCSI Initiator by Target.
In Fig. 3 shown devices,
The connection status includes:It has connected, just connect, being not connected with, not running;
The dispensing unit 304, is used for:It is each ISCSI Target configuration access permissions, the access rights in advance
It is limited including IP address range;The IP address range is limited to an IP address set;
The first Target requests carry the IP address of the ISCSI Initiator;
The 2nd Target requests that the specific ISCSI Target of the ISCSI Initiator are generated carry described first
The IP address for the ISCSI Initiator that Target requests carry;
The connection control unit 302 shares list according to the 2nd Target requests and Target and determines the ISCSI
When the corresponding all available ISCSI Target of Initiator, it is used for:List, which is shared, for Target is in not-connected status
Each ISCSI Target, judge the ISCSI Initiator of the 2nd Target requests carrying IP address whether
Within the IP address range limitation of the ISCSI Target, if it is, determining that the ISCSI Target are not described
The available ISCSI Initiator of ISCSI Initiator, otherwise, it determines the ISCSI Target are the ISCSI
The available ISCSI Initiator of Initiator.
In Fig. 3 shown devices,
The access rights further include chap authentication marks;The chap authentication marks include needing certification and need not recognizing
Card;
The dispensing unit 304, for being pre-configured with the corresponding users for chap certifications of each ISCSI Target
Name and password;
The connection control unit 302 is established with any available ISCSI Target in the ISCSI Initiator and is connected
During connecing, if any available ISCSI Target need certification, any available ISCSI is received
The chap authentication responses from the ISCSI Initiator of Target forwardings, if the use that the chap authentication responses carry
Name in an account book and password are corresponding identical for the username and password of chap certifications as any available ISCSI Target, then to
Any available ISCSI Target send chap certification success messages, so as to pass through any available ISCSI Target
It subsequently is connect flow with ISCSI Initiator execution, otherwise, chap is sent to any available ISCSI Target
Authentification failure message, so that any available ISCSI Target refusals are established with the ISCSI Initiator and connected;Its
In, the chap authentication responses are that the ISCSI Initiator are asked to any available ISCSI Target transmissions connection
It asks, and after receiving the chap certification requests that any available ISCSI Target are returned, is sent to any available ISCSI
Target's.
In Fig. 3 shown devices,
The dispensing unit 304, for being pre-configured with readings of each ISCSI Initiator to each ISCSI Target
Write permission, the access limit include read right and write permission;
The reading and writing data request is read request or write request;
The read-write control unit 304, based on the reading and writing data request to the back end in distributed file system into
When row read-write operation, it is used for:
If reading and writing data request is read request, if the ISCSI Initiator are to any available ISCSI
Target has read right, then read operation is carried out to the back end in distributed file system based on the read request, if described
ISCSI Initiator do not have read right to any available ISCSI Target, then generate and be used as read-write operation result
Misread false information;
If reading and writing data request is write request, if the ISCSI Initiator are to any available ISCSI
Target has write permission, then write operation is carried out to the back end in distributed file system based on the write request, if described
ISCSI Initiator do not have write permission to any available ISCSI Target, then generate and be used as read-write operation result
Wrongly write false information.
The foregoing is merely illustrative of the preferred embodiments of the present invention, is not intended to limit the invention, all essences in the present invention
With within principle, any modification, equivalent substitution, improvement and etc. done should be included within the scope of protection of the invention god.
Claims (14)
1. a kind of ISCSI service implementing methods based on distributed file system, which is characterized in that the distributed file system
Including management node and back end, multiple ISCSI Target are disposed on each back end;This method is applied to the pipe
Node is managed, including:
Safeguard that one includes that the Target of the ISCSI Target information on all back end shares list;
When ISCSI Initiator start, by Target share ISCSI Initiator described in list it is corresponding it is all can
The ISCSI Initiator are supplied to ISCSI Target, so that the ISCSI Initiator can be used with any
ISCSI Target establish connection;
The reading and writing data request from the ISCSI Initiator of any available ISCSI Target forwardings is received,
Operation is written and read to the back end in distributed file system based on reading and writing data request, and by described any available
ISCSI Target return to read-write operation result to the ISCSI Initiator.
2. according to the method described in claim 1, it is characterized in that,
The ISCSI Target information includes the connection status of ISCSI Target;
Safeguard that one includes that the method for the shared lists of Target of the ISCSI Target information on all back end is:Monitoring institute
There is the connection status of the ISCSI Target on back end and be updated to the Target and shares list.
3. according to the method described in claim 2, it is characterized in that,
The method for monitoring the connection status of the ISCSI Target on all back end is:Receive each ISCSI Target periods
The connection state information that property is reported or reported when itself connection status changes.
4. according to the method described in claim 2, it is characterized in that,
The specific ISCSI Target on corresponding specific data node are configured for each ISCSI Initiator;
By Target share the corresponding all available ISCSI Target of ISCSI Initiator described in list be supplied to it is described
ISCSI Initiator, including:
Receive the 2nd Target requests that the specific ISCSI Target of the ISCSI Initiator are sent;This second
Target requests are after the specific ISCSI Target receive the first Target requests that the ISCSI Initiator are sent
It generates;
List is shared with Target determine that the ISCSI Initiator are corresponding all available according to the 2nd Target requests
All available ISCSI Target are returned to the described specific ISCSI Target, by the specific ISCSI by ISCSI Target
All available ISCSI Target are returned to the ISCSI Initiator by Target.
5. according to the method described in claim 4, it is characterized in that,
The connection status includes:It has connected, just connect, being not connected with, not running;
It is each ISCSI Target configuration access permissions in advance, the access rights include IP address range limitation;The IP
Address range is limited to an IP address set;
The first Target requests carry the IP address of the ISCSI Initiator;
The 2nd Target requests that the specific ISCSI Target of the ISCSI Initiator are generated carry described first
The IP address for the ISCSI Initiator that Target requests carry;
List is shared with Target determine that the ISCSI Initiator are corresponding all available according to the 2nd Target requests
The method of ISCSI Target is:Each ISCSI Target that list is in not-connected status are shared for Target, are judged
Whether the IP address for the ISCSI Initiator that the 2nd Target requests carry is located at the IP of the ISCSI Target
Within address range limitation, if it is, determining that the ISCSI Target are not the available of the ISCSI Initiator
ISCSI Initiator, otherwise, it determines the ISCSI Target are the available ISCSI of the ISCSI Initiator
Initiator。
6. according to the method described in claim 5, it is characterized in that,
The access rights further include chap authentication marks;The chap authentication marks are including needing certification and not needing certification;
It is pre-configured with the corresponding username and passwords for chap certifications of each ISCSI Target;
During the ISCSI Initiator and any available ISCSI Target are established and connected, if described any
Certification can be needed with ISCSI Target, then receive any available ISCSI Target forwardings comes from the ISCSI
The chap authentication responses of Initiator, if the username and password that carries of the chap authentication responses with it is described any available
The corresponding username and passwords for chap certifications of ISCSI Target are identical, then to any available ISCSI Target
Chap certification success messages are sent, so as to be held by any available ISCSI Target and ISCSI Initiator
Otherwise the follow-up connection flow of row sends chap authentification failure message, so that described to any available ISCSI Target
One available ISCSI Target refusals are established with the ISCSI Initiator to be connected;Wherein, the chap authentication responses are institutes
It states ISCSI Initiator and sends connection request to any available ISCSI Target, and receive described any available
After the chap certification requests that ISCSI Target are returned, it is sent to any available ISCSI Target's.
7. according to the method described in claim 6, it is characterized in that,
It is pre-configured with access limits of each ISCSI Initiator to each ISCSI Target, the access limit includes
Read right and write permission;
The reading and writing data request is read request or write request;
Based on the reading and writing data request operation is written and read to the back end in distributed file system method be:
If reading and writing data request is read request, if the ISCSI Initiator are to any available ISCSI
Target has read right, then read operation is carried out to the back end in distributed file system based on the read request, if described
ISCSI Initiator do not have read right to any available ISCSI Target, then generate and be used as read-write operation result
Misread false information;
If reading and writing data request is write request, if the ISCSI Initiator are to any available ISCSI
Target has write permission, then write operation is carried out to the back end in distributed file system based on the write request, if described
ISCSI Initiator do not have write permission to any available ISCSI Target, then generate and be used as read-write operation result
Wrongly write false information.
8. a kind of ISCSI based on distributed file system services realization device, which is characterized in that the distributed file system
Including management node and back end, multiple ISCSI Target are disposed on each back end;The device is applied to the pipe
Node is managed, including:Maintenance unit, connection control unit, read-write control unit;
The maintenance unit, for safeguarding that one includes the shared row of Target of the ISCSI Target information on all back end
Table;
The connection control unit, for when ISCSI Initiator start, Target to be shared ISCSI described in list
The corresponding all available ISCSI Target of Initiator are supplied to the ISCSI Initiator, so that the ISCSI
Initiator is established with any available ISCSI Target and is connected;
The read-write control unit comes from the ISCSI for receive any available ISCSI Target forwarding
The reading and writing data of Initiator is asked, and is read the back end in distributed file system based on reading and writing data request
Write operation, and read-write operation result is returned to the ISCSI Initiator by any available ISCSI Target.
9. device according to claim 8, which is characterized in that
The ISCSI Target information includes the connection status of ISCSI Target;
The maintenance unit safeguards that one includes that the Target of the ISCSI Target information on all back end shares list
When, it is used for:It monitors the connection status of the ISCSI Target on all back end and is updated to the Target and share list.
10. device according to claim 9, which is characterized in that
The maintenance unit is used for when monitoring the connection status of the ISCSI Target on all back end:It receives each
The connection state information that ISCSI Target are periodically reported or reported when itself connection status changes.
11. device according to claim 9, which is characterized in that the device further includes dispensing unit;
The dispensing unit, for configuring the specific ISCSI on corresponding specific data node for each ISCSI Initiator
Target;
Target is shared the corresponding all available ISCSI of ISCSI Initiator described in list by the connection control unit
Target is supplied to the ISCSI Initiator, including:
Receive the 2nd Target requests that the specific ISCSI Target of the ISCSI Initiator are sent;This second
Target requests are after the specific ISCSI Target receive the first Target requests that the ISCSI Initiator are sent
It generates;
List is shared with Target determine that the ISCSI Initiator are corresponding all available according to the 2nd Target requests
All available ISCSI Target are returned to the described specific ISCSI Target, by the specific ISCSI by ISCSI Target
All available ISCSI Target are returned to the ISCSI Initiator by Target.
12. according to the devices described in claim 11, which is characterized in that
The connection status includes:It has connected, just connect, being not connected with, not running;
The dispensing unit, is used for:It is each ISCSI Target configuration access permissions in advance, the access rights include IP
Location scope limitation;The IP address range is limited to an IP address set;
The first Target requests carry the IP address of the ISCSI Initiator;
The 2nd Target requests that the specific ISCSI Target of the ISCSI Initiator are generated carry described first
The IP address for the ISCSI Initiator that Target requests carry;
The connection control unit shares list according to the 2nd Target requests and Target and determines the ISCSI
When the corresponding all available ISCSI Target of Initiator, it is used for:List, which is shared, for Target is in not-connected status
Each ISCSI Target, judge the ISCSI Initiator of the 2nd Target requests carrying IP address whether
Within the IP address range limitation of the ISCSI Target, if it is, determining that the ISCSI Target are not described
The available ISCSI Initiator of ISCSI Initiator, otherwise, it determines the ISCSI Target are the ISCSI
The available ISCSI Initiator of Initiator.
13. device according to claim 12, which is characterized in that
The access rights further include chap authentication marks;The chap authentication marks are including needing certification and not needing certification;
The dispensing unit, for being pre-configured with corresponding user names for chap certifications of each ISCSI Target and close
Code;
The connection control unit establishes the mistake of connection in the ISCSI Initiator with any available ISCSI Target
Cheng Zhong receives any available ISCSI Target forwardings if any available ISCSI Target need certification
The chap authentication responses from the ISCSI Initiator, if the chap authentication responses carry username and password
With any available ISCSI Target it is corresponding for the username and password of chap certifications it is identical, then to it is described it is any can
Send chap certification success messages with ISCSI Target so that by any available ISCSI Target with it is described
ISCSI Initiator execute follow-up connection flow, otherwise, send chap certifications to any available ISCSI Target and lose
Message is lost, so that any available ISCSI Target refusals are established with the ISCSI Initiator and connected;Wherein, institute
Stating chap authentication responses, to be the ISCSI Initiator send connection request to any available ISCSI Target, and
After receiving the chap certification requests that any available ISCSI Target are returned, it is sent to any available ISCSI
Target's.
14. device according to claim 13, which is characterized in that
The dispensing unit, the access limit for being pre-configured with each ISCSI Initiator to each ISCSI Target,
The access limit includes read right and write permission;
The reading and writing data request is read request or write request;
The read-write control unit is written and read behaviour based on reading and writing data request to the back end in distributed file system
When making, it is used for:
If reading and writing data request is read request, if the ISCSI Initiator are to any available ISCSI
Target has read right, then read operation is carried out to the back end in distributed file system based on the read request, if described
ISCSI Initiator do not have read right to any available ISCSI Target, then generate and be used as read-write operation result
Misread false information;
If reading and writing data request is write request, if the ISCSI Initiator are to any available ISCSI
Target has write permission, then write operation is carried out to the back end in distributed file system based on the write request, if described
ISCSI Initiator do not have write permission to any available ISCSI Target, then generate and be used as read-write operation result
Wrongly write false information.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711427584.0A CN108366087B (en) | 2017-12-26 | 2017-12-26 | ISCSI service realization method and device based on distributed file system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711427584.0A CN108366087B (en) | 2017-12-26 | 2017-12-26 | ISCSI service realization method and device based on distributed file system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108366087A true CN108366087A (en) | 2018-08-03 |
CN108366087B CN108366087B (en) | 2021-03-05 |
Family
ID=63010193
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201711427584.0A Active CN108366087B (en) | 2017-12-26 | 2017-12-26 | ISCSI service realization method and device based on distributed file system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108366087B (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109600436A (en) * | 2018-12-10 | 2019-04-09 | 浪潮电子信息产业股份有限公司 | A kind of distribution iscsi service implementing method, system and relevant apparatus |
CN109981768A (en) * | 2019-03-21 | 2019-07-05 | 上海霄云信息科技有限公司 | I/o multipath planning method and equipment in distributed network storage system |
CN110059056A (en) * | 2019-04-18 | 2019-07-26 | 北京思特奇信息技术股份有限公司 | The distributed system read/writable detection method of multinode multifile, device, equipment |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060109850A1 (en) * | 2004-11-24 | 2006-05-25 | Hitachi, Ltd. | IP-SAN network access control list generating method and access control list setup method |
CN101115009A (en) * | 2007-08-31 | 2008-01-30 | 杭州华三通信技术有限公司 | Storage resource access control method, storage control system and applied host machine |
CN101621526A (en) * | 2009-08-20 | 2010-01-06 | 杭州华三通信技术有限公司 | iSCSI method and apparatus for preventing useless connection from occupying system resources |
CN101808119A (en) * | 2010-03-04 | 2010-08-18 | 杭州华三通信技术有限公司 | Method and equipment for multiple storage array load balancing |
CN102012933A (en) * | 2010-12-02 | 2011-04-13 | 清华大学 | Distributed file system and method for storing data and providing services by utilizing same |
CN102111436A (en) * | 2010-12-20 | 2011-06-29 | 深圳市创新科信息技术有限公司 | Storage device and method for accessing storage device through internet small computer system interface (iSCSI) |
-
2017
- 2017-12-26 CN CN201711427584.0A patent/CN108366087B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060109850A1 (en) * | 2004-11-24 | 2006-05-25 | Hitachi, Ltd. | IP-SAN network access control list generating method and access control list setup method |
CN101115009A (en) * | 2007-08-31 | 2008-01-30 | 杭州华三通信技术有限公司 | Storage resource access control method, storage control system and applied host machine |
CN101621526A (en) * | 2009-08-20 | 2010-01-06 | 杭州华三通信技术有限公司 | iSCSI method and apparatus for preventing useless connection from occupying system resources |
CN101808119A (en) * | 2010-03-04 | 2010-08-18 | 杭州华三通信技术有限公司 | Method and equipment for multiple storage array load balancing |
CN102012933A (en) * | 2010-12-02 | 2011-04-13 | 清华大学 | Distributed file system and method for storing data and providing services by utilizing same |
CN102111436A (en) * | 2010-12-20 | 2011-06-29 | 深圳市创新科信息技术有限公司 | Storage device and method for accessing storage device through internet small computer system interface (iSCSI) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109600436A (en) * | 2018-12-10 | 2019-04-09 | 浪潮电子信息产业股份有限公司 | A kind of distribution iscsi service implementing method, system and relevant apparatus |
CN109600436B (en) * | 2018-12-10 | 2021-06-29 | 浪潮电子信息产业股份有限公司 | Distributed iscsi service implementation method, system and related device |
CN109981768A (en) * | 2019-03-21 | 2019-07-05 | 上海霄云信息科技有限公司 | I/o multipath planning method and equipment in distributed network storage system |
CN109981768B (en) * | 2019-03-21 | 2021-12-07 | 上海霄云信息科技有限公司 | IO multi-path planning method and device in distributed network storage system |
CN110059056A (en) * | 2019-04-18 | 2019-07-26 | 北京思特奇信息技术股份有限公司 | The distributed system read/writable detection method of multinode multifile, device, equipment |
Also Published As
Publication number | Publication date |
---|---|
CN108366087B (en) | 2021-03-05 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105511805B (en) | The data processing method and device of cluster file system | |
CN102947797B (en) | The online service using directory feature extending transversely accesses and controls | |
US7649854B2 (en) | System and method for providing channels in application servers and transaction-based systems | |
Insights | New Questions | |
US20020083146A1 (en) | Data model for automated server configuration | |
US9298936B2 (en) | Issuing security commands to a client device | |
US8341705B2 (en) | Method, apparatus, and computer product for managing operation | |
CN103731413B (en) | A kind of method for handling abnormal login | |
CN101217368A (en) | A network logging on system and the corresponding configuration method and methods for logging on the application system | |
CN105718785A (en) | Authentication-Free Configuration For Service Controllers | |
CN106789153A (en) | The log recording of self adaptation by all kinds of means of Internet of things system terminal device, output intent and system | |
CN104901923A (en) | Virtual machine access device and method | |
US11245577B2 (en) | Template-based onboarding of internet-connectible devices | |
JP4721082B1 (en) | VPN connection system | |
CN108366087A (en) | A kind of ISCSI service implementing methods and device based on distributed file system | |
JP2013187707A (en) | Host provision system and communication control method | |
CN107566195A (en) | Mirror image warehouse processing method and system | |
CN112099913A (en) | Method for realizing safety isolation of virtual machine based on OpenStack | |
CN102291239B (en) | Remote authentication method, system, agent component and authentication servers | |
CN101505221B (en) | Network guide system and unit storage unit access method | |
KR20080077966A (en) | Method and system for registering a distributed service site | |
CN102694667A (en) | Method supporting user autonomous deployment of network and system thereof | |
KR102094315B1 (en) | Network Separation System Based On Access Point Allocation Per Account | |
CN111818081A (en) | Virtual encryption machine management method and device, computer equipment and storage medium | |
CN202309766U (en) | Online service system based on activity catalog verification |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB02 | Change of applicant information |
Address after: 518057 Shenzhen Software Park, No. 9, 501, 502, Science and Technology Middle Road, Nanshan District, Shenzhen City, Guangdong Province Applicant after: Shenzhen Innovation Technology Co., Ltd. Address before: 518057 Shenzhen Software Park, No. 9, 501, 502, Science and Technology Middle Road, Nanshan District, Shenzhen City, Guangdong Province Applicant before: UIT Storage Technology (Shenzhen) Co., Ltd. |
|
CB02 | Change of applicant information | ||
GR01 | Patent grant | ||
GR01 | Patent grant |