CN104468150A - Method for realizing fault migration through virtual host and virtual host service device - Google Patents
Method for realizing fault migration through virtual host and virtual host service device Download PDFInfo
- Publication number
- CN104468150A CN104468150A CN201310415508.3A CN201310415508A CN104468150A CN 104468150 A CN104468150 A CN 104468150A CN 201310415508 A CN201310415508 A CN 201310415508A CN 104468150 A CN104468150 A CN 104468150A
- Authority
- CN
- China
- Prior art keywords
- host computer
- fictitious host
- business
- server
- resource
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Abstract
The application discloses a virtual host service device and a method for realizing fault migration through the same. The method comprises the following steps: searching a second server with a free resource through a resource control module for controlling virtual host service in a unified manner when a virtual host is in fault and a first server to which the virtual host belongs cannot realize disaster recovery, and establishing a new virtual host in the second server and updating service route; and migrating the service on the virtual host in fault to the new virtual host according to a downloaded configuration file and the updated service route. The data migration and user intervention are unnecessary in the migration of the virtual host disclosed by the application; the service can be directly transferred to the new virtual host only according to the updated route after the virtual host is successfully established; the traffic is directly cut so that the subsequent access is performed on the migrated virtual host resource; and zero interrupt of the service is realized. Thus the seamless migration of the fault is simply and flexibly realized, and the reliable operation of the user service is guaranteed.
Description
Technical field
The application relates to fictitious host computer technology, and espespecially a kind of fictitious host computer realizes method and the fictitious host computer service apparatus of fault migration.
Background technology
Fictitious host computer (virtual hosting) refers to the empty level technology by web servers such as apache, nginx, to provide the running environment of webpage.
At present, fictitious host computer all carries out multiplexing based on separate unit physical equipment, is namely directly resolved to the fictitious host computer on corresponding physical equipment by A address (Address) or CNAME.The problem caused be exactly when user fictitious host computer when run into attacked or fault, an other physical equipment can only be moved to.And along with the migration of fictitious host computer, the IP address of user and temporary domain name all can change, thus cause the interruption of customer service, now, just need user manually again to configure A address or CANME, after new record comes into force, business could be recovered.Wherein, A address record is used to the record of IP address corresponding to given host name (or domain name), and the Website server under this domain name can be directed in the web server of oneself by user.The subdomain name of domain name also can be set simultaneously; CNAME is canonical name, and this record allows multiple mapping names to same computer.
Like this, when fictitious host computer attacked or delay machine, cannot Failure Transfer be accomplished; Nor the situation of fictitious host computer dynamic adjustment resource size and running environment can easily be supported.Visible, because existing fictitious host computer cannot cross over single machine device resource, its computational resource is limited in a station server scope of resource, cannot break through separate unit Calculation bottleneck.Also just because of fictitious host computer is limited to separate unit physical machine resource, traffic handing capacity is subject to great restriction, and maximum computing capability can not exceed the computing capability of single machine.
Summary of the invention
In order to solve the problems of the technologies described above, this application provides method and fictitious host computer service apparatus that a kind of fictitious host computer realizes fault migration, the seamless migration of fault can be realized simply, neatly, guarantee the reliability service of customer service.
In order to reach the application's object, the application provides a kind of fictitious host computer to realize the method for fault migration, comprising: described fictitious host computer fault and the first server at its place can not realize disaster tolerance;
Resource controlled block searches the second server possessing idling-resource, creates new fictitious host computer and more new business route in described second server;
Business on the fictitious host computer broken down also is transferred to described new fictitious host computer according to the described business route after upgrading by download configuration file.
Business is also transferred to described new fictitious host computer comprises according to the described business route after upgrading by described download configuration file:
Download configuration file from the configuration service of described resource controlled block, increase the fictitious host computer of described new establishment to monitoring relating dot, and the business routing table on the fictitious host computer broken down described in amendment, so that the business on the fictitious host computer broken down is transferred to described new fictitious host computer.
The method also comprises: the business on the whole fictitious host computers outside the described fictitious host computer in described first server is transferred to described second server.
Described resource controlled block creates new virtual machine at described second server and comprises:
Whether described resource controlled block is searched in resources bank suitable server resource, if find enough server resources, and fictitious host computer new according to this asset creation locking protection;
Download configuration file from the configuration service of described resource controlled block, carries out initialization to the successful described new fictitious host computer of establishment;
The successful described new fictitious host computer of establishment is registered to the monitoring resource platform in described resource controlled block, and in business route mapping table, increases the business route on described new fictitious host computer.
When described fictitious host computer needs staging business, the method also comprises:
In the resources bank of described resource controlled block, search the described surplus resources needing to realize the fictitious host computer place server of staging business, need if described the surplus resources of the fictitious host computer place server realizing staging business not enough, then search the surplus resources of other servers;
If find the server having idling-resource, then create new fictitious host computer on that server and lock resource;
Download configuration file from the configuration service of described resource controlled block, carries out initialization to the successful fictitious host computer of described establishment;
Successful for described establishment fictitious host computer is registered to the monitoring resource platform in described resource controlled block, and increases the business route on described fictitious host computer in business route mapping table.
The application also provides a kind of fictitious host computer service apparatus, at least comprises resource controlled block, and two or more servers; In fictitious host computer fault and the first server at its place can not realize disaster tolerance time,
Described resource controlled block, for searching the second server possessing idling-resource, creates new fictitious host computer and more new business route in described second server; Business on the fictitious host computer broken down also is transferred to described new fictitious host computer according to the described business route after upgrading by download configuration file.
Also comprise: traffic aggregation entrance, business routing module, and for storing the memory module of all user data; Wherein,
Traffic aggregation entrance, for providing the unified interface of accesses virtual main frame; When user is by the access of traffic aggregation entrance, call business routing module inquiry business route, and according to Query Result by the fictitious host computer in server extremely corresponding for traffic distribution;
Business routing module, wherein stores the traffic distribution mapping table of fictitious host computer; Receive the inquiry from traffic aggregation entrance, the business route of the fictitious host computer of current accessed is returned to traffic aggregation entrance.
Described resource controlled block, specifically for:
Search the second server possessing idling-resource, in described second server, create new fictitious host computer and more new business route; Download configuration file from self configuration service, increase the fictitious host computer of described new establishment to monitoring relating dot, and the business routing table on the fictitious host computer broken down described in amendment, so that the business on the fictitious host computer broken down is transferred to described new fictitious host computer.
Described resource controlled block, also for the business on the whole fictitious host computers outside the described fictitious host computer in described first server is transferred to described second server.
Described resource controlled block, also for:
Search in resources bank and whether have suitable server resource, when finding enough server resources, fictitious host computer new according to this asset creation locking protection; Download configuration file from its configuration service, carries out initialization to the successful described new fictitious host computer of establishment; The successful described new fictitious host computer of establishment is registered to the monitoring resource platform in described resource controlled block, and in business route mapping table, increases the business route on the new fictitious host computer of described generation.
When described fictitious host computer needs staging business,
Described resource controlled block, also for when the described surplus resources needing the fictitious host computer place server realizing staging business is not enough, searches the surplus resources of other servers; The server having idling-resource creates new fictitious host computer and lock resource; Download configuration file from the configuration service of described resource controlled block, carries out initialization to created successful fictitious host computer; The successful fictitious host computer of establishment is registered to the monitoring resource platform of described resource controlled block, in business route mapping table, increases the business route on described fictitious host computer; And send update notification to described business routing module;
Described business routing module, also for receiving the update notification from resource controlled block, upgrades traffic distribution mapping table.
Described traffic aggregation entrance is made up of one or more Nginx.
The scheme that the application provides be included in fictitious host computer fault and the first server at its place can not realize disaster tolerance time, after finding for the resource controlled block of unified management fictitious host computer business the second server possessing idling-resource, in second server, create new fictitious host computer and more new business route; According to the configuration file downloaded and the business route after upgrading, the business on the fictitious host computer broken down is transferred to new fictitious host computer.The migration of the application's fictitious host computer is without the need to Data Migration and user intervention, create successfully at fictitious host computer, only need according to the route after renewal as the business mapping table by upgrading inside, business is directly transferred to new fictitious host computer, direct cutting flow, subsequent access be all migration after fictitious host computer resource, for business be zero interruption impact.Visible, the application achieves the seamless migration of fault simply, neatly, ensure that the reliability service of customer service.
Further, when fictitious host computer carries out upgrading service, the elasticity of server is realized by redundant resource, and is shared by multiple servers and by load balancing by traffic aggregation entrance, achieves the infinite expanding ability of the application.
The further feature of the application and advantage will be set forth in the following description, and, partly become apparent from specification, or understand by implementing the application.The object of the application and other advantages realize by structure specifically noted in specification, claims and accompanying drawing and obtain.
Accompanying drawing explanation
Accompanying drawing is used to provide the further understanding to technical scheme, and forms a part for specification, is used from the technical scheme explaining the application, does not form the restriction to technical scheme with the embodiment one of the application.
Fig. 1 is the structure composed schematic diagram of the application's fictitious host computer service apparatus;
Fig. 2 is the schematic flow sheet that the application's fictitious host computer realizes the method for fault migration;
Fig. 3 is the purchase operation flow schematic diagram of fictitious host computer;
Fig. 4 creates successfully at fictitious host computer, and fictitious host computer realizes the schematic flow sheet of staging business.
Embodiment
For making the object of the application, technical scheme and advantage clearly understand, hereinafter will by reference to the accompanying drawings the embodiment of the application be described in detail.It should be noted that, when not conflicting, the embodiment in the application and the feature in embodiment can combination in any mutually.
In the application one typically configuration, computing equipment comprises one or more processor (CPU), input/output interface, network interface and internal memory.
Internal memory may comprise the volatile memory in computer-readable medium, the form such as random-access memory (ram) and/or Nonvolatile memory, as read-only memory (ROM) or flash memory (flashRAM).Internal memory is the example of computer-readable medium.
Computer-readable medium comprises permanent and impermanency, removable and non-removable media can be stored to realize information by any method or technology.Information can be computer-readable instruction, data structure, the module of program or other data.The example of the storage medium of computer comprises, but be not limited to phase transition internal memory (PRAM), static RAM (SRAM), dynamic random access memory (DRAM), the random-access memory (ram) of other types, read-only memory (ROM), Electrically Erasable Read Only Memory (EEPROM), fast flash memory bank or other memory techniques, read-only optical disc read-only memory (CD-ROM), digital versatile disc (DVD) or other optical storage, magnetic cassette tape, tape magnetic rigid disk stores or other magnetic storage apparatus or any other non-transmitting medium, can be used for storing the information can accessed by computing equipment.According to defining herein, computer-readable medium does not comprise non-temporary computer readable media (transitory media), as data-signal and the carrier wave of modulation.
Can perform in the computer system of such as one group of computer executable instructions in the step shown in the flow chart of accompanying drawing.Further, although show logical order in flow charts, in some cases, can be different from the step shown or described by order execution herein.
Fig. 1 is the structure composed schematic diagram of the application's fictitious host computer service apparatus, as shown in Figure 1, comprises traffic aggregation entrance, business routing module, memory module, resource controlled block, and one or more servers; Wherein,
Traffic aggregation entrance, for providing the unified interface of accesses virtual main frame, can be made up of one or more Nginx, playing the effect of load balancing simultaneously.Wherein, Nginx(Engine x) be Web server/Reverse Proxy and Email (IMAP/POP3) proxy server of a lightweight.
The IP of all business falls the Nginx of front end, and the running environment decoupling zero of rear end.When user is by traffic aggregation entrance access Nginx, Nginx calls business routing module, and the business route of fictitious host computer according to Query Result and current accessed, by traffic distribution to the fictitious host computer in corresponding server.
Business routing module, wherein stores the traffic distribution mapping table of fictitious host computer, provides the inquiry to the forwarding strategy of flow and renewal.Receive the inquiry from traffic aggregation entrance, the fictitious host computer of current accessed is returned to traffic aggregation entrance; Receive the update notification from resource controlled block, upgrade traffic distribution mapping table.
Wherein, the traffic distribution mapping table in business routing module is a large K-V table, and wherein, Key is IP address and port numbers, and Value which fictitious host computer that to be corresponding run entity be in which station server, run entity can be one or more.When for multiple run entity, according to the configuration of each run entity, corresponding weighted value can be set.Here weighted value can dynamically arrange, and such as according to the proportional setting of the resource size of run entity, for example, supposes there are three run entities, occupies 1G respectively, 2G and 3G bandwidth, and so, when arranging weight, respective weighted value is correspondence 1,2,3 respectively.
Memory module, for storing all user data.Here, namely unified storage of data be shared in distributed file system, ensure that the highly reliable of data and infinite expanding.
Resource controlled block, for unified management fictitious host computer business, the production of such as fictitious host computer, amendment, safeguards and reclaims; When the change of the business of generation route, send update notification to business routing module.
Particularly, in fictitious host computer fault and the first server at this fictitious host computer place self can not disaster tolerance time, resource controlled block is used for, and finds the second server possessing idling-resource and in this server, creates new fictitious host computer and more new business route; Business on the fictitious host computer broken down also is transferred to new fictitious host computer according to the business route after upgrading by download configuration file.
When needs create fictitious host computer, in its resources bank, search whether there is suitable server resource, if find enough server resources, according to this asset creation fictitious host computer and locking protection; Download configuration file from its configuration service, carries out initialization to the successful fictitious host computer of establishment; The successful fictitious host computer of establishment is registered to the monitoring resource platform in resource controlled block, and in business route mapping table, increases the business route of the business on the fictitious host computer of described generation.
When fictitious host computer needs to realize staging business, by inquiring about in its resources bank, when needing the surplus resources of the fictitious host computer place server realizing staging business not enough, search the surplus resources of other servers; The server having idling-resource creates new fictitious host computer and lock resource; Download configuration file from the configuration service of resource controlled block, carries out initialization to created successful fictitious host computer; The successful fictitious host computer of establishment is registered to the monitoring resource platform of resource controlled block, in business route mapping table, increases the business route on described fictitious host computer; And send update notification to business routing module.
Resource controlled block, also for the business on the whole fictitious host computers outside the fictitious host computer in first server is transferred to second server.
Visible, the traffic aggregation entrance that the application is arranged by front end, and for the business mapping table of the mapping relations that store one-to-many, extend many run entities easily, unlimited many disposal abilities can be provided in theory.The resource controlled block of the application provides monitoring and the migration service of running environment, ensure that the operational reliability of resource; And the configuration service of resource controlled block is as configuration management center, concentrate the configuration information maintaining fictitious host computer and user.When creating new run entity or migration, the data of direct download configuration administrative center, complete initialization, ensure that the consistency of data, also ensure that the consistency of running environment.
The independent operating environment that the application's fictitious host computer service apparatus provides is the fictitious host computer running environment provided by Apache, Nginx etc., and running environment can complete the parsing of the script such as static traffic and PHP, JSP, ASP.Each running environment is independently, each configuration file of having self by oneself; And the configuration file unification of each user is configured by resource controlled block, is safeguarded.
Fig. 2 is the schematic flow sheet that the application's fictitious host computer realizes the method for fault migration, as shown in Figure 2, comprises the following steps:
Step 200: fictitious host computer fault and its place server self can not realize disaster tolerance.The realization of this step belongs to prior art, roughly comprises: the aggregate resource of a station server is defined in resource controlled block, and after distributing run entity and fictitious host computer, the available resource of this server will reduce.Judge can disaster tolerance time, can only need comparison disaster tolerance resource requirement and the remaining resource of this server to know disaster tolerance.In the application, the server at the fictitious host computer place of breaking down is also referred to as first server.
This step also comprises: if the server at fictitious host computer place can disaster tolerance, directly restart service in the machine, carry out initialization.Process ends.
Step 201: resource controlled block searches idling-resource.Specifically comprise:
Now show that fault is other fault of server level, whether resource controlled block searches other servers in own resource storehouse enough idling-resources.Because resource controlled block is used for unified management fictitious host computer business, the production of such as fictitious host computer, amendment, safeguard and reclaim, therefore, resource management module can be judged by the resource service condition of its resources bank to server.
If there is no idling-resource, Failure Transfer failure also alarm, process ends.
In the application, the server possessing idling-resource found is also referred to as second server.
Step 201: after the available free resource of other servers outside the server finding the fictitious host computer place of breaking down, creates new fictitious host computer and more new business route in this server.
In this step, create running environment and create fictitious host computer foregoing with the specific implementation increasing new fictitious host computer, repeat no more here.
In this step, new business route associates with the party in request of establishment, and corresponding one of the business of each user produces mark (saleid), the resource requirement state that this saleid shows user and the run entity situation associated.The IP address that more new business route is namely corresponding according to business saleid is retrieved, and after finding corresponding route entity, upgrades entity information.
Step 202: business is also transferred to new fictitious host computer according to the business route after upgrading by download configuration file.
Download configuration file from the configuration service of resource controlled block initialization.Increase fictitious host computer to monitoring relating dot, and revise business routing table to get through data channel.
It should be noted that, for the transfer of traffic failure, also can carry out global transfer, namely when a fictitious host computer breaks down, all fictitious host computers of its place server all shift, and concrete transfer method, as shown in step 201-step 202, repeats no more here.
Realize the method for fault migration from the application's fictitious host computer, the migration of fictitious host computer, without the need to Data Migration and user intervention, is also zero interruption impact for business.When needing migration fictitious host computer, only need select the server that suitable, create corresponding fictitious host computer in the server, create successfully at fictitious host computer, by upgrading inner business mapping table, directly cut flow, subsequent access be all fictitious host computer resource after migration.
Also comprise before the application's method: the purchase operation flow of fictitious host computer, as shown in Figure 3, complete the generation of order at existing platform of selling and carry out the production of fictitious host computer after paying, the generation of fictitious host computer mainly comprises the following steps:
Step 300: whether resource controlled block is searched in resources bank suitable server resource, if do not found, shows to produce unsuccessfully, and notice is sold platform and reports to the police, process ends.
Step 301: if find enough server resources, according to this asset creation running environment and locking protection.
Wherein locking protection is exactly the monitoring server that notice is specifically designed to monitoring running environment; in resources bank, available resources are how many; and regularly throw monitor data to monitoring server; monitoring server calculates afterwards and quota compares; thus the monitoring completed running environment; specific implementation belongs to prior art, and it is also not used in the protection range limiting the application, repeats no more here.
Step 302: download configuration file from the configuration service of described resource controlled block, carries out initialization for created successful running environment.
Step 303: increase fictitious host computer and the monitoring resource platform be registered in resource controlled block, to complete the monitoring of health degree and resource.The specific implementation of this step belongs to prior art, namely realizes the monitoring to running environment by monitoring server, repeats no more here.
Step 304: increase new business route in business route mapping table.Now fictitious host computer creates successfully, and notice sells platform.
Create successfully at fictitious host computer, if fictitious host computer needs staging business, its operation flow comprises:
Step 400: in the resources bank of resource controlled block, search the surplus resources that same needs to realize the fictitious host computer place server of staging business, and judge whether the demand that can meet upgrading, if this server self just can meet upgrade requirement, then directly revise the information in resources bank, with the available resources extended one's service.
Step 401: if need the surplus resources of the fictitious host computer place server realizing staging business not enough, then search the surplus resources of other servers.
If the server resource finding out other is also not enough to realize upgrading, then this is upgraded unsuccessfully and notifies to sell platform.
Step 402: have suitable Resource Server if found, then create new running environment and lock resource.
Step 403: download configuration file from the configuration service of described resource controlled block, carries out initialization for created successful running environment.
Step 404: increase fictitious host computer and be registered in resource controlled block, completing the monitoring of health degree and resource.
Step 405: increase new business route in business route mapping table.
For the multiple running environment of same business association, when revising business route mapping table, need the mapping considering multirouting entry.Such as, can be realized by similar mechanism such as dynamic arrays, a Key manages an array, and the numerical value in array is exactly the IP of corresponding actual motion environment.The corresponding resource distribution of each run entity, the disposal ability ratio of resource distribution determines the weight of multirouting entry.
When fictitious host computer carries out upgrading service, the elasticity of server is realized by redundant resource, and shared by multiple servers and by load balancing by traffic aggregation entrance, the infinite expanding ability and the traffic aggregation entrance that achieve the application can horizontal extension.
It is apparent to those skilled in the art that each part of the device that above-mentioned the embodiment of the present application provides, and each step in method, they can concentrate on single calculation element, or are distributed on network that multiple calculation element forms.Alternatively, they can realize with the executable program code of calculation element.Thus, they can be stored and be performed by calculation element in the storage device, or they are made into each integrated circuit modules respectively, or the multiple module in them or step are made into single integrated circuit module to realize.Like this, the application is not restricted to any specific hardware and software combination.
Although the execution mode disclosed by the application is as above, the execution mode that described content only adopts for ease of understanding the application, and be not used to limit the application.Those of skill in the art belonging to any the application; under the prerequisite not departing from the spirit and scope disclosed by the application; any amendment and change can be carried out in the form implemented and details; but the scope of patent protection of the application, the scope that still must define with appending claims is as the criterion.
Claims (12)
1. fictitious host computer realizes a method for fault migration, it is characterized in that, comprising: described fictitious host computer fault and the first server at its place can not realize disaster tolerance;
Resource controlled block searches the second server possessing idling-resource, creates new fictitious host computer and more new business route in described second server;
Business on the fictitious host computer broken down also is transferred to described new fictitious host computer according to the described business route after upgrading by download configuration file.
2. method according to claim 1, is characterized in that, business is also transferred to described new fictitious host computer comprises according to the described business route after upgrading by described download configuration file:
Download configuration file from the configuration service of described resource controlled block, increase the fictitious host computer of described new establishment to monitoring relating dot, and the business routing table on the fictitious host computer broken down described in amendment, so that the business on the fictitious host computer broken down is transferred to described new fictitious host computer.
3. method according to claim 2, is characterized in that, the method also comprises: the business on the whole fictitious host computers outside the described fictitious host computer in described first server is transferred to described second server.
4. method according to claim 1, is characterized in that, described resource controlled block creates new virtual machine at described second server and comprises:
Whether described resource controlled block is searched in resources bank suitable server resource, if find enough server resources, and fictitious host computer new according to this asset creation locking protection;
Download configuration file from the configuration service of described resource controlled block, carries out initialization to the successful described new fictitious host computer of establishment;
The successful described new fictitious host computer of establishment is registered to the monitoring resource platform in described resource controlled block, and in business route mapping table, increases the business route on described new fictitious host computer.
5. the method according to claim 1 or 4, is characterized in that, when described fictitious host computer needs staging business, the method also comprises:
In the resources bank of described resource controlled block, search the described surplus resources needing to realize the fictitious host computer place server of staging business, need if described the surplus resources of the fictitious host computer place server realizing staging business not enough, then search the surplus resources of other servers;
If find the server having idling-resource, then create new fictitious host computer on that server and lock resource;
Download configuration file from the configuration service of described resource controlled block, carries out initialization to the successful fictitious host computer of described establishment;
The monitoring resource that successful for described establishment fictitious host computer is registered in described resource controlled block is put down
Platform, and in business route mapping table, increase the business route on described fictitious host computer.
6. a fictitious host computer service apparatus, is characterized in that, at least comprises resource controlled block, and two or more servers; In fictitious host computer fault and the first server at its place can not realize disaster tolerance time,
Described resource controlled block, for searching the second server possessing idling-resource, creates new fictitious host computer and more new business route in described second server; Business on the fictitious host computer broken down also is transferred to described new fictitious host computer according to the described business route after upgrading by download configuration file.
7. fictitious host computer service apparatus according to claim 6, is characterized in that, also comprise: traffic aggregation entrance, business routing module, and for storing the memory module of all user data; Wherein,
Traffic aggregation entrance, for providing the unified interface of accesses virtual main frame; When user is by the access of traffic aggregation entrance, call business routing module inquiry business route, and according to Query Result by the fictitious host computer in server extremely corresponding for traffic distribution;
Business routing module, wherein stores the traffic distribution mapping table of fictitious host computer; Receive the inquiry from traffic aggregation entrance, the business route of the fictitious host computer of current accessed is returned to traffic aggregation entrance.
8. fictitious host computer service apparatus according to claim 7, is characterized in that, described resource controlled block, specifically for:
Search the second server possessing idling-resource, in described second server, create new fictitious host computer and more new business route; Download configuration file from self configuration service, increase the fictitious host computer of described new establishment to monitoring relating dot, and the business routing table on the fictitious host computer broken down described in amendment, so that the business on the fictitious host computer broken down is transferred to described new fictitious host computer.
9. fictitious host computer service apparatus according to claim 8, is characterized in that, described resource controlled block, also for the business on the whole fictitious host computers outside the described fictitious host computer in described first server is transferred to described second server.
10. fictitious host computer service apparatus according to claim 7, is characterized in that, described resource controlled block, also for:
Search in resources bank and whether have suitable server resource, when finding enough server resources, fictitious host computer new according to this asset creation locking protection; Download configuration file from its configuration service, carries out initialization to the successful described new fictitious host computer of establishment; The successful described new fictitious host computer of establishment is registered to the monitoring resource platform in described resource controlled block, and in business route mapping table, increases the business route on the new fictitious host computer of described generation.
11. fictitious host computer service apparatus according to claim 7 or 10, is characterized in that, when described fictitious host computer needs staging business,
Described resource controlled block, also for when the described surplus resources needing the fictitious host computer place server realizing staging business is not enough, searches the surplus resources of other servers; The server having idling-resource creates new fictitious host computer and lock resource; Download configuration file from the configuration service of described resource controlled block, carries out initialization to created successful fictitious host computer; The successful fictitious host computer of establishment is registered to the monitoring resource platform of described resource controlled block, in business route mapping table, increases the business route on described fictitious host computer; And send update notification to described business routing module;
Described business routing module, also for receiving the update notification from resource controlled block, upgrades traffic distribution mapping table.
12. fictitious host computer service apparatus according to claim 7, is characterized in that, described traffic aggregation entrance is made up of one or more Nginx.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310415508.3A CN104468150A (en) | 2013-09-12 | 2013-09-12 | Method for realizing fault migration through virtual host and virtual host service device |
HK15105274.9A HK1204828A1 (en) | 2013-09-12 | 2015-06-03 | Method for realizing failover through virtual host and device for virtual host service |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310415508.3A CN104468150A (en) | 2013-09-12 | 2013-09-12 | Method for realizing fault migration through virtual host and virtual host service device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN104468150A true CN104468150A (en) | 2015-03-25 |
Family
ID=52913578
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201310415508.3A Pending CN104468150A (en) | 2013-09-12 | 2013-09-12 | Method for realizing fault migration through virtual host and virtual host service device |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN104468150A (en) |
HK (1) | HK1204828A1 (en) |
Cited By (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107368358A (en) * | 2016-05-11 | 2017-11-21 | 华为技术有限公司 | Realize the apparatus and method that virtual machine where client migrates between different main frames |
CN107872499A (en) * | 2016-09-28 | 2018-04-03 | 北京金山云网络技术有限公司 | Service establishing method, apparatus and system |
CN108649597A (en) * | 2018-05-22 | 2018-10-12 | 清华大学 | The analysis method that a kind of failure moving method and failure influence HVDC commutation failures |
TWI663547B (en) * | 2017-01-19 | 2019-06-21 | International Business Machines Corporation | Computer program product, computer implemented method and computer system for saving/restoring guarded storage controls in a virtualized environment |
WO2019149029A1 (en) * | 2018-01-31 | 2019-08-08 | 华为技术有限公司 | Service equipment switching method, and device for same |
US10452288B2 (en) | 2017-01-19 | 2019-10-22 | International Business Machines Corporation | Identifying processor attributes based on detecting a guarded storage event |
US10496311B2 (en) | 2017-01-19 | 2019-12-03 | International Business Machines Corporation | Run-time instrumentation of guarded storage event processing |
US10579377B2 (en) | 2017-01-19 | 2020-03-03 | International Business Machines Corporation | Guarded storage event handling during transactional execution |
US10725685B2 (en) | 2017-01-19 | 2020-07-28 | International Business Machines Corporation | Load logical and shift guarded instruction |
US10732858B2 (en) | 2017-01-19 | 2020-08-04 | International Business Machines Corporation | Loading and storing controls regulating the operation of a guarded storage facility |
CN113495798A (en) * | 2020-03-20 | 2021-10-12 | 深圳市理邦精密仪器股份有限公司 | Method and system for selecting server based on information terminal |
CN113765689A (en) * | 2021-01-04 | 2021-12-07 | 北京沃东天骏信息技术有限公司 | Machine room switching method, device, equipment and storage medium |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102073462A (en) * | 2010-11-29 | 2011-05-25 | 华为技术有限公司 | Virtual storage migration method and system and virtual machine monitor |
US20110246669A1 (en) * | 2010-03-30 | 2011-10-06 | Hitachi, Ltd. | Method and system of virtual machine migration |
CN102546700A (en) * | 2010-12-23 | 2012-07-04 | 中国移动通信集团公司 | Resource scheduling and resource migration methods and equipment |
CN102917025A (en) * | 2012-09-21 | 2013-02-06 | 江苏乐买到网络科技有限公司 | Method for business migration based on cloud computing platform |
CN102984762A (en) * | 2012-12-12 | 2013-03-20 | 中国联合网络通信集团有限公司 | Method and device for function allocation of IMS |
CN103077079A (en) * | 2012-12-28 | 2013-05-01 | 华为技术有限公司 | Method and device for controlling migration of virtual machine |
CN103152419A (en) * | 2013-03-08 | 2013-06-12 | 中标软件有限公司 | High availability cluster management method for cloud computing platform |
-
2013
- 2013-09-12 CN CN201310415508.3A patent/CN104468150A/en active Pending
-
2015
- 2015-06-03 HK HK15105274.9A patent/HK1204828A1/en unknown
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20110246669A1 (en) * | 2010-03-30 | 2011-10-06 | Hitachi, Ltd. | Method and system of virtual machine migration |
CN102073462A (en) * | 2010-11-29 | 2011-05-25 | 华为技术有限公司 | Virtual storage migration method and system and virtual machine monitor |
CN102546700A (en) * | 2010-12-23 | 2012-07-04 | 中国移动通信集团公司 | Resource scheduling and resource migration methods and equipment |
CN102917025A (en) * | 2012-09-21 | 2013-02-06 | 江苏乐买到网络科技有限公司 | Method for business migration based on cloud computing platform |
CN102984762A (en) * | 2012-12-12 | 2013-03-20 | 中国联合网络通信集团有限公司 | Method and device for function allocation of IMS |
CN103077079A (en) * | 2012-12-28 | 2013-05-01 | 华为技术有限公司 | Method and device for controlling migration of virtual machine |
CN103152419A (en) * | 2013-03-08 | 2013-06-12 | 中标软件有限公司 | High availability cluster management method for cloud computing platform |
Cited By (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107368358B (en) * | 2016-05-11 | 2020-07-24 | 华为技术有限公司 | Device and method for realizing migration of virtual machine of client among different hosts |
CN107368358A (en) * | 2016-05-11 | 2017-11-21 | 华为技术有限公司 | Realize the apparatus and method that virtual machine where client migrates between different main frames |
CN107872499A (en) * | 2016-09-28 | 2018-04-03 | 北京金山云网络技术有限公司 | Service establishing method, apparatus and system |
CN107872499B (en) * | 2016-09-28 | 2021-05-25 | 北京金山云网络技术有限公司 | Service creation method, device and system |
US10929130B2 (en) | 2017-01-19 | 2021-02-23 | International Business Machines Corporation | Guarded storage event handling during transactional execution |
US10452288B2 (en) | 2017-01-19 | 2019-10-22 | International Business Machines Corporation | Identifying processor attributes based on detecting a guarded storage event |
US10496292B2 (en) | 2017-01-19 | 2019-12-03 | International Business Machines Corporation | Saving/restoring guarded storage controls in a virtualized environment |
US10496311B2 (en) | 2017-01-19 | 2019-12-03 | International Business Machines Corporation | Run-time instrumentation of guarded storage event processing |
US10579377B2 (en) | 2017-01-19 | 2020-03-03 | International Business Machines Corporation | Guarded storage event handling during transactional execution |
US10725685B2 (en) | 2017-01-19 | 2020-07-28 | International Business Machines Corporation | Load logical and shift guarded instruction |
US10732858B2 (en) | 2017-01-19 | 2020-08-04 | International Business Machines Corporation | Loading and storing controls regulating the operation of a guarded storage facility |
TWI663547B (en) * | 2017-01-19 | 2019-06-21 | International Business Machines Corporation | Computer program product, computer implemented method and computer system for saving/restoring guarded storage controls in a virtualized environment |
US11010066B2 (en) | 2017-01-19 | 2021-05-18 | International Business Machines Corporation | Identifying processor attributes based on detecting a guarded storage event |
WO2019149029A1 (en) * | 2018-01-31 | 2019-08-08 | 华为技术有限公司 | Service equipment switching method, and device for same |
CN108649597A (en) * | 2018-05-22 | 2018-10-12 | 清华大学 | The analysis method that a kind of failure moving method and failure influence HVDC commutation failures |
CN113495798A (en) * | 2020-03-20 | 2021-10-12 | 深圳市理邦精密仪器股份有限公司 | Method and system for selecting server based on information terminal |
CN113765689A (en) * | 2021-01-04 | 2021-12-07 | 北京沃东天骏信息技术有限公司 | Machine room switching method, device, equipment and storage medium |
Also Published As
Publication number | Publication date |
---|---|
HK1204828A1 (en) | 2015-12-04 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104468150A (en) | Method for realizing fault migration through virtual host and virtual host service device | |
US10715485B2 (en) | Managing dynamic IP address assignments | |
CN112087312B (en) | Method, device and equipment for providing edge service | |
EP3418877B1 (en) | Data writing and reading method and apparatus, and cloud storage system | |
US9720724B2 (en) | System and method for assisting virtual machine instantiation and migration | |
CN112532675B (en) | Method, device and medium for establishing network edge computing system | |
US11010265B2 (en) | Decentralized data protection system using local metadata | |
CN107734026A (en) | A kind of design method, device and the equipment of network attached storage cluster | |
US9628505B2 (en) | Deploying a security appliance system in a high availability environment without extra network burden | |
CN103516777A (en) | A method of provisioning in a cloud compute environment | |
US9390156B2 (en) | Distributed directory environment using clustered LDAP servers | |
CN105045762A (en) | Management method and apparatus for configuration file | |
CN106385455A (en) | CDN (Content Delivery Network) mirror-based whole site lock setting method | |
CN105069152A (en) | Data processing method and apparatus | |
US10924452B1 (en) | Auditing IP address assignments | |
CN110351107B (en) | Configuration management method and device | |
US11108854B2 (en) | Peer-to-peer network for internet of things resource allocation operation | |
US20200133780A1 (en) | Method, device and computer program product for data processing | |
CN116016028B (en) | Method, system, medium and equipment for creating multiple network interfaces for Pod based on IPvlan | |
CN112887116A (en) | Method, apparatus and article of manufacture for managing application nodes in a distributed application system | |
CN116346834A (en) | Session synchronization method, device, computing equipment and computer storage medium | |
WO2023029485A1 (en) | Data processing method and apparatus, computer device, and computer-readable storage medium | |
CN105338058A (en) | Application updating method and device | |
CN115914404A (en) | Cluster flow management method and device, computer equipment and storage medium | |
CN110958182B (en) | Communication method and related equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
REG | Reference to a national code |
Ref country code: HK Ref legal event code: DE Ref document number: 1204828 Country of ref document: HK |
|
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20150325 |
|
REG | Reference to a national code |
Ref country code: HK Ref legal event code: WD Ref document number: 1204828 Country of ref document: HK |