The exemplary embodiments of this invention relate generally to computing services, and more particularly to improving the determination of optimal target machine images for migration of a workload to a cloud computing environment, and to tools to assist in the migration of a workload to optimal machine instances hosted by a cloud computing service.
Advances in a virtualization technology and mainframe hardware have made a consolidation of applications onto a fewer number of centralized servers very attractive. However, a process of planning and performing such a migration is time-consuming, costly, and prone to an error. A risk is also involved in the migration process due to a high degree of complexity of applications deployed on server devices. For example, consider a large number of distributed applications (e.g., 1 million applications) that can be deployed on server devices. One server device could host an application on a middleware product to meet performance and high availability requirements. That application may be distributed over several server devices. This distributed application may require a database which is deployed on another server device. Messaging components to support information exchange with other internal or external applications may require a set of server devices and be deployed to several application servers. A consolidation of this set of servers may require an in-depth knowledge of configurations of the set of servers and an insight into how to best plan and run a migration of source applications to the final target platform
A cloud service provider offers a set of pre-configured systems (e.g., a virtual machine (VM) image with operating system (OS)). The cloud service users use these systems to create and/or modify software environments that host end-user applications and services.
Cloud computing service providers generally do not expose complete details in a computer readable manner regarding the configuration of the images that they provide. For example, one provider enables a user to search or browse their inventory of machine images, but they do not expose an application programming interface (API) to allow third-party computer programs to search the inventory of machine images for images that meet specific criteria. This means that in order to find a “best fit” machine image to instantiate, a human user must manually examine potentially thousands of machine image descriptions to evaluate their suitability as a platform to host a source application. Furthermore the descriptions of the content of images cloud computing service providers offer very little, if any, information that is meaningful without a priori knowledge on the part of the user. For example, one cloud service provider provides image names limited to 128 characters, while the associated description is limited to 255 characters.
One conventional example of a command for creating an image and describing same for future identification is as follows:
PROMPT> ec2-create-image i-10a64379 —name “Standard Web Server” —description “Standard web server AMI” IMAGE ami-4fa54026″
Neither the name “Standard Web Server” nor the description “Standard web server AMI” provide sufficient information, without a priori knowledge, to enable a user to determine if the image will meet the needs of the user. A “Standard web server AMI” might be run on any of a number of operating systems. A “Standard web server AMI” might have any storage capacity and processing speed. A “Standard web server AMI” might provide support for PHP (hypertext pre-processor), and/or support for a database, and/or support for servlets, and/or secure transactions, and/or any number of things. In most cases of interest the detail needed to determine the suitability of an image cannot be expressed in a meaningful way to the user with 255 characters. This is especially true since neither the image descriptions nor names conform to rigorous conventions.
Furthermore both the names and descriptions of the images are entered by a human and there are no guarantees that the text entered describes the actual content of the image.
Once a user has identified a suitable machine image, the user must instantiate it and install any additional required software on top of the instance, and potentially also re-configure installed software. For example, if a machine instance with a database is required and none is available, the user may need to create a user account for the database administrator on the target instance operating system, then install the database to the instance, and then enable the database administrator account to manage the database.
Tools and methods to discover the configuration of computer systems are well known. An example of a discovery toolset is IBM® Tivoli® Change and Configuration Management Database Configuration Discovery and Tracking (IBM and Tivoli are registered trademarks of International Business Machines Corporation).
Identifying suitable target machine instances, and insuring that they are properly and completely provisioned and configured, can be a tedious and costly task.
Therefore a need exists to provide computer automated tooling in order to reduce the manual effort required to prepare for the migration of an application to a cloud computing environment.
The foregoing and other problems are overcome, and other advantages are realized, in accordance with the exemplary embodiments of this invention.
In a first aspect thereof the exemplary embodiments provide a computer-implemented method for migration of a source machine instance to a target machine instance of least one heterogeneous virtual server device managed within a cloud computing environment. The method comprises discovering machine images of a cloud service provider and storing results in a computer-readable catalog containing cloud metadata comprised of machine image identifiers and information discovered about the machine images. The method further comprises, in response to a request for migration document in a computer-readable form that comprises a specification of a required migration target machine instance, specifying weight/priority information for components to be included in the target machine instance, where the weight information indicates weights for operations comprising component installation, component removal and component upgrade in the target machine instance. The method also comprises executing a best fit matching algorithm to examine the catalog in accordance with the weight/priority information to identify optimal machine images to be used for the migration of the source machine instance to the target machine instance.
In a further aspect thereof the exemplary embodiments provide a computer-readable storage medium containing program instructions that, when executed by at least one data processor, result in performing operations to migrate a source machine instance to a target machine instance of least one heterogeneous virtual server device managed within a cloud computing environment. The operations comprise discovering machine images of a cloud service provider and storing results in a computer-readable catalog containing cloud metadata comprised of machine image identifiers and information discovered about the machine images; in response to a request for migration document that comprises a specification of a required migration target machine instance, specifying weight/priority information for components to be included in the target machine instance, where the weight information indicates weights for operations comprising component installation, component removal and component upgrade in the target machine instance; and executing a best fit matching algorithm to examine the catalog in accordance with the weight/priority information to identify optimal machine images to be used for the migration of the source machine instance to the target machine instance.
In another aspect thereof the exemplary embodiments provide a system configured to migrate a source machine instance to a target machine instance of least one heterogeneous virtual server device managed within a cloud computing environment. The system includes at least one computer-readable storage medium storing computer program instructions and at least one data processor readably coupled to the at least one computer-readable storage medium. In the system execution of the computer program instructions by the at least one data processor causes the at least one data processor to discover machine images of a cloud service provider and store results in a computer-readable catalog containing cloud metadata comprised of machine image identifiers and information discovered about the machine images. The at least one data processor is responsive to a request for migration document that comprises a specification of a required migration target machine instance, to specify weight/priority information for components to be included in the target machine instance, where the weight information indicates weights for operations comprising component installation, component removal and component upgrade in the target machine instance. The at least one data processor is further configured to execute a best fit matching algorithm to examine the catalog in accordance with the weight/priority information to identify optimal machine images to be used for the migration of the source machine instance to the target machine instance.
In yet another aspect thereof the exemplary embodiments provide a computer-executed method to migrate a target machine instance to a cloud computing environment. The method comprises discovering machine image components of machine images of a cloud service provider and storing results in a computer-readable inventory; removing from consideration those machine images having hardware and software that is incompatible with the target machine instance; and executing a best fit matching algorithm to compare a sorted list of machine image software components for a particular machine image and a sorted list of software components of the target machine instance to derive a cumulative cost for implementing the sorted list of target machine software components as a particular instance of the machine image software components.
By way of an introduction, within the scope of application migration (to the cloud) “discovery” is used to assess the user's computer systems and computer system configurations. “Discovery” supports the user to understand the current status of the user's infrastructure and software. With this information the user can create a “Request for Migration” (RFM) document that specifies the infrastructure (hardware) and software that the user wishes to have instantiated in the post-migration information technology (IT) landscape. The RFM is passed to a provisioning manager which performs infrastructure and software provisioning, after which the application migration and testing is performed.
The current state of the art in migration from a source platform to a cloud environment is that only virtual machines (VM) can be migrated to cloud environments, and the source VM must be of the same kind supported by the cloud environment. Currently tooling to assist the migration of applications and systems “into the cloud” comes with restrictions on both the source systems and the target system environment (provided by the cloud). This is due to the fact that known migration and management approaches are VM-based.
As one example, it is possible to use VMware® (VMware is a registered trademark of VMWare, Inc.) migration tools to migrate VMs that have been created with VMware into a cloud that provides an environment for VMware® VMs. Therefore the migration process depends on the cloud service provider supporting the VMware® hypervisor. For example, it is not possible to upload VMware® VMs into a cloud of a provider who uses a different type of virtualization.
In order to migrate physical computer systems into a cloud that contains a set of VMs, the physical systems must first be transformed into VMs. These transformation capabilities, again, depend on the virtualization technology tooling. Furthermore, with these approaches it is not possible to “upgrade” or “downgrade” hardware and software during migration.
It would thus be useful to be able to migrate just those hardware and software platform components upon which an application depends, without migrating an entire VM, to enable the application to be migrated to a heterogeneous target platform in a cloud environment, and to enable upgrades, downgrades and other configuration customization of the target hardware and software components upon which the migrated application will depend.
Further, currently when replicating computer systems and software configurations in the cloud the user must find the most suitable systems provided by the cloud service provider, and then manually provision the infrastructure and manually install the required software on top of the infrastructure. Even if the installation procedure could be automated using existing tools, the user must still search for and locate the most suitable computer system provided by the cloud service provider, and then compare the located system it to the user's source system. If the cloud service provider offers a large number of computer systems, locating a suitable system can require considerable effort on the part of the user.
It would thus also be useful to provide tooling in order to reduce the manual effort required to prepare for the migration of an application to the cloud environment.
As a non-limiting example: consider migration of an application that is hosted on a System P/AIX computer to a Xen-x86 Virtual Machine with Linux that is offered by IBM RC2. The method makes use of an RFM document and can therefore be integrated into existing migration workflows. In particular, it is possible to provide a self-service interface to the user that enables the user to specify a target system or systems that the user wishes to use, and that enables the user to compare the source systems to the target systems in a coherent fashion. The user is not required to search the available computer systems offered by the cloud service provider and attempt to manually match between the source system(s) and the cloud service provider's target systems. Instead, the user defines the desired target system (RFM) and then enables the automated system to locate a match between the RFM and the available resources from the cloud service provider.
The RFM document contains information descriptive of the hardware and software of the systems that the user wishes to have after the migration has taken place. It can be assumed that the description expressed in the RFM document cannot directly be processed by the cloud service provider, who has only a limited set of computer systems.
An exemplary aspect of this invention is a procedure and method, which may be referred to without a loss of generality as an algorithm, to match the RFM with the hardware of the computer systems of the cloud service provider. The output of the algorithm indicates “success” or “failure”. In case of “success”, the cloud service provider can offer a computer system with the requirements specified in the RFM. In the case of “failure”, at least one of the requirements specified in the RFM could not be fulfilled. In this case the user can either select a system with a different hardware setting than the one specified in the RFM, or the user can employ an alternative migration mechanism.
In accordance with an exemplary aspect of this invention an algorithm matches the RFM with the software that can be on-boarded onto (instantiated upon) computer systems of the cloud service provider. Again, the output of the algorithm indicates “success” or “failure”.
The user can decide between a traditional provisioning process and the provisioning of resources through a cloud service provider. The choices have attributes, for example, “speed of migration”, “accuracy of provisioned target system with respect to the RFM document”, etc. These attributes are made known to the user who can then make an informed decision on the provisioning mechanism to use.
In one illustrative algorithm the source architecture specifications are used as an ‘at least’ match on the set of images maintained by the cloud service provider. That is, the set of attributes for the images available on the cloud are gathered using one of the cloud APIs and are used as minimal preconditions for selection of a viable target image. For example, if the user's CPU, memory and disk requirements are 1000Mips, 2 GB and 500 GB, respectively, those images that support at least these requirements are candidates. Of these, the least image in accordance with some criteria (e.g., based on difference of steady state running cost of the images as advertised by the service provider, or based on the least disk capacity, followed by memory, followed by CPU) is selected. If no candidate image is available then the algorithm output is ‘failure’.
This approach is independent of the computer system architectures and virtualization technologies on both the user side and on the cloud service provider side. Furthermore, this approach allows defining a RFM without knowledge of the computer systems offered by the cloud service provider.
The output is a set of computer system instances that are deployed in the administrative domain of the cloud service provider and that can be accessed by the user. Additionally, a report can be delivered to the user to show the results of the migration process.
An aspect of this invention is to provide an ability for a cloud service provider to offer an automated migration method that allows users to on-board their existing applications and services. Automation of the on-boarding process reduces the required human tasks in the workflow and thereby improves reliability and reduces cost. In general, the exemplary embodiments of this invention may be offered as a value-added service by a cloud service provider or by a third party service provider.
Reference can be made to
In a first step (Step 1) cloud computing machine images of a cloud service provider 10 are instantiated by whatever means the cloud service provider makes available. Discovery tools 12 are loaded onto the machine instances. Discovery tools are executed and the results are returned to an external application which builds a catalog 14 containing cloud metadata comprised of machine image identifiers and the information discovered about the machine images. In one embodiment the catalog 14 may be stored within a relational database to facilitate searching the catalog.
Step 2: asynchronously to operation of step 1, a specification of the required migration target environment 16 is prepared in a computer-readable form. In an exemplary embodiment this can be assisted by the application of discovery tools 18 against proposed migration source servers, returning results to an inventory 20 containing the source server identifiers and the information discovered about the source servers.
Step 3: asynchronously to the steps 1 and 2, some entity, which may be a human or some expert system software, assigns a weight/priority to components that may be included in a target machine instance, indicating weights for operations such as component installation, removal, and upgrade. This step involves the specification 22 of target requirements 24 and priorities 26.
Step 4: once the above steps have been performed, an algorithm (determine best fit algorithm 28) is executed to examine the catalog 14 to identify the optimal target machine images 10 to be used for the migration of the given source server workload (16, 18), as specified by the requirements 24, weighted by the priorities 26. The output is a list of images per best fit 30, which can be displayed to a user and/or stored for later use.
Paradigm for image management,
Paradigm for instance management,
Paradigm for virtual storage management}
Note that the specific format and content of the cloud metadata can typically be a function of a particular cloud service provider. Note further that as employed herein “Middleware” can be assumed to include software such as application software and network software, and any other executable software that is desirable to include in the instantiation of the target computer system in the cloud 10.
An aspect of the exemplary embodiments of this invention is to provide a service that accumulates image configuration details in a canonical fashion, and a further service that employs an algorithm to order images per best-fit/least cost in conformance with user-specified policies. These services collectively facilitate workload transformation into enterprise cloud environments.
One technique to establish a cloud migration service catalog of image contents is to instantiate cloud computing machine images by whatever means the cloud service provider makes available, such as via an image registry/catalog 11A and an API 11B, and then load discovery tools (12) onto the cloud machine instances. These discovery tools are then executed against the images, and the results are returned to populate the repository (cloud image inventory 14) containing the information discovered about the cloud images. By directly performing discovery against instantiated cloud images, the need to rely on cloud service provider-supplied advertisements (which can be limited in descriptive value as discussed above) is avoided.
One suitable type of discovery tool is described by K. Magoutis, M. V. Devarakonda, N. Joukov, N. G. Vogl, “Galapagos: Model-driven discovery of end-to-end application—storage relationships in distributed systems.” IBM Journal of Research and Development, Vol. 52, No. 4-5, 2008, Pages 367-378).
The administrator specifies the policies 28A regarding components which might be included in a target machine instance, indicating costs for operations such as component installation, removal, and upgrade, and indicating additional constraining policies (constraints 28B) such as “do not allow migration from IBM Websphere Application Server (WAS) 7 to WAS 5”. ‘WAS’ is an abbreviation herein for WebSphere® Application Server, where WebSphere® is a registered trademark of the International Business Machines Corporation.
It should be noted that the policies 28A can also represent installation order dependencies. For example, one such installation order dependency may be “install WAS before DB2 if both are needed”. During execution of the algorithm a final selected best fit can be arranged in accordance with the dependency policy or policies.
It can be further noted that it is within the scope of the exemplary embodiments of this invention to also consider software installation pre-requisites, such that if a first piece of SW is a pre-requisite for installing a second piece of SW, then the first piece of SW is also selected for installation. However, this type of operation may not be advantageous in some implementations. For example, if the first piece of SW does not appear in the list of source SW to be instantiated in the cloud, while the second piece of SW does appear, then the overall cumulative cost of the installation can be increased by the additional installation cost of the first piece of SW. Further, in some cases the first piece of SW may in turn have a pre-requisite that another piece of SW also be installed. As such, the complexity of the best fit algorithm can be significantly increased by permitting pre-requisites to be considered.
A specification of the required migration target environment is prepared in a computer-readable form. This may assisted by the application of discovery tools against proposed migration source servers, returning results to an inventory containing the source server identifiers and the information discovered about the source servers. Once the above steps have been performed, an algorithm is executed to identify the optimal target machine images to be used for the migration of a given source server workload, weighted by the policies and constraints 28A, 28B specified by the administrator.
In the exemplary embodiments improvements are made to the usability and capability of a Cloud Migration Service (CMS) which enable the migration of workloads to physical, virtual, and cloud environments. The CMS can support the migration of existing workloads to heterogeneous physical, virtual, or cloud platforms, and can automate the provisioning and configuration of the target platforms. The CMS can also support the provisioning and configuration of new physical, virtual, or cloud-based platforms.
One suitable type of CMS is described in commonly owned U.S. patent application Ser. No. 12/608,609, filed Oct. 29, 2009 and incorporated by reference herein, which enables the migration of workloads to physical, virtual, and cloud environments. Reference can also be made to C. Ward, N. Aravamundan, K. Bhattacharya, K. Cheng, R. Filepp, R. Kearney, B. Peterson, L. Shwartz, C. C. Young, “Workload Migration into Clouds—Challenges, Experiences, Opportunities” Proceedings of the 2010 IEEE International Conference on Cloud Computing (CLOUD 2010).
An aspect of the exemplary embodiments is to provide an ability to improve the selection of migration targets in cloud computing environments. A further aspect is to provide an algorithm for finding a best cost-effective way of migration to a cloud.
Cloud Image Inventory 14. The Cloud Migration Service provides customers and providers with an interface for cloud migration service registration during the design and on-boarding/initialization process. Participants provide the following information which is stored in a service catalog:
cloudID: an identifier unique to a cloud provider
cloudInterfaces: a set of constants that expose the capabilities of Cloud-provided APIs (if they exist, such as the API 11B shown in
Instance Management Paradigm, how an instance may be modified through the API;
Image Management Paradigm, whether an image may be uploaded through the API; and
Persistent Storage Management, whether persistent (disk) storage may be extended through the API.
A discoveryMode: identifies a mode for the discovery of the configuration of images. Discovery modes include “InstantiateAndDiscover” and “LoadDefinitions”. “InstantiateAndDiscover” indicates that periodically the CMS will run comparisons between images in the catalog 14 and images provided by the cloud provider 10. When the CMS discovers variants it acts to “InstantiateAndDiscover” newly created images and remove from the catalog 14 those images which are no longer on the cloud 10.
It may be reasonably assumed that once images are added to a cloud they will not be changed. They may be copied and those copies may be customized and stored under a different and unique id, but the existing images are not updated. The “LoadDefinitions” mode indicates that the cloud provider 10 has an interface that allows customers to download detailed configuration information about existing images in a rigorous and computer-readable format. This would obviate the need to instantiate and discover configuration information pertaining to image instances. In “InstantiateAndDiscover” mode the CMS is responsible for keeping image information up to date and could maintain currency of the information by periodic updates. In “LoadDefinitions” mode, the CMS could be responsible for contacting a cloud provider for updated image descriptions, or a cloud provider could push new image descriptions to the CMS.
ImageID: an identifier unique to an image
cloudID: an identifier unique to a cloud computing service
softwareInstalled: a list of references to the software belonging to an image
Software—software components that are either already installed on an image or that need to be installed. Each SW is represented by a pair of SWName (SW) and SW Version (V). For example Apache HTTP Server 2.2.3 would be represented as the pair (Apache, 2.2.3) Implicit in the above description is the notion that naming and versioning of software is compatible between the image and the target. Provisions are made for the specification of antipathies between software. If such antipathies are encountered, an uninstallation cost will be assigned.
install (I): install the s/w on the instance,
uninstall (R): uninstall/remove software from the instance,
update (M): upgrade the version of the software on the instance or perform ‘delete’ and ‘install’ if direct upgrade of the software is not possible.
The cost of an operation can be defined as a cost function of various parameters. For example, the cost can be a combination of the time required for the migration and the cost of required people services. The cost of each operation is specified by the administrator.
There are three operations in modifying the software between a source and target: installation, removal and upgrading. For each of these operations, a function is defined to calculate the cost.
Let ƒI(S) be a function that calculates the cost of installing the software S; let ƒR(S) be a function that calculates the cost of removing (uninstalling) the software S; and let ƒM(S,S′) be a function that calculates the cost of upgrading software S to software S′, where S and S′ are functionally compatible software. Usually this implies a change from an earlier version to a later one. However, it may indicate a change to an older version, or even a change from one vendor to another. For example, an upgrade might be from MySQL to DB2. Therefore, an upgrade may be considered as being between two softwares, rather than versions thereof.
It may be the case that the upgrade path is not defined. In this event the upgrade can be accomplished by a removal of the source software and an installation of the target software. In this case then:
ƒM(S,S′)=ƒR(S)+ƒI(S′)
Another observation is that the cost of upgrading a software to itself should be zero; that is,
ƒm(S,S)=0
It should also be noted that for a multi-step upgrade, the following relationship applies:
ƒM(S,S′)=ƒM(S,S″)+ƒM(S″,S′).
Given the above definitions, the total cost, C of migration of software can be defined to be:
where the sums are taken over the software components that have to be added, removed, and upgraded, respectively. The selection of a target image is then determined by which target image yields the smallest value of C. One simplification can be to make the assumption that the cost to install or to remove a software component is the same for any version of the software.
The functions ƒI and ƒR can be implemented as table lookups, with the table rows keyed on the software name and version. The function ƒM can be implemented as a matrix look-up, where the software name defines which matrix to use, and the rows and columns are keyed by the software versions
The Table depicted in
Described now in detail is an embodiment of an algorithm executed in the system 100.
There exist at least two types of information about the targeted instance and the available cloud images: 1) hardware and 2) software information. Hardware information may include the quantitative description of virtual hardware, such as the number of CPUs, quantity of RAM, quantity of disk space, etc. In many, but not all, cases cloud providers do not allow these values to be changed since they are already predefined in the image. If the current cloud provider 10 does not allow modification of these values then the first operation of the algorithm is filtering out from the list of existing images 14 those which have insufficient values in these parameters. For example, if a specified target has four CPUs, then all images with one or two CPUs will be removed from the list of images for further consideration. Similarly, also removed from consideration are all images which have an Operating System that differs from the Operating System of the target.
The algorithm then functions to find the least costly transitioning of an existing target image to a configuration defined by the source. Assume that k is a length of SW elements in the transition required by the source, and the maximum number of existing SW elements in any target is n. The maximum number of total comparisons is nk. In other words, the task is at most a polynomial of degree k. An alphanumeric ordering of the SW elements can be used to reduce number of operations required from polynomial to log-linear.
The set of software contained in each image is then ordered and specified for each target. The set of software for each target and image can be ordered (sorted) alphanumerically by the first element of the pair: software name. An established order allows comparing any two elements as follows: an element is deemed to be smaller than another element if its name begins with a letter earlier in the collating sequence than that of the first letter of the another element. Numbers are considered to be smaller than any letter. For example, an image that has Apache, WAS and DB2 installed may be represented by the following set {(Apache, 2.2.3), (DB2, 9.5), (WAS, 6.1)}. The ordering/sorting operation is depicted in
The next step is the execution of a matching algorithm. Following simple logic for each condition the algorithm derives the cost (C) for the migration as the sum of all install operations for a target's software, or of all uninstall operations for an image's software.
where there is no SW on the image and SW exists on the target; and
where there are no SW requirements for target and SW exists on the image.
The same statement is true if none of the SW on the image matches the SW on the target. This condition incurs maximal migration costs since it includes costs for uninstall operations for every SW on the image and the cumulative cost of install operations for each SW required for the target. In the case where one or more SWs are common between an image and a target, the maximal cost of this SW update would be the cumulative cost of the uninstall of one version of SW and the install of a new version of SW. The situation where none of SW on the image matches exactly any of SW on the target is a worst case scenario for known matching algorithms. The algorithm described herein is an optimal algorithm for the worst case scenario.
In the next step of the algorithm a comparison between two first pairs of non-empty sets of SW is performed. The SWs are compared to understand if they are the same or if the element in the target is “smaller” than the element in the image, or vice versa. In those cases where the SWs match the versions are compared. If the versions are different the cost of version upgrade is added to the cumulative cost of migration. In cases where the SW in the target is “smaller” than the SW in the image, the cost of installation of the target's SW is added to the cumulative cost of migration. The next entry in the target's list of SW is then compared against the same SW in the image list. If this SW in the target is greater than the SW in the image then the cost of the uninstall of the image's SW is added to the cumulative cost of migration. A demonstration of the operation of the algorithm is now presented in the context of a simple example.
Target: {(a,3),(b,2),(d,1)}
Image: {(a,1),(c,2),(e,1))}
First step: compare first SWs on both lists and see that each requires software “a”, but the target has version “3” while the image has version “1”. This gives a first cost term due to an upgrade from version “1” to version “3” of software “a” as:
C
0=ƒM(a1,a3).
Second step: Moving to the next software in both the target and image it can be seen that have b<c. Since b is present on the target, but not on the image, the SW=b has to be installed. Therefore, the second cost factor is given by:
C
1=ƒI(b2).
Third step: Incrementing to the next target software it can be seen that d>c which means that c is not one of the SWs on the target and it has to be removed from the image. The cost of this operation is given by:
C
2=ƒR(c2).
Fourth step: the algorithm continues by iterating through the image's list of SWs to find that d<e. This is similar to the second step, so d has to be installed and the cost of this operation is:
C
3=ƒI(d1).
Last step: The element e from the image is the element that has to be compared with the next element after d on the target. As there are no further elements on the target e has to be removed at a cost of:
C
4=ƒR(e1).
The foregoing steps yield a total, cumulative cost of:
As can be seen from this example exactly five comparison operations were performed: i.e., the SWs were compared four times, and once the versions of a SW that was present in both the target and the image were compared. Finally it was concluded that the last element of the image needed to be removed since the list of target elements had been exhausted. When the SWs did not match the algorithm was able to make decisions on the required operation for one of them. This means that the number of comparisons required does not exceed the sum of SW elements specified for the target and SW elements which are already built into the image. Thus, the algorithm has a linear time matching length. For example, in the case where the target has k number of SW elements and the image has l number of SW elements, the maximum length of the comparison is (k+l). The minimal length of comparison is min(k,l) and is achieved when there is no common SW between the image and the target. Indeed, considering the following example: Target: {(a,1),(b,2),(c,1)}, Image: :{(d,3),(e,2),(f,1),(g,5)}, it can be noted that iterating through the list of the target's SW will require three steps to conclude that each SW in the target has to be installed, and all SW in the image has to be uninstalled. The length of the algorithm in this case is thus min(3, 4)=3. The cost in this case is a sum of all costs for installation or removal of each SW in both lists:
where T the set of all SW for the target and I is the set of SWs installed on the image.
As was noted above, the algorithm is optimal for use with the worst case scenario, and an assumption can be made that using an algorithm that is optimized for the worst case scenario contributes to usability.
With respect to the data model 200, the architecture 202 is used to group server configurations 204 within an overarching type of system architecture such as IBM S390, IBM POWER, etc. The file system 206 presents mount points, sizes, permissions, types, and is related to a software FilesystemType 206A that represents types of file systems, remote or local (and contains both discovered file systems and file systems that can be provisioned). The host 208 represents a provisionable server template. The project 210 is used to group cloud images, and the request 212 is used as an entry point to requirements, and holds the source server id and the target server id.
The server configuration 204 provides hardware information such as memory, number of CPUs, machine type, architecture and source of information. The software 214 provides the software name, type, installation source location (and contains both discovered software and software that can be provisioned). A join can be used to join tables which relate, for example, software 214 with the server configuration 204.
The costs 216 represent the cost/weight for software install and uninstall, as well as upgrade/downgrade operations. The cost is dependent on the operating system, as well as the architecture 202 on which the software 214 is installed.
The constraints 218, such as the constraints 28B shown in
Target hardware and software requirements are gathered by means of the execution of the discovery tools 12 on source servers and refinement and customization of those requirements by means of the CMS which are stored to the repository 14. The inventory of cloud image attributes is populated by requesting image instances, loading and executing a discovery tool to the instances, and storing the results to the repository 14. It should be noted that by using the same discovery tools against source servers and images, and adopting the conventions of the discovery tool within the list of software, issues such as software name and version inconsistencies can be avoided.
A determination is made as to whether any affinities or antipathies exist among the target software requirements that must be taken into account, as per the constraints table 218. The outcome is the identification of conflicts among the requested software and/or more complete lists of software that should be installed on target servers. The repository 14 is then examined to determine if any software is required which cannot be provisioned. If so, any virtual image that will be considered in future steps has this restrictive software pre-installed. The repository 14 is then queried to identify cloud images that satisfy the hardware requirements, the target OS, and restrictive software from the previous step, if any. The attributes of each image are interrogated in order to determine, for each software, which operation (install, uninstall, upgrade/downgrade) may be needed. For each software which must be uninstalled, the cost of its removal is added to the total cost for that image. For each required software that requires installation or upgrade, the installation or upgrade cost is added to the image cost. The output is a sorted list specifying each virtual image and the projected workload migration cost (costs 216).
In
In Block 6A the algorithm gets the first MW in the Image and the first MW in the Target. At Block 6B a determination is made if the two MWs are equal. If yes, a determination is made at Block 6C if the version (V) of the Image MW is equal to the version of the Target MW. If yes, control passes to Block 6D, where it is declared that no edit is needed, then control passes to Block 6E to determine if the Image has a next MW. If yes, control passes to Block 6F to determine if the Target also has a next MW. If yes, then control passes to Block 6G to get the next MW in the Image and the next MW in the Target, and then control passes back to Block 6B to compare the two MWs to determine if they are equal.
If, at Block 6B, the determination is no control passes to Block 6H to determine if the Image MW is smaller than the target MW (does it come earlier in the ordered list). If yes control passes to Block 6I to indicate that an uninstall the Image MW is needed, and the transition cost for the uninstall is added to the current cumulative cost. Next, at Block 6J the next MW in the Image is obtained (if it exists). If it does control passes to Block 6A, otherwise control passes to Block 6K to determine if the Target has a next MW. Note that Block 6K can also be entered if the determination at Block 6E is no. If the Target does have a next MW (Block 6K) then at Block 6L all MW remaining in the Target has to be installed, and the algorithm adds the transition cost for the install of the needed MW or MWs to the current cumulative cost, and control passes back to Block 5C of
If at Block 6H it is determined instead that the Image MW is not smaller than the target MW then control passes to Block 6N (it is implied that the Image MW is greater than Target MW and comes later in the ordered list), and then to Block 6O to indicate that an install the Target MW is needed. The transition cost for the install is added to the current cumulative cost. Next, at Block 6P the next MW in the Target is obtained (if it exists). If it does control passes to Block 6A, otherwise control passes to Block 6Q to determine if the Image has a next MW. If the Image does have a next MW then all MW remaining in the Image has to be uninstalled and the algorithm adds the transition cost for the uninstall of the Image MW or MWs to the current cumulative cost (Block 6M). If the Image does not have a next MW, then the no path is taken from Block 6Q back to Block 5C of
At Block 6C, if the determination is made that Image MW version does not equal the Target MW version, control passes to Block 6R where a MW version update is indicated, and the transition cost for the update is added to the current cumulative cost. Control then passes to Block 6E.
As should be appreciated based on the foregoing discussion, an aspect of the invention is the sorting of relevant images by cost, which may be considered, along with finding the optimal images and migrating the source to the cloud using any (not necessarily the optimal) images, as being one of the goals of the invention.
The various embodiments described above provide a service that accumulates image configuration details and stores them in the computer-readable catalog 14, and a further service that employs an algorithm (the algorithm SW 124A) to order images per best-fit/least cost in conformance with specified requirements 24 and policies 26.
Disclosed herein has been a computer-implemented method, system and computer software for preparing a migration and consolidation of at least one source application to be migrated to, or consolidated in, at least one heterogeneous virtual server device managed within a cloud computing environment. The computer-implemented method, system and computer software includes collecting first metadata of at least one source platform component and at least one prospective target platform component, selecting at least one prospective target platform component based on one or more of: an evaluation of at least one source platform component and a requirement of the at least one source application, wherein the source platform component refers to an individual dependency that the at least one source application has upon hardware, software, or at least one attribute of the hardware and software. The prospective target platform component refers to an individual software, hardware or attributes of the individual software and hardware to be provisioned for at least one server device. The computer-implemented method, system and computer software further includes preparing and configuring an instance of a final target platform within the cloud computing environment based on the first metadata and the second metadata, where the final target platform refers to a sum of dependencies that the final target application has upon hardware and/or software. A final target application refers to an application that exists after the migration and consolidation into the cloud computing environment. The computer-implemented method, system and computer software further includes saving the instance of the final target platform within the cloud computing environment as a virtual image within the cloud computing environment.
The use of the computer-implemented method, system and computer software improves application migration from one or a plurality of computer systems to a set of computer systems offered by a cloud service provider as cloud services.
The use of the computer-implemented method, system and computer software provides an ability to distinguish between infrastructure provisioning and software provisioning, where each operation can be performed independently, and where software provisioning uses a result of the infrastructure provisioning.
The computer-implemented method, system and computer software provide an at least one algorithm that matches a RFM document to a set of computer systems of a cloud service provider.
An aspect the computer-implemented method, system and computer software is an integrated user interface that allows users to select from different migration mechanisms (e.g. cloud vs. non-cloud) and provide the possibility to view metadata on the provisioning process for decision support (e.g., speed and/or accuracy).
As will be appreciated by one skilled in the art, aspects of the present invention may be embodied as a system, method or computer program product. Accordingly, aspects of the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment (including firmware, resident software, micro-code, etc.) or an embodiment combining software and hardware aspects that may all generally be referred to herein as a “circuit,” “module” or “system.” Furthermore, aspects of the present invention may take the form of a computer program product embodied in one or more computer readable medium(s) having computer readable program code embodied thereon.
As was noted above with respect to
A computer readable signal medium may include a propagated data signal with computer readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated signal may take any of a variety of forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device.
Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to wireless, wireline, optical fiber cable, RF, etc., or any suitable combination of the foregoing.
Computer program code for carrying out operations for aspects of the present invention may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, Smalltalk, C++ or the like and conventional procedural programming languages, such as the “C” programming language or similar programming languages. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the latter scenario, the remote computer may be connected to the user's computer through any type of network, including a local area network (LAN) or a wide area network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet Service Provider).
Aspects of the present invention are described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the invention. It will be understood that each block of the flowchart illustrations and/or block diagrams, and combinations of blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions/acts specified in the flowchart and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer readable medium that can direct a computer, other programmable data processing apparatus, or other devices to function in a particular manner, such that the instructions stored in the computer readable medium produce an article of manufacture including instructions which implement the function/act specified in the flowchart and/or block diagram block or blocks.
The computer program instructions may also be loaded onto a computer, other programmable data processing apparatus, or other devices to cause a series of operational steps to be performed on the computer, other programmable apparatus or other devices to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide processes for implementing the functions/acts specified in the flowchart and/or block diagram block or blocks.
The flowcharts and block diagrams in the various Figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present invention. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the Figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems that perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. As used herein, the singular forms “a”, “an” and “the” are intended to include the plural forms as well, unless the context clearly indicates otherwise. It will be further understood that the terms “comprises” and/or “comprising,” when used in this specification, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
The corresponding structures, materials, acts, and equivalents of all means or step plus function elements in the claims below are intended to include any structure, material, or act for performing the function in combination with other claimed elements as specifically claimed. The description of the present invention has been presented for purposes of illustration and description, but is not intended to be exhaustive or limited to the invention in the form disclosed. Many modifications and variations will be apparent to those of ordinary skill in the art without departing from the scope and spirit of the invention. The embodiment was chosen and described in order to best explain the principles of the invention and the practical application, and to enable others of ordinary skill in the art to understand the invention for various embodiments with various modifications as are suited to the particular use contemplated.
As such, various modifications and adaptations may become apparent to those skilled in the relevant arts in view of the foregoing description, when read in conjunction with the accompanying drawings and the appended claims. As but some examples, the use of other similar or equivalent computer processing systems and algorithms may be used by those skilled in the art. However, all such and similar modifications of the teachings of this invention will still fall within the scope of this invention.
This patent application claims priority under 35 U.S.C. §119(e) from U.S. Provisional Patent Application No. 61/376,457, filed Aug. 24, 2010, the disclosure of which is incorporated by reference herein in its entirety.
Number | Date | Country | |
---|---|---|---|
61376457 | Aug 2010 | US |