CN104468150A - Method for realizing fault migration through virtual host and virtual host service device - Google Patents

Method for realizing fault migration through virtual host and virtual host service device Download PDF

Info

Publication number
CN104468150A
CN104468150A CN201310415508.3A CN201310415508A CN104468150A CN 104468150 A CN104468150 A CN 104468150A CN 201310415508 A CN201310415508 A CN 201310415508A CN 104468150 A CN104468150 A CN 104468150A
Authority
CN
China
Prior art keywords
host computer
fictitious host
business
server
resource
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201310415508.3A
Other languages
Chinese (zh)
Inventor
朱以军
杨名
孙磊
李群峰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Alibaba Group Holding Ltd
Original Assignee
Alibaba Group Holding Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alibaba Group Holding Ltd filed Critical Alibaba Group Holding Ltd
Priority to CN201310415508.3A priority Critical patent/CN104468150A/en
Publication of CN104468150A publication Critical patent/CN104468150A/en
Priority to HK15105274.9A priority patent/HK1204828A1/en
Pending legal-status Critical Current

Links

Abstract

The application discloses a virtual host service device and a method for realizing fault migration through the same. The method comprises the following steps: searching a second server with a free resource through a resource control module for controlling virtual host service in a unified manner when a virtual host is in fault and a first server to which the virtual host belongs cannot realize disaster recovery, and establishing a new virtual host in the second server and updating service route; and migrating the service on the virtual host in fault to the new virtual host according to a downloaded configuration file and the updated service route. The data migration and user intervention are unnecessary in the migration of the virtual host disclosed by the application; the service can be directly transferred to the new virtual host only according to the updated route after the virtual host is successfully established; the traffic is directly cut so that the subsequent access is performed on the migrated virtual host resource; and zero interrupt of the service is realized. Thus the seamless migration of the fault is simply and flexibly realized, and the reliable operation of the user service is guaranteed.

Description

A kind of fictitious host computer realizes method and the fictitious host computer service apparatus of fault migration
Technical field
The application relates to fictitious host computer technology, and espespecially a kind of fictitious host computer realizes method and the fictitious host computer service apparatus of fault migration.
Background technology
Fictitious host computer (virtual hosting) refers to the empty level technology by web servers such as apache, nginx, to provide the running environment of webpage.
At present, fictitious host computer all carries out multiplexing based on separate unit physical equipment, is namely directly resolved to the fictitious host computer on corresponding physical equipment by A address (Address) or CNAME.The problem caused be exactly when user fictitious host computer when run into attacked or fault, an other physical equipment can only be moved to.And along with the migration of fictitious host computer, the IP address of user and temporary domain name all can change, thus cause the interruption of customer service, now, just need user manually again to configure A address or CANME, after new record comes into force, business could be recovered.Wherein, A address record is used to the record of IP address corresponding to given host name (or domain name), and the Website server under this domain name can be directed in the web server of oneself by user.The subdomain name of domain name also can be set simultaneously; CNAME is canonical name, and this record allows multiple mapping names to same computer.
Like this, when fictitious host computer attacked or delay machine, cannot Failure Transfer be accomplished; Nor the situation of fictitious host computer dynamic adjustment resource size and running environment can easily be supported.Visible, because existing fictitious host computer cannot cross over single machine device resource, its computational resource is limited in a station server scope of resource, cannot break through separate unit Calculation bottleneck.Also just because of fictitious host computer is limited to separate unit physical machine resource, traffic handing capacity is subject to great restriction, and maximum computing capability can not exceed the computing capability of single machine.
Summary of the invention
In order to solve the problems of the technologies described above, this application provides method and fictitious host computer service apparatus that a kind of fictitious host computer realizes fault migration, the seamless migration of fault can be realized simply, neatly, guarantee the reliability service of customer service.
In order to reach the application's object, the application provides a kind of fictitious host computer to realize the method for fault migration, comprising: described fictitious host computer fault and the first server at its place can not realize disaster tolerance;
Resource controlled block searches the second server possessing idling-resource, creates new fictitious host computer and more new business route in described second server;
Business on the fictitious host computer broken down also is transferred to described new fictitious host computer according to the described business route after upgrading by download configuration file.
Business is also transferred to described new fictitious host computer comprises according to the described business route after upgrading by described download configuration file:
Download configuration file from the configuration service of described resource controlled block, increase the fictitious host computer of described new establishment to monitoring relating dot, and the business routing table on the fictitious host computer broken down described in amendment, so that the business on the fictitious host computer broken down is transferred to described new fictitious host computer.
The method also comprises: the business on the whole fictitious host computers outside the described fictitious host computer in described first server is transferred to described second server.
Described resource controlled block creates new virtual machine at described second server and comprises:
Whether described resource controlled block is searched in resources bank suitable server resource, if find enough server resources, and fictitious host computer new according to this asset creation locking protection;
Download configuration file from the configuration service of described resource controlled block, carries out initialization to the successful described new fictitious host computer of establishment;
The successful described new fictitious host computer of establishment is registered to the monitoring resource platform in described resource controlled block, and in business route mapping table, increases the business route on described new fictitious host computer.
When described fictitious host computer needs staging business, the method also comprises:
In the resources bank of described resource controlled block, search the described surplus resources needing to realize the fictitious host computer place server of staging business, need if described the surplus resources of the fictitious host computer place server realizing staging business not enough, then search the surplus resources of other servers;
If find the server having idling-resource, then create new fictitious host computer on that server and lock resource;
Download configuration file from the configuration service of described resource controlled block, carries out initialization to the successful fictitious host computer of described establishment;
Successful for described establishment fictitious host computer is registered to the monitoring resource platform in described resource controlled block, and increases the business route on described fictitious host computer in business route mapping table.
The application also provides a kind of fictitious host computer service apparatus, at least comprises resource controlled block, and two or more servers; In fictitious host computer fault and the first server at its place can not realize disaster tolerance time,
Described resource controlled block, for searching the second server possessing idling-resource, creates new fictitious host computer and more new business route in described second server; Business on the fictitious host computer broken down also is transferred to described new fictitious host computer according to the described business route after upgrading by download configuration file.
Also comprise: traffic aggregation entrance, business routing module, and for storing the memory module of all user data; Wherein,
Traffic aggregation entrance, for providing the unified interface of accesses virtual main frame; When user is by the access of traffic aggregation entrance, call business routing module inquiry business route, and according to Query Result by the fictitious host computer in server extremely corresponding for traffic distribution;
Business routing module, wherein stores the traffic distribution mapping table of fictitious host computer; Receive the inquiry from traffic aggregation entrance, the business route of the fictitious host computer of current accessed is returned to traffic aggregation entrance.
Described resource controlled block, specifically for:
