+

WO2019205272A1 - Procédé, dispositif et équipement de fourniture de service de machine virtuelle, et support d'informations lisible par ordinateur - Google Patents

Procédé, dispositif et équipement de fourniture de service de machine virtuelle, et support d'informations lisible par ordinateur Download PDF

Info

Publication number
WO2019205272A1
WO2019205272A1 PCT/CN2018/093149 CN2018093149W WO2019205272A1 WO 2019205272 A1 WO2019205272 A1 WO 2019205272A1 CN 2018093149 W CN2018093149 W CN 2018093149W WO 2019205272 A1 WO2019205272 A1 WO 2019205272A1
Authority
WO
WIPO (PCT)
Prior art keywords
virtual machine
primary
block
information
target
Prior art date
Application number
PCT/CN2018/093149
Other languages
English (en)
Chinese (zh)
Inventor
刘仁仕
Original Assignee
平安科技(深圳)有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 平安科技(深圳)有限公司 filed Critical 平安科技(深圳)有限公司
Publication of WO2019205272A1 publication Critical patent/WO2019205272A1/fr

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • G06F9/45533Hypervisors; Virtual machine monitors
    • G06F9/45558Hypervisor-specific management and integration aspects

Definitions

  • the present application relates to the field of virtual machine technologies, and in particular, to a virtual machine service providing method, apparatus, device, and computer readable storage medium.
  • a primary virtual machine and a standby virtual machine are usually set up. Two virtual machines are mounted on the same virtual block, and the virtual blocks are mounted on the primary virtual machine.
  • the NAS service is provided in the file system, and once the primary virtual machine fails, the standby virtual machine takes over the virtual block to provide the NAS service; while the standby virtual machine is in the process of taking over, the primary virtual machine may still write to the virtual block, two virtual The machine writes to the same virtual block.
  • file system data may overlap each other, resulting in the file system being damaged and the user data being lost in the virtual block.
  • the main purpose of the present application is to provide a virtual machine service providing method, apparatus, device, and computer readable storage medium, which are intended to solve the problem of the prior art in the virtual machine providing service, the primary virtual machine and the standby virtual machine pair virtual block double Write, causing problems with file system corruption and loss of user data.
  • the present application provides a virtual machine service providing method, where the virtual machine service providing method includes the following steps:
  • the present application further provides a virtual machine service providing apparatus, where the virtual machine service providing apparatus includes:
  • An allocating module configured to receive a lock request sent by the primary virtual machine, read the lock information in the lock request, and allocate a pair to the primary virtual machine according to the virtual block information in the lock information An exclusive right of the target virtual block corresponding to the virtual block information, for the primary virtual device to provide a service;
  • a determining module configured to determine, according to the primary virtual machine information in the takeover request, the primary virtual machine to be taken over when receiving the takeover request sent by the standby virtual machine;
  • a transfer module configured to transfer exclusive rights of the host virtual machine to be taken over the target virtual block to the standby virtual machine, to provide services for the standby virtual machine.
  • the present application further provides a virtual machine service providing device, where the virtual machine service providing device includes: a memory, a processor, a communication bus, and a virtual machine service provider stored on the memory;
  • the communication bus is used to implement connection communication between a processor and a memory
  • the processor is configured to execute the virtual machine service provider to implement the following steps:
  • the present application also provides a computer readable storage medium storing one or more programs, the one or more programs being configurable by one or more processors Execute for:
  • the virtual machine service providing method of the embodiment when receiving the locking request sent by the primary virtual machine, reads the locking information in the locking request, and according to the virtual block information in the locking information, to the primary virtual machine. Allocating exclusive rights to the target virtual block corresponding to the virtual block information to be served by the primary virtual machine; and when receiving the takeover request sent by the standby virtual machine, determining, according to the primary virtual machine information in the takeover request, The takeover of the primary virtual machine; and transferring the exclusive authority of the primary virtual machine to be taken to the target virtual block to the standby virtual machine for the standby virtual machine to provide services.
  • the scheme allocates exclusive rights to the target virtual block to the primary virtual machine before the service is provided by the primary virtual machine, and only the primary virtual machine can write to the target virtual block; when the service provision is converted from the primary virtual machine to the standby virtual machine Correspondingly, the exclusive permission of the target virtual block is transferred to the standby virtual machine, and only the standby virtual machine can write to the target virtual block; by setting an exclusive permission mechanism for the target virtual block, it is ensured that only the primary virtual machine providing the service at the same time Or backup to write to the target virtual block to avoid file system corruption.
  • FIG. 1 is a schematic flowchart of a first embodiment of a virtual machine service providing method according to the present application
  • FIG. 2 is a schematic flowchart of a second embodiment of a virtual machine service providing method according to the present application
  • FIG. 3 is a schematic flowchart of a third embodiment of a virtual machine service providing method according to the present application.
  • FIG. 4 is a schematic flowchart of a fourth embodiment of a virtual machine service providing method according to the present application.
  • FIG. 5 is a schematic diagram of functional modules of a first embodiment of a virtual machine service providing apparatus according to the present application.
  • FIG. 6 is a schematic structural diagram of a device in a hardware operating environment involved in a method according to an embodiment of the present application.
  • the application provides a virtual machine service providing method.
  • FIG. 1 is a schematic flowchart diagram of a first embodiment of a virtual machine service providing method according to the present application.
  • the virtual machine service providing method includes:
  • Step S10 Receive a lock request sent by the primary virtual machine, read the lock information in the lock request, and allocate the pair to the primary virtual machine according to the virtual block information in the lock information.
  • the virtual machine service providing method of the present application is applied to a virtual machine cluster, and the virtual machine cluster allocates exclusive rights of the virtual block to the currently provided virtual machine; the exclusive right exists in the form of an exclusive lock, and the currently provided virtual machine (VM, VMWare is the primary virtual machine, and the virtual block with exclusive permission of the primary virtual machine is the target virtual block.
  • the primary virtual machine and the target virtual block are locked by an exclusive lock, indicating that the primary virtual block has exclusive rights to the target virtual block, and only the primary virtual machine can write to the target virtual block.
  • the lock request for adding the exclusive lock is sent to the virtual machine cluster, and the lock request is passed through the supervision center corresponding to the primary virtual machine (VMM, Virtual). Machine Monitor) delivery.
  • the supervisory center is used to implement the normal operation of the virtual machine, including planning, deployment, and optimization.
  • a preset layer is set between the main virtual machine and the supervision center, and the preset layer is specifically virtio.
  • Ring the primary virtual machine writes a lock request to virtio as a preset layer
  • the ring the supervisory center corresponding to the primary virtual machine reads the lock request from the preset layer and transmits it to the virtual machine cluster.
  • the locking request includes locking information indicating the virtual blocks and virtual machines that need to be locked.
  • the virtual machine cluster receives the lock request sent by the primary virtual machine, the lock information is read, and the virtual block information in the lock information represents the information that the virtual block needs to lock.
  • This virtual block information may include a virtual block identifier indicating a specific virtual block that is locked, and a virtual block space size indicating a storage space that the locked virtual block has.
  • the virtual block that needs to be locked can be determined, the virtual block that needs to be locked is determined as the target virtual block, and the exclusive right of the target virtual block corresponding to the virtual block information is allocated to The primary virtual machine, which locks the primary virtual machine and the target virtual block. After that, the primary virtual machine mounts the target virtual block to the file system, and the host virtual machine provides NAS (network). Attached storage, network attached storage) service.
  • Step S20 when receiving the takeover request sent by the standby virtual machine, determining the primary virtual machine to be taken over according to the primary virtual machine information in the takeover request;
  • the external virtual service may be interrupted due to the failure of the primary virtual machine itself, and at least one of the primary virtual machines is provided to avoid interruption of the externally provided service.
  • a standby virtual machine If the primary virtual machine that provides the service fails, any standby virtual machine is started, and the standby virtual machine takes over the current service.
  • a network connection is established between the primary virtual machine and each of the standby virtual machines. When the primary virtual machine fails, each standby virtual machine can be monitored. When each standby virtual machine detects that the primary virtual machine is faulty, it sends a takeover request to the virtual machine cluster, and the takeover request is delivered through the supervisory center corresponding to the standby virtual machine.
  • multiple standby virtual machines may send takeover requests to the virtual machine cluster.
  • the time priority mechanism is set, that is, the standby virtual machine that first sends the takeover request to the virtual machine cluster is valid. Alternate virtual machine. Or being monitored by the virtual machine cluster.
  • the virtual machine cluster detects that the primary virtual machine fails, the message that the primary virtual machine fails is broadcasted to each standby virtual machine in the virtual machine cluster; each standby virtual machine The machine sends a takeover request to the virtual machine cluster.
  • the time priority mechanism is also adopted.
  • the standby virtual machine that first sends the takeover request to the virtual machine cluster is a valid standby virtual machine.
  • the faulty primary virtual machine information is read as long as the primary virtual machine fails.
  • the primary virtual machine information is added to the takeover request to determine the faulty primary virtual machine according to the virtual machine information carried in the takeover request, and the failed primary virtual machine is the standby host that needs to be taken over by the standby virtual machine. virtual machine.
  • the primary virtual machine a establishes a network connection with the standby virtual machines a1, a2. When a1, a2 detects that a fails, reads a information a3, and adds a3 to the takeover request.
  • the main virtual machine when the primary virtual machine a is detected to be faulty, the information a3 of a is read, and a3 is transmitted as a broadcast message to each of the standby virtual machines; each of the standby virtual machines is After receiving the broadcast message, add a3 to the takeover request and send it to the virtual machine cluster; the virtual machine cluster determines the primary virtual machine a to be taken over according to a3 in the received takeover request.
  • Step S30 Transfer the exclusive right of the primary virtual machine to be taken over the target virtual block to the standby virtual machine, so that the standby virtual machine provides a service.
