This application relates to and claims priority from Japanese Patent Application No. 2005-5988, filed on Jan. 13, 2005, the entire disclosure of which is incorporated by reference.
The present invention relates to an operation management system for diskless computers, and more particularly to a technology for the monitoring of the operating states of the communication ports of a storage system and the allocation of the communication ports to computers that execute prescribed operations in conjunction with such storage system.
In the conventional art, an operating system (OS) and various application programs are stored on a storage device in an individual computer, principally on a hard disk drive (HDD), and are executed on the individual computer. By contrast, a system has recently been proposed that uses so-called diskless computers and a storage system in which the operating system and application programs ordinarily stored on the storage devices on individual computers in the prior art are concentrated in the storage system and the HDD is removed from the individual computers.
In a system using diskless computers and a storage system, because multiple diskless computers access the storage system, management of the relationship between the diskless computers and the logical units (resources) of the storage system is critical, as is management of the communication ports of such storage system.
However, in a conventional system comprising diskless computers and a storage system, these management tasks are not taken into account, and accordingly, a method by which to appropriately manage the relationship between the computers and the logical units (resources) of the storage system, as well as the communication ports of such storage system, has been desired.
With the foregoing in view, there is need to improve the management and reliability of communications between the computers and the storage system.
In order to resolve the problem described above, a first aspect of the present invention provides a management computer that manages access by client computers to a storage system that includes multiple communication ports. The management computer pertaining to the first aspect of the present invention comprises a monitoring module that monitors the operating states of the multiple communication ports of the storage system, a storage unit that stores current communication port information regarding the communication port among the multiple communication ports that is allocated to the client computers, as well as port information including information identifying each of the multiple communication ports and information regarding the operating states of the multiple communication ports, and a switching module that, where a change in the operating state of the current communication port is detected by the monitoring module, replaces such current communication port with a different communication port among the multiple communication ports and updates the current communication port information and the port information that are stored on the storage unit.
According to the management computer pertaining to the first aspect of the present invention, because the operating states of the multiple communication ports of the storage system are monitored and where a change in the operating state of the current communication port is detected, the current communication port is replaced by a different communication port among the multiple communication ports and the current communication port information and port information that are stored on the storage unit are updated, the management and reliability of communications between the computers and the storage system can be improved.
A second aspect of the present invention provides a management computer that manages access to a storage system that includes multiple communication ports by function computers that execute prescribed operations with respect to the storage system. The management computer pertaining to the second aspect of the present invention comprises a monitoring module that monitors the operating states of the multiple communication ports of the storage system, a storage unit that stores current communication port information regarding the communication port among the multiple communication ports that is currently allocated to the client computers, as well as port information including information identifying each of the multiple communication ports and information regarding the operating states of the multiple communication ports, and a transmission module that, where it is detected by the monitoring module that all of the multiple communication ports are in a communication-enabled operating state, transmits to the client computers the information identifying the port among the multiple communication ports that has the fewest used resources and the current communication port information that are stored on the storage unit.
According to the management computer pertaining to the second aspect of the present invention, because the operating states of multiple communication ports of the storage system are monitored, and where all of the multiple communication ports are in a communication-enabled state, the information identifying the port among the multiple communication ports that has the fewest used resources and the current communication port information that are stored on the storage unit are transmitted to the client computers, the management and reliability of communications between the computers and the storage system can be improved.
A third aspect of the present invention provides a management computer that manages access by client computers to a storage system that includes a primary communication port and a secondary communication port. The management computer pertaining to the third aspect of the present invention comprises a monitoring module that monitors the operating states of the primary and secondary communication ports of the storage system, a storage unit that stores current communication port information regarding the communication port among the multiple communication ports that is currently allocated to the client computers, as well as port information including the target names and Internet protocol addresses of the primary and secondary communication ports and information regarding the operating states of the primary and secondary communication ports, a current communication port setting module that sets the primary communication port as the initial current communication port and that, where it is detected by the monitoring module that the current communication port is in a communication-disabled state, sets the primary or secondary communication port that is not such current communication port as a new current communication port, a switching module that updates the current communication port information and port information that are stored on the storage unit, and a transmission module that transmits to the client computers the updated current communication port information and port information that are stored on the storage unit.
According to the management computer pertaining to the third aspect of the present invention, because the operating states of the primary and secondary communication ports are monitored, and where it is detected that the current communication port is in a communication-disabled state, the primary or secondary communication port that is not the current communication port is set as a new current communication port, the current communication port information and port information that are stored on the storage unit are updated, and the updated current communication port information and port information are transmitted to the client computers, the management and reliability of communications between the computers and the storage system can be improved.
A fourth aspect of the present invention provides a management computer that manages access by client computers to a storage system that includes multiple communication ports. The management computer pertaining to the fourth aspect of the present invention comprises a monitoring module that monitors the operating states of the multiple communication ports of the storage system, a switching module that, where among the multiple communication ports, a change in the operating state of the communication port that is allocated to the client computers is detected, replaces such communication port with a different communication port among the multiple communication ports, and a notification module that notifies the client computers of the replacement communication port.
According to the management computer pertaining to the fourth aspect of the present invention, because the operating states of the multiple communication ports of the storage system are monitored, and where, among the multiple communication ports, a change is detected in the operating state of the communication port allocated to the client computers, such communication port is replaced by a different communication port among the multiple communication ports, and the client computers are notified of the replacement communication port, the management and reliability of communications between the computers and the storage system can be improved.
A fifth aspect of the present invention provides a client computer that communicates with a storage system that includes multiple communication ports via a communication port allocated thereto by a management computer. The client computer pertaining to the fifth aspect of the present invention comprises a communication module that communicates with the storage system via a communication port allocated thereto by a management computer, and a port switching module that, where a notification regarding a change of communication port is received from the management computer, replaces the communication port that the client computer is currently using with the communication port specified by the notification.
According to the client computer pertaining to the fifth aspect of the present invention, because where a notification regarding a change of communication port is received from the management computer, the communication port that is currently being used is replaced with the communication port specified by the notification, the management and reliability of communications between the computers and the storage system can be improved.
The management computer and the client computer pertaining to the present invention can also be realized in the form of a management method, a communication control method, a management program, a communication control program or a computer-readable recording medium on which such management program or communication control program is recorded.
The diskless computer operation management system (management computer and management method) pertaining to the present invention is described below based on an embodiment with reference to the accompanying drawings.
System Construction
The basic construction of a computer system (storage-centric system) that includes the management computer pertaining to this embodiment is described with reference to
The system management server computer 10 (hereinafter ‘system management server’) 10 that serves as the management computer pertaining to this embodiment is connected to a storage device 20 over an IP network 60. The IP network 60 is an Ethernet®-based local area network (LAN), and data is transmitted over this network using the TCP/UDP/IP communication protocol.
Other computers connected to the IP network 60 include a boot management server 30, an authentication server 31, a portal server 32 and function servers 33. Client computers connected to the IP network 60 include one or more desktop centric PCs (hereinafter ‘centric PCs’) 40, an installer PC 41, one or more blade centric PCs (hereinafter ‘blade PCs’) 42 and a management PC 44.
The system management server 10 is a server computer that manages users that use the storage-centric system, the computers used by these users, and the logical units (LU) that store disk images. The system management server 10 is connected to a storage device 11 that stores the various types of management information described below.
The system management server 10 includes internally a CPU 100, a memory 101 and an I/O interface 102, as shown in
An SCM/Mom module SMM that manages the states of the primary communication ports and secondary communication ports of the storage devices 20a, 20b is stored on the memory 101. The SCM/Mom module SMM includes a communication port monitoring module SMM1 that monitors the states of the primary and secondary communication ports of the storage devices 20a, 20b, a current communication port switching module SMM2 that sets and switches current communication ports, a communication port information update module SMM3 that updates the information regarding the states of the various communication ports stored on the memory 101 or the storage device 11, and a module SMM4 that handles other programs, modules or drivers. The various programs and modules stored on the memory 101 are described below.
The storage devices 20a, 20b are disk array devices comprising multiple magnetic hard disk drives formed in a RAID configuration, and one or more logical units (LU) 21a, 21b are provided by multiple hard disk drives or by one hard disk drive. Access to each logical unit (LU) is executed using a logical unit number (LUN) and a logical block address (LBA). In
The storage devices 20a, 20b transmit and receive data to and from the server computers such as the system management server 20 or the client computers such as the centric PCs 40 using the iSCSI protocol.
Controllers 22a, 22b each house communication ports. An IP address and iSCSI target name are allocated as information to identify each communication port. Controllers 22a, 22b connect a specified logical unit with a server computer or client computer in response to an LU connection request (i.e., a request to connect to a logical unit) from the server computer or client computer. The controllers 22a, 22b also carry out CHAP authentication in response to a CHAP authentication request from a server computer or client computer, or write data (i.e., a file) to a logical unit LU or read out data from a logical unit LU in response to a data write request or data read request.
The boot management server 30 has a function to supply boot information needed in order to execute a network boot of a centric PC 40, i.e., the IP address to be used by the centric PC 40, the IP address of the DHCP server, i.e., the boot management server 30, the name of the boot loader program, and various DHCP options as described below. The boot management server 30 transmits these items of information to the centric PC 40 in response to a PXE program request executed by the BIOS during bootup of the centric PC 40.
The authentication server 31 is a server computer that performs authentication of users who use the storage-centric system of this embodiment. The authentication server 31 executes such user authentication using the LDAP (Lightweight Directory Access Protocol), for example.
The portal server 32 is a server computer that serves as a portal for terminal PCs 45 located outside the IP network 60 to enable them to access the storage-centric system. In order for a terminal PC 45 to use a storage device 20, it must access the portal server 32 over the network 61 and boot a blade PC 42 via the portal server 32. These operations will be described in more detail below.
A centric PC 40 may comprise a computer that lacks an internal storage device such as a hard disk drive, for example, or may comprise an ordinary computer that contains a hard disk drive. However, where the centric PC 40 includes a hard disk drive, after the contents of the hard disk drive are transferred to the storage device 20a or 20b, the hard disk drive is not used when the centric PC 40 is operated, and the centric PC 40 is thereafter used in the same manner as a diskless computer. In other words, the centric PCs 40 used in this embodiment are computers that use a storage device 20a or 20b as a storage device over the network, and may comprise not only diskless computers but also computers that do not require a local storage device during computer operation. While only one centric PC 40 is shown in
Each centric PC 40 includes a CPU 401 that executes programs and modules, a memory 402 that stores network boot programs and other programs and modules, and an I/O interface 403 that enables communication over the network 60, as shown in
The installer PC 41 is a computer that installs on the logical units 21a, 21b of the storage devices 20a, 20b disk images of the operating system and application programs. The installer PC 41 includes a storage device 411 that stores files and data to be installed (stored) on the storage devices 20a, 20b. The installer PC 41 is used in order to install on the storage devices 20a, 20b a pre-chosen operating system and application programs, or to install on the storage devices 20a, 20b the operating system and application programs stored on the local disk of a computer before it is used as a centric computer 40. The former case applies to the building of a network boot environment that includes centric PCs 40 using new diskless computers, for example. The latter case applies to the transfer to the storage devices 20a, 20b of disk images of the operating systems and application programs stored on the local disks of existing computers in order to use the existing computers as diskless computers.
A blade PC 42 is a centric PC 40 that includes a remote desktop server function. While only one blade PC 42 is shown in
The management PC 44 is a computer used by the administrator of the storage-centric system, and is used in order to carry out via the system management server 10 the monitoring, registration and deletion of system resources, i.e., the resources in the storage devices 20a, 20b.
In this embodiment, iSCSI is used as the method for transmitting data over the IP network 60.
Construction of Programs, Modules, Drivers
The construction of the programs, modules and drivers incorporated in the system management server 10, the storage devices 20a, 20b, the boot management server 30, the authentication server 31, the centric PCs 40 and the installer PC 41 will now be described with reference to
The construction of software incorporated in the system management server 10 will now be described with reference to
The SCM/Base module SBM is an execution module that manages the system resources necessary for the functioning of the storage-centric system, and manages, for example, information (i.e., system resources) pertaining to the creation of disk images for the storage devices 20a, 20b and to the bootup and shutdown of the centric PCs 40. The SCM/Mom module SMM is an execution module that manages the states of the primary and secondary communication ports of the storage devices 20a, 20b described above. The SCM/Admin module SAM is an execution module that registers system resources with the system management server 10 and creates the screens used to view the system resources registered in the system management server 10.
The client authentication module SC6 is a module that asks the authentication server 31 to perform authentication in response to a request from a centric PC 40 when the centric PC 40 is booted and receives the authentication result. This client authentication module SC6 could be incorporated in the centric PCs 40, but the centric PCs 40 of this embodiment are diskless computers that can maintain only a limited number of resources. Accordingly, in this embodiment, the client authentication module SC6 is incorporated in the system management server 10, and authentication processing is carried out by having the system management server 10 execute the client authentication module SC6 in response to a request from a centric PC 40.
The construction of the software incorporated in the storage device 20a (20b) will now be described with reference to
The construction of the software incorporated in the boot management server 30 will now be described with reference to
The construction of the software incorporated in the authentication server 31 will now be described with reference to
The construction of the software incorporated in the centric PCs 40 (or the blade PCs 42) will now be described with reference to
The construction of the software incorporated in the installer PC 41 will now be described with reference to
Information managed by the system management server 10 (i.e., system resources), information managed by the storage devices 20a, 20b, and information managed by the authentication server 31 will be described below with reference to
Information managed by the system management server 10 will now be described with reference to
(1) The user ID and password of the administrator of the storage-centric system and the name of the iSCSI initiator (administration host information) used during creation of master disk images are registered as administrator information.
(2) User information regarding each user who uses the storage-centric system is registered as user information, and includes the user name, the user group comprising the user's job position information, the user's user ID, the iSCSI initiator name comprising boot host information used by the user during bootup, and the iSCSI initiator name comprising administration host information used by the system administrator during backup and virus scanning of the logical unit (iSCSI disk) associated with the user. Where the user is a user using a blade PC 42, the boot host information further includes a CHAP ID and secret.
(3) Information pertaining to the iSCSI ports of the storage devices 20a, 20b used in the storage-centric system is registered in the iSCSI port pool. Specifically, such information includes port identifiers comprising information to identify the pair of a primary communication port and a secondary port, current port information indicating the communication port used by a centric PC 40, and primary and secondary communication port information comprising the target names and IP addresses and information indicating the UP/DOWN state of each port.
(4) iSCSI disk information pertaining to the LDEVs (logical disks) of the storage devices 20a, 20b used in the storage-centric system is registered in the iSCSI disk pool. The iSCSI disk information is registered in connection with each user's disk image storage area and the master disk image storage area, respectively. The information in the iSCSI disk pool includes identifiers by which to identify iSCSI disks within the system management server 10, port identifiers by which to identify iSCSI communication ports, values indicating the size of each iSCSI disk (logical unit), storage device internal identification information comprising information used to identify iSCSI disks within the storage devices 20a, 20b, and state information comprising information indicating whether each iSCSI disk has been allocated to a user.
(5) Information regarding the centric PCs is registered in the PC pool. The information included in the PC pool includes registrant user IDs comprising identification information regarding users that registered a centric PC, PC group information specifying the PC type, model or HAL (computer hardware property), which indicates whether each registered centric PC is a desktop computer (centric PC 40) or a blade computer (blade PC 42), PC identification information indicating the MAC address of each registered computer, and state information indicating whether or not each registered centric computer has been allocated to user disk images and whether allocation is prohibited due to failure or other reason.
(6) Information regarding iSCSI disks allocated to users, as well as centric PC information, are registered in the user disk image information. Specifically, such information includes disk user IDs, iSCSI disk identifiers and the PC type information and PC identification information regarding the centric PC of each user. Where the PC type indicates a blade PC, information indicating whether or not the method of PC allocation is dynamic or static (PC allocation information) and PC group information are also included. The PC group information is information used when the method of allocation is dynamic and is used as a condition for PC selection. The user disk image information also includes image information that indicates the operating system and application program information that is registered when disk images are created. Furthermore, the user disk image information includes the IP address for each centric PC that is supplied to the system management server 10 after bootup of a centric PC, and PC state information comprising information regarding the state of each centric PC, i.e., whether a centric PC is operating, not operating, or prohibited from bootup.
(7) Information regarding disk images used as a master is registered in the master disk image information. Specifically, such information includes the identifier for the iSCSI disk on which the master disk images are stored, PC group information indicating the PC type and HAL that can be booted using the master disk images, the user group information indicating the users that can use the master disk images and image information indicating the information regarding the operating system and application programs registered as the master disk images.
Information managed by the storage device 20a (20b) will now be described with reference to
Two logical units LU comprising a primary LU and a secondary LU are allocated to a centric PC 40 (blade PC 42) as iSCSI logical units. The primary and secondary logical units are virtual iSCSI storage areas, and are mapped on the same logical disk LDEV. A construction in which the primary and secondary logical units are mapped on different logical disks LDEV may also be used, but in this embodiment, an example in which they are mapped on the same LDEV will be described.
In the example shown In
The function server (backup server PC or virus scan server PC) can be connected to the logical units for any centric PC 40 (42).
Information managed by the storage device 20a (20b) will now be described with reference to
The iSCSI communication information is information by which to specify an iSCSI communication port of the storage device 20a (20b). It is available for both the primary and secondary communication ports, and includes the iSCSI target name and IP address of the logical disk LDEV associated with each iSCSI communication port. The host group information is information by which to specify a host group regarding the storage device 20a (20b), and includes centric PC 40 host information and function server host information. The same information is registered as host group information for the primary communication port and as host group information for the secondary communication port. The host group information includes two items of host information. One (host information 1) is information by which to identify a centric PC 40 (42) and the other (host information 2) is information by which to identify a function server. The host information 1 comprises a boot initiator name (XC, YC) by which to identify the bootstrap and iSCSI driver, as well as a CHAP_ID and secret. The host information 2 comprises an administration initiator name (XS, YS) by which to identify the backup server or virus scan server as well as a CHAP_IDs and secret.
The logical disk LDEV information includes the number by which to identify each logical disk and the storage capacity information therefor. The system management server 10 determines which of the primary and secondary communication ports will be used, and the port determined for use is deemed the current port.
Information managed by the authentication server 31 will now be described with reference to
The communication port management process executed in this embodiment will be described with reference to
This processing routine is executed by the SCM/Mom module SMM included in the system management server 10. More specifically, it is executed by the communication port monitoring module SMM1, current communication port switching module SMM2 and communication port information update module SMM3 that comprise the SCM/Mom module SMM.
When this processing routine begins, the current communication port switching module SMM2 sets the primary communication port as the current communication port (step S10). In other words, in this embodiment, the default current communication port is the primary communication port. The communication port monitoring module SMM1 obtains communication port state data (step S11) and determines whether or not a change has occurred in the states of the communication ports (step S12). The communication port monitoring module SMM1 obtains the communication port state data by pinging the primary communication port and the secondary communication port. The communication port states are determined based on whether a response was received from the respective communication ports.
Where it is determined that there has been no change in the states of the communication ports (NO in step S12), the communication port monitoring module SMM1 continues to monitor the communication ports. Where the communication port monitoring module SMM1 determines that there has been a change in the state of a communication port (YES in step S12), on the other hand, the current communication port switching module SMM2 changes the setting of the current communication port (step S13).
Specifically, a change in the state of a communication port means that a communication port in the UP state (communication-enabled state) in which it responds to pinging changes to the DOWN state (communication-disabled state) in which it does not respond to pinging, and vice versa. The current communication port switching module SMM2 changes the setting of the current communication port based on the table shown in
(1) Where both the primary and secondary communication ports are in the UP state (for example, where the secondary communication port is the current communication port and the primary communication port has changed from the DOWN state to the UP state), the primary communication port is set as the current communication port;
(2) Where the primary communication port is in the UP state and the secondary communication port is in the DOWN state (for example, where the secondary communication port is the current communication port, and the primary communication port has changed from the DOWN state to the UP state), the primary communication port is set as the current communication port;
(3) Where the primary communication port is in the DOWN state and the secondary communication port is in the UP state (for example, where the primary communication port is the current communication port, and the primary communication port has changed from the UP state to the DOWN state), the secondary communication port is set as the current communication port; and
(4) Where both the primary and secondary communication ports are in the DOWN state (for example, where the primary communication port is the current communication port and the primary communication port has changed from the UP state to the DOWN state), neither of the communication ports is set as the current communication port.
(5) Where the primary communication port is in the UP state, no change is made to the current communication port setting even if the state of the secondary communication port changes.
After a change is made to the current communication port setting, the communication port information update module SMM3 updates the communication port information, i.e., the iSCSI port pool information described above (step S14), whereupon the processing routine ends. The iSCSI port pool information includes current communication port information, the states of each communication port and the target names and IP addresses of the primary and secondary communication ports.
The iSCSI port pool information is supplied to the boot management server 30, installer PC 41 and function servers as iSCSI disk information. Where both the primary and secondary communication ports are in the UP state, the current port information and the target names and IP addresses of the primary and secondary communication ports are supplied as the iSCSI disk information. Where only one of the communication ports is in the UP state, the current port information and the target name and IP address of the communication port in the UP state are supplied as the iSCSI disk information. Where both the primary and secondary communication ports are in the DOWN state, no information is supplied.
Where a current communication port is to be allocated to a function server, such current communication port allocation may be carried out in the manner shown in
The authentication processes executed in the storage-centric system of this embodiment will now be described with reference to
Authentication executed in the storage-centric system of this embodiment includes user authentication and administrator authentication. User authentication is executed in the following cases:
The authentication server 31 is used for user authentication. The user IDs and passwords of the users who employ network bootup are registered with the authentication server 31. The user IDs registered with the authentication server 31 are identical to the storage-centric system user IDs and CHAP user IDs. The user passwords registered with the authentication server 31 are identical to the CHAP secrets.
Administrator authentication is carried out when the administrator uses a management program for the storage-centric system, such as the disk image creation program or the backup program.
The system management server 10 is used for administrator authentication, and the administrator's user ID and password are registered with the system management server 10. It is not necessary for the administrator's user ID to be identical to the administrator's CHAP user ID or for the administrator's password to be identical to the administrator's CHAP secret.
Where the centric PC is a desktop machine, a method exists by which the storage device 20a (20b) to which the PC is to be connected is specified using the MAC address of the centric PC, as well as a method by which such storage device 20a (20b) is specified via user authentication. In the description below, the user ID and password are identical to the CHAP user ID and secret.
The operations of an authentication routine executed at the time of network boot, using the MAC address of a desktop centric PC, will now be described with reference to
The boot management server 30 creates DHCP options using the user information received from the system management server 10 (B11). The DHCP options include the IP address to be used by the centric PC as well as the IP address of the boot management server (DHCP server).
Having created the DHCP options, the boot management server 30 sends the centric PC 40 the created DHCP options and the IP address to be allocated to the centric PC 40 (B11). Using the TFTP module location information included in the DHCP options, the centric PC 40 accesses the TFTP module of the boot management server 30 and requests a bootstrap program (C11). The boot management server 30 sends the bootstrap program to the IP address of the centric PC 40 (B13). Upon receiving the bootstrap program, the centric PC 40 boots the bootstrap program, and awaits input of the user ID and password, which equals CHAP authentication information, by the user.
When the user ID and password are input by the user, the bootstrap program sends the input user ID and password to the storage device 20a (20b) having the target name and port address included in the DHCP options as CHAP authentication information (C12). At this stage, communications between the centric PC 40 and the storage device 20a (20b) are carried out by the bootstrap program.
Upon receiving the CHAP authentication information (Sr10), the storage device 20a (20b) determines whether or not CHAP authentication information matching the received CHAP authentication information exists in the host group information, and where CHAP authentication information matching the received CHAP authentication exists in the host group information, i.e., where authentication is successful, the storage device 20a (20b) sends a connection permitted notification to the centric PC 40 (Sr11). Upon receiving the connection permitted notification (C13), the centric PC 40 sequentially executes bootup of the operating system and application programs. Communication between the centric PC 40 and the storage device 20a (20b) after the operating system is booted is implemented via the iSCSI driver and network driver.
The operations of an authentication routine executed at the time of network boot, using the user ID of a desktop centric PC, will now be described with reference to
Using the TFTP module IP address thus obtained, the centric PC 40 requests a bootstrap program from the TFTP module of the boot management server 30 (C21). The boot management server 30 sends the bootstrap program to the IP address of the centric PC 40 (B21).
Upon receiving the bootstrap program, the centric PC 40 boots the program and awaits user input of the user ID and password, which are equivalent to CHAP authentication information.
When the user ID and password are input by the user, the bootstrap program sends them to the authentication server 31 as user authentication information (C22). Upon receiving the user authentication information, the authentication server 31 executes user authentication (A20), and sends the result thereof to the centric PC 40. Here, user authentication is executed by determining whether or not the user authentication information pre-registered with the authentication server 31 includes user authentication information matching the user authentication information sent from the centric PC 40. In the example shown in
Upon receiving a user authentication permitted notification (C23), the centric PC 40 requests disk information from the system management server 10 (C24). The system management server 10 uses the pre-registered user information to specify user information matching the user ID, and sends to the centric PC 40 as the disk information by which to specify the initiator name and current communication port (SS20).
The centric PC 40 sends the input user ID and password to the storage device 20a (20b) having the target name and port address included in the DHCP options (C25). At this stage, communications between the centric PC 40 and the storage device 20a (20b) are implemented by the bootstrap program.
Upon receiving the CHAP authentication information (Sr20), the storage device 20a (20b) determines whether or not CHAP authentication information matching the received CHAP authentication information exists in the host group information, and where CHAP authentication information matching the received CHAP authentication exists in the host group information, i.e., where authentication is successful, the storage device 20a (20b) sends a connection permitted notification to the centric PC 40 (Sr21). CHAP authentication may be executed by the authentication server 31 if cooperation with the authentication server 31 is available.
Upon receiving the connection permitted notification (C26), the centric PC 40 sequentially executes bootup of the operating system and application programs. Communication between the centric PC 40 and the storage device 20a (20b) after the operating system is booted is executed via the iSCSI driver and network driver.
The operations of an authentication routine executed in a blade centric PC at the time of network boot will now be described with reference to
When user authentication information is input from a terminal PC, the portal server 32 sends the user authentication information to the authentication server 31 (P30). The portal server 32 executes user authentication by comparing the received user authentication information and the user authentication information pre-registered therewith (A30), and if user authentication is successful, the portal server 32 sends an authentication permitted notification to the portal server 32. Upon receiving the authentication permitted notification (P31), the portal server 32 sends a centric PC (blade PC 42) allocation request to the system management server 10 (step S32).
The system management server 10 allocates to the terminal PC a pre-allocated blade PC 42 or a blade PC 42 designated by the user (SS30), and notifies the portal server 32 of such allocation. The allocation is carried out by supplying the MAC address of a blade PC 42, for example. Upon receiving allocation of a blade PC 42, the portal server 32 sends a boot request to the allocated blade PC 42 (P33), which executes the bootup process described with reference to
The operations of an authentication routine executed when a management program executable only by the administrator is executed will now be described with reference to
When user authentication information is input by the administrator, the installer PC 41 sends the input user authentication information to the system management server 10 via the network driver as administrator authentication information (140). Upon receiving the user authentication information, the system management server 10 uses the pre-registered administrator information to determine whether or not administrator information (comprising an administrator ID and password) matching the received user information exists. Where administrator information matching the received user authentication information is registered, the system management server 10 refers to the user information corresponding to the MAC address of the installer PC 41, obtains disk information including the administrator initiator name and communication port information, and sends it to the installer PC 41. (SS40).
When CHAP authentication information is input, the installer PC 41 sends the input CHAP authentication information via the iSCSI driver and network driver to the communication port of the storage device specified by the disk information (I41). Upon receiving the CHAP authentication information, the storage device 20a (20b) executes CHAP authentication using the host group information pre-registered therewith (Sr40), and if authentication is successful, sends a connection permitted notification to the installer PC 41.
Upon receiving the connection permitted notification (I42), the installer PC 41 copies the disk images stored on the storage device 411 to the storage device 20a (20b).
The operations of an authentication routine executed when a management program executable by users is executed will now be described with reference to
The installer PC 41 sends the user authentication information input by the user to the authentication server 31 via the network driver (I50). The authentication server 31 executes user authentication using the user authentication information pre-registered therewith (A50), and if authentication is successful, sends a user authentication permitted notification to the installer PC 41.
Upon receiving the user authentication permitted notification (I51), the installer PC 41 requests disk information from the system management server 10 (I52). The system management server 10 refers to the user information corresponding to the MAC address of the installer PC 41, obtains disk information including the user initiator name and communication port information, and sends it to the installer PC 41 (SS50).
When CHAP authentication information is input, the installer PC 41 sends the input CHAP authentication information via the iSCSI driver and network driver to the communication port of the storage device specified by the disk information (I41). Upon receiving the CHAP authentication information, the storage device 20a (20b) executes CHAP authentication using the host group information pre-registered therewith (Sr40), and if authentication is successful, sends a connection permitted notification to the installer PC 41.
Upon receiving the connection permitted notification (I42), the installer PC 41 copies the disk images stored on the storage device 411 to the storage device 20a (20b).
User Registration
The user registration process will now be described with reference to
As shown in
The user registration routine will now be described with reference to
The management PC 45 executes user information registration with the system management server 10 (step S21) and ends this processing routine. Specifically, the management PC 45 registers in the user information the input user name, user ID and user group of a storage-centric system user. The management PC 45 allocates a boot initiator name and management initiator name to the user, and registers them in the user information. Where the centric PC is a blade PC, the management PC 45 registers CHAP authentication information in the user information.
PC Registration
The PC registration routine will now be described with reference to
The individual PC registration routine will now be described with reference to
The SCM/Admin module SAM sends the administrator authentication information input by the PC registrant to the SCM/Base module SBM (SAM 60). The SCM/Base module SBM executes administrator authentication using the received administrator information and the administrator information pre-registered therein (SBM 60), and sends the authentication result to the SCM/Admin module SAM. In other words, it is determined by the system management server 10 whether or not the user inputting the administrator information has the authority of a PC registrant.
The SCM/Base module SBM sends the administrator authentication information to the authentication server 31 as user authentication information (SBM 61). Upon receiving the user authentication information, the authentication server 31 executes user authentication using the user authentication information pre-registered therewith and the received user authentication information (A60), and sends the authentication result to the SCM/Base module SBM. The SCM/Base module SBM sends the received authentication result to the SCM/Admin module SAM.
Where administrator authentication and user authentication are successful, the PC registrant can execute PC registration. When the user inputs PC registration information, the SCM/Admin module SAM sends the input PC registration information to the SCM/Base module SBM (Sam 61). The SCM/Base module SBM executes PC registration using the received PC registration information (SBM 62). This PC registration routine is repeatedly executed for the number of centric PCs 40 (42) that require registration.
The information input as PC registration information is the MAC address and model of each centric PC 40 (42). The input PC registration information is stored on the PC pool in association with the registrant's user ID, i.e., the user ID included in the administrator authentication information input first.
The automatic PC registration routine will now be described with reference to
The PC registration program downloaded to the centric PC 40 (42) executes the administrator authentication routine and PC information registration routine described with reference to
iSCSI Disk Allocation
The iSCSI disk allocation routine will now be described with reference to
The management PC 45 uses the LUN management module SD1 of the storage device 20a (20b) to create a new logical disk (LDEV) and host group and carry out mapping (step S30). The management PC 45 then registers via the SCM/Admin module SAM of the system management server 10 information by which to identify the new logical disk, i.e., port information and disk information, to the system management server 10 in the iSCSI port pool and iSCSI disk pool thereof. Where the logical disk (LDEV) is to be used to store the master disk images, administration host information (initiator name) and CHAP authentication information are registered via the LUN management module SD1 of the storage device 20a (20b).
The management PC 45 executes the routine to allocate a disk to the user via the SCM/Admin module SAM of the system management server 10 (step S31). Specifically, the management PC 45 creates user disk image information and registers the user ID of the disk user the management PC 45 then searches for unallocated disks from the iSCSI disk pool and registers one of the disk identifiers found as a result of the search.
The management PC 45 registers the host information in the storage device 20a (20b) via the LUN management module SD1 thereof (step S32). In other words, it registers the initiator name and CHAP authentication information in the logical disk allocated to the user. Specifically, the management PC 45 newly registers two items of host information in the host group information in the storage device 20a (20b). As the host information 1, the bootstrap and the iSCSI initiator name of the centric PC are registered, and as the host information 2, the iSCSI initiator name of the system management server 10 is registered. As described above, the host information 1 and the host information 2 in the host group information are mapped on the same logical unit LU.
Disk Image Creation
The disk image creation routine will now be described with reference to
The system construction involved in the execution of the disk image creation routine will now be described with reference to
The situation in which disk images are individually created will now be described with reference to
The PC 40a (SCM/Icopy module SIM) executes in advance the PC registration routine described with reference to
The PC 40a then registers the PC type, PC allocation method and PC group information in the user disk image information. The PC allocation method is registered in the case where the PC used by the user when using the user disk images is a blade PC 42. These items of information are input in the system management server 10 by the administrator or user via the PC 40a.
The PC 40a sends the PC allocation information including the PC registrant ID input by the administrator or user to the system management server 10 (M82). The system management server 10 performs PC allocation to the user disk images based on the received PC allocation information (SS81). Specifically, where the centric PC to be allocated to the logical disk (i.e., the PC 40a) is a desktop centric PC 40 or blade centric PC 42 and the PC allocation method is ‘static’, an unallocated PC having a matching PC registrant ID, PC group and PC type is selected from the PC pool. The MAC address of the selected PC is registered in the user disk image information. By contrast, where the centric PC to be allocated to the logical disk is a blade centric PC 42 and the PC allocation method is ‘dynamic’, no PCs to be allocated are registered.
In response to a request from the PC 40a, the system management server 10 sends to the PC 40a iSCSI disk information including the current communication information and boot host information (SS82). The PC 40a copies the disk images formed on the local disk to the storage device 20a (20b) using the received iSCSI disk information (M83). When copying is completed normally, the PC 40a registers image information in the user disk image information.
Where disk images are created for multiple PCs at the same time, the above routine is repeatedly executed.
The master disk image creation routine in the master disk image distribution process will now be described with reference to
The installer PC 41 (SCM/Icopy module SIM) sends administrator authentication information to the system management server 10 (I90). The system management server 10 (SCM/Base module SBM) executes the administrator authentication routine using the administrator ID and password pre-registered therewith (SS90), and sends the authentication result to the installer PC 41. If the authentication is successful, the installer PC 41 asks the system management server 10 to create master disk image information (191). Specifically, the system management server 10 creates the master disk image information shown in
The installer PC 41 sends to the system management server 10 image attribute information that indicates the attributes of the disk images (I92). The system management server 10 registers the received image attribute information in the master disk image information (SS92). The installer PC 41 further sends the system management server 10 information indicating the PC groups that can be booted using the master disk images and information indicating user groups that can use the master disk images (I93). The system management server 10 registers the received such PC group and user group information in the master disk image information as information on PC groups that can be booted using the master disk images and information on user groups that can use the master disk images, respectively (SS93). Where there is a match between a PC model registered in the master disk image information and the model of the PC used by a user, as well as between a user group registered in the master disk image information and the user group to which the user belongs, the user can use the master disk images.
In response to a request from the installer PC 41, the system management server 10 sends to the installer PC 41 iSCSI disk information including the current communication port information and administration host information (SS94). The installer PC 41 copies the master disk images formed on the local disk to the storage device 20a (20b) using the received iSCSI disk information.
The user disk image creation routine will now be described with reference to
Upon receiving the user group information, the installer PC 41 sends it to the system management server 10 and requests selection of a master disk (I110). Upon receiving the user group information, the system management server 10, based on the master disk image information, selects master disk images that can be used by the user group indicated by the received user group information, and sends to the installer PC 41 the iSCSI disk information for the logical disk on which the selected master disk images are stored (SS101).
The PC type, PC allocation method and PC group information are then registered in connection with the user disk image information. The PC allocation method is registered when the PC used by the user when using the user disk images is a blade PC 42. These items of information are input in the system management server 10 by the administrator via the installer PC 41.
The installer PC 41 sends to the system management server 10 the PC allocation information input by the administrator, which includes the PC registrant ID, and requests allocation of a PC (I103). Based on the received PC allocation information, the system management server 10 allocates a PC for the user disk images. Specifically, where the centric PC to be allocated to the logical disk is a desktop centric PC 40 or a blade centric PC 42 and the PC allocation method is ‘static’, an unallocated PC having a matching PC registrant ID, PC group and PC type is selected from the PC pool. The MAC address of the selected PC is registered in the user disk information. In contrast, where the centric PC to be allocated to the logical disk is a blade centric PC 42 and the PC allocation method is ‘dynamic’, no PCs to be allocated are registered.
In response to the request from the installer PC 41, the system management server 10 sends thereto iSCSI disk information including the current communication port information and boot host information (SS103). The installer PC 41 sends the received iSCSI disk information for master disk images as well as iSCSI disk information for user disk images to the system management server 10, and sends a request to the storage device 20a (20b) asking that the master disk images be copied as user disk images (I104). The storage device 20a (20b) specifies the logical disk on which the master disk images are stored based on the master disk image iSCSI disk information, specifies the logical disk on which the user disk images should be stored based on the user disk image iSCSI disk information, and copies the master disk images to the logical disk on which the user disk images are to be stored (SD100).
The disk image automatic creation routine will now be described with reference to
A centric PC 40 (42) sends a boot request including its MAC address to the boot management server 30 (C110). The boot management server 30 (SCM/Agent module BAM) sends the received MAC address to the system management server 10 (SCM/Base module SBM), and requests a PC registration search (B110). Where no centric PCs that correspond to the received MAC address are registered (B111: unregistered), the boot management server 30 executes the TFTP module and sends a disk image registration program to the centric PC 40 (42). This disk image registration program executes both PC registration and disk image registration. At the same time, because the boot management server 30 need only execute the disk image creation routine described above, where a centric PC corresponding to the received MAC address is already registered (B111: registered), it distributes the bootstrap program for bootup described below and ends this routine.
The disk image registration program downloaded to the centric PC 40 (42) and the system management server 10 execute administrator authentication and PC information registration described with reference to
The centric PC 40 (42) (disk image registration program) then executes the user disk image creation routine described with reference to
Bootup and Shutdown of Desktop Centric PC
The bootup and shutdown routines for a desktop centric PC 40 will now be described with reference to
The system construction involved in the execution of the bootup and shutdown of a desktop centric PC 40 in the storage-centric system will now be described with reference to
The centric PC 40 bootup routine will now be described in detail with reference to
Where the received MAC address is registered in the PC pool information, the system management server 10 notifies the boot management server 30 that the user disk images corresponding to the centric PC 40 that sent the boot request is not registered (SS120). Where the received MAC address is not registered in the PC pool information, the system management server 10 notifies the boot management server 30 that the centric PC 40 that sent the boot request is an unregistered computer (unregistered PC) (SS121).
On the other hand, where the user disk images corresponding to the received MAC address are registered, the system management server 10 sends to the boot management server 30 iSCSI disk information (the current communication port information, the primary and secondary communication port information, and the host information) and the boot initiator name and PC type information for the disk user (step S122). In this example, because a desktop PC is being booted, CHAP authentication information is not sent.
The SCM/Agent module BAM of the boot management server 30 creates DHCP option information using the iSCSI disk information, boot initiator name and PC type information. The DHCP module BS3 sends to the centric PC 40 the IP address to be used thereby, the IP address of the DHCP server, i.e., the boot management server 30, the TFTP server address, the boot loader program name and the DHCP option information (B121).
The centric PC 40 uses the TFTP server address to access the TFTP module BS2, obtain the program matching the boot loader program name and execute a boot (C121).
Where the PC type information indicates a desktop computer, the centric PC 40 on which the bootstrap program has started waits for user input of the user ID and password (equivalent to CHAP authentication information). When the user inputs the user ID and password, the bootstrap program uses the input CHAP authentication information (CHAP ID and secret) and the initiator name included in the DHCP options to commence processing to connect to the storage device 20a (20b) having the current communication port address included in the DHCP options (C122). At this stage, the communication with the storage device 20a (20b) is carried out by the bootstrap program.
Having received the initiator name and CHAP authentication information, the storage device 20a (20b) executes host authentication and CHAP authentication using the host group information (SD120). Where CHAP authentication information matching the received CHAP authentication information exists in the host group information, authentication is successful, and the storage device 20a (20b) sends a connection permitted notification to the centric PC 40. Having received the connection permitted notification, in order to boot the operating system, the centric PC 40 connects to the current communication port, downloads drivers and boots the operating system (C123). Subsequent communications with the storage device 20a (20b) are carried out via the iSCSI and network drivers.
When the operating system is booted, the iSCSI driver is booted as well. The iSCSI driver obtains from the bootstrap program the IP address and DHCP option information obtained from the DHCP server, as well as the user-input CHAP authentication information. After the IP address is set in the network driver and the driver is booted, The iSCSI driver begins processing to connect to the storage device 20a (20b) having the current communication port address included in the DHCP options using the initiator name included in the DHCP options and loads necessary application programs. Where the iSCSI driver can perform multipathing, the path to the storage device 20a (20b) can be switched using the primary/secondary communication port information when disconnection of the current communication port is detected.
When the SCM/Client module SCCM is booted on the centric PC 40, the SCM/Client module SCCM obtains from the bootstrap program the IP address of the DHCP server, i.e., the boot management server 30. It then uses the IP address and MAC address of the centric PC as arguments and notifies the system management server 10 (SCM/Base module SBM) of the bootup of the operating system via the boot management server 30 (SCM/Agent module BAM) (C124). In other words, in this embodiment, the notification to the SCM/Base module SBM of the bootup or shutdown of the SCM/Client module SCCM is executed by the SCM/Agent module BAM of the boot management server 30. The system management server 10 (SCM/Base module SBM) changes the PC state in the user disk image information to ‘boot completed’.
The centric PC 40 shutdown routine will now be described with reference to
The system management server 10 then carries out final shutdown processing (SS130). Specifically, the SCM/Base module SBM changes the PC state in the user disk image information to ‘hut down’.
Blade Centric PC 42 boot/Shutdown
The blade centric PC 42 boot and shutdown routines will now be described with reference to
Referring to
The blade centric PC 42 bootup routine will now be described in detail with reference to
The portal server 32 then sends the user's user ID to the system management server 10 and requests a search for a PC to be booted (P141). The system management server 10 (SCM/Base module SBM) executes a search for a PC to be booted (SS140). Specifically, the system management server 10 selects user disk image information that matches the received user ID, and if the PC allocation method in the selected user disk image information is ‘tatic’, it notifies the portal server 32 of the MAC address of the allocated PC registered in the PC pool information. On the other hand, if the PC allocation method in the selected user disk image information is ‘dynamic’, the system management server 10 selects from among the unallocated PCs registered in the PC pool a PC having a matching PC type and PC group, registers the MAC address and model in the user disk information and notifies the portal server 32.
The portal server 32 requests bootup from the blade centric PC 42 having the received MAC address (P142). Specifically, it boots the blade centric PC 42 having the received MAC address via the WakeupONLAN function known in the prior art.
The centric PC bootup routine previously described with reference to
The blade centric PC 42 shutdown routine will now be described with reference to
When the notification of successful authentication is received, the portal server 32 sends the user ID of the user to the system management server 10 and requests PC shutdown (P151). The system management server 10 then uses the user disk image information to specify the blade centric PC 42 that matches the received user ID (SS150) and requests shutdown of the specified blade centric PC 42. The centric PC shutdown routine described with reference to
As described above, according to the system management server 10 pertaining to this embodiment, the states of the primary and secondary ports of the storage devices 20a, 20b can be monitored, i.e., whether the communication ports are in a communication-enabled state or communication-disabled state can be monitored. Therefore, where the primary communication port comprising the current communication port becomes disabled, for example, the secondary communication port can be immediately set as the current communication port. As a result, a termination of access of servers and client computers to the storage devices 20a, 20b can be prevented. Therefore, the reliability of communications within the storage-centric system can be improved.
Furthermore, where a function server that performs backup or virus scanning is to access the storage devices 20a, 20b, the communication port having fewer connections is set as the current communication port. Therefore, the burden on the communication ports can be reduced and backup and virus scanning can be performed and completed quickly.
(1) In the above embodiment, dedicated PCs were used as the blade centric PCs 42, but a general desktop PC may be used as a blade centric PC 42.
(2) In the above embodiment, a situation was described in which the storage devices 20a, 20b each included two communication ports, i.e., a primary and a secondary communication port, but three or more ports may be used so long as the ports are made redundant. In this case, the system management server 10 (SCM/Mom module SMM) monitors three or more communication ports and where the current port is detected to be in a disabled state, a new communication port from among the remaining communication ports is appropriately set as the current communication port.
A diskless computer operation management system, management computer and client computer access management method pertaining to the present invention were described above based on an embodiment, but the above embodiment was described simply for ease of understanding of the present invention, and the present invention is not limited thereby. The present invention may be modified or improved within the essential scope thereof consistent with the Claims set forth herein, and equivalent technologies and methods are naturally included within the present invention.
Number | Date | Country | Kind |
---|---|---|---|
2005-005988 | Jan 2005 | JP | national |