摘要:
Configuration requirements for an Availability Management Framework (AMF) configuration are generated from high level user requirements that specify a subset of properties of an AMF configuration. The user requirements are first mapped into entity prototypes defined in an extended Entity Types File (ETF) model. A computer system identifies additional entity prototypes and dependency thereof that support functionalities of the mapped entity prototypes under a set of grouping conditions. The computer system calculates the required number of component service instances (CSIs) and service instances (SIs) that satisfy the user requirements. The calculation is based on the subset of the properties specified by the user requirements and measurements associated with the entity prototypes in the extended ETF model. The computer system then forms configuration requirements including the required number of CSIs and SIs for generating the AMF configuration that satisfies the user requirements.
摘要:
Configuration requirements for an Availability Management Framework (AMF) configuration are generated from high level user requirements that specify a subset of properties of an AMF configuration. The user requirements are first mapped into entity prototypes defined in an extended Entity Types File (ETF) model. A computer system identifies additional entity prototypes and dependency thereof that support functionalities of the mapped entity prototypes under a set of grouping conditions. The computer system calculates the required number of component service instances (CSIs) and service instances (SIs) that satisfy the user requirements. The calculation is based on the subset of the properties specified by the user requirements and measurements associated with the entity prototypes in the extended ETF model. The computer system then forms configuration requirements including the required number of CSIs and SIs for generating the AMF configuration that satisfies the user requirements.
摘要:
A method and system for generating an Availability Management Framework (AMF) configuration based on a model driven approach. The AMF configuration is an instance of an AMF sub-profile that can be used to model resources and services to be protected, and is generated from an instance of the Entity Type Files (ETF) sub-profile and an instance of the Configuration Requirements (CR) sub-profile. The ETF sub-profile can be used to model the resources provided by vendors, and the CR sub-profile can be used to model configuration requirements. Each of the AMF sub-profile, the ETF sub-profile and the CR sub-profile is a specialization of pre-defined Unified Modeling Language (UML) meta-classes. An input that includes an ETF model and a CR model, which are instances of the ETF sub-profile and the CR sub-profile, respectively, is transformed into an AMF model as the AMF configuration.
摘要:
A configuration including Service Instances (SIs) and a list of Service Units (SUs) is to be validated. The SIs are to be allocated to the SUs for protection of the service represented by the SIs. A set of heuristics is applied to determine whether, for each of the SI assignments, the SI can be allocated to one of the SUs whose capacities support the required capacities of the SI. The heuristic then walks the list in order, to find a first SU that supports a current SI. If none of the SUs in the list can support the current SI, the heuristic indicates that the configuration is not validated. In response to a result that at least one of the heuristics in the set indicates the SUs can support all of the SIs, a final result is generated indicating that the configuration is valid.
摘要:
A method and system for generating an Availability Management Framework (AMF) configuration based on a model driven approach. The AMF configuration is an instance of an AMF sub-profile that can be used to model resources and services to be protected, and is generated from an instance of the Entity Type Files (ETF) sub-profile and an instance of the Configuration Requirements (CR) sub-profile. The ETF sub-profile can be used to model the resources provided by vendors, and the CR sub-profile can be used to model configuration requirements. Each of the AMF sub-profile, the ETF sub-profile and the CR sub-profile is a specialization of pre-defined Unified Modeling Language (UML) meta-classes. An input that includes an ETF model and a CR model, which are instances of the ETF sub-profile and the CR sub-profile, respectively, is transformed into an AMF model as the AMF configuration.
摘要:
A configuration including Service Instances (SIs) and a list of Service Units (SUs) is to be validated. The SIs are to be allocated to the SUs for protection of the service represented by the SIs. A set of heuristics is applied to determine whether, for each of the SI assignments, the SI can be allocated to one of the SUs whose capacities support the required capacities of the SI. The heuristic then walks the list in order, to find a first SU that supports a current SI. If none of the SUs in the list can support the current SI, the heuristic indicates that the configuration is not validated. In response to a result that at least one of the heuristics in the set indicates the SUs can support all of the SIs, a final result is generated indicating that the configuration is valid.
摘要:
An Availability Management Framework (AMF) configuration describes how configuration entities of a highly available system are grouped and includes information on service provision and service protection policies against resource failure. The AMF configuration defines a set of failure types for each component and each node, and specifies a failure rate and a recommended recovery for each failure type. A method for evaluating service availability receives the AMF configuration as input, and analyzes it to obtain an actual recovery that the highly available system is to perform when the given component fails. The method maps the AMF configuration to a stochastic model that captures the dependencies among the components and among the configuration entities at multiple levels of the hierarchy. The method utilizes the model to calculate the service availability of the AMF configuration based on the failure rate, the actual recovery and the dependencies.
摘要:
An Availability Management Framework (AMF) configuration describes how configuration entities of a highly available system are grouped and includes information on service provision and service protection policies against resource failure. The AMF configuration defines a set of failure types for each component and each node, and specifies a failure rate and a recommended recovery for each failure type. A method for evaluating service availability receives the AMF configuration as input, and analyzes it to obtain an actual recovery that the highly available system is to perform when the given component fails. The method maps the AMF configuration to a stochastic model that captures the dependencies among the components and among the configuration entities at multiple levels of the hierarchy. The method utilizes the model to calculate the service availability of the AMF configuration based on the failure rate, the actual recovery and the dependencies.
摘要:
Resources in an Infrastructure-as-a-Service (IaaS) system are upgraded in an iterative process. In response to an upgrade request indicating requested changes to a current configuration of the system, one or more graph representations of the current configuration and the requested changes are created. The graph representations include a control graph which has vertices representing resource groups, and edges representing dependences among the resource groups. A batch of resource groups is identified to be upgraded in a current iteration based on the dependencies and Service Level Agreement (SLA) requirements including availability and elasticity of the system. Upgrade operations are executed on the identified batch using selected upgrade methods which handle potential incompatibilties during transition of system configurations. The graph representations are updated to include any new requested changes and recovery operations in response to feedback of failed upgrade operations. The iterative process proceed to upgrade remaining one or more resource groups.
摘要:
A system performs runtime adjustment of a configuration model. The system receives, at runtime, a change request directed at one or more modified entities in the configuration model. Based on leadership information, one or more infringing entities are identified among the one or more modified entities. The leadership information indicates an impact that one entity has on another entity with respect to a given constraint. Based on the leadership information, a propagation scope is identified for a constraint violated by an infringing entity. The propagation scope includes the infringing entity and other entities that are potentially affected by the request. For resolving single constraint violation, a collection of paths are created in the propagation scope and a path is selected one at a time starting from the shortest path in the collection. For resolving multiple constraint violation, a bonded path is formed for a group of propagation scopes that overlap.