CN117891563A - Control method and device of virtual machine, storage medium and electronic device - Google Patents

Control method and device of virtual machine, storage medium and electronic device Download PDF

Info

Publication number
CN117891563A
CN117891563A CN202410084604.2A CN202410084604A CN117891563A CN 117891563 A CN117891563 A CN 117891563A CN 202410084604 A CN202410084604 A CN 202410084604A CN 117891563 A CN117891563 A CN 117891563A
Authority
CN
China
Prior art keywords
control
target
virtual machine
tool
control tool
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202410084604.2A
Other languages
Chinese (zh)
Inventor
马国良
陈彬
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Suzhou Metabrain Intelligent Technology Co Ltd
Original Assignee
Suzhou Metabrain Intelligent Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Suzhou Metabrain Intelligent Technology Co Ltd filed Critical Suzhou Metabrain Intelligent Technology Co Ltd
Priority to CN202410084604.2A priority Critical patent/CN117891563A/en
Publication of CN117891563A publication Critical patent/CN117891563A/en
Pending legal-status Critical Current

Links

Landscapes

  • Numerical Control (AREA)

Abstract

The application discloses a control method and device of a virtual machine, a storage medium and an electronic device, wherein the control method of the virtual machine comprises the following steps: receiving a target control request; responding to the target control request, and detecting the current running state of the second control tool through the connection relation; under the condition that the current running state is used for indicating that the second control tool runs abnormally, a target control configuration of a target virtual machine in the first control tool is called to execute a target control request on the target virtual machine, wherein the target control configuration is used for indicating control conditions required for allowing control of the target virtual machine, and the target control configuration is transmitted to the first control tool through a connection relation under the condition that the second control tool runs normally.

Description

Control method and device of virtual machine, storage medium and electronic device
Technical Field
The embodiment of the application relates to the field of computers, in particular to a control method and device of a virtual machine, a storage medium and an electronic device.
Background
The current management of the virtual machine clusters can be realized through VCENTER, a plurality of virtual machine clusters are often deployed on one virtualization platform, each virtual machine cluster is managed through different VCENTER, and the management mode has various problems.
On the one hand, when one VCENTER on the virtualized platform fails, all the virtual machines subordinate to the failed VCENTER cannot be managed, the management of the subordinate virtual machines can be continued after the VCENTER is required to be repaired, long waiting time is often required, on the other hand, when the virtual machines in different virtual machine clusters need to be controlled, the different VCENTER needs to be switched, the control efficiency of the virtual machines is low,
aiming at the problems of low control efficiency and the like of the virtual machine in the related art, no effective solution is proposed yet.
Disclosure of Invention
The embodiment of the application provides a control method and device of a virtual machine, a storage medium and an electronic device, so as to at least solve the problems of low control efficiency and the like of the virtual machine in the related technology.
According to an embodiment of the present application, there is provided a control method for a virtual machine, where a first virtual machine cluster, a second virtual machine cluster, a first control tool and a second control tool are disposed on a virtualization platform, where the first control tool is used to control virtual machines in the first virtual machine cluster, the second control tool is used to control virtual machines in the second virtual machine cluster, and a connection relationship is between the first control tool and the second control tool, and the connection relationship is used to allow the first control tool to control virtual machines in the second virtual machine cluster through the second control tool, and the method is used for the first control tool, and includes:
Receiving a target control request, wherein the target control request is used for requesting to control a target virtual machine in the second virtual machine cluster;
responding to the target control request, and detecting the current running state of the second control tool through the connection relation, wherein the current running state is used for indicating the current running condition of the second control tool;
and under the condition that the current running state is used for indicating that the second control tool runs abnormally, calling a target control configuration of the target virtual machine in the first control tool to execute the target control request on the target virtual machine, wherein the target control configuration is used for indicating control conditions required for allowing the control of the target virtual machine, and the target control configuration is transmitted to the first control tool through the connection relation under the condition that the second control tool runs normally.
Optionally, the invoking the target control configuration of the target virtual machine in the first control tool performs the target control request on the target virtual machine, including:
invoking the target control configuration to construct a target control link between the first control tool and the target virtual machine;
And calling the target control link to execute the target control request on the target virtual machine.
Optionally, the invoking the target control configuration constructs a target control link between the first control tool and the target virtual machine, including:
extracting target interaction information from the target control configuration, wherein the target interaction information is information required for interaction with the target virtual machine;
sending a target connection request carrying a target tool identifier to the target virtual machine according to the target interaction information, wherein the target tool identifier is the tool identifier of the first control tool, and the target virtual machine is used for determining whether the tool identifier carried in the connection request falls into a tool identifier set under the condition that the connection request sent by the control tool is received; when the tool identifier falls into the tool identifier set, switching the current connection state of the target virtual machine into a target connection state, and sending target prompt information to a corresponding control tool, wherein the target connection state is used for indicating that the target virtual machine is currently allowed to construct a control link with the control tool corresponding to the tool identifier, the tool identifier included in the tool identifier set is used for indicating that the target virtual machine is currently allowed to construct a control link with the first control tool, and the tool identifier set is transmitted to the target virtual machine under the condition that the second control tool operates normally;
And under the condition that target prompt information returned by the target virtual machine is received, a target control link is constructed between the first control tool and the target virtual machine through the target control configuration.
Optionally, before the invoking the target control configuration of the target virtual machine in the first control tool performs the target control request on the target virtual machine, the method further includes:
receiving a target synchronization request, wherein the target synchronization request is initiated by the second control tool under the condition of normal operation, and the target synchronization request is used for requesting to synchronize a control configuration set corresponding to the second virtual machine cluster to the first control tool, and the control configuration set comprises control configuration of each virtual machine in the second virtual machine cluster;
receiving the control configuration set sent by the second control tool in response to the target synchronization request;
and storing the received control configuration set to a first storage space of the first control tool.
Optionally, after the storing the received control configuration set in the first storage space of the first control tool, the method further includes:
Reading a change control configuration from a change record table corresponding to the second control tool, wherein the change control configuration recorded in the change record table is a control configuration in which the second control tool performs a change operation on a control configuration set corresponding to the second virtual machine cluster within a target time period, and the target time period is a time period in which the second control tool cannot be connected with the first control tool;
and updating the current control configuration set in the first storage space according to the change control configuration.
Optionally, after the storing the received control configuration set in the first storage space of the first control tool, the method further includes:
receiving a target adjustment request, wherein the target adjustment request is initiated by the second control tool under the condition that the first control tool is detected to work normally, and the target adjustment request is used for requesting adjustment of the current control configuration set in the first storage space;
and responding to the target adjustment request, executing a target adjustment statement on the first storage space, wherein the target adjustment statement is sent by the second control tool, and the target adjustment statement is used for indicating to adjust the current control configuration set.
Optionally, the executing the target adjustment statement on the first storage space includes:
adding a reference control configuration to the current control configuration set under the condition that the target adjustment statement is a first adjustment statement, wherein the first adjustment statement is used for indicating the newly added reference control configuration, and the target adjustment statement comprises the first adjustment statement;
deleting a reference control configuration from the current control configuration set if the target adjustment statement is a second adjustment statement, wherein the second adjustment statement is used for indicating to delete the reference control configuration, and the target adjustment statement comprises the second adjustment statement;
and modifying the reference control configuration in the current control configuration set into a candidate control configuration in the case that the target adjustment statement is a third adjustment statement, wherein the third adjustment statement is used for indicating that the reference control configuration in the current control configuration set is modified into the candidate control configuration, and the target adjustment statement comprises the third adjustment statement.
According to another embodiment of the present application, there is provided a control device for a virtual machine, where a first virtual machine cluster, a second virtual machine cluster, a first control tool and a second control tool are disposed on a virtualization platform, where the first control tool is used to control virtual machines in the first virtual machine cluster, the second control tool is used to control virtual machines in the second virtual machine cluster, and a connection relationship is between the first control tool and the second control tool, and the connection relationship is used to allow the first control tool to control virtual machines in the second virtual machine cluster through the second control tool, where the device includes:
The first receiving module is used for receiving a target control request, wherein the target control request is used for requesting to control a target virtual machine in the second virtual machine cluster;
the detection module is used for responding to the target control request and detecting the current running state of the second control tool through the connection relation, wherein the current running state is used for indicating the current running condition of the second control tool;
and the calling module is used for calling a target control configuration of the target virtual machine in the first control tool to execute the target control request on the target virtual machine under the condition that the current running state is used for indicating that the second control tool runs abnormally, wherein the target control configuration is used for indicating control conditions required for allowing the control of the target virtual machine, and the target control configuration is transmitted to the first control tool through the connection relation under the condition that the second control tool runs normally.
According to a further embodiment of the present application, there is also provided a computer readable storage medium having stored therein a computer program, wherein the computer program is arranged to perform the steps of any of the method embodiments described above when run.
According to a further embodiment of the present application, there is also provided an electronic device comprising a memory having stored therein a computer program and a processor arranged to run the computer program to perform the steps of any of the method embodiments described above.
In the embodiment of the application, a first virtual machine cluster, a second virtual machine cluster, a first control tool and a second control tool are deployed on a virtualization platform, the first control tool is used for controlling virtual machines in the first virtual machine cluster, the second control tool is used for controlling virtual machines in the second virtual machine cluster, a connection relation is arranged between the first control tool and the second control tool, the connection relation is used for allowing the first control tool to control the virtual machines in the second virtual machine cluster through the second control tool, the first control tool firstly receives a target control request, when the target control request is used for requesting to control the target virtual machines in the second virtual machine cluster, the current running state of the second control tool is detected through the connection relation, so that the current running condition of the second control tool is known, when the current running state is used for indicating abnormal running of the second control tool, the target control configuration of the target virtual machine in the first control tool is called for executing the target control request on the target virtual machine, wherein the target control configuration is used for indicating control conditions required for allowing the control on the target virtual machine, the target virtual machine is realized in a mode that the second control configuration can be carried out by the second control tool through the second control tool to the second virtual machine in a normal running condition, when the second control tool is not required to normally run through the second virtual machine in a second virtual machine, the second control tool can be normally run through the second control tool, when the second control tool can be normally run through the second control tool, and the second control tool can normally run through the second control tool is not normally, and the cross-control tool is not used for controlling the target virtual machine, so that the waiting time for repairing the second control tool and the switching time for switching the control tool are reduced. By adopting the technical scheme, the problems of low control efficiency and the like of the virtual machine in the related technology are solved, and the technical effect of improving the control efficiency of the virtual machine is realized.
Drawings
Fig. 1 is a hardware block diagram of a computer device of a control method of a virtual machine according to an embodiment of the present application;
FIG. 2 is a flow chart of a method of controlling a virtual machine according to an embodiment of the present application;
FIG. 3 is a schematic diagram of a method of controlling a virtual machine according to an embodiment of the present application;
FIG. 4 is a schematic illustration of a second control tool to a first control tool according to an embodiment of the present application;
FIG. 5 is a schematic diagram of a process of synchronizing control configuration of a second control tool to a first control tool according to an embodiment of the present application;
FIG. 6 is a schematic diagram of a configuration information change synchronization according to an embodiment of the present application;
FIG. 7 is a schematic diagram of a read change log according to an embodiment of the present application;
FIG. 8 is a schematic diagram of controlling a virtual machine across control tools according to an embodiment of the present application;
fig. 9 is a block diagram of a control apparatus of a virtual machine according to an embodiment of the present application.
Detailed Description
Embodiments of the present application will be described in detail below with reference to the accompanying drawings in conjunction with the embodiments.
It should be noted that the terms "first," "second," and the like in the description and claims of the present application and the above figures are used for distinguishing between similar objects and not necessarily for describing a particular sequential or chronological order.
The method embodiments provided in the embodiments of the present application may be performed in a server device or similar computing device. Taking the example of running on a server device, fig. 1 is a block diagram of a hardware structure of a computer device of a control method of a virtual machine according to an embodiment of the present application. As shown in fig. 1, the server device may include one or more (only one is shown in fig. 1) processors 102 (the processor 102 may include, but is not limited to, a microprocessor MCU, a programmable logic device FPGA, or the like processing means) and a memory 104 for storing data, wherein the server device may further include a transmission device 106 for communication functions and an input-output device 108. It will be appreciated by those of ordinary skill in the art that the architecture shown in fig. 1 is merely illustrative and is not intended to limit the architecture of the server apparatus described above. For example, the server device may also include more or fewer components than shown in FIG. 1, or have a different configuration than shown in FIG. 1.
The memory 104 may be used to store a computer program, for example, a software program of application software and a module, such as a computer program corresponding to a control method of a virtual machine in the embodiment of the present application, and the processor 102 executes the computer program stored in the memory 104, thereby performing various functional applications and data processing, that is, implementing the method described above. Memory 104 may include high-speed random access memory, and may also include non-volatile memory, such as one or more magnetic storage devices, flash memory, or other non-volatile solid-state memory. In some examples, the memory 104 may further include memory remotely located with respect to the processor 102, which may be connected to the server device via a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.
The transmission device 106 is used to receive or transmit data via a network. Specific examples of the network described above may include a wireless network provided by a communication provider of a server device. In one example, the transmission device 106 includes a network adapter (Network Interface Controller, simply referred to as NIC) that can connect to other network devices through a base station to communicate with the internet. In one example, the transmission device 106 may be a Radio Frequency (RF) module, which is configured to communicate with the internet wirelessly.
In this embodiment, a control method for a virtual machine is provided, fig. 2 is a flowchart of a control method for a virtual machine according to an embodiment of the present application, a first virtual machine cluster, a second virtual machine cluster, a first control tool and a second control tool are disposed on a virtualization platform, the first control tool is used for controlling a virtual machine in the first virtual machine cluster, the second control tool is used for controlling a virtual machine in the second virtual machine cluster, a connection relationship is provided between the first control tool and the second control tool, the connection relationship is used for allowing the first control tool to control the virtual machine in the second virtual machine cluster through the second control tool, the method is used for the first control tool, as shown in fig. 2, and the process includes the following steps:
Step S12, receiving a target control request, wherein the target control request is used for requesting to control a target virtual machine in the second virtual machine cluster;
optionally, in this embodiment, fig. 3 is a schematic diagram of a control method of a virtual machine according to an embodiment of the present application, as shown in fig. 3, a first virtual machine cluster (VM-A1, VM-A2, VM-A3) is deployed on a virtualization platform, a second virtual machine cluster (VM-B1, VM-B2, VM-B3), a first control tool VCENTER-a and a second control tool VCENTER-B, where VCENTER-a is used to control virtual machines (VM-A1, VM-A2, VM-A3) in the first virtual machine cluster, VCENTER-B is used to control virtual machines (VM-B1, VM-B2, VM-B3) in the second virtual machine cluster, and each virtual machine VM is deployed on a corresponding host computer esoi, and the first control tool and the second control tool have a connection relationship therebetween, where the connection relationship is used to allow the first control tool to control virtual machines in the second virtual machine cluster through the second control tool.
The connection relationship between the VCENTER-A and the VCENTER-B can be established by a LINK MODE, the VCENTER-B can register itself in the VCENTER-A by the LINK MODE, so that the control of the VCENTER-A on the virtual machines (VM-B1, VM-B2 and VM-B3) in the second virtual machine cluster subordinate to the VCENTER-B is realized, and likewise, the VCENTER-A can register itself in the VCENTER-B by the LINK MODE, so that the control of the VCENTER-B on the virtual machines (VM-A1, VM-A2 and VM-A3) in the first virtual machine cluster subordinate to the VCENTER-A is realized.
In the following, the following description will be given by taking the case that the VCENTER-B registers itself to the VCENTER-a by the LINK MODE, after the VCENTER-B registers itself to the VCENTER-a by the LINK MODE, the management interface of the VCENTER-a can see the information such as the cluster under the VCENTER-B, so that the VCENTER-a can control (or manage) the virtual machines (VM-A1, VM-A2, VM-A3) in the first virtual machine cluster, and can also control (or manage) the virtual machines (VM-B1, VM-B2, VM-B3) in the second virtual machine cluster, but after the VCENTER-B is turned off or down, the cluster information under the VCENTER-B cannot be checked under the management interface of the VCENTER-a, and the virtual machine clusters cannot be managed again through the VCENTER-a. The virtual machine control method provided by the application further provides a solution based on the LINK MODE aiming at the problems which can occur by simply adopting the LINK MODE, and the solution is described in detail below.
Step S14, responding to the target control request, and detecting the current running state of the second control tool through the connection relation, wherein the current running state is used for indicating the current running condition of the second control tool;
optionally, in this embodiment, the current operation state of the second control tool relates to a control manner of the first control tool to the target virtual machine in the second virtual machine cluster, and when the current operation state of the second control tool is normal operation, the first control tool invokes the second control tool to control manner of the second control tool to the target virtual machine in the second virtual machine cluster, that is, the first control tool forwards the received target control request to the second control tool, and the second control tool controls the target virtual machine.
And step S16, calling a target control configuration of the target virtual machine in the first control tool to execute the target control request on the target virtual machine under the condition that the current running state is used for indicating abnormal running of the second control tool, wherein the target control configuration is used for indicating control conditions required for allowing control of the target virtual machine, and the target control configuration is transmitted to the first control tool through the connection relation under the condition that the second control tool runs normally.
Optionally, in this embodiment, the target control configuration of the target virtual machine in the first control tool is invoked to execute the target control request on the target virtual machine, and before that, it needs to be ensured that there is a target control configuration in the first control tool, where the target control configuration is transmitted to the first control tool through the connection relationship under the condition that the second control tool operates normally.
In the embodiment of the application, a first virtual machine cluster, a second virtual machine cluster, a first control tool and a second control tool are deployed on a virtualization platform, the first control tool is used for controlling virtual machines in the first virtual machine cluster, the second control tool is used for controlling virtual machines in the second virtual machine cluster, a connection relation is arranged between the first control tool and the second control tool, the connection relation is used for allowing the first control tool to control the virtual machines in the second virtual machine cluster through the second control tool, the first control tool firstly receives a target control request, when the target control request is used for requesting to control the target virtual machines in the second virtual machine cluster, the current running state of the second control tool is detected through the connection relation, so that the current running condition of the second control tool is known, when the current running state is used for indicating abnormal running of the second control tool, the target control configuration of the target virtual machine in the first control tool is called for executing the target control request on the target virtual machine, wherein the target control configuration is used for indicating control conditions required for allowing the control on the target virtual machine, the target virtual machine is realized in a mode that the second control configuration can be carried out by the second control tool through the second control tool to the second virtual machine in a normal running condition, when the second control tool is not required to normally run through the second virtual machine in a second virtual machine, the second control tool can be normally run through the second control tool, when the second control tool can be normally run through the second control tool, and the second control tool can normally run through the second control tool is not normally, and the cross-control tool is not used for controlling the target virtual machine, so that the waiting time for repairing the second control tool and the switching time for switching the control tool are reduced. By adopting the technical scheme, the problems of low control efficiency and the like of the virtual machine in the related technology are solved, and the technical effect of improving the control efficiency of the virtual machine is realized.
As an alternative, invoking the target control configuration of the target virtual machine in the first control tool to execute the target control request on the target virtual machine further includes:
s21, calling the target control configuration to construct a target control link between the first control tool and the target virtual machine;
s22, calling the target control link to execute the target control request on the target virtual machine.
Optionally, in this embodiment, in a case where the current running state is used to indicate that the second control tool is running abnormally, a first control tool cannot control the virtual machines in the second virtual machine cluster through the second control tool, but may invoke the target control configuration to construct a target control link between the first control tool and the target virtual machine, and execute the target control request on the target virtual machine using the target control link.
As an alternative, invoking the target control configuration to construct a target control link between the first control tool and the target virtual machine further includes:
s31, extracting target interaction information from the target control configuration, wherein the target interaction information is information required for interaction with the target virtual machine;
S32, sending a target connection request carrying a target tool identifier to the target virtual machine according to the target interaction information, wherein the target tool identifier is the tool identifier of the first control tool, and the target virtual machine is used for determining whether the tool identifier carried in the connection request falls into a tool identifier set under the condition that the connection request sent by the control tool is received; when the tool identifier falls into the tool identifier set, switching the current connection state of the target virtual machine into a target connection state, and sending target prompt information to a corresponding control tool, wherein the target connection state is used for indicating that the target virtual machine is currently allowed to construct a control link with the control tool corresponding to the tool identifier, the tool identifier included in the tool identifier set is used for indicating that the target virtual machine is currently allowed to construct a control link with the first control tool, and the tool identifier set is transmitted to the target virtual machine under the condition that the second control tool operates normally;
S33, under the condition that target prompt information returned by the target virtual machine is received, a target control link is constructed between the first control tool and the target virtual machine through the target control configuration.
Optionally, in this embodiment, the tool identifier set is transmitted to the target virtual machine under the condition that the second control tool operates normally, and it is seen that, under the condition that the second control tool operates normally, not only the target control configuration is transmitted to the first control tool, but also the tool identifier set that allows control over the target virtual machine is transmitted to the target virtual machine, and when the target virtual machine subsequently builds the control link, whether the control tool allows control over the target virtual machine is determined by matching whether the tool identifier corresponding to the control tool is the tool identifier in the tool identifier set, and when the tool identifier corresponding to the control tool is the tool identifier in the tool identifier set, the control tool allows control over the target virtual machine, and when the tool identifier corresponding to the control tool is not the tool identifier in the tool identifier set, the control tool does not allow control over the target virtual machine.
By the method, the target virtual machine can perform double verification on the control tool initiating the connection request, and the safety of virtual machine control is improved.
As an alternative, before the invoking the target control configuration of the target virtual machine in the first control tool performs the target control request on the target virtual machine, the method further includes:
s41, receiving a target synchronization request, wherein the target synchronization request is initiated by the second control tool under the condition of normal operation, and the target synchronization request is used for requesting to synchronize a control configuration set corresponding to the second virtual machine cluster to the first control tool, and the control configuration set comprises control configuration of each virtual machine in the second virtual machine cluster;
s42, responding to the target synchronization request, and receiving the control configuration set sent by the second control tool;
s43, storing the received control configuration set into a first storage space of the first control tool.
Optionally, in this embodiment, the target synchronization request is initiated by the second control tool under a normal operating condition, and is used to synchronize the total control configuration set corresponding to the second virtual machine cluster to the first control tool.
Optionally, in this embodiment, the first control tool may also periodically actively request to synchronize the control configuration set corresponding to the second virtual machine cluster from the second control tool.
Optionally, in this embodiment, the target control configuration is transmitted to the first control tool by the second control tool through the connection relationship under the condition that the second control tool operates normally, specifically, the second control tool may transmit the target control configuration to the first control tool through the connection relationship constructed by the LINK MODE, so that the first control tool performs full synchronization on the control configuration of the virtual machines in the second virtual machine cluster in the second control tool, fig. 4 is ase:Sub>A schematic diagram of the second control tool to the first control tool, as shown in fig. 4, where the VCENTER itself uses ase:Sub>A postgresql database as ase:Sub>A database for storing configuration information, and when the VCENTER-B and the VCENTER-ase:Sub>A are not registered with each other in the LINK MODE, the VCENTER-ase:Sub>A creates ase:Sub>A database VCDB-ase:Sub>A in the postgresql database-ase:Sub>A to store virtual machines (VM-ase:Sub>A 1, VM-ase:Sub>A 2, VM-ase:Sub>A 3) in the first virtual machine cluster, and creates ase:Sub>A database VCENTER-B in the virtual machine cluster, and creates ase:Sub>A virtual machine-B-2 in the virtual machine cluster. FIG. 5 is ase:Sub>A schematic diagram of ase:Sub>A process of ase:Sub>A second control tool synchronous control configuration with ase:Sub>A first control tool according to an embodiment of the present application, as shown in FIG. 5, after VCENTER-B and VCENTER-A have not been registered with each other in ase:Sub>A LINK MODE manner, VCENTER-A creates ase:Sub>A database VCDB-LMB in the postgresql database-A (VCDB-LMB is used for storing contents in the database VCDB-B at the opposite end VCENTER-B), VCENTER-B creates ase:Sub>A database VCDB-LMA in the postgresql database-B (VCDB-LMA is used for storing contents in the database VCDB-A at the opposite end VCENTER-A), the VCENTER-A takes out and transmits contents in the VCENTER-A to the opposite end VCENTER-B, and the opposite end VCENTER-B receives and imports them all into the VCENTER-LMA of the VCENTER-B, so that the VCENTER-A and VCENTER-B have all virtual configuration of the opposite end virtual machines.
Optionally, in this embodiment, the LINK MODE may implement mutual registration of control tools of the same type, that is, both the VCENTER-a and the VCENTER-B are VCENTER control tools, and then the LINK MODE may be used to register each other, and in a case that the first control tool and the second control tool belong to different types of control tools, the middleware may be called to connect the first control tool and the second control tool respectively, so that the first information sent by the first control tool is translated into the second information that the second control tool allows to identify, and meanwhile, the third information sent by the second control tool is translated into the fourth information that the second control tool allows to identify, so as to implement the adaptation of the first control tool and the second control tool on connection.
By the method, virtual machine cluster control can be performed among different types of control tools across the control tools, and the control efficiency of the virtual machines is further improved.
As an alternative, after the storing the received control configuration set in the first storage space of the first control tool, the method further includes:
s51, reading a change control configuration from a change record table corresponding to the second control tool, wherein the change control configuration recorded in the change record table is a control configuration in which the second control tool executes a change operation on a control configuration set corresponding to the second virtual machine cluster within a target time period, and the target time period is a time period in which the second control tool cannot be connected with the first control tool;
And S52, updating the current control configuration set in the first storage space according to the change control configuration.
Optionally, in this embodiment, the above mentioned transmission of the target control configuration to the first control tool through the connection relationship under the condition that the second control tool operates normally, and describes a specific manner in which the second control tool may transmit the target control configuration to the first control tool through the connection relationship constructed by the LINK MODE, so as to implement full synchronization of the control configuration of the first control tool to the virtual machines in the second virtual machine cluster in the second control tool. After the first control tool performs full synchronization on the control configuration of the virtual machines in the second virtual machine cluster in the second control tool, if the control configuration of the virtual machines in the second virtual machine cluster in the second control tool is changed, the manner of synchronizing the changed control configuration to the first control tool by the LINK MODE is described as follows:
taking the scenario set forth in fig. 4 as an example, fig. 6 is a schematic diagram of a configuration information change synchronization according to an embodiment of the present application, where, as shown in fig. 6, a VCENTER-B changes the control configuration of a virtual machine in its second virtual machine cluster (for example, a new virtual machine, a delete virtual machine, and a change control configuration of a virtual machine), and after clicking a confirm or submit button, these changed change control configurations (corresponding to the control configuration in which the change operation is performed) are written into a database VCDB-B of the VCENTER-B, so as to permanently record the change operation. These change operations are then sent to the database VCDB-LMB of LINK MODE opposite VCENTER-A. If the LINK MODE opposite terminal VCENTER-a cannot access (may fail, be closed, etc.) at this time, these data will be recorded in the change record table of the database VCDB-B of the present VCENTER-B, and after the LINK MODE opposite terminal VCENTER-a is restored, the change control configuration is read from the change record table and then inserted into the VCDB-LMB. Specifically, fig. 7 is a schematic diagram of a read change record table according to an embodiment of the present application, as shown in fig. 7, after VCENTER-a returns to normal, the read change record table of VCENTER-B is read in the LINK MODE opposite VCENTER-B, and if there is no data, it is indicated that there is no control configuration change for the opposite VCENTER-B during the period of VCENTER-a failure. If so, the data in the change record table (corresponding to the change control configuration) is read and stored in the database VCDB-LMB of VCENTER-A.
Alternatively, in this embodiment, after waiting for the LINK MODE opposite terminal VCENTER-a to recover, the VCENTER-B may read the change control configuration from the change record table and send the change control configuration to VCENTER-a, where the received change control configuration is inserted into the VCDB-LMB.
As an alternative, after the storing the received control configuration set in the first storage space of the first control tool, the method further includes:
s61, receiving a target adjustment request, wherein the target adjustment request is initiated by the second control tool under the condition that the first control tool is detected to run normally, and the target adjustment request is used for requesting adjustment of the current control configuration set in the first storage space;
s62, responding to the target adjustment request, and executing a target adjustment statement on the first storage space, wherein the target adjustment statement is sent by the second control tool, and the target adjustment statement is used for indicating to adjust the current control configuration set.
Optionally, in this embodiment, when the first control tool and the second control tool both operate normally and the control configuration in the second control tool is changed, the changed control configuration may be synchronized by the target adjustment request, and ase:Sub>A specific synchronization manner may be that the second control tool sends ase:Sub>A target adjustment statement to the first control tool, where the target adjustment statement may be an SQL statement written in the change record table by the second control tool, and taking the scenario set up in fig. 4 as an example, the vcents structures of the LINK MODE are identical, and the database storage structures used are identical, so that the SQL statement when the VCENTER-B has the configuration change and operates the datase:Sub>A in the VCDB-B is also applicable to the VCDB-ase:Sub>A and VCDB-LMB databases of the VCENTER-ase:Sub>A of the LINK MODE. When VCENTER-B performs configuration change operation, the configuration change is converted into SQL sentences, one configuration operation may generate a plurality of SQL sentences, and the SQL sentences are executed in the database VCDB-B according to the sequence (operations such as adding control configuration, deleting control configuration, modifying control configuration and the like are related). Meanwhile, the VCENTER-B also records the SQL sentences and the execution sequence and sends the SQL sentences and the execution sequence to the VCENTER-A at the opposite end of the LINK MODE, and the VCENTER-A at the opposite end of the LINK MODE directly executes the SQL sentences and the execution sequence in the database VCDB-LMB after receiving the SQL sentences and the execution sequence so as to realize the synchronization of the two sides of the VCENTER-A and the VCENTER-B on the changed control configuration. When the VCENTER-A of the opposite terminal LINK MODE does not respond at the moment, the VCENTER-B records the SQL sentences and the execution sequence into a change record table of the VCENTER-B, and the VCENTER change record table is extracted and executed after the opposite terminal VCENTER-A is recovered, wherein the structure of the VCENTER change record table is as shown in the following table 1:
TABLE 1
As an alternative, executing the target adjustment statement on the first storage space further includes:
s71, adding a reference control configuration to the current control configuration set when the target adjustment statement is a first adjustment statement, wherein the first adjustment statement is used for indicating to add the reference control configuration, and the target adjustment statement comprises the first adjustment statement;
s72, deleting a reference control configuration from the current control configuration set when the target adjustment statement is a second adjustment statement, wherein the second adjustment statement is used for indicating to delete the reference control configuration, and the target adjustment statement comprises the second adjustment statement;
s73, when the target adjustment statement is a third adjustment statement, the reference control configuration in the current control configuration set is modified to be a candidate control configuration, wherein the third adjustment statement is used for indicating that the reference control configuration in the current control configuration set is modified to be the candidate control configuration, and the target adjustment statement comprises the third adjustment statement.
Optionally, in this embodiment, it is mentioned that after the configuration change operation is performed by VCENTER-B, the configuration change is converted into SQL statements, and one configuration operation may generate multiple SQL statements, and these SQL statements are executed in the database VCDB-B according to the sequence (related to operations of adding a control configuration, deleting a control configuration, modifying a control configuration, etc.), where a first adjustment statement is used for adding a control configuration, a second adjustment statement is used for deleting a control configuration, and a third adjustment statement is used for modifying a control configuration.
Taking the scenario set up in fig. 4 as an example, based on the above synchronization operation of the control configuration, the VCENTER-a may synchronize the control configuration in the VCENTER-B in real time, so that the VCENTER-a may control the virtual machines in the second virtual machine cluster of the VCENTER-B through the synchronized control configuration, when the LINK MODE opposite VCENTER-B is accessed in the VCENTER-a interface, if the opposite VCENTER-B is normal, the data of the virtual machines in the second virtual machine cluster in all the opposite VCENTER-B are returned to the local VCENTER-a through the opposite VCENTER-B, and then control is performed. If the opposite terminal VCENTER-B is abnormal, the VCENTER-A controls the virtual machines in the second virtual machine cluster through the control configuration information of the opposite terminal VCENTER-B stored in the local terminal VCDB-LMB. Fig. 8 is a schematic diagram of controlling a virtual machine across control tools according to an embodiment of the present application, as shown in fig. 8, in the foregoing manner, VCENTER-a (corresponding to control tool 10.49.33.118) and VCENTER-B (corresponding to control tool 10.49.33.119) of LINK MODE are mutually used, and virtual machine cluster information of two VCENTERs can be displayed on one interface through VCENTER-a.
The application provides a control method of a virtual machine, when two vcerters register with each other through a LINK MODE, the two vcerters registered with each other acquire all configuration information of the other vcerter through the other vcerter and then store the configuration information into a local vcerter, and when the configuration information of the other vcerter cluster cannot be accessed through the other vcerter (for example, the other vcerter is closed, down, failure, etc.), the configuration information of the other vcerter cluster stored into the local vcerter is displayed. When the opposite-end VCENTER cannot be used, when the content in the opposite-end VCENTER cluster is configured through the local VCENTER (such as adding virtual machine control configuration, deleting virtual machine control configuration, modifying virtual machine control configuration and the like), the changed configuration information is stored in a change record table of the local VCENTER, which is specially used for storing change information for the configuration information of the opposite-end VCENTER cluster, when the opposite-end VCENTER becomes available, the local VCENTER detects that the opposite-end VCENTER is recovered to be normal, and the local VCENTER synchronizes the modified configuration information into the opposite-end VCENTER so as to achieve the consistency of the configuration information in the two-end VCENTER. When both vcents are normal, after the vcents configure and modify their own cluster information, the modified configuration information is also synchronized to the opposite vcents. Any VCENTER on the LINK MODE is not available and does not affect the purpose of the operation of the rest VCENTER on the fault VCENTER cluster, thereby achieving the purpose of improving the usability of the VCENTER.
By the control method of the virtual machine, the VCENTER which is the LINK MODE can store one set of configuration data of the VCENTER at the opposite end, and the data of the VCENTER at the two ends can achieve the aim of synchronization through a synchronization mechanism. Through the processing mechanism, when any VCENTER fails, the management of two VCENTER clusters can be realized through the other VCENTER, so that the management and the use of a virtualization system are not affected when one VCENTER fails, and the availability of the virtualization system is improved.
From the description of the above embodiments, it will be clear to a person skilled in the art that the method according to the above embodiments may be implemented by means of software plus the necessary general hardware platform, but of course also by means of hardware, but in many cases the former is a preferred embodiment. Based on such understanding, the technical solution of the present application may be embodied essentially or in a part contributing to the prior art in the form of a software product stored in a storage medium (such as ROM/RAM, magnetic disk, optical disk), comprising several instructions for causing a terminal device (which may be a mobile phone, a computer, a server, or a network device, etc.) to perform the method described in the embodiments of the present application.
The embodiment also provides a control device for a virtual machine, which is used for implementing the foregoing embodiments and preferred embodiments, and is not described in detail. As used below, the term "module" may be a combination of software and/or hardware that implements a predetermined function. While the means described in the following embodiments are preferably implemented in software, implementation in hardware, or a combination of software and hardware, is also possible and contemplated.
Fig. 9 is a structural block diagram of a control device for a virtual machine according to an embodiment of the present application, where a first virtual machine cluster, a second virtual machine cluster, a first control tool and a second control tool are disposed on a virtualization platform, where the first control tool is used to control a virtual machine in the first virtual machine cluster, the second control tool is used to control a virtual machine in the second virtual machine cluster, and a connection relationship is between the first control tool and the second control tool, and the connection relationship is used to allow the first control tool to control the virtual machine in the second virtual machine cluster through the second control tool, as shown in fig. 9, where the control device for a virtual machine includes:
A first receiving module 902, configured to receive a target control request, where the target control request is used to request to control a target virtual machine in the second virtual machine cluster;
a detection module 904, configured to respond to the target control request, and detect a current operation state of the second control tool according to the connection relationship, where the current operation state is used to indicate a current operation situation of the second control tool;
and a calling module 906, configured to call a target control configuration of the target virtual machine in the first control tool to execute the target control request on the target virtual machine, where the target control configuration is used to indicate a control condition that is required to allow control of the target virtual machine, and the target control configuration is transmitted to the first control tool through the connection relationship under a condition that the second control tool operates normally.
In one exemplary embodiment, the calling module includes:
the first calling unit is used for calling the target control configuration to construct a target control link between the first control tool and the target virtual machine;
And the second calling unit is used for calling the target control link to execute the target control request on the target virtual machine.
In an exemplary embodiment, the first calling unit is further configured to:
extracting target interaction information from the target control configuration, wherein the target interaction information is information required for interaction with the target virtual machine;
sending a target connection request carrying a target tool identifier to the target virtual machine according to the target interaction information, wherein the target tool identifier is the tool identifier of the first control tool, and the target virtual machine is used for determining whether the tool identifier carried in the connection request falls into a tool identifier set under the condition that the connection request sent by the control tool is received; when the tool identifier falls into the tool identifier set, switching the current connection state of the target virtual machine into a target connection state, and sending target prompt information to a corresponding control tool, wherein the target connection state is used for indicating that the target virtual machine is currently allowed to construct a control link with the control tool corresponding to the tool identifier, the tool identifier included in the tool identifier set is used for indicating that the target virtual machine is currently allowed to construct a control link with the first control tool, and the tool identifier set is transmitted to the target virtual machine under the condition that the second control tool operates normally;
And under the condition that target prompt information returned by the target virtual machine is received, a target control link is constructed between the first control tool and the target virtual machine through the target control configuration.
In an exemplary embodiment, the apparatus further comprises:
a second receiving module, configured to receive a target synchronization request before the calling the target control configuration of the target virtual machine in the first control tool to execute the target control request on the target virtual machine, where the target synchronization request is initiated by the second control tool under a normal operation condition, where the target synchronization request is used to request to synchronize a control configuration set corresponding to the second virtual machine cluster to the first control tool, where the control configuration set includes a control configuration of each virtual machine in the second virtual machine cluster;
a third receiving module, configured to receive the control configuration set sent by the second control tool in response to the target synchronization request;
and the storage module is used for storing the received control configuration set to a first storage space of the first control tool.
In an exemplary embodiment, the apparatus further comprises:
The reading module is configured to read a change control configuration from a change record table corresponding to the second control tool after the received control configuration set is stored in the first storage space of the first control tool, where the change control configuration recorded in the change record table is a control configuration that the second control tool performs a change operation on the control configuration set corresponding to the second virtual machine cluster in a target time period, and the target time period is a time period in which the second control tool cannot be connected to the first control tool;
and the updating module is used for updating the current control configuration set in the first storage space according to the change control configuration.
In an exemplary embodiment, the apparatus further comprises:
a fourth receiving module, configured to receive a target adjustment request after the received control configuration set is stored in the first storage space of the first control tool, where the target adjustment request is initiated by the second control tool when the second control tool detects that the first control tool is operating normally, and the target adjustment request is used to request adjustment of the current control configuration set in the first storage space;
And the execution module is used for responding to the target adjustment request and executing a target adjustment statement on the first storage space, wherein the target adjustment statement is sent by the second control tool, and the target adjustment statement is used for indicating to adjust the current control configuration set.
In one exemplary embodiment, the execution module includes:
an adding unit, configured to add a reference control configuration to a current control configuration set if the target adjustment statement is a first adjustment statement, where the first adjustment statement is used to indicate to add the reference control configuration, and the target adjustment statement includes the first adjustment statement;
a deleting unit, configured to delete a reference control configuration from the current control configuration set if the target adjustment statement is a second adjustment statement, where the second adjustment statement is used to instruct deletion of the reference control configuration, and the target adjustment statement includes the second adjustment statement;
a modifying unit, configured to modify the reference control configuration in the current control configuration set into a candidate control configuration when the target adjustment statement is a third adjustment statement, where the third adjustment statement is used to instruct modification of the reference control configuration in the current control configuration set into the candidate control configuration, and the target adjustment statement includes the third adjustment statement.
It should be noted that each of the above modules may be implemented by software or hardware, and for the latter, it may be implemented by, but not limited to: the modules are all located in the same processor; alternatively, the above modules may be located in different processors in any combination.
Embodiments of the present application also provide a computer readable storage medium having a computer program stored therein, wherein the computer program is arranged to perform the steps of any of the method embodiments described above when run.
In one exemplary embodiment, the computer readable storage medium may include, but is not limited to: a usb disk, a Read-Only Memory (ROM), a random access Memory (Random Access Memory, RAM), a removable hard disk, a magnetic disk, or an optical disk, or other various media capable of storing a computer program.
Embodiments of the present application also provide an electronic device comprising a memory having stored therein a computer program and a processor arranged to run the computer program to perform the steps of any of the method embodiments described above.
In an exemplary embodiment, the electronic device may further include a transmission device connected to the processor, and an input/output device connected to the processor.
Specific examples in this embodiment may refer to the examples described in the foregoing embodiments and the exemplary implementation, and this embodiment is not described herein.
It will be appreciated by those skilled in the art that the modules or steps of the application described above may be implemented in a general purpose computing device, they may be concentrated on a single computing device, or distributed across a network of computing devices, they may be implemented in program code executable by computing devices, so that they may be stored in a storage device for execution by computing devices, and in some cases, the steps shown or described may be performed in a different order than that shown or described herein, or they may be separately fabricated into individual integrated circuit modules, or multiple modules or steps of them may be fabricated into a single integrated circuit module. Thus, the present application is not limited to any specific combination of hardware and software.
The foregoing description is only of the preferred embodiments of the present application and is not intended to limit the same, but rather, various modifications and variations may be made by those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the principles of the present application should be included in the protection scope of the present application.

Claims (10)

1. The control method of the virtual machine is characterized in that a first virtual machine cluster, a second virtual machine cluster, a first control tool and a second control tool are deployed on a virtualization platform, the first control tool is used for controlling the virtual machines in the first virtual machine cluster, the second control tool is used for controlling the virtual machines in the second virtual machine cluster, a connection relation is arranged between the first control tool and the second control tool, the connection relation is used for allowing the first control tool to control the virtual machines in the second virtual machine cluster through the second control tool, the method is used for the first control tool,
the method comprises the following steps:
receiving a target control request, wherein the target control request is used for requesting to control a target virtual machine in the second virtual machine cluster;
Responding to the target control request, and detecting the current running state of the second control tool through the connection relation, wherein the current running state is used for indicating the current running condition of the second control tool;
and under the condition that the current running state is used for indicating that the second control tool runs abnormally, calling a target control configuration of the target virtual machine in the first control tool to execute the target control request on the target virtual machine, wherein the target control configuration is used for indicating control conditions required for allowing the control of the target virtual machine, and the target control configuration is transmitted to the first control tool through the connection relation under the condition that the second control tool runs normally.
2. The method of claim 1, wherein the step of determining the position of the substrate comprises,
the invoking the target control configuration of the target virtual machine in the first control tool to execute the target control request for the target virtual machine includes:
invoking the target control configuration to construct a target control link between the first control tool and the target virtual machine;
and calling the target control link to execute the target control request on the target virtual machine.
3. The method of claim 2, wherein the step of determining the position of the substrate comprises,
the invoking the target control configuration to construct a target control link between the first control tool and the target virtual machine includes:
extracting target interaction information from the target control configuration, wherein the target interaction information is information required for interaction with the target virtual machine;
sending a target connection request carrying a target tool identifier to the target virtual machine according to the target interaction information, wherein the target tool identifier is the tool identifier of the first control tool, and the target virtual machine is used for determining whether the tool identifier carried in the connection request falls into a tool identifier set under the condition that the connection request sent by the control tool is received; when the tool identifier falls into the tool identifier set, switching the current connection state of the target virtual machine into a target connection state, and sending target prompt information to a corresponding control tool, wherein the target connection state is used for indicating that the target virtual machine is currently allowed to construct a control link with the control tool corresponding to the tool identifier, the tool identifier included in the tool identifier set is used for indicating that the target virtual machine is currently allowed to construct a control link with the first control tool, and the tool identifier set is transmitted to the target virtual machine under the condition that the second control tool operates normally;
And under the condition that target prompt information returned by the target virtual machine is received, a target control link is constructed between the first control tool and the target virtual machine through the target control configuration.
4. The method of claim 1, wherein the step of determining the position of the substrate comprises,
before the invoking the target control configuration of the target virtual machine in the first control tool to execute the target control request to the target virtual machine, the method further comprises:
receiving a target synchronization request, wherein the target synchronization request is initiated by the second control tool under the condition of normal operation, and the target synchronization request is used for requesting to synchronize a control configuration set corresponding to the second virtual machine cluster to the first control tool, and the control configuration set comprises control configuration of each virtual machine in the second virtual machine cluster;
receiving the control configuration set sent by the second control tool in response to the target synchronization request;
and storing the received control configuration set to a first storage space of the first control tool.
5. The method of claim 4, wherein the step of determining the position of the first electrode is performed,
After said storing the received set of control configurations to the first storage space of the first control tool, the method further comprises:
reading a change control configuration from a change record table corresponding to the second control tool, wherein the change control configuration recorded in the change record table is a control configuration in which the second control tool performs a change operation on a control configuration set corresponding to the second virtual machine cluster within a target time period, and the target time period is a time period in which the second control tool cannot be connected with the first control tool;
and updating the current control configuration set in the first storage space according to the change control configuration.
6. The method of claim 4, wherein the step of determining the position of the first electrode is performed,
after said storing the received set of control configurations to the first storage space of the first control tool, the method further comprises:
receiving a target adjustment request, wherein the target adjustment request is initiated by the second control tool under the condition that the first control tool is detected to work normally, and the target adjustment request is used for requesting adjustment of the current control configuration set in the first storage space;
And responding to the target adjustment request, executing a target adjustment statement on the first storage space, wherein the target adjustment statement is sent by the second control tool, and the target adjustment statement is used for indicating to adjust the current control configuration set.
7. The method of claim 6, wherein the step of providing the first layer comprises,
the executing the target adjustment statement on the first storage space includes:
adding a reference control configuration to the current control configuration set under the condition that the target adjustment statement is a first adjustment statement, wherein the first adjustment statement is used for indicating the newly added reference control configuration, and the target adjustment statement comprises the first adjustment statement;
deleting a reference control configuration from the current control configuration set if the target adjustment statement is a second adjustment statement, wherein the second adjustment statement is used for indicating to delete the reference control configuration, and the target adjustment statement comprises the second adjustment statement;
and modifying the reference control configuration in the current control configuration set into a candidate control configuration in the case that the target adjustment statement is a third adjustment statement, wherein the third adjustment statement is used for indicating that the reference control configuration in the current control configuration set is modified into the candidate control configuration, and the target adjustment statement comprises the third adjustment statement.
8. The control device of the virtual machine is characterized in that a first virtual machine cluster, a second virtual machine cluster, a first control tool and a second control tool are deployed on a virtualization platform, the first control tool is used for controlling the virtual machines in the first virtual machine cluster, the second control tool is used for controlling the virtual machines in the second virtual machine cluster, a connection relation is arranged between the first control tool and the second control tool, the connection relation is used for allowing the first control tool to control the virtual machines in the second virtual machine cluster through the second control tool, the method is used for the first control tool,
the device comprises:
the first receiving module is used for receiving a target control request, wherein the target control request is used for requesting to control a target virtual machine in the second virtual machine cluster;
the detection module is used for responding to the target control request and detecting the current running state of the second control tool through the connection relation, wherein the current running state is used for indicating the current running condition of the second control tool;
and the calling module is used for calling a target control configuration of the target virtual machine in the first control tool to execute the target control request on the target virtual machine under the condition that the current running state is used for indicating that the second control tool runs abnormally, wherein the target control configuration is used for indicating control conditions required for allowing the control of the target virtual machine, and the target control configuration is transmitted to the first control tool through the connection relation under the condition that the second control tool runs normally.
9. A computer-readable storage medium comprising,
the computer readable storage medium has stored therein a computer program, wherein the computer program when executed by a processor realizes the steps of the method as claimed in any of claims 1 to 7.
10. An electronic device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, characterized in that,
the processor, when executing the computer program, implements the steps of the method as claimed in any one of claims 1 to 7.
CN202410084604.2A 2024-01-19 2024-01-19 Control method and device of virtual machine, storage medium and electronic device Pending CN117891563A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202410084604.2A CN117891563A (en) 2024-01-19 2024-01-19 Control method and device of virtual machine, storage medium and electronic device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202410084604.2A CN117891563A (en) 2024-01-19 2024-01-19 Control method and device of virtual machine, storage medium and electronic device

Publications (1)

Publication Number Publication Date
CN117891563A true CN117891563A (en) 2024-04-16

Family

ID=90641076

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202410084604.2A Pending CN117891563A (en) 2024-01-19 2024-01-19 Control method and device of virtual machine, storage medium and electronic device

Country Status (1)

Country Link
CN (1) CN117891563A (en)

Similar Documents

Publication Publication Date Title
CN112099918B (en) Live migration of clusters in a containerized environment
CN110224871B (en) High-availability method and device for Redis cluster
US10999139B2 (en) Online upgrade method, apparatus, and system
US20190205220A1 (en) System and method for live migration of a virtual machine
US9992058B2 (en) Redundant storage solution
US11803538B2 (en) Distributed transaction processing method and related apparatus
CN103324582A (en) Memory migration method, memory migration device and equipment
JP2020035374A (en) Availability system, method, and program
US9223834B2 (en) Distributed multi-system management
CN111600794B (en) Server switching method, terminal, server and storage medium
CN111342986B (en) Distributed node management method and device, distributed system and storage medium
CN110958287B (en) Operation object data synchronization method, device and system
US10812586B2 (en) Method and system for high availability topology for master-slave data systems with low write traffic
CN112073499A (en) Dynamic service method of multi-machine type cloud physical server
CN117891563A (en) Control method and device of virtual machine, storage medium and electronic device
CN116193481A (en) 5G core network processing method, device, equipment and medium
CN112711466B (en) Hanging affair inspection method and device, electronic equipment and storage medium
CN114780270A (en) Memory fault processing method and device, electronic equipment and computer readable storage medium
CN107783855B (en) Fault self-healing control device and method for virtual network element
CN111324632A (en) Transparent database session recovery with client-side caching
CN113076273B (en) Component access method, device, electronic equipment, storage medium and program product
JP6822706B1 (en) Cluster system, server equipment, takeover method, and program
CN114564225A (en) Firmware updating method, firmware updating apparatus, computer device, and medium
CN117714276A (en) Redis cluster deployment method and device, storage medium and electronic equipment
CN114625568A (en) Block chain backup processing method, device and equipment and readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination