WO2023050667A1 - 一种实现裸金属检查流程的方法、系统、设备和存储介质 - Google Patents

一种实现裸金属检查流程的方法、系统、设备和存储介质 Download PDF

Info

Publication number
WO2023050667A1
WO2023050667A1 PCT/CN2022/074375 CN2022074375W WO2023050667A1 WO 2023050667 A1 WO2023050667 A1 WO 2023050667A1 CN 2022074375 W CN2022074375 W CN 2022074375W WO 2023050667 A1 WO2023050667 A1 WO 2023050667A1
Authority
WO
WIPO (PCT)
Prior art keywords
port
bare metal
inspection
network
openstack
Prior art date
Application number
PCT/CN2022/074375
Other languages
English (en)
French (fr)
Inventor
刘元锋
雷亚帅
Original Assignee
苏州浪潮智能科技有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 苏州浪潮智能科技有限公司 filed Critical 苏州浪潮智能科技有限公司
Priority to US18/281,689 priority Critical patent/US20240155023A1/en
Publication of WO2023050667A1 publication Critical patent/WO2023050667A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/06Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L49/00Packet switching elements
    • H04L49/70Virtual switches
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/64Routing or path finding of packets in data switching networks using an overlay routing layer
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L49/00Packet switching elements
    • H04L49/35Switches specially adapted for specific applications
    • H04L49/354Switches specially adapted for specific applications for supporting virtual local area networks [VLAN]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/46Interconnection of networks
    • H04L12/4633Interconnection of networks using encapsulation techniques, e.g. tunneling
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/46Interconnection of networks
    • H04L12/4641Virtual LANs, VLANs, e.g. virtual private networks [VPN]

Definitions

  • This field relates to the field of cloud computing, and more specifically refers to a method, system, device, and storage medium for implementing a bare metal inspection process.
  • Bare Metal Service is a computing service that combines the flexibility of virtual machines and the performance of physical machines. It can provide individuals or enterprises with dedicated physical servers on the cloud. It can provide excellent computing performance and ensure data security for key application systems, high-performance computing, big data, core database and other businesses.
  • a bare metal cloud physical machine just like creating a virtual machine, you only need to specify the required hardware requirements (such as: cpu memory, etc.), mirroring, and the required network to create the required bare metal cloud physical machine, and Users can apply flexibly and apply for use on demand.
  • the OVERLAY network is a virtual network built on the existing physical network, with independent control and forwarding planes.
  • terminal devices such as servers
  • the physical network is transparent, so that the bearer network and service network can be realized separation.
  • the bare metal inspection process not only needs to obtain hardware information such as the CPU, memory, and hard disk of the bare metal node, but also needs to obtain the hostname (host name) on the smart network card.
  • the open source community only has the bare metal smart network card-based deployment solution implemented by the Openstack community based on neutron-openvswitch-agent and mellanox bluefield network card, and there is no bare metal inspection implementation solution yet.
  • the purpose of the embodiments of this application is to propose a method, system, computer equipment, and computer-readable storage medium for realizing the bare metal inspection process.
  • This application realizes the isolation of the inspection network by using the agent component inspur-inspect-agent In the scenario of smart network card and open virtual network, the inspection process of bare metal is realized.
  • an aspect of the embodiments of the present application provides a method for implementing the bare metal inspection process, including the following steps: installing Openstack on the control node, installing a network card on the bare metal node, and installing an operating system on the network card, Make the network card generate a first bare metal port on the bare metal node, and generate a second bare metal port corresponding to the first bare metal port in the operating system; establish the Openstack and the operating system Communication channel between, and agent component is deployed on described operating system; Create the first inspection port (bm-inspect) on described Openstack, create the second inspection port (ironic inspect port) based on described agent component and Binding the second inspection port to the second bare metal port; and in response to receiving the flow table sent by the Openstack, based on the first bare metal port, the second bare metal port and the first inspection port Obtain the memory file system, collect all hardware information of the current system through the memory file system, and send the collected information to the bare metal
  • the installing Openstack on the control node includes: setting the deployment network and the IP address of the Simple File Transfer Protocol service, and deploying the Simple File Transfer Protocol service on the control node.
  • the establishment of the communication channel between the Openstack and the operating system includes: respectively setting virtual channel endpoint IP addresses on the Openstack and the operating system, and based on the virtual channel endpoint IP The address sets the virtual network tunnel.
  • the method further includes: creating an inspection network, writing the UUID of the inspection network into the configuration file of the proxy component, and setting the hostname of the inspection network to the second Check the hostname corresponding to the port.
  • the method further includes: judging whether there is a port under the host name corresponding to the second inspection port in the inspection network; and responding to the If there is a port, delete the port.
  • the creating a first inspection port on the Openstack includes: creating a first inspection port on the bridge of the Openstack, and configuring the network segment of the inspection network on the first inspection port the corresponding IP address, and enable the Simple File Transfer Protocol service to monitor the first inspection port.
  • the obtaining the memory file system based on the first bare metal port, the second bare metal port, and the first inspection port includes: according to the first bare metal port, the second bare metal port, The network bridge on the operating system, the virtual network tunnel, the Openstack network bridge, the first inspection port and the Simple File Transfer Protocol service obtain the memory file system in sequence.
  • Another aspect of the embodiment of the present application provides a system for implementing the bare metal inspection process, including: a deployment module for installing Openstack on the control node, installing a network card on the bare metal node, and installing an operating system on the network card , so that the network card generates a first bare metal port on the bare metal node, and generates a second bare metal port corresponding to the first bare metal port in the operating system; a communication module, configured to establish the A communication channel between Openstack and the operating system, and an agent component is deployed on the operating system; a port module is used to create a first inspection port on the Openstack, and create a second inspection port based on the agent component And binding the second inspection port to the second bare metal port; and an execution module, configured to respond to receiving the flow table sent by the Openstack, based on the first bare metal port, the second bare metal
  • the port and the first inspection port obtain the memory file system, collect all hardware information of the current system through the memory file
  • a computer device including: at least one processor; and a memory, the memory stores computer instructions that can be run on the processor, and the instructions are executed by the The steps of the above method are realized when the processor executes.
  • a computer-readable storage medium stores a computer program for implementing the above method steps when executed by a processor.
  • the inspection network is isolated and connected by using the agent component inspur-inspect-agent, and the bare metal inspection process is realized in the scene of the smart network card and the open virtual network.
  • FIG. 1 is a schematic diagram of an embodiment of a method for implementing a bare metal inspection process provided by the present application
  • Fig. 2 is the hardware architecture diagram of the embodiment of the present application.
  • FIG. 3 is a schematic diagram of an embodiment of a system for implementing a bare metal inspection process provided by the present application
  • Fig. 4 is a schematic diagram of the hardware structure of an embodiment of a computer device implementing a bare metal inspection process provided by the present application;
  • FIG. 5 is a schematic diagram of an embodiment of a computer storage medium for implementing a bare metal inspection process provided by the present application.
  • FIG. 1 is a schematic diagram of an embodiment of a method for implementing a bare metal inspection process provided by the present application. As shown in Figure 1, the embodiment of the present application includes the following steps:
  • FIG. 2 shows a hardware architecture diagram of the embodiment of the present application, and the embodiment of the present application will be described with reference to FIG. 2 .
  • this embodiment includes a control node and a bare metal node.
  • the left side of Figure 2 is the control node, and the right side is the bare metal node.
  • the bare metal node includes bare metal and a network card, and the network card includes an Arm operating system.
  • Install Openstack on the control node install a network card on the bare metal node, and install an operating system on the network card, so that the network card generates a first bare metal port on the bare metal node, and generates a first bare metal port in the operating system.
  • the second bare metal port corresponding to the first bare metal port.
  • Install Openstack on the control node, and Openstack contains neutron ironic nova components.
  • Install the smart network card on the bare metal side install the operating system in the smart network card, and install ovn-controller (controller) and ovs on the operating system.
  • the network card in this embodiment is the bluefield2 smart network card launched by Mellanox. After the smart network card is inserted into the bare metal node, the smart network card will generate the first bare metal port (PF0) on the bare metal system, and there will also be a port in the arm operating system of the smart network card that is the same as that in the bare metal system PF0 corresponds to the second bare metal port (pf0hpf).
  • PF0 bare metal port
  • pf0hpf the second bare metal port
  • the installing Openstack on the control node includes: setting the deployment network and the IP address of the Simple File Transfer Protocol service, and deploying the Simple File Transfer Protocol service on the control node. Plan and deploy the network and the ip address of the tftp (Trivial File Transfer Protocol)-server (service), and deploy the tftp-server on the control node.
  • Plan and deploy the network and the ip address of the tftp (Trivial File Transfer Protocol)-server (service) and deploy the tftp-server on the control node.
  • a communication channel between the Openstack and the operating system is established, and an agent component is deployed on the operating system.
  • the establishment of the communication channel between the Openstack and the operating system includes: respectively setting virtual channel endpoint IP addresses on the Openstack and the operating system, and based on the virtual channel endpoint IP The address sets the virtual network tunnel. Plan and configure vtep (Virtual Tunnel Endpoint, virtual channel endpoint) ip on the deployment node and the Arm operating system and open the OVERLAY tunnel.
  • vtep Virtual Tunnel Endpoint, virtual channel endpoint
  • the agent component inspur-inspect-agent developed by Inspur and running on the smart network card Arm system is used, which is mainly used to get through the inspection network. Deploy the inspur-inspect-agent as a service on the smart network card Arm, and enable it.
  • the method further includes: creating an inspection network, writing the UUID of the inspection network into the configuration file of the proxy component, and setting the hostname of the inspection network to the second Check the hostname corresponding to the port.
  • the method further includes: judging whether there is a port under the host name corresponding to the second inspection port in the inspection network; and responding to the If there is a port, delete the port.
  • Initialization operations including: (1) Initialize the log module; (2) Obtain the mac (Media Access Control, Media Access Control) address of the bare metal PF port on the Arm; (3) Read the configuration file to obtain the tftp-server ip address, obtain and check the network uuid (Universally Unique Identifier, universally unique identifier); (4) pull up the ovn-controller service;
  • a first inspection port is created on the Openstack, a second inspection port is created based on the proxy component, and the second inspection port is bound to the second bare metal port.
  • the creating a first inspection port on the Openstack includes: creating a first inspection port on the bridge of the Openstack, and configuring the network segment of the inspection network on the first inspection port the corresponding IP address, and enable the Simple File Transfer Protocol service to monitor the first inspection port.
  • the bare metal After Openstack initiates the bare metal inspection operation, the bare metal will power off (shutdown) and then power on (start up) to start pxe (Pre-boot Execution Environment, pre-boot operating environment). After power on, the smart network card on the bare metal will also Perform power-on operation. Usually, the power-on process of the smart network card is much earlier than the time point when the bare metal node network card starts to perform pxe, so when the bare metal network card performs pxe, inspur-inspect-agent has already created the second inspection port (ironic inspect port) and bound to pf0hpf. Ovn has delivered the flow table for checking the network. In special scenarios, the ironic conductor code flow can be modified to ensure that the smart network card has been powered on and the port binding operation has been completed when the bare metal initiates a pxe request.
  • the obtaining the memory file system based on the first bare metal port, the second bare metal port, and the first inspection port includes: according to the first bare metal port, the second bare metal port, The network bridge on the operating system, the virtual network tunnel, the Openstack network bridge, the first inspection port and the Simple File Transfer Protocol service obtain the memory file system in sequence.
  • dhcp (Dynamic host configuration protocol, dynamic host configuration protocol) obtains the dhcp option tftp server address and other dhcp option related information in the ovn flow table, and then passes through the PF0 ⁇ pf0hpf ⁇ br-int ⁇ vxlan tunnel ⁇ br-int ⁇ bm-inspect ⁇ tftp-server to obtain the memory file system, after the bare metal obtains the memory system, the IPA in the system (ironic-python-agent, is a service written in python, used in the bare metal In the deployment inspection process, different processes have different functions.
  • bare metal hardware information used in the bare metal inspection process, mainly used to collect bare metal hardware information
  • the hardware information of the smart network card can be collected through the rshim service of pci (Peripheral Component Interconnect, external controller interface), and will be sent to ironic after all the required information is collected.
  • pci Peripheral Component Interconnect, external controller interface
  • neutron is used to create an inspection network.
  • the purpose of creating it with neutron is to manage the inspection network by OVN, facilitate the isolation and connection of the inspection network, and fill in the uuid of the created inspection network to inspur-inspect-agent configuration file.
  • Inspur-inspect-agent When Inspur-inspect-agent is powered on, it will read the configuration file and configuration information such as mac, tftp server ip, hostname, etc. of the bare metal port PF. Then, all ports on the hostname of the currently inspected network will be obtained through neutronclient, and any ports will be deleted.
  • Use neutronclient to specify the mac as the mac of the PF port, and the hostname as the ironc-inspect port.
  • the embodiment of this application can enable the bare metal to implement the OVERLAY solution based on the smart network card to solve the inspection process of the bare metal, and provide a technical cornerstone for the bare metal to realize the OVERLAY based on the smart network card + OVN.
  • the system 200 includes the following modules: a deployment module, configured to install Openstack on the control node, install a network card on the bare metal node, and install an operating system on the network card so that the network card is installed on the bare metal node Generate a first bare metal port, and generate a second bare metal port corresponding to the first bare metal port in the operating system; a communication module, configured to establish a communication channel between the Openstack and the operating system , and deploy the agent component on the operating system; the port module is used to create a first inspection port on the Openstack, create a second inspection port based on the agent component and bind the second inspection port to The second bare metal port; and an execution module, configured to obtain a memory file system based on the first bare metal port, the second bare metal port and the first inspection port in response to receiving
  • the deployment module is configured to: set the deployment network and the IP address of the Simple File Transfer Protocol service, and deploy the Simple File Transfer Protocol service on the control node.
  • the communication module is configured to: respectively set virtual channel endpoint IP addresses on the Openstack and the operating system, and set a virtual network tunnel based on the virtual channel endpoint IP addresses.
  • system further includes a network module, configured to: create an inspection network, write the UUID of the inspection network into the configuration file of the agent component, and set the hostname of the inspection network to become the host name corresponding to the second check port.
  • the system further includes a judgment module, configured to: judge whether there is a port under the host name corresponding to the second inspection port in the inspection network; and respond to the second inspection port in the inspection network If there is a port under the corresponding host name, delete the port.
  • a judgment module configured to: judge whether there is a port under the host name corresponding to the second inspection port in the inspection network; and respond to the second inspection port in the inspection network If there is a port under the corresponding host name, delete the port.
  • the port module is used to: create a first inspection port on the bridge of the Openstack, configure the IP address corresponding to the network segment of the inspection network on the first inspection port, and open The Simple File Transfer Protocol service listens on the first inspection port.
  • the execution module is configured to: according to the first bare metal port, the second bare metal port, the network bridge on the operating system, the virtual network tunnel, and the Openstack network The order of the bridge, the first inspection port, and the Simple File Transfer Protocol service acquires an in-memory file system.
  • the third aspect of the embodiments of the present application proposes a computer device, including: at least one processor; and a memory, the memory stores computer instructions that can run on the processor, and the instructions are executed by the processor to The following steps are implemented: S1. Install Openstack on the control node, install a network card on the bare metal node, and install an operating system on the network card, so that the network card generates a first bare metal port on the bare metal node, and Generate a second bare metal port corresponding to the first bare metal port in the operating system; S2, establish a communication channel between the Openstack and the operating system, and deploy an agent component on the operating system; S3 .
  • the installing Openstack on the control node includes: setting the deployment network and the IP address of the Simple File Transfer Protocol service, and deploying the Simple File Transfer Protocol service on the control node.
  • the establishment of the communication channel between the Openstack and the operating system includes: respectively setting virtual channel endpoint IP addresses on the Openstack and the operating system, and based on the virtual channel endpoint IP The address sets the virtual network tunnel.
  • the steps further include: creating an inspection network, writing the UUID of the inspection network into the configuration file of the proxy component, and setting the hostname of the inspection network to the second Check the hostname corresponding to the port.
  • the steps further include: judging whether there is a port under the host name corresponding to the second inspection port in the inspection network; and responding to the If there is a port, delete the port.
  • the creating a first inspection port on the Openstack includes: creating a first inspection port on the bridge of the Openstack, and configuring the network segment of the inspection network on the first inspection port the corresponding IP address, and enable the Simple File Transfer Protocol service to monitor the first inspection port.
  • the obtaining the memory file system based on the first bare metal port, the second bare metal port, and the first inspection port includes: according to the first bare metal port, the second bare metal port, The network bridge on the operating system, the virtual network tunnel, the Openstack network bridge, the first inspection port and the Simple File Transfer Protocol service obtain the memory file system in sequence.
  • FIG. 4 it is a schematic diagram of the hardware structure of an embodiment of the above-mentioned computer equipment for implementing the bare metal inspection process provided by the present application.
  • the device includes a processor 301 and a memory 302 .
  • the processor 301 and the memory 302 may be connected through a bus or in other ways, and connection through a bus is taken as an example in FIG. 4 .
  • the memory 302 as a non-volatile computer-readable storage medium, can be used to store non-volatile software programs, non-volatile computer-executable programs and modules, such as the method for realizing the bare metal inspection process in the embodiment of the present application Corresponding program instruction/module.
  • the processor 301 executes various functional applications and data processing of the server by running non-volatile software programs, instructions, and modules stored in the memory 302 , that is, executes a method for implementing a bare metal inspection process.
  • the memory 302 may include a program storage area and a data storage area, wherein the program storage area may store an operating system and an application program required by at least one function; the data storage area may store data created by using the method for implementing the bare metal inspection process wait.
  • the memory 302 may include a high-speed random access memory, and may also include a non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other non-volatile solid-state storage devices.
  • the memory 302 may optionally include memory that is remotely located relative to the processor 301, and these remote memories may be connected to the local module through a network. Examples of the aforementioned networks include, but are not limited to, the Internet, intranets, local area networks, mobile communication networks, and combinations thereof.
  • One or more computer instructions 303 corresponding to the method for implementing the bare metal inspection process are stored in the memory 302, and when executed by the processor 301, the method for implementing the bare metal inspection process in any of the above method embodiments is executed.
  • Any one embodiment of the computer equipment that executes the above-mentioned method for implementing the bare metal inspection process can achieve the same or similar effects as any of the above-mentioned method embodiments corresponding to it.
  • the present application also provides a computer-readable storage medium.
  • the computer-readable storage medium stores a computer program for executing the method for implementing the bare metal inspection process when executed by a processor.
  • FIG. 5 it is a schematic diagram of an embodiment of the computer storage medium for implementing the bare metal inspection process provided by the present application.
  • the computer readable storage medium 401 stores a computer program 402 for executing the above method when executed by a processor.
  • the storage medium may be a read-only memory, a magnetic disk or an optical disk, and the like.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

本申请提供一种实现裸金属检查流程的方法、系统、设备和介质,方法包括:在控制节点安装Openstack,在裸金属节点安装网卡,在网卡中安装操作系统,使得网卡在裸金属节点生成第一裸金属端口,在操作系统中生成与第一裸金属端口对应的第二裸金属端口;建立Openstack和操作系统之间的通信通道,将代理组件部署在操作系统上;在Openstack上创建第一检查端口,基于代理组件创建第二检查端口并将第二检查端口绑定到第二裸金属端口;响应于接收到Openstack发出的流表,基于第一、第二裸金属端口和第一检查端口获取内存文件系统,并通过内存文件系统采集当前系统的所有硬件信息,并将采集到的信息上送到裸金属服务。

Description

一种实现裸金属检查流程的方法、系统、设备和存储介质
本申请要求在2021年9月30日提交中国专利局、申请号为202111155877.4、发明名称为“一种实现裸金属检查流程的方法、系统、设备和存储介质”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本领域涉及云计算领域,更具体地,特别是指一种实现裸金属检查流程的方法、系统、设备和存储介质。
背景技术
随着云计算领域的快速发展,裸金属服务是一款兼具虚拟机弹性和物理机性能的计算类服务,可以为个人或者企业提供专属的云上物理服务器。可以为关键应用系统、高性能计算、大数据、核心数据库等业务提供卓越的计算性能并保证数据安全。在创建裸金属云物理机时可以和创建虚拟机一样,只需指定所需要的硬件要求(如:cpu内存等)、镜像以及所需要的网络即可创建出所需要的裸金属云物理机,并且用户可以灵活申请,按需申请使用。
但是对于裸金属的OVERLAY实现方案不同于Openstack上的虚拟机OVERLAY的方案。OVERLAY网络是建立在已有物理网络上的虚拟网络,具有独立的控制和转发平面,对于连接到OVERLAY的终端设备(例如服务器)来说,物理网络是透明的,从而可以实现承载网络和业务网络的分离。
对于Openstack虚拟机,共享占用计算节点的资源,但是计算节点不会对最终用户暴露。因此可以在计算节点上部署隧道,实现虚拟机的 OVERLAY封装与解封装。但在裸金属场景下,裸金属独占一个计算节点,这个计算节点需要完全对最终用户暴露,因此在计算节点上部署隧道的虚拟机OVERLAY实现方式不能应用在裸金属场景下。
对于裸金属的OVERLAY目前主要由两种主流的实现方案:(1)采用硬SDN,即通过控制物理交换机,对从裸金属进出的报文在物理交换机上进行OVERLAY的封装与解封装;(2)采用软SDN,借助于智能网卡,在智能网卡的操作系统中实现对裸金属进出报文的封装与解封装。
在借助于智能网卡实现裸金属OVERLAY的方案下,如何实现裸金属的检查工作流程是一个非常重要的环节。Ovn(Open Virtual Network,开放虚拟网络)+智能网卡下,裸金属的检查流程不仅需要获取到裸金属节点的cpu、内存、硬盘等硬件信息,还需要获取智能网卡上的hostname(主机名)。目前开源社区只有Openstack社区基于neutron-openvswitch-agent和mellanox bluefield网卡实现的裸金属基于智能网卡的部署方案,暂无裸金属检查实现方案。
发明内容
有鉴于此,本申请实施例的目的在于提出一种实现裸金属检查流程的方法、系统、计算机设备及计算机可读存储介质,本申请通过采用代理组件inspur-inspect-agent实现了检查网络的隔离和打通,在智能网卡和开放虚拟网络的场景下实现了裸金属的检查流程。
基于上述目的,本申请实施例的一方面提供了一种实现裸金属检查流程的方法,包括如下步骤:在控制节点安装Openstack,在裸金属节点安装网卡,并在所述网卡中安装操作系统,使得所述网卡在所述裸金属节点生成第一裸金属端口,并在所述操作系统中生成与所述第一裸金属端口对应的第二裸金属端口;建立所述Openstack和所述操作系统之间的通信通道,并将代理组件部署在所述操作系统上;在所述Openstack上创建第一检查端口(bm-inspect),基于所述代理组件创建第二检查端口(ironic inspect port)并将所述第二检查端口绑定到所述第二裸金属端口;以及响应于接收到所 述Openstack发出的流表,基于所述第一裸金属端口、第二裸金属端口和第一检查端口获取内存文件系统,并通过所述内存文件系统采集当前系统的所有硬件信息,并将采集到的信息上送到裸金属服务。
在一些实施方式中,所述在控制节点安装Openstack包括:设置部署网络和简单文件传输协议服务的IP地址,并在所述控制节点上部署所述简单文件传输协议服务。
在一些实施方式中,所述建立所述Openstack和所述操作系统之间的通信通道包括:在所述Openstack和所述操作系统上分别设置虚拟通道端点IP地址,并基于所述虚拟通道端点IP地址设置虚拟网络隧道。
在一些实施方式中,方法还包括:创建检查网络,将所述检查网络的通用唯一标识符写入所述代理组件的配置文件中,并将所述检查网络的主机名设置成所述第二检查端口对应的主机名。
在一些实施方式中,方法还包括:判断所述检查网络中所述第二检查端口对应的主机名下是否存在端口;以及响应于所述检查网络中所述第二检查端口对应的主机名下存在端口,将所述端口删除。
在一些实施方式中,所述在所述Openstack上创建第一检查端口包括:在所述Openstack的网桥上创建第一检查端口,在所述第一检查端口上配置所述检查网络的网段对应的IP地址,并开启简单文件传输协议服务监听所述第一检查端口。
在一些实施方式中,所述基于所述第一裸金属端口、第二裸金属端口和第一检查端口获取内存文件系统包括:按照所述第一裸金属端口、所述第二裸金属端口、所述操作系统上的网桥、所述虚拟网络隧道、所述Openstack的网桥、所述第一检查端口和所述简单文件传输协议服务的顺序获取内存文件系统。
本申请实施例的另一方面,提供了一种实现裸金属检查流程的系统,包括:部署模块,用于在控制节点安装Openstack,在裸金属节点安装网卡,并在所述网卡中安装操作系统,使得所述网卡在所述裸金属节点生成第一 裸金属端口,并在所述操作系统中生成与所述第一裸金属端口对应的第二裸金属端口;通信模块,用于建立所述Openstack和所述操作系统之间的通信通道,并将代理组件部署在所述操作系统上;端口模块,用于在所述Openstack上创建第一检查端口,基于所述代理组件创建第二检查端口并将所述第二检查端口绑定到所述第二裸金属端口;以及执行模块,用于响应于接收到所述Openstack发出的流表,基于所述第一裸金属端口、第二裸金属端口和第一检查端口获取内存文件系统,并通过所述内存文件系统采集当前系统的所有硬件信息,并将采集到的信息上送到裸金属服务。
本申请实施例的又一方面,还提供了一种计算机设备,包括:至少一个处理器;以及存储器,所述存储器存储有可在所述处理器上运行的计算机指令,所述指令由所述处理器执行时实现如上方法的步骤。
本申请实施例的再一方面,还提供了一种计算机可读存储介质,计算机可读存储介质存储有被处理器执行时实现如上方法步骤的计算机程序。
本申请至少具有以下有益技术效果:通过采用代理组件inspur-inspect-agent实现了检查网络的隔离和打通,在智能网卡和开放虚拟网络的场景下实现了裸金属的检查流程。
附图说明
为了更清楚地说明本申请实施例或现有技术中的技术方案,下面将对实施例或现有技术描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本申请的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的实施例。
图1为本申请提供的实现裸金属检查流程的方法的实施例的示意图;
图2为本申请实施例的硬件架构图;
图3为本申请提供的实现裸金属检查流程的系统的实施例的示意图;
图4为本申请提供的实现裸金属检查流程的计算机设备的实施例的硬 件结构示意图;
图5为本申请提供的实现裸金属检查流程的计算机存储介质的实施例的示意图。
具体实施方式
为使本申请的目的、技术方案和优点更加清楚明白,以下结合具体实施例,并参照附图,对本申请实施例进一步详细说明。
需要说明的是,本申请实施例中所有使用“第一”和“第二”的表述均是为了区分两个相同名称非相同的实体或者非相同的参量,可见“第一”、“第二”仅为了表述的方便,不应理解为对本申请实施例的限定,后续实施例对此不再一一说明。
本申请实施例的第一个方面,提出了一种实现裸金属检查流程的方法的实施例。图1示出的是本申请提供的实现裸金属检查流程的方法的实施例的示意图。如图1所示,本申请实施例包括如下步骤:
S1、在控制节点安装Openstack,在裸金属节点安装网卡,并在所述网卡中安装操作系统,使得所述网卡在所述裸金属节点生成第一裸金属端口,并在所述操作系统中生成与所述第一裸金属端口对应的第二裸金属端口;
S2、建立所述Openstack和所述操作系统之间的通信通道,并将代理组件部署在所述操作系统上;
S3、在所述Openstack上创建第一检查端口,基于所述代理组件创建第二检查端口并将所述第二检查端口绑定到所述第二裸金属端口;以及
S4、响应于接收到所述Openstack发出的流表,基于所述第一裸金属端口、第二裸金属端口和第一检查端口获取内存文件系统,并通过所述内存文件系统采集当前系统的所有硬件信息,并将采集到的信息上送到裸金属服务。
图2示出的是本申请实施例的硬件架构图,结合图2对本申请实施例进行说明。如图2所示,本实施例包括控制节点和裸金属节点,图2左边 为控制节点,右边为裸金属节点,裸金属节点中包括裸金属和网卡,网卡中包括Arm操作系统。
在控制节点安装Openstack,在裸金属节点安装网卡,并在所述网卡中安装操作系统,使得所述网卡在所述裸金属节点生成第一裸金属端口,并在所述操作系统中生成与所述第一裸金属端口对应的第二裸金属端口。在控制节点安装Openstack,并且Openstack中包含neutron ironic nova组件。在控制节点安装部署ovn以及ovs(Open Virtual Switch,开放虚拟交换机)。在裸金属侧安装智能网卡,并在智能网卡中安装操作系统,在操作系统上安装ovn-controller(控制器)以及ovs。本实施例中的网卡采用的是Mellanox推出的bluefield2智能网卡。将智能网卡插到裸金属节点上之后,智能网卡会在裸金属的系统上生成第一裸金属端口(PF0),同样在智能网卡的Arm操作系统中也会有一个端口与在裸金属系统中的PF0相对应,也即是第二裸金属端口(pf0hpf)。
在一些实施方式中,所述在控制节点安装Openstack包括:设置部署网络和简单文件传输协议服务的IP地址,并在所述控制节点上部署所述简单文件传输协议服务。规划部署网络以及tftp(Trivial File Transfer Protocol,简单文件传输协议)-server(服务)的ip地址,并在控制节点上部署tftp-server。
建立所述Openstack和所述操作系统之间的通信通道,并将代理组件部署在所述操作系统上。
在一些实施方式中,所述建立所述Openstack和所述操作系统之间的通信通道包括:在所述Openstack和所述操作系统上分别设置虚拟通道端点IP地址,并基于所述虚拟通道端点IP地址设置虚拟网络隧道。在部署节点和Arm操作系统上规划配置vtep(Virtual Tunnel Endpoint,虚拟通道端点)ip并打通OVERLAY隧道。本申请实施例中采用浪潮自研运行在智能网卡Arm系统上的代理组件inspur-inspect-agent,主要用于打通检查网络。将inspur-inspect-agent以服务的形式部署在智能网卡Arm上,并进行enable(使能)。
在一些实施方式中,方法还包括:创建检查网络,将所述检查网络的通用唯一标识符写入所述代理组件的配置文件中,并将所述检查网络的主机名设置成所述第二检查端口对应的主机名。
在一些实施方式中,方法还包括:判断所述检查网络中所述第二检查端口对应的主机名下是否存在端口;以及响应于所述检查网络中所述第二检查端口对应的主机名下存在端口,将所述端口删除。
Inspur-inspect-agent软件设计框架流程如下:
1、Inspur-inspect-agent上电;
2、初始化操作,包括:(1)初始化日志log模块;(2)在Arm上获取裸金属PF口的mac(Media Access Control,介质访问控制)地址;(3)读取配置文件获取tftp-server的ip地址、获取检查网络uuid(Universally Unique Identifier,通用唯一标识符);(4)拉起ovn-controller服务;
3、实例化neutronclient;
4、对当前检查网络的port(端口)做处理,包括:(1)获取当前检查网络hostname上的port,有则删除;(2)通过neutronclient创建检查网络的port,指定‘binding:host_id’:hostname、PF的mac创建;
5、调用os_vif.plug将该port_id绑定到pf0hpf;
6、将检查网络的dhcp_opts,update(更新)到刚创建的port。
在所述Openstack上创建第一检查端口,基于所述代理组件创建第二检查端口并将所述第二检查端口绑定到所述第二裸金属端口。
在一些实施方式中,所述在所述Openstack上创建第一检查端口包括:在所述Openstack的网桥上创建第一检查端口,在所述第一检查端口上配置所述检查网络的网段对应的IP地址,并开启简单文件传输协议服务监听所述第一检查端口。在Openstack的网桥(br-int)上创建ovs internal(内部)端口第一检查端口(bm-inspect)。在bm-inspect上配置一个检查网络网段的一个ip地址,开启tftp-server监听bm-inspect端口,用来提供裸金属检查阶段的内存镜像和文件系统。
在Openstack发起裸金属检查操作之后,裸金属会进行power off(关机)然后power on(开机)进行pxe(Pre-boot Execution Environment,预启动运行环境)启动,在power on之后裸金属上智能网卡也进行上电操作。通常情况下智能网卡上电流程要比裸金属节点网卡开始进行pxe的时间点要早很多,所以在裸金属网卡进行pxe的时候,inspur-inspect-agent已经创建好了第二检查端口(ironic inspect port)并绑定到了pf0hpf。Ovn已将检查网络的流表下发,特殊场景下可以修改ironic conductor代码流程来保证裸金属发起pxe请求时智能网卡已经上电并完成port绑定操作。
响应于接收到所述Openstack发出的流表,基于所述第一裸金属端口、第二裸金属端口和第一检查端口获取内存文件系统,并通过所述内存文件系统采集当前系统的所有硬件信息,并将采集到的信息上送到裸金属服务。
在一些实施方式中,所述基于所述第一裸金属端口、第二裸金属端口和第一检查端口获取内存文件系统包括:按照所述第一裸金属端口、所述第二裸金属端口、所述操作系统上的网桥、所述虚拟网络隧道、所述Openstack的网桥、所述第一检查端口和所述简单文件传输协议服务的顺序获取内存文件系统。裸金属节点执行pxe过程中dhcp(Dynamic host configuration protocol,动态主机配置协议)获取到ovn流表中dhcp option tftp server地址以及其他dhcp option相关信息之后,会通过PF0→pf0hpf→br-int→vxlan隧道→br-int→bm-inspect→tftp-server去获取内存文件系统,在裸金属获取到内存系统之后,系统中的IPA(ironic-python-agent,是一个用python写的服务,用在裸金属部署检查流程当中,在不同的流程有着不同的作用。在本申请实施例中,用在裸金属的检查流程中,主要用来采集裸金属的硬件信息)会去采集当前系统的所有硬件信息。对于智能网卡的硬件信息可以通过pci(Peripheral Component Interconnect,外部控制器接口)的rshim服务进行采集,在所有所需信息采集完成之后会向ironic进行上送。
本申请实施例中通过neutron创建一个检查网络,用neutron创建的目的是将检查网络被OVN纳管,方便检查网络的隔离和打通,并将创建的检查网络的uuid填写到inspur-inspect-agent的配置文件中。Inspur-inspect-agent 上电将会去读取配置文件以及裸金属端口PF的mac、tftp server ip、hostname等配置信息。接着会通过neutronclient获取当前检查网络本hostname上的所有port,有则删除。通过neutronclient指定mac为PF口的mac、hostname为ironc-inspect port。调用os_vif模块将该port plug(插入)到br-int网桥上,此时检查Arm侧检查网络是否已打通。将tftp server ip、next server等一些dhcp option更新到port的extra_dhcp_opts属性当中,此时发起dhcp请求的网卡能够拿到tftpserver地址。
现在技术中基于裸金属实现OVERLAY方案一直是一个技术难点。本申请实施例可以让裸金属基于智能网卡实现OVERLAY方案解决裸金属的检查流程,为裸金属基于智能网卡+OVN实现OVERLAY提供技术基石。
需要特别指出的是,上述实现裸金属检查流程的方法的各个实施例中的各个步骤均可以相互交叉、替换、增加、删减,因此,这些合理的排列组合变换之于实现裸金属检查流程的方法也应当属于本申请的保护范围,并且不应将本申请的保护范围局限在实施例之上。
基于上述目的,本申请实施例的第二个方面,提出了一种实现裸金属检查流程的系统。如图3所示,系统200包括如下模块:部署模块,用于在控制节点安装Openstack,在裸金属节点安装网卡,并在所述网卡中安装操作系统,使得所述网卡在所述裸金属节点生成第一裸金属端口,并在所述操作系统中生成与所述第一裸金属端口对应的第二裸金属端口;通信模块,用于建立所述Openstack和所述操作系统之间的通信通道,并将代理组件部署在所述操作系统上;端口模块,用于在所述Openstack上创建第一检查端口,基于所述代理组件创建第二检查端口并将所述第二检查端口绑定到所述第二裸金属端口;以及执行模块,用于响应于接收到所述Openstack发出的流表,基于所述第一裸金属端口、第二裸金属端口和第一检查端口获取内存文件系统,并通过所述内存文件系统采集当前系统的所有硬件信息,并将采集到的信息上送到裸金属服务。
在一些实施方式中,所述部署模块用于:设置部署网络和简单文件传输协议服务的IP地址,并在所述控制节点上部署所述简单文件传输协议服 务。
在一些实施方式中,所述通信模块用于:在所述Openstack和所述操作系统上分别设置虚拟通道端点IP地址,并基于所述虚拟通道端点IP地址设置虚拟网络隧道。
在一些实施方式中,系统还包括网络模块,用于:创建检查网络,将所述检查网络的通用唯一标识符写入所述代理组件的配置文件中,并将所述检查网络的主机名设置成所述第二检查端口对应的主机名。
在一些实施方式中,系统还包括判断模块,用于:判断所述检查网络中所述第二检查端口对应的主机名下是否存在端口;以及响应于所述检查网络中所述第二检查端口对应的主机名下存在端口,将所述端口删除。
在一些实施方式中,所述端口模块用于:在所述Openstack的网桥上创建第一检查端口,在所述第一检查端口上配置所述检查网络的网段对应的IP地址,并开启简单文件传输协议服务监听所述第一检查端口。
在一些实施方式中,所述执行模块用于:按照所述第一裸金属端口、所述第二裸金属端口、所述操作系统上的网桥、所述虚拟网络隧道、所述Openstack的网桥、所述第一检查端口和所述简单文件传输协议服务的顺序获取内存文件系统。
基于上述目的,本申请实施例的第三个方面,提出了一种计算机设备,包括:至少一个处理器;以及存储器,存储器存储有可在处理器上运行的计算机指令,指令由处理器执行以实现如下步骤:S1、在控制节点安装Openstack,在裸金属节点安装网卡,并在所述网卡中安装操作系统,使得所述网卡在所述裸金属节点生成第一裸金属端口,并在所述操作系统中生成与所述第一裸金属端口对应的第二裸金属端口;S2、建立所述Openstack和所述操作系统之间的通信通道,并将代理组件部署在所述操作系统上;S3、在所述Openstack上创建第一检查端口,基于所述代理组件创建第二检查端口并将所述第二检查端口绑定到所述第二裸金属端口;以及S4、响应于接收到所述Openstack发出的流表,基于所述第一裸金属端口、第二裸金 属端口和第一检查端口获取内存文件系统,并通过所述内存文件系统采集当前系统的所有硬件信息,并将采集到的信息上送到裸金属服务。
在一些实施方式中,所述在控制节点安装Openstack包括:设置部署网络和简单文件传输协议服务的IP地址,并在所述控制节点上部署所述简单文件传输协议服务。
在一些实施方式中,所述建立所述Openstack和所述操作系统之间的通信通道包括:在所述Openstack和所述操作系统上分别设置虚拟通道端点IP地址,并基于所述虚拟通道端点IP地址设置虚拟网络隧道。
在一些实施方式中,步骤还包括:创建检查网络,将所述检查网络的通用唯一标识符写入所述代理组件的配置文件中,并将所述检查网络的主机名设置成所述第二检查端口对应的主机名。
在一些实施方式中,步骤还包括:判断所述检查网络中所述第二检查端口对应的主机名下是否存在端口;以及响应于所述检查网络中所述第二检查端口对应的主机名下存在端口,将所述端口删除。
在一些实施方式中,所述在所述Openstack上创建第一检查端口包括:在所述Openstack的网桥上创建第一检查端口,在所述第一检查端口上配置所述检查网络的网段对应的IP地址,并开启简单文件传输协议服务监听所述第一检查端口。
在一些实施方式中,所述基于所述第一裸金属端口、第二裸金属端口和第一检查端口获取内存文件系统包括:按照所述第一裸金属端口、所述第二裸金属端口、所述操作系统上的网桥、所述虚拟网络隧道、所述Openstack的网桥、所述第一检查端口和所述简单文件传输协议服务的顺序获取内存文件系统。
如图4所示,为本申请提供的上述实现裸金属检查流程的计算机设备的一个实施例的硬件结构示意图。
以如图4所示的装置为例,在该装置中包括一个处理器301以及一个存储器302。
处理器301和存储器302可以通过总线或者其他方式连接,图4中以通过总线连接为例。
存储器302作为一种非易失性计算机可读存储介质,可用于存储非易失性软件程序、非易失性计算机可执行程序以及模块,如本申请实施例中的实现裸金属检查流程的方法对应的程序指令/模块。处理器301通过运行存储在存储器302中的非易失性软件程序、指令以及模块,从而执行服务器的各种功能应用以及数据处理,即执行实现裸金属检查流程的方法。
存储器302可以包括存储程序区和存储数据区,其中,存储程序区可存储操作系统、至少一个功能所需要的应用程序;存储数据区可存储根据实现裸金属检查流程的方法的使用所创建的数据等。此外,存储器302可以包括高速随机存取存储器,还可以包括非易失性存储器,例如至少一个磁盘存储器件、闪存器件、或其他非易失性固态存储器件。在一些实施例中,存储器302可选包括相对于处理器301远程设置的存储器,这些远程存储器可以通过网络连接至本地模块。上述网络的实例包括但不限于互联网、企业内部网、局域网、移动通信网及其组合。
一个或者多个实现裸金属检查流程的方法对应的计算机指令303存储在存储器302中,当被处理器301执行时,执行上述任意方法实施例中的实现裸金属检查流程的方法。
执行上述实现裸金属检查流程的方法的计算机设备的任何一个实施例,可以达到与之对应的前述任意方法实施例相同或者相类似的效果。
本申请还提供了一种计算机可读存储介质,计算机可读存储介质存储有被处理器执行时执行实现裸金属检查流程的方法的计算机程序。
如图5所示,为本申请提供的上述实现裸金属检查流程的计算机存储介质的一个实施例的示意图。以如图5所示的计算机存储介质为例,计算机可读存储介质401存储有被处理器执行时执行如上方法的计算机程序402。
最后需要说明的是,本领域普通技术人员可以理解实现上述实施例方 法中的全部或部分流程,可以通过计算机程序来指令相关硬件来完成,实现裸金属检查流程的方法的程序可存储于一计算机可读取存储介质中,该程序在执行时,可包括如上述各方法的实施例的流程。其中,程序的存储介质可为磁碟、光盘、只读存储记忆体(ROM)或随机存储记忆体(RAM)等。上述计算机程序的实施例,可以达到与之对应的前述任意方法实施例相同或者相类似的效果。
以上是本申请公开的示例性实施例,但是应当注意,在不背离权利要求限定的本申请实施例公开的范围的前提下,可以进行多种改变和修改。根据这里描述的公开实施例的方法权利要求的功能、步骤和/或动作不需以任何特定顺序执行。此外,尽管本申请实施例公开的元素可以以个体形式描述或要求,但除非明确限制为单数,也可以理解为多个。
应当理解的是,在本文中使用的,除非上下文清楚地支持例外情况,单数形式“一个”旨在也包括复数形式。还应当理解的是,在本文中使用的“和/或”是指包括一个或者一个以上相关联地列出的项目的任意和所有可能组合。
上述本申请实施例公开实施例序号仅仅为了描述,不代表实施例的优劣。
本领域普通技术人员可以理解实现上述实施例的全部或部分步骤可以通过硬件来完成,也可以通过程序来指令相关的硬件完成,程序可以存储于一种计算机可读存储介质中,上述提到的存储介质可以是只读存储器,磁盘或光盘等。
所属领域的普通技术人员应当理解:以上任何实施例的讨论仅为示例性的,并非旨在暗示本申请实施例公开的范围被限于这些例子;在本申请实施例的思路下,以上实施例或者不同实施例中的技术特征之间也可以进行组合,并存在如上的本申请实施例的不同方面的许多其它变化,为了简明它们没有在细节中提供。因此,凡在本申请实施例的精神和原则之内,所做的任何省略、修改、等同替换、改进等,均应包含在本申请实施例的保护范围之内。

Claims (11)

  1. 一种实现裸金属检查流程的方法,其特征在于,包括如下步骤:
    在控制节点安装Openstack,在裸金属节点安装网卡,并在所述网卡中安装操作系统,使得所述网卡在所述裸金属节点生成第一裸金属端口,并在所述操作系统中生成与所述第一裸金属端口对应的第二裸金属端口;
    建立所述Openstack和所述操作系统之间的通信通道,并将代理组件部署在所述操作系统上;
    在所述Openstack上创建第一检查端口,基于所述代理组件创建第二检查端口并将所述第二检查端口绑定到所述第二裸金属端口;以及
    响应于接收到所述Openstack发出的流表,基于所述第一裸金属端口、第二裸金属端口和第一检查端口获取内存文件系统,并通过所述内存文件系统采集当前系统的所有硬件信息,并将采集到的信息上送到裸金属服务。
  2. 根据权利要求1所述的方法,其特征在于,所述在控制节点安装Openstack包括:
    设置部署网络和简单文件传输协议服务的IP地址,并在所述控制节点上部署所述简单文件传输协议服务。
  3. 根据权利要求1所述的方法,其特征在于,所述建立所述Openstack和所述操作系统之间的通信通道包括:
    在所述Openstack和所述操作系统上分别设置虚拟通道端点IP地址,并基于所述虚拟通道端点IP地址设置虚拟网络隧道。
  4. 根据权利要求3所述的方法,其特征在于,方法还包括:
    创建检查网络,将所述检查网络的通用唯一标识符写入所述代理组件的配置文件中,并将所述检查网络的主机名设置成所述第二检查端口对应的主机名。
  5. 根据权利要求4所述的方法,其特征在于,方法还包括:
    判断所述检查网络中所述第二检查端口对应的主机名下是否存在端口; 以及
    响应于所述检查网络中所述第二检查端口对应的主机名下存在端口,将所述端口删除。
  6. 根据权利要求4所述的方法,其特征在于,所述在所述Openstack上创建第一检查端口包括:
    在所述Openstack的网桥上创建第一检查端口,在所述第一检查端口上配置所述检查网络的网段对应的IP地址,并开启简单文件传输协议服务监听所述第一检查端口。
  7. 根据权利要求6所述的方法,其特征在于,所述基于所述第一裸金属端口、第二裸金属端口和第一检查端口获取内存文件系统包括:
    按照所述第一裸金属端口、所述第二裸金属端口、所述操作系统上的网桥、所述虚拟网络隧道、所述Openstack的网桥、所述第一检查端口和所述简单文件传输协议服务的顺序获取内存文件系统。
  8. 一种实现裸金属检查流程的系统,其特征在于,包括:
    部署模块,用于在控制节点安装Openstack,在裸金属节点安装网卡,并在所述网卡中安装操作系统,使得所述网卡在所述裸金属节点生成第一裸金属端口,并在所述操作系统中生成与所述第一裸金属端口对应的第二裸金属端口;
    通信模块,用于建立所述Openstack和所述操作系统之间的通信通道,并将代理组件部署在所述操作系统上;
    端口模块,用于在所述Openstack上创建第一检查端口,基于所述代理组件创建第二检查端口并将所述第二检查端口绑定到所述第二裸金属端口;以及
    执行模块,用于响应于接收到所述Openstack发出的流表,基于所述第一裸金属端口、第二裸金属端口和第一检查端口获取内存文件系统,并通过所述内存文件系统采集当前系统的所有硬件信息,并将采集到的信息上送到裸金属服务。
  9. 根据权利要求8所述的系统,其特征在于,还包括:
    网络模块,用于创建检查网络,将所述检查网络的通用唯一标识符写入所述代理组件的配置文件中,并将所述检查网络的主机名设置成所述第二检查端口对应的主机名。
  10. 一种计算机设备,其特征在于,包括:
    至少一个处理器;以及
    存储器,所述存储器存储有可在所述处理器上运行的计算机指令,所述指令由所述处理器执行时实现权利要求1-7任意一项所述方法的步骤。
  11. 一种计算机可读存储介质,所述计算机可读存储介质存储有计算机程序,其特征在于,所述计算机程序被处理器执行时实现权利要求1-7任意一项所述方法的步骤。
PCT/CN2022/074375 2021-09-30 2022-01-27 一种实现裸金属检查流程的方法、系统、设备和存储介质 WO2023050667A1 (zh)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US18/281,689 US20240155023A1 (en) 2021-09-30 2022-01-27 Method and system for implementing bare metal inspection process, device, and storage medium

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202111155877.4 2021-09-30
CN202111155877.4A CN113612702B (zh) 2021-09-30 2021-09-30 一种实现裸金属检查流程的方法、系统、设备和存储介质

Publications (1)

Publication Number Publication Date
WO2023050667A1 true WO2023050667A1 (zh) 2023-04-06

Family

ID=78343281

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2022/074375 WO2023050667A1 (zh) 2021-09-30 2022-01-27 一种实现裸金属检查流程的方法、系统、设备和存储介质

Country Status (3)

Country Link
US (1) US20240155023A1 (zh)
CN (1) CN113612702B (zh)
WO (1) WO2023050667A1 (zh)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114157639B (zh) * 2021-11-26 2023-07-14 苏州浪潮智能科技有限公司 服务器智能网卡信息采集的方法、装置、设备及可读介质
CN114244703B (zh) * 2022-02-24 2022-05-10 苏州浪潮智能科技有限公司 一种裸金属服务器检查及部署方法、装置、设备、介质

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20200285461A1 (en) * 2020-04-06 2020-09-10 Mohan J. Kumar Microcode(ucode) hot-upgrade method for bare metal cloud deployment
CN111694519A (zh) * 2020-05-29 2020-09-22 北京世纪互联宽带数据中心有限公司 一种裸金属服务器挂载云硬盘的方法、系统及服务器
CN112671578A (zh) * 2020-12-23 2021-04-16 北京浪潮数据技术有限公司 一种sriov虚拟化网络配置方法及相关装置
CN112799776A (zh) * 2020-12-31 2021-05-14 科东(广州)软件科技有限公司 多分区操作系统监控方法、装置、计算设备及存储介质
CN113127008A (zh) * 2019-12-30 2021-07-16 华为技术有限公司 裸金属服务器发放方法及相关装置

Family Cites Families (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103024079B (zh) * 2012-12-31 2015-09-30 华为技术有限公司 获取服务器资源信息的方法、资源池管理系统和服务器
US9596135B1 (en) * 2016-08-31 2017-03-14 Red Hat, Inc. Configuring new nodes for using a storage system managed by a unified storage manager
CN110495136B (zh) * 2017-11-01 2021-11-19 华为技术有限公司 裸金属服务器的硬件属性发现方法和系统
CN109150624A (zh) * 2018-09-14 2019-01-04 郑州云海信息技术有限公司 一种基于sdn的裸机管理方法、装置、服务器及存储介质
CN112395084A (zh) * 2020-10-28 2021-02-23 安擎(天津)计算机有限公司 一种裸金属服务器的部署方法
CN112486522A (zh) * 2020-12-17 2021-03-12 济南浪潮数据技术有限公司 含智能网卡OpenStack裸机的部署方法及装置
US11991077B2 (en) * 2021-03-01 2024-05-21 Juniper Networks, Inc. Data interfaces with isolation for containers deployed to compute nodes
CN112948008B (zh) * 2021-03-02 2023-06-23 浪潮云信息技术股份公司 一种基于Ironic管理物理裸机的方法
CN113419815B (zh) * 2021-05-28 2022-04-22 济南浪潮数据技术有限公司 一种预启动运行环境装机的方法、系统、设备及介质
US12021740B2 (en) * 2021-05-28 2024-06-25 Juniper Networks, Inc. Policy enforcement for bare metal servers by top of rack switches

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113127008A (zh) * 2019-12-30 2021-07-16 华为技术有限公司 裸金属服务器发放方法及相关装置
US20200285461A1 (en) * 2020-04-06 2020-09-10 Mohan J. Kumar Microcode(ucode) hot-upgrade method for bare metal cloud deployment
CN111694519A (zh) * 2020-05-29 2020-09-22 北京世纪互联宽带数据中心有限公司 一种裸金属服务器挂载云硬盘的方法、系统及服务器
CN112671578A (zh) * 2020-12-23 2021-04-16 北京浪潮数据技术有限公司 一种sriov虚拟化网络配置方法及相关装置
CN112799776A (zh) * 2020-12-31 2021-05-14 科东(广州)软件科技有限公司 多分区操作系统监控方法、装置、计算设备及存储介质

Also Published As

Publication number Publication date
CN113612702A (zh) 2021-11-05
US20240155023A1 (en) 2024-05-09
CN113612702B (zh) 2021-12-24

Similar Documents

Publication Publication Date Title
US9825900B2 (en) Overlay tunnel information exchange protocol
US10127055B2 (en) iSCSI based bare metal OS image deployment and diskless boot
US11941423B2 (en) Data processing method and related device
TWI844586B (zh) 具有分解式網路元件的邏輯路由系統及其方法
US9588807B2 (en) Live logical partition migration with stateful offload connections using context extraction and insertion
JP5885834B2 (ja) モバイル・コンピューティング・デバイスを介して管理されたusbサービスをリモートに送達する方法および装置
WO2023050667A1 (zh) 一种实现裸金属检查流程的方法、系统、设备和存储介质
CN113419815B (zh) 一种预启动运行环境装机的方法、系统、设备及介质
EP2843906B1 (en) Method, apparatus, and system for data transmission
CN113452830B (zh) 安卓云手机的批量控制方法、计算机可读介质及电子设备
WO2013049991A1 (en) Network adapter hardware state migration discovery in a stateful environment
TW201738746A (zh) 分析包裝後修復的紀錄與使用的方法及系統
US11924024B2 (en) Switching method and apparatus, device, and storage medium
WO2021174943A1 (zh) 数据转发方法、装置、设备和存储介质
US20230171223A1 (en) Communication Method, CP Device, and NAT Device
US10469402B2 (en) Dynamic endpoint group binding for cross-tenant resource sharing in software defined networks
WO2023000672A1 (zh) 一种网络切换方法、装置及电子设备和存储介质
CN109379239B (zh) 一种OpenStack环境中配置接入交换机的方法及装置
WO2021143183A1 (zh) 一种部署虚拟机的方法及相关装置
CN111130978B (zh) 网络流量转发方法、装置、电子设备及机器可读存储介质
CN110086657B (zh) 一种配置同步方法及装置
CN116132435B (zh) 一种容器云平台的双栈跨节点通信方法和系统
US20220070276A1 (en) Boot server support in an enterprise fabric network
CN112671552A (zh) 一种虚拟化平台智能网卡自动发现方法、系统及设备
US9787529B1 (en) Systems and methods for tunneling socket calls across operating systems

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 22874070

Country of ref document: EP

Kind code of ref document: A1

WWE Wipo information: entry into national phase

Ref document number: 18281689

Country of ref document: US

NENP Non-entry into the national phase

Ref country code: DE