CN103744625B - Method for copying disk data in virtual application - Google Patents

Method for copying disk data in virtual application Download PDF

Info

Publication number
CN103744625B
CN103744625B CN201410015533.7A CN201410015533A CN103744625B CN 103744625 B CN103744625 B CN 103744625B CN 201410015533 A CN201410015533 A CN 201410015533A CN 103744625 B CN103744625 B CN 103744625B
Authority
CN
China
Prior art keywords
data
copy
copying
target
storage
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201410015533.7A
Other languages
Chinese (zh)
Other versions
CN103744625A (en
Inventor
程维轩
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Inspur Electronic Information Industry Co Ltd
Original Assignee
Inspur Electronic Information Industry Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Inspur Electronic Information Industry Co Ltd filed Critical Inspur Electronic Information Industry Co Ltd
Priority to CN201410015533.7A priority Critical patent/CN103744625B/en
Publication of CN103744625A publication Critical patent/CN103744625A/en
Application granted granted Critical
Publication of CN103744625B publication Critical patent/CN103744625B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The invention provides a method for copying disk data in a virtual application. According to the method, load of a server host is transferred to a storage hardware system when a virtual machine requires copying and cloning a virtual disk remotely, the storage hardware system performs IO operations according to dynamic characteristics of the request during the process, and multisource multi-target copying is allowed, so that system performance is greatly improved. Compared with the prior art, the method has the advantages that through the multisource multi-target copying in the storage virtual application, copying disorder caused by overlapping of copying source areas and copying target areas is avoided; for read-only files, mapping of the copying target areas is disconnected to achieve copying effect, so that IO response speed of the storage system is increased, and market competitiveness of company products is improved.

Description

A kind of method that data in magnetic disk is copied in virtualization applications
Technical field
The present invention relates to copy disk number in computer virtualized applied technical field, more specifically virtualization applications According to method.
Background technology
VMware virtual platforms are based on can put into the architecture structure that business is used.Using VMware vSphere etc. Software can change or " virtualization " based on x86 computer hardware resource(Including CPU, RAM, hard disk and network controller), To create virtual machine multiple functional, that its own operating system and application program can be run as " true " computer.Each Virtual machine all systems comprising complete set, thus do not have potential conflict.The virtualized operation principles of VMware are directly to exist A software layer simplified is inserted above computer hardware or host operating system.The software layer is comprising one with dynamic and transparent Mode distributes the virtual machine monitor of hardware resource(That is " virtual management program ").Multiple operating systems can be operated in simultaneously In separate unit physical machine, hardware resource is shared each other.Due to being by whole computer(Including CPU, internal memory, operating system and The network equipment)It is encapsulated, therefore virtual machine can be with the x86 operating systems of all standards, application program and device driver It is completely compatible.Can the simultaneously multiple operating systems of safe operation and application program in single computer, each operating system and Application program can when needed access the resource needed for it.
ESX is the enterprise-level virtualization product of VMware, is the virtualized platform bases of vmware, is deployed in server On.It is efficient with advanced resource management function, and flexible fictitious host computer platform, perfect matching enterprise data center passes through Resource utilization, extension computing power and optimization server are improved, VMware ESX servers help enterprise to reduce computer The cost of base frame.
Say from the angle of broad sense, vStorage API are that one kind can allow Virtual base external member and the even closer knot of storage hardware The mechanism of conjunction:
For the storage hardware that virtual external member provides solution.
VMware or third party's management software.
Application program in operate in virtual machine provides more preferable storage service quality.
VAAI(vStorage API for Array Integration)It is the bigger vStorage API specifications of scope A subset, mainly use hardware uninstall feature improving performance.
In virtualization applications, when system performs remote copy and clone's virtual disk, if using traditional duplication Method will take very much, inefficiency.Bring resource consumption excessive to server host to solve existing this generic operation, the time Long problem, realization transfers load to storage hardware, and lift system overall performance now provides one kind and answers in Storage Virtualization With the method for being called full duplication of middle raising data in magnetic disk copy efficiency, the method is by sending full copy command during remote copy Storage system is asked, copy efficiency will be greatly improved, lift system overall performance mitigates server load.
The content of the invention
The technical assignment of the present invention is to solve the deficiencies in the prior art, there is provided copy data in magnetic disk in a kind of virtualization applications Method.
The technical scheme is that what is realized in the following manner, the side of data in magnetic disk is copied in a kind of virtualization applications Method, it implements process and is:
First, storage array hardware receives the initialization requests from fictitious host computer, and the resource needed for distributing, and checks its conjunction Method, wherein validity checking include task status inspection and parameter validity checking, if illegal will terminate the request, and return Return specific perception data;
2nd, the detection of parameter legitimacy is performed, if asynchronous mode request, needs have detected whether identical order Process;
3rd, querying command is sent to copy source and target LUN, determines whether LUN can normally access according to returning result;
4th, judge to copy whether source and target region overlaps;
5th, the data copy of overlapping region is performed, and is marked;
6th, order performs data copy;
7th, retain the status data of command processing result and order the retention data of itself;
8th, result is returned to server;
9th, judge whether the retention data time expires according to timer, if not yet due, continue retention data, if Expire, terminate whole process.
The produced compared with prior art beneficial effect of the present invention is:
The method that data in magnetic disk is copied in a kind of virtualization applications of the present invention is adopted the virtual machine in server host Please remote copy and clone virtual disk load be transferred in storage hardware system, in the process storage system is according to the request Feature Dynamic Execution I/O operation, it is allowed to how far multiple target copy function, greatly improve systematic function;Storage system can be selected In the bob that disconnection copy targeting is performed from the LUN for simplifying, with copy source copy targeting is replaced, inreal diskcopy behaviour When making, but postponing till to the data area execution write operation;Can prevent from drawing because region is grasped in copy source and target area overlaps The copy for rising is chaotic;Improve error handling mechanism, retain done state data and retention data that request is performed, it is allowed to which user is certainly Row arranges retention time;Solve existing this generic operation brings resource consumption excessive to server host, and the problem of overlong time is real Now transfer load to storage hardware, lift system overall performance;It is practical, it is easy to promote.
Description of the drawings
Accompanying drawing 1 is the static diagram in virtualization applications of the invention on full reproduction process virtual disk.
Accompanying drawing 2 is the full replicate data copy process flow chart of the present invention.
Specific embodiment
Below in conjunction with the accompanying drawings the method to copying data in magnetic disk in a kind of virtualization applications of the present invention is said in detailed below It is bright.
The core concept that system involved in the present invention is realized is:Full copy command in virtualized VAAI characteristics can subtract The load at light server host end, and storage array hardware is during this unloading is realized, can be according to the requirement of host side Dynamic is processed, and storage can not perform actual copy, and only be carried out a process for remapping, and can greatly improve The speed of copy procedure;If there is overlap in the duplication source data region and target data area in copy procedure, weight is first copied Folded region, then remaining data of sequential copy again.So will prevent from copying the confusion that data cause because of overlapping;Deposit Storage system can support the synchronization request and Asynchronous Request both of which of full duplication;Because full reproduction process is complicated, there is mistake Probability it is big, so needing to improve error mechanism process.Full reproduction process performs done state data and reservation by order is retained Data, its retention time length is set by user, can so meet needs.
As shown in accompanying drawing 1, Fig. 2, a kind of method that data in magnetic disk is copied in virtualization applications is now provided.Provide in Fig. 1 The complete static diagram for replicating in virtualization applications, disk is mapped as file through virtual level VMFS file system, and the right Raw device is contrasted.The file being present on LUN A in VMFS file system is cloned on LUN B, as a result source file Section<s1,e2>With<s4,e1>It is cloned into file destination section<s4,e3>With<s1,eN>, and storage system can not be performed really Copy function, but only disconnect file destination section<s4,e3>With<s1,eN>, use source file section<s1,e2>With<s4,e1 >Replace, and be read-only by this file mark, when needing to perform write operation to this document, then perform copy work.
Accompanying drawing 2 describes to initialize concrete handling process, mainly has below scheme to realize:
Flow process 100:Storage array hardware receives the initialization requests from fictitious host computer, and the resource needed for distributing, inspection Look into its legitimacy.Wherein validity checking includes task status inspection and parameter validity checking, if illegal will terminate asking Ask, and return specific perception data.
Flow process 101:The detection of parameter legitimacy is performed, if asynchronous mode request, needs have detected whether that identical is ordered Order is being processed.
Flow process 102:INRUIRY querying commands are sent to copy source and target LUN, whether LUN is determined according to returning result Can normally access.
Flow process 103:Judge to copy whether source and target region overlaps.
Flow process 104:The data copy of overlapping region is performed, and is marked.
Flow process 105:Order performs data copy.
Flow process 106:Retain the status data of command processing result and order the retention data of itself.
Flow process 107:Result is returned to server.
Flow process 108:Judge whether the retention data time expires according to timer.
Flow process 109:Continue retention data.
In the present invention, during data copy is performed, in the case of particularly having multiple source and targets, server No longer need repeatedly to send the order of copy data to storage system, but only send a subcommand to storage system.Then The storage system asynchronous process order, process terminate or abnormal end in the case of return result, server root to server Corresponding operation is made according to the result.The method or the greatly I/O load of mitigation server, optimize system.
At some in particular cases, when performing copy in same LUN, there is weight in copy source and copy purpose region It is folded.If using traditional data copying method, copy data may destroy source data because of covering, cause copy procedure to be mixed Disorderly.In the method, the duplication source data of overlap can be first detected, then first copies the data for performing the overlapping region Shellfish, then carries out normal copy function.So avoid because the chaotic generation of copy.
The applied environment occurred during copy data is very complicated, and the type for making a mistake is also more than comparison, existing Copy method error handle is not comprehensive enough.After the completion of copy is performed, storage system needs result and the reservation operated for this Data retain a period of time, if it exceeds this period client send inquire about these data, then can point out mistake.Here side More friendly prompting data will be returned in method to client, and allows client to change the time of retention data.
The scheme that the present invention is provided, by being estimated to I/O request and system status, can good lift system performance.
Certainly, the present invention can also have other various embodiments, ripe in the case of without departing substantially from spirit of the invention and its essence Knowing those skilled in the art can make various corresponding changes and deformation, but these corresponding changes and deformation according to the present invention The protection domain of appended claims of the invention should all be belonged to.
One of ordinary skill in the art will appreciate that all or part of step in said method can be instructed by program Related hardware is completed, and described program can be stored in computer-readable recording medium, such as read-only storage, disk or CD Deng.Alternatively, all or part of step of above-described embodiment can also be realized using one or more integrated circuits.Accordingly Ground, each module/unit in above-described embodiment can be realized in the form of hardware, it would however also be possible to employ the shape of software function module Formula is realized.The present invention is not restricted to the combination of the hardware and software of any particular form.
The foregoing is only embodiments of the invention, it is all within the spirit and principles in the present invention, made it is any Modification, equivalent, improvement etc., should be included within the scope of the present invention.

Claims (1)

1. a kind of method that data in magnetic disk is copied in virtualization applications, it is characterised in that it implements process and is:
First, storage array hardware receives the initialization requests from fictitious host computer, and the initialization requests are the request of full copy command, And the resource needed for distributing, its legitimacy is checked, wherein validity checking includes task status inspection and parameter validity checking, If illegal will terminate the request, and return specific perception data;When performing the parameter legitimacy detection, if asynchronous Mode request, needs have detected whether that identical order is being processed;
2nd, querying command is sent to copy source and target LUN, determines whether LUN can normally access according to returning result;
If the 3, can normally access, judge to copy whether source and target region overlaps;
4th, if overlapping, then the data copy of overlapping region is first carried out, and is marked;
5th, remaining data copy is sequentially performed;
6th, retain the status data of command processing result and order the retention data of itself;
7th, result is returned to server;
8th, judge whether the retention data time expires according to timer, if not yet due, continue retention data, if expired Then terminate whole process.
CN201410015533.7A 2014-01-14 2014-01-14 Method for copying disk data in virtual application Active CN103744625B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410015533.7A CN103744625B (en) 2014-01-14 2014-01-14 Method for copying disk data in virtual application

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410015533.7A CN103744625B (en) 2014-01-14 2014-01-14 Method for copying disk data in virtual application

Publications (2)

Publication Number Publication Date
CN103744625A CN103744625A (en) 2014-04-23
CN103744625B true CN103744625B (en) 2017-05-10

Family

ID=50501646

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410015533.7A Active CN103744625B (en) 2014-01-14 2014-01-14 Method for copying disk data in virtual application

Country Status (1)

Country Link
CN (1) CN103744625B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105159908A (en) * 2015-07-02 2015-12-16 浪潮(北京)电子信息产业有限公司 Database cloning method and apparatus
CN105760211A (en) * 2016-01-18 2016-07-13 浪潮(北京)电子信息产业有限公司 Method and system for cloning virtual machine
US10942857B1 (en) * 2019-09-11 2021-03-09 International Business Machines Corporation Dynamically adjusting a number of memory copy and memory mapping windows to optimize I/O performance

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1504905A (en) * 2002-12-05 2004-06-16 �Ҵ���˾ Method and system for overlapped operation
CN101689148A (en) * 2008-05-29 2010-03-31 威睿公司 offloading storage operations to storage hardware
CN102033792A (en) * 2010-12-17 2011-04-27 浪潮(北京)电子信息产业有限公司 Virtualization-based remote data recovery method and device
US8566542B1 (en) * 2011-01-06 2013-10-22 Hewlett-Packard Development Company, L.P. Backup using storage array LUN level snapshot
CN103455280A (en) * 2012-05-31 2013-12-18 国际商业机器公司 Method and system for copying memory

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1504905A (en) * 2002-12-05 2004-06-16 �Ҵ���˾ Method and system for overlapped operation
CN101689148A (en) * 2008-05-29 2010-03-31 威睿公司 offloading storage operations to storage hardware
CN102033792A (en) * 2010-12-17 2011-04-27 浪潮(北京)电子信息产业有限公司 Virtualization-based remote data recovery method and device
US8566542B1 (en) * 2011-01-06 2013-10-22 Hewlett-Packard Development Company, L.P. Backup using storage array LUN level snapshot
CN103455280A (en) * 2012-05-31 2013-12-18 国际商业机器公司 Method and system for copying memory

Also Published As

Publication number Publication date
CN103744625A (en) 2014-04-23

Similar Documents

Publication Publication Date Title
US9501245B2 (en) Systems and methods for NVMe controller virtualization to support multiple virtual machines running on a host
US8782323B2 (en) Data storage management using a distributed cache scheme
JP5541117B2 (en) Virtual machine migration system, virtual machine migration program, and virtual machine migration method
TWI625674B (en) Systems and methods for nvme controller virtualization to support multiple virtual machines running on a host
US10079850B1 (en) Systems and methods for provisioning cyber security simulation exercises
CN102193824B (en) Virtual machine homogenizes to realize the migration across heterogeneous computers
US8171176B2 (en) Method for selective replication of physical devices on a virtual self-configuring zoning expander
KR20200078382A (en) Solid-state drive with initiator mode
US9213500B2 (en) Data processing method and device
CN108469986A (en) A kind of data migration method and device
US20140095769A1 (en) Flash memory dual in-line memory module management
US20120297382A1 (en) Virtual server and virtual machine management method for supporting zero client
CN102314378A (en) Use the technology that virtual machine is moved in storage of sharing
US20130283264A1 (en) Method for selective replication of physical devices on a virtual self-configuring zoning expander
CN106471469A (en) Input/output in virtualization information processing system accelerates
US20160112342A1 (en) Machine providing method, machine providing system and computer-readable recording medium having stored therein machine providing program
CN103744625B (en) Method for copying disk data in virtual application
US10979289B2 (en) Apparatuses and methods for remote computing node registration and authentication
US9348513B2 (en) SAS virtual tape drive
US11212168B2 (en) Apparatuses and methods for remote computing node initialization using a configuration template and resource pools
JP2013191090A (en) Backup control program, backup control method and information processing apparatus
JP5673396B2 (en) Information processing system, information processing program, and information processing method
US20070300051A1 (en) Out of band asset management
US8055867B2 (en) Methods, apparatuses, and computer program products for protecting pre-staged provisioned data in a storage system
US11016698B2 (en) Storage system that copies write data to another storage system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant