WO2013051142A1 - 更新制御装置、更新制御プログラム、および更新制御方法 - Google Patents
更新制御装置、更新制御プログラム、および更新制御方法 Download PDFInfo
- Publication number
- WO2013051142A1 WO2013051142A1 PCT/JP2011/073139 JP2011073139W WO2013051142A1 WO 2013051142 A1 WO2013051142 A1 WO 2013051142A1 JP 2011073139 W JP2011073139 W JP 2011073139W WO 2013051142 A1 WO2013051142 A1 WO 2013051142A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- update
- devices
- workflow
- component
- server device
- Prior art date
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/28—Databases characterised by their database models, e.g. relational or object models
- G06F16/284—Relational databases
- G06F16/285—Clustering or classification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/30—Monitoring
- G06F11/3003—Monitoring arrangements specially adapted to the computing system or computing system component being monitored
- G06F11/3006—Monitoring arrangements specially adapted to the computing system or computing system component being monitored where the computing system is distributed, e.g. networked systems, clusters, multiprocessor systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/30—Monitoring
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/30—Monitoring
- G06F11/3051—Monitoring arrangements for monitoring the configuration of the computing system or of the computing system component, e.g. monitoring the presence of processing resources, peripherals, I/O links, software programs
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2201/00—Indexing scheme relating to error detection, to error correction, and to monitoring
- G06F2201/815—Virtual
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/60—Software deployment
- G06F8/65—Updates
Definitions
- the present invention relates to an update control device, an update control program, and an update control method.
- a system is operated by a large number of physical servers, or a virtual machine (Virtual Machine) is operated on the physical server and the system is operated by a virtual machine.
- a virtual machine Virtual Machine
- Such a large-scale system is configured by a number of components such as hardware of each server and various software operating on the server.
- a correction program may be applied to all Apache versions 2.4.x running on each server.
- the adequacy of such a component change is confirmed and determined, for example, by a Change Advisory Board (CAB).
- CAB Change Advisory Board
- changes to physical servers, virtual machines, software, etc. that are allowed to be executed are applied in a semi-automated manner in which modification programs such as batch processing and setting changes are executed in a series of flows. .
- the reason for applying changes in a semi-automated manner is that applying changes manually is inefficient in terms of time and cost.
- CMDB Configuration Management Database
- An object of one aspect is to provide an update control device, an update control program, and an update control method that can improve the reliability of system change work.
- the update control device includes an acquisition unit that acquires component information indicating each component of the plurality of devices.
- the update control device calculates the similarity of the component information of each of the plurality of devices acquired by the acquisition unit, and classifies the plurality of devices into one or a plurality of device groups based on the calculated similarity.
- the update control device includes an update processing unit that executes a process of updating a system by applying a common program update method to devices classified into the same device group by the classification unit.
- FIG. 1 is a diagram illustrating an overall configuration of a system including an update control apparatus.
- FIG. 2 is a diagram illustrating an example of a functional configuration of a system according to the second embodiment.
- FIG. 3 is a diagram illustrating an example of the configuration of each server device.
- FIG. 4 is a diagram illustrating an example of the data configuration of the first table.
- FIG. 5 is a diagram illustrating a correspondence relationship between information on the components of the server device and each item of the first table.
- FIG. 6 is a diagram illustrating an example of a data configuration of the second table.
- FIG. 7 is a diagram illustrating an example of the data configuration of the third table.
- FIG. 8 is a diagram schematically showing an example of a workflow flow to which the correction program shown in FIG. 7 is applied.
- FIG. 8 is a diagram schematically showing an example of a workflow flow to which the correction program shown in FIG. 7 is applied.
- FIG. 9 is a diagram illustrating an example of a data configuration of the fourth table.
- FIG. 10 is a diagram illustrating an example of a data configuration of the fifth table.
- FIG. 11 is a diagram illustrating an example of a result of calculating I / H as a value indicating an exception degree of each piece of information of the component illustrated in FIG.
- FIG. 12 is a diagram illustrating an example of a result of discriminating information on the constituent elements of the first table illustrated in FIG. 4 into a majority group and a minority group.
- FIG. 13 is a diagram illustrating an example of a result of classifying the server device into a tree structure according to the type of the constituent element made minor and the number of the constituent elements made minor.
- FIG. 14 is a diagram schematically showing the flow of an exception workflow.
- FIG. 14 is a diagram schematically showing the flow of an exception workflow.
- FIG. 15 is a diagram schematically illustrating the workflow executed for each VMM and the processing order of the workflow.
- FIG. 16 is a flowchart showing the procedure of the update control process.
- FIG. 17 is a flowchart showing the procedure of the discrimination process.
- FIG. 18 is a flowchart showing the procedure of the specifying process.
- FIG. 19 is a flowchart showing the procedure of the setting process.
- FIG. 20 is a flowchart illustrating a procedure of system update processing.
- FIG. 21 is a diagram illustrating an example of a result of classifying the server device into a tree structure according to the type of the constituent element made minor and the added value of the exception degree.
- FIG. 21 is a diagram schematically illustrating the workflow executed for each VMM and the processing order of the workflow.
- FIG. 16 is a flowchart showing the procedure of the update control process.
- FIG. 17 is a flowchart showing the procedure of the discrimination process.
- FIG. 18 is a flowchart showing the
- FIG. 22 is a diagram illustrating an example of a separation condition and a definition of a workflow to be executed when each server device is classified into three categories according to the added value of the exception degree.
- FIG. 23 is a diagram illustrating an example of a result of classifying the server device into a tree structure according to the type of the constituent element made minor and the added value of the exception degree.
- FIG. 24 is a diagram schematically showing the flow of system update.
- FIG. 25 is a diagram schematically illustrating an example of a workflow flow to which the correction program is applied.
- FIG. 26 is a diagram schematically showing the flow of an exception workflow created from FIG.
- FIG. 27 is a diagram illustrating a computer that executes an update control program.
- FIG. 1 is a diagram illustrating an overall configuration of a system including an update control apparatus.
- the update control device 10 is a physical server that controls processing for updating the system, and is, for example, a data server or a management server computer provided in each company.
- the update control device 10 can communicate with each device 12 to be changed by the system via the network 11.
- Examples of the device 12 include network devices such as a server device, a storage device, and a router.
- the network 11 there is an arbitrary communication network such as the Internet (Internet), a LAN (Local Area Network), a VPN (Virtual Private Network), or the like regardless of wired or wireless.
- the update control device 10 includes an acquisition unit 13, a classification unit 14, and an update processing unit 15.
- the acquisition unit 13 acquires component information indicating each component of the plurality of devices 12. For example, the acquisition unit 13 acquires information regarding a predetermined component from the plurality of devices 12. For example, the acquisition unit 13 requests the transmission control unit 10 to transmit information on the component to each device 12 and receives information on the component from each device 12 to acquire information on the predetermined component. May be. In addition, the acquisition unit 13 may acquire the information by causing each device 12 to transmit information related to the component to the update control device 10 at every predetermined timing, and the update control device 10 may receive the information related to the component. As an example of the information regarding the component to be acquired, information indicating the hardware of the device 12, information indicating the software operating on the device 12, information on the version of the software, and the like can be given. The information on the component to be acquired is preferably information on a component that may be a restriction on the system change.
- the classification unit 14 classifies the devices 12 into one or a plurality of device groups. For example, the classification unit 14 calculates the similarity of the information regarding each component of the plurality of devices 12 acquired by the acquisition unit 13, and based on the calculated similarity, the plurality of devices 12 are grouped into one or a plurality of device groups. Classify into: As an example, the classification unit 14 compares information on the components of each device 12 and identifies a small number of set information. Then, the classifying unit 14 classifies the device 12 having a small number of pieces of information set in the constituent elements as the device 12 that is exceptionally set and classifies the device 12 into a device group.
- the update processing unit 15 performs a process of updating the system by applying a common program update method to the devices classified into the same device group by the classification unit. For example, the update processing unit 15 executes a process of updating the system by changing the control between the device 12 with the exceptional setting specified by the classification unit 14 and the other device 12 among the devices 12. As an example, the update processing unit 15 performs a system change on another device 12 by a semi-automated method such as by batch processing. In addition, when there are a plurality of other devices 12, for example, after the system change is executed by any one of the devices 12 by a semi-automated method and it is confirmed that no abnormality occurs in the system change, the remaining other devices 12 System changes may be performed continuously on the device 12. As a result, with respect to the other devices 12 in which exceptional settings are not made for the constituent elements, the system can be changed while reducing the time and work of the administrator.
- the update processing unit 15 compares the system of the other device 12 with the update processing for the device 12 that has been set exceptionally, and executes the system change while frequently checking the state of the system. .
- the update processing unit 15 has a predetermined possibility that an abnormality may occur when the system is updated in the update process of the system, such as application of a correction program or restart.
- the update processing unit 15 performs a system change by adding a predetermined process such as log output or backup of a state before the system update in the update process of the system. That is, the system 12 is updated while the administrator confirms the state of the system for the device 12 that has been set exceptionally. Thereby, since the system is carefully changed for the device 12 that has been set exceptionally, the reliability of the system change work can be improved.
- the acquisition unit 13, the classification unit 14, and the update processing unit 15 are separately provided, but may be configured by one device, for example.
- An example of the device is an electronic circuit such as a CPU (Central Processing Unit) or MPU (Micro Processing Unit).
- An integrated circuit such as ASIC (Application Specific Integrated Circuit) or FPGA (Field Programmable Gate Array) can also be adopted as the device.
- the update control device 10 acquires component element information indicating each component of the plurality of devices 12. Further, the update control device 10 calculates the similarity of the component information of each of the acquired plurality of devices 12, and classifies the plurality of devices 12 into one or a plurality of device groups based on the calculated similarity. In addition, the update control device 10 executes a process of updating the system by applying a common program update method to devices classified in the same device group. Thereby, according to the update control apparatus 10, even if the administrator does not grasp all the restrictions regarding the system change, the apparatus 12 in which an exception is set in the component that is likely to fail in the system change. The system can be updated by changing the control. As described above, according to the update control device 10, the system 12 is changed by carefully controlling the system 12 by changing the control of the system update process for the device 12 in which the component is exceptionally set. Work reliability can be increased.
- Example 2 will be described.
- a system 20 in which a VM (Virtual Machine) 32 operates on a plurality of server devices 30 and the system change of each server device 30 is controlled by the management server 40 will be described.
- FIG. 2 is a diagram illustrating an example of a functional configuration of a system according to the second embodiment.
- the system 20 includes a plurality of server devices 30 and a management server 40.
- Each server device 30 and the management server 40 are communicably connected via the network 21.
- any communication network such as the Internet, a LAN, and a VPN can be used regardless of wired or wireless.
- the server device 30 operates the VM 32 and operates each system on the VM 32.
- the management server 40 manages each server device 30 and controls the system change of each server device 30.
- three server devices 30 are illustrated, but the number of server devices 30 may be any. In the present embodiment, a case will be described as an example in which the number of server devices 30 is 16 of the server devices 30a to 30p.
- FIG. 3 is a diagram illustrating an example of the configuration of each server device.
- the server devices 30a to 30p operate one or a plurality of VMs 32 on a VMM (Virtual Machine Monitor) 32 and operate various applications 33 on the VM 32, and the various applications 33 are used by the tenant 34.
- the tenant 34 is, for example, a general user such as a user or a trader, or an administrator of the system 20.
- the VMM 31 is virtualization software that virtually realizes the operating environment of the computer system, and controls the VM 32 to operate. Further, the VMM 31 performs control to update the system in accordance with the system update instruction received from the management server 40. Further, the VMM 31 performs migration of the VM 32 with another server device 30 in accordance with the migration instruction received from the management server 40.
- the example of FIG. 3 indicates that “Xen” is operating as the VMM 31 in the server apparatuses 30a to 30p.
- “VMM1” to “VMM16” described in each VMM 31 indicate an ID for identifying the VMM 31.
- the numbers written in line with “Xen” of each VMM 31 indicate the version of the virtualization software.
- the example of FIG. 3 shows that Xen whose version is 4.0 is operating as the VMM 31 in the server device 30a.
- the VM 32 is a virtual machine responsible for processing provided to the tenant 34 in the environment provided by the VMM 31.
- the VM 32 executes the processing of the application 33 in the virtual environment.
- FIG. 3 shows that the VM 32 is operating on the VMM 31 of the server apparatuses 30a to 30p.
- the numbers written alongside “CentOS” of each VM 32 indicate the version of the client OS.
- the server device 30a indicates that a client OS with a version of 4.0 and a client OS with a version of 4.5 are operating as the VM 32.
- FIG. 3 shows that Apache or MySQL is operating as the application 33 on the VM 32 of the server devices 30a to 30p.
- the numbers listed alongside “Apache” and “MySQL” of each application 33 indicate the version of the application 33.
- the server device 30a confirms that Apache 2.4 operates as the application 33 on the client OS whose version is 4.0, and that MySQL 4.1 is operating as the application 33 on the client OS whose version is 4.5. Show.
- Apache and MySQL operating on the server device 30a are both used by a general user A.
- the management server 40 includes a communication control I / F unit 41, a storage unit 42, and a control unit 43.
- the communication control I / F unit 41 is an interface that has at least one port and controls communication between each server device 30 and the management server 40.
- the communication control I / F unit 41 transmits / receives various information to / from each server device 30.
- the communication control I / F unit 41 receives information on the components from each server device 30.
- the communication control I / F unit 41 transmits various instructions for controlling system changes to each server device 30.
- the storage unit 42 stores various information.
- the storage unit 42 stores a first table 42a, a second table 42b, a third table 42c, a fourth table 42d, and a fifth table 42e.
- Each data of the first table 42a is registered by the acquisition unit 43a described later.
- each data in the second table 42a to the fifth table 42e is stored in a terminal device such as a client computer that can communicate with the management server 40 by the administrator of the system 20, or a mouse, a keyboard, etc. provided in the management server 40. Registered from the input device.
- the device of the storage unit 42 include a semiconductor memory capable of rewriting data such as a flash memory and NVSRAM (Non Volatile Static Random Access Memory), and a storage device such as a hard disk and an optical disk.
- the first table 42 a is a table for managing information related to the components of each server device 30.
- FIG. 4 is a diagram illustrating an example of the data configuration of the first table. As illustrated in FIG. 4, the first table 42 a includes items of a target ID, a target type, a VM number, a VM type, an application number, an application type, a tenant number, a tenant type, and a tenant owner.
- FIG. 5 is a diagram illustrating a correspondence relationship between information on the components of the server device and each item of the first table.
- the target ID item is an area for storing the ID of the VMM 31 operating on the server device 30.
- the target type item is an area for storing the software name and version of the VMM 31 operating on the server device 30.
- the VM number item is an area for storing the number of VMs 32 operating on the VMM 31.
- the VM type item is an area for storing the client OS name and version of the VM 32 operating on the VMM 31.
- the number of applications item is an area for storing the number of applications 33 operating on the VM 32.
- the application type item is an area for storing the application name and version of the application 33 operating on the VM 32.
- the item of the number of tenants is an area for storing the number of tenants 34 of the VM 32.
- the item of tenant type is an area that stores the type of whether the tenant 34 is a general user or an administrator.
- the item of tenant owner is an area for storing information indicating the tenant 34.
- the server apparatus 30e indicates that the VMM 31 ID is “VMM5” and the VMM 31 is “Xen3.0”. Further, the server device 30e indicates that the number of VMs 32 operating on the VMM 31 is “2”, and the two VMs 32 are “CentOS” versions “4.0” and “4.5”. In addition, the server device 30e indicates that the number of applications 33 operating on the VM 32 is “2”, and that the two applications 33 are “Apache 2.4” and “MySQL 4.1”. The server device 30e indicates that the number of tenants 34 is “1”, the type of the tenant 34 is a general user, and the tenant 34 is “E”.
- the second table 42b is a table for managing registered workflows.
- FIG. 6 is a diagram illustrating an example of a data configuration of the second table. As shown in FIG. 6, the second table 42b has items of workflow ID and content.
- the item of workflow ID is an area for storing identification information for identifying a workflow.
- the content item is an area for storing information indicating the processing content of the workflow.
- the workflow with the workflow ID “WF-01” indicates that the correction program is applied
- the workflow with the workflow ID “WF-02” indicates that the processing content is migration.
- the third table 42c is a table for managing each process of the workflow.
- FIG. 7 is a diagram illustrating an example of the data configuration of the third table. As shown in FIG. 7, the third table 42c has items of operation ID, contents, command definition, success next processing, and failure next processing.
- the operation ID item is an area for storing an ID for identifying each process of the workflow. In the example of FIG. 7, the operation ID is a number obtained by adding “-branch number” to the workflow ID of the workflow.
- the content item is an area for storing information indicating the processing content of each process of the workflow.
- the command definition item is an area for storing a command for executing each process of the workflow.
- the item of next processing upon success is an area for storing an operation ID to be processed next when the processing is successful.
- the item of next processing upon failure is an area for storing an operation ID to be processed next when the processing fails.
- FIG. 7 shows an example of each process of the workflow whose workflow ID is “WF-01” in FIG.
- the workflow shown in FIG. 7 shows the flow of each process for applying the correction program.
- the record with the operation ID “WF-01-1” is a start process that is executed first when the workflow is executed, and the next process is “WF-01-2”. It shows that.
- the record with the operation ID “WF-01-2” executes a command “ssh XXXX” to log in to the server device 30 that changes the system, and the next process is “WF-01-3”. It shows that.
- the command “XXXX” is changed according to the change target.
- the record with the operation ID “WF-01-3” indicates that the VM 32 is backed up by executing the command “vm-snapshot” and the next processing is “WF-01-4”.
- execute the “patch YYY” command to apply the correction program, and when the process is successful, the next process is “WF-01-5” This indicates that the next process when the process fails is “WF-01-8”.
- the command “YYY” is changed according to the correction program to be applied.
- the record with the operation ID “WF-01-5” indicates that the next process is “WF-01-6” by executing the “shutdown -r” command to restart the server device 30. .
- the operation of the server device 30 is checked by executing the command “http: // xxx...”. "01-7”, indicating that the next process is "WF-01-8" in the case of an abnormality.
- the command “xxx...” Is changed according to the contents of the operation confirmation.
- the record with the operation ID “WF-01-7” indicates that the next process is “WF-01-10” by executing a command “exit” to log out from the server device 30.
- the record with the operation ID “WF-01-8” executes the process of executing the command “vm-revert” to return to the backed up VM 32, and indicates that the next process is “WF-01-9”. .
- the record with the operation ID “WF-01-9” executes the command “mail” to notify the administrator that an abnormality has occurred by mail, and the next process is “WF-01-10”. It shows that.
- the record with the operation ID “WF-01-10” indicates the end of the workflow.
- FIG. 8 is a diagram schematically showing an example of a workflow flow to which the correction program shown in FIG. 7 is applied.
- the operation ID corresponding to each process shown in FIG. 7 is attached to each process of the workflow.
- the workflow for applying the correction program is “start”, “login”, “backup”, “patch application”, “restart”, “operation check” if the correction program can be normally applied. , “Logout”, and “end” process in this order.
- the workflow for applying the correction program if an abnormality is detected by “patch application” or “operation check”, the process flows in the order of “restore”, “report”, “logout”, and “end”.
- the fourth table 42d is a table for managing workflow execution conditions.
- FIG. 9 is a diagram illustrating an example of a data configuration of the fourth table.
- the fourth table 42d has items of instance ID, start date and time, execution workflow, and execution target definition.
- the item of instance ID is an area for storing the ID of the workflow instance when the workflow is executed.
- the item of the start date / time is an area for storing the start date / time for executing the workflow.
- the execution workflow item is an area for storing the workflow ID of the workflow to be executed.
- the item of the execution target definition is an area for storing a processing target condition for performing the processing of the workflow.
- the workflow with the workflow ID “WF-01” is executed at the date of 2011/4/15 3:00, and the instance ID at the time of execution is “WF_patch_20110415”.
- the workflow with the workflow ID “WF-01” indicates that the application to which the patch is applied is “Apache” and the correction program to be applied is “patch-0.5.1.2”.
- a workflow with a workflow ID “WF-01” indicates that the application target servers are the server devices 30a to 30p.
- the fifth table 42e is a table for managing the control conditions to be changed corresponding to the exception.
- FIG. 10 is a diagram illustrating an example of a data configuration of the fifth table.
- the fifth table 42e has items of an instance ID and a control condition.
- the instance ID item is an area for storing an ID of an instance of a workflow that performs control according to the control condition.
- the control condition item is an area for storing a control condition for a change target that is exceptionally set.
- the workflow with the instance ID “WF_patch — 201110415” indicates that the workflow processing is executed for the change target corresponding to the exception.
- control unit 43 is an electronic circuit such as a CPU having an internal memory, for example, and includes an acquisition unit 43 a, a monitoring unit 43 b, a determination unit 43 c, a classification unit 43 d, and an update processing unit. 43e.
- the acquisition unit 43 a communicates with each server device 30 via the communication control I / F unit 41 and acquires information on the components from each server device 30.
- the acquisition unit 43a stores information on the acquired component in the first table 42a of the storage unit 42.
- the management server 40 requests each server device 30 to transmit information about the component, and the information about the component from each server device 30 is acquired by the acquisition unit 43a. You may acquire by receiving.
- the acquisition unit 43a transmits information on the component from each server device 30, each server device 30 transmits information on the component to the management server 40 at every predetermined timing, and the management server 40 transmits information on the component. You may acquire by receiving.
- the monitoring unit 43b periodically monitors each start date and time stored in the fourth table 42d of the storage unit 42, and determines whether there is a workflow with the start date and time. When there is a workflow determined to be the start date and time, the monitoring unit 43b notifies the determination unit 43c.
- the determination unit 43c reads the processing target condition of the workflow determined by the monitoring unit 43b as the start date and time from the execution target definition item of the fourth table 42d of the storage unit 42.
- the determination unit 43c determines the server device 30 that satisfies the processing target condition from the first table 42a, and reads information regarding the components of each server device 30 that satisfies the processing target condition. For example, when it is determined that the workflow with the workflow ID “WF-01” illustrated in FIG. 9 is the start date and time, the determination unit 43c reads information on the components of the server devices 30a to 30p from the first table 42a.
- the classification unit 43d determines the majority and the minority for each component regarding the information regarding the component of each server device 30 read by the determination unit 43c.
- the discrimination between the majority and minority for each component is performed, for example, by the following method.
- the classification unit 43d calculates a value indicating the degree of exception on the basis of information regarding the components of each server device 30, assuming that the rarer the information, the larger the value.
- the value indicating the degree of exception is calculated, for example, from the information amount I of information about the component and the average information amount H of the component as follows.
- the probability that specific information is set in the component of each server device 30 when the number of samples of information regarding the component is m and the number of targets for which specific information is set in the component is n P is obtained from the following equation (1).
- P n / m (1)
- the information amount I and the average information amount H of specific information are calculated from the following equations (2) and (3).
- the information amount I Xen4.0 in which the VMM 31 is Xen 4.0, the information amount I Xen3.5 in which the VMM 31 is Xen 3.5, and the average information amount H are expressed by the following equations (5) to (7). Calculated.
- the information amount I and the average information amount H are calculated as in the following equations (8) and (9).
- the amount of information I increases as the amount of information related to the constituent elements decreases.
- a value obtained by dividing the information amount I by the average information amount H is obtained as a value indicating the degree of exception.
- the information indicating the information amount I that is equal to or less than the average information amount H has a value that indicates an exception level of 1 or less.
- the value indicating the degree of exception is greater than 1. Therefore, the larger the value indicating the degree of exception, the more rare information can be determined.
- the value of I / H was used as a value indicating the degree of exception, the present invention is not limited to this example, and any calculation method may be used as long as the information is rare.
- FIG. 11 is a diagram illustrating an example of a result of calculating I / H as a value indicating the degree of exception of each piece of information of the component illustrated in FIG.
- the target type, the number of samples m, the number of sample types, the number of targets n, the value of n / m, the information amount I, and the average information amount H are also shown for each piece of information of the constituent elements. .
- the target information is “Xen3.0”, the target type is “Xen”, the number of samples m is “16”, the number of sample types is “3”, and the number of targets n is Indicates “1”.
- the target information is “Xen3.0”
- the value of n / m is “0.06”
- the information amount I is “4.00”
- the average information amount H is “1.20”.
- I / H value is “3.34”.
- the classification unit 43d determines the majority or minority of the information related to the component based on the I / H value. For example, the classification unit 43d determines the majority and the minority using a predetermined threshold. In this embodiment, when the value of I / H is 2.0 or more, it is determined as a minority, and when the value of I / H is smaller than 2.0, it is determined as a majority.
- determines a majority and a minority is not restricted to this illustration, What is necessary is just one or more, and the person using the management server 40 may set it to arbitrary values. In order to discriminate between the majority and the minority, for example, clustering by the k-means method or a decision tree method may be used.
- the example of FIG. 11 shows the result of discriminating the majority when the I / H is smaller than 2.0 and discriminating the minority when the I / H is 2.0 or more.
- the dot information is added to the target information of the information that is set as the majority and the I / H area.
- “Xen3.0” is determined to be a minority
- “Xen3.5” and “Xen4.0” are determined to be a majority
- “VM number 1” and “VM number 4” are determined as minorities
- “VM number 2” is determined as a majority.
- CentOS 3.0” is determined to be a minority
- “CentOS 4.0” and “CentOS 4.5” are determined to be a majority.
- “Application number 1” and “application number 4” are determined to be a minority group, and “application number 2” is determined to be a majority group. “Apache 2.6” is determined to be a minority, and “Apache 2.4” is determined to be a majority.
- “MySQL 5.1” and “VM management” are determined as minorities, and “MySQL 4.1” is determined as a majority.
- “owner number 2” is determined to be a minority group, and “owner number 1” is determined to be a majority group.
- “tenant management” is determined to be a minority group, and “tenant general” is determined to be a majority group. Also, tenants “A” to “N” and “manager” are determined to be majority.
- FIG. 12 is a diagram showing an example of a result of discriminating information on the components of the first table shown in FIG. 4 into majority and minority.
- a dot pattern is added to the component area which is a minority.
- the number of constituent elements made minor is shown as “number of minorities”. For example, since the server device 30 with the VMM 31 IDs “VMM2” and “VMM3” has been determined that Apache 2.4 is a minority, a dot pattern is attached to the application type area, and the number of minorities is “ 1 ”.
- the classification unit 43d counts the number of components that are made minority for each server device 30. Then, the classification unit 43d identifies the server device 30 that has been exceptionally set based on the number of components that have been made minority. For example, the classification unit 43d identifies the VMM 31 that has been exceptionally set using a predetermined threshold. In the present embodiment, the classifying unit 43d identifies the server device 30 having three or more constituent elements as the minority group as the server device 30 that has been exceptionally set. Note that the threshold for determining the VMM 31 that has been set exceptionally is not limited to this example, and a person using the management server 40 may set an arbitrary value.
- FIG. 13 is a diagram illustrating an example of a result of classifying the server device into a tree structure according to the type of the constituent element made minor and the number of the constituent elements made minor.
- FIG. 13 shows the classification result of the server device 30 by the ID of the VMM 31.
- the server device 30 with the VMM 31 IDs “VMM1”, “VMM6”, “VMM7”, “VMM8”, “VMM9”, “VMM14” does not have a minority component. The component which is made minority is classified into the position of “0”.
- the constituent elements that are made minor are both “owner number 2”, and the number of constituent elements that are made minor is 1.
- the server device 30 of “VMM10” has the same number of “owner number 2” as the constituent elements of the “VMM4”, “VMM11”, and “VMM12” groups, , A structure branched from the group “VMM12”.
- the server device 30 whose VMM 31 ID is “VMM13”, “VMM15”, and “VMM16” has three or more constituent elements that are made minority. Server device 30 is identified.
- the update processing unit 43e refers to the execution workflow stored in the fourth table 42d of the storage unit 42, and identifies the instance ID and workflow ID of the workflow determined as the start date and time by the monitoring unit 43b.
- the update processing unit 43e reads out each process of the workflow with the identified workflow ID from the third table 42c of the storage unit 42.
- the update processing unit 43e sets the workflow process read from the third table 42c as the normal workflow process.
- the update processing unit 43 e reads the control condition corresponding to the identified instance ID from the fifth table 42 e of the storage unit 42.
- the update processing unit 43e updates the normal workflow process according to the control conditions read from the fifth table 42e, and creates an exception workflow.
- FIG. 14 is a diagram schematically showing the flow of an exception workflow.
- a confirmation process is added to each process of the workflow shown in FIG.
- the update processing unit 43e determines the processing order of the workflow in ascending order of the number of constituent elements made minor. In this embodiment, when the number of constituent elements made minor is the same, the VMM 31 is executed from the smallest ID, but the processing order condition may be further defined.
- the update processing unit 43e executes normal workflow processing on the VMM 31 of the server device 30 that is not an exceptional setting in the determined processing order, and then the VMM 31 of the server device 30 that is exceptionally set. Exception workflow process is executed.
- FIG. 15 is a diagram schematically showing the workflow executed for each VMM and the processing order of the workflow.
- FIG. 15 shows the server device 30 with the ID of the VMM 31.
- the example of FIG. 15 shows that the workflow with the workflow ID “WF-01” is executed as a normal workflow for the server devices 30 with the IDs “VMM1” to “VMM12” and “VMM14”.
- the normal workflow is executed in order for the server devices 30 with IDs “VMM1”, “VMM6” to “VMM9”, and “VMM14”. Thereafter, the normal workflow is sequentially executed for the VMMs 31 having IDs “VMM5”, “VMM4”, “VMM11”, “VMM12”, “VMM2”, and “VMM3”. Thereafter, the normal workflow indicates that the VMM 31 having the ID “VMM10” is sequentially executed.
- FIG. 15 indicates that an exception workflow updated with the normal workflow process is executed for the VMM 31 having IDs “VMM13”, “VMM15”, and “VMM16”.
- the exceptional workflow is executed with respect to the VMM 31 with the ID “VMM13”, and then executed sequentially with respect to the VMM 31 with the IDs “VMM15” and “VMM16”.
- the normal workflow process is executed on the server apparatus 30 that is not exceptionally set, and the exceptional workflow process is executed on the server apparatus 30 that is exceptionally set to update the system carefully. As a result, the reliability of the system change operation can be improved.
- the update processing unit 43e executes a process of updating the system of each server device 30 in the order from the smallest number of constituent elements made minority, and an abnormality occurs in the update of the system of any one of the server devices 30 Thereafter, the update of the system of the server device 30 is stopped.
- the server device 30 in which the system device is updated later is exceptionally set. . Therefore, when an abnormality occurs in the system update of any of the server devices 30, by canceling the subsequent system update of the server device 30 to the server device 30 that may cause an abnormality in the system update System updates can be prevented.
- FIG. 16 is a flowchart showing the procedure of the update control process. This update control process is executed, for example, at a timing when any of the workflows is determined as the start date / time by the monitoring unit 43b.
- the determination unit 43c reads the processing target condition of the workflow determined to be the start date and time from the fourth table 42d, and relates to the components of the server device 30 that satisfy the processing target condition from the first table 42a. Information is read (step S10).
- the classification unit 43d performs a discrimination process for discriminating between the majority and the minority by comparing each component with respect to the read information regarding the component of each server device 30 (step S11).
- FIG. 17 is a flowchart showing the procedure of the discrimination process.
- the classification unit 43d calculates a value indicating the degree of exception for each piece of information related to the components of each server device 30 (step S20). Then, the classification unit 43d determines the majority and minority of the information for each component based on the calculated value indicating the degree of exception (step S21), and proceeds to step S12 in FIG.
- the classification unit 43d performs a specifying process for specifying the server device 30 that is exceptionally set based on the determination result of the majority or minority of information for each component (step S12).
- FIG. 18 is a flowchart showing the procedure of the specifying process.
- the classification unit 43d counts the number of components that are made minority for each server device 30 (step S30).
- the classification unit 43d identifies the server device 30 in which the number of constituent elements made minor is equal to or greater than a predetermined threshold as the server device 30 that has been exceptionally set (step S31), and proceeds to step S13 in FIG. .
- the update processing unit 43e performs a setting process for setting the workflow execution order and the workflow execution target (step S13).
- FIG. 19 is a flowchart showing the procedure of the setting process.
- the update processing unit 43e reads the workflow process of the workflow ID of the workflow determined to be the start date and time from the third table 42c and sets it as the normal workflow process (step S40).
- the update processing unit 43e reads the control condition corresponding to the instance ID of the workflow determined as the start date and time from the fifth table 42e, updates the normal workflow process according to the control condition, and updates the exception workflow. Is created (step S41).
- the update processing unit 43e assigns an exceptional workflow to the server device 30 that has been set exceptionally, and assigns a normal workflow to the server device 30 that has not been exceptionally set (step S42). .
- the update processing unit 43e determines the processing order of the workflow for each server device 30 in ascending order of the number of constituent elements made minor (step S43), and proceeds to step S14 in FIG.
- the update processing unit 43e performs a system update process for updating the system by executing a workflow process on the VMM 31 of the server device 30 in the determined process order (step S14).
- FIG. 20 is a flowchart illustrating a procedure of system update processing.
- the update processing unit 43e selects the server device 30 that has not been exceptionally set in the determined processing order (step S50).
- the update processing unit 43e performs each process of the assigned normal workflow on the VMM 31 of the selected server device 30 to change the system (step S51).
- the update processing unit 43e determines whether or not the change of the system of the selected server device 30 is successful (step S52).
- Step S52 If the system change has failed (No at Step S52), the administrator is notified that the system change has failed (Step S53), and the process returns to the update control process of FIG.
- the update processing unit 43e determines whether or not the system change of all the server devices 30 that are not exceptionally set is completed (Step S54). .
- the process proceeds to Step S50.
- the update processing unit 43e selects the server device 30 that has been set exceptionally in the determined processing order (Step S55).
- the update processing unit 43e executes each process of the assigned exception workflow on the VMM 31 of the selected server device 30 to change the system (step S56).
- the update processing unit 43e determines whether or not the system change of the selected server device 30 has been successful (step S57). If the system change has failed (No at Step S57), the process proceeds to Step S53, where the administrator is notified that the system change has failed, and the process returns to the update control process of FIG.
- the update processing unit 43e determines whether or not the system change of all the server devices 30 for which exceptional settings have been made is completed (Step S58). When the system change of all the server devices 30 has not been completed (No at Step S58), the process proceeds to Step S55.
- the process returns to the update control process of FIG.
- the management server 40 discriminates between the majority and the minority regarding the information regarding the component of each server device 30 for each component, and the server device in which the number of components set to the minority is equal to or greater than a predetermined threshold value. 30 is identified as the server device 30 in which exceptional settings are made. Therefore, according to the management server 40, the server device 30 having a large number of information on the constituent elements and a large number of exceptional settings can be identified as the server device 30 with exceptional settings.
- the management server 40 executes a process of updating the system in order from the change target with the smallest number of constituent elements made minor. Therefore, according to the management server 40, the system can be updated from the server device 30 that has few exceptional settings and can stably update the system.
- the management server 40 stops the subsequent update of the system to be changed. Therefore, according to the management server 40, there are more exceptional settings than the management server 40 in which an abnormality has occurred, and the system update is performed for the server device 30 that may cause an abnormality in the system update. Can be prevented.
- Example 3 will be described.
- a change target that is exceptionally set is specified based on a value obtained by adding a value indicating an exception level for each component. Since the configuration of the system according to the third embodiment is substantially the same as that of the system according to the second embodiment illustrated in FIG. 2, only different portions will be described.
- the classification unit 43d calculates a value indicating the degree of exception, and determines the majority or minority of the information regarding the component based on the value indicating the degree of exception. Then, the classification unit 43d adds, for each server device 30, a value indicating the degree of exception for each constituent element that is a minority, and based on the added value, the server device 30 that has been exceptionally set is added. Identify. For example, the classification unit 43d identifies the VMM 31 that has been exceptionally set using a predetermined threshold. In the present embodiment, the classifying unit 43d identifies the server device 30 having an exception level addition value of 3 or more for each constituent element as a minority group as the server device 30 that has been set exceptionally. Note that the threshold for determining the VMM 31 that has been set exceptionally is not limited to this example, and a person using the management server 40 may set an arbitrary value.
- FIG. 21 is a diagram showing an example of a result of classifying the server device into a tree structure according to the type of the constituent element made minor and the added value of the exception degree.
- FIG. 21 shows the classification result of the server device 30 with the ID of the VMM 31.
- the server device 30 with the VMM 31 ID “VMM1”, “VMM6”, “VMM7”, “VMM8”, “VMM9”, “VMM14” has no minority component. Therefore, the added value is classified into a position of “0”.
- the constituent elements that are made minority are “owner number 2”, and the I / H value of “owner number 2” is 2.
- the added value is classified into a position between “2” and “3” as the same group.
- the server device 30 of “VMM10” has minority components “owner number 2” and “CentOS 3.0”, and the respective I / H values are 2.47 and 3.34. Since the addition value is 5.81, the addition value is classified into a position between “5” and “6”.
- the server device 30 of “VMM10” has the same number of “owner number 2” as the constituent elements of the “VMM4”, “VMM11”, and “VMM12” groups, “VMM4”, “VMM11” , A structure branched from the group “VMM12”.
- the server apparatus 30 with the VMM 31 ID “VMM10”, “VMM13”, “VMM15”, and “VMM16” has an addition value of 3 or more, and thus the server apparatus 30 in which exceptional settings are made. Identified.
- the update processing unit 43e determines the processing order of the workflow in ascending order of the added value of the exception degree for each component that is a minority. In this embodiment, when the addition values are the same, the VMM 31 is executed from the smallest ID, but the processing order condition may be further defined. The update processing unit 43e executes normal workflow processing on the VMM 31 of the server device 30 that is not an exceptional setting in the determined processing order, and then the VMM 31 of the server device 30 that is exceptionally set. Exception workflow process is executed.
- the update processing unit 43e executes a process of updating the system of each server device 30 in ascending order of the addition value, and when an abnormality occurs in the system update of any of the server devices 30, the subsequent server devices 30 Cancel the system update.
- the management server 40 calculates a value indicating the degree of exception for the information related to the component of each server device 30 for each component.
- the value indicating the degree of exception is larger for rare information.
- the management server 40 identifies a change target in which a value obtained by adding a value indicating the degree of exception for each constituent element selected as a minority is equal to or more than a predetermined threshold as a change target that is set exceptionally. Therefore, according to the management server 40, even if only one piece of information about the component is a minority, it is rare information, and when the I / H value is large, the server device 30 that is exceptionally set Can be identified.
- the management server 40 executes processing for updating the system in order from a change target having a smaller value obtained by adding a value indicating the degree of exception for each component that is a minority.
- the server device 30 is set to be more exceptional as the added value of the degree of exception for each constituent element made minority is larger. Therefore, according to the management server 40, the system can be updated from the server device 30 that has few exceptional settings and can stably update the system.
- the management server 40 stops the subsequent update of the change target system. Therefore, according to the management server 40, there are more exceptional settings than the management server 40 in which an abnormality has occurred, and the system update is performed for the server device 30 that may cause an abnormality in the system update. Can be prevented.
- the server device 30 is classified into two categories, that is, the server device 30 that is not exceptional and the exceptional server device 30 according to the number of components that are made minority or the added value of the exception level.
- each server device 30 may be classified into three or more categories according to the number of constituent elements made minority or the added value of the degree of exception.
- FIG. 22 is a diagram illustrating an example of a separation condition and a definition of a workflow to be executed when each server device is classified into three categories according to the added value of the exception degree. In the example of FIG.
- the server device 30 with the exception degree addition value of less than 3 is classified as being almost safe, and the system is updated in a normal workflow.
- the server device 30 having an exception degree addition value of 3 or more and less than 10 is classified as cautionary and updates the system with a highly reliable workflow to which a visual confirmation process by an administrator is added.
- the server device 30 having an exception degree added value of 10 or more is classified as dangerous, checks with a manager such as a domain expert, and does not update the system.
- FIG. 23 is a diagram illustrating an example of a result of classifying the server device into a tree structure according to the type of the constituent element made minor and the added value of the exception degree.
- FIG. 23 shows the classification result of the server device 30 with the ID of the VMM 31.
- the server device 30 with the VMM 31 IDs “VMM1” to “VMM4”, “VMM6” to “VMM9”, “VMM11”, “VMM12”, and “VMM14” has an addition value of less than 3. Therefore, it is classified as almost safe.
- the server devices 30 with the VMM 31 IDs “VMM5” and “VMM10” have a sum of 3 or more and less than 10, and are therefore classified as caution.
- the server devices 30 with the VMM 31 IDs “VMM13”, “VMM15”, and “VMM16” have a sum of 10 or more and are therefore classified as dangerous.
- FIG. 24 is a diagram schematically showing the flow of system update.
- FIG. 25 is a diagram schematically illustrating an example of a workflow flow to which the correction program is applied.
- the workflow for applying the correction program is “start”, “VM evacuation”, “VMM correction program application”, “VMM restart”, “operation check” when the correction program can be normally applied. , “VM recovery” and “end” are processed in this order.
- the workflow to apply the fix program is processed in the order of “VMM restore”, “VM return”, “report issue”, “end”.
- the workflow shown in FIG. 25 is updated according to the control conditions to create an exception workflow. For example, when the control condition is added to each process, a confirmation process is added to each process of the workflow.
- FIG. 26 is a diagram schematically showing the flow of an exception workflow created from FIG. In the example of FIG. 26, a confirmation process is added to each process of the workflow shown in FIG.
- each component of each illustrated apparatus is functionally conceptual and does not necessarily need to be physically configured as illustrated.
- the specific state of distribution / integration of each device is not limited to the one shown in the figure, and all or a part thereof may be functionally or physically distributed or arbitrarily distributed in arbitrary units according to various loads or usage conditions.
- the acquisition unit 43a, the monitoring unit 43b, the determination unit 43c, the classification unit 43d, and the update processing unit 43e illustrated in FIG. 2 may be appropriately integrated.
- all or any part of each processing function performed in each processing unit can be realized by a CPU and a program analyzed and executed by the CPU, or can be realized as hardware by wired logic. .
- FIG. 27 is a diagram illustrating a computer that executes an update control program.
- the computer 300 includes a CPU (Central Processing Unit) 310, a ROM (Read Only Memory) 320, an HDD (Hard Disk Drive) 330, and a RAM (Random Access Memory) 340. These units 300 to 340 are connected via a bus 400.
- the HDD 330 stores a table having the same function as each of the first table 42a to the fifth table 42e shown in FIG.
- the ROM 320 includes the acquisition unit 13, the classification unit 14, the update processing unit 1 of the first embodiment, or the acquisition unit 43a, the monitoring unit 43b, the determination unit 43c, the classification unit 43d, and the update processing unit 43e of the second and third embodiments.
- An update control program 320a that exhibits the same function is stored in advance. Note that the update control program 320a may be separated as appropriate.
- the CPU 310 reads the update control program 320a from the ROM 320 and executes it, thereby executing the same operations as those of the control units of the first to third embodiments. That is, the update control program 320a includes the acquisition unit 13, the classification unit 14, the update processing unit 15, or the acquisition unit 43a illustrated in the second example, the monitoring unit 43b, and the determination unit 43c. The same operation as that of the classification unit 43d and the update processing unit 43e is executed.
- update control program 320a is not necessarily stored in the HDD 330 from the beginning.
- the program is stored in a “portable physical medium” such as a flexible disk (FD), a CD-ROM, a DVD disk, a magneto-optical disk, or an IC card inserted into the computer 300. Then, the computer 300 may read and execute the program from these.
- a “portable physical medium” such as a flexible disk (FD), a CD-ROM, a DVD disk, a magneto-optical disk, or an IC card
- the program is stored in “another computer (or server)” connected to the computer 300 via a public line, the Internet, a LAN, a WAN, or the like. Then, the computer 300 may read and execute the program from these.
Abstract
Description
P=n/m (1)
例外度合い=I/H (4)
また、上記の実施例で説明した各種の処理は、あらかじめ用意されたプログラムをパーソナルコンピュータやワークステーションなどのコンピュータシステムで実行することによって実現することもできる。そこで、以下では、上記の実施例と同様の機能を有するプログラムを実行するコンピュータシステムの一例を説明する。図27は、更新制御プログラムを実行するコンピュータを示す図である。
12 装置
13 取得部
14 分類部
15 更新処理部
20 システム
30 サーバ装置
31 VMM
32 VM
33 アプリケーション
40 管理サーバ
42 記憶部
43 制御部
43a 取得部
43b 監視部
43c 判別部
43d 分類部
43e 更新処理部
Claims (6)
- 複数の装置のそれぞれの構成要素を示す構成要素情報を取得する取得部と、
前記取得部により取得した前記複数の装置のそれぞれの構成要素情報の類似度を算出し、算出した類似度に基づいて、前記複数の装置を1又は複数の装置群に分類する分類部と、
前記分類部により同じ装置群に分類された装置に対して、共通したプログラムの更新方法を適用してシステムを更新する処理を実行する更新処理部と、
を有することを特徴とする更新制御装置。 - 前記分類部は、構成要素毎に、前記複数の装置の構成要素に関する情報に関して多数派と少数派を判別し、少数派とされた構成要素の数が所定の閾値以上の装置を例外的な設定がされた装置と特定して装置群に分類する
ことを特徴とする請求項1に記載の更新制御装置。 - 前記分類部は、構成要素毎に、前記複数の装置の構成要素に関する情報に関して例外度合いを示す値を算出し、少数派とされた構成要素毎の例外度合いを示す値を加算した値が所定の閾値以上の装置を例外的な設定がされた装置と特定する
ことを特徴とする請求項2に記載の更新制御装置。 - 前記更新処理部は、前記少数派とされた構成要素の数が少ない、または前記構成要素毎の例外度合いを示す値を加算した値が小さい装置から順にシステムを更新する処理を実行し、いずれかの装置のシステムの更新で異常が発生した場合、以降の装置のシステムの更新を中止する
ことを特徴とする請求項2または3に記載の更新制御装置。 - コンピュータに、
複数の装置のそれぞれの構成要素情報の類似度を算出し、算出した類似度に基づいて、前記複数の装置を1又は複数の装置群に分類し、
同じ装置群に分類された装置に対して、共通したプログラムの更新方法を適用してシステムを更新する処理を実行する
各処理を実行させることを特徴とする更新制御プログラム。 - コンピュータが、
複数の装置のそれぞれの構成要素情報の類似度を算出し、算出した類似度に基づいて、前記複数の装置を1又は複数の装置群に分類し、
同じ装置群に分類された装置に対して、共通したプログラムの更新方法を適用してシステムを更新する処理を実行する
各処理を実行することを特徴とする更新制御方法。
Priority Applications (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GB1405924.0A GB2509635A (en) | 2011-10-06 | 2011-10-06 | Update control apparatus, update control program, and update control method |
PCT/JP2011/073139 WO2013051142A1 (ja) | 2011-10-06 | 2011-10-06 | 更新制御装置、更新制御プログラム、および更新制御方法 |
JP2013537359A JP5692401B2 (ja) | 2011-10-06 | 2011-10-06 | 更新制御装置、更新制御プログラム、および更新制御方法 |
US14/245,240 US9477742B2 (en) | 2011-10-06 | 2014-04-04 | Update control device, update control program, and update control method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/JP2011/073139 WO2013051142A1 (ja) | 2011-10-06 | 2011-10-06 | 更新制御装置、更新制御プログラム、および更新制御方法 |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/245,240 Continuation US9477742B2 (en) | 2011-10-06 | 2014-04-04 | Update control device, update control program, and update control method |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2013051142A1 true WO2013051142A1 (ja) | 2013-04-11 |
Family
ID=48043333
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/JP2011/073139 WO2013051142A1 (ja) | 2011-10-06 | 2011-10-06 | 更新制御装置、更新制御プログラム、および更新制御方法 |
Country Status (4)
Country | Link |
---|---|
US (1) | US9477742B2 (ja) |
JP (1) | JP5692401B2 (ja) |
GB (1) | GB2509635A (ja) |
WO (1) | WO2013051142A1 (ja) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2015007842A (ja) * | 2013-06-24 | 2015-01-15 | 富士通株式会社 | ソフトウェア修正パッチ抽出プログラム、ソフトウェア修正パッチ抽出方法および情報処理装置 |
GB2527646A (en) * | 2014-04-24 | 2015-12-30 | Boeing Co | Network revision evaluator |
JP2016035708A (ja) * | 2014-08-04 | 2016-03-17 | インターナショナル・ビジネス・マシーンズ・コーポレーションInternational Business Machines Corporation | ソフトウェアを更新する装置及び方法 |
JP2017507415A (ja) * | 2014-08-13 | 2017-03-16 | 株式会社日立製作所 | クラウド環境におけるitインフラ管理のための方法とその装置 |
Families Citing this family (18)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9960963B2 (en) * | 2013-06-24 | 2018-05-01 | Oracle International Corporation | Dynamic client fail-over during a rolling patch installation based on temporal server conditions |
JP6447054B2 (ja) * | 2014-11-27 | 2019-01-09 | 富士通株式会社 | 情報処理方法、及び情報処理プログラム |
WO2017022022A1 (ja) * | 2015-07-31 | 2017-02-09 | 三菱電機株式会社 | 車両用情報通信システムおよび車両用情報通信方法 |
US10430173B2 (en) * | 2015-10-19 | 2019-10-01 | Harman International Industries, Incorporated | Techniques for updating components of a computer device while enabling components for availability |
US10878079B2 (en) | 2016-05-11 | 2020-12-29 | Oracle International Corporation | Identity cloud service authorization model with dynamic roles and scopes |
US10425386B2 (en) | 2016-05-11 | 2019-09-24 | Oracle International Corporation | Policy enforcement point for a multi-tenant identity and data security management cloud service |
US10341410B2 (en) | 2016-05-11 | 2019-07-02 | Oracle International Corporation | Security tokens for a multi-tenant identity and data security management cloud service |
US10581820B2 (en) | 2016-05-11 | 2020-03-03 | Oracle International Corporation | Key generation and rollover |
US9838377B1 (en) | 2016-05-11 | 2017-12-05 | Oracle International Corporation | Task segregation in a multi-tenant identity and data security management cloud service |
US10585682B2 (en) | 2016-08-05 | 2020-03-10 | Oracle International Corporation | Tenant self-service troubleshooting for a multi-tenant identity and data security management cloud service |
US10735394B2 (en) | 2016-08-05 | 2020-08-04 | Oracle International Corporation | Caching framework for a multi-tenant identity and data security management cloud service |
US10530578B2 (en) * | 2016-08-05 | 2020-01-07 | Oracle International Corporation | Key store service |
US10255061B2 (en) | 2016-08-05 | 2019-04-09 | Oracle International Corporation | Zero down time upgrade for a multi-tenant identity and data security management cloud service |
US10721237B2 (en) | 2016-08-05 | 2020-07-21 | Oracle International Corporation | Hierarchical processing for a virtual directory system for LDAP to SCIM proxy service |
US10516672B2 (en) | 2016-08-05 | 2019-12-24 | Oracle International Corporation | Service discovery for a multi-tenant identity and data security management cloud service |
US10567364B2 (en) | 2016-09-16 | 2020-02-18 | Oracle International Corporation | Preserving LDAP hierarchy in a SCIM directory using special marker groups |
US10791087B2 (en) | 2016-09-16 | 2020-09-29 | Oracle International Corporation | SCIM to LDAP mapping using subtype attributes |
US11169815B2 (en) * | 2018-01-16 | 2021-11-09 | Bby Solutions, Inc. | Method and system for automation tool set for server maintenance actions |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2009059186A (ja) * | 2007-08-31 | 2009-03-19 | Casio Comput Co Ltd | データ管理装置及びプログラム |
WO2010029602A1 (ja) * | 2008-09-12 | 2010-03-18 | 富士通株式会社 | ソフトウェアパッチ適用方法、プログラム及び装置 |
Family Cites Families (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2006119848A (ja) | 2004-10-20 | 2006-05-11 | Fujitsu Ltd | ソフトウェア更新プログラム、ソフトウェア更新装置およびソフトウェア更新方法 |
JP5010472B2 (ja) * | 2005-07-25 | 2012-08-29 | 株式会社テイエルブイ | 保守点検支援装置 |
US8839221B2 (en) * | 2007-09-10 | 2014-09-16 | Moka5, Inc. | Automatic acquisition and installation of software upgrades for collections of virtual machines |
JP5136159B2 (ja) | 2008-03-31 | 2013-02-06 | 富士通株式会社 | 構成情報管理装置、構成情報管理プログラム及び構成情報管理方法 |
US8775578B2 (en) * | 2008-11-28 | 2014-07-08 | Red Hat, Inc. | Providing hardware updates in a software environment |
JP2012069088A (ja) * | 2010-06-25 | 2012-04-05 | Toshiba Corp | 医用情報処理装置及びソフトウェア配信システム |
US8719802B2 (en) * | 2010-09-30 | 2014-05-06 | Nec Laboratories America, Inc. | Interprocedural exception method |
-
2011
- 2011-10-06 GB GB1405924.0A patent/GB2509635A/en not_active Withdrawn
- 2011-10-06 JP JP2013537359A patent/JP5692401B2/ja not_active Expired - Fee Related
- 2011-10-06 WO PCT/JP2011/073139 patent/WO2013051142A1/ja active Application Filing
-
2014
- 2014-04-04 US US14/245,240 patent/US9477742B2/en not_active Expired - Fee Related
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2009059186A (ja) * | 2007-08-31 | 2009-03-19 | Casio Comput Co Ltd | データ管理装置及びプログラム |
WO2010029602A1 (ja) * | 2008-09-12 | 2010-03-18 | 富士通株式会社 | ソフトウェアパッチ適用方法、プログラム及び装置 |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2015007842A (ja) * | 2013-06-24 | 2015-01-15 | 富士通株式会社 | ソフトウェア修正パッチ抽出プログラム、ソフトウェア修正パッチ抽出方法および情報処理装置 |
GB2527646A (en) * | 2014-04-24 | 2015-12-30 | Boeing Co | Network revision evaluator |
GB2527646B (en) * | 2014-04-24 | 2016-10-12 | Boeing Co | Network revision evaluator |
US10374898B2 (en) | 2014-04-24 | 2019-08-06 | The Boeing Company | Network revision evaluator |
JP2016035708A (ja) * | 2014-08-04 | 2016-03-17 | インターナショナル・ビジネス・マシーンズ・コーポレーションInternational Business Machines Corporation | ソフトウェアを更新する装置及び方法 |
US10705819B2 (en) | 2014-08-04 | 2020-07-07 | International Business Machines Corporation | Updating software based on similarities between endpoints |
JP2017507415A (ja) * | 2014-08-13 | 2017-03-16 | 株式会社日立製作所 | クラウド環境におけるitインフラ管理のための方法とその装置 |
Also Published As
Publication number | Publication date |
---|---|
JP5692401B2 (ja) | 2015-04-01 |
US20140222818A1 (en) | 2014-08-07 |
GB201405924D0 (en) | 2014-05-14 |
US9477742B2 (en) | 2016-10-25 |
GB2509635A (en) | 2014-07-09 |
JPWO2013051142A1 (ja) | 2015-03-30 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP5692401B2 (ja) | 更新制御装置、更新制御プログラム、および更新制御方法 | |
US9705923B2 (en) | Method and apparatus for automating security provisioning of workloads | |
US10565096B2 (en) | Generation of test scenarios based on risk analysis | |
US8572607B2 (en) | System and method for performing designated service image processing functions in a service image warehouse | |
US8874954B1 (en) | Compatibility of high availability clusters supporting application failover with shared storage in a virtualization environment without sacrificing on virtualization features | |
US9058265B2 (en) | Automated fault and recovery system | |
CN109522095B (zh) | 云主机异常故障检测恢复系统、方法及云平台 | |
CN104158910B (zh) | 一种云端Web应用自动化部署系统 | |
US8397293B2 (en) | Suspicious node detection and recovery in mapreduce computing | |
US8862941B2 (en) | Methods and apparatus for remediation execution | |
US10885200B2 (en) | Detecting security risks related to a software component | |
US20150293800A1 (en) | Robust hardware fault management system, method and framework for enterprise devices | |
US11483325B2 (en) | Differencing engine for digital forensics | |
JP2008211350A (ja) | 分散ネットワーク環境におけるシステム管理方法、情報処理装置及びプログラム | |
US11126494B2 (en) | Automated, adaptive, and auto-remediating system for production environment | |
US9355005B2 (en) | Detection apparatus and detection method | |
US8990608B1 (en) | Failover of applications between isolated user space instances on a single instance of an operating system | |
US20200364001A1 (en) | Identical workloads clustering in virtualized computing environments for security services | |
JP7207009B2 (ja) | 異常検知装置、異常検知方法および異常検知プログラム | |
US10754753B1 (en) | Performance of virtual machine instances using machine recognition of screenshot images | |
CN109857629B (zh) | 一种扫描检测方法及装置 | |
US20150052164A1 (en) | Associating an application with an application file | |
US20200233734A1 (en) | Wait-and-see candidate identification apparatus, wait-and-see candidate identification method, and computer readable medium | |
US9436523B1 (en) | Holistic non-invasive evaluation of an asynchronous distributed software process | |
US11928499B2 (en) | Intent-based orchestration of independent automations |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 11873649 Country of ref document: EP Kind code of ref document: A1 |
|
ENP | Entry into the national phase |
Ref document number: 2013537359 Country of ref document: JP Kind code of ref document: A |
|
ENP | Entry into the national phase |
Ref document number: 1405924 Country of ref document: GB Kind code of ref document: A Free format text: PCT FILING DATE = 20111006 |
|
WWE | Wipo information: entry into national phase |
Ref document number: 1405924.0 Country of ref document: GB |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 11873649 Country of ref document: EP Kind code of ref document: A1 |