CN109698769A - Using disaster tolerance device and method, terminal device, readable storage medium storing program for executing - Google Patents

Using disaster tolerance device and method, terminal device, readable storage medium storing program for executing Download PDF

Info

Publication number
CN109698769A
CN109698769A CN201910120857.XA CN201910120857A CN109698769A CN 109698769 A CN109698769 A CN 109698769A CN 201910120857 A CN201910120857 A CN 201910120857A CN 109698769 A CN109698769 A CN 109698769A
Authority
CN
China
Prior art keywords
cloud environment
virtual network
network tunnel
alternative
tunnel
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910120857.XA
Other languages
Chinese (zh)
Other versions
CN109698769B (en
Inventor
谢忠杰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sangfor Technologies Co Ltd
Original Assignee
Sangfor Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sangfor Technologies Co Ltd filed Critical Sangfor Technologies Co Ltd
Priority to CN201910120857.XA priority Critical patent/CN109698769B/en
Publication of CN109698769A publication Critical patent/CN109698769A/en
Application granted granted Critical
Publication of CN109698769B publication Critical patent/CN109698769B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/06Management of faults, events, alarms or notifications
    • H04L41/0654Management of faults, events, alarms or notifications using network fault recovery
    • H04L41/0668Management of faults, events, alarms or notifications using network fault recovery by dynamic selection of recovery network elements, e.g. replacement by the most appropriate element after failure
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/46Interconnection of networks
    • H04L12/4633Interconnection of networks using encapsulation techniques, e.g. tunneling
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/46Interconnection of networks
    • H04L12/4641Virtual LANs, VLANs, e.g. virtual private networks [VPN]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/60Scheduling or organising the servicing of application requests, e.g. requests for application data transmissions using the analysis and optimisation of the required network resources
    • H04L67/61Scheduling or organising the servicing of application requests, e.g. requests for application data transmissions using the analysis and optimisation of the required network resources taking into account QoS or priority requirements

Abstract

The present invention provides a kind of application disaster tolerance device, and the application disaster tolerance device includes: tunnel creation module, the virtual network tunnel for being respectively created between private clound and each alternative cloud environment according to user configuration;Using deployment module, target alternative cloud environment is deployed to for that will apply by the destination virtual network tunnel in the virtual network tunnel;Using transferring module, for the application being migrated to other alternative cloud environments by the alternative virtual network tunnel in the virtual network tunnel when listening to the destination virtual network tunnel exception.The present invention also provides a kind of application disaster recovery methods, terminal device, readable storage medium storing program for executing.The present invention solves existing application Disaster Tolerant Scheme and is difficult to restore or there is technical issues that be applicable in when cloud environment is damaged.

Description

Using disaster tolerance device and method, terminal device, readable storage medium storing program for executing
Technical field
The present invention relates to Internet communication technology field more particularly to a kind of application disaster tolerance device and method, terminal device, Readable storage medium storing program for executing.
Background technique
Currently, the mixing cloud framework that private clound and public cloud are managed collectively, distributed and disposed obtains more and more extensively General application, it is a main trend of industry that different cloud platforms, which are uniformly received that pipe gets up,.But in unified management, and there are different clouds Secure communication problem between environment.When a certain publicly-owned cloud environment is by natural calamity, artificial destruction and unpredictable risk, The disaster tolerance for promoting application becomes the tight demand of user.
Disaster tolerance technology refers in strange land relatively far apart, establishes two sets or covers functionally similar system more.Work as work system When the disaster events such as earthquake, fire occur, or the significant troubles such as power-off occur, by the disaster tolerance that work system is switched to strange land System, to keep providing a kind of reliability mechanisms of the ability of application service.
It can not restore under other cloud environment when impaired there are cloud environment using the prior art of disaster tolerance in the industry at present, with And the problems such as applicable limitation.
Above content is only used to facilitate the understanding of the technical scheme, and is not represented and is recognized that above content is existing skill Art.
Summary of the invention
The main purpose of the present invention is to provide a kind of application disaster tolerance device and method, terminal device, readable storage medium storing program for executing, Aim to solve the problem that existing application Disaster Tolerant Scheme is difficult to restore or there is technical issues that be applicable in when cloud environment is damaged.
To achieve the above object, the present invention provides a kind of application disaster tolerance device, and the application disaster tolerance device includes:
Tunnel creation module, the virtual net for being respectively created according to user configuration between private clound and each alternative cloud environment Network tunnel;
Using deployment module, it is deployed to for that will be applied by the destination virtual network tunnel in the virtual network tunnel On target alternative cloud environment;
Using transferring module, for passing through the virtual network when listening to the destination virtual network tunnel exception Alternative virtual network tunnel in tunnel migrates the application to other alternative cloud environments.
Preferably, the tunnel creation module includes:
Acquiring unit, for obtain user terminal setting virtual network tunnel quantity setting value and/or each cloud environment it is excellent First grade setting information and/or the preset state information of each cloud environment of reading are with the precedence information of each cloud environment of determination;
First determination unit, for the described excellent of tunnel quantity setting value according to the virtual network and/or each cloud environment The precedence information of first grade setting information and/or each cloud environment determines that the cloud environment of specified quantity is made from each cloud environment For alternative cloud environment;Wherein, the specified quantity is equal to the virtual network tunnel quantity setting value, remaining not determined cloud Environment is as idle cloud environment;
First tunnel creation unit, for carrying out resource layout, and by gateway deployment to each alternative cloud environment, with creation Private clound is to the virtual network tunnel of each alternative cloud environment.
Preferably, the tunnel creation module includes: the second determination unit, is used to be set according to the priority of each cloud environment The precedence information of confidence breath and/or each cloud environment, determines the alternative cloud environment of fresh target, and by private clound from alternative cloud environment It is determined as fresh target virtual network tunnel to the virtual network tunnel of target alternative cloud environment;
It is described apply transferring module, for by fresh target virtual network tunnel will apply migrate it is alternative to fresh target On cloud environment.
Preferably, the tunnel creation module includes third determination unit, the second tunnel creation unit;Wherein,
The third determination unit, for according to the preferential of the priority setting information of each cloud environment and/or each cloud environment Grade information determines new alternative cloud environment from idle cloud environment;
Second tunnel creation unit, it is private for being created after migrating the application to other alternative cloud environments There is cloud to the virtual network tunnel of new alternative cloud environment.
In addition, to achieve the above object, applying disaster recovery method the present invention also provides a kind of, the method includes walking as follows It is rapid:
Establish the virtual network tunnel between private clound and each alternative cloud environment respectively according to user configuration;
It will be applied and be deployed on target alternative cloud environment by the destination virtual network tunnel in the virtual network tunnel;
When listening to the destination virtual network tunnel exception, pass through the alternative virtual net in the virtual network tunnel Network tunnel migrates the application to other alternative cloud environments.
Preferably, the virtual network tunnel established respectively according to user configuration between private clound and each alternative cloud environment The step of, it specifically includes:
The priority setting information of virtual network tunnel quantity setting value and/or each cloud environment that acquisition user terminal is set, And/or the preset state information of each cloud environment is read with the precedence information of each cloud environment of determination;
According to the virtual network the priority setting information of tunnel quantity setting value and/or each cloud environment and/or The precedence information of each cloud environment determines the cloud environment alternately cloud environment of specified quantity from each cloud environment;Wherein, The specified quantity is equal to the virtual network tunnel quantity setting value, remaining not determined cloud environment is as idle cloud ring Border;
Resource layout is carried out, and by gateway deployment to each alternative cloud environment, to create private clound to each alternative cloud environment Virtual network tunnel.
Preferably, the destination virtual network tunnel by the virtual network tunnel will be standby using target is deployed to Before selecting the step on cloud environment, further includes:
According to the priority setting information of each cloud environment and/or the precedence information of each cloud environment, from alternative cloud environment Determine the alternative cloud environment of fresh target, and it is virtual that the virtual network tunnel of private clound to target alternative cloud environment is determined as fresh target Network tunnel;
It is described when listening to the destination virtual network tunnel exception, pass through the alternative void in the virtual network tunnel Quasi- network tunnel migrates the application to the step on other alternative cloud environments, specifically includes:
When listening to the destination virtual network tunnel exception, it will be applied and be moved by fresh target virtual network tunnel It moves on the alternative cloud environment of fresh target.
Preferably, described when listening to the destination virtual network tunnel exception, by the virtual network tunnel Alternative virtual network tunnel the application is migrated to the step on other alternative cloud environments, further includes:
According to the priority setting information of each cloud environment and/or the precedence information of each cloud environment, from idle cloud environment Determine new alternative cloud environment;
Private clound is created to the virtual network tunnel of new alternative cloud environment.
In addition, to achieve the above object, the present invention also provides a kind of terminal device, the terminal device include: memory, Processor and the application disaster tolerance program that is stored on the memory and can run on the processor, the application disaster tolerance journey The step of applying disaster recovery method as described above is realized when sequence is executed by the processor.
In addition, to achieve the above object, the present invention also provides a kind of readable storage medium storing program for executing, being deposited on the readable storage medium storing program for executing It contains using disaster tolerance program, it is described to realize the step for applying disaster recovery method as described above when being executed by processor using disaster tolerance program Suddenly.
The embodiment of the present invention proposes a kind of application disaster tolerance device and method, intelligent terminal, readable storage medium storing program for executing.According to The virtual network tunnel between private clound and each alternative cloud environment is respectively created in family configuration, and by the virtual network tunnel Destination virtual network tunnel will using being deployed on target alternative cloud environment, to realize using the preferred of deployment cloud environment, Help to improve the anti-disaster ability using deployment cloud environment.In addition, the preparatory deployment of the architecture based on above-mentioned dynamic disaster recovery, In currently used destination virtual network tunnel broken string, current application deployment cloud environment is switched to its good for use immediately Its alternative cloud environment realizes the higher dynamic disaster recovery effect of reliability.For users, without perceiving cloud environment exception, Without manpower intervention processing, human cost is saved to a certain extent.And the power of disaster tolerance is applied, the number with cloud environment Measure it is directly proportional, receive pipe alternative cloud environment it is more, disaster tolerance is stronger.Furthermore, it is possible to be drawn according to user demand to cloud environment Divide priority level, carries out flexible configuration.
Detailed description of the invention
Fig. 1 is the functional block diagram that the present invention applies disaster tolerance device;
Fig. 2 is composition schematic diagram of the present invention using the tunnel creation module 10 of disaster tolerance device;
Fig. 3 is another composition schematic diagram using deployment module 10 that the present invention applies disaster tolerance device;
Fig. 4 is another composition schematic diagram of the present invention using the tunnel creation module 10 of disaster tolerance device;
Fig. 5 is another the functional block diagram that the present invention applies disaster tolerance device;
Fig. 6 is flow diagram of the present invention using the first embodiment of disaster recovery method;
Fig. 7 is refinement step flow diagram of the present invention using the first embodiment step S10 of disaster recovery method;
Fig. 8 is another refinement step flow diagram of the present invention using the first embodiment step S10 of disaster recovery method;
Fig. 9 is flow diagram of the present invention using the second embodiment of disaster recovery method;
Figure 10 is the specific implementation flow chart that the present invention applies disaster recovery method.
The object of the invention is realized, the embodiments will be further described with reference to the accompanying drawings for functional characteristics and advantage.
Specific embodiment
It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, it is not intended to limit the present invention.
Part term of the present invention and its explanation are listed below:
API (Application Programming Interface): application programming interface is some fixed in advance The function of justice, it is therefore an objective to application program and the developer ability that one group of routine of access is able to based on certain software or hardware are provided, And it is not necessarily to access source code, or understand the details of internal work mechanism.
VPN (Virtual Private Network): Virtual Private Network.Dedicated network is established on public network, into Row encryption, to realize end to end communication.
IPSec (Internet Protocol Security): Internet protocol safety is a kind of open standard Frame structure, ensure to be maintained secrecy on Internet protocol (IP) network by using the security service of encryption and safety Communication.
VLAN (Virtual Local Area Network): virtual LAN.
VXLAN (Virtual Extensible LAN): it is empty like extension local area network, it is a kind of network void like change technology, it It is a kind of extension to VLAN, has 24bit in the message Header of VXLAN, can support 224VLAN number.
The present invention provides a kind of application disaster tolerance device.As shown in FIG. 1, FIG. 1 is the functional modules using disaster tolerance device Composition schematic diagram.Wherein, described device includes:
Tunnel creation module 10, it is virtual between private clound and each alternative cloud environment for being respectively created according to user configuration Network tunnel;
In a specific implementation, as shown in Fig. 2, the tunnel creation module 10 includes acquiring unit 110, used for obtaining The virtual network tunnel quantity setting value of family end setting and/or the priority setting information of each cloud environment and/or each cloud ring of reading The preset state information in border is with the precedence information of each cloud environment of determination;
Wherein, user terminal operates for realizing the setting of user, can be page end or operates in mobile terminal (such as hand Machine, tablet computer) on application program.When needing to create the virtual network tunnel between private clound and each alternative cloud environment, User is set by user terminal, so that user terminal triggers a tunnel creation and requests to tunnel creation module 10.
Specifically, user by user terminal setting using disaster tolerance device need the private clound that creates and each alternative cloud environment it Between virtual network tunnel quantity;Optionally, the priority of a certain cloud environment can also be set by user terminal.Acquiring unit 110 are responsible for interacting with user terminal, to obtain the virtual network tunnel quantity setting value set on user terminal and/or each cloud The priority setting information of environment.
In general, virtual network tunnel quantity setting value is greater than 1, to provide alternative virtual network tunnel and Yun Huan Border, such as it is set as 2.All cloud environment default priorities be same rank, user can as needed by a certain cloud environment into The setting of row major rank divides (can also be arranged without priority level);The high cloud environment of priority is preferentially made by selection For the cloud environment of application deployment.
It should be noted that the type of " cloud environment " alleged by various embodiments of the present invention is not necessarily to considered critical, any " Yun Huan Border " can be publicly-owned cloud environment perhaps privately owned cloud environment or other types of cloud environment.
Acquiring unit 110 receive tunnel creation request when, optionally, read the preset state information of each cloud environment with Determine the precedence information of each cloud environment.Specifically, the application disaster tolerance device further include a cloud environment resource pool (in Fig. 1 not Mark).Cloud environment resource pool is based on specific API (application programming interface) and monitors each cloud environment, and obtains cloud environment column Table includes the default characteristic information of each cloud environment in the list.Cloud environment resource pool is by the default characteristic information of each cloud environment Report to acquiring unit 110.
The default characteristic information of any cloud environment can specifically include but unlimited for characterizing corresponding cloud environment state In: the cloud environment is horizontal to the occupancy of computing resource, Internet resources and storage resource.Believed according to the default feature of each cloud environment Breath determines the precedence information (priority level) of each cloud environment.For example, a certain cloud environment is to computing resource, Internet resources and storage The occupancy level of resource is lower, then the priority level of the cloud environment is higher, and Ying Youxian is determined as alternative cloud environment.I.e. identical Under the conditions of, the resources occupation rate of a certain cloud environment is lower, and the priority level of the cloud environment is higher.
First determination unit 120, for described in tunnel quantity setting value according to the virtual network and/or each cloud environment The precedence information of priority setting information and/or each cloud environment determines the cloud environment of specified quantity from each cloud environment Alternately cloud environment;Wherein, the specified quantity is equal to the virtual network tunnel quantity setting value, remaining is not determined Cloud environment is as idle cloud environment;
Each cloud is carried out according to the precedence information of the precedence information of each cloud environment and/or each cloud environment Environment it is integrated ordered;According to integrated ordered as a result, determine the cloud environment of specified quantity alternately cloud environment, remaining not by Determining cloud environment is as idle cloud environment, and wherein specified quantity is equal to the virtual network tunnel quantity setting value.
In a more excellent specific implementation, according to the priority setting information of each cloud environment of user terminal setting, to each cloud ring Border is ranked up according to set priority level.It is assumed that the precedence information of user terminal setting five cloud environments of A, B, C, D, E Respectively 3 grades, 1 grade, 1 grade, 2 grades, 3 grades (priority level is bigger, is preferentially selected), the then priority of above-mentioned five cloud environments Other Bit-reversed result are as follows: A=E > D > B=C.If virtual network tunnel quantity setting value is 2, it is determined that priority level is larger 2 cloud environments (i.e. A and E) be alternative cloud environment, remaining 3 cloud environment (i.e. B, C, D) is idle cloud environment.If virtual network Tunnel quantity setting value is 3, it is determined that biggish 3 cloud environments (i.e. A, E and D) of priority level are alternative cloud environment, remaining 2 A cloud environment (i.e. B, C) is idle cloud environment.Wherein, it is if desired determined in several identical cloud environments of priority level alternative When cloud environment, it can be randomly selected.Remaining situation is also and so on.
In another more excellent specific implementation, according to the precedence information of each cloud environment, to each cloud environment according to set Priority level is ranked up.According to ranking results, the cloud environment of specified quantity alternately cloud environment is determined, remaining is not determined Cloud environment as idle cloud environment.Its specific determination process is referred to explanation exemplified above, and details are not described herein again.
First tunnel creation unit 130, for carrying out resource layout, and by gateway deployment to each alternative cloud environment, with Private clound is created to the virtual network tunnel of each alternative cloud environment.
After determining the alternative cloud environment of specified quantity, private clound is carried out to the virtual network tunnel of each alternative cloud environment Creation.
Wherein, resource layout is related to the mark for composition of the running environment such as computing resource, Internet resources and storage resource or resource Match.After completing resource layout, by gateway deployment to each alternative cloud environment.The communication protocol that gateway uses can select versatility The communication technology/agreement (such as it is preferable to use VXLAN gateway or ipsec gateways), or be customized as needed.
For example, the first tunnel creation unit 130 carries out resource layout, and in local and each cloud environment automatically dispose VXLAN gateway or ipsec gateway.By VXLAN gateway or ipsec gateway, the local network topology for arriving each cloud environment is established, it is real Intercommunication between existing private clound and alternative cloud environment.In this way, realizing virtual network tunnel using VXLAN technology or IPSecVPN Road makes to realize that double layer network communicates between private clound and alternative cloud environment.
Later, the first tunnel creation unit 130 creates private clound to the virtual network tunnel of each alternative cloud environment.For example, There are three alternative cloud environment is total: cloud environment A/B/C.Gateway is deployed to cloud environment A/B/C respectively, and then establishes private clound respectively To the virtual network tunnel A/B/C of alternative cloud environment A/B/C.Based on the virtual network tunnel created may be implemented private clound with It is communicated between cloud between different alternative cloud environments.
In a specific implementation, as shown in figure 3, the tunnel creation module 10 can also include:
Second determination unit 140, for according to the priority setting information of each cloud environment and/or the priority of each cloud environment Information determines target alternative cloud environment from alternative cloud environment, and by the virtual network tunnel of private clound to target alternative cloud environment Road is determined as destination virtual network tunnel;
I.e. according to the priority level of each cloud environment, the highest alternative cloud ring of priority level is determined from each alternative cloud environment Border, and using identified alternative cloud environment as target alternative cloud environment, and then by private clound to the void of target alternative cloud environment Quasi- network tunnel is determined as destination virtual network tunnel.In this way, can determine that priority level highest, resources occupation rate are least Alternative cloud environment is used for applying to dispose.
Understandably, the determination of target alternative cloud environment and destination virtual network tunnel is in the default shape for reading each cloud environment State information after the precedence information of each cloud environment of determination to execute.
Using deployment module 20, for deployment will to be applied by the destination virtual network tunnel in the virtual network tunnel To target alternative cloud environment;
After choosing preferably alternative cloud environment, it will be applied by destination virtual network tunnel and be deployed to the target alternative Cloud environment, to realize using normal operation in the target alternative cloud environment.The implementation of specific application deployment is here With no restrictions.In this way, by the alternative cloud environment for selecting specified quantity, be respectively created private clound to each alternative cloud environment void Quasi- network tunnel, and will be using one of them more excellent alternative cloud environment is deployed to, to realize the architecture of dynamic disaster recovery Preparatory deployment.
Using transferring module 30, for passing through the virtual net when listening to the destination virtual network tunnel exception Alternative virtual network tunnel in network tunnel migrates the application to other alternative cloud environments.
In the specific implementation, relatively with the execution step of above-mentioned second determination unit 140, described to apply transferring module 30, it migrates for that will be applied by fresh target virtual network tunnel to the alternative cloud environment of fresh target.
Firstly, monitoring the status information of destination virtual network tunnel in real time using transferring module 30;Believed according to the state Breath judges whether destination virtual network tunnel interrupts.
If judging, destination virtual network tunnel is interrupted, and is obtained and is parsed the status information confirmation destination virtual network tunnel Whether road is in broken string state, with exclude destination virtual network tunnel in short-term intermittent line can recovery situation;Or it can not obtain Directly determine that destination virtual network tunnel is in broken string state when getting the status information.
When confirming that destination virtual network tunnel is in broken string state, the migration applied.It is determined based on second single Member selects another available alternative cloud environment as the alternative cloud environment of fresh target, by private clound and the alternative cloud environment of fresh target it Between virtual network tunnel as fresh target virtual network tunnel.It in turn, will be using migration by fresh target virtual network tunnel To the alternative cloud environment of fresh target, specific implementation is referred to above, and details are not described herein again.Due to being previously created private clound and new The virtual network tunnel of target alternative cloud environment, therefore can be by that will be answered with the virtual network tunnel of the alternative cloud environment of fresh target With the other alternative cloud environments being rapidly migrated to other than target alternative cloud environment, the efficiency using conversion deployment is improved, thus Achieve the effect that dynamic disaster recovery.
Being respectively created between private clound and each alternative cloud environment using disaster tolerance device according to user configuration in the present embodiment Virtual network tunnel, and will be using being deployed to target alternative by the destination virtual network tunnel in the virtual network tunnel On cloud environment, to realize using the preferred of deployment cloud environment, the anti-disaster ability using deployment cloud environment is helped to improve.
In addition, the preparatory deployment of the architecture based on above-mentioned dynamic disaster recovery, in currently used destination virtual network tunnel When road breaks, current application deployment cloud environment is switched to other alternative cloud environments good for use immediately, realizes reliability Higher dynamic disaster recovery effect.For users, without perceiving cloud environment exception, without manpower intervention processing, in certain journey Human cost is saved on degree.And the power of disaster tolerance is applied, and it is directly proportional to the quantity of cloud environment, receive the alternative cloud environment of pipe More, disaster tolerance is stronger.Furthermore, it is possible to divide priority level according to user demand to cloud environment, carry out flexible configuration.
Further, based on disaster tolerance device is applied in above-mentioned first embodiment, as shown in figure 4, the tunnel creation mould Block 10 includes third determination unit 150, the second tunnel creation unit 160;Wherein,
The third determination unit 150, for according to the excellent of the priority setting information of each cloud environment and/or each cloud environment First grade information determines new alternative cloud environment from idle cloud environment;
Specifically, third determination unit 150 is according to the preferential of the priority setting information of each cloud environment and/or each cloud environment Grade information, each cloud environment is ranked up according to set priority level.Third determination unit 150 according to ranking results, from Determine the idle cloud environment of highest one of priority level as new alternative cloud environment in each idle cloud environment.
Second tunnel creation unit 160 is also used to after migrating the application to other alternative cloud environments Private clound is created to the virtual network tunnel of new alternative cloud environment.
Second tunnel creation unit 160 creates private clound to the virtual network tunnel and virtual net above of new alternative cloud environment The creation in network tunnel is identical, and details are not described herein again.Optionally, the second tunnel creation unit 160 can be equal to the first tunnel wound Build unit 130.
In this way, after the switching that application transferring module 30 carries out current application deployment cloud environment, third determination unit 150 The determination of new alternative cloud environment is carried out, the second tunnel creation unit 160 creates private clound to the virtual network of new alternative cloud environment Tunnel, to keep the total quantity of alternative cloud environment to be equal to set virtual network tunnel quantity setting value.To keep alternative The state that cloud environment quantity is had a surplus, in case needing for disaster tolerance switching next time, realizes the higher dynamic disaster recovery effect of reliability.
Further, as shown in figure 5, the application disaster tolerance device further includes cloud environment resource pool 50;Cloud environment resource pool 50 are connected with tunnel creation module 10;The cloud environment resource pool 50, for managing private clound and each alternative cloud environment, and according to The data acquisition request of tunnel creation module 10 sends cloud environment list to cloud environment resource pool 50, includes each cloud in the list The default characteristic information of environment specifically may refer to the pipe that following cloud environment resource pool 50 is responsible for all cloud environments for receiving pipe of management Manage index/content.
In the present embodiment, cloud environment resource pool 50 is responsible for all cloud environments for receiving pipe of management, and level of control/content includes But it is not limited to: computing resource, Internet resources, storage resource, monitoring, alarm.I.e. cloud environment resource pool 50 is as by that can unify to manage The set of the compositions such as reason, computing resource, storage resource, the Internet resources deployed and monitored, can be realized private clound and each cloud ring The unified management and distribution in border.
In addition, applying disaster recovery method the present invention also provides a kind of.
As shown in fig. 6, Fig. 6 is the flow diagram that the present invention applies disaster recovery method first embodiment.Wherein, the method Include the following steps:
Step S10 establishes the virtual network tunnel between private clound and each alternative cloud environment according to user configuration respectively;
In a specific implementation, as shown in fig. 7, step S10 includes: step S11, the virtual network of user terminal setting is obtained The priority setting information of tunnel quantity setting value and/or each cloud environment and/or read the preset state information of each cloud environment with Determine the precedence information of each cloud environment;
Wherein, user terminal operates for realizing the setting of user, can be page end or operates in mobile terminal (such as hand Machine, tablet computer) on application program.When needing to create the virtual network tunnel between private clound and each alternative cloud environment, User is set by user terminal, so that user terminal triggers a tunnel creation and requests to application disaster tolerance as described above to fill It sets.
Specifically, user by user terminal setting using disaster tolerance device need the private clound that creates and each alternative cloud environment it Between virtual network tunnel quantity;Optionally, the priority of a certain cloud environment can also be set by user terminal.It is filled using disaster tolerance It sets and is interacted with user terminal, to obtain the virtual network tunnel quantity setting value set on user terminal and/or each cloud environment Priority setting information.
In general, virtual network tunnel quantity setting value is greater than 1, to provide alternative virtual network tunnel and Yun Huan Border, such as it is set as 2.All cloud environment default priorities be same rank, user can as needed by a certain cloud environment into The setting of row major rank divides (can also be arranged without priority level);The high cloud environment of priority is preferentially made by selection For the cloud environment of application deployment.
It should be noted that the type of " cloud environment " alleged by various embodiments of the present invention is not necessarily to considered critical, any " Yun Huan Border " can be publicly-owned cloud environment perhaps privately owned cloud environment or other types of cloud environment.
When receiving tunnel creation request, optionally, the default characteristic information of each cloud environment is read.Specifically, it is based on Specific API (application programming interface) monitors each cloud environment, and obtains cloud environment list, includes each cloud ring in the list The default characteristic information in border.
The default characteristic information of any cloud environment can specifically include but unlimited for characterizing corresponding cloud environment state In: the cloud environment is horizontal to the occupancy of computing resource, Internet resources and storage resource.Believed according to the default feature of each cloud environment Breath determines the precedence information (priority level) of each cloud environment.For example, a certain cloud environment is to computing resource, Internet resources and storage The occupancy level of resource is lower, then the priority level of the cloud environment is higher, and Ying Youxian is determined as alternative cloud environment.I.e. identical Under the conditions of, the resources occupation rate of a certain cloud environment is lower, and the priority level of the cloud environment is higher.
Step S12, tunnel quantity setting value and/or the setting of the priority of each cloud environment are believed according to the virtual network The precedence information of breath and/or each cloud environment determines the cloud environment alternately cloud ring of specified quantity from each cloud environment Border;Wherein, the specified quantity is equal to the virtual network tunnel quantity setting value, remaining not determined cloud environment is as not busy Set cloud environment;
Each cloud is carried out according to the precedence information of the precedence information of each cloud environment and/or each cloud environment Environment it is integrated ordered;According to integrated ordered as a result, determine the cloud environment of specified quantity alternately cloud environment, remaining not by Determining cloud environment is as idle cloud environment, and wherein specified quantity is equal to the virtual network tunnel quantity setting value.
In a more excellent specific implementation, according to the priority setting information of each cloud environment of user terminal setting, to each cloud ring Border is ranked up according to set priority level.It is assumed that the precedence information of user terminal setting five cloud environments of A, B, C, D, E Respectively 3 grades, 1 grade, 1 grade, 2 grades, 3 grades (priority level is bigger, is preferentially selected), the then priority of above-mentioned five cloud environments Other Bit-reversed result are as follows: A=E > D > B=C.If virtual network tunnel quantity setting value is 2, it is determined that priority level is larger 2 cloud environments (i.e. A and E) be alternative cloud environment, remaining 3 cloud environment (i.e. B, C, D) is idle cloud environment.If virtual network Tunnel quantity setting value is 3, it is determined that biggish 3 cloud environments (i.e. A, E and D) of priority level are alternative cloud environment, remaining 2 A cloud environment (i.e. B, C) is idle cloud environment.Wherein, it is if desired determined in several identical cloud environments of priority level alternative When cloud environment, it can be randomly selected.Remaining situation is also and so on.
In another more excellent specific implementation, according to the precedence information of each cloud environment, to each cloud environment according to set Priority level is ranked up.According to ranking results, the cloud environment of specified quantity alternately cloud environment is determined, remaining is not determined Cloud environment as idle cloud environment.Its specific determination process is referred to explanation exemplified above, and details are not described herein again.
Step S13 carries out resource layout, and by gateway deployment to each alternative cloud environment, to create private clound to each standby Select the virtual network tunnel of cloud environment.
After determining the alternative cloud environment of specified quantity, private clound is carried out to the virtual network tunnel of each alternative cloud environment Creation.
Wherein, resource layout is related to the mark for composition of the running environment such as computing resource, Internet resources and storage resource or resource Match.After completing resource layout, by gateway deployment to each alternative cloud environment.The communication protocol that gateway uses can select versatility The communication technology/agreement (such as it is preferable to use VXLAN gateway or ipsec gateways), or be customized as needed.
For example, first carrying out resource layout, and in local and each cloud environment automatically dispose VXLAN gateway or ipsec gateway. By VXLAN gateway or ipsec gateway, the local network topology for arriving each cloud environment is established, realizes private clound and alternative cloud environment Between intercommunication.In this way, realizing virtual network tunnel using VXLAN technology or IPSecVPN, make private clound and alternative cloud ring Double layer network communication is realized between border.
Further, private clound is created to the virtual network tunnel of each alternative cloud environment.For example, alternative cloud environment shares three It is a: cloud environment A/B/C.Gateway is deployed to cloud environment A/B/C respectively, and then establishes private clound respectively to alternative cloud environment A/B/ The virtual network tunnel A/B/C of C.It is realized between private clound and different alternative cloud environments based on the virtual network tunnel created It is communicated between cloud.
In a specific implementation, as shown in figure 8, step S10 further include: step S14 is set according to the priority of each cloud environment The precedence information of confidence breath and/or each cloud environment, determines target alternative cloud environment, and private clound is arrived from alternative cloud environment The virtual network tunnel of target alternative cloud environment is determined as destination virtual network tunnel;
I.e. according to the priority level of each cloud environment, the highest alternative cloud ring of priority level is determined from each alternative cloud environment Border, and using identified alternative cloud environment as target alternative cloud environment, and then by private clound to the void of target alternative cloud environment Quasi- network tunnel is determined as destination virtual network tunnel.In this way, can determine that priority level highest, resources occupation rate are least Alternative cloud environment is used for applying to dispose.
Understandably, step S14 can be executed after above-mentioned steps S11, not made with the specific execution sequence of step S12 It limits.
Step S20 will be applied by the destination virtual network tunnel in the virtual network tunnel and is deployed to target alternative On cloud environment;
After choosing preferably alternative cloud environment, it will be applied by destination virtual network tunnel and be deployed to the target alternative Cloud environment, to realize using normal operation in the target alternative cloud environment.The implementation of specific application deployment is here With no restrictions.In this way, by the alternative cloud environment for selecting specified quantity, be respectively created private clound to each alternative cloud environment void Quasi- network tunnel, and will be using one of them more excellent alternative cloud environment is deployed to, to realize the architecture of dynamic disaster recovery Preparatory deployment.
Step S30, when listening to the destination virtual network tunnel exception, by standby in the virtual network tunnel Virtual network tunnel is selected to migrate the application to other alternative cloud environments.
It in the specific implementation, relatively with above-mentioned steps S14, will be using migration by fresh target virtual network tunnel To the alternative cloud environment of fresh target.
Firstly, monitoring the status information of destination virtual network tunnel in real time;Destination virtual is judged according to the state information Whether network tunnel interrupts.
If judging, destination virtual network tunnel is interrupted, and is obtained and is parsed the status information confirmation destination virtual network tunnel Whether road is in broken string state, with exclude destination virtual network tunnel in short-term intermittent line can recovery situation;Or it can not obtain Directly determine that destination virtual network tunnel is in broken string state when getting the status information.
When confirming that destination virtual network tunnel is in broken string state, the migration applied.It selects another available Alternative cloud environment is as new target alternative cloud environment, by the virtual network tunnel between private clound and the alternative cloud environment of fresh target As fresh target virtual network tunnel.In turn, it will be applied and be migrated to the alternative cloud ring of fresh target by fresh target virtual network tunnel Border, specific implementation refer to above, and details are not described herein again.Due to being previously created private clound and new target alternative cloud environment Virtual network tunnel, therefore can will be using being rapidly migrated to mesh by the virtual network tunnel with the alternative cloud environment of fresh target Other alternative cloud environments other than alternative cloud environment are marked, the efficiency using conversion deployment are improved, to reach dynamic disaster recovery Effect.
In the present embodiment, the virtual network tunnel between private clound and each alternative cloud environment is respectively created according to user configuration Road, and will be applied and be deployed on target alternative cloud environment by the destination virtual network tunnel in the virtual network tunnel, from And realize the preferred of application deployment cloud environment, help to improve the anti-disaster ability using deployment cloud environment.
In addition, the preparatory deployment of the architecture based on above-mentioned dynamic disaster recovery, in currently used destination virtual network tunnel When road breaks, current application deployment cloud environment is switched to other alternative cloud environments good for use immediately, realizes reliability Higher dynamic disaster recovery effect.For users, without perceiving cloud environment exception, without manpower intervention processing, in certain journey Human cost is saved on degree.And the power of disaster tolerance is applied, and it is directly proportional to the quantity of cloud environment, receive the alternative cloud environment of pipe More, disaster tolerance is stronger.Furthermore, it is possible to divide priority level according to user demand to cloud environment, carry out flexible configuration.
Further, the first embodiment of disaster recovery method is applied based on the present invention, proposes the present invention using disaster recovery method Second embodiment.As shown in figure 9, after step S30, further includes:
Step S40, according to the priority setting information of each cloud environment and/or the precedence information of each cloud environment, from idle New alternative cloud environment is determined in cloud environment;
Specifically, according to the priority setting information of each cloud environment and/or the precedence information of each cloud environment, to each cloud ring Border is ranked up according to set priority level.According to ranking results, priority level highest is determined from each idle cloud environment An idle cloud environment as new alternative cloud environment.
Step S41, creation private clound to the virtual network tunnel of new alternative cloud environment.
The specific implementation flow chart of present invention application disaster recovery method is as shown in Figure 10, creation private clound to new alternative cloud environment Virtual network tunnel it is identical as the creation in virtual network tunnel above, details are not described herein again.
In this way, carrying out the determination of new alternative cloud environment after the switching for carrying out current application deployment cloud environment, creation is private There is cloud to the virtual network tunnel of new alternative cloud environment, to keep the total quantity of alternative cloud environment to be equal to set virtual network Tunnel quantity setting value.State to keep alternative cloud environment quantity to have a surplus, in case needing for disaster tolerance switching next time, realizes The higher dynamic disaster recovery effect of reliability.
The present invention also provides a kind of terminal devices.
Terminal device of the present invention includes: memory, processor and is stored on the memory and can be in the processor Disaster tolerance program is applied in upper operation, is realized when the application disaster tolerance program is executed by the processor and is applied disaster tolerance as described above The step of method.
Wherein, what is run on the processor is performed realized method using disaster tolerance program and can refer to the present invention Using each embodiment of disaster recovery method, details are not described herein again.
The present invention also provides a kind of storage mediums.
The realization when application disaster tolerance program is executed by processor using disaster tolerance program is stored on storage medium of the present invention The step of applying disaster recovery method as described above.
Wherein, what is run on the processor is performed realized method using disaster tolerance program and can refer to the present invention Using each embodiment of disaster recovery method, details are not described herein again.
It should be noted that, in this document, the terms "include", "comprise" or its any other variant are intended to non-row His property includes, so that the process, method, article or the device that include a series of elements not only include those elements, and And further include other elements that are not explicitly listed, or further include for this process, method, article or device institute it is intrinsic Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including being somebody's turn to do There is also other identical elements in the process, method of element, article or device.
The serial number of the above embodiments of the invention is only for description, does not represent the advantages or disadvantages of the embodiments.
The embodiment of the present invention is described with above attached drawing, but the invention is not limited to above-mentioned specific Embodiment, the above mentioned embodiment is only schematical, rather than restrictive, those skilled in the art Under the inspiration of the present invention, without breaking away from the scope protected by the purposes and claims of the present invention, it can also make very much Form, all of these belong to the protection of the present invention.

Claims (10)

1. a kind of application disaster tolerance device, which is characterized in that the application disaster tolerance device includes:
Tunnel creation module, the virtual network tunnel for being respectively created according to user configuration between private clound and each alternative cloud environment Road;
Using deployment module, target is deployed to for that will apply by the destination virtual network tunnel in the virtual network tunnel On alternative cloud environment;
Using transferring module, for passing through the virtual network tunnel when listening to the destination virtual network tunnel exception In alternative virtual network tunnel the application is migrated to other alternative cloud environments.
2. applying disaster tolerance device as described in claim 1, which is characterized in that the tunnel creation module includes:
Acquiring unit, for obtaining the virtual network tunnel quantity setting value of user terminal setting and/or the priority of each cloud environment Setting information and/or the preset state information of each cloud environment of reading are with the precedence information of each cloud environment of determination;
First determination unit, for tunnel quantity setting value according to the virtual network and/or the priority of each cloud environment The precedence information of setting information and/or each cloud environment determines the cloud environment of specified quantity as standby from each cloud environment Select cloud environment;Wherein, the specified quantity is equal to the virtual network tunnel quantity setting value, remaining not determined cloud environment As idle cloud environment;
First tunnel creation unit, it is privately owned to create for carrying out resource layout, and by gateway deployment to each alternative cloud environment Cloud is to the virtual network tunnel of each alternative cloud environment.
3. applying disaster tolerance device as described in claim 1, which is characterized in that the tunnel creation module includes: second determining Unit is used for the precedence information of the priority setting information and/or each cloud environment according to each cloud environment, from alternative cloud environment The middle alternative cloud environment of determining fresh target, and the virtual network tunnel of private clound to target alternative cloud environment is determined as fresh target void Quasi- network tunnel;
It is described to apply transferring module, it migrates for that will be applied by fresh target virtual network tunnel to the alternative cloud ring of fresh target On border.
4. device as described in claim 1, which is characterized in that the tunnel creation module includes third determination unit, second Tunnel creation unit;Wherein,
The third determination unit, for being believed according to the priority setting information of each cloud environment and/or the priority of each cloud environment Breath determines new alternative cloud environment from idle cloud environment;
Second tunnel creation unit, for creating private clound after migrating the application to other alternative cloud environments To the virtual network tunnel of new alternative cloud environment.
5. a kind of apply disaster recovery method, which is characterized in that described method includes following steps:
Establish the virtual network tunnel between private clound and each alternative cloud environment respectively according to user configuration;
It will be applied and be deployed on target alternative cloud environment by the destination virtual network tunnel in the virtual network tunnel;
When listening to the destination virtual network tunnel exception, pass through the alternative virtual network tunnel in the virtual network tunnel Road migrates the application to other alternative cloud environments.
6. applying disaster recovery method as claimed in claim 5, which is characterized in that described to establish private clound respectively according to user configuration It the step of virtual network tunnel between each alternative cloud environment, specifically includes:
Obtain user terminal setting virtual network tunnel quantity setting value and/or each cloud environment priority setting information and/or The preset state information of each cloud environment is read with the precedence information of each cloud environment of determination;
The priority setting information and/or each cloud of tunnel quantity setting value and/or each cloud environment according to the virtual network The precedence information of environment determines the cloud environment alternately cloud environment of specified quantity from each cloud environment;Wherein, described Specified quantity is equal to the virtual network tunnel quantity setting value, remaining not determined cloud environment is as idle cloud environment;
Carry out resource layout, and by gateway deployment to each alternative cloud environment, with create private clound to each alternative cloud environment void Quasi- network tunnel.
7. applying disaster recovery method as claimed in claim 5, which is characterized in that the mesh by the virtual network tunnel Before the step that application is deployed on target alternative cloud environment by mark virtual network tunnel, further includes:
According to the priority setting information of each cloud environment and/or the precedence information of each cloud environment, determined from alternative cloud environment The alternative cloud environment of fresh target, and the virtual network tunnel of private clound to target alternative cloud environment is determined as fresh target virtual network Tunnel;
It is described when listening to the destination virtual network tunnel exception, pass through the alternative virtual net in the virtual network tunnel Network tunnel migrates the application to the step on other alternative cloud environments, specifically includes:
When listening to the destination virtual network tunnel exception, by fresh target virtual network tunnel will using migrate to On the alternative cloud environment of fresh target.
8. applying disaster recovery method as claimed in claim 5, which is characterized in that described to listen to the destination virtual network tunnel When road exception, the application is migrated to other alternative cloud rings by the alternative virtual network tunnel in the virtual network tunnel After step on border, further includes:
According to the priority setting information of each cloud environment and/or the precedence information of each cloud environment, determined from idle cloud environment New alternative cloud environment;
Private clound is created to the virtual network tunnel of new alternative cloud environment.
9. a kind of terminal device, which is characterized in that the terminal device includes: memory, processor and is stored in the storage On device and what can be run on the processor applies disaster tolerance program, real when the application disaster tolerance program is executed by the processor Now as described in any one of claim 5 to 8 application disaster recovery method the step of.
10. a kind of readable storage medium storing program for executing, which is characterized in that it is stored on the readable storage medium storing program for executing using disaster tolerance program, it is described The step of application disaster recovery method as described in any one of claim 5 to 8 is realized when being executed by processor using disaster tolerance program.
CN201910120857.XA 2019-02-18 2019-02-18 Application disaster tolerance device and method, terminal device and readable storage medium Active CN109698769B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910120857.XA CN109698769B (en) 2019-02-18 2019-02-18 Application disaster tolerance device and method, terminal device and readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910120857.XA CN109698769B (en) 2019-02-18 2019-02-18 Application disaster tolerance device and method, terminal device and readable storage medium

Publications (2)

Publication Number Publication Date
CN109698769A true CN109698769A (en) 2019-04-30
CN109698769B CN109698769B (en) 2022-03-22

Family

ID=66234807

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910120857.XA Active CN109698769B (en) 2019-02-18 2019-02-18 Application disaster tolerance device and method, terminal device and readable storage medium

Country Status (1)

Country Link
CN (1) CN109698769B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110572321A (en) * 2019-09-30 2019-12-13 北京天融信网络安全技术有限公司 Data transmission method and device, storage medium and electronic equipment

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110231841A1 (en) * 2010-03-17 2011-09-22 Zerto Ltd. Methods and apparatus for providing hypervisor level data services for server virtualization
US20110271067A1 (en) * 2010-05-03 2011-11-03 Pixel8 Networks, Inc. Efficient Cloud Network Attached Storage
CN102291262A (en) * 2011-09-01 2011-12-21 中兴通讯股份有限公司 Disaster recovery method, device and system
EP2800308A1 (en) * 2013-04-30 2014-11-05 Comcast Cable Communications, LLC Tunnel failover
CN104869118A (en) * 2015-05-15 2015-08-26 北京云杉世纪网络科技有限公司 Method and system for achieving DDoS defense based on technology of dynamic tunnels
CN105812191A (en) * 2016-04-28 2016-07-27 杭州华三通信技术有限公司 Disaster recovery switching method and device
CN106254095A (en) * 2016-07-19 2016-12-21 华为技术有限公司 The backup processing method of tunnel traffic and equipment
CN107241384A (en) * 2017-05-03 2017-10-10 复旦大学 A kind of content distribution service priority scheduling of resource method based on many cloud frameworks
CN108475251A (en) * 2016-01-22 2018-08-31 环球互连及数据中心公司 It is put for the virtual network of container, heat exchange, pyrocondensation and disaster recovery

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110231841A1 (en) * 2010-03-17 2011-09-22 Zerto Ltd. Methods and apparatus for providing hypervisor level data services for server virtualization
US20110271067A1 (en) * 2010-05-03 2011-11-03 Pixel8 Networks, Inc. Efficient Cloud Network Attached Storage
CN102291262A (en) * 2011-09-01 2011-12-21 中兴通讯股份有限公司 Disaster recovery method, device and system
EP2800308A1 (en) * 2013-04-30 2014-11-05 Comcast Cable Communications, LLC Tunnel failover
CN104869118A (en) * 2015-05-15 2015-08-26 北京云杉世纪网络科技有限公司 Method and system for achieving DDoS defense based on technology of dynamic tunnels
CN108475251A (en) * 2016-01-22 2018-08-31 环球互连及数据中心公司 It is put for the virtual network of container, heat exchange, pyrocondensation and disaster recovery
CN105812191A (en) * 2016-04-28 2016-07-27 杭州华三通信技术有限公司 Disaster recovery switching method and device
CN106254095A (en) * 2016-07-19 2016-12-21 华为技术有限公司 The backup processing method of tunnel traffic and equipment
CN107241384A (en) * 2017-05-03 2017-10-10 复旦大学 A kind of content distribution service priority scheduling of resource method based on many cloud frameworks

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110572321A (en) * 2019-09-30 2019-12-13 北京天融信网络安全技术有限公司 Data transmission method and device, storage medium and electronic equipment

Also Published As

Publication number Publication date
CN109698769B (en) 2022-03-22

Similar Documents

Publication Publication Date Title
EP3819757A1 (en) Edge application management method and system
US9999030B2 (en) Resource provisioning method
CN108737468B (en) Cloud platform service cluster, construction method and device
CN109040276B (en) Method and device for constructing cloud platform, computer storage medium and terminal
US8806015B2 (en) Workload-aware placement in private heterogeneous clouds
EP3754494A1 (en) Using multidimensional metadata tag sets to determine resource allocation in a distributed computing environment
CN105335229B (en) Scheduling method and device of service resources
CN105408863A (en) Endpoint data centers of different tenancy sets
US20180375825A1 (en) Container networking for connecting network controller applications to a switch fabric
CN103888277B (en) A kind of gateway disaster-tolerant backup method, device and system
WO2015172362A1 (en) Network function virtualization network system, data processing method and device
CN105138389A (en) Method and system for managing virtual devices in cluster
CN105159775A (en) Load balancer based management system and management method for cloud computing data center
CN106790092B (en) Remote procedure call server control system and method
CN111880936A (en) Resource scheduling method and device, container cluster, computer equipment and storage medium
CN112882790A (en) Cloud edge cooperative management method based on distributed cloud platform
CN108345490B (en) Method and system for deploying virtual machine in NFV
CN105429938A (en) Resource allocation method and device
CN113301078A (en) Network system, service deployment and network division method, device and storage medium
WO2016095524A1 (en) Resource allocation method and apparatus
CN108900435B (en) Service deployment method, device and computer storage medium
JP5661328B2 (en) Efficient and cost-effective distributed call admission control
CN109698769A (en) Using disaster tolerance device and method, terminal device, readable storage medium storing program for executing
CN112532758B (en) Method, device and medium for establishing network edge computing system
CN112948055A (en) Innovative course experiment automatic management method and system based on cloud computing

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant