Multi-path equipment shielding system, method and equipment and readable storage medium

A shielding system and multi-path technology, applied in the field of network storage, can solve the problems of difficult maintenance, misoperation, and inability to be added to the blacklist fixedly, so as to reduce the complexity of operation and maintenance, and reduce the possibility of misoperation and the steps Simple and efficient effects

Inactive Publication Date: 2020-06-16
INSPUR SUZHOU INTELLIGENT TECH CO LTD
View PDF3 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Local disks generally have fixed device names such as sda, sdb, and sdc. It is easier to add to the blacklist, but removable hard disks, U disks and other randomly plugged block devices have different device names due to different plugging times. change, so cannot be permanently blacklisted
[0004] At present, the maintenance of multi-path is generally solved by logging in through serial ports, SSH, etc., which not only opens the debugging port for the need, reduces the security of the business server system, but also puts forward higher requirements for the professional knowledge of the operating technicians. It is extremely difficult; if you add multi-path blacklist at the same time, it may lead to misoperation and affect the normal operation of the business

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multi-path equipment shielding system, method and equipment and readable storage medium
  • Multi-path equipment shielding system, method and equipment and readable storage medium
  • Multi-path equipment shielding system, method and equipment and readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0045] At present, the maintenance of multi-path is generally solved by logging in through serial ports, SSH, etc., which not only opens the debugging port for the need, reduces the security of the business server system, but also puts forward higher requirements for the professional knowledge of the operating technicians. It is extremely difficult; if you add multi-path blacklists at the same time, it may cause misoperation and affect the normal operation of t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a multipath equipment shielding system, method and equipment and a readable storage medium, and the system comprises a message monitoring module which is used for detecting whether a block equipment insertion message appears in a system message or not; if yes, triggering a block equipment monitoring module; a block equipment detection module which is used for judging whether block equipment corresponding to the block equipment insertion message is target block equipment or not, and if so, triggering the blacklist action module, wherein the target block equipment is specifically random plugging block equipment or a block equipment whose physical link protocol is a to-be-shielded protocol; and a blacklist action module which is used for adding the equipment information of the target block equipment into a multi-path blacklist. According to the application, the targets of automatically monitoring information, judging whether the target block equipment is the targetblock equipment and adding the equipment name of the target block equipment into the multi-path blacklist are realized, the steps are simple and efficient, the operation and maintenance complexity isreduced, and the possibility of misoperation and the security risk of the system are reduced.

Description

technical field [0001] The invention relates to the field of network storage, in particular to a multipath device shielding system, method, device and readable storage medium. Background technique [0002] Currently, on the Linux operating system platform, the multipath technology based on Device Mapper is applied. The multipathing architecture on this platform uses multipathing at the top level by creating a virtual device that includes block devices built by hardware subsystems. Multipath-tools is a tool used by the Linux platform to configure multipath support for storage devices. Its function is to configure the Linux kernel module device-mapper to implement multipath support for storage devices. The traditional multipath-tools tool supports the blacklist function, that is, for block devices in the unsupported list (blacklist, also known as multipath blacklist), multipath-tools will ignore it and will not perform the operation of aggregating multipath. When we need to ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F11/30G06F11/34
CPCG06F11/3041G06F11/3051G06F11/3485
Inventor 杨飞虎
Owner INSPUR SUZHOU INTELLIGENT TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products