WO2022009438A1 - サーバメンテナンス制御装置、システム、制御方法及びプログラム - Google Patents
サーバメンテナンス制御装置、システム、制御方法及びプログラム Download PDFInfo
- Publication number
- WO2022009438A1 WO2022009438A1 PCT/JP2020/033954 JP2020033954W WO2022009438A1 WO 2022009438 A1 WO2022009438 A1 WO 2022009438A1 JP 2020033954 W JP2020033954 W JP 2020033954W WO 2022009438 A1 WO2022009438 A1 WO 2022009438A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- server
- maintenance
- virtual machine
- alarm
- unit
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/455—Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
- G06F9/45533—Hypervisors; Virtual machine monitors
- G06F9/45558—Hypervisor-specific management and integration aspects
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/30—Monitoring
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/455—Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
- G06F9/45533—Hypervisors; Virtual machine monitors
- G06F9/45558—Hypervisor-specific management and integration aspects
- G06F2009/45591—Monitoring or debugging support
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/455—Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
- G06F9/45533—Hypervisors; Virtual machine monitors
- G06F9/45558—Hypervisor-specific management and integration aspects
- G06F2009/45595—Network integration; Enabling network access in virtual machine instances
Definitions
- the present invention detects a failure of a device connected to the physical server and maintains the server used for maintenance of the device. Control devices, server maintenance systems, server maintenance control methods, and programs.
- a virtualization platform is a system that abstracts and hides physical resources such as physical servers and networks using virtualization technology, and provides a common platform for multiple applications and services.
- the physical server of the virtualization infrastructure is assigned to the user on demand according to the user's request.
- the physical server of the virtualization platform includes a plurality of various external devices (hereinafter referred to as "devices") such as GPU (graphics processing unit), FPGA (field programmable gate array), NIC (network interface card), etc. Is connected.
- Each user requests resources from each physical server and temporarily uses the virtual machine deployed on the physical server. At this time, each virtual machine uses an arbitrary number of devices. Each device needs to be maintained on an irregular basis. During device maintenance, the virtual machine cannot use the device under maintenance.
- Non-Patent Document 1 the following processing is performed by the controller server (see, for example, Non-Patent Document 1).
- the instance (virtual machine) of the user who is using the physical server to which the maintenance target device is connected is saved (migrated) to another server.
- the instance (virtual machine) that does not use the maintenance target device is saved (migrated). Therefore, the instance (virtual machine) that is not using the maintenance target device is temporarily suspended.
- the present invention has been made to solve the above-mentioned problems, and suppresses saving processing of a virtual machine that does not use this device to another physical server on the physical server to which the maintenance target device is connected.
- the main subject is to provide a server maintenance control device, a server maintenance system, a server maintenance control method, and a program for suppressing the issuance of an alarm due to device maintenance.
- Another object is to perform device maintenance triggered by device failure detection.
- the server maintenance control device includes an allocation unit that allocates a device connected to a server to a virtual machine managed by a user, the virtual machine, and a device used by the virtual machine.
- the usage status management unit that records the correspondence of the server
- the alarm-related management unit that records the alarm type that can occur in each device during maintenance
- the above is based on the maintenance control unit that determines the order of the instruction and the instruction to save the virtual machine to other servers affected by maintenance, and the alarm type recorded in the alarm-related management unit.
- the effect is based on the correspondence between the alarm exclusion setting unit that instructs the server to suppress the issuance of an alarm that may occur on the device during maintenance, the virtual machine recorded in the usage status management unit, and the device used by the virtual machine. It is characterized by having an influence user specific save unit that identifies a virtual machine and saves it from the server to the other server.
- the evacuation process of the virtual machine that does not use this device to another physical server is suppressed, and the issuance of an alarm due to the maintenance of the device is suppressed.
- the device maintenance can be performed by using the device failure detection as a trigger.
- FIG. 3 is an explanatory diagram (3) of an overall configuration and operation of a server system including a controller server (server maintenance control device) according to the first embodiment. It is a block diagram of a controller server. It is explanatory drawing of the usage situation database. It is explanatory drawing of the alarm relational database. It is a flowchart which shows the whole operation of a controller server.
- FIGS. 1A to 1C are explanatory views of the overall configuration and operation of the server system 100 including the controller server 10 (server maintenance control device) according to the first embodiment, respectively.
- the server system 100 includes a controller server 10, a plurality of physical servers, a maintenance instruction device 91, and an alarm monitoring system 92.
- the server system 100 includes two physical servers, a first server 20a and a second server 20b, will be described.
- the number of physical servers may be three or more.
- the controller server 10 is a computer that functions as a server maintenance control device that controls maintenance processing of a physical server.
- Each physical server in the first embodiment, the first server 20a and the second server 20b) is a computer that provides a virtualized environment to the user.
- the maintenance instruction device 91 is a terminal device that transmits a maintenance request Rq (see FIG. 1B) to the controller server 10 at the time of maintenance of an external device connected to each physical server.
- the alarm monitoring system 92 is a system that monitors alarms issued from each physical server and notifies an administrator or the like.
- a plurality of various external devices are electrically connected to each physical server.
- the plurality of external devices are, for example, GPU (graphics processing unit), FPGA (field programmable gate array), NIC (network interface card), and the like.
- GPU graphics processing unit
- FPGA field programmable gate array
- NIC network interface card
- the first device 31a, the second device 32a, and the third device 33a are connected to the first server 20a.
- the first device 31b, the second device 32b, and the third device 33b are connected to the second server 20b.
- the device connected to the first server 20a and the device connected to the second server 20b are of the same type. That is, the first device 31a of the first server 20a and the first device 31b of the second server 20b are of the same type.
- the second device 32a of the first server 20a and the second device 32b of the second server 20b are of the same type.
- the third device 33a of the first server 20a and the third device 33b of the second server 20b are of the same type.
- the first server 20a and the second server 20b can also connect three or more devices.
- devices such as GPUs and FPGAs often do not have a function specialized for temporary evacuation (migration) of the internal state, unlike the CPU (central processing unit). Therefore, devices such as GPUs and FPGAs require evacuation processing by software, and the evacuation processing requires a relatively long time. That is, devices such as GPUs and FPGAs have relatively high setting costs at the time of evacuation.
- devices such as GPUs and FPGAs have relatively high setting costs at the time of evacuation.
- the plurality of devices connected to the physical server such devices such as GPU and FPGA are included. Therefore, even in the maintenance work of a certain device, it is preferable that other virtual machines that do not use the device to be maintained can be continuously used without being evacuated.
- each physical server is provided with a filter setting unit for filtering alarms that should not be issued (alarms that are not subject to monitoring) and suppressing the issuance of the alarms.
- the first server 20a is provided with a filter setting unit 26a.
- the second server 20b is provided with a filter setting unit 26b.
- the filter setting units 26a and 26b operate when suppressing the issuance of an alarm due to device maintenance.
- the controller server 10 is pre-installed with a control program Pr for making the computer function as a server maintenance control device from the storage medium 99.
- the controller server 10 is communicably connected to each physical server (in the first embodiment, the first server 20a and the second server 20b) and the maintenance instruction device 91.
- the controller server 10 internally constructs the configuration shown in FIG. 2 by executing the control program Pr. As a result, the controller server 10 realizes the following first to sixth functions.
- the allocation unit 11a embodies the device allocation function (first function) to the user's virtual machine (see FIGS. 1A and 1B).
- the "device allocation function to the user” is a function of allocating an arbitrary number of devices connected to the server to each virtual machine managed by the user.
- the usage status management unit 11b embodies the usage status recording function (second function) of the device (see FIGS. 1A and 1B).
- the "device usage record function" is a function for recording the correspondence between each virtual machine managed by the user and the device used by the virtual machine.
- the device usage status recording function is realized by the usage status management unit 11b and the usage status database 12a (see FIG. 2) described later.
- the alarm-related management unit 11c embodies the alarm-related recording function (third function) (see FIGS. 1A and 1B).
- the "alarm-related recording function” is a function for recording and managing the correspondence between a device and an alarm type that may occur during maintenance of this device, that is, an exclusion target that is excluded from monitoring during maintenance of each device. Record and manage the correspondence with the alarm type.
- the alarm-related recording function is realized by the alarm-related management unit 11c and the alarm-related database 12b (see FIG. 2) described later.
- the maintenance control unit 11d embodies the maintenance request reception function (fourth function) (see FIG. 1B).
- the "maintenance request reception function" is an instruction to exclude (suppress) the issuance of an alarm that may occur during device maintenance and device maintenance when a device maintenance request Rq (see FIG. 1B) is received from an external maintenance instruction device 91. It is a function to determine the order with the save instruction to other physical servers of the virtual machine affected by.
- virtual machines affected by device maintenance will be referred to as "affected virtual machines”.
- the alarm exclusion setting unit 11e embodies the alarm exclusion setting function (fifth function) (see FIG. 1B).
- the "alarm exclusion setting function" is a function that instructs the physical server to exclude (suppress) the issuance of an alarm that may occur due to device maintenance.
- the affected user identification / saving unit 11f embodies the affected user identification / saving function (sixth function) (see FIG. 1B).
- the "affected user identification / evacuation function" is to identify the affected virtual machine and change the affected virtual machine from the physical server (first server 20a in the first embodiment) to another physical server (first embodiment). Then, it is a function to save to the second server 20b).
- the physical server is provided on demand in response to requests from multiple user terminals. Each user utilizes the provided virtual machine on the physical server.
- the first server 20a is provided to the first user on demand in response to a request from the first user terminal 61a used by the first user.
- the first user uses the first virtual machine 21a on the first server 20a via the first user terminal 61a.
- the first server 20a is provided to the second user on demand in response to a request from the second user terminal 61b used by the second user.
- the second user uses the second virtual machine 22a on the first server 20a via the second user terminal 61b.
- Each user requests resources from each virtual machine on demand and temporarily uses the virtual machine.
- each virtual machine uses an arbitrary number of devices.
- the first user requests the first virtual machine 21a on demand for the first device 31a, which is a resource.
- the first virtual machine 21a uses the first device 31a.
- the second user requests the second virtual machine 22a on demand for the second device 32a and the third device 33a, which are resources.
- the second virtual machine 22a uses the second device 32a and the third device 33a.
- the first virtual machine 21a is connected to the first device 31a and provides a virtual environment to the first user terminal 61a.
- the second device 32a and the third device 33a are connected to provide a virtual environment for the second user terminal 61b.
- the first device 31a, the second device 32a, and the third device 33a each require irregular maintenance work.
- the virtual machine cannot use the device during device maintenance.
- Each physical server actively issues an alarm Wa (see FIG. 1C) to the alarm monitoring system 92 when it detects a predetermined abnormality. In response to this, the alarm monitoring system 92 issues an alarm to the administrator and the like.
- the maintenance request Rq is output from the maintenance instruction device 91 to the controller server 10 at an arbitrary timing.
- the maintenance request Rq is in a form of designating a device to be maintained (hereinafter referred to as "maintenance target device").
- the maintenance request Rq specifies the third device 33a as the maintenance target device.
- the second virtual machine 22a using the third device 33a, which is the maintenance target device becomes the affected virtual machine.
- the controller server 10 receives the maintenance request by the maintenance control unit 11d (fourth function) in response to the maintenance request Rq. Then, the controller server 10 sets the alarm exclusion setting in the physical server by the alarm exclusion setting unit 11e (fifth function), and identifies and saves the affected virtual machine by the affected user specific evacuation unit 11f (sixth function).
- the affected user specific evacuation unit 11f saves only the second virtual machine 22a, which is the affected virtual machine.
- the affected user-specified save unit 11f does not save the first virtual machine 21a.
- the controller server 10 outputs the alarm exclusion setting instruction Cm1 for instructing the exclusion (suppression) of the issuance of the alarm due to the maintenance of the device to the first server 20a by the alarm exclusion setting unit 11e (fifth function). do.
- the first server 20a sets a filter for the filter setting unit 26a to exclude (suppress) the issuance of an alarm due to the maintenance of the third device 33a, which is a maintenance target device. I do.
- controller server 10 outputs an evacuation instruction Cm2 for instructing evacuation (migration) of the affected virtual machine to another server by the affected user specific evacuation unit 11f (sixth function) to the first server 20a.
- the first server 20a saves (migrates) the second virtual machine 22a, which is the affected virtual machine, to the second server 20b.
- the second user terminal 61b is connected to the second virtual machine 22b constructed on the second server 20b.
- the second virtual machine 22b of the second server 20b uses the second device 32b and the third device 33b to provide the same virtualization environment as the second virtual machine 22a to the second user.
- the first virtual machine 21a that does not use the third device 33a can be continuously used without being evacuated.
- FIG. 2 is a block diagram of the controller server 10.
- the controller server 10 includes a control unit 11, a storage unit 12, and a communication unit 19.
- the control unit 11 has an allocation unit 11a, a usage status management unit 11b, an alarm-related management unit 11c, a maintenance control unit 11d, an alarm exclusion setting unit 11e, and an affected user specific evacuation unit 11f. ..
- the control unit 11 is the CPU of the controller server 10, and embodies the functions of each unit by executing the control program Pr.
- the allocation unit 11a allocates an arbitrary number of devices connected to the server to the physical server and the virtual machine managed by the user. This allows the virtual machine to utilize the assigned device.
- the usage status management unit 11b records the correspondence between the virtual machine managed by each user and the device used by this virtual machine.
- the alarm-related management unit 11c records the correspondence between the device and the alarm type that may occur during maintenance of the device.
- the maintenance control unit 11d receives the device maintenance request Rq from the external maintenance instruction device 91 or the like, and is instructed to exclude (suppress) the issuance of an alarm that may occur due to the device maintenance, and the virtual user affected by the device maintenance. Determines the order with the save instruction to other physical servers of the affected virtual machine that is the machine.
- the maintenance control unit 11d causes the alarm exclusion setting instruction Cm1 (see FIG. 1B) to be output to the first server 20a earlier than the evacuation instruction Cm2 (see FIG. 1B).
- the alarm exclusion setting unit 11e instructs the physical server to exclude (suppress) the issuance of an alarm that may occur due to device maintenance based on the alarm type recorded by the alarm-related management unit 11c.
- the affected user identification save unit 11f identifies the affected virtual machine based on the correspondence between the device and the virtual machine that uses this device, using the device ID to be maintained as a key, and transfers this affected virtual machine to another physical server. Evacuate. The correspondence between the device and the virtual machine that uses this device is recorded in the usage status database 12a by the usage status management unit 11b.
- the control program Pr is stored in the storage unit 12. Further, in the storage unit 12, a usage status database 12a and an alarm relational database 12b are constructed.
- the usage status database 12a (first database) is a device allocation function to users, and records the correspondence between the virtual machine managed by each user and the device used by the virtual machine.
- the alarm-related database 12b (second database) records the correspondence between each device and the alarm type that may occur in this device during maintenance.
- FIG. 3 is an explanatory diagram of the usage status database 12a.
- the usage status database 12a associates a user ID that identifies a user's virtual machine with a device ID of a device used by this virtual machine.
- the first device 31a is associated with the first virtual machine 21a of the first user.
- the second device 32a and the third device 33a are associated with the second virtual machine 22a of the second user.
- the affected user identification save unit 11f identifies the virtual machine that uses the maintenance target device specified in the maintenance request as the affected virtual machine by referring to the usage status database 12a at the time of receiving the maintenance request. By doing so, the affected user identification evacuation unit 11f can easily and quickly identify the virtual machine associated with the device ID of the maintenance target device.
- FIG. 4 is an explanatory diagram of the alarm relational database 12b.
- the alarm-related database 12b associates the device ID with the exclusion target alarm type.
- the “exclusion target alarm type” means the type of alarm to be excluded from monitoring during maintenance of the device indicated by the device ID.
- "Reboot” is associated with the exclusion target alarm type for the first device 31a. Rebooting means rebooting the device.
- “Shutdown” is associated with the exclusion target alarm type for the first device 31b. Shutdown means shutting down the device and turning it off.
- “unavailable” is associated with the exclusion target alarm type for 31c. Unavailable means that the device is unusable.
- the alarm exclusion setting unit 11e refers to the alarm-related database 12b and instructs the physical server to suppress the issuance of an alarm that may occur due to the maintenance of the device specified in the maintenance request. By doing so, the alarm exclusion setting unit 11e can exclude (suppress) the issuance of an alarm that may occur due to device maintenance.
- FIG. 5 is a flowchart showing the overall operation of the controller server 10.
- FIG. 6 is a flowchart showing the operation of the controller server 10 at the time of alarm-related recording in step S125 shown in FIG.
- FIG. 7 is a flowchart showing the operation of the controller server 10 at the time of preparation for maintenance in step S140 shown in FIG.
- the maintenance control unit 11d of the controller server 10 repeatedly determines whether or not there is a request from the maintenance instruction device 91, which is a user terminal (step S105), and receives a request from the user terminal. In the case (in the case of “Yes”), the request from the user terminal is accepted (step S110). The request from the user terminal includes the ID of the device to be used. In step S105, the maintenance control unit 11d returns to the process of step S105 when there is no request from the user terminal (in the case of “No”).
- the allocation unit 11a of the controller server 10 allocates the requested device to the user's virtual machine (step S115). Then, the usage status management unit 11b of the controller server 10 records the correspondence between the ID of each virtual machine managed by the user and the ID of the device used by this virtual machine in the usage status database 12a, thereby using the device. Record the situation (step S120). Further, the alarm-related management unit 11c of the controller server 10 records the correspondence relationship between the device ID and the alarm type that may occur during maintenance of this device in the alarm-related database 12b (step S125).
- step S125 for example, the alarm-related recording process shown in FIG. 6 is performed.
- the alarm-related management unit 11c of the controller server 10 receives an input of an alarm type that may occur during maintenance of each device from the user terminal after the user starts using the device (step S125a).
- the alarm-related management unit 11c records the alarm types that may occur during maintenance of each device in the alarm-related database 12b (step S125b).
- the alarm type that can occur during maintenance of each device is input by the user.
- the alarm-related management unit 11c determines whether or not all alarm-related recordings that may occur during device maintenance have been completed (step S125c). When the alarm-related management unit 11c determines in step S125c that the recording is not completed (in the case of "No"), the process returns to step S125b. On the other hand, when the alarm-related management unit 11c determines that the recording is completed (in the case of “Yes”), the process of FIG. 6 ends. In this case, the process proceeds to step S130 in FIG.
- step S130 the maintenance control unit 11d of the controller server 10 determines whether or not there is a device maintenance request Rq from the maintenance instruction device 91 (step S130). If it is determined in step S130 that there is no device maintenance request Rq (in the case of "No"), the process returns to step S130.
- the maintenance control unit 11d receives the device maintenance request Rq (step S135). At this time, the maintenance control unit 11d determines the order of the instruction for excluding (suppressing) the issuance of an alarm that may occur due to maintenance and the instruction for saving the affected virtual machine affected by maintenance to another physical server. Then, the maintenance control unit 11d prepares for maintenance (step S140).
- step S140 for example, the process shown in FIG. 7 is performed.
- the maintenance control unit 11d of the controller server 10 instructs the alarm exclusion setting unit 11e to exclude (suppress) the issuance of an alarm that may occur due to the maintenance of the maintenance target device.
- the alarm exclusion setting unit 11e refers to the alarm relational database 12b with the device ID attached to the maintenance target device (hereinafter referred to as “designated device ID”) as an argument (step S140a).
- the alarm exclusion setting unit 11e identifies the alarm type that may occur due to the maintenance of this device.
- the alarm exclusion setting unit 11e determines whether or not there is an exclusion target alarm associated with the designated device ID (step S140b).
- step S140b If it is determined in step S140b that there is no exclusion target alarm associated with the designated device ID (in the case of "No"), the process proceeds to step S140d.
- the alarm exclusion setting unit 11e When it is determined that there is an exclusion target alarm associated with the designated device ID (in the case of "Yes"), the alarm exclusion setting unit 11e outputs an alarm exclusion setting instruction to the physical server and filters the physical server. The setting unit is made to set the alarm of the exclusion target alarm type associated with the designated device ID in the filter (step S140c). Specifically, as shown in FIG. 1B, the alarm exclusion setting unit 11e outputs the alarm exclusion setting instruction Cm1 to the first server 20a, and the designated device ID for the filter setting unit 26a of the first server 20a. Set the alarm of the exclusion target alarm type associated with. As a result, the first server 20a can suppress the issuance of an alarm when the maintenance of the device is executed in step S145 described later.
- step S140b If it is determined in step S140b that there is no exclusion target alarm associated with the designated device ID (in the case of "No"), or after step S140c, the maintenance control unit 11d is a virtual machine affected by maintenance. Instructs the affected user-specified save unit 11f to save the affected virtual machine to another physical server. In response to this, the affected user identification save unit 11f refers to the usage status database 12a with the designated device ID as an argument (step S140d). Then, the affected user identification evacuation unit 11f determines whether or not there is a user ID that is using the device with the designated device ID (that is, the device to be maintained) (step S140e). This user ID identifies the affected virtual machine. Here, the affected user specific evacuation unit 11f determines whether or not there is an affected virtual machine.
- the affected user identification save unit 11f affects the physical server with the user ID as an argument. Instruct to save the virtual machine (step S140f). Specifically, as shown in FIG. 1B, the affected user specific evacuation unit 11f is a second affected virtual machine with the user ID using the third device 33a as an argument to the first server 20a. Instructs the evacuation of the virtual machine 22a. In response to this, the second virtual machine 22a is evacuated (migrated) between the first server 20a and the second server 20b.
- step S140e If it is determined in step S140e that there is no user ID in use (in the case of "No"), or after step S140f, the process of step S140 ends. In this case, the process proceeds to step S145 in FIG.
- step S140 the operator or the like maintains the device (step S145) and returns to step S130.
- Second Embodiment In the server system 100A of the second embodiment, a function is added to automatically perform maintenance on a device-by-device basis triggered by a device failure, from the occurrence of a failure to maintenance on a device-by-device basis and evacuation of only affected users. Performs a series of processes autonomously.
- FIG. 8 is an explanatory diagram of the overall configuration and operation of the server system including the controller server 10A (server maintenance control device) according to the second embodiment.
- the server system 100A shown in FIG. 8 includes a controller server 10A and an alarm monitoring system 92A, which are different from those in the first embodiment. Other configurations are the same as those of the server system 100 of the first embodiment.
- the controller server 10A is a computer that functions as a server maintenance control device that controls the maintenance process of the server.
- the controller server 10A has a configuration similar to that of the controller server 10 of the first embodiment, and further includes a maintenance request generation unit 11g.
- the alarm monitoring system 92A is a system that monitors alarms issued from each physical server and notifies an administrator or the like, and includes a device failure notification unit 921a and a device failure management unit 921b.
- the device failure notification unit 921a embodies the device failure notification function (seventh function) (see FIGS. 8 and 9).
- the "device failure notification function" is a function of notifying the maintenance request generation unit 11g of the controller server 10A of failure information related to a device failure. That is, the device failure notification unit 921a determines whether or not this notification is a device failure by inputting a notification from a physical server equipped with the device and comparing it with each record of the device failure notification function. If this notification is related to a device failure, the maintenance request generation unit 11g of the controller server 10A is notified of the occurrence of the failure together with information that uniquely identifies the target physical server and device.
- the device failure notification unit 921a autonomously notifies the maintenance request generation unit 11g of the server maintenance control device of the device failure, the device failure can be dealt with promptly.
- the notification from the physical server equipped with the device here is rsyslog or SNMP (Simple Network Management Protocol) that transfers the system log to the remote server.
- SNMP Simple Network Management Protocol
- the present invention is not limited to this, and the alarm monitoring system 92A may periodically check the physical server on which the device is mounted by polling.
- the device failure notification unit 921a of the second embodiment detects that the device has failed, it autonomously notifies the maintenance request generation unit 11g.
- the present invention is not limited to this, and the device failure notification unit 921a may notify the operator when it detects that the device has failed, and then the operator may determine whether or not to notify the maintenance request generation unit 11g.
- the device failure notification unit 921a may be arranged on the controller server 10A or an independent server, and may receive the device failure notification by an interface independent of the alarm monitoring.
- the device failure management unit 921b embodies the device failure notification function.
- the "device failure notification function" is a function for recording failure information corresponding to a device failure in the device failure database 922b (see FIG. 10). Since the device failure management unit 921b notifies the maintenance request generation unit 11g only of the predetermined failure information, the load on the server maintenance control device can be reduced.
- the controller server 10A internally constructs the configuration shown in FIG. 8 by executing the control program Pr. As a result, the controller server 10A realizes the eighth function in addition to the first function to the sixth function similar to the first embodiment.
- the maintenance request generation unit 11g embodies the maintenance request generation function (eighth function).
- the "maintenance request generation function" is a function of notifying the maintenance control unit 11d of a failure response maintenance request based on the device failure information and the target server information notified from the alarm monitoring system 92A. As a result, device maintenance can be performed using the device failure detection as a trigger.
- the device failure notification unit 921a of the alarm monitoring system 92A determines whether or not the device has failed. If the device failure notification unit 921a determines that the device has failed, the device failure notification unit 921a notifies the operator (user) of an alarm and also notifies the maintenance request generation unit 11g of the controller server 10.
- the maintenance request generation unit 11g generates a maintenance request Rq for the device based on the device failure information and notifies the maintenance control unit 11d.
- the device maintenance request Rq includes a device ID that uniquely identifies the failed device.
- FIG. 9 is a block diagram of the controller server 10A. As shown in FIG. 9, the controller server 10A includes a control unit 11A, a storage unit 12 similar to that of the first embodiment, and a communication unit 19.
- the control unit 11A has the same allocation unit 11a, usage status management unit 11b, alarm-related management unit 11c, maintenance control unit 11d, alarm exclusion setting unit 11e, and affected user specific evacuation unit as in the first embodiment. It has 11f.
- the control unit 11A further includes a maintenance request generation unit 11g.
- the control unit 11A is the CPU of the controller server 10A, and embodies the functions of each unit by executing the control program Pr. The function of the maintenance request generation unit 11g has already been described with reference to FIG.
- FIG. 10 is a block diagram of the alarm monitoring system 92A. As shown in FIG. 10, the alarm monitoring system 92A includes a control unit 921, a storage unit 922, and a communication unit 923.
- the control unit 921 has a device failure notification unit 921a and a device failure management unit 921b.
- the control unit 921 is a CPU of a device constituting the alarm monitoring system 92A, and embodies the functions of each unit by executing the alarm monitoring program 922a described later.
- the device failure notification unit 921a has already been described with reference to FIG.
- the device failure management unit 921b embodies the device failure recording function.
- the "device failure recording function" is a function for recording and managing failure information corresponding to a device failure.
- the device failure recording function is realized by the device failure management unit 921b and the device failure database 922b described later.
- the alarm monitoring program 922a and the device failure database 922b are stored in the storage unit 922.
- the device failure database 922b is a third database that records failure information corresponding to a device failure.
- FIG. 11 is an explanatory diagram of the device failure database 922b. As shown in FIG. 11, the device failure database 922b records failure information corresponding to a device failure. “Device Failure” is failure information indicating that the device has failed in operation. “Error” is failure information indicating that an error has occurred during the operation of the device. “Unavailable” is failure information indicating that the device cannot be used.
- FIG. 12 is a flowchart of the registration process in the usage status database 12a.
- the allocation unit 11a allocates the device to the virtual machine of the user (S200), and when the allocation result is registered in the usage status database 12a (S201), the process of FIG. 12 ends.
- the correspondence between each virtual machine managed by the user and the device used by the virtual machine is recorded in the usage status database 12a.
- FIG. 13 is a flowchart of the registration process in the alarm relational database 12b.
- the user inputs an alarm type to be excluded via a terminal or the like (S210).
- the alarm type to be excluded here means an alarm type that can occur during device maintenance.
- the alarm-related management unit 11c records one of the input alarm types to be excluded in the alarm-related database 12b (S211). Then, the alarm-related management unit 11c determines whether or not the recording is completed (S212). If the recording is not completed (No), the alarm-related management unit 11c returns to the process of step S211 and ends the process of FIG. 13 if the recording is completed (Yes).
- the device failure notification unit 921a of the alarm monitoring system 92A collates with the device failure database 922b based on the alarm from the device (S221). Then, the device failure notification unit 921a ends the process of FIG. 14A if the alarm is not a device failure (No), and proceeds to step S222 if the alarm is a device failure (Yes). As described above, since the device failure notification unit 921a notifies the controller server 10A only in the case of a device failure, the load on the controller server 10A can be reduced.
- step S222 the device failure notification unit 921a notifies the operator that the device has failed.
- the device failure notification unit 921a further calls the maintenance request generation unit 11g together with the device ID included in the alarm (S223).
- the maintenance request generation unit 11g calls the maintenance control unit 11d based on the device ID (S224). Then, when the maintenance control unit 11d calls the alarm exclusion setting unit 11e to instruct the exclusion (suppression) of the issuance of an alarm that may occur due to the maintenance of the device to be maintained based on the device ID (S225), FIG. The process proceeds to step S226 of 14B.
- the alarm exclusion setting unit 11e refers to the alarm-related database 12b with the device ID attached to the maintenance target device, that is, the designated device ID as an argument. As a result, the alarm exclusion setting unit 11e identifies the alarm type that may occur due to maintenance. Then, the alarm exclusion setting unit 11e determines whether or not there is an exclusion target alarm associated with the designated device ID (S227).
- step S227 if there is an exclusion target alarm associated with the designated device ID (Yes), the alarm exclusion setting unit 11e proceeds to step S228, sets the exclusion target alarm in the filter setting unit, and steps S229. move on. If there is no exclusion target alarm associated with the designated device ID (No), the alarm exclusion setting unit 11e proceeds to step S229.
- step S229 the maintenance control unit 11d calls the affected user specific evacuation unit 11f with the device ID designated as the maintenance target as an argument.
- step S230 the affected user identification evacuation unit 11f determines whether or not there is a user ID related to the virtual machine using the designated device ID. If there is a user ID related to the virtual machine using the designated device ID (Yes), the affected user identification save unit 11f instructs the virtual machine to save using the designated user ID as an argument, and performs the process of FIG. 14B. finish. If there is no user ID related to the virtual machine using the designated device ID (No), the affected user identification save unit 11f ends the process of FIG. 14B.
- the alarm monitoring system 92A is activated triggered by a device failure, and the maintenance control unit 11d is activated based on the device information. As a result, the alarm monitoring system 92A issues an alarm due to failure detection, and the controller server 10A suppresses the issue of an alarm due to device maintenance, and then saves the affected virtual machine that uses the device. As a result, maintenance can be performed promptly in the event of a failure of the device connected to the server.
- the server maintenance control device records the correspondence between the allocation unit that allocates the device connected to the server to the virtual machine managed by the user, and the virtual machine and the device used by the virtual machine.
- the maintenance control unit that determines the order of the instruction to save the virtual machine to other servers affected by maintenance, and the alarm type recorded in the alarm-related management unit are generated in the device during the maintenance.
- the affected virtual machine is specified based on the correspondence between the alarm exclusion setting unit that instructs the server to suppress the issuance of possible alarms and the virtual machine recorded in the usage status management unit and the device used by the virtual machine. It has an influence user specific save unit for saving from the server to the other server.
- Such a server maintenance control device manages the allocation of devices to each virtual machine.
- the server maintenance control device is a server (first server) so that an alarm generated by the maintenance is not issued when the maintenance target device (third device 33a) connected to the server is maintained. 20a) is made to set the filter, and the virtual machine assigned to the maintenance target device is specified and saved (migrated) from the server (first server 20a) to another server (second server 20b).
- the server maintenance control device suppresses the save processing of the virtual machine that does not use this device to another physical server on the server to which the maintenance target device is connected, and also performs maintenance. It is possible to suppress the issuance of an alarm due to the above. As a result, the server maintenance control device according to the present invention can continue the operation of other virtual machines except the affected virtual machine. In addition, it is possible to suppress the issuance of an alarm due to device maintenance.
- the usage status management unit records the correspondence between the virtual machine and the device used by the virtual machine in the first database, and the affected user identification / saving unit stores the first database at the time of receiving the maintenance request.
- the server maintenance control device according to claim 1, wherein a virtual machine that uses the device specified in the maintenance request with reference to the reference is specified as the affected virtual machine.
- the server maintenance control device can easily and quickly identify the virtual machine associated with the device ID of the device to be maintained.
- the alarm-related management unit records the correspondence between each device and the exclusion target alarm type to be excluded from monitoring at the time of maintenance of the device in the second database, and the alarm exclusion setting unit requests maintenance.
- the server maintenance control device can exclude (suppress) the issuance of an alarm that may occur due to device maintenance.
- the server maintenance control device further comprising a maintenance request generation unit that generates a maintenance request for the device related to the failure information based on the failure information of any of the devices. And said.
- the server maintenance system of the present invention includes the server maintenance control device according to (4) and an alarm including a device failure notification unit that notifies the maintenance request generation unit of the failure information of the device when a device failure is detected. It is characterized by having a monitoring device.
- the failure of the device is autonomously notified to the maintenance request generation unit of the server maintenance control device, so that the failure of the device can be dealt with promptly.
- the maintenance request generation unit is notified only of the predetermined failure information, so that the load on the server maintenance control device can be reduced.
- the server maintenance control method is a server maintenance control method of a server maintenance control device, and the server maintenance control device is a device connected to a server for a virtual machine managed by a user.
- the server maintenance control method according to the present invention suppresses the save processing of the virtual machine that does not use this device to another server on the server to which the device to be maintained is connected, and also performs maintenance. It is possible to suppress the issuance of the accompanying alarm. As a result, the server maintenance control method according to the present invention can continue the operation of other virtual machines except the affected virtual machine. It also suppresses the issuance of alarms associated with device maintenance.
- the program according to the present invention describes a procedure for assigning a device connected to a server to a computer managed by a user as a server maintenance control device, and a correspondence between the virtual machine and the device used by the virtual machine.
- the procedure for recording the alarm in the first database the procedure for recording the alarm type that can be generated in each device during maintenance in the second database, the instruction to suppress the issuance of the alarm that may occur due to maintenance when the maintenance request is received, and the virtual machine.
- the procedure for determining the order of the virtual machine's evacuation instructions to other servers affected by maintenance, and the issuance of alarms that may occur due to the maintenance based on the alarm type recorded in the second database.
- the affected virtual machine is identified and saved from the server to the other server based on the procedure for instructing the server to exclude and the correspondence between the virtual machine recorded in the first database and the device used by the virtual machine. It is for executing the procedure.
- the program according to the present invention suppresses the evacuation process of the virtual machine that does not use this device to another server on the server to which the maintenance target device is connected, and also suppresses the evacuation process of the virtual machine associated with the maintenance. It is possible to suppress the issuance. As a result, the program according to the present invention can continue the operation of other virtual machines except the affected virtual machine. It also suppresses the issuance of alarms associated with device maintenance.
- the present invention is not limited to the above-described embodiment, and various changes and modifications can be made without departing from the gist of the present invention. Further, the above-described embodiment has been described in detail in order to explain the gist of the present invention in an easy-to-understand manner. Therefore, the present invention is not necessarily limited to those including all the components described above. In addition, the present invention can add other components to a certain component, or change some components to other components. In addition, the present invention can also delete some components.
Landscapes
- Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Quality & Reliability (AREA)
- Debugging And Monitoring (AREA)
- Hardware Redundancy (AREA)
Abstract
Description
(1)メンテナンス対象デバイスが接続された物理サーバ全体を警報監視の対象外に設定する。
(2)メンテナンス対象デバイスが接続された物理サーバを利用中のユーザのインスタンス(仮想マシン)を他のサーバに退避(移行)させる。
<サーバシステムの全体構成と動作>
以下、図1A乃至図1Cを参照して、第1の実施形態に係るコントローラサーバ10を含むサーバシステム100(サーバメンテナンスシステム)の全体構成と動作について説明する。図1A乃至図1Cは、それぞれ、第1の実施形態に係るコントローラサーバ10(サーバメンテナンス制御装置)を含むサーバシステム100の全体構成と動作の説明図である。
各物理サーバ(第1の実施形態では、第1サーバ20aと第2サーバ20b)は、ユーザに仮想化環境を提供するコンピュータである。
メンテナンス指示装置91は、各物理サーバに接続された外部デバイスのメンテナンス時に、メンテナンス要求Rq(図1B参照)をコントローラサーバ10に送信する端末装置である。
警報監視システム92は、各物理サーバから発出される警報を監視して管理者等に通知するシステムである。
第1デバイス31aや第2デバイス32aや第3デバイス33aは、それぞれ不定期にメンテナンス作業が必要となる。デバイスのメンテナンス中に、仮想マシンは当該デバイスを利用できない。
このとき、第3デバイス33aのメンテナンス作業においても、第3デバイス33aを利用しない第1仮想マシン21aを退避させず、継続して利用できる。
以下、図2を参照して、コントローラサーバ10(サーバメンテナンス制御装置)の構成について説明する。図2は、コントローラサーバ10の構成ブロック図である。
警報関係管理部11cは、デバイスと、このデバイスのメンテナンス時に発生しうる警報種別との対応を記録する。
影響ユーザ特定退避部11fは、メンテナンス対象のデバイスIDをキーとして、デバイスとこのデバイスを利用する仮想マシンとの対応に基づいて影響仮想マシンを特定して、この影響仮想マシンを他の物理サーバに退避させる。デバイスとこのデバイスを利用する仮想マシンとの対応は、利用状況管理部11bにより利用状況データベース12aに記録されている。
警報関係データベース12b(第2データベース)は、各デバイスと、メンテナンス時にこのデバイスに発生しうる警報種別との対応を記録する。
以下、図3を参照して、利用状況データベース12aの構成について説明する。図3は、利用状況データベース12aの説明図である。
以下、図4を参照して、警報関係データベース12bの構成について説明する。図4は、警報関係データベース12bの説明図である。
以下、図5乃至図7を参照して、コントローラサーバ10(サーバメンテナンス制御装置)の動作について説明する。図5は、コントローラサーバ10の全体の動作を表すフローチャートである。図6は、図5に示すステップS125の警報関係記録時のコントローラサーバ10の動作を表すフローチャートである。図7は、図5に示すステップS140のメンテナンス準備時のコントローラサーバ10の動作を表すフローチャートである。
ステップS105において、メンテナンス制御部11dは、ユーザ端末からの要求が無かった場合(“No”の場合)に、ステップS105の処理に戻る。
図6に示すように、まず、コントローラサーバ10の警報関係管理部11cは、ユーザがデバイスの利用を開始した後に、ユーザ端末から各デバイスのメンテナンス時に発生しうる警報種別の入力を受け付ける(ステップS125a)。次に、警報関係管理部11cは、各デバイスのメンテナンス時に発生しうる警報種別を警報関係データベース12bに記録する(ステップS125b)。なお、各デバイスのメンテナンス時に発生しうる警報種別は、ユーザによって入力される。
図7に示すように、まず、コントローラサーバ10のメンテナンス制御部11dは、メンテナンス対象デバイスのメンテナンスにより発生しうる警報の発出の除外(抑止)を警報除外設定部11eに指示する。これに応答して、警報除外設定部11eは、メンテナンス対象デバイスに付されたデバイスID(以下、「指定デバイスID」と称する)を引数にして警報関係データベース12bを参照する(ステップS140a)。これにより、警報除外設定部11eは、このデバイスのメンテナンスにより発生しうる警報種別を特定する。そして警報除外設定部11eは、指定デバイスIDに紐づく除外対象警報があるか否かを判定する(ステップS140b)。
第2の実施形態のサーバシステム100Aでは、デバイス故障をトリガに、デバイス単位でのメンテナンスを自動的に行う機能を追加し、故障発生からデバイス単位でのメンテナンスと、影響のあるユーザのみの退避までの一連の処理を自律的に行う。
以降のサーバシステム100Aの動作は、第1の実施形態のサーバシステム100の動作と同様である。
図9に示すように、コントローラサーバ10Aは、制御部11Aと、第1の実施形態と同様な記憶部12と、通信部19とを備えている。
図10に示すように、警報監視システム92Aは、制御部921と、記憶部922と、通信部923とを備えている。
デバイス故障管理部921bは、デバイス故障記録機能を具現化するものである。「デバイス故障記録機能」とは、デバイスの故障に該当する故障情報を記録管理する機能である。デバイスの故障記録機能は、このデバイス故障管理部921bと、後記するデバイス故障データベース922bによって実現される。
図11に示すように、デバイス故障データベース922bは、デバイスの故障に該当する故障情報を記録する。“Device Failure”とは、デバイスが動作を失敗した旨の故障情報である。“Error”とは、デバイスの動作中にエラーが発生した旨の故障情報である。“unavailable”とは、デバイスが使用不能である旨の故障情報である。
最初、割当部11aは、ユーザの仮想マシンへのデバイス割り当てを行い(S200)、割当結果を利用状況データベース12aに登録すると(S201)、図12の処理を終了する。これにより利用状況データベース12aには、ユーザが管理する各仮想マシンと、この仮想マシンが利用するデバイスとの対応が記録される。
ユーザは、端末などを介して除外対象とする警報種別を入力する(S210)。ここで除外対象とする警報種別とは、デバイスのメンテナンス時に発生しうる警報種別のことをいう。
最初、警報監視システム92Aのデバイス故障通知部921aは、デバイスからのアラームをもとに、デバイス故障データベース922bと照合する(S221)。そして、デバイス故障通知部921aは、アラームがデバイス故障でなければ(No)、図14Aの処理を終了し、アラームがデバイス故障ならば(Yes)、ステップS222に進む。このように、デバイス故障通知部921aは、デバイス故障の場合に限って、コントローラサーバ10Aに通知するので、コントローラサーバ10Aの負荷を軽減することができる。
ステップS230において、影響ユーザ特定退避部11fは、指定デバイスIDを利用中の仮想マシンに係るユーザIDが有るか否かを判定する。影響ユーザ特定退避部11fは、指定デバイスIDを利用中の仮想マシンに係るユーザIDが有るならば(Yes)、指定されたユーザIDを引数に仮想マシンの退避を指示し、図14Bの処理を終了する。影響ユーザ特定退避部11fは、指定デバイスIDを利用中の仮想マシンに係るユーザIDが無いならば(No)、図14Bの処理を終了する。
以下、本発明に係るサーバメンテナンス制御装置の構成と効果について説明する。
11,11A 制御部
11a 割当部
11b 利用状況管理部
11c 警報関係管理部
11d メンテナンス制御部
11e 警報除外設定部
11f 影響ユーザ特定退避部
11g メンテナンス要求生成部
12 記憶部
12a 利用状況データベース(第1データベース)
12b 警報関係データベース(第2データベース)
19 通信部
20a 第1サーバ
20b 第2サーバ
21a 第1仮想マシン
22a,22b 第2仮想マシン
26a,26b フィルタ設定部
31a,31b 第1デバイス
32a,32b 第2デバイス
33a,33b 第3デバイス
61a 第1ユーザ端末
61b 第2ユーザ端末
91 メンテナンス指示装置
92,92A 警報監視システム
921 制御部
921a デバイス故障通知部
921b デバイス故障管理部
922 記憶部
922a 警報監視プログラム
922b デバイス故障データベース (第3のデータベース)
923 通信部
99 記憶媒体
100,100A サーバシステム(サーバメンテナンスシステム)
Cm1 警報除外設定指示
Cm2 退避指示
Pr 制御プログラム
Rq メンテナンス要求
Wa 警報
Claims (8)
- ユーザが管理する仮想マシンに対して、サーバに接続されたデバイスを割り当てる割当部と、
前記仮想マシンとそれが利用するデバイスとの対応を記録する利用状況管理部と、
メンテナンス時に各前記デバイスに発生しうる警報種別を記録する警報関係管理部と、
メンテナンス要求を受け付けると、メンテナンス時に前記デバイスに発生しうる警報の発出の抑止指示と前記仮想マシンのうちメンテナンスにより影響を受ける影響仮想マシンの他のサーバへの退避指示との順序を決定するメンテナンス制御部と、
前記警報関係管理部に記録された前記警報種別に基づいて前記メンテナンス時にデバイスに発生しうる警報の発出の抑止を前記サーバに指示する警報除外設定部と、
前記利用状況管理部に記録された前記仮想マシンとそれが利用するデバイスとの対応に基づいて前記影響仮想マシンを特定して前記サーバから前記他のサーバに退避させる影響ユーザ特定退避部と、を有する、
ことを特徴とするサーバメンテナンス制御装置。 - 前記利用状況管理部は、前記仮想マシンとそれが利用するデバイスとの対応を第1データベースに記録しておき、
前記影響ユーザ特定退避部は、メンテナンス要求受付時に、前記第1データベースを参照して前記メンテナンス要求で指定されたデバイスを利用する仮想マシンを、前記影響仮想マシンとして特定する、
ことを特徴とする請求項1に記載のサーバメンテナンス制御装置。 - 前記警報関係管理部は、各デバイスとそれのメンテナンス時に監視の除外対象となる除外対象警報種別との対応関係を第2データベースに記録しておき、
前記警報除外設定部は、メンテナンス要求受付時に、前記第2データベースを参照して前記メンテナンス要求で指定されたデバイスのメンテナンスにより発生しうる警報の発出の抑止を前記サーバに指示する、
ことを特徴とする請求項1に記載のサーバメンテナンス制御装置。 - 前記デバイスのうち何れかの故障情報に基づき、前記故障情報に係るデバイスのメンテナンス要求を生成するメンテナンス要求生成部、
を更に備えることを特徴とする請求項1に記載のサーバメンテナンス制御装置。 - 請求項4に記載のサーバメンテナンス制御装置と、
デバイスの故障を検知すると前記メンテナンス要求生成部に当該デバイスの故障情報を通知するデバイス故障通知部を備える警報監視装置と、
を有することを特徴とするサーバメンテナンスシステム。 - 前記警報監視装置は、前記デバイス故障通知部が前記メンテナンス要求生成部に通知する故障情報を記録する第3のデータベースを備える、
ことを特徴とする請求項5に記載のサーバメンテナンスシステム。 - サーバメンテナンス制御装置のサーバメンテナンス制御方法であって、
前記サーバメンテナンス制御装置は、
ユーザが管理する仮想マシンに対して、サーバに接続されたデバイスを割り当てるステップと、
前記仮想マシンとそれが利用するデバイスとの対応を第1データベースに記録するステップと、
メンテナンス時に各前記デバイスに発生しうる警報種別を第2データベースに記録するステップと、
メンテナンス要求を受け付けるステップと、
前記第2データベースに記録された前記警報種別に基づいてメンテナンス時に前記デバイスに発生しうる警報の発出の除外を前記サーバに指示するステップと、
前記第1データベースに記録された前記仮想マシンとそれが利用するデバイスとの対応に基づいてメンテナンスにより影響を受ける前記仮想マシンである影響仮想マシンを特定して前記サーバから他のサーバに退避させるステップと、を実行する、
ことを特徴とするサーバメンテナンス制御方法。 - サーバメンテナンス制御装置としてコンピュータに、
ユーザが管理する仮想マシンに対して、サーバに接続されたデバイスを割り当てる手順、
前記仮想マシンとそれが利用するデバイスとの対応を第1データベースに記録する手順、
メンテナンス時に各前記デバイスに発生しうる警報種別を第2データベースに記録する手順、
メンテナンス要求を受け付けると、メンテナンスにより発生しうる警報の発出の抑止指示と前記仮想マシンのうちメンテナンスにより影響を受ける影響仮想マシンの他のサーバへの退避指示との順序を決定する手順、
前記第2データベースに記録された前記警報種別に基づいて前記メンテナンスにより発生しうる警報の発出の除外を前記サーバに指示する手順、
前記第1データベースに記録された前記仮想マシンとそれが利用するデバイスとの対応に基づいて前記影響仮想マシンを特定して前記サーバから前記他のサーバに退避させる手順、
を実行させるためのプログラム。
Priority Applications (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US18/014,855 US12386649B2 (en) | 2020-07-10 | 2020-09-08 | Server maintenance control device, server maintenance system, server maintenance control method, and program |
| JP2022534888A JP7405260B2 (ja) | 2020-07-10 | 2020-09-08 | サーバメンテナンス制御装置、システム、制御方法及びプログラム |
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| JPPCT/JP2020/026992 | 2020-07-10 | ||
| PCT/JP2020/026992 WO2022009410A1 (ja) | 2020-07-10 | 2020-07-10 | サーバメンテナンス制御装置、制御方法、及び、プログラム |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| WO2022009438A1 true WO2022009438A1 (ja) | 2022-01-13 |
Family
ID=79552379
Family Applications (2)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/JP2020/026992 Ceased WO2022009410A1 (ja) | 2020-07-10 | 2020-07-10 | サーバメンテナンス制御装置、制御方法、及び、プログラム |
| PCT/JP2020/033954 Ceased WO2022009438A1 (ja) | 2020-07-10 | 2020-09-08 | サーバメンテナンス制御装置、システム、制御方法及びプログラム |
Family Applications Before (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/JP2020/026992 Ceased WO2022009410A1 (ja) | 2020-07-10 | 2020-07-10 | サーバメンテナンス制御装置、制御方法、及び、プログラム |
Country Status (3)
| Country | Link |
|---|---|
| US (1) | US12386649B2 (ja) |
| JP (1) | JP7405260B2 (ja) |
| WO (2) | WO2022009410A1 (ja) |
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JP7683966B1 (ja) * | 2024-01-29 | 2025-05-27 | Necプラットフォームズ株式会社 | コンピュータシステム、障害処理方法、及び、そのプログラム |
Families Citing this family (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN115271669B (zh) * | 2022-08-01 | 2024-12-27 | 上海诺创信息技术有限公司 | 一种用于erp服务器的维护方法及系统 |
Citations (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JP2011081588A (ja) * | 2009-10-07 | 2011-04-21 | Nec Corp | コンピュータシステム、及びコンピュータシステムのメンテナンス方法 |
| WO2014203360A1 (ja) * | 2013-06-19 | 2014-12-24 | 富士通株式会社 | 情報処理装置、情報処理方法及び情報処理プログラム |
Family Cites Families (52)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20060085668A1 (en) * | 2004-10-15 | 2006-04-20 | Emc Corporation | Method and apparatus for configuring, monitoring and/or managing resource groups |
| US8381209B2 (en) * | 2007-01-03 | 2013-02-19 | International Business Machines Corporation | Moveable access control list (ACL) mechanisms for hypervisors and virtual machines and virtual port firewalls |
| US7865762B2 (en) * | 2007-12-04 | 2011-01-04 | Intel Corporation | Methods and apparatus for handling errors involving virtual machines |
| US9032397B2 (en) * | 2008-05-28 | 2015-05-12 | Hewlett-Packard Development Company, L.P. | Virtual machine migration with direct physical access control |
| US8327355B2 (en) * | 2008-07-15 | 2012-12-04 | International Business Machines Corporation | Method, computer program product, and hardware product for supporting virtual machine guest migration overcommit |
| US9715401B2 (en) * | 2008-09-15 | 2017-07-25 | International Business Machines Corporation | Securing live migration of a virtual machine from a secure virtualized computing environment, over an unsecured network, to a different virtualized computing environment |
| US20100161922A1 (en) * | 2008-12-19 | 2010-06-24 | Richard William Sharp | Systems and methods for facilitating migration of virtual machines among a plurality of physical machines |
| US8150971B2 (en) * | 2009-05-31 | 2012-04-03 | Red Hat Israel, Ltd. | Mechanism for migration of client-side virtual machine system resources |
| US8381033B2 (en) * | 2009-10-30 | 2013-02-19 | International Business Machines Corporation | Fault management in virtual computing environments |
| US8874749B1 (en) * | 2010-02-03 | 2014-10-28 | Citrix Systems, Inc. | Network fragmentation and virtual machine migration in a scalable cloud computing environment |
| US8490088B2 (en) * | 2010-09-10 | 2013-07-16 | International Business Machines Corporation | On demand virtual machine image streaming |
| US9021096B2 (en) * | 2012-01-23 | 2015-04-28 | International Business Machines Corporation | Performing maintenance operations on cloud computing node without requiring to stop all virtual machines in the node |
| US10474369B2 (en) * | 2012-02-06 | 2019-11-12 | Vmware, Inc. | Mapping guest pages to disk blocks to improve virtual machine management processes |
| US9122507B2 (en) * | 2012-02-18 | 2015-09-01 | Cisco Technology, Inc. | VM migration based on matching the root bridge of the virtual network of the origination host and the destination host |
| US8997094B2 (en) * | 2012-06-29 | 2015-03-31 | Pulse Secure, Llc | Migrating virtual machines between computing devices |
| JP5954074B2 (ja) * | 2012-09-20 | 2016-07-20 | 富士通株式会社 | 情報処理方法、情報処理装置、及びプログラム。 |
| US9172587B2 (en) * | 2012-10-22 | 2015-10-27 | International Business Machines Corporation | Providing automated quality-of-service (‘QoS’) for virtual machine migration across a shared data center network |
| JP2014178912A (ja) * | 2013-03-15 | 2014-09-25 | Hitachi Ltd | サーバ移動計画策定支援方法 |
| US9361139B1 (en) * | 2013-03-15 | 2016-06-07 | Ca, Inc. | System and method for visualizing virtual system components |
| US9208015B2 (en) * | 2013-06-18 | 2015-12-08 | Vmware, Inc. | Hypervisor remedial action for a virtual machine in response to an error message from the virtual machine |
| US9841983B2 (en) * | 2013-06-28 | 2017-12-12 | Vmware, Inc. | Single click host maintenance |
| JP6232826B2 (ja) * | 2013-08-09 | 2017-11-22 | 富士通株式会社 | 仮想ルータ制御方法、仮想ルータ制御プログラムおよび制御装置 |
| US10452418B2 (en) * | 2013-12-17 | 2019-10-22 | Vmware, Inc. | Location based management of virtual machines in datacenters |
| US20160077854A1 (en) * | 2014-09-12 | 2016-03-17 | International Business Machines Corporation | Expediting host maintenance mode in cloud computing environments |
| US9442742B2 (en) * | 2014-09-18 | 2016-09-13 | Arista Networks, Inc. | Method and system for network device maintenance |
| US10176004B2 (en) * | 2014-11-18 | 2019-01-08 | International Business Machines Corporation | Workload-aware load balancing to minimize scheduled downtime during maintenance of host or hypervisor of a virtualized computing system |
| WO2016121728A1 (ja) * | 2015-01-27 | 2016-08-04 | 日本電気株式会社 | ネットワーク機能仮想化管理およびオーケストレーション装置とシステムと管理方法とプログラム |
| US9798570B2 (en) * | 2015-02-27 | 2017-10-24 | The Faction Group Llc | System and method for nested hypervisors and layer 2 interconnection |
| JP2016167143A (ja) * | 2015-03-09 | 2016-09-15 | 富士通株式会社 | 情報処理システムおよび情報処理システムの制御方法 |
| JP6394455B2 (ja) * | 2015-03-24 | 2018-09-26 | 富士通株式会社 | 情報処理システム、管理装置およびプログラム |
| CN106302623B (zh) * | 2015-06-12 | 2020-03-03 | 微软技术许可有限责任公司 | 承租人控制的云更新 |
| US10725883B2 (en) * | 2015-08-05 | 2020-07-28 | Vmware, Inc. | Externally triggered maintenance of state information of virtual machines for high availablity operations |
| JP2017227969A (ja) * | 2016-06-20 | 2017-12-28 | 富士通株式会社 | 制御プログラム、システム、及び方法 |
| EP3485374A1 (en) * | 2016-07-18 | 2019-05-22 | Telefonaktiebolaget LM Ericsson (PUBL) | Allocating vnfc instances with anti affinity rule to hosts |
| US11150950B2 (en) * | 2016-12-01 | 2021-10-19 | Vmware, Inc. | Methods and apparatus to manage workload domains in virtual server racks |
| JP6885264B2 (ja) * | 2017-08-25 | 2021-06-09 | 富士通株式会社 | 情報処理装置、情報処理システム、及びプログラム |
| US10725885B1 (en) * | 2017-11-17 | 2020-07-28 | Amazon Technologies, Inc. | Methods and apparatus for virtual machine load monitoring |
| US10509567B2 (en) * | 2018-02-06 | 2019-12-17 | Nutanix, Inc. | System and method for migrating storage while in use |
| US10664323B2 (en) * | 2018-03-07 | 2020-05-26 | Microsoft Technology Licensing, Llc | Live migration of virtual machines in distributed computing systems |
| US10860367B2 (en) * | 2018-03-14 | 2020-12-08 | Microsoft Technology Licensing, Llc | Opportunistic virtual machine migration |
| US11579909B2 (en) * | 2018-07-31 | 2023-02-14 | Vmware, Inc. | Honoring resource scheduler constraints during maintenances |
| US11003478B2 (en) * | 2018-12-11 | 2021-05-11 | Schneider Electric It Corporation | Systems and methods for protecting virtual machines running on software-defined storage |
| JP7177349B2 (ja) * | 2019-02-08 | 2022-11-24 | 富士通株式会社 | スケジュールプログラム、スケジュール装置およびスケジュール方法 |
| US11907743B2 (en) * | 2019-05-21 | 2024-02-20 | Oracle International Corporation | System and method for relocating customer virtual machine instances in a multi-tenant cloud service |
| US20210004000A1 (en) * | 2019-07-01 | 2021-01-07 | Vmware, Inc. | Automated maintenance window predictions for datacenters |
| US11449393B2 (en) * | 2019-08-06 | 2022-09-20 | Citrix Systems, Inc. | Automatic restore for a failed virtual computing session |
| US11461191B2 (en) * | 2019-11-14 | 2022-10-04 | Vmware, Inc. | Orchestrating and prioritizing the rebuild of storage object components in a hyper-converged infrastructure |
| US11416277B2 (en) * | 2019-11-22 | 2022-08-16 | Nutanix, Inc. | Situation-aware virtual machine migration |
| US12254335B2 (en) * | 2020-02-26 | 2025-03-18 | Samsung Electronics Co., Ltd. | Storage device-assisted live virtual machine migration |
| US11474857B1 (en) * | 2020-05-06 | 2022-10-18 | Amazon Technologies, Inc. | Accelerated migration of compute instances using offload cards |
| US11610121B2 (en) * | 2020-06-03 | 2023-03-21 | Microsoft Technology Licensing, Llc | Identifying patterns in event logs to predict and prevent cloud service outages |
| CN113805907B (zh) * | 2020-06-15 | 2025-07-01 | 戴尔产品有限公司 | 流水线滚动更新 |
-
2020
- 2020-07-10 WO PCT/JP2020/026992 patent/WO2022009410A1/ja not_active Ceased
- 2020-09-08 US US18/014,855 patent/US12386649B2/en active Active
- 2020-09-08 JP JP2022534888A patent/JP7405260B2/ja active Active
- 2020-09-08 WO PCT/JP2020/033954 patent/WO2022009438A1/ja not_active Ceased
Patent Citations (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JP2011081588A (ja) * | 2009-10-07 | 2011-04-21 | Nec Corp | コンピュータシステム、及びコンピュータシステムのメンテナンス方法 |
| WO2014203360A1 (ja) * | 2013-06-19 | 2014-12-24 | 富士通株式会社 | 情報処理装置、情報処理方法及び情報処理プログラム |
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JP7683966B1 (ja) * | 2024-01-29 | 2025-05-27 | Necプラットフォームズ株式会社 | コンピュータシステム、障害処理方法、及び、そのプログラム |
Also Published As
| Publication number | Publication date |
|---|---|
| US12386649B2 (en) | 2025-08-12 |
| US20230289203A1 (en) | 2023-09-14 |
| JP7405260B2 (ja) | 2023-12-26 |
| WO2022009410A1 (ja) | 2022-01-13 |
| JPWO2022009438A1 (ja) | 2022-01-13 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US10609159B2 (en) | Providing higher workload resiliency in clustered systems based on health heuristics | |
| US9213572B2 (en) | Interdependent virtual machine management | |
| US10680896B2 (en) | Virtualized network function monitoring | |
| US9110717B2 (en) | Managing use of lease resources allocated on fallover in a high availability computing environment | |
| CN103677967B (zh) | 一种数据库的远程数据服务系统及任务调度方法 | |
| US11507479B2 (en) | High availability for a relational database management system as a service in a cloud platform | |
| CN108632057A (zh) | 一种云计算服务器的故障恢复方法、装置及管理系统 | |
| US20140068040A1 (en) | System for Enabling Server Maintenance Using Snapshots | |
| CN106980529B (zh) | 基板管理控制器资源管理的电脑系统 | |
| CN105357038A (zh) | 监控虚拟机集群的方法和系统 | |
| JP2008293117A (ja) | 仮想計算機の性能監視方法及びその方法を用いた装置 | |
| AU2013207906A1 (en) | Fault tolerance for complex distributed computing operations | |
| JP2020115330A (ja) | ソフトウエアアプリケーションプロセスを監視するシステムと方法 | |
| EP3591530B1 (en) | Intelligent backup and recovery of cloud computing environment | |
| US9529656B2 (en) | Computer recovery method, computer system, and storage medium | |
| JP7405260B2 (ja) | サーバメンテナンス制御装置、システム、制御方法及びプログラム | |
| US9032014B2 (en) | Diagnostics agents for managed computing solutions hosted in adaptive environments | |
| US20150220379A1 (en) | Dynamically determining an external systems management application to report system errors | |
| JP2014002798A (ja) | 計算機システム及びプログラム | |
| US8806500B2 (en) | Dynamically setting the automation behavior of resources | |
| JP5390651B2 (ja) | 計算機システム及びプログラム | |
| US20160380855A1 (en) | Efficient replacement of clients running large scale applications | |
| US11972124B1 (en) | Using dynamic capabilities of cluster nodes to schedule services in a storage cluster | |
| CN118921264A (zh) | 云服务容灾恢复方法、云服务系统、存储介质和程序产品 | |
| KR20160027405A (ko) | 개선된 이중화 기법을 이용한 서버/스토리지 관리 시스템 및 방법 |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 20944233 Country of ref document: EP Kind code of ref document: A1 |
|
| ENP | Entry into the national phase |
Ref document number: 2022534888 Country of ref document: JP Kind code of ref document: A |
|
| NENP | Non-entry into the national phase |
Ref country code: DE |
|
| 122 | Ep: pct application non-entry in european phase |
Ref document number: 20944233 Country of ref document: EP Kind code of ref document: A1 |
|
| WWG | Wipo information: grant in national office |
Ref document number: 18014855 Country of ref document: US |