CN112328366B - Efficient cloud platform host protection method and system - Google Patents

Efficient cloud platform host protection method and system Download PDF

Info

Publication number
CN112328366B
CN112328366B CN202011230030.3A CN202011230030A CN112328366B CN 112328366 B CN112328366 B CN 112328366B CN 202011230030 A CN202011230030 A CN 202011230030A CN 112328366 B CN112328366 B CN 112328366B
Authority
CN
China
Prior art keywords
host
source
target
disk
proxy
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202011230030.3A
Other languages
Chinese (zh)
Other versions
CN112328366A (en
Inventor
倪国军
周华
胡军擎
江俊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Information2 Software Inc
Original Assignee
Shanghai Information2 Software Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Information2 Software Inc filed Critical Shanghai Information2 Software Inc
Priority to CN202011230030.3A priority Critical patent/CN112328366B/en
Publication of CN112328366A publication Critical patent/CN112328366A/en
Application granted granted Critical
Publication of CN112328366B publication Critical patent/CN112328366B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • G06F9/45533Hypervisors; Virtual machine monitors
    • G06F9/45558Hypervisor-specific management and integration aspects
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0668Interfaces specially adapted for storage systems adopting a particular infrastructure
    • G06F3/0671In-line storage system
    • G06F3/0673Single storage device
    • G06F3/0674Disk device
    • G06F3/0676Magnetic disk device
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/54Interprogram communication
    • G06F9/547Remote procedure calls [RPC]; Web services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • G06F9/45533Hypervisors; Virtual machine monitors
    • G06F9/45558Hypervisor-specific management and integration aspects
    • G06F2009/4557Distribution of virtual machine instances; Migration and load balancing

Abstract

The invention discloses a high-efficiency protection system and a method of a cloud platform host, wherein the system comprises: the host protection server is used for creating a snapshot for a source host on a source cloud platform, acquiring configuration of the source host and disk information, mounting a disk of the source host to a source proxy host, creating a disk of a target host on a target cloud platform according to the disk configuration of the source host, mounting the disk of the target host to the target proxy host, issuing a task to the target proxy host, informing the source proxy host to be connected to the target proxy host, and creating a target host consistent with the source cloud platform on the target cloud platform after the disk data transmission is finished; the source cloud platform is provided with a source host and a source proxy host, and the source proxy host is connected to the corresponding target proxy host for data transmission after receiving the issued parameters; and the target cloud platform is provided with a target proxy host, establishes connection with the source proxy host, sends the disk mounting point corresponding table to the source proxy host after establishing connection, and receives and stores each disk file data sent by the source proxy host.

Description

Efficient cloud platform host protection method and system
Technical Field
The invention relates to the technical field of cloud computing, in particular to a high-efficiency cloud platform host protection method and system.
Background
With the rapid development of information technology, the demand of computing infrastructure is continuously increased in the information construction process, and the requirements on hardware equipment, software, maintenance cost and timeliness are higher and higher. Hardware virtualization and cloud platforms ensue in order to increase infrastructure utilization, reduce time and money costs.
Virtualization is a specific technology, and means to virtualize hardware resources, so that isolation, expandability, security, full utilization of resources and the like are realized. Cloud is not a specific technology, a service that delivers shared computing resources on demand over a network. Virtualization is the most critical technology of the cloud and is the cornerstone. Enterprises can start with virtualizing their servers and then turn to the cloud for greater agility and self-service.
The cloud platform is a platform which is based on virtualization technology and provides computing resources on demand through a network. The cloud platform host is the most basic and important computing resource provided by the cloud platform. Cloud platforms are divided into public cloud, private cloud and hybrid cloud (fig. 1). Public cloud resources are owned and operated by third party cloud service providers, and the resources are provided through the Internet; the private cloud is composed of cloud computing resources dedicated to one enterprise or organization; hybrid clouds, which are generally considered "the best of the two," combine a local infrastructure or private cloud with a public cloud, and organizations can take advantage of both.
For tenants of the cloud platform, the cloud platform host is a remote computer distributed as required, almost all functions of a physical computer can be realized, computing, storage and network resources can be flexibly expanded, and time and money costs can be greatly reduced. Although the security of the large cloud platform is high, the important host and the data thereof need to be protected to ensure the security of the data.
At present, although the technologies for cloud platform host protection of various manufacturers are different, the following defects are mainly found in summary:
1. some vendors need to install services or plug-ins inside the cloud platform to achieve protection of the host. However, in fact, installing anything on the cloud platform is sensitive, and may affect the stability of the whole cloud platform. A common private cloud platform does not allow additional services or plug-ins to be installed, and a public cloud is not allowed to be allowed;
2. some manufacturers' cloud host protection needs to be performed by installing an application on a host system of a cloud platform, and the method has the following disadvantages:
(1) the user name and the password of the host computer are required to log in the host computer system, which cannot be operated by the host computer of some sensitive departments, and the log-in information cannot be provided.
(2) The application is installed and operated on the host computer, the stability of the host computer is threatened, the state of the original host computer is damaged, and particularly for a database server, the application is not feasible in many times.
(3) This approach is labor intensive and often unacceptable if the number of hosts that need to be migrated is large.
3. Some vendors use third party tools for transmission. The use of third party sophisticated tools to transfer, while potentially functionally or functionally unique, functions other than basic functions such as encryption, compression, etc. are somewhat laborious, such as bandwidth control, congestion control, performance tuning, etc.
4. Automatic protection cannot be realized, and the operation time and the protection type can be flexibly set.
5. No independent controller, controller server, target agent host and the like cooperate, and a high-expansion and high-performance backup system cannot be realized; host protection of other kinds of platforms cannot be conveniently realized; it cannot be easily integrated with other data protection methods, such as data protection of block devices and data protection of file systems.
Disclosure of Invention
In order to overcome the defects in the prior art, the present invention provides a system and a method for efficiently protecting a cloud platform host, so as to efficiently protect the host in the cloud platform.
To achieve the above object, the present invention provides an efficient protection system for a cloud platform host, including:
the host protection server is used for creating a protection rule aiming at the protection of the cloud platform host, creating a snapshot for a source host to be protected on a source cloud platform, acquiring the configuration and disk information of the source host, mounting a disk of the source host to a source proxy host of the source cloud platform, creating a disk of a target host on a target cloud platform according to the disk configuration information of the source host, mounting the disk to the target proxy host, issuing a task to the target proxy host of the target cloud platform, informing the source proxy host on the source cloud platform to be connected to the target proxy host of the target cloud platform to perform disk data transmission, and creating a target host with the same specification as the source cloud platform on the target cloud platform after the disk data transmission is finished;
the source cloud platform is provided with a source proxy, and the source proxy is connected to a target proxy of a corresponding target cloud platform for disk data transmission after receiving the parameters sent by the host protection server;
the target cloud platform is provided with a target proxy host, the target proxy host receives a task and a disk mounting point corresponding table issued by a host protection server, establishes connection with a source proxy host when receiving a connection request sent by the source proxy host for the task, sends the disk mounting point corresponding table to the source proxy host after establishing the connection, and receives data of each disk file sent by the source proxy host and stores the data to a disk of the target host.
Preferably, the host protection server includes:
the snapshot creating unit is used for creating a snapshot for a source host to be protected by the source cloud platform;
a configuration information obtaining unit, configured to obtain all configurations and disk information of the source host;
the disk operation unit is used for mounting the obtained snapshot disk of the source host to the source proxy host, creating a target host disk on the target cloud platform according to the obtained configuration information of the source host, and mounting the created target host disk to the target proxy host;
a disk mounting point acquisition unit, configured to acquire mounting point information of a mounted disk from each proxy, and establish a disk mounting point correspondence table as a source and a target during disk data transmission;
the proxy host task starting unit is used for issuing tasks to the target proxy host, providing the disk mounting point corresponding table to the target proxy host, issuing parameters to the source proxy host, and starting the source proxy host to establish connection with the target proxy host by using the issued parameters;
and the target host creating unit is used for creating a target host with the specification consistent with that of the source cloud platform on the target cloud platform after the disk data transmission is finished.
Preferably, the host protection server further includes a disk unloading unit, configured to unload the source host disk mounted on the source proxy host and unload the target disk mounted on the target proxy host after completing disk data transmission.
Preferably, the source cloud platform and the target cloud platform have Restful interfaces, the host protection server manages each cloud platform through the Restful interfaces, and each proxy host deploys a transceiver library component and a block device data read-write component.
Preferably, the parameters issued by the proxy task starting unit include, but are not limited to, an IP address, a port number, and a task ID required to be connected of the target proxy.
Preferably, the source proxy further comprises:
the connection unit is used for connecting the connection unit to the corresponding target proxy host through the transceiving library component according to the issued parameters when the issued parameters of the host protection server are received;
a disk mounting point list obtaining unit, configured to obtain a disk mounting point list to be read from the target proxy host;
and the change block information acquisition unit is used for reading the disk data of the fixed size of the disk mounted by the source proxy host, calculating a hash value of each data block, judging the validity of each data block, sending the valid data block and the hash value of each data block to the target proxy host, and reserving the hash value of each data block for use in next migration at the target proxy host.
Preferably, when the change block information obtaining unit performs full migration, the change block information obtaining unit reads disk data mounted on the source proxy host according to a fixed size, calculates a hash value for each data block, sequentially judges whether each data block is a non-empty data block, sends the non-empty data block and the hash value of each data block to the target proxy host, and reserves the hash value of each data block in the target proxy host for use in next migration.
Preferably, when the incremental migration is performed, the changed block information obtaining unit obtains a disk hash value list generated during the previous migration from the target proxy host, reads disk data from the disk mounted by the source proxy host according to a fixed size, calculates hash values of the data blocks, determines whether the data blocks are changed by comparing whether the hash values of the corresponding data blocks in the disk hash value list are the same, sends the changed data blocks and the hash values of the data blocks to the target proxy host, and reserves the hash values of the data blocks in the target proxy host for use during the next migration.
Preferably, the target proxy comprises:
a task issuing receiving unit, configured to receive a task issued by the host protection server and a disk mounting point mapping table;
a connection request receiving unit, configured to establish connection with the source proxy host when receiving a connection request sent by the source proxy host for a task, and send a disk mount point list to be read to the source proxy host;
and the change block information acquisition and storage unit is used for receiving the effective data block information of each disk sent by the change block information acquisition unit of the source proxy host and writing the effective data block information into the target disk on the corresponding mounting point.
In order to achieve the above object, the present invention further provides an efficient cloud platform host protection method, which includes the following steps:
step S1, the host protection server takes a snapshot of the source host of the source cloud platform, obtains the configuration and disk information of the source host, mounts the snapshot disk of the source host to the source proxy host of the source cloud platform to obtain a mounting point, and creates a target host disk on the target cloud platform according to the disk configuration information of the source host and mounts the target host disk to the target proxy host to obtain the mounting point;
step S2, the host protection server issues tasks to the target proxy, provides the disk mount point mapping table to the target proxy, issues parameters to the source proxy, and starts the tasks of the source proxy by using the issued parameters;
step S3, after the source proxy establishes connection with the target proxy, the target proxy sends the disk mounting point correspondence table to the source proxy to obtain a disk mounting point list to be read.
Step S4, the source proxy host reads the disk data of the mounted disk with fixed size, calculates the hash value of each data block, and sends the valid data block and the hash value of each data block to the target proxy host after the validity judgment of each data block;
step S5, the target proxy receives the effective data block information of each disk sent by the source proxy and writes the effective data block information into the target disk on the corresponding mounting point;
step S6, after the disk data transmission is completed, the host protection server creates a target host on the target cloud platform, where the target host has a specification that is consistent with that of the source cloud platform.
Compared with the prior art, the invention has the following beneficial effects:
the invention has the following advantages:
1. the proxy host is arranged on the source cloud platform and the target cloud platform to protect the effective data blocks, so that transmission and storage are saved, recovery, migration and copying can be carried out across the cloud platforms, the proxy host is a common cloud platform host without special limitation, the source host to be protected has no influence, login information is not needed, an operating system and application information are not needed, and real proxy protection in the host is realized.
2. The proxy host can simultaneously support the operation of dozens or even hundreds of virtual machine protection tasks. If the simultaneous protection is not needed, one platform can deploy one proxy host, so that the resources are fully saved, and the efficient protection is realized.
3. The invention can realize continuous protection for backup and copy based on a periodic strategy, and realize more flexible protection strategy by setting full, differential or incremental protection.
4. The invention controls the machine server, the host computer protects the server, and the proxy computer can be flexibly configured, thereby realizing a high-performance system which is scalable and easy to expand.
5. The invention can realize the migration of the virtual machine based on the vmware virtual platform and the kvm virtual platform to the cloud platform.
Drawings
FIG. 1 is a flowchart illustrating steps of a cross-platform migration method for virtual machines according to the present invention;
FIG. 2 is a system architecture diagram of a virtual machine cross-platform migration system according to the present invention;
FIG. 3 is a system architecture diagram of a high-efficiency protection system for a cloud platform host according to the present invention;
FIG. 4 is a flowchart illustrating steps of a method for efficiently protecting a cloud platform host according to the present invention;
fig. 5 is a flowchart illustrating protection of a cloud platform host according to an embodiment of the present invention.
Detailed Description
Other advantages and capabilities of the present invention will be readily apparent to those skilled in the art from the present disclosure by describing the embodiments of the present invention with specific embodiments thereof in conjunction with the accompanying drawings. The invention is capable of other and different embodiments and its several details are capable of modification in various other respects, all without departing from the spirit and scope of the present invention.
Generally, protection of a cloud platform host includes backup, restoration, migration and replication, as shown in fig. 2, where backup is to store host data of a cloud platform, and if necessary, the host data may be restored to an original platform or another platform, and migration is to migrate a cloud host from one cloud platform to another cloud platform, so that backup and restoration processes are integrated, but data is not dropped to the ground, is not stored locally, and is directly moved between platforms, and replication is based on a migration technology, so that an operation of automatically operating according to time configuration is implemented, and switching and takeover can be performed. The invention introduces a cloud platform host protection technology by taking migration as an example.
Fig. 3 is a system architecture diagram of a high-efficiency protection system for a cloud platform host according to the present invention. As shown in fig. 3, the present invention provides a high-efficiency protection system for a cloud platform host, including:
the host protection server 30 is configured to create a protection rule for protection of a cloud platform host, process most of management work for protecting the cloud platform host, and include operations of managing a cloud platform (including a source cloud platform and a target cloud platform) and hosts thereof, managing rules for host protection, and scheduling rules, creating a snapshot for a source host to be protected on the source cloud platform 31, acquiring configuration and disk information of the source host, and mounting a disk of the source host to a source proxy host of the source cloud platform, creating a disk on the target cloud platform according to disk configuration information and mounting the disk to a target proxy host, notifying the source proxy host on the source cloud platform 31 to connect to the target proxy host of the target cloud platform 32 to perform disk data transmission, and creating a target host with a specification consistent with that of the source cloud platform 31 on the target cloud platform 32 after the disk data transmission is completed.
Common cloud platforms all have open interfaces, for example, most of the cloud platforms have Restful interfaces. The third-party application can be developed aiming at the interface, realizes more functions, and is complementary with the platform to form a set of situation that ecology achieves win-win. In the present invention, the host protection server 30 manages the cloud platform (including the source cloud platform 31 and the target cloud platform 32) through the Restful interface, and in addition, the host protection server also manages and schedules the rules, so as to implement most of the management work of the system. To protect the cloud platform host in the agent-free manner, at least one agent host needs to be deployed on the cloud platform (including the source cloud platform 31 and the target cloud platform 32) to operate the disk of the host to be protected on the cloud platform.
Specifically, the host protection server 30 further includes:
a snapshot creating unit 301, configured to create a snapshot for a source host to be protected by the source cloud platform 31. In the present invention, the snapshot creating unit 301 creates a snapshot for the source host to be protected by the source cloud platform 31 by calling a source cloud platform Restful interface.
A configuration information obtaining unit 302, configured to obtain all configurations and disk information of the source host. In the present invention, the configuration information obtaining unit 302 obtains all configurations and disk information of the source host by calling a cloud platform Restful interface.
The disk operating unit 303 is configured to mount the obtained snapshot disk of the source host to the source proxy of the source cloud platform 31, and meanwhile, the disk operating unit 303 further creates a target host disk on the target cloud platform 32 according to the obtained configuration information of the source host, and mounts the created target host disk to the target proxy of the target cloud platform 32. Specifically, the disk operating unit 303 mounts the disk of the source host to the source proxy host by calling the Restful interface of the source cloud platform, creates the disk of the target host according to the obtained configuration information of the source host by calling the Restful interface of the target cloud platform, and mounts the disk of the target host to the target proxy host.
A disk mount point obtaining unit 304, configured to obtain mount point information of the mounted disk from each proxy through a remote management interface (RPC interface) of each proxy, and establish a disk mount point correspondence table, that is, a correspondence table between a source host disk mount point and a target host disk mount point, as a source and a target during disk data transmission.
The proxy task starting unit 305 is configured to issue a task (e.g., migration) to a target proxy, provide the disk mount point mapping table to the target proxy, issue a parameter to a source proxy, and start the source proxy to connect to the target proxy according to the issued parameter, that is, indicate an IP address and a port number of the target proxy and a task ID (i.e., an issued task) to be connected by using the issued parameter, so that the source proxy and the target proxy establish a connection. That is, the proxy task initiating unit 305 of the host protection server 30 issues the migration task to the target proxy, runs on the target proxy, issues to the source proxy only to notify the source proxy to connect to the target proxy, and has a task ID in the parameters when issuing, and information for connecting to the target, such as ip, port number, etc. of the target proxy. In an embodiment of the present invention, the proxy task starting unit 305 issues the migration task to the target proxy by invoking a remote management interface (RPC interface), provides the disk mount point mapping table to the target proxy, and issues parameters to the source proxy by invoking the remote management interface (RPC interface) so as to start the task of the source proxy using the parameters, where the issued parameters include, but are not limited to, an IP address, a port number, and a task ID that needs to be connected of the target proxy, and the source proxy can be connected to the target proxy according to the issued parameters.
And the disk unloading unit 306 is configured to unload the source host disk mounted on the source proxy host and unload the target disk mounted on the target proxy host after the disk data transmission is completed.
Specifically, the disk unloading unit 306 unloads the source host disk mounted on the source proxy host by calling the Restful interface of the source cloud platform, and unloads the target disk mounted on the target proxy host by calling the Restful interface of the target cloud platform.
And a target host creating unit 307, configured to create, on the target cloud platform 32, a target host whose specification is consistent with that of the source cloud platform 31 after the disk data transmission is completed.
Specifically, after the disk data transmission is completed, the target host creating unit 307 calls the Restful interface of the source cloud platform to delete the snapshot of the source host, and according to the specification of the source host, the transmitted target disk and the start sequence, the selected network and other information calls the Restful interface of the target cloud platform to create the target host on the target cloud platform, thereby completing the migration.
The source cloud platform 31 is provided with a source host to be protected and a source proxy host, the host protection server mounts a disk of the source host to the source proxy host under the operation of the host protection server 30, and the source proxy host is connected to a target proxy host corresponding to the target cloud platform to perform disk data transmission after receiving parameters issued by the host protection server 30.
Specifically, the source proxy host is a library receiving and sending component and a block device data reading and writing component, and after receiving the currently mounted source host disk information, the source proxy host is connected to the target proxy host through the library receiving and sending component to establish connection, so that the transmission and storage of host data are realized.
The source proxy further comprises:
the connection unit 310 is configured to, when receiving the issued parameter of the host protection server 30, connect to the corresponding target proxy host through the transceiving library component according to the issued parameter. In the embodiment of the present invention, the parameters issued by the host protection server 30 indicate the IP address and the port number of the target proxy to be connected, and the task ID to be connected, and the connection unit 310 connects the source proxy to the corresponding target proxy through the transceiver component deployed by the source proxy according to the issued parameters.
A disk mounting point list obtaining unit 311, configured to obtain a disk mounting point list that needs to be read. In the specific embodiment of the present invention, the target proxy host sends the disk mounting point correspondence table acquired from the host protection server 30 to the source proxy host, and the disk mounting point list acquiring unit 311 acquires the disk mounting point list.
A change block information obtaining unit 312, configured to read disk data from the mounted disk data according to a fixed size during full migration, calculate a hash value for each block of data, and send the valid data block and the hash value of each data block to the target proxy host; and during incremental migration, acquiring a disk hash value list generated during the last migration, calculating a hash value of the mounted disk data according to a fixed size, comparing the hash value during the last migration, and determining an effective data block according to a comparison result and sending the effective data block to the target proxy host.
Specifically, when the full-volume migration is performed, the change block information obtaining unit 312 reads the disk data mounted on the source proxy host according to a fixed size, calculates a hash value for each data block, sequentially checks whether each data block is empty (all zeros) and determines whether each data block is an effective data block, after the empty data block is removed, all the obtained effective data blocks are sent to the target proxy host, and sends the hash value of each data block to the target proxy host, and the target proxy host reserves the hash value of each data block for use in the next migration, and writes the effective data block into the target disk on the corresponding mounting point; during incremental migration, the target proxy host sends a disk hash value list generated during the last migration to the source proxy host, the changed block information obtaining unit 312 reads disk data from the disk data mounted on the source proxy host according to a fixed size, calculates hash values of the data blocks, compares the hash values of the corresponding data blocks in the disk hash value list, if the data hash values at the same position are the same, indicates that the data block data does not change and is not required to be migrated, the data block is an invalid data block, if the data hash values at the same position are different, indicates that the data block data changes, determines that the data block data is a valid data block, sends the valid data block to the target proxy host after the invalid data block is removed, sends the hash value of each data block to the target proxy host, and reserves the hash value of each data block for use during the next migration, and writing the valid data block into the target disk on the corresponding mounting point by the target agent host.
The target cloud platform 32 is provided with a target proxy, a disk is created on the target platform according to the disk configuration information of the source host under the operation of the host protection server 30 and is mounted to the target proxy, the target proxy receives the task and the disk mounting point list sent by the host protection server 30, the target proxy establishes connection with the source proxy when receiving a connection request sent by the source proxy for the task, and sends mounting points of all disk files to the source proxy after establishing connection, and receives and stores data of each disk file sent by the source proxy.
Specifically, the target proxy host also deploys a library transceiver component and a block device data read-write component, so as to connect with the source proxy host through the library transceiver component. The target proxy further comprises:
the issued task receiving unit 320 is configured to receive a task (for example, a migration task) issued by the host protection server 30 and a disk mount point mapping table.
A connection request receiving unit 321, configured to establish a connection with the source proxy host when receiving a connection request sent by the source proxy host for a task, and send a disk mount point list to be read to the source proxy host.
A change block information obtaining and storing unit 322, configured to receive valid data block information of each disk sent by the change block information obtaining unit of the source proxy, write the valid data block information into a target disk at a corresponding mount point, and meanwhile, the change block information obtaining and storing unit 322 also receives hash values of each valid data block sent by the change block information obtaining unit of the source proxy, and retains the hash values of each data block for use in next migration by the target proxy
Specifically, the changed block information obtaining and storing unit 322 of the target proxy writes the disk data into the corresponding target disk mount point in a block device manner after receiving the data of each disk file sent by the source proxy.
Preferably, the system of the present invention may further include a general control server module (not shown in the drawings) including a user interface providing an interface for user operations in a web page and client manner and a control machine providing management functions including various management of users, permissions, authorities, logs, history, rules, host protection servers, target agent hosts, and the like.
Fig. 4 is a flowchart of a method for efficiently protecting a cloud platform host according to the present invention. As shown in fig. 4, the method for efficiently protecting the cloud platform host according to the present invention includes the following steps:
step S1, the host protection server obtains the configuration and disk information of the source host and mounts the disk of the source host to the source proxy host of the source cloud platform to obtain a mounting point, and creates a target host disk on the target cloud platform according to the disk configuration information of the source host and mounts the target host disk to the target proxy host to obtain the mounting point.
In the specific embodiment of the invention, the host protection server calls a Restful interface of a source cloud platform to create a snapshot for a source host to be protected by the source cloud platform, obtains all configuration and disk information of the corresponding source host by calling the Restful interface of the source cloud platform, mounts the obtained snapshot disk of the source host to a source proxy host of the source cloud platform, and simultaneously calls a Restful interface of a target cloud platform to create a disk of the target host according to the obtained configuration information of the source host and mounts the disk of the target host to the target proxy host.
Step S2, the host protection server issues a task (e.g. migration) to the target proxy, provides the disk mount point mapping table to the target proxy, and at the same time, issues a parameter to the source proxy, and starts the source proxy to connect to the target proxy by using the issued parameter, that is, indicates the IP address, port number, and task ID to be connected of the target proxy by using the issued parameter, so that the source proxy and the target proxy establish connection. In the embodiment of the invention, the host protection server issues the migration task to the target proxy host by calling a remote management interface (RPC interface), provides the disk mount point corresponding table to the target proxy host, and issues the parameters to the source proxy host by calling the remote management interface (RPC interface) so as to start the task of the source proxy host by using the parameters, wherein the issued parameters include but are not limited to an IP address and a port number of the target proxy host and a task ID required to be connected, and the source proxy host can be connected to the target proxy host according to the issued parameters.
Step S3, after the source proxy establishes a connection with the target proxy, the target proxy sends the disk mount point list to be read to the source proxy.
Step S4, the source proxy reads disk data of a fixed size for the mounted disk, calculates a hash value for each block of data, and sends the valid data block and the hash value of each data block to the target proxy after determining the validity of each data block.
In the specific embodiment of the invention, during full migration, a source proxy host reads disk data of a mounted disk according to a fixed size, calculates a hash value for each block of data, judges whether each data block is an effective data block or not by checking whether each data block is empty (all zeros) or not, if a certain data block is all zeros, the data block is an invalid data block, after validity judgment of all data blocks, the effective data block without the empty data block is sent to a target proxy host and the hash value of each data block is sent to the target proxy host, and the hash value of each data block is reserved for use during next migration by the target proxy host; when incremental migration is performed, a disk hash value list generated during last migration is obtained from a target proxy host, hash values of mounted disk data are calculated according to a fixed size, hash values of corresponding data blocks in the disk hash value list are compared, if the data hash values at the same positions are the same, the data block data is unchanged and does not need to be migrated, the data block is an invalid data block, if the data hash values at the same positions are different, the data block data is changed, the data block data is determined to be a valid data block, after the invalid data block is removed, the valid data block is sent to the target proxy host, and the hash values of the data blocks are reserved by the target proxy host for use during next migration.
And step S5, the target proxy receives the effective data block information of each disk sent by the source proxy, writes the effective data block information into the target disk on the corresponding mounting point, and stores the hash value of each data block for use in the next migration.
Specifically, after receiving the data of each disk file sent by the source proxy, the target proxy writes the disk data into the corresponding target disk mount point in a block device manner.
And step S6, after the disk data transmission is finished, the host protection server creates a target host on the target cloud platform, wherein the target host has the specification consistent with that of the source cloud platform.
Specifically, after the disk data transmission is completed, the host protection server calls a source cloud platform Restful interface to delete a source host snapshot, and according to the specification of the source host, the transmitted target disk and the starting sequence, the selected network and other information calls a target cloud platform Restful interface to create a target host on the target cloud platform, so as to complete the migration.
Preferably, after step S5, the method further includes the following steps:
step S6, after the disk data transmission is completed, the host protection server unloads the source host disk mounted on the source proxy and unloads the target disk mounted on the target proxy.
Specifically, the host protection server unloads the source host disk mounted on the source proxy host, the target disk mounted on the target proxy host and the target disk mounted on the target proxy host through the Restful interface of the source cloud platform.
Examples
In this embodiment, as shown in fig. 5, an efficient cloud platform host protection process is as follows:
step 1, the host protection server acquires a source host on a source cloud platform by calling a Restful interface of the source cloud platform and takes a snapshot of the source host (disk).
And 2, the host protection server obtains the configuration of the source host and the snapshot disk information through a Restful interface of the source cloud platform.
And 3, mounting the snapshot disk to the source proxy host by the host protection server through the source cloud platform Restful interface and obtaining a mounting point.
And 4, the host protection server creates a target host disk on the target cloud platform through the Restful interface of the target cloud platform according to the configuration information of the source host disk.
And 5, mounting the target host disk applied on the target cloud platform to the target proxy host by the host protection server through the Restful interface of the target cloud platform and obtaining a mounting point.
And 6, the host protection server issues a migration task to the target proxy host by calling a remote management interface (RPC interface), and gives the corresponding table of the disk mounting point to the target proxy host.
And 7, the host protection server calls a remote call interface (RPC interface) of the source proxy, issues parameters to the source proxy, and starts the task of the source proxy by using the issued parameters, wherein the issued parameters comprise the IP address and the port number of the target proxy and the task ID required to be connected.
And 8, connecting the source proxy host to the target proxy host according to the issued parameters.
And 9, the target proxy host sends the disk mounting point list needing to be read to the source proxy host.
And step 10, if the incremental migration is performed, the target proxy sends the disk hash value list generated in the last migration to the source proxy.
Step 11, for each disk, performing the following operations of steps 12 to 15:
and step 12, reading the disk data according to the size of the fixed block by the source proxy host, and generating a hash value for each piece of data.
Step 13, the source proxy host checks the validity of the data block, if the data block is migrated in full, the source proxy host checks whether the data block is empty (all zeros) or not, and if not, the data block is a valid data block; if the data block is the incremental migration, comparing whether the data hash values at the same position are the same or not in the last migration, and if not, determining the data block to be the valid data block.
And 14, the source proxy host ignores the invalid data blocks, sends the valid data blocks to the target proxy host, sends the hash value of each data block to the target proxy host, and reserves the hash value of each data block for use in the next migration.
And step 15, writing the valid data block into the target disk on the corresponding mounting point by the target proxy host.
And step 16, after the disk data transmission is finished, the host protection server unloads the source host disk mounted on the source proxy host through the Restful interface of the source cloud platform, and unloads the target disk mounted on the target proxy host through the Restful interface of the target cloud platform.
And step 17, deleting the source host snapshot by the host protection server, and creating a target host on the target platform according to the configuration of the source host, the transmitted target disk and the starting sequence, the selected information such as the network and the like to finish the migration.
The foregoing embodiments are merely illustrative of the principles and utilities of the present invention and are not intended to limit the invention. Modifications and variations can be made to the above-described embodiments by those skilled in the art without departing from the spirit and scope of the present invention. Therefore, the protection scope of the present invention should be as set forth in the claims.

Claims (10)

1. An efficient protection system for a cloud platform host, comprising:
the host protection server is used for creating a protection rule aiming at the protection of the cloud platform host, creating a snapshot for a source host to be protected on a source cloud platform, acquiring the configuration and disk information of the source host, mounting a disk of the source host to a source proxy host of the source cloud platform, creating a disk of a target host on a target cloud platform according to the disk configuration information of the source host, mounting the disk to the target proxy host, issuing a task to the target proxy host of the target cloud platform, informing the source proxy host on the source cloud platform to be connected to the target proxy host of the target cloud platform to perform disk data transmission, and creating a target host with the same specification as the source cloud platform on the target cloud platform after the disk data transmission is finished;
the source cloud platform is provided with a source proxy, and the source proxy is connected to a target proxy of a corresponding target cloud platform for disk data transmission after receiving the parameters sent by the host protection server;
the target cloud platform is provided with a target proxy host, the target proxy host receives a task and a disk mounting point corresponding table issued by a host protection server, establishes connection with a source proxy host when receiving a connection request sent by the source proxy host for the task, sends the disk mounting point corresponding table to the source proxy host after establishing the connection, and receives data of each disk file sent by the source proxy host and stores the data to a disk of the target host.
2. The efficient cloud platform host protection system of claim 1, wherein said host protection server comprises:
the snapshot creating unit is used for creating a snapshot for the source host to be protected by the source cloud platform;
a configuration information obtaining unit, configured to obtain all configurations and disk information of the source host;
the disk operation unit is used for mounting the obtained snapshot disk of the source host to the source proxy host, creating a target host disk on the target cloud platform according to the obtained configuration information of the source host, and mounting the created target host disk to the target proxy host;
a disk mounting point acquisition unit, configured to acquire mounting point information of a mounted disk from each proxy, and establish a disk mounting point correspondence table as a source and a target during disk data transmission;
the proxy task starting unit is used for issuing a task to the target proxy, providing the disk mounting point corresponding table to the target proxy, issuing parameters to the source proxy and starting the source proxy to establish connection with the target proxy by using the issued parameters;
and the target host creating unit is used for creating a target host with the specification consistent with that of the source cloud platform on the target cloud platform after the disk data transmission is finished.
3. The system for efficiently protecting a cloud platform host as claimed in claim 2, wherein: the host protection server also comprises a disk unloading unit used for unloading the source host disk mounted on the source proxy host and unloading the target disk mounted on the target proxy host after the disk data transmission is finished.
4. The efficient cloud platform host protection system of claim 3, wherein: the source cloud platform and the target cloud platform are provided with Restful interfaces, the host protection server manages the cloud platforms through the Restful interfaces, and the proxy hosts deploy the transceiving library components and the block device data reading and writing components.
5. The efficient cloud platform host protection system of claim 4, wherein: the parameters issued by the proxy task starting unit include, but are not limited to, an IP address, a port number, and a task ID to be connected of the target proxy.
6. The efficient cloud platform host protection system of claim 4, wherein the source proxy host further comprises:
the connection unit is used for connecting the issuing parameters of the host protection server to the corresponding target proxy host through the transceiving library component according to the issuing parameters when receiving the issuing parameters;
a disk mounting point list obtaining unit, configured to obtain a disk mounting point list to be read from the target proxy host;
and the change block information acquisition unit is used for reading the disk data of the fixed size of the disk mounted by the source proxy host, calculating a hash value of each data block, judging the validity of each data block, sending the valid data block and the hash value of each data block to the target proxy host, and reserving the hash value of each data block for use in next migration at the target proxy host.
7. The efficient cloud platform host protection system of claim 6, wherein: when the change block information acquisition unit is in full migration, the change block information acquisition unit reads disk data mounted on the source proxy host according to a fixed size, calculates a hash value of each data block, sequentially judges whether each data block is a non-empty data block or not, sends the non-empty data block and the hash value of each data block to the target proxy host, and reserves the hash value of each data block for use in next migration.
8. The system for efficient protection of cloud platform hosts of claim 7, wherein: the change block information acquisition unit acquires a disk hash value list generated during last migration from the target proxy host during incremental migration, reads disk data according to a fixed size from the disk data mounted by the source proxy host, calculates hash values of the data blocks, judges whether the data blocks are change data blocks or not by comparing whether the hash values of the corresponding data blocks in the disk hash value list are the same, sends the change data blocks and the hash values of the data blocks to the target proxy host, and reserves the hash values of the data blocks in the target proxy host for use during next migration.
9. The efficient cloud platform host protection system of claim 8, wherein the target proxy host comprises:
the issued task receiving unit is used for receiving the tasks issued by the host protection server and the corresponding table of the disk mounting points;
a connection request receiving unit, configured to establish connection with the source proxy host when receiving a connection request sent by the source proxy host for a task, and send a disk mount point list to be read to the source proxy host;
and the change block information acquisition and storage unit is used for receiving the effective data block information of each disk sent by the change block information acquisition unit of the source proxy host and writing the effective data block information into the target disk on the corresponding mounting point.
10. An efficient cloud platform host protection method comprises the following steps:
step S1, the host protection server takes a snapshot of the source host of the source cloud platform, obtains the configuration and disk information of the source host, mounts the snapshot disk of the source host to the source proxy host of the source cloud platform to obtain a mounting point, and creates a target host disk on the target cloud platform according to the disk configuration information of the source host and mounts the target host disk to the target proxy host to obtain the mounting point;
step S2, the host protection server issues tasks to the target proxy, provides the disk mount point mapping table to the target proxy, issues parameters to the source proxy, and starts the tasks of the source proxy by using the issued parameters;
step S3, after the source proxy host and the target proxy host are connected, the target proxy host sends the corresponding table of disk mounting points to the source proxy host to obtain a disk mounting point list to be read;
step S4, the source proxy host reads the disk data of the mounted disk with fixed size, calculates the hash value of each data block, and sends the valid data block and the hash value of each data block to the target proxy host after the validity judgment of each data block;
step S5, the target proxy receives the effective data block information of each disk sent by the source proxy, and writes the effective data block information into the target disk on the corresponding mount point;
step S6, after the disk data transmission is completed, the host protection server creates a target host on the target cloud platform, the target host having a specification that is consistent with that of the source cloud platform.
CN202011230030.3A 2020-11-06 2020-11-06 Efficient cloud platform host protection method and system Active CN112328366B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011230030.3A CN112328366B (en) 2020-11-06 2020-11-06 Efficient cloud platform host protection method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011230030.3A CN112328366B (en) 2020-11-06 2020-11-06 Efficient cloud platform host protection method and system

Publications (2)

Publication Number Publication Date
CN112328366A CN112328366A (en) 2021-02-05
CN112328366B true CN112328366B (en) 2022-09-06

Family

ID=74316283

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011230030.3A Active CN112328366B (en) 2020-11-06 2020-11-06 Efficient cloud platform host protection method and system

Country Status (1)

Country Link
CN (1) CN112328366B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113515343A (en) * 2021-04-23 2021-10-19 上海英方软件股份有限公司 Virtual machine migration system and method
CN113485787A (en) * 2021-06-30 2021-10-08 南京壹进制信息科技有限公司 Method for agent-free live migration of virtual machine to Openstack
CN116132441A (en) * 2022-12-30 2023-05-16 中国人寿保险股份有限公司上海数据中心 Cloud desktop data intercommunication method and system

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104281484A (en) * 2014-09-23 2015-01-14 华为技术有限公司 VM (virtual machine) migration method and device
CN106775922A (en) * 2016-11-22 2017-05-31 山东浪潮云服务信息科技有限公司 A kind of virtual machine migration method based on Plugin Mechanism
CN109756413A (en) * 2019-03-05 2019-05-14 山东浪潮云信息技术有限公司 A kind of cloud data center heterogeneous network internetworking system and method
CN111651238A (en) * 2020-06-03 2020-09-11 上海英方软件股份有限公司 System and method for acquiring effective data in virtual machine protection

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9223617B2 (en) * 2010-05-06 2015-12-29 Nec Laboratories America, Inc. Methods and systems for migrating networked systems across administrative domains

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104281484A (en) * 2014-09-23 2015-01-14 华为技术有限公司 VM (virtual machine) migration method and device
CN106775922A (en) * 2016-11-22 2017-05-31 山东浪潮云服务信息科技有限公司 A kind of virtual machine migration method based on Plugin Mechanism
CN109756413A (en) * 2019-03-05 2019-05-14 山东浪潮云信息技术有限公司 A kind of cloud data center heterogeneous network internetworking system and method
CN111651238A (en) * 2020-06-03 2020-09-11 上海英方软件股份有限公司 System and method for acquiring effective data in virtual machine protection

Also Published As

Publication number Publication date
CN112328366A (en) 2021-02-05

Similar Documents

Publication Publication Date Title
CN112328366B (en) Efficient cloud platform host protection method and system
CN106991035B (en) Host monitoring system based on micro-service architecture
US10169173B2 (en) Preserving management services with distributed metadata through the disaster recovery life cycle
US8615588B2 (en) Accelerate copying of virtual machine images
US7587471B2 (en) System and method for virtualizing network storages into a single file system view
US9871851B2 (en) Migrating private infrastructure services to a cloud
JP5727020B2 (en) Cloud computing system and data synchronization method thereof
US7783737B2 (en) System and method for managing supply of digital content
US10353790B1 (en) Disaster recovery rehearsals
US10089187B1 (en) Scalable cloud backup
WO2018090290A1 (en) Mirror image file conversion method and apparatus
US20200026786A1 (en) Management and synchronization of batch workloads with active/active sites using proxy replication engines
JP2005535019A (en) Storage management bridge
US11494130B2 (en) Operation data accessing device and accessing method thereof
KR101429956B1 (en) Cloud storage server and system by use of virtual nas and method thereof
CN112130959B (en) Virtual machine protection system and method
US20030018759A1 (en) Method and system for performing computer system cloning
CN114222990A (en) Automatic lasso software detection with on-demand file system locking and automatic repair
US20220129352A1 (en) Cloud-based processing of backup data for storage onto various types of object storage systems
CN114745397B (en) Online storage method and system based on private cloud
CN115485677A (en) Secure data replication in a distributed data storage environment
CN113515343A (en) Virtual machine migration system and method
JP2000112890A (en) Prevention of wrong operation and tracking device
US11675668B2 (en) Leveraging a cloud-based object storage to efficiently manage data from a failed backup operation
US11876860B2 (en) Data sharing system, data sharing method and non-transitory computer-readable recording medium for data sharing program

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant