Just-in-time networking requires the frequent addition of capacity in a cloud-computing environment. A unit of capacity, called a network cluster, typically comprises about one hundred network devices, including servers and other hardware. Configuring the network devices in a network cluster includes both human-performed steps, such as cabling, as well as automated steps, such as configuration of the devices. Unfortunately, there is no system for integrating the human steps along with the automated steps. In other words, there is no orchestration of the process of adding capacity that takes into account the human tasks along with the automated tasks. Instead, the human-performed steps are separated from the automated steps. Cabling operations are performed blindly, without any software feedback to the person performing the operation. Also, no parallelization is possible because the entire cabling operation must be performed first before network device configuration can be performed. Thus, the addition of a network cluster for extra capacity can typically take two to three weeks. In addition, the lifecycle state of the network cluster is not tracked.
Non-limiting examples of the present disclosure describe a process of tracking the lifecycle of a network cluster. A method readies a device for provisioning in the network cluster to place the device in a provision ready state. The method further provisions the device to place the device in an in provision state and when provisioned places the device in an in validation state. The method validates the provisioning of the device by, in parallel, validating the automatic configuration operation of the device and validating the human configuration operation of the device when the device is in the in validation state. When the device is validated the method changes the device state to a production ready state.
Other non-limiting examples of the present disclosure describe a system for tracking the lifecycle of a network cluster. The system includes: at least one processor; and a memory operatively connected with the at least one processor storing computer-executable instructions that, when executed by the at least one processor, causes the at least one processor to execute a method. The method includes placing a device in a provision-ready state upon designating the device to be provisioned within the network cluster; provisioning the device to place the device in an in provision state and when provisioned placing the device in an in validation state; validating the provisioning of the device by, in parallel, validating the automatic configuration operation of the device and validating the human configuration operation of the device when the device is in the in validation state; and when the device is validated changing the device state to a production ready state.
Other non-limiting examples include a method of tracking the life cycle of a device in a network cluster. The method establishes a plurality of states for a device and places the device in a first state of the plurality of states during installation of the device in the network cluster. The method transitions the device from the first state to a second state of the plurality of states when a first validation action is verified, wherein the first validation action includes human activity. The method transitions the device from the second state to a third state of the plurality of states when a second validation action is verified, wherein the second validation action includes automated activity.
This Summary is provided to introduce a selection of concepts in a simplified form that are further described below in the Detailed Description. This Summary is not intended to identify key features or essential features of the claimed subject matter, nor is it intended to be used to limit the scope of the claimed subject matter. Additional aspects, features, and/or advantages of examples will be set forth in part in the description which follows and, in part, will be apparent from the description, or may be learned by practice of the disclosure.
Non-limiting and non-exhaustive examples are described with reference to the following figures.
Examples disclosed herein describe systems and methods for tracking the lifecycle of a network cluster and integrating the human performed operations with the automated operations during installation of the network cluster in a life cycle management system. The method may eliminate errors by incorporating human operations, such as cabling of devices, with configuration of devices into an automated workflow. The method may enable large scale fault-tolerant configuration. In order to accomplish this, the method may track the life cycle of devices in a network cluster on a device-by-device basis. The status of a device in a network cluster may be tracked to determine its status, e.g.: device purchased but not in data center; device ready for provisioning; device physically in the data center; device properly provisioned; device in validation; device production ready; device in production; and device in repair. The method and system may automatically monitor for the appearance of a new network cluster in the data center, and human intervention may not be required to start the life cycle management system. Accessibility of the devices in the network cluster may be polled on a regular basis, and they may be configured in parallel to the human operation of cabling. A visual dashboard of the overall progress may be presented to the datacenter as well as to remote personnel expert in networking. After final validation, the network cluster may be declared built.
When the device has been completely provisioned and the configuration is correct 222, the device state transitions to the InValidation state 208. In the InValidation State 208, the state of the device is ready to be validated. In other words, it is ready to be checked to see if, for example, the data cabling is proper, the management devices are connected, and loopback checks may be made. If the device passes the InValidation stage 208 by passing the tests 224 (to be described in more detail with respect to
In parallel with these automatic tests and configurations, a check is made to determine if the data cabling 314 and the management cabling 316 has been properly installed by the human operators. If all of the above checklists pass, the device is accepted 312 and the transition to the ProductionReady state 210 occurs. Those skilled in the art after reading this disclosure will appreciate that the checklist can be expanded or contracted as appropriate for various devices in the network cluster. In other words, fewer or additional checklist items may be included. It is worth noting that the checklist illustrated in
The operating system 605, for example, may be suitable for controlling the operation of the computing device 600. Furthermore, embodiments of the disclosure may be practiced in conjunction with a graphics library, other operating systems, or any other application program and is not limited to any particular application or system. This basic configuration is illustrated in
As stated above, a number of program modules and data files may be stored in the system memory 604. While executing on the processing unit 602, the program modules 606 (e.g., life cycle management application 650) may perform processes including, but not limited to, the aspects, as described herein. Other program modules that may be used in accordance with aspects of the present disclosure.
Furthermore, embodiments of the disclosure may be practiced in an electrical circuit comprising discrete electronic elements, packaged or integrated electronic chips containing logic gates, a circuit utilizing a microprocessor, or on a single chip containing electronic elements or microprocessors. For example, embodiments of the disclosure may be practiced via a system-on-a-chip (SOC) where each or many of the components illustrated in
The computing device 600 may also have one or more input device(s) 612 such as a keyboard, a mouse, a pen, a sound or voice input device, a touch or swipe input device, etc. The output device(s) 614 such as a display, speakers, a printer, etc. may also be included. The aforementioned devices are examples and others may be used. The computing device 600 may include one or more communication connections 616 allowing communications with other computing devices 618. Examples of suitable communication connections 616 include, but are not limited to, radio frequency (RF) transmitter, receiver, and/or transceiver circuitry; universal serial bus (USB), parallel, and/or serial ports.
The term computer readable media as used herein may include computer storage media. Computer storage media may include volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information, such as computer readable instructions, data structures, or program modules. The system memory 604, the removable storage device 609, and the non-removable storage device 610 are all computer storage media examples (e.g., memory storage). Computer storage media may include RAM, ROM, electrically erasable read-only memory (EEPROM), flash memory or other memory technology, CD-ROM, digital versatile disks (DVD) or other optical storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other article of manufacture which can be used to store information and which can be accessed by the computing device 600. Any such computer storage media may be part of the computing device 600. Computer storage media does not include a carrier wave or other propagated or modulated data signal.
Communication media may be embodied by computer readable instructions, data structures, program modules, or other data in a modulated data signal, such as a carrier wave or other transport mechanism, and includes any information delivery media. The term “modulated data signal” may describe a signal that has one or more characteristics set or changed in such a manner as to encode information in the signal. By way of example, and not limitation, communication media may include wired media such as a wired network or direct-wired connection, and wireless media such as acoustic, radio frequency (RF), infrared, and other wireless media.
One or more application programs 766 may be loaded into the memory 762 and run on or in association with the operating system 764. Examples of the application programs include phone dialer programs, e-mail programs, personal information management (PIM) programs, word processing programs, spreadsheet programs, Internet browser programs, messaging programs, and so forth. The system 702 also includes a non-volatile storage area 868 within the memory 762. The non-volatile storage area 768 may be used to store persistent information that should not be lost if the system 702 is powered down. The application programs 766 may use and store information in the non-volatile storage area 768, such as email or other messages used by an email application, and the like. A synchronization application (not shown) also resides on the system 702 and is programmed to interact with a corresponding synchronization application resident on a host computer to keep the information stored in the non-volatile storage area 768 synchronized with corresponding information stored at the host computer. As should be appreciated, other applications may be loaded into the memory 762 and run on the mobile computing device 700, including the instructions for providing a document history interface as described herein (e.g., life cycle management application).
The system 702 has a power supply 770, which may be implemented as one or more batteries. The power supply 770 may further include an external power source, such as an AC adapter or a powered docking cradle that supplements or recharges the batteries.
The system 702 may also include a radio interface layer 772 that performs the function of transmitting and receiving radio frequency communications. The radio interface layer 772 facilitates wireless connectivity between the system 702 and the “outside world,” via a communications carrier or service provider. Transmissions to and from the radio interface layer 772 are conducted under control of the operating system 764. In other words, communications received by the radio interface layer 772 may be disseminated to the application programs 866 via the operating system 764, and vice versa.
The visual indicator 720 may be used to provide visual notifications, and/or an audio interface 774 may be used for producing audible notifications via an audio transducer 725 (e.g., audio transducer 725 illustrated in
A mobile computing device 700 implementing the system 702 may have additional features or functionality. For example, the mobile computing device 700 may also include additional data storage devices (removable and/or non-removable) such as, magnetic disks, optical disks, or tape. Such additional storage is illustrated in
Data/information generated or captured by the mobile computing device 700 and stored via the system 702 may be stored locally on the mobile computing device 700, as described above, or the data may be stored on any number of storage media that may be accessed by the device via the radio interface layer 772 or via a wired connection between the mobile computing device 700 and a separate computing device associated with the mobile computing device 700, for example, a server computer in a distributed computing network, such as the Internet. As should be appreciated such data/information may be accessed via the mobile computing device 700 via the radio interface layer 772 or via a distributed computing network. Similarly, such data/information may be readily transferred between computing devices for storage and use according to well-known data/information transfer and storage means, including electronic mail and collaborative data/information sharing systems.
As should be appreciated,
Aspects of the present disclosure, for example, are described above with reference to block diagrams and/or operational illustrations of methods, systems, and computer program products according to aspects of the disclosure. The functions/acts noted in the blocks may occur out of the order as shown in any flowchart. For example, two blocks shown in succession may in fact be executed substantially concurrently or the blocks may sometimes be executed in the reverse order, depending upon the functionality/acts involved.
The description and illustration of one or more aspects provided in this application are not intended to limit or restrict the scope of the disclosure as claimed in any way. The aspects, examples, and details provided in this application are considered sufficient to convey possession and enable others to make and use the best mode of claimed disclosure. The claimed disclosure should not be construed as being limited to any aspect, example, or detail provided in this application. Regardless of whether shown and described in combination or separately, the various features (both structural and methodological) are intended to be selectively included or omitted to produce an embodiment with a particular set of features. Having been provided with the description and illustration of the present application, one skilled in the art may envision variations, modifications, and alternate aspects falling within the spirit of the broader aspects of the general inventive concept embodied in this application that do not depart from the broader scope of the claimed disclosure.