  • the service currently provided by the primary virtual machine to be taken over needs to be switched to the standby virtual machine, and the standby virtual machine provides the service. Because the primary virtual machine to be taken over and the target virtual block are locked, the primary virtual machine to be taken over can only be served by the primary virtual machine to be taken over.
  • the exclusive virtual machine to be taken over by the primary virtual machine must be transferred to the standby virtual virtual machine. machine.
  • the standby virtual machine is locked to the target virtual block, giving the standby virtual machine exclusive rights to the target virtual block.
  • the virtual machine cluster first unlocks the lock between the primary virtual machine and the target virtual block to be taken over, and then locks the standby virtual machine and the target virtual block to provide services by the standby virtual machine.
  • the virtual machine service providing method of the embodiment when receiving the locking request sent by the primary virtual machine, reads the locking information in the locking request, and according to the virtual block information in the locking information, to the primary virtual machine. Allocating exclusive rights to the target virtual block corresponding to the virtual block information to be served by the primary virtual machine; and when receiving the takeover request sent by the standby virtual machine, determining, according to the primary virtual machine information in the takeover request, The takeover of the primary virtual machine; and transferring the exclusive authority of the primary virtual machine to be taken to the target virtual block to the standby virtual machine for the standby virtual machine to provide services.
  • the scheme allocates exclusive rights to the target virtual block to the primary virtual machine before the service is provided by the primary virtual machine, and only the primary virtual machine can write to the target virtual block; when the service provision is converted from the primary virtual machine to the standby virtual machine Correspondingly, the exclusive permission of the target virtual block is transferred to the standby virtual machine, and only the standby virtual machine can write to the target virtual block; by setting an exclusive permission mechanism for the target virtual block, it is ensured that only the primary virtual machine providing the service at the same time Or backup to write to the target virtual block to avoid file system corruption.
  • the step of assigning the primary virtual machine exclusive rights to the target virtual block corresponding to the virtual block information includes:
  • step S11 it is determined whether there is another virtual machine exclusive tag in the target virtual block corresponding to the virtual block information, and if the other virtual machine exclusive tag exists in the target virtual block, it is determined that the primary virtual machine is allocated to the primary virtual machine.
  • the target virtual block exclusive authority fails;
  • the exclusive permission of the virtual machine to the virtual block is implemented by an exclusive label
  • the exclusive label is a label related to the virtual machine and representing the uniqueness of the virtual machine.
  • the virtual machine's exclusive label is added to the virtual block to characterize the virtual machine's exclusive use of the virtual block. Considering that when a virtual machine is requesting exclusive use of a virtual block, it is possible that the virtual block has been locked with other virtual machines, that is, its exclusive rights are already owned by other virtual machines.
  • the present embodiment determines whether there is another virtual machine exclusive tag in the target virtual block corresponding to the virtual block information, that is, determining the target virtual block. Whether exclusive privileges are occupied by other virtual machines. When it is determined that there is another virtual machine exclusive label in the target virtual block, it indicates that the exclusive right of the target virtual block is occupied by other virtual machines, and the target virtual block exclusive right cannot be allocated to the primary virtual machine, and the target is allocated to the primary virtual machine. Virtual block exclusive permissions failed.
  • Step S12 If the other virtual machine exclusive label does not exist in the target virtual block, add an exclusive label of the primary virtual machine to the target virtual block, to allocate the target virtual to the primary virtual machine. Exclusive rights to the block.
  • the exclusive right of the target virtual block when it is determined that there is no other virtual machine exclusive label in the target virtual block, it indicates that the exclusive right of the target virtual block is not occupied by other virtual machines, and the exclusive right of the target virtual block may be allocated to the primary virtual machine. . Thereby, the exclusive tag of the primary virtual machine is added to the target virtual block, the primary virtual machine and the target virtual block are locked, and the primary virtual machine is assigned exclusive rights to the target virtual block.
  • the step of transferring the exclusive authority of the to-be-taken primary virtual machine to the target virtual block to the standby virtual machine includes:
  • Step S31 erasing the exclusive label of the primary virtual machine to be taken over in the target virtual block, to release the exclusive authority of the primary virtual machine to be taken over to the target virtual block;
  • the exclusive right of the virtual machine to the virtual block is implemented by an exclusive label, so that the exclusive right transfer can be performed by the exclusive label operation.
  • the transfer operation is performed by first releasing the lock between the primary virtual machine to be taken over and the target virtual block, and then locking the standby virtual machine and the target virtual block.
  • the exclusive label of the primary virtual machine to be taken over in the target virtual block is first erased to release the exclusive authority of the target virtual virtual machine to the exclusive virtual block.
  • Step S32 adds an exclusive label of the standby virtual machine to the target virtual block to transfer the exclusive authority of the to-be-taken primary virtual machine to the target virtual block to the standby virtual machine.
  • the target virtual block does not have an exclusive tag of any virtual machine, and its exclusive permission is not occupied. Therefore, the exclusive virtual machine's exclusive label can be added to the target virtual block, the standby virtual machine and the target virtual block are locked, and the standby virtual machine is assigned exclusive rights to the target virtual block, thereby realizing the virtual virtual machine to be taken over to the target virtual virtual machine. The exclusive right of the block is transferred to the standby virtual machine.
  • the receiving Before the steps to the takeover request sent by the standby virtual machine include:
  • Step S40 when receiving the abnormality log uploaded by the primary virtual machine, determining, according to the service information in the abnormality log, a service type label currently provided by the primary virtual machine;
  • a log uploading mechanism is set between the primary virtual machine and the virtual machine cluster, and the primary virtual machine uploads a log file of its own running state to the virtual machine cluster.
  • the log file includes an exception log that identifies the failure of the primary virtual machine, and the exception log is distinguished by the generated exception tag.
  • the VM cluster receives the log file and reads the log file that contains the abnormal tag, it indicates that the abnormal log uploaded by the primary VM is received. If the primary VM fails, you need to use the standby VM to service the VM. take over. Considering that the services currently provided by the primary virtual machine have their own requirements, such as requiring better display functions and faster read and write speeds.
  • the primary virtual machine fails, the virtual machine with the closest matching performance is taken over as the standby virtual machine according to the service demand it currently provides.
  • the service information of the service currently provided by the primary virtual machine is generated to generate an abnormality log, so as to determine the requirement of the service currently provided by the primary virtual machine according to the service information in the abnormality log.
  • the service information includes information about the type of the service currently provided, the amount of users accessing the service, and the virtual machine cluster reads the service requirements represented by the service information in the abnormal log, according to the service requirements and service types preset therein.
  • the correspondence between the tags determines the service type tag currently provided by the primary virtual machine.
  • the service requirements represented by the service information are: download speed and large amount of users; and the service type labels corresponding to the service requirements are a1 and a2, and the service types currently provided by the primary virtual machine are labeled as a1 and a2.
  • Step S50 Match the service type label and the attribute label of each virtual machine to generate each matching rate, and determine a target matching rate with the largest value among the respective matching rates;
  • different performances of different virtual machines in the virtual machine cluster are determined by attribute tags; if a virtual machine has faster upload performance and display performance, its attribute labels are b1 and c1; and another virtual The performance of the machine is faster download speed and display performance, then its attribute labels are a1 and c1.
  • the service type label and the attribute label of each virtual machine are matched to determine the virtual machine that most closely matches the current service requirement. Because there are multiple virtual machines in the virtual machine cluster, you need to match the service type label and the attribute labels of each virtual machine one by one to generate each matching rate. After each matching rate is generated, the values of the matching rates are compared to determine the maximum value in the matching rate values. The match rate for this maximum indicates that the virtual machine performance best matches the current service demand and is determined as the target match rate.
  • Step S60 determining an attribute tag corresponding to the target matching rate, and determining a virtual machine having the attribute tag as a standby virtual machine, and sending prompt information to the standby virtual machine, where the standby virtual machine is prompted according to the prompt
  • the message is sent to take over the request.
  • the matching rate is generated by matching the service type tag with the attribute tag of each virtual machine
  • the attribute tag of the virtual machine that generates the target matching rate can be determined, and the virtual tag with the attribute tag is The machine is determined to be a standby virtual machine.
  • the performance of the standby virtual machine is the best match with the current service requirement, and the prompt information is sent to the prompt, and the prompt information includes the faulty primary virtual machine information.
  • the standby virtual machine sends a takeover request to the virtual machine cluster according to the prompt information, and adds the primary virtual machine information in the prompt information to the takeover request to represent the primary virtual machine that it needs to take over.
  • the method includes:
  • Step S70 Receive a log file uploaded by the primary virtual machine, and determine, according to the log file, whether abnormal information in the abnormal log returns to normal.
  • the failure point of the primary virtual machine needs to be optimized.
  • the primary virtual machine still uploads its own running state generation log file to the virtual machine cluster.
  • the virtual machine cluster receives the log file uploaded by the primary virtual machine, and detects whether the abnormality log is included in the uploaded log file, that is, whether the abnormality label is carried in the log file, and whether the abnormal information in the abnormal log is restored according to the detection result. Normal, that is, whether the fault of the primary virtual machine is restored.
  • Step S80 If the abnormality information in the abnormality log returns to normal, the primary virtual machine is regarded as a new standby virtual machine.
  • the abnormality log is not included in the log file.
  • the abnormal information in the abnormal log is restored. That is, the fault of the primary VM is restored.
  • the primary virtual machine is used as the new standby virtual machine. machine. This new standby virtual machine can be used for service takeover when the standby virtual machine currently providing the service fails.
  • the abnormality label is still included in the log file, the abnormality log is included in the log file.
  • the abnormal information in the abnormal log is not restored. That is, the fault of the primary virtual machine is not restored.
  • the primary virtual machine cannot be used as the new one.
  • the standby virtual machine until the exception information in the exception log returns to normal.
  • the step of assigning the primary virtual machine exclusive rights to the target virtual block corresponding to the virtual block information includes:
  • Step S90 reading the primary virtual machine identifier in the locking request, and adding the primary virtual machine identifier to the preset identifier library;
  • the virtual machine cluster includes a large number of primary virtual machines to provide different services through different primary virtual machines.
  • a preset identification library is preset, and each primary virtual machine is assigned a primary virtual machine identifier that is unique.
  • the lock request sent by the primary virtual machine carries a primary virtual machine identifier that identifies the source of the lock request, and after the exclusive virtual machine is assigned exclusive rights to the target virtual block corresponding to the virtual block information, the lock request is read.
  • the primary virtual machine ID in the middle, and the read primary virtual machine ID is added to the preset identity database to indicate that the primary virtual machine corresponding to the primary virtual machine identifier is providing services.
  • the corresponding primary virtual machine identifier needs to be deleted from the preset identifier library; and the identifier of the standby virtual machine that takes over the primary virtual machine is added to the preset identifier library, Set the identity library to update.
  • the takeover request when receiving the takeover request sent by the standby virtual machine, the takeover request carries the primary virtual machine information that represents the primary virtual machine that needs to be taken over, that is, according to the primary virtual machine information in the takeover request, the pending takeover can be determined.
  • the main virtual machine its specific steps include:
  • Step S20-1 comparing the primary virtual machine information in the takeover request with the preset identifier database, determining a primary virtual machine identifier in the preset identifier database that is consistent with the primary virtual machine information, and using the primary virtual machine identifier The primary virtual machine corresponding to the identifier is determined as the primary virtual machine to be taken over.
  • the takeover request is sent to the virtual machine cluster, and the takeover request carries the information of the primary virtual machine that needs to be taken over.
  • the information of the primary virtual machine is read, and the information of the primary virtual machine that is read is compared with the preset identification database. Because all the primary virtual machine identifiers of the currently provided service exist in the preset identifier database, the preset identifier library is inevitable. There is a primary virtual machine ID that is consistent with the information of the primary virtual machine.
  • the primary virtual machine corresponding to the primary virtual machine identifier is the primary virtual machine that has the takeover requirement.
  • the primary virtual machine is determined to be the primary virtual machine to be taken over, so that the subsequent virtual machine cluster can remove the exclusive right of the target virtual block and add it to the standby virtual machine, that is, the virtual virtual machine to be taken over is targeted to the target virtual machine.
  • the exclusive right of the block is transferred to the standby virtual machine.
  • the present application provides a virtual machine service providing apparatus.
  • the virtual machine service providing apparatus includes:
  • the allocating module 10 is configured to receive a lock request sent by the primary virtual machine, read the lock information in the lock request, and allocate the virtual lock information to the primary virtual machine according to the virtual block information in the lock information. Exclusive rights to the target virtual block corresponding to the virtual block information, for the primary virtual device to provide a service;
  • the determining module 20 is configured to determine, according to the primary virtual machine information in the takeover request, the primary virtual machine to be taken over when receiving the takeover request sent by the standby virtual machine;
  • the transfer module 30 is configured to transfer the exclusive authority of the primary virtual machine to be taken over the target virtual block to the standby virtual machine, so that the standby virtual machine provides a service.
  • the virtual machine service providing apparatus of the embodiment when receiving the lock request sent by the primary virtual machine, the allocation module 10 reads the lock information in the lock request, and according to the virtual block information in the lock information, The primary virtual machine allocates exclusive rights to the target virtual block corresponding to the virtual block information to be served by the primary virtual machine; and when receiving the takeover request sent by the standby virtual machine, the determining module 20 is based on the primary in the takeover request The virtual machine information determines the primary virtual machine to be taken over; the transfer module 30 transfers the exclusive authority of the primary virtual machine to be taken over the target virtual block to the standby virtual machine for the standby virtual machine to provide the service.
  • the scheme allocates exclusive rights to the target virtual block to the primary virtual machine before the service is provided by the primary virtual machine, and only the primary virtual machine can write to the target virtual block; when the service provision is converted from the primary virtual machine to the standby virtual machine Correspondingly, the exclusive permission of the target virtual block is transferred to the standby virtual machine, and only the standby virtual machine can write to the target virtual block; by setting an exclusive permission mechanism for the target virtual block, it is ensured that only the primary virtual machine providing the service at the same time Or backup to write to the target virtual block to avoid file system corruption.
  • the allocating module includes:
  • a determining unit configured to determine whether there is another virtual machine exclusive label in the target virtual block corresponding to the virtual block information, and if the other virtual machine exclusive label exists in the target virtual block, determining to the primary virtual machine Assigning the target virtual block exclusive permission fails;
  • the transfer module includes:
  • a releasing unit configured to erase an exclusive label of the primary virtual machine to be taken over in the target virtual block, to release the exclusive authority of the primary virtual machine to be taken over to the target virtual block;
  • a transfer unit configured to add an exclusive label of the standby virtual machine to the target virtual block, to transfer the exclusive authority of the to-be-taken primary virtual machine to the target virtual block to the standby virtual machine.
  • the virtual machine service providing apparatus further includes:
  • a receiving module configured to determine, according to service information in the abnormality log, a service type label currently provided by the primary virtual machine, when receiving an abnormality log uploaded by the primary virtual machine;
  • a matching module configured to match the service type label and the attribute label of each virtual machine, generate each matching rate, and determine a target matching rate with the largest value among the matching rates
  • a sending module configured to determine an attribute label corresponding to the target matching rate, and determine a virtual machine having the attribute label as a standby virtual machine, and send prompt information to the standby virtual machine for the standby virtual machine Send a takeover request based on the prompt information.
  • the virtual machine service providing apparatus further includes:
  • a determining module configured to receive a log file uploaded by the primary virtual machine, and determine, according to the log file, whether abnormal information in the abnormal log returns to normal;
  • a setting module configured to: if the abnormal information in the abnormality log returns to normal, use the primary virtual machine as a new standby virtual machine.
  • the virtual machine service providing apparatus further includes:
  • a reading module configured to read the primary virtual machine identifier in the locking request, and add the primary virtual machine identifier to the preset identifier library;
  • the determining module includes:
  • a determining unit configured to compare the primary virtual machine information in the takeover request with a preset identifier database, determine a primary virtual machine identifier in the preset identifier database that is consistent with the primary virtual machine information, and use the primary virtual machine identifier The primary virtual machine corresponding to the identifier is determined as the primary virtual machine to be taken over.
  • the allocating module includes:
  • a receiving unit configured to receive a lock request sent by the primary virtual machine, where the lock request is written by the primary virtual machine to a preset layer, and then the preset corresponding to the primary virtual machine from the preset The layer is read and passed through the regulatory center.
  • the above-mentioned storage medium may be a read only memory, a magnetic disk or an optical disk or the like.
  • FIG. 6 is a schematic structural diagram of a device in a hardware operating environment involved in a method according to an embodiment of the present application.
  • the virtual machine service providing device in the embodiment of the present application may be a PC, or may be a terminal device such as a smart phone, a tablet computer, an e-book reader, or a portable computer.
  • the virtual machine service providing device may include a processor 1001, such as a CPU, a memory 1005, and a communication bus 1002.
  • the communication bus 1002 is used to implement connection communication between the processor 1001 and the memory 1005.
  • the memory 1005 may be a high speed RAM memory or a stable memory (non-volatile) Memory), such as disk storage.
  • the memory 1005 can also optionally be a storage device independent of the aforementioned processor 1001.
  • the virtual machine service providing device may further include a user interface, a network interface, a camera, and an RF (Radio). Frequency, RF) circuits, sensors, audio circuits, WiFi modules, and more.
  • the user interface may include a display, an input unit such as a keyboard, and the optional user interface may also include a standard wired interface, a wireless interface.
  • the network interface can optionally include a standard wired interface or a wireless interface (such as a WI-FI interface).
  • the virtual machine service providing device structure shown in FIG. 6 does not constitute a limitation of the virtual machine service providing device, and may include more or less components than those illustrated, or combine some components. Or different parts arrangement.
  • an operating system may be included in the memory 1005 as a computer-readable storage medium.
  • An operating system is a program that manages and controls virtual machine services to provide device hardware and software resources, and supports the operation of virtual machine service providers and other software and/or programs.
  • the network communication module is used to implement communication between components within the memory 1005 and with other hardware and software in the virtual machine service providing device.
  • the processor 1001 is configured to execute the virtual machine service provider stored in the memory 1005, and implement the steps in the foregoing embodiments of the virtual machine service providing method.
  • the application provides a computer readable storage medium storing one or more programs, the one or more programs being further executable by one or more processors for implementing the above
  • the virtual machine service provides the steps in the various embodiments of the method.
  • portions of the technical solution of the present application that contribute substantially or to the prior art may be embodied in the form of a software product stored in a computer readable storage medium as described above (eg, The ROM/RAM, the magnetic disk, and the optical disk include a plurality of instructions for causing a terminal device (which may be a mobile phone, a computer, a server, or a network device, etc.) to execute the method described in the various embodiments of the present application.
  • a terminal device which may be a mobile phone, a computer, a server, or a network device, etc.

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Hardware Redundancy (AREA)

Abstract

La présente invention concerne un procédé, un dispositif et un équipement de fourniture de service de machine virtuelle, et un support d'informations lisible par ordinateur. Le procédé consiste : à recevoir une demande de verrouillage envoyée par une machine virtuelle principale, à lire les informations de verrouillage dans la demande de verrouillage et à attribuer à la machine virtuelle principale les droits exclusifs à un bloc virtuel cible correspondant aux informations de bloc virtuel de façon à permettre à la machine virtuelle principale de fournir un service ; lors de la réception d'une demande de prise en charge envoyée par une machine virtuelle de secours, à déterminer une machine virtuelle principale à prendre en charge selon les informations de machine virtuelle principale dans la demande de prise en charge ; à transférer, de la machine virtuelle principale à prendre en charge à la machine virtuelle de secours, les droits exclusifs au bloc virtuel cible de façon à permettre à la machine virtuelle de secours de fournir un service. Dans ladite solution technique, un mécanisme de droit exclusif est réglé sur le bloc virtuel cible pour s'assurer que seule la machine virtuelle principale ou le service de fourniture de machine virtuelle de secours puisse mener une opération d'écriture sur bloc virtuel cible au même instant, ce qui peut empêcher un endommagement du système de fichiers.
PCT/CN2018/093149 2018-04-27 2018-06-27 Procédé, dispositif et équipement de fourniture de service de machine virtuelle, et support d'informations lisible par ordinateur WO2019205272A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201810397142.4A CN108614728A (zh) 2018-04-27 2018-04-27 虚拟机服务提供方法、装置、设备及计算机可读存储介质
CN201810397142.4 2018-04-27

Publications (1)

Publication Number Publication Date
WO2019205272A1 true WO2019205272A1 (fr) 2019-10-31

Family

ID=63661178

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2018/093149 WO2019205272A1 (fr) 2018-04-27 2018-06-27 Procédé, dispositif et équipement de fourniture de service de machine virtuelle, et support d'informations lisible par ordinateur

Country Status (2)

Country Link
CN (1) CN108614728A (fr)
WO (1) WO2019205272A1 (fr)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112306762A (zh) * 2020-10-30 2021-02-02 西安万像电子科技有限公司 通信处理方法、装置及系统、非易失性存储介质

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111142777A (zh) * 2018-11-03 2020-05-12 广州市明领信息科技有限公司 一种大数据存储系统
CN109814979B (zh) * 2018-12-17 2021-03-30 华为技术有限公司 数据加载方法、装置、计算机设备以及可读存储介质
CN112181593A (zh) * 2020-09-27 2021-01-05 北京首都在线科技股份有限公司 虚拟机调度方法、装置、设备及存储介质
CN112527205B (zh) * 2020-12-16 2024-12-06 江苏国科微电子有限公司 一种数据安全防护方法、装置、设备及介质

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102063338A (zh) * 2010-12-28 2011-05-18 华为技术有限公司 一种请求独占资源的方法及装置
CN103309698A (zh) * 2012-03-16 2013-09-18 鸿富锦精密工业(深圳)有限公司 虚拟机内存管理系统及方法
US20140173595A1 (en) * 2012-12-17 2014-06-19 International Business Machines Corporation Hybrid virtual machine configuration management
CN107391224A (zh) * 2017-06-09 2017-11-24 华为技术有限公司 一种虚拟卷的创建方法、挂载方法及装置
CN107402820A (zh) * 2017-08-10 2017-11-28 郑州云海信息技术有限公司 云计算系统中资源的管理方法和装置
CN107526653A (zh) * 2017-07-31 2017-12-29 华为技术有限公司 一种虚拟机的管理方法和服务器

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7181744B2 (en) * 2002-10-24 2007-02-20 International Business Machines Corporation System and method for transferring data between virtual machines or other computer entities
CN103338241B (zh) * 2013-06-19 2016-08-10 合肥工业大学 一种新的公有云架构及其虚拟化资源自适应配置方法
CN104281496B (zh) * 2014-10-27 2018-02-02 深圳中兴网信科技有限公司 虚拟资源的分配方法及分配装置
CN107704314B (zh) * 2017-11-09 2023-09-12 北京百度网讯科技有限公司 用于迁移虚拟机的方法和装置

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102063338A (zh) * 2010-12-28 2011-05-18 华为技术有限公司 一种请求独占资源的方法及装置
CN103309698A (zh) * 2012-03-16 2013-09-18 鸿富锦精密工业(深圳)有限公司 虚拟机内存管理系统及方法
US20140173595A1 (en) * 2012-12-17 2014-06-19 International Business Machines Corporation Hybrid virtual machine configuration management
CN107391224A (zh) * 2017-06-09 2017-11-24 华为技术有限公司 一种虚拟卷的创建方法、挂载方法及装置
CN107526653A (zh) * 2017-07-31 2017-12-29 华为技术有限公司 一种虚拟机的管理方法和服务器
CN107402820A (zh) * 2017-08-10 2017-11-28 郑州云海信息技术有限公司 云计算系统中资源的管理方法和装置

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112306762A (zh) * 2020-10-30 2021-02-02 西安万像电子科技有限公司 通信处理方法、装置及系统、非易失性存储介质

Also Published As

Publication number Publication date
CN108614728A (zh) 2018-10-02

Similar Documents

Publication Publication Date Title
WO2019205272A1 (fr) Procédé, dispositif et équipement de fourniture de service de machine virtuelle, et support d'informations lisible par ordinateur
WO2017088664A1 (fr) Procédé et appareil de traitement de données destinés à un système de fichiers en grappes
WO2017190450A1 (fr) Procédé et appareil de clôture de processus
WO2018028121A1 (fr) Procédé et dispositif de gestion de l'espace de stockage d'une partition de données
WO2013131444A1 (fr) Procédé, terminal, serveur et système de partage de contenu et support de stockage informatique
WO2018233370A1 (fr) Procédé, système, dispositif et support de stockage lisible par ordinateur de synchronisation d'une image
WO2018053963A1 (fr) Procédé et appareil de mise à niveau d'un système de téléviseur intelligent
WO2021157934A1 (fr) Appareil et procédé de génération de tranche de réseau dans un système de communication sans fil
WO2018076812A1 (fr) Procédé et dispositif de réponse à une demande de données, support de stockage, serveur et système
WO2018120680A1 (fr) Système de sauvegarde de disque virtuel, procédé, appareil, hôte de service et support d'enregistrement
WO2015106497A1 (fr) Procédé dynamique de mappage équilibré d'interruption en fonction d'un état de programmation de vcpu en cours
WO2018040421A1 (fr) Procédé, appareil et système de partage de ressources
WO2018233369A1 (fr) Procédé d'écriture basé sur la copie sur écriture et dispositif de disque virtuel, et support de stockage
WO2018076829A1 (fr) Serveur, support d'informations, système, appareil et procédé de traitement de données de terminal
WO2018076811A1 (fr) Dispositif électronique, support d'informations, système, dispositif et procédé de partage de données
WO2018014567A1 (fr) Procédé servant à améliorer les performances d'une machine virtuelle, et terminal, dispositif et support de stockage lisible par ordinateur
WO2017063366A1 (fr) Procédé et système de lancement d'une application
WO2019062109A1 (fr) Procédé de montage d'un réseau de disques, dispositif android et support de stockage
WO2019127869A1 (fr) Procédé, appareil et dispositif de collecte d'informations de vulnérabilité, et support de stockage lisible
WO2023033588A1 (fr) Système de commande de flux de données dans un terminal de virtualisation, et procédé associé
WO2018076872A1 (fr) Procédé et appareil de sauvegarde de données, support de stockage et serveur
WO2018161588A1 (fr) Procédé, appareil, support de stockage et dispositif électronique d'ajustement de file d'attente de récepteur de diffusion
WO2019080401A1 (fr) Procédé et appareil de conversion d'instruction de script, et support de stockage lisible par ordinateur
WO2020101211A1 (fr) Appareil électronique et son procédé de commande
WO2017219636A1 (fr) Procédé d'échange de données, serveur en nuage et terminal intelligent

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 18916162

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 03.02.2021)

122 Ep: pct application non-entry in european phase

Ref document number: 18916162

Country of ref document: EP

Kind code of ref document: A1

点击 这是indexloc提供的php浏览器服务,不要输入任何密码和下载