CN102609309B - A kind of strategy scheduling system and method for cloud computing - Google Patents

A kind of strategy scheduling system and method for cloud computing Download PDF

Info

Publication number
CN102609309B
CN102609309B CN201210017636.8A CN201210017636A CN102609309B CN 102609309 B CN102609309 B CN 102609309B CN 201210017636 A CN201210017636 A CN 201210017636A CN 102609309 B CN102609309 B CN 102609309B
Authority
CN
China
Prior art keywords
virtual machine
strategy
target virtual
configuration
module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201210017636.8A
Other languages
Chinese (zh)
Other versions
CN102609309A (en
Inventor
余志强
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
Nanjing ZTE New Software Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanjing ZTE New Software Co Ltd filed Critical Nanjing ZTE New Software Co Ltd
Priority to CN201210017636.8A priority Critical patent/CN102609309B/en
Priority to PCT/CN2012/076114 priority patent/WO2013107141A1/en
Publication of CN102609309A publication Critical patent/CN102609309A/en
Application granted granted Critical
Publication of CN102609309B publication Critical patent/CN102609309B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/50Allocation of resources, e.g. of the central processing unit [CPU]
    • G06F9/5061Partitioning or combining of resources
    • G06F9/5072Grid computing

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Mathematical Physics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Debugging And Monitoring (AREA)

Abstract

The present invention provides a kind of strategy scheduling system and method for cloud computing, wherein the system includes strategy configuration, monitoring, strategy scheduling and policy enforcement module;Tactful configuration module, for configuration pin to the strategy of target virtual machine in cloud computing resource pool;The performance parameter for knowing target virtual machine, the performance parameter of monitoring objective virtual machine from tactful configuration module, and is sent to tactful scheduler module by monitoring module;Tactful scheduler module, for judging whether the target virtual machine performance parameter from monitoring module meets the trigger condition of strategy corresponding with the target virtual machine, and when target virtual machine performance parameter meets the trigger condition of strategy corresponding with the target virtual machine, request message is sent out to policy enforcement module;Policy enforcement module, after receiving the request message from tactful scheduler module, the strategy for meeting trigger condition of implementation strategy configuration module configuration.Flexibly configurable strategy of the present invention, rational management resources of virtual machine.

Description

A kind of strategy scheduling system and method for cloud computing
Technical field
The present invention relates to computing resource scheduling field more particularly to a kind of tactful scheduling systems and side for cloud computing Method.
Background technology
In recent years, with the continuous development of internet, a kind of new services computation model --- cloud computing (cloud Computing), fast development is got up.Cloud computing is a kind of calculation Internet-based, in this way, shared Software and hardware resources and information can be supplied to computer and other equipment on demand.The core concept of cloud computing is will largely to use net The virtual machine unified management and scheduling of network connection, constitute a computing resource pond to user's on-demand service.
In face of the cloud computing environment of a large amount of virtual machine, how to ensure that the flexible setting of scheduling strategy, rational management are virtual Machine resource becomes the major issue that those skilled in the art face.
Invention content
The present invention provides a kind of strategy scheduling system and method for cloud computing, to solve how to ensure scheduling strategy It is flexible setting, rational management resources of virtual machine the technical issues of.
In order to solve the above technical problems, the present invention provides a kind of tactful scheduling system for cloud computing, the system Including tactful configuration module, monitoring module, tactful scheduler module and policy enforcement module, wherein
The strategy configuration module, for configuration pin to the strategy of target virtual machine in cloud computing resource pool;
The monitoring module monitors the target virtual machine for knowing the target virtual machine from tactful configuration module Performance parameter, and the performance parameter is sent to tactful scheduler module;
The strategy scheduler module, for judging whether the target virtual machine performance parameter from the monitoring module meets The trigger condition of strategy corresponding with the target virtual machine, and meet and the target virtual machine pair in target virtual machine performance parameter When the trigger condition for the strategy answered, request message is sent out to policy enforcement module;
The policy enforcement module, after receiving the request message from tactful scheduler module, implementation strategy configuration The strategy for meeting the trigger condition of module configuration.
Further, the strategy of the tactful configuration module configuration includes one or more of:EVM(extended virtual machine), contraction Virtual machine, virtual machine alarm record and virtual machine alarm notification;
The strategy of the strategy configuration module configuration, which forms, includes:Target virtual machine, tactful trigger condition and policy action.
Further, the tactful configuration module, whether the strategy for being additionally operable to detection configuration clashes, and is detecting The strategy for going out configuration does not have normally to indicate to the monitoring module sending strategy under conditions of conflicting;
The monitoring module is additionally operable to after receiving the normal instruction of the strategy from tactful configuration module, matches from strategy It sets module and knows target virtual machine.
Further, the strategy composition of the tactful configuration module configuration further includes:Continuously meet this strategy trigger condition Number;
The strategy scheduler module, is additionally operable in the case where target virtual machine performance parameter meets the trigger condition, Statistics continuously meets the number of this strategy trigger condition, judges whether the number for continuously meeting this strategy trigger condition reaches default Threshold value, in the case where the number for continuously meeting this strategy trigger condition reaches preset threshold value, just to execute described plan Policy enforcement module slightly sends out request message.
Further, the tactful configuration module, same strategy is corresponded to for configuring multiple target virtual machines, described more A target virtual machine forms target virtual machine list;
The monitoring module, for the property every the virtual machine for including in one section of predetermined period monitoring objective virtual machine list It can parameter;
The policy enforcement module is additionally operable in the plan that the tactful configuration module is the configuration of the multiple target virtual machine When slightly shrinking virtual machine, the policy action for including in the strategy configured according to configuration module executes contraction virtual machine strategy Afterwards, the target virtual machine that the tactful configuration module forms the virtual machine of contraction from the multiple target virtual machine is informed about to arrange It is deleted in table;And for being the multiple target virtual machine configuration strategy in the tactful configuration module it is EVM(extended virtual machine) When, after the policy action that includes in the strategy configured according to configuration module executes EVM(extended virtual machine) strategy, inform about the plan Slightly the virtual machine of extension is added to the target virtual machine list of the multiple target virtual machine composition by configuration module.
Further, the policy enforcement module is additionally operable in the tactful configuration module be that the multiple virtual machine is matched The strategy set is when shrinking virtual machine, and the policy action for including in the strategy configured according to configuration module executes contraction virtual machine Before strategy, the number of target virtual machine in the target virtual machine list is detected, being only more than the minimum of setting in the number matches When setting target virtual machine number, just continues to execute and shrink virtual machine strategy.
In order to solve the above technical problems, the present invention also provides a kind of tactful dispatching method for cloud computing, the side Method includes the following steps:
Strategy of the configuration pin to target virtual machine in cloud computing resource pool;
Monitor the performance parameter of the target virtual machine;
Judge whether the performance parameter of the target virtual machine meets the triggering item of strategy corresponding with the target virtual machine Part executes full when the performance parameter of the target virtual machine meets the trigger condition of strategy corresponding with the target virtual machine The strategy of the foot trigger condition.
Further, the strategy includes one or more of:EVM(extended virtual machine) shrinks virtual machine, virtual machine alarm Record and virtual machine alarm notification;
The strategy, which forms, includes:Target virtual machine, tactful trigger condition and policy action.
Further, the method further includes:
After configuration pin is to the strategy of target virtual machine, whether the strategy for detecting configuration clashes, and is detecting configuration Under conditions of strategy is without conflict, the performance parameter of monitoring objective virtual machine.
Further, it in the case where target virtual machine performance parameter meets the trigger condition, counts continuous and meets this The number of tactful trigger condition, judges whether the number for continuously meeting this strategy trigger condition reaches preset threshold value, continuous Meet this strategy trigger condition number reach preset threshold value in the case of, just execute this strategy.
Further, multiple target virtual machines are configured and correspond to same strategy, the multiple target virtual machine forms target Virtual machine list;
Every the performance parameter for the target virtual machine for including in one section of predetermined period monitoring objective virtual machine list;
When the strategy configured for the multiple target virtual machine is to shrink virtual machine, virtual machine strategy is shunk executing Afterwards, also the virtual machine of contraction is deleted from the target virtual machine list that the multiple target virtual machine forms;
When being EVM(extended virtual machine) for the multiple target virtual machine configuration strategy, after executing EVM(extended virtual machine) strategy, The virtual machine of extension is also added to the target virtual machine list of the multiple target virtual machine composition.
Further, when the strategy for the multiple virtual machine configuration is to shrink virtual machine, virtual machine is shunk executing Before strategy, the number of target virtual machine in the target virtual machine list is detected, being only more than the minimum of setting in the number matches When setting target virtual machine number, just continues to execute and shrink virtual machine strategy.
Above-mentioned technical proposal can flexible Provisioning Policy;And the triggering of strategy is not only related with the performance of virtual machine, but also should Performance is the current performance of virtual machine, ensures that scheduling strategy really reflects resource situation;Only to the virtual machine provided with strategy Detection, avoids the unnecessary consumption of system.
Description of the drawings
Fig. 1 is the strategy scheduling system module figure for cloud computing of the present embodiment;
Fig. 2 is the tactful dispatching method flow chart for cloud computing of the present embodiment.
Specific implementation mode
To make the objectives, technical solutions, and advantages of the present invention clearer, below in conjunction with attached drawing to the present invention Embodiment be described in detail.It should be noted that in the absence of conflict, in the embodiment and embodiment in the application Feature mutually can arbitrarily combine.
Fig. 1 is the strategy scheduling system module figure for cloud computing of the present embodiment.
The system includes tactful configuration module, monitoring module, tactful scheduler module and policy enforcement module, wherein
The strategy configuration module, for configuration pin to the strategy of target virtual machine in cloud computing resource pool;
The strategy of the strategy configuration module configuration may include one or more of:EVM(extended virtual machine), shrink virtual machine, Virtual machine alarm record and virtual machine alarm notification;The strategy can be flexibly arranged by user's foundation practical application scene;
The strategy composition of the strategy configuration module configuration may include:Target virtual machine, tactful trigger condition and strategy are dynamic Make;Certainly, tactful composition is not limited to the above-mentioned parameter enumerated, and may also include strategy mark (ID);Wherein, target virtual machine can For a virtual machine or more virtual machines, when target virtual machine is more virtual machines, target virtual machine at this time is referred to as target Virtual robot arm;
Above-mentioned policy action is corresponding, the plan such as when tactful configuration module configuration with the strategy of tactful configuration module configuration Slightly EVM(extended virtual machine) when, corresponding policy action is to start new virtual machine, completes the initialization of the virtual machine, and load Related application etc.;Such as when the strategy of tactful configuration module configuration is to shrink virtual machine, corresponding policy action is that closing is related Using, cleaning virtual-machine data, release virtual machine etc.;
When the strategy of tactful configuration module configuration is to shrink virtual machine, it is empty that corresponding policy action may additionally include contraction Before quasi- machine, the number of target virtual machine in the target virtual machine list is detected, being only more than the minimum of setting in the number matches When setting target virtual machine number, contraction virtual machine operations are just continued to execute;It is all retracted to avoid target virtual machine, Wu Fabao The application for demonstrate,proving user can normal operation;
When the strategy of tactful configuration module configuration is EVM(extended virtual machine), corresponding policy action may also include extension Virtual machine is added to the target virtual machine list of the multiple target virtual machine composition, so that monitoring module is to the virtual machine of extension Carry out performance monitoring;
When the strategy of tactful configuration module configuration is to shrink virtual machine, corresponding policy action may also include contraction Virtual machine is deleted from the target virtual machine list that the multiple target virtual machine forms, to save void of the monitoring module to contraction The monitoring of quasi- machine, avoids the unnecessary waste of system resource;
To ensure whether the availability of strategy, above-mentioned strategy configuration module, the strategy for being additionally operable to detection configuration clash, And it is normally indicated to the monitoring module sending strategy under conditions of detecting that the strategy of configuration does not conflict.
The monitoring module monitors the property of the target virtual machine for knowing target virtual machine from tactful configuration module Energy parameter, and the performance parameter is sent to tactful scheduler module;
In the case where whether tactful configuration module can be used for detecting the strategy configured and clashes, the monitoring module, It is additionally operable to after receiving the normal instruction of the strategy from tactful configuration module, knows target virtual machine from tactful configuration module;
The performance for the virtual machine that above-mentioned monitoring module can include in one section of predetermined period monitoring objective virtual machine list Parameter to obtain the performance condition of current goal virtual machine, and then ensures the validity and accuracy of strategy scheduling.
The strategy scheduler module, for judging whether the target virtual machine performance parameter from the monitoring module meets The trigger condition of strategy corresponding with the target virtual machine, and meet and the target virtual machine pair in target virtual machine performance parameter When the trigger condition for the strategy answered, request message is sent out to policy enforcement module;The request message may include strategy scheduling mould The policy action corresponding with the trigger condition that block is obtained from tactful configuration module, or strategy mark corresponding with the trigger condition Know;
The trigger condition can be preset virtual machine CPU usage, memory usage, hard disk utilization rate etc., this is touched Clockwork spring part is obtained by tactful scheduler module from tactful configuration module;
The policy enforcement module, after receiving the request message from tactful scheduler module, implementation strategy configuration The strategy for meeting the trigger condition of module configuration;
The policy enforcement module may include multiple strategy execution submodules, wherein each strategy execution submodule executes not The strategy that Virtual Machine Manager submodule executes EVM(extended virtual machine), shrinks virtual machine is such as arranged in same strategy, and record alarm is arranged Module executes virtual machine alarm record and virtual machine alarm notification strategy;
Policy enforcement module can be after receiving the request message, according to the plan for including in the strategy of configuration module configuration It slightly acts this parameter and executes corresponding strategy;If including policy action in request message, policy enforcement module can direct root According to the policy action implementation strategy;If in request message comprising strategy mark, policy enforcement module can according to strategy mark from Tactful configuration module obtains corresponding policy action, then implementation strategy.
If the operation involved in the strategy that policy enforcement module executes to target virtual machine list, can be by policy enforcement module It directly modifies to the target virtual machine list configured in tactful configuration module, can also be configured from policy enforcement module to strategy Module sends the amendment advice for carrying strategy mark, then by tactful configuration module according to strategy mark to the destination virtual of configuration Machine list is modified.
In other embodiments of the invention, it is removed in the composition of the strategy of tactful configuration module configuration and includes above-mentioned parameter Outside, it also may include continuously meeting the number of this strategy trigger condition this parameter;
Tactful scheduler module at this time, in the case where target virtual machine performance parameter meets the trigger condition, statistics Continuously meet the number of this strategy trigger condition, and continues to judge that this continuously meets whether the number of this strategy trigger condition reaches Preset threshold value, in the case where the number for continuously meeting this strategy trigger condition reaches preset threshold value, just to described in execution The policy enforcement module of this strategy sends out request message, can be reset at this time to the number for continuously meeting tactful trigger condition;In this way Target virtual machine can be eliminated and erroneous judgement caused by peak value occur.If tactful scheduler module is judged continuously to meet the triggering of this strategy The number of condition does not reach preset threshold value, to be reset to the number for continuously meeting this strategy trigger condition counted yet, To ensure that the number of the tactful trigger condition of the satisfaction counted every time is the number for continuously meeting this strategy trigger condition.
Fig. 2 is the tactful dispatching method flow chart for cloud computing of the present embodiment.
Strategy of the S201 configuration pins to target virtual machine in cloud computing resource pool;
It can configure multiple target virtual machines and correspond to same strategy, the multiple target virtual machine composition target virtual machine row Table;
The strategy includes one or more of:EVM(extended virtual machine) shrinks virtual machine, virtual machine alarm record and virtual Machine alarm notification;
The strategy, which forms, includes:Target virtual machine, tactful trigger condition and policy action;
After executing step S201, whether the strategy of also detectable configuration clashes, and is detecting that the strategy of configuration do not have Under conditions of having conflict, step S202 is executed;
S202 monitors the performance parameter of the target virtual machine;
The performance parameter for the target virtual machine for including in above-mentioned target virtual machine list can be monitored every one section of predetermined period;
S203 judges whether the performance parameter of the target virtual machine meets touching for strategy corresponding with the target virtual machine Clockwork spring part executes if the performance parameter of the target virtual machine meets the trigger condition of strategy corresponding with the target virtual machine Step S204;Otherwise, step S205 is executed;
In the case where target virtual machine performance parameter meets the trigger condition, it can also first count and continuously meet this strategy The number of trigger condition, judges whether the number for continuously meeting this strategy trigger condition reaches preset threshold value, is continuously meeting In the case that the number of this strategy trigger condition reaches preset threshold value, step S204 is executed;
S204 executes the strategy for meeting the trigger condition;
When the strategy for the multiple virtual machine configuration is to shrink virtual machine, before executing contraction virtual machine strategy, inspection The number of target virtual machine in the target virtual machine list is surveyed, the minimalist configuration destination virtual of setting is only more than in the number When machine number, just continues to execute and shrink virtual machine strategy;And execute shrink virtual machine strategy after, also by the virtual machine of contraction from It is deleted in the target virtual machine list of the multiple target virtual machine composition;
When being EVM(extended virtual machine) for the multiple target virtual machine configuration strategy, after executing EVM(extended virtual machine) strategy, The virtual machine of extension is also added to the target virtual machine list of the multiple target virtual machine composition.
S205 flows terminate.
One of ordinary skill in the art will appreciate that all or part of step in the above method can be instructed by program Related hardware is completed, and described program can be stored in computer readable storage medium, such as read-only memory, disk or CD Deng.Optionally, all or part of step of above-described embodiment can also be realized using one or more integrated circuits, accordingly Ground, the form that hardware may be used in each module/unit in above-described embodiment are realized, the shape of software function module can also be used Formula is realized.The present invention is not limited to the combinations of the hardware and software of any particular form.
It should be noted that the invention may also have other embodiments, without departing substantially from spirit of that invention and its essence In the case of, those skilled in the art can make various corresponding change and deformations according to the present invention, but these are corresponding Change and distortion should all belong to the protection domain of appended claims of the invention.

Claims (8)

1. a kind of tactful scheduling system for cloud computing, which is characterized in that the system comprises tactful configuration module, monitoring moulds Block, tactful scheduler module and policy enforcement module, wherein
The strategy configuration module, for configuration pin to the strategy of target virtual machine in cloud computing resource pool;
The monitoring module monitors the property of the target virtual machine for knowing the target virtual machine from tactful configuration module Energy parameter, and the performance parameter is sent to tactful scheduler module;
The strategy scheduler module, for judging whether the target virtual machine performance parameter from the monitoring module meets and this The trigger condition of the corresponding strategy of target virtual machine, and it is corresponding with the target virtual machine in target virtual machine performance parameter satisfaction When the trigger condition of strategy, request message is sent out to policy enforcement module;
The policy enforcement module, after receiving the request message from tactful scheduler module, implementation strategy configuration module The strategy for meeting the trigger condition of configuration;
The strategy of the strategy configuration module configuration includes one or more of:EVM(extended virtual machine) shrinks virtual machine, virtual machine Alarm record and virtual machine alarm notification;
The strategy of the strategy configuration module configuration, which forms, includes:Target virtual machine, tactful trigger condition and policy action;
Whether the strategy configuration module, the strategy for being additionally operable to detection configuration clash, and in the strategy for detecting configuration It is normally indicated to the monitoring module sending strategy under conditions of not conflicting;
The monitoring module is additionally operable to after receiving the normal instruction of the strategy from tactful configuration module, mould is configured from strategy Block knows target virtual machine.
2. the system as claimed in claim 1, which is characterized in that
The strategy of the strategy configuration module configuration, which forms, further includes:Continuously meet the number of this strategy trigger condition;
The strategy scheduler module, is additionally operable in the case where target virtual machine performance parameter meets the trigger condition, counts Continuously meet the number of this strategy trigger condition, judges whether the number for continuously meeting this strategy trigger condition reaches preset threshold Value, it is just tactful to described of execution in the case where the number for continuously meeting this strategy trigger condition reaches preset threshold value Policy enforcement module sends out request message.
3. system as claimed in claim 1 or 2, which is characterized in that
The strategy configuration module, same strategy, the multiple target virtual machine are corresponded to for configuring multiple target virtual machines Form target virtual machine list;
The monitoring module, for the performance ginseng every the virtual machine for including in one section of predetermined period monitoring objective virtual machine list Number;
The policy enforcement module is additionally operable in the tactful configuration module be that the strategy that the multiple target virtual machine configures is When shrinking virtual machine, after the policy action execution contraction virtual machine strategy for including in the strategy configured according to configuration module, also Notify the tactful configuration module by the virtual machine of contraction from the target virtual machine list that the multiple target virtual machine forms It deletes;And for when it is EVM(extended virtual machine) that the tactful configuration module, which is the multiple target virtual machine configuration strategy, After executing EVM(extended virtual machine) strategy according to the policy action for including in the strategy of configuration module configuration, the strategy configuration is informed about The virtual machine of extension is added to the target virtual machine list of the multiple target virtual machine composition by module.
4. system as claimed in claim 3, which is characterized in that
The policy enforcement module is additionally operable in the strategy that the tactful configuration module is the multiple virtual machine configuration be contraction When virtual machine, before the policy action execution contraction virtual machine strategy for including in the strategy configured according to configuration module, institute is detected The number of target virtual machine in target virtual machine list is stated, the minimalist configuration target virtual machine of setting is only more than in the number When number, just continues to execute and shrink virtual machine strategy.
5. a kind of tactful dispatching method for cloud computing, which is characterized in that the described method comprises the following steps:
Strategy of the configuration pin to target virtual machine in cloud computing resource pool;
Monitor the performance parameter of the target virtual machine;
Judge whether the performance parameter of the target virtual machine meets the trigger condition of strategy corresponding with the target virtual machine, When the performance parameter of the target virtual machine meets the trigger condition of strategy corresponding with the target virtual machine, execute described in meeting The strategy of trigger condition;
The strategy includes one or more of:EVM(extended virtual machine) shrinks virtual machine, virtual machine alarm record and virtual machine announcement Alert notice;
The strategy, which forms, includes:Target virtual machine, tactful trigger condition and policy action;
After configuration pin is to the strategy of target virtual machine, whether the strategy for detecting configuration clashes, in the strategy for detecting configuration Under conditions of not conflicting, the performance parameter of monitoring objective virtual machine.
6. method as claimed in claim 5, which is characterized in that
In the case where target virtual machine performance parameter meets the trigger condition, statistics continuously meets this strategy trigger condition Number, judges whether the number for continuously meeting this strategy trigger condition reaches preset threshold value, is continuously meeting the triggering of this strategy In the case that the number of condition reaches preset threshold value, this strategy is just executed.
7. such as method described in claim 5 or 6, which is characterized in that
It configures multiple target virtual machines and corresponds to same strategy, the multiple target virtual machine forms target virtual machine list;
Every the performance parameter for the target virtual machine for including in one section of predetermined period monitoring objective virtual machine list;
When the strategy configured for the multiple target virtual machine is to shrink virtual machine, after executing contraction virtual machine strategy, also The virtual machine of contraction is deleted from the target virtual machine list that the multiple target virtual machine forms;
When being EVM(extended virtual machine) for the multiple target virtual machine configuration strategy, after executing EVM(extended virtual machine) strategy, will also The virtual machine of extension is added to the target virtual machine list of the multiple target virtual machine composition.
8. the method for claim 7, which is characterized in that
When the strategy for the multiple virtual machine configuration is to shrink virtual machine, before executing contraction virtual machine strategy, institute is detected The number of target virtual machine in target virtual machine list is stated, the minimalist configuration target virtual machine of setting is only more than in the number When number, just continues to execute and shrink virtual machine strategy.
CN201210017636.8A 2012-01-19 2012-01-19 A kind of strategy scheduling system and method for cloud computing Active CN102609309B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201210017636.8A CN102609309B (en) 2012-01-19 2012-01-19 A kind of strategy scheduling system and method for cloud computing
PCT/CN2012/076114 WO2013107141A1 (en) 2012-01-19 2012-05-25 Policy scheduling system and method for cloud computing

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210017636.8A CN102609309B (en) 2012-01-19 2012-01-19 A kind of strategy scheduling system and method for cloud computing

Publications (2)

Publication Number Publication Date
CN102609309A CN102609309A (en) 2012-07-25
CN102609309B true CN102609309B (en) 2018-08-21

Family

ID=46526703

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210017636.8A Active CN102609309B (en) 2012-01-19 2012-01-19 A kind of strategy scheduling system and method for cloud computing

Country Status (2)

Country Link
CN (1) CN102609309B (en)
WO (1) WO2013107141A1 (en)

Families Citing this family (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103164271A (en) * 2011-12-12 2013-06-19 台达电子工业股份有限公司 Triggering method of moving position computational procedure of virtual machine
CN102932413B (en) * 2012-09-26 2016-03-30 华为软件技术有限公司 A kind of computational resource allocation method, cloud management platform node and computational resource cluster
CN103581183B (en) * 2013-10-30 2017-01-04 华为技术有限公司 A kind of virtualization security isolation method and device
CN104796274B (en) * 2014-01-21 2019-05-03 华为技术有限公司 The matching process and device of O&M operation
CN104951351B (en) * 2014-03-28 2018-12-18 株式会社日立制作所 Scheduling virtual machine device, dispatching requirement manager and method and scheduling virtual machine system
WO2015157896A1 (en) 2014-04-14 2015-10-22 华为技术有限公司 Disaster recovery scheme configuration method and apparatus in cloud computing architecture
CN105357097A (en) * 2014-08-19 2016-02-24 中兴通讯股份有限公司 Virtual network (VN) regulation method and system
TWI519943B (en) * 2014-10-24 2016-02-01 Virtual machine automatic expansion system and method
CN105786587B (en) * 2014-12-23 2019-11-26 华为技术有限公司 A kind of telescopic method and equipment of virtual machine VM
CN104954478A (en) * 2015-06-23 2015-09-30 普元信息技术股份有限公司 System and method for realizing automatic longitudinal scaling of server in cloud computing platform
CN105159759B (en) * 2015-08-31 2019-01-08 华为软件技术有限公司 Application example dispositions method and device
CN105490846B (en) * 2015-12-07 2019-11-05 中国电子科技集团公司第三十二研究所 Server virtualization management system and method
CN106095581B (en) * 2016-06-18 2022-07-26 南京采薇且歌信息科技有限公司 Network storage virtualization scheduling method under private cloud condition
CN107807874A (en) * 2017-10-19 2018-03-16 国云科技股份有限公司 A kind of virtual machine behavior monitoring and locking means
CN110427356B (en) * 2018-04-26 2021-08-13 中移(苏州)软件技术有限公司 Parameter configuration method and equipment

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101986274A (en) * 2010-11-11 2011-03-16 东软集团股份有限公司 Resource allocation system and resource allocation method in private cloud environment
CN102082692A (en) * 2011-01-24 2011-06-01 华为技术有限公司 Method and equipment for migrating virtual machines based on network data flow direction, and cluster system

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101753461B (en) * 2010-01-14 2012-07-25 中国建设银行股份有限公司 Method for realizing load balance, load balanced server and group system
CN102262567A (en) * 2010-05-24 2011-11-30 中兴通讯股份有限公司 Virtual machine scheduling decision system, platform and method
CN101938416B (en) * 2010-09-01 2012-08-08 华南理工大学 Cloud computing resource scheduling method based on dynamic reconfiguration virtual resources
CN102081554A (en) * 2011-01-30 2011-06-01 浪潮(北京)电子信息产业有限公司 Cloud computing operating system as well as kernel control system and method thereof
CN102158535A (en) * 2011-02-10 2011-08-17 浪潮(北京)电子信息产业有限公司 Cloud computing operating system
CN102164184A (en) * 2011-04-22 2011-08-24 广州杰赛科技股份有限公司 Computer entity access and management method for cloud computing network and cloud computing network

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101986274A (en) * 2010-11-11 2011-03-16 东软集团股份有限公司 Resource allocation system and resource allocation method in private cloud environment
CN102082692A (en) * 2011-01-24 2011-06-01 华为技术有限公司 Method and equipment for migrating virtual machines based on network data flow direction, and cluster system

Also Published As

Publication number Publication date
WO2013107141A1 (en) 2013-07-25
CN102609309A (en) 2012-07-25

Similar Documents

Publication Publication Date Title
CN102609309B (en) A kind of strategy scheduling system and method for cloud computing
CN108039964B (en) Fault processing method, device and system based on network function virtualization
KR102421672B1 (en) System and method for resource isolation and consumption in a multitenant application server environment
US8745216B2 (en) Systems and methods for monitoring and controlling a service level agreement
US9104480B2 (en) Monitoring and managing memory thresholds for application request threads
WO2019062304A1 (en) Method, device and system for managing computing resources of block chain node
US9785477B2 (en) Providing a policy hierarchy in an enterprise data processing system
CN108572898B (en) Method, device, equipment and storage medium for controlling interface
RU2013137316A (en) LARGE DATA STORAGE SYSTEM
CN108153590A (en) Manage hardware resource
US20210105179A1 (en) Fault management method and related apparatus
US10305974B2 (en) Ranking system
WO2016028945A1 (en) Equitable sharing of system resources in workflow execution
CN110708316A (en) Method and system architecture for enterprise network security operation management
US20170054592A1 (en) Allocation of cloud computing resources
JP2017531852A (en) Resource leak detection method, apparatus and system
JP2009237859A (en) Virtual machine management system
CN108566386A (en) A kind of encryption device management method, device and storage medium based on cloud platform
CN106155826A (en) For detecting and process the method and system of mistake in bus structures
CN111339466A (en) Interface management method and device, electronic equipment and readable storage medium
CN110018932B (en) Method and device for monitoring container magnetic disk
CN105610643B (en) A kind of cloud computing monitoring method and device
JP2014513344A (en) Method and apparatus for moving a software object in the background
CN103246551A (en) Device and method for management of background timed task
CN110221929A (en) A kind of service software system architecture and its application method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20180529

Address after: 210012 No. 68 Bauhinia Road, Yuhuatai District, Jiangsu, Nanjing

Applicant after: Nanjing Zhongxing New Software Co., Ltd.

Address before: 518057 Nanshan District high tech Industrial Park, Shenzhen, Guangdong, Ministry of justice, Zhongxing Road, South China road.

Applicant before: ZTE Corporation

GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20191106

Address after: 518057 Nanshan District science and Technology Industrial Park, Guangdong high tech Industrial Park, ZTE building

Patentee after: ZTE Communications Co., Ltd.

Address before: Yuhuatai District of Nanjing City, Jiangsu province 210012 Bauhinia Road No. 68

Patentee before: Nanjing Zhongxing New Software Co., Ltd.