Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Locked resource configuration method based on shared storage

A technology of shared storage and configuration method, applied in the field of cloud storage virtualization, can solve the problems of inability to remove the mapping table, failure to release resources, affecting user experience, etc., to achieve the effect of improving high availability and stability

Active Publication Date: 2018-04-06
无锡地铁集团有限公司 +1
View PDF10 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] However, when the LV is being used, that is, when the cloud hard disk corresponding to the LV is mounted to the virtual machine and is powered on, the LV is still being used at this time, and the mapping table cannot be removed at this time, which will eventually lead to the release of resources. (i.e. LV) fails, the watchdog heartbeat times out, the computing node is reset and shut down, and other virtual machines running on this computing node (such as virtual machines that do not mount LV but mount ceph storage) will also be merged Reset downtime, which severely impacts user-initiated business, which greatly impacts user access to virtual storage, thereby severely impacting user experience

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Locked resource configuration method based on shared storage
  • Locked resource configuration method based on shared storage

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] The present invention will be described in detail below in conjunction with the implementations shown in the drawings, but it should be noted that these implementations are not limitations of the present invention, and those of ordinary skill in the art based on the functions, methods, or structural changes made by these implementations Equivalent transformations or substitutions all fall within the protection scope of the present invention.

[0033] Before elaborating the specific implementation process of the present invention in detail, the names of proprietary technologies involved in the description are defined and explained.

[0034] 1. sanlock: lock service based on shared storage.

[0035] 2. LVM: Logical Volume Manager, Logical Volume Manager.

[0036] 3. Watchdog: Watchdog program for Linux system.

[0037] 4. lvmlockd: LVM lock service component, which calls sanlock service through lvmlockd.

[0038] 5. VG: Volume Group volume group.

[0039] 6. PV: Physi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a locked resource configuration method based on shared storage. The method comprises the steps that a logical volume locking service process calls a Device Mapper mapping tablemanagement tool to prohibit follow-up IO request operations between a volume group and real target equipment, and after IO request operations sent to logical volumes are completed, the real target equipment mapped by the logical volume corresponding to a failure generated by a multi-path data distribution link in a mapping table of the Device Mapper is replaced with pseudo target equipment. According to the method, the phenomenon that all computing nodes are reset and shut down due to the fact that a sanlock triggers a watchdog when the heartbeat of the watchdog is out of time can be avoided,therefore, other virtual machines mounted on the computing nodes are avoided, the phenomenon that the virtual machines mounted with ceph cloud hard disks are forced to suspend responding is avoided,and then the high availability and stability of a cloud platform are improved.

Description

technical field [0001] The invention relates to the technical field of cloud storage virtualization, in particular to a shared storage-based locking resource configuration method in a virtualized storage system in cloud computing. Background technique [0002] As the mainstream storage method in the virtualized storage system in cloud computing, shared storage is mainly used to provide data support for virtual machines (VMs) and upper-layer services, and to manage shared storage by relying on the file system. However, due to the limitation of the performance of the file system itself, the performance of the shared storage provided by the file system is far inferior to that of the block storage. Therefore, the current mainstream open source cloud computing platforms usually use the block storage to manage the shared storage. [0003] In block storage, LVM (Logical Volume Manager, Logical Volume Manager) is usually used, and LVM provides a management mechanism for disks or par...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/08H04L12/24
CPCH04L41/00H04L41/0654H04L67/1097
Inventor 陶杰罗亭马晓峰许广彬郑军郭晓张银滨张欢
Owner 无锡地铁集团有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products