Search the second server possessing idling-resource, in described second server, create new fictitious host computer and more new business route; Download configuration file from self configuration service, increase the fictitious host computer of described new establishment to monitoring relating dot, and the business routing table on the fictitious host computer broken down described in amendment, so that the business on the fictitious host computer broken down is transferred to described new fictitious host computer.
Described resource controlled block, also for the business on the whole fictitious host computers outside the described fictitious host computer in described first server is transferred to described second server.
Described resource controlled block, also for:
Search in resources bank and whether have suitable server resource, when finding enough server resources, fictitious host computer new according to this asset creation locking protection; Download configuration file from its configuration service, carries out initialization to the successful described new fictitious host computer of establishment; The successful described new fictitious host computer of establishment is registered to the monitoring resource platform in described resource controlled block, and in business route mapping table, increases the business route on the new fictitious host computer of described generation.
When described fictitious host computer needs staging business,
Described resource controlled block, also for when the described surplus resources needing the fictitious host computer place server realizing staging business is not enough, searches the surplus resources of other servers; The server having idling-resource creates new fictitious host computer and lock resource; Download configuration file from the configuration service of described resource controlled block, carries out initialization to created successful fictitious host computer; The successful fictitious host computer of establishment is registered to the monitoring resource platform of described resource controlled block, in business route mapping table, increases the business route on described fictitious host computer; And send update notification to described business routing module;
Described business routing module, also for receiving the update notification from resource controlled block, upgrades traffic distribution mapping table.
Described traffic aggregation entrance is made up of one or more Nginx.
The scheme that the application provides be included in fictitious host computer fault and the first server at its place can not realize disaster tolerance time, after finding for the resource controlled block of unified management fictitious host computer business the second server possessing idling-resource, in second server, create new fictitious host computer and more new business route; According to the configuration file downloaded and the business route after upgrading, the business on the fictitious host computer broken down is transferred to new fictitious host computer.The migration of the application's fictitious host computer is without the need to Data Migration and user intervention, create successfully at fictitious host computer, only need according to the route after renewal as the business mapping table by upgrading inside, business is directly transferred to new fictitious host computer, direct cutting flow, subsequent access be all migration after fictitious host computer resource, for business be zero interruption impact.Visible, the application achieves the seamless migration of fault simply, neatly, ensure that the reliability service of customer service.
Further, when fictitious host computer carries out upgrading service, the elasticity of server is realized by redundant resource, and is shared by multiple servers and by load balancing by traffic aggregation entrance, achieves the infinite expanding ability of the application.
The further feature of the application and advantage will be set forth in the following description, and, partly become apparent from specification, or understand by implementing the application.The object of the application and other advantages realize by structure specifically noted in specification, claims and accompanying drawing and obtain.
Accompanying drawing explanation
Accompanying drawing is used to provide the further understanding to technical scheme, and forms a part for specification, is used from the technical scheme explaining the application, does not form the restriction to technical scheme with the embodiment one of the application.
Fig. 1 is the structure composed schematic diagram of the application's fictitious host computer service apparatus;
Fig. 2 is the schematic flow sheet that the application's fictitious host computer realizes the method for fault migration;
Fig. 3 is the purchase operation flow schematic diagram of fictitious host computer;
Fig. 4 creates successfully at fictitious host computer, and fictitious host computer realizes the schematic flow sheet of staging business.
Embodiment
For making the object of the application, technical scheme and advantage clearly understand, hereinafter will by reference to the accompanying drawings the embodiment of the application be described in detail.It should be noted that, when not conflicting, the embodiment in the application and the feature in embodiment can combination in any mutually.
In the application one typically configuration, computing equipment comprises one or more processor (CPU), input/output interface, network interface and internal memory.
Internal memory may comprise the volatile memory in computer-readable medium, the form such as random-access memory (ram) and/or Nonvolatile memory, as read-only memory (ROM) or flash memory (flashRAM).Internal memory is the example of computer-readable medium.
Computer-readable medium comprises permanent and impermanency, removable and non-removable media can be stored to realize information by any method or technology.Information can be computer-readable instruction, data structure, the module of program or other data.The example of the storage medium of computer comprises, but be not limited to phase transition internal memory (PRAM), static RAM (SRAM), dynamic random access memory (DRAM), the random-access memory (ram) of other types, read-only memory (ROM), Electrically Erasable Read Only Memory (EEPROM), fast flash memory bank or other memory techniques, read-only optical disc read-only memory (CD-ROM), digital versatile disc (DVD) or other optical storage, magnetic cassette tape, tape magnetic rigid disk stores or other magnetic storage apparatus or any other non-transmitting medium, can be used for storing the information can accessed by computing equipment.According to defining herein, computer-readable medium does not comprise non-temporary computer readable media (transitory media), as data-signal and the carrier wave of modulation.
Can perform in the computer system of such as one group of computer executable instructions in the step shown in the flow chart of accompanying drawing.Further, although show logical order in flow charts, in some cases, can be different from the step shown or described by order execution herein.
Fig. 1 is the structure composed schematic diagram of the application's fictitious host computer service apparatus, as shown in Figure 1, comprises traffic aggregation entrance, business routing module, memory module, resource controlled block, and one or more servers; Wherein,
Traffic aggregation entrance, for providing the unified interface of accesses virtual main frame, can be made up of one or more Nginx, playing the effect of load balancing simultaneously.Wherein, Nginx(Engine x) be Web server/Reverse Proxy and Email (IMAP/POP3) proxy server of a lightweight.
The IP of all business falls the Nginx of front end, and the running environment decoupling zero of rear end.When user is by traffic aggregation entrance access Nginx, Nginx calls business routing module, and the business route of fictitious host computer according to Query Result and current accessed, by traffic distribution to the fictitious host computer in corresponding server.
Business routing module, wherein stores the traffic distribution mapping table of fictitious host computer, provides the inquiry to the forwarding strategy of flow and renewal.Receive the inquiry from traffic aggregation entrance, the fictitious host computer of current accessed is returned to traffic aggregation entrance; Receive the update notification from resource controlled block, upgrade traffic distribution mapping table.
Wherein, the traffic distribution mapping table in business routing module is a large K-V table, and wherein, Key is IP address and port numbers, and Value which fictitious host computer that to be corresponding run entity be in which station server, run entity can be one or more.When for multiple run entity, according to the configuration of each run entity, corresponding weighted value can be set.Here weighted value can dynamically arrange, and such as according to the proportional setting of the resource size of run entity, for example, supposes there are three run entities, occupies 1G respectively, 2G and 3G bandwidth, and so, when arranging weight, respective weighted value is correspondence 1,2,3 respectively.
Memory module, for storing all user data.Here, namely unified storage of data be shared in distributed file system, ensure that the highly reliable of data and infinite expanding.
Resource controlled block, for unified management fictitious host computer business, the production of such as fictitious host computer, amendment, safeguards and reclaims; When the change of the business of generation route, send update notification to business routing module.
Particularly, in fictitious host computer fault and the first server at this fictitious host computer place self can not disaster tolerance time, resource controlled block is used for, and finds the second server possessing idling-resource and in this server, creates new fictitious host computer and more new business route; Business on the fictitious host computer broken down also is transferred to new fictitious host computer according to the business route after upgrading by download configuration file.
When needs create fictitious host computer, in its resources bank, search whether there is suitable server resource, if find enough server resources, according to this asset creation fictitious host computer and locking protection; Download configuration file from its configuration service, carries out initialization to the successful fictitious host computer of establishment; The successful fictitious host computer of establishment is registered to the monitoring resource platform in resource controlled block, and in business route mapping table, increases the business route of the business on the fictitious host computer of described generation.
When fictitious host computer needs to realize staging business, by inquiring about in its resources bank, when needing the surplus resources of the fictitious host computer place server realizing staging business not enough, search the surplus resources of other servers; The server having idling-resource creates new fictitious host computer and lock resource; Download configuration file from the configuration service of resource controlled block, carries out initialization to created successful fictitious host computer; The successful fictitious host computer of establishment is registered to the monitoring resource platform of resource controlled block, in business route mapping table, increases the business route on described fictitious host computer; And send update notification to business routing module.
Resource controlled block, also for the business on the whole fictitious host computers outside the fictitious host computer in first server is transferred to second server.
Visible, the traffic aggregation entrance that the application is arranged by front end, and for the business mapping table of the mapping relations that store one-to-many, extend many run entities easily, unlimited many disposal abilities can be provided in theory.The resource controlled block of the application provides monitoring and the migration service of running environment, ensure that the operational reliability of resource; And the configuration service of resource controlled block is as configuration management center, concentrate the configuration information maintaining fictitious host computer and user.When creating new run entity or migration, the data of direct download configuration administrative center, complete initialization, ensure that the consistency of data, also ensure that the consistency of running environment.
The independent operating environment that the application's fictitious host computer service apparatus provides is the fictitious host computer running environment provided by Apache, Nginx etc., and running environment can complete the parsing of the script such as static traffic and PHP, JSP, ASP.Each running environment is independently, each configuration file of having self by oneself; And the configuration file unification of each user is configured by resource controlled block, is safeguarded.
Fig. 2 is the schematic flow sheet that the application's fictitious host computer realizes the method for fault migration, as shown in Figure 2, comprises the following steps:
Step 200: fictitious host computer fault and its place server self can not realize disaster tolerance.The realization of this step belongs to prior art, roughly comprises: the aggregate resource of a station server is defined in resource controlled block, and after distributing run entity and fictitious host computer, the available resource of this server will reduce.Judge can disaster tolerance time, can only need comparison disaster tolerance resource requirement and the remaining resource of this server to know disaster tolerance.In the application, the server at the fictitious host computer place of breaking down is also referred to as first server.
This step also comprises: if the server at fictitious host computer place can disaster tolerance, directly restart service in the machine, carry out initialization.Process ends.
Step 201: resource controlled block searches idling-resource.Specifically comprise:
Now show that fault is other fault of server level, whether resource controlled block searches other servers in own resource storehouse enough idling-resources.Because resource controlled block is used for unified management fictitious host computer business, the production of such as fictitious host computer, amendment, safeguard and reclaim, therefore, resource management module can be judged by the resource service condition of its resources bank to server.
If there is no idling-resource, Failure Transfer failure also alarm, process ends.
In the application, the server possessing idling-resource found is also referred to as second server.
Step 201: after the available free resource of other servers outside the server finding the fictitious host computer place of breaking down, creates new fictitious host computer and more new business route in this server.
In this step, create running environment and create fictitious host computer foregoing with the specific implementation increasing new fictitious host computer, repeat no more here.
In this step, new business route associates with the party in request of establishment, and corresponding one of the business of each user produces mark (saleid), the resource requirement state that this saleid shows user and the run entity situation associated.The IP address that more new business route is namely corresponding according to business saleid is retrieved, and after finding corresponding route entity, upgrades entity information.
Step 202: business is also transferred to new fictitious host computer according to the business route after upgrading by download configuration file.
Download configuration file from the configuration service of resource controlled block initialization.Increase fictitious host computer to monitoring relating dot, and revise business routing table to get through data channel.
It should be noted that, for the transfer of traffic failure, also can carry out global transfer, namely when a fictitious host computer breaks down, all fictitious host computers of its place server all shift, and concrete transfer method, as shown in step 201-step 202, repeats no more here.
Realize the method for fault migration from the application's fictitious host computer, the migration of fictitious host computer, without the need to Data Migration and user intervention, is also zero interruption impact for business.When needing migration fictitious host computer, only need select the server that suitable, create corresponding fictitious host computer in the server, create successfully at fictitious host computer, by upgrading inner business mapping table, directly cut flow, subsequent access be all fictitious host computer resource after migration.
Also comprise before the application's method: the purchase operation flow of fictitious host computer, as shown in Figure 3, complete the generation of order at existing platform of selling and carry out the production of fictitious host computer after paying, the generation of fictitious host computer mainly comprises the following steps:
Step 300: whether resource controlled block is searched in resources bank suitable server resource, if do not found, shows to produce unsuccessfully, and notice is sold platform and reports to the police, process ends.
Step 301: if find enough server resources, according to this asset creation running environment and locking protection.
Wherein locking protection is exactly the monitoring server that notice is specifically designed to monitoring running environment; in resources bank, available resources are how many; and regularly throw monitor data to monitoring server; monitoring server calculates afterwards and quota compares; thus the monitoring completed running environment; specific implementation belongs to prior art, and it is also not used in the protection range limiting the application, repeats no more here.
Step 302: download configuration file from the configuration service of described resource controlled block, carries out initialization for created successful running environment.
Step 303: increase fictitious host computer and the monitoring resource platform be registered in resource controlled block, to complete the monitoring of health degree and resource.The specific implementation of this step belongs to prior art, namely realizes the monitoring to running environment by monitoring server, repeats no more here.
Step 304: increase new business route in business route mapping table.Now fictitious host computer creates successfully, and notice sells platform.
Create successfully at fictitious host computer, if fictitious host computer needs staging business, its operation flow comprises:
Step 400: in the resources bank of resource controlled block, search the surplus resources that same needs to realize the fictitious host computer place server of staging business, and judge whether the demand that can meet upgrading, if this server self just can meet upgrade requirement, then directly revise the information in resources bank, with the available resources extended one's service.
Step 401: if need the surplus resources of the fictitious host computer place server realizing staging business not enough, then search the surplus resources of other servers.
If the server resource finding out other is also not enough to realize upgrading, then this is upgraded unsuccessfully and notifies to sell platform.
Step 402: have suitable Resource Server if found, then create new running environment and lock resource.
Step 403: download configuration file from the configuration service of described resource controlled block, carries out initialization for created successful running environment.
Step 404: increase fictitious host computer and be registered in resource controlled block, completing the monitoring of health degree and resource.
Step 405: increase new business route in business route mapping table.
For the multiple running environment of same business association, when revising business route mapping table, need the mapping considering multirouting entry.Such as, can be realized by similar mechanism such as dynamic arrays, a Key manages an array, and the numerical value in array is exactly the IP of corresponding actual motion environment.The corresponding resource distribution of each run entity, the disposal ability ratio of resource distribution determines the weight of multirouting entry.
When fictitious host computer carries out upgrading service, the elasticity of server is realized by redundant resource, and shared by multiple servers and by load balancing by traffic aggregation entrance, the infinite expanding ability and the traffic aggregation entrance that achieve the application can horizontal extension.
It is apparent to those skilled in the art that each part of the device that above-mentioned the embodiment of the present application provides, and each step in method, they can concentrate on single calculation element, or are distributed on network that multiple calculation element forms.Alternatively, they can realize with the executable program code of calculation element.Thus, they can be stored and be performed by calculation element in the storage device, or they are made into each integrated circuit modules respectively, or the multiple module in them or step are made into single integrated circuit module to realize.Like this, the application is not restricted to any specific hardware and software combination.
Although the execution mode disclosed by the application is as above, the execution mode that described content only adopts for ease of understanding the application, and be not used to limit the application.Those of skill in the art belonging to any the application; under the prerequisite not departing from the spirit and scope disclosed by the application; any amendment and change can be carried out in the form implemented and details; but the scope of patent protection of the application, the scope that still must define with appending claims is as the criterion.

Claims (12)

1. fictitious host computer realizes a method for fault migration, it is characterized in that, comprising: described fictitious host computer fault and the first server at its place can not realize disaster tolerance;
Resource controlled block searches the second server possessing idling-resource, creates new fictitious host computer and more new business route in described second server;
Business on the fictitious host computer broken down also is transferred to described new fictitious host computer according to the described business route after upgrading by download configuration file.
2. method according to claim 1, is characterized in that, business is also transferred to described new fictitious host computer comprises according to the described business route after upgrading by described download configuration file:
Download configuration file from the configuration service of described resource controlled block, increase the fictitious host computer of described new establishment to monitoring relating dot, and the business routing table on the fictitious host computer broken down described in amendment, so that the business on the fictitious host computer broken down is transferred to described new fictitious host computer.
3. method according to claim 2, is characterized in that, the method also comprises: the business on the whole fictitious host computers outside the described fictitious host computer in described first server is transferred to described second server.
4. method according to claim 1, is characterized in that, described resource controlled block creates new virtual machine at described second server and comprises:
Whether described resource controlled block is searched in resources bank suitable server resource, if find enough server resources, and fictitious host computer new according to this asset creation locking protection;
Download configuration file from the configuration service of described resource controlled block, carries out initialization to the successful described new fictitious host computer of establishment;
The successful described new fictitious host computer of establishment is registered to the monitoring resource platform in described resource controlled block, and in business route mapping table, increases the business route on described new fictitious host computer.
5. the method according to claim 1 or 4, is characterized in that, when described fictitious host computer needs staging business, the method also comprises:
In the resources bank of described resource controlled block, search the described surplus resources needing to realize the fictitious host computer place server of staging business, need if described the surplus resources of the fictitious host computer place server realizing staging business not enough, then search the surplus resources of other servers;
If find the server having idling-resource, then create new fictitious host computer on that server and lock resource;
Download configuration file from the configuration service of described resource controlled block, carries out initialization to the successful fictitious host computer of described establishment;
The monitoring resource that successful for described establishment fictitious host computer is registered in described resource controlled block is put down
Platform, and in business route mapping table, increase the business route on described fictitious host computer.
6. a fictitious host computer service apparatus, is characterized in that, at least comprises resource controlled block, and two or more servers; In fictitious host computer fault and the first server at its place can not realize disaster tolerance time,
Described resource controlled block, for searching the second server possessing idling-resource, creates new fictitious host computer and more new business route in described second server; Business on the fictitious host computer broken down also is transferred to described new fictitious host computer according to the described business route after upgrading by download configuration file.
7. fictitious host computer service apparatus according to claim 6, is characterized in that, also comprise: traffic aggregation entrance, business routing module, and for storing the memory module of all user data; Wherein,
Traffic aggregation entrance, for providing the unified interface of accesses virtual main frame; When user is by the access of traffic aggregation entrance, call business routing module inquiry business route, and according to Query Result by the fictitious host computer in server extremely corresponding for traffic distribution;
Business routing module, wherein stores the traffic distribution mapping table of fictitious host computer; Receive the inquiry from traffic aggregation entrance, the business route of the fictitious host computer of current accessed is returned to traffic aggregation entrance.
8. fictitious host computer service apparatus according to claim 7, is characterized in that, described resource controlled block, specifically for:
Search the second server possessing idling-resource, in described second server, create new fictitious host computer and more new business route; Download configuration file from self configuration service, increase the fictitious host computer of described new establishment to monitoring relating dot, and the business routing table on the fictitious host computer broken down described in amendment, so that the business on the fictitious host computer broken down is transferred to described new fictitious host computer.
9. fictitious host computer service apparatus according to claim 8, is characterized in that, described resource controlled block, also for the business on the whole fictitious host computers outside the described fictitious host computer in described first server is transferred to described second server.
10. fictitious host computer service apparatus according to claim 7, is characterized in that, described resource controlled block, also for:
Search in resources bank and whether have suitable server resource, when finding enough server resources, fictitious host computer new according to this asset creation locking protection; Download configuration file from its configuration service, carries out initialization to the successful described new fictitious host computer of establishment; The successful described new fictitious host computer of establishment is registered to the monitoring resource platform in described resource controlled block, and in business route mapping table, increases the business route on the new fictitious host computer of described generation.
11. fictitious host computer service apparatus according to claim 7 or 10, is characterized in that, when described fictitious host computer needs staging business,
Described resource controlled block, also for when the described surplus resources needing the fictitious host computer place server realizing staging business is not enough, searches the surplus resources of other servers; The server having idling-resource creates new fictitious host computer and lock resource; Download configuration file from the configuration service of described resource controlled block, carries out initialization to created successful fictitious host computer; The successful fictitious host computer of establishment is registered to the monitoring resource platform of described resource controlled block, in business route mapping table, increases the business route on described fictitious host computer; And send update notification to described business routing module;
Described business routing module, also for receiving the update notification from resource controlled block, upgrades traffic distribution mapping table.
12. fictitious host computer service apparatus according to claim 7, is characterized in that, described traffic aggregation entrance is made up of one or more Nginx.
CN201310415508.3A 2013-09-12 2013-09-12 Method for realizing fault migration through virtual host and virtual host service device Pending CN104468150A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201310415508.3A CN104468150A (en) 2013-09-12 2013-09-12 Method for realizing fault migration through virtual host and virtual host service device
HK15105274.9A HK1204828A1 (en) 2013-09-12 2015-06-03 Method for realizing failover through virtual host and device for virtual host service

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310415508.3A CN104468150A (en) 2013-09-12 2013-09-12 Method for realizing fault migration through virtual host and virtual host service device

Publications (1)

Publication Number Publication Date
CN104468150A true CN104468150A (en) 2015-03-25

Family

ID=52913578

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310415508.3A Pending CN104468150A (en) 2013-09-12 2013-09-12 Method for realizing fault migration through virtual host and virtual host service device

Country Status (2)

Country Link
CN (1) CN104468150A (en)
HK (1) HK1204828A1 (en)

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107368358A (en) * 2016-05-11 2017-11-21 华为技术有限公司 Realize the apparatus and method that virtual machine where client migrates between different main frames
CN107872499A (en) * 2016-09-28 2018-04-03 北京金山云网络技术有限公司 Service establishing method, apparatus and system
CN108649597A (en) * 2018-05-22 2018-10-12 清华大学 The analysis method that a kind of failure moving method and failure influence HVDC commutation failures
TWI663547B (en) * 2017-01-19 2019-06-21 International Business Machines Corporation Computer program product, computer implemented method and computer system for saving/restoring guarded storage controls in a virtualized environment
WO2019149029A1 (en) * 2018-01-31 2019-08-08 华为技术有限公司 Service equipment switching method, and device for same
US10452288B2 (en) 2017-01-19 2019-10-22 International Business Machines Corporation Identifying processor attributes based on detecting a guarded storage event
US10496311B2 (en) 2017-01-19 2019-12-03 International Business Machines Corporation Run-time instrumentation of guarded storage event processing
US10579377B2 (en) 2017-01-19 2020-03-03 International Business Machines Corporation Guarded storage event handling during transactional execution
US10725685B2 (en) 2017-01-19 2020-07-28 International Business Machines Corporation Load logical and shift guarded instruction
US10732858B2 (en) 2017-01-19 2020-08-04 International Business Machines Corporation Loading and storing controls regulating the operation of a guarded storage facility
CN113495798A (en) * 2020-03-20 2021-10-12 深圳市理邦精密仪器股份有限公司 Method and system for selecting server based on information terminal
CN113765689A (en) * 2021-01-04 2021-12-07 北京沃东天骏信息技术有限公司 Machine room switching method, device, equipment and storage medium

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102073462A (en) * 2010-11-29 2011-05-25 华为技术有限公司 Virtual storage migration method and system and virtual machine monitor
US20110246669A1 (en) * 2010-03-30 2011-10-06 Hitachi, Ltd. Method and system of virtual machine migration
CN102546700A (en) * 2010-12-23 2012-07-04 中国移动通信集团公司 Resource scheduling and resource migration methods and equipment
CN102917025A (en) * 2012-09-21 2013-02-06 江苏乐买到网络科技有限公司 Method for business migration based on cloud computing platform
CN102984762A (en) * 2012-12-12 2013-03-20 中国联合网络通信集团有限公司 Method and device for function allocation of IMS
CN103077079A (en) * 2012-12-28 2013-05-01 华为技术有限公司 Method and device for controlling migration of virtual machine
CN103152419A (en) * 2013-03-08 2013-06-12 中标软件有限公司 High availability cluster management method for cloud computing platform

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110246669A1 (en) * 2010-03-30 2011-10-06 Hitachi, Ltd. Method and system of virtual machine migration
CN102073462A (en) * 2010-11-29 2011-05-25 华为技术有限公司 Virtual storage migration method and system and virtual machine monitor
CN102546700A (en) * 2010-12-23 2012-07-04 中国移动通信集团公司 Resource scheduling and resource migration methods and equipment
CN102917025A (en) * 2012-09-21 2013-02-06 江苏乐买到网络科技有限公司 Method for business migration based on cloud computing platform
CN102984762A (en) * 2012-12-12 2013-03-20 中国联合网络通信集团有限公司 Method and device for function allocation of IMS
CN103077079A (en) * 2012-12-28 2013-05-01 华为技术有限公司 Method and device for controlling migration of virtual machine
CN103152419A (en) * 2013-03-08 2013-06-12 中标软件有限公司 High availability cluster management method for cloud computing platform

Cited By (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107368358B (en) * 2016-05-11 2020-07-24 华为技术有限公司 Device and method for realizing migration of virtual machine of client among different hosts
CN107368358A (en) * 2016-05-11 2017-11-21 华为技术有限公司 Realize the apparatus and method that virtual machine where client migrates between different main frames
CN107872499A (en) * 2016-09-28 2018-04-03 北京金山云网络技术有限公司 Service establishing method, apparatus and system
CN107872499B (en) * 2016-09-28 2021-05-25 北京金山云网络技术有限公司 Service creation method, device and system
US10929130B2 (en) 2017-01-19 2021-02-23 International Business Machines Corporation Guarded storage event handling during transactional execution
US10452288B2 (en) 2017-01-19 2019-10-22 International Business Machines Corporation Identifying processor attributes based on detecting a guarded storage event
US10496292B2 (en) 2017-01-19 2019-12-03 International Business Machines Corporation Saving/restoring guarded storage controls in a virtualized environment
US10496311B2 (en) 2017-01-19 2019-12-03 International Business Machines Corporation Run-time instrumentation of guarded storage event processing
US10579377B2 (en) 2017-01-19 2020-03-03 International Business Machines Corporation Guarded storage event handling during transactional execution
US10725685B2 (en) 2017-01-19 2020-07-28 International Business Machines Corporation Load logical and shift guarded instruction
US10732858B2 (en) 2017-01-19 2020-08-04 International Business Machines Corporation Loading and storing controls regulating the operation of a guarded storage facility
TWI663547B (en) * 2017-01-19 2019-06-21 International Business Machines Corporation Computer program product, computer implemented method and computer system for saving/restoring guarded storage controls in a virtualized environment
US11010066B2 (en) 2017-01-19 2021-05-18 International Business Machines Corporation Identifying processor attributes based on detecting a guarded storage event
WO2019149029A1 (en) * 2018-01-31 2019-08-08 华为技术有限公司 Service equipment switching method, and device for same
CN108649597A (en) * 2018-05-22 2018-10-12 清华大学 The analysis method that a kind of failure moving method and failure influence HVDC commutation failures
CN113495798A (en) * 2020-03-20 2021-10-12 深圳市理邦精密仪器股份有限公司 Method and system for selecting server based on information terminal
CN113765689A (en) * 2021-01-04 2021-12-07 北京沃东天骏信息技术有限公司 Machine room switching method, device, equipment and storage medium

Also Published As

Publication number Publication date
HK1204828A1 (en) 2015-12-04

Similar Documents

Publication Publication Date Title
CN104468150A (en) Method for realizing fault migration through virtual host and virtual host service device
US10715485B2 (en) Managing dynamic IP address assignments
CN112087312B (en) Method, device and equipment for providing edge service
EP3418877B1 (en) Data writing and reading method and apparatus, and cloud storage system
US9720724B2 (en) System and method for assisting virtual machine instantiation and migration
CN112532675B (en) Method, device and medium for establishing network edge computing system
US11010265B2 (en) Decentralized data protection system using local metadata
CN107734026A (en) A kind of design method, device and the equipment of network attached storage cluster
US9628505B2 (en) Deploying a security appliance system in a high availability environment without extra network burden
CN103516777A (en) A method of provisioning in a cloud compute environment
US9390156B2 (en) Distributed directory environment using clustered LDAP servers
CN105045762A (en) Management method and apparatus for configuration file
CN106385455A (en) CDN (Content Delivery Network) mirror-based whole site lock setting method
CN105069152A (en) Data processing method and apparatus
US10924452B1 (en) Auditing IP address assignments
CN110351107B (en) Configuration management method and device
US11108854B2 (en) Peer-to-peer network for internet of things resource allocation operation
US20200133780A1 (en) Method, device and computer program product for data processing
CN116016028B (en) Method, system, medium and equipment for creating multiple network interfaces for Pod based on IPvlan
CN112887116A (en) Method, apparatus and article of manufacture for managing application nodes in a distributed application system
CN116346834A (en) Session synchronization method, device, computing equipment and computer storage medium
WO2023029485A1 (en) Data processing method and apparatus, computer device, and computer-readable storage medium
CN105338058A (en) Application updating method and device
CN115914404A (en) Cluster flow management method and device, computer equipment and storage medium
CN110958182B (en) Communication method and related equipment

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
REG Reference to a national code

Ref country code: HK

Ref legal event code: DE

Ref document number: 1204828

Country of ref document: HK

RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20150325

REG Reference to a national code

Ref country code: HK

Ref legal event code: WD

Ref document number: 1204828

Country of ref document: HK