CN116467106A - Data processing method and system of processor and electronic equipment - Google Patents

Data processing method and system of processor and electronic equipment Download PDF

Info

Publication number
CN116467106A
CN116467106A CN202310345613.8A CN202310345613A CN116467106A CN 116467106 A CN116467106 A CN 116467106A CN 202310345613 A CN202310345613 A CN 202310345613A CN 116467106 A CN116467106 A CN 116467106A
Authority
CN
China
Prior art keywords
target
processor
computing server
virtual computing
service
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310345613.8A
Other languages
Chinese (zh)
Inventor
代斌虎
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Alibaba China Co Ltd
Original Assignee
Alibaba China Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alibaba China Co Ltd filed Critical Alibaba China Co Ltd
Priority to CN202310345613.8A priority Critical patent/CN116467106A/en
Publication of CN116467106A publication Critical patent/CN116467106A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/0703Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation
    • G06F11/079Root cause analysis, i.e. error or fault diagnosis
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/0703Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation
    • G06F11/0706Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation the processing taking place on a specific hardware platform or in a specific software environment
    • G06F11/0712Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation the processing taking place on a specific hardware platform or in a specific software environment in a virtual computing platform, e.g. logically partitioned systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/0703Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation
    • G06F11/0706Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation the processing taking place on a specific hardware platform or in a specific software environment
    • G06F11/0721Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation the processing taking place on a specific hardware platform or in a specific software environment within a central processing unit [CPU]
    • G06F11/0724Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation the processing taking place on a specific hardware platform or in a specific software environment within a central processing unit [CPU] in a multiprocessor or a multi-core unit
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/0703Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation
    • G06F11/0751Error or fault detection not based on redundancy
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/0703Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation
    • G06F11/0766Error or fault reporting or storing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/0703Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation
    • G06F11/0793Remedial or corrective actions
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Abstract

The invention discloses a data processing method, a data processing system and electronic equipment of a processor. Wherein the method comprises the following steps: monitoring log data generated by a processor in the running process, wherein the processor runs on an original host; determining a processor core for the processor to run based on the log data; determining a target service provided by a target virtual computing server associated with an operating processor core, wherein the operating processor core is used for responding to a service processing request of the target virtual computing server operated by an original host machine, and the service processing request is used for requesting the operating processor core to process the target service; in response to the type of the target service including the target type, migrating the target virtual computing server from the original host to the target host for execution. The invention solves the technical problem that the host machine cannot be effectively prevented from downtime.

