CN107566319B - Virtual machine instant transfer method - Google Patents
Virtual machine instant transfer method Download PDFInfo
- Publication number
- CN107566319B CN107566319B CN201610507020.7A CN201610507020A CN107566319B CN 107566319 B CN107566319 B CN 107566319B CN 201610507020 A CN201610507020 A CN 201610507020A CN 107566319 B CN107566319 B CN 107566319B
- Authority
- CN
- China
- Prior art keywords
- host
- client
- virtual machine
- state data
- connection
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Landscapes
- Data Exchanges In Wide-Area Networks (AREA)
- Computer And Data Communications (AREA)
Abstract
A virtual machine instant transfer method includes the following steps: connecting a virtual machine operated by a first host computer from a client; transmitting the state data of the virtual machine to a second host by a first host within the transfer time, wherein the first host and the second host are located in different network domains; transmitting, by the first host, a variation amount of the state data of the virtual machine within the transfer time to the second host; informing the client to switch the connection to the second host by the first host; and changing the network packet transmission rule by the client according to the notification of the first host, so that the client is connected to the second host, and operating the virtual machine by the second host according to the state data and the variable quantity of the virtual machine, so as to keep the connection between the client and the virtual machine. Therefore, the problem that the network service is interrupted to influence the reliability of the network service when the virtual machine is transferred in real time can be solved, and the poor network operation experience of a user is brought.
Description
Technical Field
The present invention relates to a network service technology, and more particularly, to a virtual machine instant transfer method.
Background
With the rapid development of Infrastructure as a Service (IaaS) in recent years, the reliability of network services becomes more important when Virtual machines (Virtual machines) perform Live Migration (Live Migration). If the network service is interrupted during the real-time migration of the virtual machine, the reliability of the network service will be affected and the user will have a poor network operation experience.
It is apparent that there are inconveniences and disadvantages to the above-described conventional method, and improvements are desired. In order to solve the above problems, the related art has not been able to make a thorough effort to solve the above problems, but appropriate solutions have not been developed for a long time.
Disclosure of Invention
This summary is provided to provide a simplified summary of the invention in order to provide a basic understanding to the reader. This summary is not an extensive overview of the disclosure and is intended to neither identify key/critical elements of the embodiments nor delineate the scope of the invention.
It is an object of the present invention to provide a virtual machine live migration method to improve the problems of the prior art.
To achieve the above object, an aspect of the present invention relates to a virtual machine live migration method, comprising: connecting a virtual machine operated by a first host computer from a client; transmitting the state data of the virtual machine to a second host by a first host within the transfer time, wherein the first host and the second host are located in different network domains; transmitting, by the first host, a variation amount of the state data of the virtual machine within the transfer time to the second host; informing the client to switch the connection to the second host by the first host; and changing the network packet transmission rule by the client according to the notification of the first host, so that the client is connected to the second host, and operating the virtual machine by the second host according to the state data and the variable quantity of the virtual machine, so as to keep the connection between the client and the virtual machine.
In one embodiment, the step of notifying the client by the first host of the converted connection to the second host comprises: the first host informs the client to transmit the packet to the second host.
In another embodiment, the step of changing the network packet forwarding rule by the client to connect the client to the second host comprises: the IP address of the transmitted packet is changed by the client, and the IP address of the first host is changed into the IP address of the second host.
In yet another embodiment, the virtual machine run by the second host is started simultaneously with the change of the IP address of the transmitted packet.
In another embodiment, the virtual machine live migration method further comprises: after the second host runs the virtual machine according to the state data and the variable quantity of the virtual machine, the first host closes the running virtual machine.
In one embodiment, the virtual machine live migration method further comprises: when another client connects to the first host, the first host informs the other client to switch the connection to the virtual machine operated by the second host.
In another embodiment, the step of notifying the other client by the first host of the switch connection to the virtual machine running on the second host when the other client is connected to the first host comprises: when another client is connected to the first host, the first host judges whether the other client is a malicious client, and if the first host judges that the other client is not the malicious client, the first host informs the other client to switch the connection to the virtual machine operated by the second host.
In another embodiment, the step of determining by the first host whether the other client is a malicious client comprises: if the first host judges that the other client is a malicious client, the first host blocks the connection of the other client.
In another embodiment, the first host and the second host are connected to a network file system server.
In one embodiment, the state data of the virtual machine includes CPU state data and memory state data.
Therefore, according to the technical content of the present invention, the embodiment of the present invention provides a virtual machine instant transfer method to solve the problem that when the virtual machine is instantly transferred, the network service is interrupted, which affects the reliability of the network service and brings a poor network operation experience to the user.
The basic spirit and other objects of the present invention, as well as the technical means and embodiments adopted by the present invention, will be readily understood by those skilled in the art after considering the following embodiments.
Drawings
In order to make the aforementioned and other objects, features, and advantages of the invention, as well as others which will become apparent, reference is made to the following description taken in conjunction with the accompanying drawings in which:
FIG. 1 is a flowchart illustrating a virtual machine live migration method according to an embodiment of the present invention;
FIG. 2 is a schematic diagram illustrating an operation of the virtual machine live migration method shown in FIG. 1 according to another embodiment of the present invention;
FIG. 3 is a schematic diagram illustrating an operation of the virtual machine live migration method shown in FIG. 1 according to yet another embodiment of the present invention;
FIG. 4 is a schematic diagram illustrating an operation of the virtual machine live migration method shown in FIG. 1 according to yet another embodiment of the present invention;
fig. 5 is a schematic operation diagram illustrating a virtual machine live migration method shown in fig. 1 according to another embodiment of the present invention.
In accordance with conventional practice, the various features and elements of the drawings are not drawn to scale in order to best illustrate the particular features and elements associated with the present invention. Moreover, the same or similar reference numbers are used throughout the different drawings to reference like elements/components.
Detailed Description
In order to make the description of the invention more complete and thorough, the following illustrative description is set forth in terms of embodiments and specific examples of the invention; it is not intended to be the only form in which the embodiments of the invention may be practiced or utilized. The embodiments are intended to cover the features of the various embodiments as well as the method steps and sequences for constructing and operating the embodiments. However, other embodiments may be utilized to achieve the same or equivalent functions and step sequences.
Unless defined otherwise herein, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this invention belongs.
Fig. 1 is a flowchart illustrating a virtual machine live migration method according to an embodiment of the present invention. As shown in fig. 1, a virtual machine live migration method 100 includes the following steps:
step 110: connecting a virtual machine operated by a first host computer from a client;
step 120: transmitting the state data of the virtual machine to a second host by a first host within the transfer time, wherein the first host and the second host are located in different network domains;
step 130: transmitting, by the first host, a variation amount of the state data of the virtual machine within the transfer time to the second host;
step 140: informing the client to switch the connection to the second host by the first host; and
step 150: according to the notice of the first host, the client changes the network packet transmission rule so as to connect the client to the second host, and the second host runs the virtual machine according to the state data and the variable quantity of the virtual machine so as to keep the connection between the client and the virtual machine.
To make the virtual machine live-migration method 100 shown in fig. 1 easy to understand, please refer to fig. 2 to fig. 5 together to respectively describe each step of the virtual machine live-migration method 100, which will be described in detail later.
Fig. 2 is a schematic operation diagram illustrating a virtual machine live migration method shown in fig. 1 according to another embodiment of the present invention. First, please refer to step 110 of fig. 1 and fig. 2, the client 210 is connected to the virtual machine operated by the first host 220. Next, referring to step 120 of fig. 1 and the marked line 1 of fig. 2, the first host 220 transmits the state data of the running virtual machine to the second host 230 during the transfer time. It should be noted that the migration time is the time taken for the first host 220 to transfer the state data of the virtual machine to the second host 230 in the whole migration step. In addition, the first host 220 and the second host 230 are located in different network domains.
Fig. 3 is a schematic operation diagram illustrating a virtual machine live migration method shown in fig. 1 according to yet another embodiment of the present invention. First, referring to step 130 of fig. 1 and the marked line 2 of fig. 3, the first host 220 transmits the variation of the state data of the virtual machine in the transition time to the second host 230. It should be noted that, if the first host 220 transmits the state data of the virtual machine to the second host 230, the whole transferring step takes a period of time, and the state data of the virtual machine running in the first host 220 has changed during the period of time, so that the change amount of the state data of the virtual machine needs to be further transmitted to the second host 230.
Next, referring to step 140 of fig. 1 and the marked line 3 of fig. 3, the first host 220 notifies the client 210 to switch the connection to the second host 230. For example, the first host 220 may notify the client 210 to transmit its packet to the second host 230, in other words, the first host 220 may notify the client 210 that the destination of the packet transmission is changed from the first host 220 to the second host 230.
Fig. 4 is a schematic operation diagram illustrating a virtual machine live migration method shown in fig. 1 according to yet another embodiment of the present invention. First, referring to step 150 of fig. 1 and the line 4 of fig. 4, the network packet transmission rule is changed by the client 210 according to the notification of the first host 220, so that the client 210 is connected to the second host 230. In detail, the network packet transmission rule is changed by the client 210 to change an internet protocol address (IP address) of the transmitted packet, for example, the IP address of the first host 220 is changed to the IP address of the second host 230, so that the client 210 transmits the packet to the second host 230.
Next, referring to step 150 of fig. 1 and the marked line 5 of fig. 4, the second host 230 runs the virtual machine according to the state data and the variation of the virtual machine to keep the connection between the client 210 and the virtual machine. In one embodiment, the instant virtual machine migration method 100 of the present invention can simultaneously start the virtual machine operated by the second host 230 under the condition of changing the ip address of the transmitted packet, so that the virtual machine operated by the second host 230 is already started at the same time when the client 210 transmits the packet to the second host 230, so as to ensure that the connection between the client 210 and the virtual machine is not interrupted.
In this way, the instant virtual machine transfer method 100 provided in the embodiment of the present invention enables the virtual machine to maintain the connection of the network service during the instant transfer process (e.g., the virtual machine is transferred from the first host 220 to the second host 230) by changing the network packet transmission rule of the client 210, so as to improve the reliability of the network service and bring better network operation experience to the user.
Referring back to fig. 1, in another embodiment, the virtual machine live migration method 100 further includes the following steps:
step 160: after the second host runs the virtual machine according to the state data and the variable quantity of the virtual machine, the first host closes the running virtual machine; and
step 170: when another client connects to the first host, the first host informs the other client to switch the connection to the virtual machine operated by the second host.
To explain the above steps in detail, please refer to fig. 5, which is a schematic operation diagram illustrating a virtual machine live migration method shown in fig. 1 according to another embodiment of the present invention. First, referring to step 160 of fig. 1, after the second host 230 runs the virtual machine according to the state data and the variation of the virtual machine, the first host 220 shuts down the running virtual machine. Next, referring to step 170 of fig. 1 and fig. 5, when another client 260 is connected to the first host 220, the first host 220 notifies the other client 260 to switch the connection to the virtual machine operated by the second host 230.
In another embodiment, when another ue 260 is connected to the first host 220, the first host 220 determines whether the another ue 260 is a malicious ue, for example, whether the another ue 260 is intentionally attacked by transmitting a large amount of packets. If the first host 220 determines that the other ue 260 is not a malicious ue, for example, the other ue 260 is only a ue that normally transmits a normal packet amount, the first host 220 notifies the other ue 260 to switch the connection to the virtual machine operated by the second host 230.
On the contrary, if the first host 220 determines that the other ue 260 is a malicious ue, the first host group 220 blocks the connection of the other ue 260, so as to prevent the virtual machine operated by the second host 230 from being attacked by the other ue 260 in a manner of intentionally transmitting a large amount of packets.
It should be noted that, after the flow of the virtual machine live migration method 100 according to the embodiment of the present invention, since the virtual machine is operated by the destination machine 230, if the new client 260 is connected to the source machine 220, the source machine 220 redirects the new client to the destination machine 230. In addition, the source machine 220 serves as a level for filtering the connection of the new client 260, and if the new client 260 is a normal client, the new client is redirected to the destination machine 230; if the new client 260 is a malicious client, the source machine 220 blocks the connection of the new client 260.
Referring to fig. 2 to 5, it can be seen that the first host 220, the second host 230 and the third host 240 are all connected to the network file system server 250. In addition, the state data of the virtual machine in the above embodiment includes cpu state data, memory state data, and file data, wherein the file data can be stored in the above network file system server 250. In an embodiment, the Network File System server 250 may be, but is not limited to, a Network File System (NFS) server, a Common Internet File System (CIFS), a distributed storage System (Gluster File System, GlusterFS) server …, and any other server that can provide similar Network File storage technology.
It will be understood by those skilled in the art that the steps of the virtual machine live migration method 100 are named according to the functions they perform, only for the sake of clarity of the technology, and are not intended to limit the steps. It is also within the scope of the present invention to integrate the steps into one step or to split the steps into multiple steps, or to replace any step with another step.
As can be seen from the above-described embodiments of the present invention, the following advantages can be obtained by applying the present invention. The embodiment of the invention provides a virtual machine instant transfer method, so as to solve the problems that the network service is interrupted to influence the reliability of the network service and bring poor network operation experience to a user when the virtual machine is transferred in an instant manner.
Although the foregoing embodiments have been described with reference to specific embodiments, it will be understood by those skilled in the art that various changes and modifications may be made without departing from the spirit and scope of the invention as defined in the following claims.
While various embodiments of the present invention have been shown and described, it is to be understood that the invention is not limited to the form disclosed herein, but is not to be construed as limited to other embodiments, and is capable of use in various other combinations, modifications, and environments and is capable of changes within the scope of the inventive concept as expressed herein, commensurate with the above teachings, or the skill or knowledge of the relevant art. And that modifications and variations may be effected by those skilled in the art without departing from the spirit and scope of the invention as defined by the appended claims.
Claims (6)
1. A method for virtual machine live migration, comprising:
connecting a client to a first virtual machine operated by the first host;
transmitting the state data of the first virtual machine to a second host by the first host within a transfer time, wherein the first host and the second host are located in different domains;
transmitting a variation of the state data of the first virtual machine in the transition time to the second host by the first host;
informing the client to switch the connection to the second host by the first host;
according to the notice of the first host, the client changes the network packet transmission rule so as to enable the client to be connected to the second host, and the second host runs a second virtual machine according to the state data and the variable quantity of the first virtual machine so as to keep the connection between the client and the second virtual machine; and
after the second host runs the second virtual machine according to the state data and the variable quantity of the first virtual machine, the first host closes the first virtual machine which is run by the second host, when another client is connected to the first host, the first host judges whether the another client is a malicious client, if the first host judges that the another client is not the malicious client, the first host informs the another client to switch the connection to the second virtual machine which is run by the second host.
2. The method of claim 1, wherein the step of notifying the client of the transfer of the connection to the second host by the first host comprises:
the first host informs the client to transmit the packet to the second host.
3. The method of claim 2, wherein the step of the client modifying network packet forwarding rules to connect the client to the second host comprises:
the IP address of the transmitted packet is changed by the client from the IP address of the first host to the IP address of the second host.
4. The method of claim 3, wherein the second VM run by the second host is started simultaneously with the change of IP address of the transmitted packet.
5. The method of claim 1, wherein the step of determining by the first host whether the another client is a malicious client comprises:
if the first host determines that the other client is a malicious client, the first host blocks the connection of the other client.
6. The method as claimed in any one of claims 1 to 5, wherein the status data of the first virtual machine includes a CPU status data and a memory status data.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610507020.7A CN107566319B (en) | 2016-06-30 | 2016-06-30 | Virtual machine instant transfer method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610507020.7A CN107566319B (en) | 2016-06-30 | 2016-06-30 | Virtual machine instant transfer method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN107566319A CN107566319A (en) | 2018-01-09 |
CN107566319B true CN107566319B (en) | 2021-01-26 |
Family
ID=60968760
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610507020.7A Active CN107566319B (en) | 2016-06-30 | 2016-06-30 | Virtual machine instant transfer method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107566319B (en) |
Citations (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101876883A (en) * | 2009-11-30 | 2010-11-03 | 英业达股份有限公司 | Method for keeping remote operation of virtual machine uninterrupted |
CN102739645A (en) * | 2012-04-23 | 2012-10-17 | 杭州华三通信技术有限公司 | Method and device for migrating virtual machine safety policy |
CN103229489A (en) * | 2012-12-21 | 2013-07-31 | 华为技术有限公司 | Virtual-machine control strategy configuration method and switch |
CN103631633A (en) * | 2012-08-20 | 2014-03-12 | 中国电信股份有限公司 | Virtual machine total-system online migration method, device and system |
CN103703729A (en) * | 2011-07-27 | 2014-04-02 | 微软公司 | Virtual machine migration to minimize packet loss in virtualized network |
CN103716221A (en) * | 2013-12-10 | 2014-04-09 | 同济大学 | On-line migration method of virtual machine in wide area network under future network NDN (Named Data Network) |
CN103905303A (en) * | 2012-12-28 | 2014-07-02 | 中国移动通信集团公司 | Method, device and system for processing data after VM transfer across subnet |
CN103902368A (en) * | 2012-12-24 | 2014-07-02 | 中国电信股份有限公司 | Method for realizing virtual machine disk image cross-storage live migration and virtual machine system |
CN104184803A (en) * | 2014-08-08 | 2014-12-03 | 同济大学 | DAG based method for adaptively completing online migration of virtual machine in XIA network |
CN104243427A (en) * | 2013-06-19 | 2014-12-24 | 日电(中国)有限公司 | Virtual machine online migration method and data package transmission method and device |
CN104468521A (en) * | 2014-11-13 | 2015-03-25 | 华为技术有限公司 | Online migration method, device and system |
CN105335234A (en) * | 2015-10-29 | 2016-02-17 | 贵州电网有限责任公司电力调度控制中心 | Method for immediately migrating virtual machine |
Family Cites Families (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7757231B2 (en) * | 2004-12-10 | 2010-07-13 | Intel Corporation | System and method to deprivilege components of a virtual machine monitor |
CN101953112A (en) * | 2008-02-25 | 2011-01-19 | 松下电器产业株式会社 | Information security device and information security system |
US8533320B2 (en) * | 2010-12-15 | 2013-09-10 | Red Hat Israel, Ltd. | Coalescing network notifications for live migration |
CN102521038B (en) * | 2011-12-06 | 2014-04-09 | 北京航空航天大学 | Virtual machine migration method and device based on distributed file system |
CN103118100A (en) * | 2013-01-25 | 2013-05-22 | 武汉大学 | Guarantee method and guarantee system for improving usability of virtual machine application |
CN103685256B (en) * | 2013-12-06 | 2017-08-04 | 华为技术有限公司 | A kind of virtual machine migration management, apparatus and system |
CN103617090A (en) * | 2013-12-10 | 2014-03-05 | 浪潮电子信息产业股份有限公司 | Energy saving method based on distributed management |
CN105446892B (en) * | 2014-07-01 | 2020-04-14 | 上海诺基亚贝尔股份有限公司 | Method, equipment and system for dynamic migration of virtualized telecommunication equipment |
CN104113841B (en) * | 2014-07-11 | 2017-08-08 | 北京信息科技大学 | A kind of virtualization detecting system and detection method for mobile Internet Botnet |
CN105700945B (en) * | 2016-01-12 | 2019-01-11 | 中南大学 | A kind of secure virtual machine moving method based on clean |
CN105704217B (en) * | 2016-01-15 | 2018-09-25 | 中国人民解放军国防科学技术大学 | It is a kind of transparent based on event driven symbiosis virtual machine Dynamic Discovery method |
-
2016
- 2016-06-30 CN CN201610507020.7A patent/CN107566319B/en active Active
Patent Citations (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101876883A (en) * | 2009-11-30 | 2010-11-03 | 英业达股份有限公司 | Method for keeping remote operation of virtual machine uninterrupted |
CN103703729A (en) * | 2011-07-27 | 2014-04-02 | 微软公司 | Virtual machine migration to minimize packet loss in virtualized network |
CN102739645A (en) * | 2012-04-23 | 2012-10-17 | 杭州华三通信技术有限公司 | Method and device for migrating virtual machine safety policy |
CN103631633A (en) * | 2012-08-20 | 2014-03-12 | 中国电信股份有限公司 | Virtual machine total-system online migration method, device and system |
CN103229489A (en) * | 2012-12-21 | 2013-07-31 | 华为技术有限公司 | Virtual-machine control strategy configuration method and switch |
CN103902368A (en) * | 2012-12-24 | 2014-07-02 | 中国电信股份有限公司 | Method for realizing virtual machine disk image cross-storage live migration and virtual machine system |
CN103905303A (en) * | 2012-12-28 | 2014-07-02 | 中国移动通信集团公司 | Method, device and system for processing data after VM transfer across subnet |
CN104243427A (en) * | 2013-06-19 | 2014-12-24 | 日电(中国)有限公司 | Virtual machine online migration method and data package transmission method and device |
CN103716221A (en) * | 2013-12-10 | 2014-04-09 | 同济大学 | On-line migration method of virtual machine in wide area network under future network NDN (Named Data Network) |
CN104184803A (en) * | 2014-08-08 | 2014-12-03 | 同济大学 | DAG based method for adaptively completing online migration of virtual machine in XIA network |
CN104468521A (en) * | 2014-11-13 | 2015-03-25 | 华为技术有限公司 | Online migration method, device and system |
CN105335234A (en) * | 2015-10-29 | 2016-02-17 | 贵州电网有限责任公司电力调度控制中心 | Method for immediately migrating virtual machine |
Also Published As
Publication number | Publication date |
---|---|
CN107566319A (en) | 2018-01-09 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
TWI603206B (en) | Server cluster based data processing method and cluster based data processing system | |
CN115004673B (en) | Message pushing method, device, electronic equipment and computer readable medium | |
US9900385B2 (en) | Connection management device, communication system, connection management method, and computer program product | |
CN108063813B (en) | Method and system for parallelizing password service network in cluster environment | |
CN111338806B (en) | Service control method and device | |
US10860375B1 (en) | Singleton coordination in an actor-based system | |
CN111345008A (en) | Mobile edge host service notification method and device | |
WO2021184992A1 (en) | Mirror image file uploading method, related device and computer storage medium | |
JP6540063B2 (en) | Communication information control apparatus, relay system, communication information control method, and communication information control program | |
TWI552077B (en) | Method for live migrating virtual machine | |
EP3276914A1 (en) | Data sharing method and device for virtual desktop | |
CN116684468B (en) | Data processing method, device, equipment and storage medium | |
CN106330492B (en) | A kind of method, apparatus and system configuring user equipment forwarding table | |
CN109218182B (en) | Method and device for synchronizing routing information | |
CN107566319B (en) | Virtual machine instant transfer method | |
WO2017071430A1 (en) | Message processing method, network card, system, information update method, and server | |
CN108932149B (en) | Data transmission method and device | |
CN114928615B (en) | Load balancing method, device, equipment and readable storage medium | |
US9348672B1 (en) | Singleton coordination in an actor-based system | |
CN108848175B (en) | Method and device for establishing TCP connection | |
CN103248668A (en) | Virtual desktop service parameter negotiation method, device and system | |
CN113973114A (en) | Cloud server live migration method, virtual switch and software defined network architecture | |
US20200341968A1 (en) | Differential Update of Local Cache from Central Database | |
CN111866100A (en) | Method, device and system for controlling data transmission rate | |
US20140317236A1 (en) | Delegated services platform system and method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |