摘要:
Resources in an Infrastructure-as-a-Service (IaaS) system are upgraded in an iterative process. In response to an upgrade request indicating requested changes to a current configuration of the system, one or more graph representations of the current configuration and the requested changes are created. The graph representations include a control graph which has vertices representing resource groups, and edges representing dependences among the resource groups. A batch of resource groups is identified to be upgraded in a current iteration based on the dependencies and Service Level Agreement (SLA) requirements including availability and elasticity of the system. Upgrade operations are executed on the identified batch using selected upgrade methods which handle potential incompatibilties during transition of system configurations. The graph representations are updated to include any new requested changes and recovery operations in response to feedback of failed upgrade operations. The iterative process proceed to upgrade remaining one or more resource groups.
摘要:
A Virtual Network Function (VNF) is provided for deployment in a Network Function Virtualization Infrastructure (NFVI). First, an input is obtained that includes a description of available software components, configuration requirements specifying service types to be provided by the VNF, and infrastructure information specifying resources provided by the NFVI. The infrastructure information includes characteristics of virtual machines (VMs). For each service type, a VNF component (VNFC) configuration is generated. The generated VNFC configuration optimizes usage of the resources and satisfies requested service availability. A VNF configuration is formed that includes a collection of VNFC configurations created for the service types. The VNF configuration is delivered to a Network Function Virtualization (NFV) system for the deployment of VNFC instances on the VMs thereby providing the VNF.
摘要:
A system performs runtime adjustment of a configuration model. The system receives, at runtime, a change request directed at one or more modified entities in the configuration model. Based on leadership information, one or more infringing entities are identified among the one or more modified entities. The leadership information indicates an impact that one entity has on another entity with respect to a given constraint. Based on the leadership information, a propagation scope is identified for a constraint violated by an infringing entity. The propagation scope includes the infringing entity and other entities that are potentially affected by the request. For resolving single constraint violation, a collection of paths are created in the propagation scope and a path is selected one at a time starting from the shortest path in the collection. For resolving multiple constraint violation, a bonded path is formed for a group of propagation scopes that overlap.
摘要:
An upgrade campaign is generated for entities of a system described by a source configuration. According to the upgrade campaign, the system is upgraded to a target configuration using available software. A change model describes changes from the source configuration to the target configuration. According to the change model, an upgrade campaign specification model is generated, which contains at least one upgrade campaign element for each change in the change model. A subset of upgrade campaign elements are matched based on a first set of rules, and the matched upgrade campaign elements are merged into an upgrade procedure in the upgrade campaign specification model. The upgrade procedures are ordered based on a second set of rules and dependencies among the entities of the system, where the dependencies are extracted from the source configuration, the target configuration and the description of available software.
摘要:
A configuration is generated for a software that is to be deployed for providing high service availability to satisfy configuration requirements. One or more configuration patterns are identified, each of which specifies a set of attribute values and an actual recovery action for a failed component as a configuration option of the software. The unchangeable attribute values of the software are matched with the configuration patterns to obtain a matching configuration pattern, whose actual recovery action incurs a smallest component failure recovery impact zone. The matching configuration pattern is selected as at least a portion of the configuration of the software. Then the changeable attribute values of the software are set to the corresponding attribute values of the matching configuration pattern to satisfy the configuration requirements.
摘要:
A configuration is generated that enables Availability Management Framework (AMF) to manage virtual machines (VMs) and support hardware redundancy for each of service groups (SGs). Each component service instance (CSI) is configured to represent one or more of the VMs to be managed by AMF. Configuration attributes are set to associate each VM with one CSI, such that the VMs to be hosted on a same physical host are associated with different CSIs of a same service instance. Service units (SUs) of different SGs are configured such that each SU is hosted by any one VM on the same physical host, while the different SUs of a same SG are mapped to the VMs hosted on different physical hosts. The configuration enables the AMF to manage an application formed by the SGs in a virtualized environment in a same way as in a non-virtualized environment without modification to the application.
摘要:
Methods for providing feedback in messaging systems are described. A communication node can include a first counter for counting a first number of messages which received by and/or forwarded by the node. The communication node can also include a second counter which counts a second number of messages which are expected to be delivered from that node to other nodes.
摘要:
Among other things, embodiments described herein enable systems, e.g., Availability Management Forum (AMF) systems, having service units to operate with balanced loads both before and after the failure of one of the service units. A configuration can be generated which provides for distributed backup roles and balanced active loads. When a failure of a service unit occurs, the active loads previously handled by that service unit are substantially evenly picked up as active loads by remaining service units.
摘要:
A node, computer readable medium and method for generating an upgrade campaign for a system. The method includes receiving a current configuration of the system and a set of modifications to be implemented into the system to arrive at a new configuration of the system, automatically selecting an upgrade procedure for each modification in the set of modifications to be either a rolling upgrade procedure or a single step upgrade procedure, or a combination of these and generating the automatically selected upgrade procedure for each modification of the set of modifications.
摘要:
Node, computer software and method for identifying a target set of entities associated with a first configuration of a computer system that are to be modified for arriving at a second configuration of the computer system. The method includes selecting a single service, determining a characteristic of the single service, wherein the characteristic of the service is indicative of whether the single service is provided in both the first and second configurations, only in the first configuration or only in the second configuration, identifying, based on the selected service and its characteristic, one or two corresponding entity groups that are related to the single service, and mapping subsets of entities associated with the identified corresponding entity groups for transitioning the computer system from the first configuration to the second configuration.