Description

Data processing method and system of processor and electronic equipment
Technical Field
The present invention relates to the field of data processing, and in particular, to a data processing method, system and electronic device for a processor.
Background
Currently, a node controller in a host may be down due to a central processing unit (Central Processing Unit, abbreviated as CPU), a memory, a motherboard, a power source, a disk, a network, etc. In the stability work management process of the high-sensitivity client (which can be a client highly sensitive to downtime), the downtime caused by the CPU is the most, and the occupation ratio is generally more than 30%.
In the related art, no abnormal features appear before the downtime caused by the CPU, and further analysis on the downtime caused by the CPU cannot be performed, so that the technical problem that the downtime of the host cannot be effectively avoided is caused
In view of the above problems, no effective solution has been proposed at present.
Disclosure of Invention
The embodiment of the invention provides a data processing method, a data processing system and electronic equipment of a processor, which at least solve the technical problem that a host machine cannot be effectively prevented from being down.
According to an aspect of an embodiment of the present invention, there is provided a data processing method of a processor. The method may include: monitoring log data generated by a processor in the running process, wherein the processor runs on an original host; determining a processor core for the processor to run based on the log data; determining a target service provided by a target virtual computing server associated with an operating processor core, wherein the operating processor core is used for responding to a service processing request of the target virtual computing server operated by an original host machine, and the service processing request is used for requesting the operating processor core to process the target service; and in response to the type of the target service comprising the target type, migrating the target virtual computing server from the original host to the target host for operation, wherein the target type is based on that at least one historical virtual computing server is down in the historical operation process of the processor.
According to an aspect of an embodiment of the present invention, there is provided another data processing method of a processor. The method may include: determining at least one historical virtual computing server which is down in the historical operation process of the processor, wherein the processor is operated on an original host; determining the type of service provided by the historical virtual computing server; the method comprises the steps of determining a target type based on the type of the service, and migrating the target virtual computing server from an original host to the target host to operate when the type of the target service provided by the target virtual computing server associated with a processor core operated by the processor comprises the target type.
According to an aspect of an embodiment of the present invention, there is provided a data processing apparatus of a processor. The apparatus may include: the monitoring unit is used for monitoring log data generated by the processor in the running process, wherein the processor runs on the original host; a first determining unit configured to determine a processor core that the processor operates on the basis of the log data; the second determining unit is used for determining target services provided by a target virtual computing server associated with the running processor core, wherein the running processor core is used for responding to service processing requests of the target virtual computing server running by the original host machine, and the service processing requests are used for requesting the running processor core to process the target services; and the migration unit is used for migrating the target virtual computing server from the original host machine to the target host machine to run in response to the type of the target service comprising the target type, wherein the target type is determined based on the type of the service provided by at least one historical virtual computing server, and the at least one historical virtual computing server is down in the historical running process of the processor.
According to an aspect of an embodiment of the present invention, there is provided a data processing apparatus of another processor. The apparatus may include: the third determining unit is used for determining at least one historical virtual computing server which is down in the historical running process of the processor, wherein the processor runs on an original host; a fourth determining unit configured to determine a type of service provided by the history virtual computing server; and a fifth determining unit, configured to determine a target type based on the type of the service, so that when the type of the target service provided by the target virtual computing server associated with the processor core running on the processor includes the target type, the target virtual computing server is migrated from the original host to the target host for running.
According to one aspect of an embodiment of the present invention, a data processing system for a processor is provided. The system may include: a processor for generating log data during operation, wherein the processor is operated on an original host; a processor core to determine based on log data; the target virtual computing server is associated with the running processor core and is used for providing target services, wherein the running processor core is used for responding to service processing requests of the target virtual computing server operated by the original host machine, and the service processing requests are used for requesting the running processor core to process the target services; and the controller is used for controlling the migration of the target virtual computing server from the original host to the target host to operate in response to the type of the target service comprising the target type, wherein the target type is determined based on the type of the service provided by at least one historical virtual computing server, and the at least one historical virtual computing server is down in the historical operation process of the processor.
According to another aspect of the embodiments of the present application, there is also provided a computer readable storage medium, where the computer readable storage medium includes a stored program, where when the program runs, the device on which the storage medium is controlled to execute the data processing method of the processor of any one of the above.
According to another aspect of the embodiments of the present application, there is further provided a processor, configured to execute a program, where the data processing method of any one of the above processors is performed when the program is executed.
In the embodiment of the application, log data generated by a processor in the running process is monitored, wherein the processor runs on an original host; determining a processor core for the processor to run based on the log data; determining a target service provided by a target virtual computing server associated with an operating processor core, wherein the operating processor core is used for responding to a service processing request of the target virtual computing server operated by an original host machine, and the service processing request is used for requesting the operating processor core to process the target service; and in response to the type of the target service comprising a target type, migrating the target virtual computing server from the original host to the target host for operation, wherein the target type is determined based on the type of the service provided by at least one historical virtual computing server, and the at least one historical virtual computing server is down in the historical operation process of the processor. That is, in the embodiment of the present application, the processor core operated by the processor is determined based on the monitored log data, once the type of the target service provided by the target virtual computing server (for example, the client instance) bound by the operated processor core is found to include the target type, the target virtual computing server is immediately migrated from the original host to the target host, thereby realizing the technical effect of effectively avoiding the downtime of the host, and solving the technical problem that the downtime of the host cannot be effectively avoided.
Drawings
The accompanying drawings, which are included to provide a further understanding of the application and are incorporated in and constitute a part of this application, illustrate embodiments of the application and together with the description serve to explain the application and do not constitute an undue limitation to the application. In the drawings:
FIG. 1 is a block diagram of a hardware architecture of a computer terminal (or mobile device) for implementing a data processing method of a processor according to an embodiment of the present application;
FIG. 2 is a block diagram of a computing environment according to an embodiment of the present application;
FIG. 3 is a block diagram of a service grid according to an embodiment of the present application;
FIG. 4 is a flow chart of a method of data processing of a processor according to an embodiment of the present application;
FIG. 5 is a flow chart of another data processing method of a processor according to an embodiment of the present application;
FIG. 6 is a schematic diagram of a data processing system of a processor according to an embodiment of the present application;
FIG. 7 is a schematic diagram of a CPU cause downtime in accordance with an embodiment of the present application;
FIG. 8 is a flow chart of analyzing CPU causes for downtime according to an embodiment of the present application;
FIG. 9 is a schematic diagram of a kernel number according to an embodiment of the present application;
FIG. 10 is a schematic diagram of a data processing apparatus of a processor according to an embodiment of the present application;
FIG. 11 is a schematic diagram of a data processing apparatus of another processor according to an embodiment of the present application;
fig. 12 is a block diagram of a computer terminal according to an embodiment of the present application.
Detailed Description
In order that those skilled in the art will better understand the present invention, a technical solution in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in which it is apparent that the described embodiments are only some embodiments of the present invention, not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the present invention without making any inventive effort, shall fall within the scope of the present invention.
It should be noted that the terms "first," "second," and the like in the description and claims of the present application and the above figures are used for distinguishing between similar objects and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used may be interchanged where appropriate such that embodiments of the present application described herein may be implemented in sequences other than those illustrated or otherwise described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
First, partial terms or terminology appearing in describing embodiments of the present application are applicable to the following explanation:
the cloud server (Elastic Compute Service, abbreviated as ECS) can be an elastically telescopic computing service, can be used for constructing more stable and safe application, improves operation and maintenance efficiency, and reduces information technology (Information Technology, abbreviated as IT) cost;
a Node Controller (NC for short) may be a complete cloud server, may run an instance, or may be called a host;
the instance on the cloud server can be a virtual computing server on the cloud and can comprise basic components such as a central processor, an inclusion, a memory, an operating system, a network, a disk and the like which are distributed to the virtual machine;
a Virtual processor (Virtual Central Processing Unit, abbreviated as VCPU) may be a physical central processing unit assigned to a Virtual Machine (VM);
the downtime probability can be expressed by 'down' in the field of computers, and the machine is stopped, and the conversion into Chinese characters is 'downtime', and can be also understood as the cause of the downtime of all servers, namely, the servers cannot work normally, and the like; the downtime probability can be the proportion of the number of servers which cannot normally work to the number of all servers in a certain time;
Thermomigration, which may refer to the process of migrating an instance from one physical machine to another, involves memory copying and the saving and recovery of registers; the purpose of the thermal migration is to balance the load, and to avoid possible failures and the like.
Example 1
According to an embodiment of the present application, there is provided a data processing method of a processor, it should be noted that the steps illustrated in the flowcharts of the drawings may be performed in a computer system such as a set of computer executable instructions, and that although a logical order is illustrated in the flowcharts, in some cases the steps illustrated or described may be performed in an order different from that herein.
The data processing method embodiment of the processor provided in the first embodiment of the present application may be executed in a mobile terminal, a computer terminal, or a similar computing device. Fig. 1 is a block diagram of a hardware architecture of a computer terminal (or mobile device) for implementing a data processing method of a processor according to an embodiment of the present application. As shown in fig. 1, the computer terminal 10 (or mobile device) may include one or more processors 102 (shown as 102a, 102b, … …,102 n), wherein the processors 102 may include, but are not limited to, a microprocessor (Micro Controller Unit, abbreviated as MCU) or a processing device such as a programmable logic device (Field-Programmable Gate Array, abbreviated as FPGA), a memory 104 for storing data, and a transmission module 106 for communication functions. In addition, the method may further include: a display, an input/output interface (I/O interface), a universal serial BUS (Universal Serial Bus, USB) port (which may be included as one of the ports of the BUS), a network interface, a power supply, and/or a camera. It will be appreciated by those of ordinary skill in the art that the configuration shown in fig. 1 is merely illustrative and is not intended to limit the configuration of the electronic device described above. For example, the computer terminal 10 may also include more or fewer components than shown in FIG. 1, or have a different configuration than shown in FIG. 1.
It should be noted that the one or more processors 102 and/or other data processing circuits described above may be referred to generally herein as "data processing circuits. The data processing circuit may be embodied in whole or in part in software, hardware, firmware, or any other combination. Furthermore, the data processing circuitry may be a single stand-alone processing module, or incorporated, in whole or in part, into any of the other elements in the computer terminal 10 (or mobile device). As referred to in the embodiments of the present application, the data processing circuit acts as a processor control (e.g., selection of the path of the variable resistor termination to interface).
The memory 104 may be used to store software programs and modules of application software, such as program instructions/data storage devices corresponding to the data processing method of the processor in the embodiments of the present application, and the processor 102 executes the software programs and modules stored in the memory 104, thereby executing various functional applications and data processing, that is, implementing the above-mentioned data authentication method. Memory 104 may include high-speed random access memory, and may also include non-volatile memory, such as one or more magnetic storage devices, flash memory, or other non-volatile solid-state memory. In some examples, the memory 104 may further include memory located remotely from the processor 102, which may be connected to the computer terminal 10 via a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.
The transmission means 106 is arranged to receive or transmit data via a network. The specific examples of the network described above may include a wireless network provided by a communication provider of the computer terminal 10. In one example, the transmission device 106 includes a network adapter (Network Interface Controller, NIC) that can connect to other network devices through a base station to communicate with the internet. In one example, the transmission device 106 may be a Radio Frequency (RF) module for communicating with the internet wirelessly.
The display may be, for example, a touch screen type liquid crystal display (Liquid Crystal Display, LCD) that may enable a user to interact with a user interface of the computer terminal 10 (or mobile device).
The hardware block diagram shown in fig. 1 may be used not only as an exemplary block diagram of the computer terminal 10 (or mobile device) described above, but also as an exemplary block diagram of the server described above, and in an alternative embodiment, fig. 2 shows, in block diagram form, one embodiment of using the computer terminal 10 (or mobile device) shown in fig. 1 described above as a computing node in a computing environment 201. Fig. 2 is a block diagram of a computing environment, as shown in fig. 2, where the computing environment 201 includes a plurality of computing nodes (e.g., servers) running on a distributed network (shown as 210-1, 210-2, …) in accordance with an embodiment of the present application. The computing nodes each contain local processing and memory resources and end user 202 may run applications or store data remotely in computing environment 201. An application may be provided as a plurality of services 220-1,220-2,220-3 and 220-4 in computing environment 201, representing services "A", "D", "E", and "H", respectively.
End user 202 may provide and access services through a web browser or other software application on a client, in some embodiments, provisioning and/or requests of end user 202 may be provided to portal gateway 230. Ingress gateway 230 may include a corresponding agent to handle provisioning and/or request for services (one or more services provided in computing environment 201).
Services are provided or deployed in accordance with various virtualization techniques supported by the computing environment 201. In some embodiments, services may be provided according to Virtual Machine (VM) based virtualization, container based virtualization, and/or the like. Virtual machine-based virtualization may be the emulation of a real computer by initializing a virtual machine, executing programs and applications without directly touching any real hardware resources. While the virtual machine virtualizes the machine, according to container-based virtualization, a container may be started to virtualize the entire Operating System (OS) so that multiple workloads may run on a single Operating System instance.
In one embodiment based on container virtualization, several containers of a service may be assembled into one Pod (e.g., kubernetes Pod). For example, as shown in FIG. 2, the service 220-2 may be equipped with one or more Pods 240-1,240-2, …,240-N (collectively referred to as Pods). The Pod may include an agent 245 and one or more containers 242-1,242-2, …,242-M (collectively referred to as containers). One or more containers in the Pod handle requests related to one or more corresponding functions of the service, and the agent 245 generally controls network functions related to the service, such as routing, load balancing, etc. Other services may also be equipped with Pod similar to Pod.
In operation, executing a user request from end user 202 may require invoking one or more services in computing environment 201, and executing one or more functions of one service may require invoking one or more functions of another service. As shown in FIG. 2, service "A"220-1 receives a user request of end user 202 from ingress gateway 230, service "A"220-1 may invoke service "D"220-2, and service "D"220-2 may request service "E"220-3 to perform one or more functions.
The computing environment may be a cloud computing environment, and the allocation of resources is managed by a cloud service provider, allowing the development of functions without considering the implementation, adjustment or expansion of the server. The computing environment allows developers to execute code that responds to events without building or maintaining a complex infrastructure. Instead of expanding a single hardware device to handle the potential load, the service may be partitioned to a set of functions that can be automatically scaled independently.
In another alternative embodiment, FIG. 3 illustrates in block diagram form one embodiment of using the computer terminal 10 (or mobile device) illustrated in FIG. 1 described above as a service grid. Fig. 3 is a block diagram of a service grid, as shown in fig. 3, that is primarily used to facilitate secure and reliable communication between a plurality of micro services, which are applications broken down into a plurality of smaller services or instances and run on different clusters/machines, according to an embodiment of the present application.
As shown in fig. 3, the micro-services may include an application service instance a and an application service instance B, which form a functional application layer of the service grid 300. In one embodiment, application service instance A runs in the form of container/process 308 on machine/workload container set 314 (Pod) and application service instance B runs in the form of container/process 310 on machine/workload container set 316 (Pod).
In one embodiment, application service instance A may be the hosting source running the target virtual computing server and application service instance B may be the target hosting source running the target virtual computing server. In response to the type of the target service of the target virtual computing server being the target type, the target virtual computing server may be migrated from application service instance A to application service instance B.
As shown in fig. 3, application service instance a and grid agent (sidecar) 303 coexist in machine workload container set 614 and application service instance B and grid agent 305 coexist in machine workload container 314. Grid agent 303 and grid agent 305 form a data plane layer (data plane) of service grid 300. Wherein the grid agent 303 and the grid agent 305 are running in the form of containers/processes 304, 306, respectively, which may receive requests 312 for goods inquiry services, and which may be in bi-directional communication between the grid agent 303 and the application service instance a, and which may be in bi-directional communication between the grid agent 305 and the application service instance B. In addition, two-way communication is also possible between the grid agent 303 and the grid agent 305.
In one embodiment, application service instance A's traffic is routed through grid agent 303 to the appropriate destination and application service instance B's network traffic is routed through grid agent 305 to the appropriate destination. It should be noted that, the network traffic mentioned herein includes, but is not limited to, hypertext transfer protocol (Hyper Text Transfer Protocol, abbreviated as HTTP), representational state transfer (Representational State Transfer, abbreviated as REST), high-performance, general-purpose open source framework (google Remote Procedure Call, g-RPC), data structure storage system (dis) in open source memory, and the like.
In one embodiment, the functionality of the extended data plane layer may be implemented by writing custom filters (filters) for agents (envoys) in the service grid 300, which may be configured to enable the service grid to properly proxy service traffic for service interworking and service remediation. Grid agent 303 and grid agent 305 may be configured to perform at least one of the following functions: service discovery (service discovery), health checking (Routing), load Balancing (Load Balancing), authentication and authorization (authentication and authorization), and observability (observability).
As shown in fig. 3, the service grid 300 also includes a control plane layer. Wherein the control plane layer may be a set of services running in a dedicated namespace, hosted by the hosting control plane component 301 in the machine/workload container set (machine/Pod) 302. As shown in fig. 3, managed control plane component 301 is in bi-directional communication with grid agent 303 and grid agent 305. Managed control plane component 301 is configured to perform some control management functions. For example, managed control plane component 301 receives telemetry data transmitted by grid agent 303 and grid agent 305, which may be further aggregated. These services, managed control plane component 301 may also provide user-oriented application program interfaces (Application Programming Interface, APIs) to more easily manipulate network behavior, provide configuration data to grid agents 303 and 305, and the like.
In the above-described operating environment, the present application provides a data processing method of a processor as shown in fig. 4. Fig. 4 is a flowchart of a data processing method of a processor according to an embodiment of the present application. As shown in fig. 4, the method may include the steps of:
In step S402, log data generated by the processor during the running process is monitored, where the processor runs on the original host.
In the technical scheme provided in the above step S402 of the present application, log data generated by the processor in the running process is obtained, and the log data generated by the processor in the running process can be monitored. Wherein the processor may be a central processor running on the original host. The original host may be used to run an instance, may be a cloud server, for example, may be a node controller, and the log data may include a logic processing request submitted by a processor in a certain instance on the original host, may be data generated by the processor during the running process, and may also be referred to as a central processing unit log (CPU log).
Step S404, determining a processor core operated by the processor based on the log data.
In the technical solution provided in step S404 of the present application, the monitored log data may be parsed to determine the processor core that the processor operates in the operation process. Wherein a processor core (cpu core) may be located on an interface (socket).
Optionally, the number mode of the processor core in the processor may be obtained by analyzing a register provided by the network, a sequence number corresponding to the processor core may be determined, and the processor core operated by the processor and the sequence number of the processor core may be determined based on log data.
In step S406, a target service provided by a target virtual computing server associated with the running processor core is determined, where the running processor core is configured to respond to a service processing request of the target virtual computing server running by the original host, and the service processing request is configured to request the running processor core to process the target service.
In the technical solution provided in step S406 of the present application, the target service provided by the target virtual computing server associated with the running processor core may be determined based on the binding relationship existing between the target virtual computing server and the running processor core. The target virtual computing server may be an instance, and may be a virtual computing server on a cloud server, where the target virtual computing server may include a central processor, an internal memory, an operating system, a network, a disk, and other basic components allocated to the virtual machine. The target service may be a client scenario running on an instance, such as an online service, an offline service, a rendering service, etc., which are given here by way of example only and not limitation. The processor core may be configured to respond to service processing requests from a target virtual server operated by the primary host. The service processing request may be a logic processing request issued by the central processing unit, and may be used to request the running processor core to process the target service.
Alternatively, the running processor core is associated with the target virtual computing server, and the target service provided by the target virtual computing server associated with the processor core may be determined based on an association relationship between the running processor core and the target virtual computing server. When the target virtual computing server sends out a service processing request for processing the target service by the processor core which is requested to run, the processor core responds to the service processing request of the target virtual computing server which is run by the original host machine, and processes the target service.
For example, distributed snapshot data of the instance on the running processor core may be obtained, and the target virtual computing server associated with the running processor core and the target service provided by the target virtual computing server may be determined according to the obtained distributed snapshot data.
In step S408, in response to the type of the target service including the target type, the target virtual computing server is migrated from the original host to the target host for operation, where the target type is determined based on the type of the service provided by the at least one historical virtual computing server, and the at least one historical virtual computing server is down during the historical operation of the processor.
In the technical solution provided in step S408 of the present application, the type of the target service provided by the target virtual computing server is determined, and whether the type of the target service includes the target type is determined. In response to the type of target service comprising the target type, the target virtual computing server may be migrated from the original host to run on the target host. The types of the target service may include an online service type, an offline service type, a rendering service type, and the like, which are only examples herein, and the types of the target service are not particularly limited. The target type may be determined based on a type of service provided by the at least one historical virtual computing server, may be an online service type, an offline service type, a rendering service type, and the like. The at least one historical virtual computing server may be a server that causes the processor to crash during historical operation.
Optionally, at least one historical virtual computing server in which the processor is down during the historical operation may be determined, and a type of service provided by the at least one historical virtual computing server may be determined as the target type. Determining whether a type of a target service provided by the target virtual computing server includes a target type of service, and in response to the type of the target service including the target type, migrating the target virtual computing server from an original host to run on the target host.
Optionally, if there are multiple target services, the target computing server may be migrated from the original host to run on the target host as long as there are target types in the types of target services, so as to achieve the purpose of avoiding downtime of the processor core.
In this embodiment, in order to avoid that the processor is down during the running process, at least one historical virtual computing server in which the processor is down during the historical running process may be determined, and a type of a service provided by the at least one historical virtual computing server may be determined as a target type, so that a type of a service in which the processor is down easily during the running process of the processor core may be determined. While the processor is running, log data generated by the processor during the running process may be monitored, and a processor core on which the processor is running is determined based on the log data. Judging whether the type of the target service processed by the processor core comprises the target type of service, if so, determining that the processor core is likely to be down, and migrating the target computing server from the original host to the target host for operation, thereby avoiding the down of the processor core.
Through the steps S402 to S408 in the present application, log data generated by the processor in the running process is monitored, where the processor runs on the original host; determining a processor core for the processor to run based on the log data; determining a target service provided by a target virtual computing server associated with an operating processor core, wherein the operating processor core is used for responding to a service processing request of the target virtual computing server operated by an original host machine, and the service processing request is used for requesting the operating processor core to process the target service; and in response to the type of the target service comprising a target type, migrating the target virtual computing server from the original host to the target host for operation, wherein the target type is determined based on the type of the service provided by at least one historical virtual computing server, and the at least one historical virtual computing server is down in the historical operation process of the processor. That is, in the embodiment of the present application, the processor core operated by the processor is determined based on the monitored log data, once the type of the target service provided by the target virtual computing server (for example, the client instance) bound by the operated processor core is found to include the target type, the target virtual computing server is immediately migrated from the original host to the target host, thereby realizing the technical effect of effectively avoiding the downtime of the host, and solving the technical problem that the downtime of the host cannot be effectively avoided.
The above-described method of this embodiment is further described below.
As an alternative embodiment, the virtual computing server that provides the target type of service makes the probability of the original host downtime higher than the probability threshold, and makes the probability of the target host downtime lower than the probability threshold.
In this embodiment, when the virtual computing server provides the target type of service, the probability of downtime of the original host is higher than the probability threshold due to downtime of the processor cores associated with the virtual computing server. The processor cores associated with the virtual computing server are down, and the probability of the target host being down is lower than a probability threshold. The probability threshold may be a preset value.
Optionally, when the virtual computing server running in the original host runs the target type of service, the processor core of the virtual computing server is easily down, thereby resulting in the situation that the original host is down. However, when the service of the target type is operated in the target host, the situation that the processor core of the virtual computing server is down is not easy to happen, so that when the type of the target service is the target type, the virtual computing server is migrated from the original host to the target host to operate, and the aim of effectively avoiding the host down can be achieved.
As an optional implementation, in response to the type of the target service including the target type, step S408, migrating the target virtual computing server from the original host to the target host for running includes: in response to the type of target service including the target type, the disabled processor core responds to the service processing request and migrates the target virtual compute server from the original host to be executed on the target host to respond to the service processing request by the target host.
In this embodiment, it is determined whether the type of the target service running on the processor core includes a target type, and in response to the type of the target service including the target type, the running processor core may be prohibited from responding to the service processing request, and at the same time, the target virtual computing server may be migrated from the original host to the target host for running, and the target host may respond to the service processing request, thereby achieving the purpose of effectively avoiding downtime of the host.
Alternatively, log data generated by the processor during operation may be obtained while the processor is running. Determining a processor core operated by the processor based on log data, determining a target service provided by a target virtual server associated with the processor core, determining whether the type of the target service provided by the target virtual server associated with the operated processor core contains a target type, and if the type of the target service provided by the target virtual server associated with the operated processor core comprises the target type, determining that the target service processed by the processor core operated at the moment easily causes the processor core to be down, thereby causing the original host to be down. Therefore, in order to avoid the downtime of the processor kernel, the running processor kernel can be forbidden to respond to the service processing request, so that the downtime of the processor kernel is effectively avoided, and meanwhile, the target virtual computing server can be migrated from the original host to the target host to run, so that the target host responds to the service processing request, and the purpose that the target service can continue to run is achieved.
As an alternative embodiment, the method further comprises: determining at least one historical processor core in which the processor is down in the historical operation process; at least one history virtual compute server associated with the history processor core is determined, wherein the history processor core does not successfully respond to a history service handling request of the history virtual compute server, the history service handling request being for requesting the history processor core to handle a service provided by the history virtual compute server.
In this embodiment, log data may be obtained, at least one historical processor core in the log data for causing a downtime of the processor during historical operation is determined, and at least one historical virtual compute server associated with the historical processor core is determined. The history processor core does not successfully respond to the history service processing request of the history virtual computing server, and the history service processing request is used for requesting the history processor core to process the service provided by the history virtual computing server.
Alternatively, the processor is down mainly due to the service processing request not being responded to. Therefore, log data of the processor can be acquired, the log data is analyzed, and the historical processor cores which do not successfully respond to the historical service processing request of the historical virtual computing server are determined, so that at least one historical processor core which causes the processor to be down in the historical operation process is determined.
For example, a history processor core that does not successfully respond to a history service processing request of a history virtual computing server may be determined, so as to achieve the purpose of locating at least one processor core that causes a processor to be down in a history running process, and by an association relationship between the processor core and the virtual computing server, at least one history virtual computing server associated with the history processor core may be determined.
As an optional implementation manner, clustering the types of the services provided by the historical virtual computing server to obtain a clustering result; and determining the target type based on the clustering result.
In this embodiment, the types of servers provided by the historical virtual computing server may be clustered to obtain a clustering result, and a target type that easily causes downtime of the processor may be determined based on the clustering result. The clustering result may be a classification result obtained by classifying the type of at least one service, and may be used to analyze commonality of the service in some dimensions.
Optionally, determining at least one historical processor core for causing a processor to crash during historical operation; the at least one historical virtual computing server associated with the historical processor kernel is determined, the type of at least one service which is provided by the at least one historical virtual computing server and is easy to cause the downtime of the processor can be classified, a classification result is obtained, the commonality among the types of the at least one service which is easy to cause the downtime of the processor is determined, and therefore the target type which is easy to cause the downtime of the processor is determined.
For example, log data that causes the processor to downtime in a historical time period may be obtained, the log data may be analyzed to obtain a type of at least one service that causes the processor to downtime, the type of at least one service may be clustered, and commonalities between the types of at least one service may be analyzed to determine a target type that easily causes the processor to downtime. In the clustering process, noise brought by the high-quality client can be removed by adjusting the calculation proportion, so that the accuracy of the clustering result is improved.
As an alternative embodiment, determining the target type based on the clustering result includes: portraying the clustering result to obtain portrayal data, wherein the portrayal data are used for representing a virtual computing server providing a service corresponding to the clustering result, so that the probability of downtime of a processor operated by an original host is higher than a probability threshold; acquiring a verification result of the portrait data; and determining the clustering result corresponding to the portrait data as the target type in response to the verification result that the accuracy of the portrait data is higher than an accuracy threshold.
In this embodiment, the clustering result may be portrait to obtain portrait data, the portrait data may be verified to obtain a verification result of the portrait data, whether the verification result is that the accuracy of the portrait data is higher than an accuracy threshold is determined, and in response to the verification result being that the accuracy of the portrait data is higher than the accuracy threshold, the clustering result corresponding to the portrait data may be determined as the target type. The representation data may be client-side representation data of the virtual computing server, for example, a label of the virtual computing server, which is given here by way of example only, and the representation form of the representation data is not particularly limited. The representation data may be used to represent virtual compute servers that provide the services of the clustering results such that the probability of downtime of the processor operated by the original host is above a probability threshold.
For example, based on the clustering result, the virtual computing server determining that the portrait data is the service of the tag 1 may be used to indicate that the probability of occurrence of downtime is higher than the probability threshold in the process of running the virtual computing server in the original host, and the virtual computing server determining that the portrait data is the service of the tag 0 may be used to indicate that the probability of occurrence of downtime is lower than the probability threshold in the process of running the virtual computing server in the original host.
Optionally, at least one service with the probability of downtime of the processor operated by the original host machine higher than the probability threshold may be obtained, the type of at least one service may be clustered to obtain a clustering result, the clustering result may be portrait to obtain portrait data, and the portrait data may be verified by a front-line worker to obtain a verification result of the portrait data, so that the accuracy of the portrait data may be determined based on the verification result. If the verification result is that the accuracy of the image data is higher than the accuracy threshold, the clustering result corresponding to the image data can be determined as the target type.
As an alternative embodiment, determining at least one historical processor core that caused a processor to crash during historical operation includes: acquiring historical log data generated by a processor in a historical operation process; finding abnormal log data in the history log data; a historical processor core for generating exception log data is determined.
In this embodiment, the history log data generated by the processor during the history running may be acquired, the exception log data may be found in the history log data, and the history processor core for generating the exception log data may be determined from the exception log data.
For example, historical log data generated by a processor during historical execution may be automatically acquired at regular time, exception log data may be found from the historical log data, and a historical processor core for generating the exception log data may be determined based on the exception log data.
As an alternative embodiment, determining a historical processor core for generating exception log data includes: determining processor kernel identification associated with the abnormal log data; the processor core represented by the processor core identification is determined to be a historical processor core.
In this embodiment, the processor core identification associated with the exception log data may be determined and the processor core represented by the processor core identification may be determined to be a historical processor core. The processor core identifier may be a processor core number (cpu core number), and may be used to determine a location of the processor core in the processor.
In the embodiment of the application, the processor cores related to the abnormal log data determined after downtime diagnosis can be combined, and the processor cores represented by the processor core identifiers can be determined as historical processor cores, so that the purpose of automatizing the processor cores with the occurrence of the output downtime is achieved, and the period of manually positioning by teams such as coordination (Automatic Identification System, AIS for short) and virtualization in the past is greatly shortened.
As an alternative embodiment, determining at least one historical virtual compute server associated with a historical processor core includes: obtaining snapshot data, wherein the snapshot data is used for representing the association relationship between a history virtual computing server and a history processor core; at least one historical virtual compute server associated with the historical processor cores is determined based on the snapshot data.
In this embodiment, snapshot data of the historical virtual compute may be obtained, which may be used to represent an association between the historical virtual compute servers and the historical processor cores, such that at least one historical virtual compute server associated with the historical processor cores may be determined based on the snapshot data.
Optionally, snapshot data of the history virtual computing server before downtime can be obtained, and because the relation between the history virtual computing server and the history processor kernel is bound, the position of the history virtual computing server causing the abnormality of the processor kernel can be located based on the snapshot data.
As an alternative embodiment, the method further comprises: and determining the candidate host as the target host in response to the virtual computing server providing the target type of service such that the probability of downtime of a processor operated by the candidate host is below a probability threshold.
In this embodiment, in determining that the probability of occurrence of downtime is lower than the probability threshold in running the virtual calculator provided with the target type of service in the candidate host, the candidate host may be determined as the target host. The candidate host may be a relatively stable host, and may be other hosts except the original host.
Alternatively, a target host machine with low downtime probability of running a virtual computing server provided with a target type of service may be selected from a plurality of candidate host machines, and the target virtual computing server may be migrated from an original host machine to the target host machine for running.
In this embodiment, when it is determined that a service processed by a processor core in a virtual computing server on an original host is a service of a target type, the processor core may be prohibited from processing the service, and a target host with a probability of downtime of a running processor lower than a threshold probability is selected from candidate hosts, and the target virtual computing server is migrated from the original host to the target host for running.
As an alternative implementation, in response to the type of the target service including the target type, migrating the target virtual computing server from the original host to run on the target host includes: and in response to the type of the target service comprising the target type and the influence degree of the target virtual computing server influenced by the downtime of the original host being greater than the influence degree threshold, migrating the target virtual computing server from the original host to the target host for operation.
In this embodiment, when the type of the target service includes the target type, in response to the type of the target service including the target type, it is determined that an influence degree of the target virtual computing service influenced by downtime of the original host is greater than an influence degree threshold, the target virtual computing server may be migrated from the original host to run on the target host. The influence degree threshold may be a threshold set as needed.
Optionally, it may be determined whether the client is a highly sensitive client to downtime, if the client is a highly sensitive client that is highly sensitive to downtime, it may be determined that a target virtual computing server of the client is greatly affected by downtime of an original host, and is greater than an impact threshold, and in response to the type of the target service including the target type and the impact of the target virtual computing server being affected by the original host being greater than the impact threshold, the target virtual computing server may be migrated from the original host to operate on the target host.
In the embodiment of the application, when the influence degree of the target virtual computing server influenced by the downtime of the original host is greater than the influence degree threshold, it may be determined that the virtual computing server is a high-sensitivity client instance. The technical effect of effectively avoiding host downtime can be achieved by performing hot migration (i.e., migration of the target virtual computing server from the original host to the target host) on the high-sensitivity client so as to avoid downtime risk of the high-sensitivity client.
Optionally, the anti-affinity policy may be specified according to the virtual computing server of the high-sensitivity client, so as to achieve the purpose that when the risk is found, the target virtual computing server may be migrated from the original host to the target host in time.
As an alternative embodiment, a processor core running on a processor on the target host is used to respond to service processing requests by the target virtual compute server.
In this embodiment, a processor core running on a processor on the target host may be used to respond to service requests by the target virtual computing server.
Alternatively, after migrating the target virtual computing server from the original host to the target host for execution, the target virtual computing server issues a service processing request, and a processor core running on a processor on the target host may respond to the service processor request.
In this embodiment, the processor core operated by the processor is determined based on the monitored log data, and once the type of the target service provided by the target virtual computing server (for example, the client instance) bound by the processor core is found to include the target type (may be the service type), the target virtual computing server is immediately migrated from the original host to the target host, so that the technical effect of effectively avoiding the downtime of the host is achieved, and the technical problem that the downtime of the host cannot be effectively avoided is solved.
The embodiment of the application also provides another data processing method of the processor. Fig. 5 is a flowchart of another method of data processing of a processor according to an embodiment of the present application, as shown in fig. 5, the method may include the following steps.
Step S502, determining at least one historical virtual computing server which is down in the historical operation process of the processor, wherein the processor is operated on an original host.
In the technical scheme provided in the above step S502 of the present application, log data of a processor may be obtained, and day master data of the processor may be analyzed to determine at least one historical virtual computing server that is down in the historical operation process of the processor. Wherein the processor may be a processor running on an original host.
Optionally, the processor is run on the original host, and at least one historical virtual computing server for causing downtime of the processor during the historical running is determined.
Step S504, determining the type of service provided by the historical virtual computing server.
In the technical solution provided in the above step S504 of the present application, a type of a service provided by each of the at least one historical virtual computing server is determined.
In step S506, a target type is determined based on the type of the service, so that when the type of the target service provided by the target virtual computing server associated with the processor core running on the processor includes the target type, the target virtual computing server is migrated from the original host to the target host for running.
In the technical solution provided in step S506 of the present application, the service type may be processed, the service type may be mined, and the service of the target type that may easily cause the downtime of the processor of the original host may be determined. When the type of the target service provided by the target virtual computing server associated with the processor core operated by the processor comprises a target type, the target virtual computing server can be migrated from the original host to the target host for operation. Wherein the target type is the same as the type of the target service. The target service may be provided by a target virtual computing server. The target virtual computing server may be migrated from the original host to the target host for execution.
Optionally, at least one historical virtual computing server with the processor down can be determined in the historical operation process, the type of the service provided by the at least one historical virtual computing server is determined, and the target type which is easy to cause the down of the original host is determined by analyzing the type of the at least one service. When the type of the target service provided by the target virtual computing server is the same as the target type, the target virtual computing server can be migrated from the original host to the target host for operation, so that the aim of effectively avoiding downtime of the host is achieved.
Determining at least one historical virtual computing server which is down in the historical running process of a processor through the steps S502 to S506, wherein the processor runs on an original host; determining the type of service provided by the historical virtual computing server; the method comprises the steps that the target type is determined based on the type of the service, and when the type of the target service provided by the target virtual computing server associated with the processor core operated by the processor comprises the target type, the target virtual computing server is migrated from an original host to the target host to operate, so that the technical effect of effectively avoiding the downtime of the host is achieved, and the technical problem that the downtime of the host cannot be effectively avoided is solved.
Example 2
There is further provided, in accordance with an embodiment of the present application, an embodiment of a data processing system of a processor, fig. 6 is a schematic diagram of a data processing system of a processor according to an embodiment of the present application, and as shown in fig. 6, a data processing system 600 of a processor may include: processor 601, processor core 602, target virtual compute server 603, and controller 604.
A processor 601 for generating log data during operation, wherein the processor is running on an original host.
In this embodiment, the processor 601 may be a central processor running on an original host machine, which may be used to generate log data during the running process. The log data may be a central processing unit log.
The processor core 602 is determined based on log data.
In this embodiment, the processor core 602 may be determined based on log data, and an association relationship may exist between the processor core and the virtual compute server.
Alternatively, the location of the processor core may be quickly determined by computing instructions.
The target virtual computing server 603 is associated with a running processor core, where the running processor core is configured to respond to a service processing request of the target virtual computing server running by the original host, and the service processing request is configured to request the running processor core to process the target service.
In this embodiment, the target virtual computing server 603, which may also be referred to as an instance, may run on a host machine, may include a processor and a processor core, and may be used to provide target services.
Optionally, the target virtual computing server provides a target service, and the processor kernel processes the target service provided by the target virtual computing server in response to a service processing request of the target virtual computing server operated by the original host machine.
And a controller 604, configured to control the migration of the target virtual computing server from the original host to the target host for operation in response to the type of the target service including a target type, where the target type is determined based on the type of the at least one service provided by the at least one historical virtual computing server, and the at least one historical virtual computing server is down during the historical operation of the processor.
In this embodiment, when the service type of the target service provided by the target virtual computing server includes the target type, it may be determined that the target service of the target virtual computing server is a service that is easy to cause downtime of the original host, and in order to avoid downtime of the original host, the controller may control the migration of the target virtual computing server from the original host to the target host to operate in response to the type of the target service being the target type, so as to achieve the technical effect of effectively avoiding downtime of the host.
In this embodiment, a data processing system for a processor is provided. Generating, by a processor, log data during operation, wherein the processor operates on an original host; providing a target service by associating the target virtual computing server with an operating processor core, wherein the operating processor core is used for responding to a service processing request of the target virtual computing server operated by the original host machine, and the service processing request is used for requesting the operating processor core to process the target service; and controlling the target virtual computing server to migrate from the original host to the target host for operation by the controller in response to the type of the target service including the target type, wherein the target type is determined based on the type of the service provided by at least one historical virtual computing server, and the at least one historical virtual computing server is down in the historical operation process of the processor, so that the technical effect of effectively avoiding the down of the host is realized, and the technical problem that the down of the host cannot be effectively avoided is solved.
Example 3
The running process of the CPU includes storing the command and data in the memory, and the controller reads the command and data from the memory based on the clock signal after the program is started. By interpreting and executing these instructions, the operator will operate on the data and the controller will control the computer based on the result of this operation.
Currently, a node controller may be down due to conditions such as CPU reasons, memory reasons, motherboard reasons, power reasons, field gate programmable arrays (Field Programmable Gate Array, abbreviated as FPGA), disks, and networks. In the stability work management process of the high-sensitivity client (which can be a client highly sensitive to downtime), the downtime caused by the CPU is the most, and the occupation ratio is generally more than 30%.
Therefore, to reduce the downtime of the high-sensitivity client, reducing the downtime caused by the CPU is a difficult problem to overcome, and reducing the downtime caused by the CPU has an important role.
In general, the downtime caused by the CPU is caused by the fact that the computing instruction cannot be responded due to various reasons, and may be caused by the fact that the core (core) of the central processing unit cannot respond due to a logic processing request submitted by an instance on the NC. That is, the downtime caused by the CPU may be sudden death of the CPU, and the reason for the sudden death may be that an instruction which cannot be processed is encountered in the logic processing process, so that the kernel reports an error, thereby causing the CPU to fail to operate normally. Because no abnormal characteristics appear before downtime, the technical problem that the host machine is not effectively avoided.
The positioning is caused by CPU downtime caused by the self service of the high-sensitivity client or caused by the instance of other clients on the NC, and the positioning is combined with the service realization scene of the client to seek breakthrough.
In order to solve the above problem, in the embodiment of the present application, capturing abnormal features, for example, capturing too many features of isolating a host machine fault memory page, etc., thereby implementing adjustment and positioning of deep causes of the CPU downtime. When the host machine where the high-sensitivity client instance is located is down, further determining whether the reason of the down is the CPU down caused by the service type of the high-sensitivity client or the result of the instance of other clients on the NC. That is, by combining with the working scene of the client, the effect of effectively avoiding the downtime of the host is realized.
In the embodiment of the application, a method for reducing the downtime caused by the CPU of a specific user group is provided, the method is used for rapidly positioning whether the position of the CPU downtime is on a core or a non-core (uncor), if the CPU downtime is on the core, rapidly determining what core is on an interface, determining which examples run on the core of the downtime before the CPU downtime is rapidly positioned, analyzing a node controller of which the CPU downtime occurs, determining whether the examples run on the node controller have commonalities in certain dimensions, if the commonalities exist, the method can be linked with scheduling and operation and maintenance capability, and corresponding operation and maintenance strategies are formulated, so that the stability of the examples of a high-sensitivity client is ensured, the technical effect of effectively avoiding the downtime of the host is further realized, and the technical problem that the downtime of the host cannot be effectively avoided is solved.
The method is further described below.
Fig. 7 is a schematic diagram of a cause of downtime by a CPU according to an embodiment of the present application, where the cause of downtime may occur on a kernel or on a non-kernel as shown in fig. 7. If downtime occurs on uncore, it may occur in the L3 cache (L3 cache), interface, and Cache (CHA). Only for the scenes where the downtime occurs on the memory. If the downtime occurs on the kernel, step S701 may be executed to analyze the downtime caused by the CPU cause.
In order to reduce downtime caused by CPU reasons of specific user groups, the embodiment of the application further analyzes downtime caused by the CPU reasons. Fig. 8 is a flowchart of analyzing a cause of a CPU to cause downtime, and as shown in fig. 8, a method for reducing the cause of a CPU to cause downtime for a specific user group may include the following steps when downtime occurs on a kernel according to an embodiment of the present application.
Step S801, a log of the central processing unit is acquired.
In this embodiment, log data of the central processing unit may be acquired, and the acquired log may be parsed.
Step S802, determining the position of the core where downtime occurs based on the log of the central processing unit.
In this embodiment, the log of the central processor is parsed. Through calculation instructions, when the downtime caused by the CPU causes occurs on the cores, the number of the cores on which the downtime occurs can be positioned, so that the number (core number) of the cores on which the downtime occurs is determined.
Alternatively, fig. 9 is a schematic diagram of a kernel number according to an embodiment of the present application, where, as shown in fig. 9, the numbers of the internal interfaces and kernels of the central processing unit may be obtained by parsing registers provided by a network (intel).
Step S803, determining a client instance on the kernel where the downtime occurs.
In the embodiment, the distributed snapshot data of the instance before downtime on the central processor core can be obtained, and the client instance causing the abnormality of the central processor core can be determined based on the binding relationship between the instance and the central processor core by analyzing the distributed snapshot data on the central processor core.
In the embodiment, the positions of the cores of the central processing unit where the downtime occurs are automatically produced by combining the capabilities of downtime diagnosis, snapshot data and the like, so that the period of manually positioning teams needing to coordinate an automatic identification system, virtualization and the like is greatly shortened.
Step S804, the abnormal client instance is analyzed.
In this embodiment, the noise caused by the high-quality client may be removed by adjusting the calculation ratio, and then the services running on the abnormal client instance may be classified and categorized, so as to analyze the commonality between the services.
Alternatively, the services in the instance may be portrayed, and it is determined whether the services of the client are online services, offline services, rendering services, etc., so as to mine out a specific type of service that is prone to downtime.
In this embodiment, after portraying the running service, the accuracy of the portrayal can be verified with the front-end staff.
In the embodiment of the application, the method is not limited to static dimensions such as CPU algebra, instance specification, machine type, virtualized version, memory batch, available area and the like, and the method is provided that the service types of the CPU downtime and the client are required to be combined, the method goes deep into the CPU and positions from the deep cause of the CPU downtime, so that the purpose of accurately analyzing the client instance is achieved.
In step S805, resource isolation is performed on the client instance.
In the embodiment, once a certain type of instance is found, the probability of downtime of the client instance is higher, and the thermo migration can be immediately adopted for the high-sensitivity client instance, so that the purpose of carrying out resource isolation on the client instance is achieved, and the effect of avoiding the downtime risk of the host is achieved.
Optionally, links such as front line, scheduling, operation and maintenance can be coordinated, and an instance of a service type with a higher probability of downtime of a specific product is operated and maintained, and an instance of a service type with a higher probability of downtime of a specific product is migrated to other relatively stable products for operation.
In the embodiment, the feedback result of the method can be obtained, the method is optimized and improved based on the feedback result, and the inventory, operation and maintenance team is coordinated to make an anti-affinity strategy for the type of examples and the high-sensitivity client examples, so that the aim of effectively avoiding the downtime of the host is achieved, and the technical problem that the downtime of the host cannot be effectively avoided is solved.
In the embodiment of the application, the processor core operated by the processor is determined based on the monitored log data, once the target service of the target virtual computing server (for example, a client instance) bound by the processor core is found to be the same as the target type, the target virtual computing server is immediately migrated from the original host to the target host, so that the technical effect of effectively avoiding the downtime of the host is realized, and the technical problem that the downtime of the host cannot be effectively avoided is solved.
Example 4
According to an embodiment of the present application, there is also provided a data processing apparatus of a processor for implementing the data processing method of a processor shown in fig. 4.
Fig. 10 is a schematic diagram of a data processing apparatus of a processor according to an embodiment of the present application, and as shown in fig. 10, a data processing apparatus 1000 of the processor may include: a monitoring unit 1002, a first determining unit 1004, a second determining unit 1006, and a migration unit 1008.
And a monitoring unit 1002, configured to monitor log data generated by the processor during the running process, where the processor runs on the original host.
A first determining unit 1004 is configured to determine a processor core that the processor operates on the basis of the log data.
A second determining unit 1006, configured to determine a target service provided by a target virtual computing server associated with a running processor core, where the running processor core is configured to respond to a service processing request of the target virtual computing server running by the original host, and the service processing request is configured to request the running processor core to process the target service.
And the migration unit 1008 is configured to migrate the target virtual computing server from the original host to the target host for running in response to the type of the target service including a target type, where the target type is determined based on a type of the service provided by at least one historical virtual computing server, and the at least one historical virtual computing server is down during historical running of the processor.
Here, it should be noted that the monitoring unit 1002, the first determining unit 1004, the second determining unit 1006, and the migration unit 1008 correspond to steps S402 to S408 in embodiment 1, and the four units are the same as the examples and application scenarios implemented by the corresponding steps, but are not limited to those disclosed in embodiment 1. It should be noted that the above-mentioned units may be hardware components or software components stored in a memory (for example, the memory 104) and processed by one or more processors (for example, the processors 102a,102b … …,102 n), or the above-mentioned units may be executed as a part of the apparatus in the computer terminal a provided in embodiment 1.
According to an embodiment of the present application, there is also provided a data processing apparatus of a processor for implementing the data processing method of a processor shown in fig. 5.
Fig. 11 is a schematic diagram of a data processing apparatus of another processor according to an embodiment of the present application, and as shown in fig. 11, a data processing apparatus 1100 of the processor may include: a third determination unit 1102, a fourth determination unit 1104, and a fifth determination unit 1106.
A third determining unit 1102 is configured to determine at least one historical virtual computing server that is down during a historical running process of the processor, where the processor runs on an original host.
A fourth determining unit 1104 for determining the type of service provided by the history virtual computing server.
A fifth determining unit 1106 is configured to determine a target type based on the type of the service, so as to migrate the target virtual computing server from the original host to the target host for running when the type of the target service provided by the target virtual computing server associated with the processor core running on the processor includes the target type.
Here, it should be noted that the third determination unit 1102, the fourth determination unit 1104, and the fifth determination unit 1106 described above correspond to steps S502 to S506 in embodiment 1, and the three units are the same as the examples and application scenarios realized by the corresponding steps, but are not limited to those disclosed in embodiment 1 described above. It should be noted that the above-mentioned units may be hardware components or software components stored in a memory (for example, the memory 104) and processed by one or more processors (for example, the processors 102a,102b … …,102 n), or the above-mentioned units may be executed as a part of the apparatus in the computer terminal a provided in embodiment 1.
In the data processing device of the processor, the processor core operated by the processor is determined based on the monitored log data, once the type of the target service provided by the target virtual computing server (such as a client instance) bound by the processor core is found to be the same as the target type, the target virtual computing server is immediately migrated from the original host to the target host, so that the technical effect of effectively avoiding the downtime of the host is realized, and the technical problem that the downtime of the host cannot be effectively avoided is solved.
Example 5
Embodiments of the present application may provide a computer terminal, which may be any one of a group of computer terminals. Alternatively, in the present embodiment, the above-described computer terminal may be replaced with a terminal device such as a mobile terminal.
Alternatively, in this embodiment, the above-mentioned computer terminal may be located in at least one network device among a plurality of network devices of the computer network.
In this embodiment, the computer terminal may execute the program code of the following steps in the data processing method of the processor: monitoring log data generated by a processor in the running process, wherein the processor runs on an original host; determining a processor core for the processor to run based on the log data; determining a target service provided by a target virtual computing server associated with an operating processor core, wherein the operating processor core is used for responding to a service processing request of the target virtual computing server operated by an original host machine, and the service processing request is used for requesting the operating processor core to process the target service; and in response to the type of the target service comprising the target type, migrating the target virtual computing server from the original host to the target host for operation, wherein the target type is based on that at least one historical virtual computing server is down in the historical operation process of the processor.
Alternatively, fig. 12 is a block diagram of a computer terminal according to an embodiment of the present application. As shown in fig. 12, the computer terminal a may include: one or more (only one is shown) processors 1202, memory 1204, and transmission 1206.
The memory may be used to store software programs and modules, such as program instructions/modules corresponding to the data processing method and apparatus of the processor in the embodiments of the present application, and the processor executes the software programs and modules stored in the memory, thereby executing various functional applications and data processing, that is, implementing the data processing method of the processor. The memory may include high-speed random access memory, and may also include non-volatile memory, such as one or more magnetic storage devices, flash memory, or other non-volatile solid-state memory. In some examples, the memory may further comprise memory remotely located from the processor, the remote memory being connectable to the computer terminal a through a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.
The processor may call the information and the application program stored in the memory through the transmission device to perform the following steps: monitoring log data generated by a processor in the running process, wherein the processor runs on an original host; determining a processor core for the processor to run based on the log data; determining a target service provided by a target virtual computing server associated with an operating processor core, wherein the operating processor core is used for responding to a service processing request of the target virtual computing server operated by an original host machine, and the service processing request is used for requesting the operating processor core to process the target service; and in response to the type of the target service comprising a target type, migrating the target virtual computing server from the original host to the target host for operation, wherein the target type is determined based on the type of the service provided by at least one historical virtual computing server, and the at least one historical virtual computing server is down in the historical operation process of the processor.
Optionally, the above processor may further execute program code for: and providing the virtual computing server of the target type of service, so that the probability of downtime of the original host is higher than a probability threshold value, and the probability of downtime of the target host is lower than the probability threshold value.
Optionally, the above processor may further execute program code for: in response to the type of target service including the target type, the disabled processor core responds to the service processing request and migrates the target virtual compute server from the original host to be executed on the target host to respond to the service processing request by the target host.
Optionally, the above processor may further execute program code for: determining at least one historical processor core in which the processor is down in the historical operation process; at least one history virtual compute server associated with the history processor core is determined, wherein the history processor core does not successfully respond to a history service handling request of the history virtual compute server, the history service handling request being for requesting the history processor core to handle a service provided by the history virtual compute server.
Optionally, the above processor may further execute program code for: clustering types of services provided by the historical virtual computing server to obtain a clustering result; and determining the target type based on the clustering result.
Optionally, the above processor may further execute program code for: portraying the clustering result to obtain portrayal data, wherein the portrayal data are used for representing a virtual computing server providing a service corresponding to the clustering result, so that the probability of downtime of a processor operated by an original host is higher than a probability threshold; acquiring a verification result of the portrait data; and determining the clustering result corresponding to the portrait data as the target type in response to the verification result that the accuracy of the portrait data is higher than an accuracy threshold.
Optionally, the above processor may further execute program code for: acquiring historical log data generated by a processor in a historical operation process; finding abnormal log data in the history log data; a historical processor core for generating exception log data is determined.
Optionally, the above processor may further execute program code for: determining processor kernel identification associated with the abnormal log data; the processor core represented by the processor core identification is determined to be a historical processor core.
Optionally, the above processor may further execute program code for: obtaining snapshot data, wherein the snapshot data is used for representing the association relationship between a history virtual computing server and a history processor core; at least one historical virtual compute server associated with the historical processor cores is determined based on the snapshot data.
Optionally, the above processor may further execute program code for: and determining the candidate host as the target host in response to the virtual computing server providing the target type of service such that the probability of downtime of a processor operated by the candidate host is below a probability threshold.
Optionally, the above processor may further execute program code for: and in response to the type of the target service comprising the target type and the influence degree of the target virtual computing server influenced by the downtime of the original host being greater than the influence degree threshold, migrating the target virtual computing server from the original host to the target host for operation.
Optionally, the above processor may further execute program code for: the processor core run by the processor on the target host is configured to respond to service processing requests by the target virtual computing server.
The processor may call the information and the application program stored in the memory through the transmission device to perform the following steps: determining at least one historical virtual computing server which is down in the historical operation process of the processor, wherein the processor is operated on an original host; determining the type of service provided by the historical virtual computing server; the method comprises the steps of determining a target type based on the type of the service, and migrating the target virtual computing server from an original host to the target host to operate when the type of the target service provided by the target virtual computing server associated with a processor core operated by the processor comprises the target type.
By adopting the embodiment of the application, a data processing method of a processor is provided. And determining a processor core operated by the processor based on the monitored log data, and once a target virtual computing server (such as a client instance) bound by the processor core is found to comprise an instance of a target type (which can be a work type), immediately migrating the target virtual computing server from an original host to a target host, thereby realizing the technical effect of effectively avoiding the downtime of the host and solving the technical problem that the downtime of the host cannot be effectively avoided.
It will be appreciated by those skilled in the art that the structure shown in fig. 12 is only illustrative, and the computer terminal a may be a terminal device such as a smart phone (e.g. an Android phone, an iOS phone, etc.), a tablet computer, a palm computer, a mobile internet device (Mobile Internet Devices, MID), a PAD, etc. Fig. 12 does not limit the structure of the computer terminal a. For example, the computer terminal a may also include more or fewer components (such as a network interface, a display device, etc.) than shown in fig. 12, or have a different configuration than shown in fig. 12.
Those of ordinary skill in the art will appreciate that all or part of the steps in the various methods of the above embodiments may be implemented by a program for instructing a terminal device to execute in association with hardware, the program may be stored in a computer readable storage medium, and the storage medium may include: flash disk, read-Only Memory (ROM), random-access Memory (Random Access Memory, RAM), magnetic or optical disk, and the like.
Example 6
Embodiments of the present application also provide a computer-readable storage medium. Alternatively, in this embodiment, the computer-readable storage medium may be used to store program code executed by the authentication method for data provided in the first embodiment.
Alternatively, in this embodiment, the above-mentioned computer-readable storage medium may be located in any one of the computer terminals in the computer terminal group in the computer network, or in any one of the mobile terminals in the mobile terminal group.
Optionally, in the present embodiment, the computer readable storage medium is configured to store program code for performing the steps of: monitoring log data generated by a processor in the running process, wherein the processor runs on an original host; determining a processor core for the processor to run based on the log data; determining a target service provided by a target virtual computing server associated with an operating processor core, wherein the operating processor core is used for responding to a service processing request of the target virtual computing server operated by an original host machine, and the service processing request is used for requesting the operating processor core to process the target service; and in response to the type of the target service comprising the target type, migrating the target virtual computing server from the original host to the target host for operation, wherein the target type is based on that at least one historical virtual computing server is down in the historical operation process of the processor.
Optionally, the above computer readable storage medium may further execute program code for: and providing the virtual computing server of the target type of service, so that the probability of downtime of the original host is higher than a probability threshold value, and the probability of downtime of the target host is lower than the probability threshold value.
Optionally, the above computer readable storage medium may further execute program code for: in response to the type of target service including the target type, the disabled processor core responds to the service processing request and migrates the target virtual compute server from the original host to be executed on the target host to respond to the service processing request by the target host.
Optionally, the above computer readable storage medium may further execute program code for: determining at least one historical processor core in which the processor is down in the historical operation process; at least one history virtual compute server associated with the history processor core is determined, wherein the history processor core does not successfully respond to a history service handling request of the history virtual compute server, the history service handling request being for requesting the history processor core to handle a service provided by the history virtual compute server.
Optionally, the above computer readable storage medium may further execute program code for: clustering types of services provided by the historical virtual computing server to obtain a clustering result; and determining the target type based on the clustering result.
Optionally, the above computer readable storage medium may further execute program code for: portraying the clustering result to obtain portrayal data, wherein the portrayal data are used for representing a virtual computing server providing a service corresponding to the clustering result, so that the probability of downtime of a processor operated by an original host is higher than a probability threshold; acquiring a verification result of the portrait data; and determining the clustering result corresponding to the portrait data as the target type in response to the verification result that the accuracy of the portrait data is higher than an accuracy threshold.
Optionally, the above computer readable storage medium may further execute program code for: acquiring historical log data generated by a processor in a historical operation process; finding abnormal log data in the history log data; a historical processor core for generating exception log data is determined.
Optionally, the above computer readable storage medium may further execute program code for: determining processor kernel identification associated with the abnormal log data; the processor core represented by the processor core identification is determined to be a historical processor core.
Optionally, the above computer readable storage medium may further execute program code for: obtaining snapshot data, wherein the snapshot data is used for representing the association relationship between a history virtual computing server and a history processor core; at least one historical virtual compute server associated with the historical processor cores is determined based on the snapshot data.
Optionally, the above computer readable storage medium may further execute program code for: and determining the candidate host as the target host in response to the virtual computing server providing the target type of service such that the probability of downtime of a processor operated by the candidate host is below a probability threshold.
Optionally, the above computer readable storage medium may further execute program code for: and in response to the type of the target service comprising the target type and the influence degree of the target virtual computing server influenced by the downtime of the original host being greater than the influence degree threshold, migrating the target virtual computing server from the original host to the target host for operation.
Optionally, the above computer readable storage medium may further execute program code for: the processor core run by the processor on the target host is configured to respond to service processing requests by the target virtual computing server.
As an alternative example, the computer readable storage medium is arranged to store program code for performing the steps of: determining at least one historical virtual computing server which is down in the historical operation process of the processor, wherein the processor is operated on an original host; determining the type of service provided by the historical virtual computing server; the method comprises the steps of determining a target type based on the type of the service, and migrating the target virtual computing server from an original host to the target host to operate when the type of the target service provided by the target virtual computing server associated with a processor core operated by the processor comprises the target type.
The foregoing embodiment numbers of the present application are merely for describing, and do not represent advantages or disadvantages of the embodiments.
In the foregoing embodiments of the present application, the descriptions of the embodiments are emphasized, and for a portion of this disclosure that is not described in detail in this embodiment, reference is made to the related descriptions of other embodiments.
In the several embodiments provided in the present application, it should be understood that the disclosed technology content may be implemented in other manners. The above-described embodiments of the apparatus are merely exemplary, and are merely a logical functional division, and there may be other manners of dividing the apparatus in actual implementation, for example, multiple units or components may be combined or integrated into another system, or some features may be omitted, or not performed. Alternatively, the coupling or direct coupling or communication connection shown or discussed with each other may be through some interfaces, units or modules, or may be in electrical or other forms.
The units described as separate units may or may not be physically separate, and units shown as units may or may not be physical units, may be located in one place, or may be distributed over a plurality of network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
In addition, each functional unit in each embodiment of the present application may be integrated in one processing unit, or each unit may exist alone physically, or two or more units may be integrated in one unit. The integrated units may be implemented in hardware or in software functional units.
The integrated units, if implemented in the form of software functional units and sold or used as stand-alone products, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present application may be embodied in essence or a part contributing to the prior art or all or part of the technical solution, in the form of a software product stored in a storage medium, including several instructions to cause a computer device (which may be a personal computer, a server or a network device, etc.) to perform all or part of the steps of the methods of the embodiments of the present application. And the aforementioned storage medium includes: a U-disk, a Read-Only Memory (ROM), a random access Memory (RAM, random Access Memory), a removable hard disk, a magnetic disk, or an optical disk, or other various media capable of storing program codes.
The foregoing is merely a preferred embodiment of the present application and it should be noted that modifications and adaptations to those skilled in the art may be made without departing from the principles of the present application and are intended to be comprehended within the scope of the present application.

Claims (13)

1. A method of data processing for a processor, comprising:
monitoring log data generated by a processor in the running process, wherein the processor runs on an original host;
determining a processor core operated by the processor based on the log data;
determining a target service provided by a target virtual computing server associated with the running processor core, wherein the running processor core is used for responding to a service processing request of the target virtual computing server running by the original host, and the service processing request is used for requesting the running processor core to process the target service;
and in response to the type of the target service comprising a target type, migrating the target virtual computing server from the original host to the target host for operation, wherein the target type is determined based on the type of the service provided by at least one historical virtual computing server, and the at least one historical virtual computing server is down in the historical operation process of the processor.
2. The method of claim 1, wherein a virtual computing server providing the target type of service is such that the probability of downtime of the original host is above a probability threshold, such that the probability of downtime of the target host is below the probability threshold.
3. The method of claim 1, wherein, in response to the type of target service comprising a target type, migrating the target virtual computing server from the original host to run on a target host comprises:
and in response to the type of the target service including the target type, prohibiting the running processor core from responding to the service processing request, and migrating the target virtual computing server from the original host to a target host for running, so that the target host responds to the service processing request.
4. The method according to claim 1, wherein the method further comprises:
determining at least one historical processor core of the processor which is down in the historical operation process;
and determining the at least one historical virtual computing server associated with the historical processor core, wherein the historical processor core does not successfully respond to a historical service processing request of the historical virtual computing server, and the historical service processing request is used for requesting the historical processor core to process services provided by the historical virtual computing server.
5. The method according to claim 4, wherein the method further comprises:
clustering the types of the services provided by the historical virtual computing server to obtain a clustering result;
and determining the target type based on the clustering result.
6. The method of claim 5, wherein determining the target type based on the clustering result comprises:
portraying the clustering result to obtain portrayal data, wherein the portrayal data are used for representing a virtual computing server for providing services corresponding to the clustering result, so that the probability of downtime of the processor operated by the original host is higher than a probability threshold;
acquiring a verification result of the portrait data;
and determining the clustering result corresponding to the portrait data as the target type in response to the verification result that the accuracy of the portrait data is higher than an accuracy threshold.
7. The method of claim 4, wherein determining at least one historical processor core that caused the processor to crash during historical operation comprises:
acquiring historical log data generated by the processor in the historical operation process;
Finding abnormal log data in the history log data;
determining a processor core for generating the exception log data as the historical processor core.
8. The method of claim 4, wherein determining at least one historical virtual compute server associated with the historical processor core comprises:
obtaining snapshot data, wherein the snapshot data is used for representing the association relationship between the historical virtual computing server and the historical processor core;
at least one of the historical virtual compute servers associated with the historical processor cores is determined based on the snapshot data.
9. The method according to claim 1, wherein the method further comprises:
and responding to the virtual computing server providing the target type of service, enabling the probability of downtime of a processor operated by a candidate host to be lower than a probability threshold, and determining the candidate host as the target host.
10. The method of any of claims 1 to 9, wherein, in response to the type of target service comprising a target type, migrating the target virtual computing server from the original host to run on a target host, comprises:
And in response to the type of the target service comprising the target type, and the influence degree of the target virtual computing server influenced by the downtime of the original host is greater than an influence degree threshold, migrating the target virtual computing server from the original host to the target host for operation.
11. A method of data processing for a processor, comprising:
determining at least one historical virtual computing server which is down in the historical operation process of a processor, wherein the processor is operated on an original host;
determining the type of service provided by the historical virtual computing server;
and determining a target type based on the type of the service, so as to migrate the target virtual computing server from the original host to the target host for operation when the type of the target service provided by the target virtual computing server associated with the processor core operated by the processor comprises the target type.
12. A data processing system for a processor, comprising:
a processor for generating log data during operation, wherein the processor is operating on an original host;
A processor core to determine based on the log data;
the target virtual computing server is associated with the running processor core and is used for providing target services, wherein the running processor core is used for responding to a service processing request of the target virtual computing server running by the original host, and the service processing request is used for requesting the running processor core to process the target services;
and the controller is used for responding to the type of the target service and comprising a target type, and controlling the target virtual computing server to migrate from the original host to the target host for operation, wherein the target type is determined based on the type of the service provided by at least one historical virtual computing server, and the at least one historical virtual computing server is down in the historical operation process of the processor.
13. An electronic device, comprising:
a memory storing an executable program;
a processor for executing the program, wherein the program when run performs the method of any of claims 1 to 11.
CN202310345613.8A 2023-03-31 2023-03-31 Data processing method and system of processor and electronic equipment Pending CN116467106A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310345613.8A CN116467106A (en) 2023-03-31 2023-03-31 Data processing method and system of processor and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310345613.8A CN116467106A (en) 2023-03-31 2023-03-31 Data processing method and system of processor and electronic equipment

Publications (1)

Publication Number Publication Date
CN116467106A true CN116467106A (en) 2023-07-21

Family

ID=87178232

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310345613.8A Pending CN116467106A (en) 2023-03-31 2023-03-31 Data processing method and system of processor and electronic equipment

Country Status (1)

Country Link
CN (1) CN116467106A (en)

Similar Documents

Publication Publication Date Title
CN106489251B (en) The methods, devices and systems of applied topology relationship discovery
CN109154849B (en) Super fusion system comprising a core layer, a user interface and a service layer provided with container-based user space
US11416342B2 (en) Automatically configuring boot sequence of container systems for disaster recovery
US11429442B2 (en) Parallel and distributed computing using multiple virtual machines
US10474488B2 (en) Configuration of a cluster of hosts in virtualized computing environments
US10013491B2 (en) Methods and systems of workload mobility across divergent platforms
US11093296B2 (en) System, virtualization control apparatus, method for controlling a virtualization control apparatus, and program
US20150120887A1 (en) Deploying a cluster
US20200034178A1 (en) Virtualization agnostic orchestration in a virtual computing system
US11924117B2 (en) Automated local scaling of compute instances
US9535754B1 (en) Dynamic provisioning of computing resources
US8793688B1 (en) Systems and methods for double hulled virtualization operations
CN112948063B (en) Cloud platform creation method and device, cloud platform and cloud platform implementation system
CN104335180A (en) Real time measurement of virtualization I/O processing delays
KR101680702B1 (en) System for web hosting based cloud service
Kjorveziroski et al. Kubernetes distributions for the edge: serverless performance evaluation
US9529656B2 (en) Computer recovery method, computer system, and storage medium
CN114691286A (en) Server system, virtual machine creation method and device
CN106874214B (en) Cloud hard disk resource recovery method and related device
US10360614B1 (en) Assessing and rating deployments of resources
CN112235300B (en) Cloud virtual network vulnerability detection method, system, device and electronic equipment
US20210182165A1 (en) Distributed application resource determination based on performance metrics
US11546224B2 (en) Virtual network layer for distributed systems
CN116467106A (en) Data processing method and system of processor and electronic equipment
JP4877608B2 (en) Virtual machine server, virtual machine server information storage method, and virtual machine server information storage program

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination