The present invention relates to a system for providing virtual machines that provides virtual machines virtualized on a physical server to each user.
There is a virtual server distributed arrangement method including: generating server arrangement data that represents correspondence relation between a virtual server identifier representing each one of a plurality of virtual servers and a physical server identifier representing each one of a plurality of physical servers arranging the virtual servers in a distributed manner; generating virtual server configuration data that represents correspondence relation between a virtual server identifier and a group identifier used for identifying a user group using the virtual server; calculating an evaluation value of the virtual server arrangement that is arranged in accordance with the server arrangement data based on the virtual server identifier and the group identifier; and displaying a plurality of candidates for the virtual server arrangement based on the calculated evaluation values (see Patent Literature 1). According to this virtual server distributed arrangement method, virtual computers can be appropriately arranged for a physical computer, and thereby a loss in the user section can be minimized.
According to the virtual server distributed arrangement method disclosed in Patent Document 1 described above, the virtual servers are not assigned separately to each user based on the use frequency, the use form and the user method of a user using the virtual servers, and the virtual servers cannot allow users to effectively use the virtual servers without any waste in correspondence with the use frequency and the use form of the virtual server, and the use method of each user. In addition, virtual servers having mutually-different capacities cannot be assigned to each user in accordance with a request of the user, and virtual servers having mutually-different capacities corresponding to the use frequency, the use form, and the use method of each user cannot be used by the user. According to this virtual server distributed arrangement method, the virtual servers are visualized for users using the virtual servers, and a virtual server of one user may be changed by another user, and thereby it is difficult to acquire the security of the virtual servers.
The present invention is directed to provide a system for providing virtual machines that can assign virtual machines to users based on the use frequencies, the use forms, and the use methods of the users using the virtual machines and enables the users to effectively use the virtual machines without any waste. Furthermore, the present invention is directed to provide a system for providing virtual machines that can assign virtual machines having mutually-different capacities corresponding to the use frequencies, the use forms, and the use methods of the users to the users and enables the users to use the virtual machines having mutually-different capacities. In addition, the present invention is directed to provide a system for providing virtual machines that can prevent the virtual server of each user from being changed and can acquire the security of virtual servers.
A premise of the present invention for solving the above-described problem is a system for providing virtual machines that provides virtual machines virtualized on a physical server for each user
On the above-described premise, according to an aspect of the present invention, there is provided a system for providing virtual machines including: first to n-th virtual routers that are virtualized on at least one physical router; first to n-th virtual firewalls that are individually connected to the first to n-th virtual routers through global networks and are virtualized on at least one physical firewall; and a plurality of virtual machines that are connected to the first to n-th virtual firewalls through private networks and are virtualized on at least one physical server, wherein the system for providing the virtual machines executes a virtual machine generating means for generating the virtual machines on the physical server in accordance with a request of the user and a first virtual machine assigning means for assigning the generated virtual machines to the user.
As an example of the present invention, the system for providing the virtual machines further includes a capacity setting means for setting capacities of the virtual machines generated by the virtual machine generating means for the virtual machines.
As another example of the present invention, the system for providing virtual machines further includes a first IP address setting means that generates a predetermined IP address for each one of the virtual machines assigned by the first virtual machine assigning means and sets the generated IP address to each one of the virtual machines.
As another example of the present invention, the system for providing the virtual machines further includes a first capacity visualizing means for allowing the capacities of the virtual machines assigned by the first virtual machine assigning means to be individually visualized for each user and allowing the capacities to be non-visible to the other users.
As another example of the present invention, the system for providing the virtual machines further includes a first virtual machine removing means for removing unnecessary virtual machines out of the virtual machines assigned by the first virtual machine assigning means in accordance with a request of the user.
As another example of the present invention, the system for providing the virtual machines further includes: a clone generating means for generating clones of virtual machines that are the same as the virtual machines that have already been generated in accordance with a request of the user; a second virtual machine assigning means for assigning the generated clones of the virtual machine to the user; and a second IP address setting means for generating predetermined IP addresses for the clones of the virtual machines assigned by the second virtual machine assigning means and individually sets the generated IP addresses to the clones of the virtual machines.
As another example of the present invention, the system for providing the virtual machines further includes a second capacity visualizing means for allowing the capacities of the clones of the virtual machines assigned by the second virtual machine assigning means to be individually visualized for each user and allowing the capacities to be non-visible to the other users.
As another example of the present invention, the system for providing the virtual machines further includes a second virtual machine removing means for removing unnecessary clones of virtual machines out of the clones of the virtual machines assigned by the second virtual machine assigning means in accordance with a request of the user.
As another example of the present invention, the system for providing the virtual machines further includes a private network setting means for setting a private network connecting the virtual firewalls, the virtual machines, and the clones together in accordance with a request of the user.
As another example of the present invention, the private network setting means divides the virtual machines and the clones connected to a specific virtual firewall into two or more groups in accordance with a request of the user and sets a plurality of the private networks that connect the virtual firewalls and the groups together.
As another example of the present invention, the system for providing the virtual machines further includes a private network changing means that adds, changes, or removes the private network connecting the virtual firewalls, the virtual machines, and the clones together in accordance with a request of the user.
As another example of the present invention, the system for providing the virtual machines further includes a console function setting means for setting a console function to the virtual machines and the clones in accordance with a request of the user.
As another example of the present invention, the capacities of the virtual machines and the clones are the numbers of central processing units used therein, and the system for providing the virtual systems further includes: a capacity changing means for subsequently increasing or decreasing the number of the central processing units in accordance with a request of the user; and a capacity change visualizing means for allowing the numbers of the central processing units, which have been increased or decreased by the capacity changing means, to be individually visualized for each user and allowing the numbers of the central processing units to be non-visible to the other users.
As another example of the present invention, the capacities of the virtual machines and the clones are memory sizes thereof, the capacity changing means subsequently increases or decreases the memory sizes in accordance with a request of the user; and a capacity change visualizing means allows the memory sizes, which have been increased or decreased by the capacity changing means, to be individually visualized for each user and allows the memory sizes to be non-visible to the other users.
As another example of the present invention, the capacities of the virtual machines and the clones are the capacities of hard disks used therein, the capacity changing means subsequently increases or decreases the capacities of the hard disks in accordance with a request of the user, and the capacity visualizing means allows the capacities of the hard disks, which have been increased or decreased by the capacity changing means, to be individually visualized for each user and allows the capacities of the hard disks to be non-visible to the other users.
As another example of the present invention, the system for providing the virtual machines further includes an operating status visualizing means for allowing operating statuses of the virtual machines and the clones assigned to the users to be individually visualized for each user and allowing the operating statuses to be non-visible to the other users.
As another example of the present invention, the operating statuses of the virtual machines and the clones are past or present memory use rates of each one of the virtual machines and each one of the clones, and the operating status visualizing means allows the memory use rates to be individually visualized for each user and allows the memory use rates to be non-visible to the other users.
As another example of the present invention, the operating status visualizing means visualizes the memory use rates in time series.
As another example of the present invention, the operating statuses of the virtual machines and the clones are past or present use rates of central processing units of each one of the virtual machines and each one of the clones, and the operating status visualizing means allows the use rates of the central processing units to be individually visualized for each user and allowing the use rates to be non-visible to the other users.
As another example of the present invention, the operating status visualizing means visualizes the use rates of the central processing units in time series.
As another example of the present invention, the operating statuses of the virtual machines and the clones are past or present private network use rates of each one of the virtual machines and each one of the clones, and the operating status visualizing means allows the private network use rates to be individually visualized for each user and allows the network use rates to be non-visible to the other users.
As another example of the present invention, the operating status visualizing means visualizes the private network use rates in time series.
As another example of the present invention, the operating statuses of the virtual machines and the clones are an operating time, latest power-on date and time, and latest power-off date and time of each one of the virtual machines and each one of the clones, and the operating status visualizing means allows the operating time, the power-on date and time, and the power-off date and time to be individually visualized for each user and allows the operating time, the power-on date and time, and the power-off date and time to be non-visible to the other users.
A system for providing virtual machines according to the present invention is formed by first to n-th virtual routers that are virtualized on a physical router, first to n-th virtual firewalls that are connected to the first to n-th virtual routers and are virtualized on a physical firewall, and a plurality of virtual machines that are connected to the first to n-th virtual firewalls and are virtualized on a physical server and executes a virtual machine generating means that generates the virtual machines and a first virtual machine assigning means that assigns the generated virtual machines to users. Accordingly, since each virtual machine can be freely assigned in accordance with the use form, the use frequency, the use method, and the like of a user using the virtual machine, a virtual machine that is not necessary to the user is not assigned, and the virtual machines can be effectively used without any waste in an optimal environment by users. According to this system for providing virtual machines, a user can provide various services through the Internet and can receive various services through the Internet, using the virtual machines.
According to a system for providing the virtual machines that further includes a capacity setting means for setting capacities of the virtual machines generated by the virtual machine generating means for the virtual machines, mutually-different capacities can be set to the virtual machines. Accordingly, since virtual machines having different capacities can be freely assigned in accordance with the use form, the use frequency, the use method, and the like of a user using the virtual machine, a virtual machine having performance that is not necessary to the user or a virtual machine having insufficient performance is not assigned, and the virtual machines 161 to 16n having optimal capacities can be used by the users.
According to a system for providing virtual machines that further includes a first IP address setting means for generating predetermined IP addresses for the virtual machines assigned by the first virtual machine assigning means and setting the generated IP addresses respectively to the virtual machines, predetermined IP addresses are individually set respectively to the virtual machines. Accordingly, the virtual machines are connected to the Internet using the IP addresses, and each user can receive various services provided through the Internet. This system for providing virtual machines can access the virtual machines from the Internet side using the IP addresses, and the virtual machine assigned to each user can be used for providing various services through the Internet.
According to a system for providing virtual machines that further includes a first capacity visualizing means for allowing the capacities of the virtual machines assigned by the first virtual machine assigning means to be individually visualized for each user and allowing the capacities to be non-visible to the other users, the capacity of a virtual machine of a user using the virtual machine is not visualized for the other users, and the privacy of each user can be protected. In addition, the addition or the removal of the virtual machine of the user, the addition, the change, the removal of the capacity of the virtual machine, or a change in the IP address of the virtual machine such as the addition, the change, or the removal thereof can be prevented from being performed by the other users, and accordingly, the security of the virtual machines assigned to each user can be reliably secured.
According to a system for providing virtual machines that further includes a first virtual machine removing means for removing unnecessary virtual machines out of the virtual machines assigned by the first virtual machine assigning means in accordance with a request of the user, the virtual machines out of the assigned virtual machines that become unnecessary can be freely removed by the user based on a request of the user. Accordingly, the waste of the virtual machines can be prevented with the use form, the use frequency, the use method, and the like of the virtual machines being considered, whereby the virtual machines can be effectively used without any waste in an optimal environment.
According to a system for providing virtual machines that further includes: a second virtual machine assigning means for generating clones (copies) of virtual machines that are the same as the virtual machines that have already been generated in accordance with a request of the user, and assigning the generated clones of the virtual machine to the user; and a second IP address setting means for generating predetermined IP addresses for the clones of the virtual machines assigned by the second virtual machine assigning means and individually sets the generated IP addresses to the clones of the virtual machines, a clone that is the same as a virtual machine that has already been present can be generated. Accordingly, by freely copying the virtual machine having the same function, a plurality of virtual machines having the same function can be generated in a speedy manner. By generating a plurality of virtual machines having the same function in accordance with a user's request, the system for providing virtual machines can respond to the use form, the use frequency, the use method, and the like of the virtual machine of the user in a speedy manner. Since the system for providing virtual machines individually sets predetermined IP addresses to the clones of the virtual machines, the clones of the virtual machines can be connected to the Internet using the IP addresses and, each user can receive various services provided through the Internet. Since this system for providing virtual machines can access the clones of the virtual machines from the Internet side using the IP addresses, the clones of the virtual machines assigned to the users can be used for providing various services through the Internet.
According to a system for providing virtual machines that includes a second capacity visualizing means for allowing the capacities of the clones of the virtual machines assigned by the second virtual machine assigning means to be individually visualized for each user and allowing the capacities to be non-visible to the other users, the capacity of the clone of a virtual machine of a user using the clone of the virtual machine is not visualized for the other users, and the privacy of each user can be protected. In addition, the addition or the removal of the clone of the virtual machine of the user, the addition, the change, the removal of the capacity of the clone of the virtual machine, or a change in the IP address of the clone of the virtual machine such as the addition, the change, or the removal thereof can be prevented from being performed by the other users, and accordingly, the security of the clones of the virtual machines assigned to each user can be reliably secured.
According to a system for providing virtual machines that further includes a second virtual machine removing means for removing unnecessary clones of virtual machines out of the clones of the virtual machines assigned by the second virtual machine assigning means in accordance with a request of the user, the clones of the virtual machines out of the clones of the assigned virtual machines that become unnecessary can be freely removed by the user based on a request of the user. Accordingly, the waste of the clones of the virtual machines can be prevented with the use frequency, the use form, the use method, and the like of the clones of the virtual machines being considered, whereby the virtual machines can be effectively used without any waste in an optimal environment.
According to a system for providing virtual machines that further includes a private network setting means for setting a private network connecting the virtual firewalls, the virtual machines, and the clones together in accordance with a request from the user, a private network that can be used by a user can be set for each user. Accordingly, an aggregation of the virtual machines or the clones connected using the private network for each user can be generated, and the virtual machines or the clones connected to the private network are not visualized for the other users. Therefore, while a request for allowing the virtual machines or the clones of each user to be non-visible is satisfied, a request for using the private network in this system can be responded in a speedy manner.
According to a system for providing the virtual machines in which the private network setting means divides the virtual machines and the clones connected to a specific virtual firewall into two or more groups in accordance with a request of the user and sets a plurality of the private networks that connect the virtual firewalls and the groups together, a user can maintain a plurality of private networks connecting the virtual firewalls, the virtual machines, and the group of the clones in accordance with a user's request. In this system for providing virtual machines, since each user can use a plurality of private networks, groups of the virtual machines or the clones that are used for different purposes can be generated. Therefore, while a request for allowing the group of the virtual machines or the clones connected to the private network to be non-visible is satisfied, a request for using a plurality of private networks connecting groups of the virtual machines or the clones used for different purposes can be responded in a speedy manner.
According to a system for providing virtual machines that further includes a private network changing means that adds, changes, or removes the private network in accordance with a request of the user, a private network that is newly desired to be used can be added in accordance with a user's request. Accordingly, a request for using a new private network in the system can be responded in a speedy manner. Since the system for providing virtual machines can change the private network in accordance with a user's request, a request for changing the private network in the system can be responded in a speedy manner, and accordingly, an aggregation of the virtual machines or the clones connected using the changed private network can be generated. Since the system for providing virtual machines can remove the private network in accordance with a user's request, unnecessary private networks can be removed with the use form, the use frequency, the use method, and the like of the virtual machines or the clones being considered, whereby a request for removing the private network in the system can be responded in a speedy manner.
According to a system for providing the virtual machines that further includes a console function setting means for setting a console function to the virtual machines and the clones in accordance with a request of the user, a virtual console function can be implemented in each virtual machine or each clone. Accordingly, another device connected to each virtual machine or each clone through the private network can be used as a console.
According to a system for providing virtual machines in which the capacities of the virtual machines and the clones are the numbers of central processing units used therein, further including: a capacity changing means for subsequently increasing or decreasing the number of the central processing units in accordance with a request of the user; and a capacity change visualizing means for allowing the numbers of the central processing units, which have been increased or decreased by the capacity changing means, to be individually visualized for each user and allowing the numbers of the central processing units to be non-visible to the other users, virtual machines or clones of which the numbers of central processing units are different can be assigned in accordance with the use form, the use frequency, the use method, and the like of the virtual machine or the clone of each user, and a virtual machine or a clone having an unnecessary function for the user is not assigned. Therefore, the virtual machines or the clones can be effectively used without any waste in an optimal environment by the user. In addition, since the system for providing virtual machines can increase or decrease the number of the central processing units subsequently in accordance with a user's request, the performance-up or performance-down of the virtual machine or the clone can be performed in accordance with the use frequency, the use form, the use method, and the like of the virtual machine or the clone, and accordingly, the user can use virtual machines or clones matching the user's needs. Since this system for providing virtual machines allows the number of the central processing units or the increased or decreased number of the central processing units to be non-visible to the other users, the numbers of the central processing units of the virtual machines or the clones of a user using the virtual machines or the clones are not visualized for the other users, and the privacy of each user can be protected. In addition, since an arbitrary increase or decrease in the number of the central processing units of the user that is made by the other users can be prevented, the security of the virtual machines or the clones assigned to each user can be reliably secured.
According to a system for providing the virtual machines in which the capacities of the virtual machines and the clones are memory sizes thereof, the capacity changing means subsequently increases or decreases the memory sizes in accordance with a request of the user, and a capacity change visualizing means allows the memory sizes, which have been increased or decreased by the capacity changing means, to be individually visualized for each user and allows the memory sizes to be non-visible to the other users, virtual machines or clones of which the memory sizes are different can be assigned in accordance with the use form, the use frequency, the use method, and the like of the virtual machine or the clone of each user, and a virtual machine or a clone having an unnecessary function for the user is not assigned. Therefore, the virtual machines or the clones can be effectively used without any waste in an optimal environment by the user. In addition, since the system for providing virtual machines can increase or decrease the memory size subsequently in accordance with a user's request, the performance-up or performance-down of the virtual machine or the clone can be performed in accordance with the use frequency, the use form, the use method, and the like of the virtual machine or the clone, and accordingly, the user can use virtual machines or clones matching the user's needs. Since this system for providing virtual machines allows the memory size or the increased or decreased memory size to be non-visible to the other users, memory sizes of the virtual machines or the clones of a user using the virtual machines or the clones are not visualized to the other users, and the privacy of each user can be protected. In addition, since an arbitrary increase or decrease in the memory size of the user that is made by the other users can be prevented, the security of the virtual machines or the clones assigned to each user can be reliably secured.
According to a system for providing the virtual machines in which the capacities of the virtual machines and the clones are the capacities of hard disks used therein, the capacity changing means subsequently increases or decreases the capacities of the hard disks in accordance with a request of the user, and the capacity change visualizing means allows the capacities of the hard disks, which have been increased or decreased by the capacity changing means, to be individually visualized for each user and allows the capacities of the hard disks to be non-visible to the other users, virtual machines or clones of which the hard disk capacities are different can be assigned in accordance with the use form, the use frequency, the use method, and the like of the virtual machine or the clone of each user, and a virtual machine or a clone having an unnecessary function for the user is not assigned. Therefore, the virtual machines or the clones can be effectively used without any waste in an optimal environment by the user. In addition, since the system for providing virtual machines can increase or decrease the hard disk capacity subsequently in accordance with a user's request, the performance-up or performance-down of the virtual machine or the clone can be performed in accordance with the use frequency, the use form, the use method, and the like of the virtual machine or the clone, and accordingly, the user can use virtual machines or clones matching the user's needs. Since this system for providing virtual machines allows the hard disk capacity of the virtual machine or the clone or the increased or decreased hard disk capacity to be non-visible to the other users, hard disk capacities of the virtual machines or the clones of a user using the virtual machines or the clones are not visualized for the other users, and the privacy of each user can be protected. In addition, since an arbitrary increase or decrease in the hard disk capacity of the user that is made by the other users can be prevented, the security of the virtual machines or the clones assigned to each user can be reliably secured.
According to a system for providing the virtual machines that further includes an operating status visualizing means for allowing operating statuses of the virtual machines and the clones assigned to the users to be individually visualized for each user and allowing the operating statuses to be non-visualized for the other users, the operating statuses of the virtual machines or the clones can be allowed to be individually visualized for each user. Accordingly, since each user can acquire the operating status of each virtual machine or each clone, the performance-up or performance-down of the virtual machine or the clone can be accurately determined, and the addition or the removal of the virtual machine or the clone can be accurately determined. In addition, since the system for providing virtual machines allows the operating statuses of the virtual machines or the clones to be non-visible to the other users, the operating statuses of the virtual machines or the clones are not acquired by the other users, and the operating status of each user can kept in secret. Therefore, the privacy of each user at the time of using the virtual machines or the clones can be protected, and various changes in the virtual machines or the clones that are made by the other users can be prevented, whereby the security of the virtual machines or the clones assigned to each user can be reliably secured.
According to a system for providing virtual machines in which the operating statuses of the virtual machines and the clones are past or present memory use rates of each one of the virtual machines and each one of the clones, and the operating status visualizing means allows the memory use rates to be individually visualized for each user and allows the memory use rates to be non-visualized for the other users, the memory use rates of the virtual machines or the clones are individually displayed for each user. Accordingly, the memory use rate of each virtual machine or each clone can be acquired by each user, and the maintenance of the memory of the virtual machine or the clone or an increase or decrease in the memory can be accurately determined. Since this system for providing virtual machines allows the memory use rates of the virtual machines or the clones to be non-visible to the other users, the memory use rates of the virtual machines or the clones are not acquired by the other users, and the memory use state of each user can be kept in secret. Accordingly, the privacy of each user at the time of using the virtual machines or the clones can be protected. In addition, since an arbitrary increase or decrease in the memory of the virtual machine or the clone that is made by the other users can be prevented, the security of the virtual machines or the clones assigned to each user can be reliably secured.
According to a system for providing the virtual machines in which the operating status visualizing means visualizes the memory use rates in time series, the past to present memory use rates are individually displayed for each user in time series. Accordingly, the memory use rate of each virtual machine or each clone for every month, every date, and every hour can be acquired by each user, and the maintenance of the memory of the virtual machine or the clone or an increase or decrease in the memory can be accurately determined. Since this system for providing virtual machines allows the time-series memory use rates of the virtual machines or the clones to be non-visible to the other users, the memory use rates of the virtual machines or the clones are not acquired by the other users, and the memory use state of each user in time series can be kept in secret. Accordingly, the privacy of each user at the time of using the virtual machines or the clones can be protected. In addition, since an arbitrary increase or decrease in the memory of the virtual machine or the clone that is made by the other users can be prevented, the security of the virtual machines or the clones assigned to each user can be reliably secured.
According to a system for providing the virtual machines in which the operating statuses of the virtual machines and the clones are past or present use rates of central processing units of each one of the virtual machines and each one of the clones, and the operating status visualizing means allows the use rates of the central processing units to be individually visualized for each user and allowing the use rates to be non-visualized for the other users, the use rates of the central processing units of the virtual machines or the clones are individually displayed for each user. Accordingly, the use rate of the central processing unit of each virtual machine or each clone can be acquired by each user, and the maintenance of the number of the central processing units of the virtual machine or the clone or an increase or decrease in the number of the central processing units can be accurately determined. Since this system for providing virtual machines allows the use rates of the central processing units of the virtual machines or the clones to be non-visible to the other users, the use rates of the central processing units of the virtual machines or the clones are not acquired by the other users, and the use state of the central processing units of each user can be kept in secret. Accordingly, the privacy of each user at the time of using the virtual machines or the clones can be protected. In addition, since an arbitrary increase or decrease in the number of the central processing units of the virtual machine or the clone that is made by the other users can be prevented, the security of the virtual machines or the clones assigned to each user can be reliably secured.
According to a system for providing the virtual machines in which the operating status visualizing means visualizes the use rates of the central processing units in time series, the past to present use rates of the central processing units are individually displayed for each user in time series. Accordingly, the use rate of the central processing unit of each virtual machine or each clone for every month, every date, and every hour can be acquired by each user, and the maintenance of the number of the central processing units of the virtual machine or the clone or an increase or decrease in the number of the central processing units can be accurately determined. Since this system for providing virtual machines allows the time-series use rates of the central processing units of the virtual machines or the clones to be non-visible to the other users, the use rates of the central processing units of the virtual machines or the clones are not acquired by the other users, and the use state of the central processing unit of each user in time series can be kept in secret. Accordingly, the privacy of each user at the time of using the virtual machines or the clones can be protected. In addition, since an arbitrary increase or decrease in the number of the central processing units of the virtual machine or the clone that is made by the other users can be prevented, the security of the virtual machines or the clones assigned to each user can be reliably secured.
According to a system for providing the virtual machines in which the operating statuses of the virtual machines and the clones are past or present private network use rates of each one of the virtual machines and each one of the clones, and the operating status visualizing means allows the private network use rates to be individually visualized for each user and allows the network use rates to be non-visualized for the other users, the use rates of the private networks of the virtual machines or the clones are individually displayed for each user. Accordingly, the use rate of the private network of each virtual machine or each clone can be acquired by each user, and the maintenance of the private networks of the virtual machine or the clone or the addition, the change, the removal of the private network can be accurately determined. Since this system for providing virtual machines allows the use rates of the private networks of the virtual machines or the clones to be non-visible to the other users, the use rates of the private networks of the virtual machines or the clones are not acquired by the other users, and the use state of the private network of each user can be kept in secret. Accordingly, the privacy of each user at the time of using the private networks can be protected. In addition, since arbitrary addition, change, or removal of the private networks that is made by the other users can be prevented, the security of the virtual machines or the clones assigned to each user can be reliably secured.
According to a system for providing the virtual machines in which the operating status visualizing means visualizes the private network use rates in time series, the past to present use rates of the private networks are individually displayed for each user in time series. Accordingly, the use rate of the private network of each virtual machine or each clone for every month, every date, and every hour can be acquired by each user, and the maintenance of the private networks of the virtual machine or the clone or the addition, the change, or the removal of the private network can be accurately determined. Since this system for providing virtual machines allows the time-series use rates of the private networks of the virtual machines or the clones to be non-visible to the other users, the use rates of the private networks of the virtual machines or the clones are not acquired by the other users, and the use state of the private network of each user in time series can be kept in secret. Accordingly, the privacy of each user at the time of using the private networks can be protected. In addition, since arbitrary addition, change, or removal of the private network that is made by the other users can be prevented, the security of the virtual machines or the clones assigned to each user can be reliably secured.
According to a system for providing the virtual machines in which the operating statuses of the virtual machines and the clones are an operating time, latest power-on date and time, and latest power-off date and time of each one of the virtual machines and each one of the clones, and the operating status visualizing means allows the operating time, the power-on date and time, and the power-off date and time to be individually visualized for each user and allows the operating time, the power-on date and time, and the power-off date and time to be non-visualized for the other users, the operating time, the power-on date and time, and the power-off date and time of each virtual machine or each clone are individually displayed for each user. Accordingly, the operating time, the power-on date and time, and the power-off date and time of each virtual machine or each clone can be acquired by each user, and the addition, or removal of the virtual machine or the clone, or the addition, change, or removal of the capacity of the virtual machine or the clone can be accurately determined. Since this system for providing virtual machines allows the operating time, the power-on date and time, and the power-off date and time of each virtual machine or each clone to be non-visible to the other users, the operating time, the power-on date and time, and the power-off date and time of each virtual machine or each clone are not acquired by the other users, and the use state of the virtual machines or the clones of each user can be kept in secret. Accordingly, the privacy of each user can be protected. In addition, since addition, or removal of the virtual machine or the clone that is made by the other users, or the addition, change, or removal of the capacity of the virtual machine or the clone can be prevented, the security of the virtual machines or the clones assigned to each user can be reliably secured.
A system for providing virtual machines according to the present invention will be described in detail as below with reference to the accompanying drawings such as
The system 10 for providing virtual machines illustrated in
The physical security router 11 and the physical firewall 12 are connected to each other through a global network. The physical firewall 12 and the physical server 13 are connected to each other through a private network. The 1st to n-th virtual firewalls 151 to 15n are respectively connected to the 1st to n-th virtual routers 141 to 14n through global networks 171 to 17n. In the system 10 illustrated in
Each user can use the virtual machines 161 to 16n provided by this system 10 through user servers 191 to 19n held by the user. Users can log in this system 10 from the Internet 20 by using the user servers 191 to 19n and set the virtual machines 161 to 16n used by the users. The users can provide various services through the Internet 20 and receive various services through the Internet 20 by using the virtual machines 161 to 16n.
The physical firewall 12, the physical server 13, and the user servers 191 to 19n are computers each being equipped with a central processing unit (CPU or MPU) and a storage device (memory), and large-capacity hard disks are built therein. The input device and the display 23 are mounted on the user servers 191 to 19n. Each one of the physical server 13 and the user servers 191 to 19n has various server functions such as a DNS server function for setting correspondence between a host name and an IP address assigned to the host name, a web server function that is necessary for publishing a home page, a database server function for receiving a request from another computer or another server and reading or writing various kinds of information, a mail server function for transmitting and receiving electronic mails, and a document server function for storing data of all the generated sentences and images and configuring such data to be searchable.
The physical server 13 and the user servers 191 to 19n are connectable to the Internet 20 and can access and log in the other servers (computers) of an unspecified large number by using the Internet 20. The physical server 13 and the user servers 191 to 19n can provide various kinds of information (various services) through the Internet 20 and can receive various kinds of information (various services) through the Internet 20.
Each one of the virtual machines 161 to 16n, similar to the physical server 13, is a computer equipped with a central processing unit (CPU or MPU), a storage device (memory), and a hard disk and has various server functions such as the DNS server function, the Web server function, the database server function, the mail server function, and the document server function. The virtual machines 161 to 16n are logical computers that are operated by independent operating systems (OS). The virtual machines 161 to 16n are connectable to the Internet 20 and can access and log in the other servers (computers) of an unspecified large number by using the Internet 20. Each one of the virtual machines 161 to 16n can provide various kinds of information (various services) through the Internet 20 and can receive various kinds of information (various services) through the Internet 20.
In this system 10, one or some of the virtual machines 161 to 16n are used as a management machine 21 (management virtual machine). An input device (not illustrated in the figure) such as a keyboard or a mouse and an output device such as a display 22 or a printer (not illustrated in the figure) are connected to the management machine 21 through an interface. Alternatively, instead of using the virtual machines 161 to 16n as the management machine 21, it may be configured such that a physical management server (management computer) that is physically present is connected to the physical firewall 12 through an interface, and the physical management server is used as the management machine 21. In accordance with the supervisor of this system 10, the management machine 21 monitors various means performed by the system 10 and monitors the virtual machines 161 to 16n provided for each user.
In the hard disks of the virtual machines 161 to 16n and the user servers 191 to 19n, user data such as a login ID, a password, a user number corresponding to the login ID and the password, a user name (a corporate name (including the name of its representative) or a personal name), a section or a department, a managerial position, an address (a corporate address, a personal address), a telephone number, a FAX number, and a mail address) is stored. In the management machine 21, management company data such as a login ID, a password, a management company number corresponding to the login ID and the password, a management corporate name (including the name of its representative), a corporate address, a telephone number, a FAX number, and a mail address is stored.
The physical security router 11 and the physical firewall 12 are connected to each other through a global network. The physical firewall 12 and the physical servers 131 to 13n are connected to each other through a private network. In the system 10 illustrated in
The physical security routers 111 to 11, and the physical firewalls 121 to 12n are respectively connected to each other through a global network. The physical firewalls 121 to 12n and the physical servers 131 to 13n are respectively connected to each other through a private network. In the system 10 illustrated in
The physical security routers 111 to 11n and the physical firewalls 121 to 12n are respectively connected to each other through a global network. The physical firewalls 121 to 12n and the physical servers 131 to 13n are respectively connected to each other through a private network. In the system 10 illustrated in
The system 10 (management server 21) for providing virtual machines operates an application that is stored in the memory under the control of the operating system (OS), thereby performing means described below in accordance with the application. In accordance with a user's request, the system 10 executes a virtual machine generating means that generates virtual machines 161 to 16n on the physical servers 13, 131 to 13n, executes a capacity setting means that sets the capacities of the generated virtual machines 161 to 16n for the virtual machines 161 to 16n, and executes a first virtual machine assigning means that assigns the generated virtual machines 161 to 16n to the users. The system 10 executes a first IP address setting means that generates predetermined IP addresses for the virtual machines 161 to 16n assigned by the first virtual machine assigning means and sets the generated IP addresses to the virtual machines 161 to 16n. The first virtual machine assigning means assigns the virtual machines 161 to 16n belonging to a machine group having a highest processing efficiency out of machine groups connected to the 1st to n-th virtual firewalls 151 to 15n to the users.
The system 10 for providing virtual machines executes a first capacity visualizing means that allows the capacities of the virtual machines 161 to 16n assigned by the first virtual machine assigning means to be individually visualized for respective users and allows the capacities to be non-visible to the other user. For the management company (data center), the capacities of the virtual machines 161 to 16n of all the users are displayed. The system 10 executes a first virtual machine removing means that removes unnecessary virtual machines 161 to 16n out of virtual machines 161 to 16n, which are assigned by the first virtual machine assigning means, in accordance with a user's request.
The system 10 for providing virtual machines executes a clone generating means that generates clones of the same virtual machines 161 to 16n as the virtual machines 161 to 16n that have already been generated in accordance with a request of the user and executes a second virtual machine assigning means that assigns the generated clones of the virtual machines 161 to 16n to the users. The system 10 executes a second IP address setting means that generates predetermined IP addresses for the clones of the virtual machines 161 to 16n assigned by the second virtual machine assigning means and individually sets the generated IP addresses to the clones of the virtual machines 161 to 16n. The clones of the virtual machines 161 to 16n are copies of the virtual machines 161 to 16n that are completely the same as the virtual machines 161 to 16n that have already been virtualized.
The second virtual machine assigning means assigns clones belong to the clone group having a highest processing efficiency from among the clone group connected to the 1st to n-th virtual firewalls 151 to 15n to the users.
The system 10 for providing virtual machines executes a second capacity visualizing means that allows the capacities of the clones of the virtual machines 161 to 16n assigned by the second virtual machine assigning means to be individually visualized to respective users and allows the capacities to be non-visible to the other users. For the management company (data center), the capacities of the clones of the virtual machine 161 to 16n of all the users are displayed. The system 10 executes a second virtual machine removing means that removes the clones of unnecessary virtual machines 161 to 16n out of the clones of the virtual machines 161 to 16n assigned by the second virtual machine assigning means in accordance with a user's request.
As the capacities of the virtual machines 161 to 16n (including the clones of the virtual machines 161 to 16n), there are the number of central processing units (CPUs or MPUs) used in each one of the virtual machines 161 to 16n, the memory size of each one of the virtual machines 161 to 16n, the number of hard disks used in each one of the virtual machines 161 to 16n, the hard disk capacity of each one of the virtual machines 161 to 16n, and the used operating system (OS). To allow the capacities to be individually visualized for each user and allow the capacities to be non-visible to the other users by the first capacity visualizing means and the second capacity visualizing means represents that the capacities of the virtual machines 161 to 16n and the clones provided for a specific user are allowed to be seen and acquired by the user, and the other users are not allowed to see or acquire the capacities of the virtual machines 161 to 16n and the clones.
The system 10 for providing virtual machines executes a global network setting means that sets the global networks 171 to 17n connecting the virtual routers 141 to 14n and the virtual firewalls 151 to 15n in accordance with a user's request and executes a private network setting means that sets the private networks 181 to 18n connecting the virtual firewalls 151 to 15n and the virtual machines 161 to 16n in accordance with a user's request. In addition, the private network setting means divides the virtual machines 161 to 16n connected to specific virtual firewalls 151 to 15n in accordance with a user's request into two or more groups and sets a plurality of the private networks 181 to 18n connecting the virtual firewall 151 to 15n and the groups. The system 10 executes a network visualizing means that allows the networks 171 to 17n and 181 to 18n of the virtual machines 161 to 16n (including the clones of the virtual machines 161 to 16n) set by each network setting means to be individually visualized to each user and allows the networks to be non-visible to the other users. For the management company (data center), the networks 171 to 17n and 181 to 18n of the virtual machines 161 to 16n of all the users are displayed.
The system 10 for providing virtual machines executes a global network changing means that adds, changes, or removes the global networks 171 to 17n connecting the virtual routers 141 to 14n and the virtual firewalls 151 to 15n in accordance with a user's request subsequently (after the initial setting of the global networks 171 to 17n) and executes a private network changing means that adds, changes, or removes the private networks 181 to 18n connecting the virtual firewalls 151 to 15n and the virtual machines 161 to 16n in accordance with a user's request subsequently (after the initial setting of the private networks 181 to 18n). The system 10 executes a network change visualizing means that allows the networks 171 to 17n and 181 to 18n of the virtual machines 161 to 16n (including the clones of the virtual machines 161 to 16n) changed by each network changing means to be individually visualized to each user and allows the networks to be non-visible to the other users. For the management company (data center), the networks 171 to 17n and 181 to 18n in which the virtual machines 161 to 16n of all the users changed are displayed. The system 10 executes a console function setting means that sets a console function to the virtual machines 161 to 16n in accordance with a user's request.
The system 10 for providing virtual machines executes a capacity changing means that changes the capacities of the virtual machines 161 to 16n (including the clones of the virtual machines 161 to 16n) subsequently (after the initial setting of the capacities) in accordance with a user's request and executes a capacity change visualizing means that allows the capacities of the virtual machines 161 to 16n (including the clones of the virtual machines 161 to 16n) that have been changed by the capacity changing means to be individually visualized for each user and allows the capacities to be non-visible to the other users. For the management company (data center), the capacities of the virtual machines 161 to 16n (including the clones of the virtual machines 161 to 16n), which have been changed, of all the users are displayed.
To allow the changed capacities to be individually visualized for each user and allow the capacities to be non-visible to the other users by the capacity change visualizing means represents that the changed capacities of the virtual machines 161 to 16n and the clones provided for a specific user are allowed to be seen and acquired by the user, and the other users are not allowed to see or acquire the changed capacities of the virtual machines 161 to 16n and the clones.
In the changing of the capacities of the virtual machines 161 to 16n and the clones, there are a case where the number of the central processing units of the virtual machines 161 to 16n or the clones is subsequently increased or decreased in accordance with a user's request, a case where the memory size of the virtual machines 161 to 16n or the clones is subsequently increased or decreased in accordance with a user's request, a case where the number of hard disks of the virtual machines 161 to 16n or the clones is subsequently increased or decreased in accordance with a user's request, a case where the capacity of hard disks of the virtual machines 161 to 16n or the clones is subsequently increased or decreased in accordance with a user's request, and a case where the used operating system is changed. The capacity change visualizing means allows the number of the central processing units that has been increased or decreased by the capacity changing means to be individually visualized for respective users and to be non-visible to the other users. In addition, the capacity change visualizing means allows the memory size that has been increased or decreased by the capacity changing means to be individually visualized for respective users and to be non-visible to the other users. Furthermore, the capacity change visualizing means allows the number of hard disks that has been increased or decreased by the capacity changing means to be individually visualized for respective users and to be non-visible to the other users and allows the hard disk capacity that has been increased or decreased by the capacity changing means to be individually visualized for respective users and to be non-visible to the other users. In addition, the capacity change visualizing means allows the operating system that has been changed by the capacity changing means to be individually visualized for respective users and to be non-visible to the other users.
The system 10 for providing virtual machines executes an operating status visualizing means that allows the operating statuses of the virtual machines 161 to 16n and the clones assigned to users to be individually visualized for respective users and to be non-visible to the other users. In addition, for the management company (data center), the operating statuses of the virtual machines 161 to 16n and the clones of all the users are displayed. To allow the operating statuses of the virtual machines 161 to 16n and the clones to be individually visualized for respective users and to be non-visible to the other users by the operating status visualizing means represents that the operating statuses of the virtual machines 161 to 16n and the clones that are provided for a specific user are allowed to be seen and acquired by the user, and the operating statuses of the virtual machines 161 to 16n and the clones are not allowed to be seen and acquired by the other users.
As the operating statuses of the virtual machines 161 to 16n and the clones, there are past or present memory use rates of the virtual machines 161 to 16n and the clones, and the operating status visualizing means allows the memory use rates to be individually visualized for respective users and to be non-visualized to the other users. In addition, the operating status visualizing means visualizes the memory use rates in time series. As the operating statuses of the virtual machines 161 to 16n and the clones, there are the past or present use rates of the central processing units (CPUs or MPUs) of the virtual machines 161 to 16n and the clones, and the operating status visualizing means allows the use rates of the central processing units to be individually visualized for respect users and to be non-visible to the other users. In addition, the operating status visualizing means visualizes the use rates of the central processing units in time series.
As the operating statuses of the virtual machines 161 to 16n and the clones, there are past or present private network use rates of the virtual machines 161 to 16n and the clones, and the operating status visualizing means allows the private network use rates to be individually visualized for respective users and to be non-visualized to the other users. In addition, the operating status visualizing means visualizes the private network use rates in time series. As the operating statuses of the virtual machines 161 to 16n and the clones, there are operating times of each one of the virtual machines 161 to 16n and the clones, the latest power-on date and time of each one of the virtual machines 161 to 16n and the clones, and the latest power-off date and time of each one of the virtual machines 161 to 16n and the clones, and the operating status visualizing means allows the operating time, the power-on date and time, and the power-off date and time to be individually visualized for each user and to be non-visible to the other users.
In a case where a user desires to use the virtual machines 161 to 16n provided by this system 10, first, the user contacts the data center of a management company that manages the system 10. The user notifies a person in charge of user information such as the user name, the representative name, the telephone number, the FAX number, the zip code, the address, and the mail address. The person in charge of the contacted data center inquires the user of the number of global networks 171 to 17n and the number of private networks 181 to 18n desired to be used and performs new user registration for the management machine 21.
When the system 10 is operated by clicking on the icon of the system 10 for providing virtual machines that is displayed on the display of the management server 21, the login screen illustrated in
When the login button 5c is clicked on, an initial screen represented in
On the new user registration screen illustrated in
When the management company (the person in charge) inputs data (information) that is necessary to each input area of the new user registration screen illustrated in
Next, the management company clicks on the registered user information list button 6b on the initial screen illustrated in
In a case where the registered user information is added, changed, or removed (altered), the management company inverts a user name that is a target for changing the user information out of the user names displayed in the user name display area 8b of the registered user information list screen illustrated in
On the network information setting screen illustrated in
In addition, private networks 181 to 18n of which the number is desired by the user are set. More specifically, a private network address is input (a private network address is selected from a pull-down list of a private network input area 9d) to the private network address input area 9d included in the private network input area, and a private network ID is input (a private network ID is selected from a pull-down list of a private network input area 9e) to the private network ID input area 9e included in the private network input area.
When the execution button 9f is clicked after the address and the ID are input to the respective input areas, the management machine 21, although not illustrated in the figure, displays a network setting checking screen on the display 22. On the network setting checking screen, a user name that is a target for setting the network, a global network display area in which the global networks 171 to 17n are displayed, a private network display area in which the private networks 181 to 18n are displayed, a setting confirmation button, and a cancel button are displayed. When the cancel button is clicked, the screen is returned to the registered user information list screen illustrated in
The system 10, as illustrated in
On the virtual machine setting screen illustrated in
The management company checks the user name and the user No. that are displayed respectively in the user name display area 10a and the user number display area 10b and then sets virtual machines 161 to 16n of which the number is desired by the user. More specifically, the management company inputs one, two, or more virtual machines to the machine name input area 10c (selects a virtual machine name from a pull-down list of the machine name input area 10c), inputs the numbers of CPUs of the virtual machines 161 to 16n to the CPU number input area 10d (selects the numbers of CPUs from a pull-down list of the CPU number input area 10d), and inputs the memory sizes of the virtual machines 161 to 16n to the memory size input area 10e (selects memory sizes from a pull-down list of the memory size input area 10e). In addition, the management company inputs the number of disks of the virtual machines 161 to 16n to the disk number input area 10f (selects the number of disks from a pull-down list of the disk number input area 10f), inputs disk capacities of the virtual machines 161 to 16n to the disk capacity input area 10g (selects a disk capacity from a pull-down list of the disk capacity input area 10g), and inputs OS templates used in the virtual machines 161 to 16n to the OS template input area 10h (selects an OS template from a pull-down list of the OS template input area 10h).
When data necessary to each input area is input and the execution button 10k is clicked on the virtual machine setting screen illustrated in
When the setting of the virtual machines 161 to 16n is completed, as illustrated in
The management machine 21 stores the user identifier and the machine name, the number of CPUs, the memory size, the number of disks, the disk capacity, the OS template, and the IP address, which have been input, in the hard disk in the state being associated with one another. When those are stored, the management machine 21 displays the registered user information list screen illustrated in
Since the system 10 for providing virtual machines can freely assign the virtual machines 161 to 16n in accordance with the use form, the use frequency, the use method, and the like of a user using the virtual machines 161 to 16n, virtual machines 161 to 16n that are not necessary to the user are not assigned, and the virtual machines 161 to 16n can be effectively used without any waste in an optimal environment by users. In addition, since the system 10 can set mutually-different capacities to the virtual machines 161 to 16n, virtual machines 161 to 16n having different capacities can be freely assigned in accordance with the use form, the use frequency, the use method, and the like of each user using respective virtual machines 161 to 16n, virtual machines 161 to 16n each having performance that is not necessary to the user or virtual machines 161 to 16n each having insufficient performance are not assigned, and the virtual machines 161 to 16n having optimal capacities can be used by the users.
On the virtual machine list screen illustrated in
In a case where the set virtual machines 161 to 16n (the clones of the virtual machines 161 to 16n) are to be removed, the management company inverts one, two, or more virtual machine names to be removed out of the virtual machine names displayed in a virtual machine name display area 11d of the virtual machine list screen illustrated in
The system 10 for providing virtual machines can freely remove the virtual machines 161 to 16n and the clones, which become unnecessary, out of the virtual machines 161 to 16n and the clones of the virtual machines 161 to 16n that have been assigned, and accordingly, the waste of the virtual machines 161 to 16n and the clones can be omitted with the use form, the use frequency, the use method, and the like of the virtual machines 161 to 16n and the clones being considered. Therefore, the virtual machines 161 to 16n and the clones can be effectively used without any waste in the optimal environment.
On the virtual machine capacity change screen illustrated in
In a case where the set capacities of the virtual machines 161 to 16n and the clones are to be changed, the management company checks the user name or the user No. and the virtual machine name on the virtual machine capacity change screen illustrated in
In a case where the number of disks is to be increased, the number of additional disks is designated in the disk number increase input area 12i (the number of additional disks is selected from a pull-down list of the disk number increase input area 12i), and the disk capacity of each disk added to the disk capacity input area 12j is input (a disk capacity is selected from a pull-down list of the disk capacity input area 12j). On the other hand, in a case where a disk is to be removed, the disk to be removed is designated in the disk removal area 12k (the disk to be removed is selected from a pull-down list of the disk removal area 12k).
After those capacities are changed, the change execution button 12l is clicked. When the change execution button 12l is clicked, the management machine 21, although not illustrated in the figure, displays a change confirmation screen on the display 22. On the change confirmation screen, a virtual machine name display area in which a machine name (in a case where the machine name is changed, the machine name) that is the change target is displayed, a capacity display area in which the number of CPUs after the change, the memory size, the number of disks, the disk capacities, and the OS template are displayed, a change confirmation button, and a cancel button are displayed. When the cancel button is clicked, the screen is returned to the virtual machine list screen illustrated in
On the clone generation screen illustrated in
In a case where the clones of the set virtual machines 161 to 16n are to be generated, the management company checks the user name, the user No., the virtual machine name, the number of CPUs, the memory size, the number of disks, the disk capacity, the OS template, the global network address, and the private network on the clone generation screen illustrated in
When the clone execution button 13l is clicked, the management machine 21, although not illustrated in the figure, displays a clone confirmation screen on the display 22. On the clone confirmation screen, a virtual machine name display area in which the virtual machine name of the clone source is displayed, a capacity display area in which the number of CPUs of a clone, a memory size, a disk capacity, and an OS template are displayed, a clone confirmation button, and a cancel button are displayed. When the cancel button is clicked, the screen is returned to the virtual machine list screen illustrated in
When the clone confirmation button is clicked, the management machine 21 generates the clones of the virtual machines 161 to 16n on the physical servers 13, 131 to 13n (clone generating means) and assigns the generated clones of the virtual machines 161 to 16n to the user (second virtual machine assigning means). The management machine 21 generates a predetermined IP address for each one of the clones of the virtual machines 161 to 16n assigned by the second virtual machine assigning means and sets the generated IP addresses to the virtual machines 161 to 16n (second IP address setting means).
When the clones are generated on the physical servers 13, 131 to 13n, as illustrated in
The management machine 21 stores the user identifier, the virtual machine name of the clone source, and the virtual machine name of the clone (for example, a machine name+clone 1, a machine name+clone 2, or the like) in the hard disk in the state being associated with one another and stores the user identifier and the number of CPUs, the memory size, the number of disks, the disk capacity, the OS template, and the IP address of the clone in the hard disk in the state being associated with each other. In addition, the management machine stores the user identifier and the global network address in the hard disk in the state being associated with each other (global network setting means) and stores the private network address (including the network ID) in the hard disk in the state being associated with the user identifier (private network setting means). When those are stored, the management machine 21 displays the virtual machine list screen illustrated in
The system 10 for providing virtual machines can generate clones that are the same as the virtual machines 161 to 16n that have been already present, and, by freely copying (replicating) the virtual machines 161 to 16n having the same functions, a plurality of virtual machines 161 to 16n (clones) having the same functions can be generated in a speedy manner. By generating a plurality of virtual machines 161 to 16n (clones) having the same functions in accordance with a user's request, the system 10 for providing virtual machines can respond to the needs of the virtual machines 161 to 16n according to the use form, the use frequency, the use method, and the like of the virtual machines 161 to 16n of the user in a speedy manner.
Next, in a case where a console function is set to the use form of virtual machines assigned to the user, the management company inverts a virtual machine name to which the console function is set out of the virtual machine names displayed in the virtual machine name display area 11d of the virtual machine list screen illustrated in
On the network list screen illustrated in
On the network detail screen illustrated in
On the network addition screen illustrated in
In addition, the user sets private networks 181 to 18n of which the number is desired by the user. More specifically, a private network address is input to the private network address input area 16d included in the private network input area (a private network address is selected from a pull-down list of the private network input area 16d), and a private network ID is input to the private network ID input area 16e included in the private network input area (a private network ID is selected from a pull-down list of the private network input area 16e).
After the address and the ID are input to the respective input areas, the management company clicks on the addition button 16f. When the addition button 16f is clicked, the management machine 21, although not illustrated in the figure, displays an addition confirmation screen on the display 22. On the addition confirmation screen, a user name display area in which a user name is displayed, a global network address display area in which a global network address is displayed, a private network address display area in which a private network address is displayed, an addition confirmation button, and a cancel button are displayed.
When the addition confirmation button is clicked, the management machine 21 stores the user identifier and the added global network address in the hard disk in the state being associated with each other (global network changing means) and stores the user identifier and the added private network address and the private network ID in the hard disk in the state being associated with each other (private network changing means). When those are stored, the management machine 21 displays a network list screen illustrated in
On the network change screen illustrated in
In addition, the private networks 181 to 18n that are the change targets are changed. More specifically, a private network address of the change target displayed in the private network address display area out of the private network address display areas 17d is changed, and a private network ID of the change target displayed in the private network ID display area 17e out of the private network display areas is changed.
After the network address and the network ID of the change target are changed, the change button 17f is clicked. When the change button 17f is clicked, the management machine 21, although not illustrated in the figure, displays a change confirmation screen on the display 22. On the change confirmation screen, a user name display area in which a user name is displayed, a global network address display area in which a changed global network address is displayed, a private network address display area in which a changed private network address is displayed, a private network ID display area in which a changed private network ID is displayed, a change confirmation button, and a cancel button are displayed.
When the change confirmation button is clicked, the management machine 21 stores the user identifier and the changed global network address in the hard disk in the state being associated with each other (global network changing means) and stores the user identifier, the changed private network address, and the private network ID in the hard disk in the state being associated with one another (private network changing means). In addition, the global network address, the private network address, and the private network ID before the change are removed from the hard disk. When the network address and the network ID after the change are stored, the management machine 21 displays the network list screen illustrated in
On the network removal screen illustrated in
After the network address and the network ID of the removal target are changed, the removal button 18f is clicked. When the removal button 18f is clicked, the management machine 21, although not illustrated in the figure, displays a removal confirmation screen on the display 22. On the removal confirmation screen, a user name display area in which a user name is displayed, a global network address display area in which a global network address of the removal target is displayed, a private network address display area in which a private network address of the removal target is displayed, a private network ID display area in which a private network ID of the removal target is displayed, a removal confirmation button, and a cancel button are displayed.
When the removal confirmation button is clicked, the management machine 21 eliminates the global network address, the private network address, and the private network ID of the removal target from the hard disk (a global network changing means and a private network changing means). When the network address and the network ID are removed, the management machine 21 displays the network list screen illustrated in
On the event log display screen illustrated in
As the event names displayed in the event name display area 19d, there are a new virtual machine, virtual machine cloning, removal of a virtual machine, removal of a virtual machine clone, a change in the virtual machine name, an increase/decrease in the number of CPUs, an increase/decrease in the memory size, an increase/decrease in the number of disks, an increase/decrease in the disk capacity, removal of a disk, addition of a global network address, a change in a global network address, removal of a global network address, addition of a private network address, a change in a private network address, removal of a private network address, power on, and power off. As remarks displayed in the remark display area, there are a virtual machine name of a clone source, a virtual machine name before change, and an increased/decreased content.
On the event log display screen for each user that is illustrated in
On the operating status display screen illustrated in
In the state display area 21d, the states of the virtual machines 161 to 16n are displayed. Here, “◯” displayed in the state display area 21d represents a good state, “Δ” displayed in the state display area 21d represents an attentive state, and “X” displayed in the state display area 21d represents a defective state. Alternatively, similar to the traffic light, it may be configured such that a blue display is used in a case where the state is good, a yellow display is used in a case where the state is attentive, and a red display is used in a case where the state is defective. In the memory use status display area 21e, the current memory use rates of the virtual machines 161 to 16n are displayed, and, in the CPU use status display area 21f, the current CPU use rates of the virtual machines 161 to 16n are displayed. In the latest power-on date and time display area 21h, the latest date and time of power-on in each one of the virtual machines 161 to 16n is displayed, and, in the latest power-off date and time display area 21i, the latest date and time of power-off in each one of the virtual machines 161 to 16n is displayed.
On the operating status display screen for each machine that is displayed in
When the print button 22p is clicked, the operating status that is displayed on the operating status display screen is printed through the printer. When the close button 22q is clicked, the screen is returned to the operating status display screen illustrated in
On the memory use rate time-series display screen that is illustrated in
On the CPU use rate time-series display screen that is illustrated in
On the private network use rate time-series display screen that is illustrated in
The user inputs a user ID to the user ID input area 26a, inputs a password to the password input area 26b, and then clicks on the login button 26c. When the login button 26c is clicked, the user initial screen illustrated in
When the user clicks on the virtual machine list button 27c, on the displays 23 of the user servers 191 to 19n, the user virtual machine list screen illustrated in
On the user virtual machine list screen illustrated in
In order to allow the assigned virtual machines 161 to 16n to be used by the user, the user inverts a virtual machine name (or a plurality of virtual machines) to be used out of virtual machine names displayed in the user virtual machine list screen illustrated in.
In order for the user to set new virtual machines 161 to 16n, the user clicks on the virtual machine newly-setting button 28l on the user virtual machine list screen illustrated in
When the execution button is clicked, the system 10 (management server 21) generates the virtual machines 161 to 16n on the physical servers 13, 131 to 13n (virtual machine generating means), sets the capacities of the generated virtual machines 161 to 16n respectively for the virtual machines 161 to 16n (capacity setting means), and assigns the generated virtual machines 161 to 16n to the user (first virtual machine assigning means). The management machine 21 generates predetermined IP addresses respectively for the virtual machines 161 to 16n assigned by the first virtual machine assigning means and sets the generated IP addresses respectively to the virtual machines 161 to 16n (first IP address setting means). The system 10 stores the user identifier and the machine name, the number of CPUs, the memory size, the number of disks, the disk capacity, the OS template, and the IP address, which have been input, in the hard disk of the management server 21 in the state being associated with one another. On the displays 23 of the user servers 191 to 19n, the user virtual machine list screen illustrated in
In order for the user to remove one or more virtual machines 161 to 16n, the user inverts a virtual machine name (or a plurality of virtual machine names) to be removed out of virtual machine names displayed in the virtual machine name display area 28c of the user virtual machine list screen illustrated in
In order for the user to change the capacities of the virtual machines 161 to 16n (including the clones of the virtual machines 161 to 16n), the user inverts virtual machine names of which the capacities are to be changed out of virtual machine names displayed in the virtual machine name display area 28c of the user virtual machine list screen illustrated in
When the change execution button is clicked, although not illustrated in the figure, a change confirmation screen is displayed on the displays 23 of the user servers 191 to 19n. On the change confirmation screen, a virtual machine name display area in which a virtual machine name (in a case where the machine name is changed, the changed machine name) of the change target is displayed, a capacity display area in which the number of CPUs, the memory size, the disk capacity, and the OS template after the change are displayed, a change confirmation button, and a cancel button are displayed. When the change confirmation button is clicked, the system (management server 21) stores the user identifier, the changed machine name, the increased/decreased number of CPUs, the increased/decreased memory size, the increased/decreased disk capacity, and the changed OS template in the hard disk of the management server 21 in the state being associated with one another (capacity changing means). On the displays 23 of the user servers 191 to 19n, the user virtual machine list screen illustrated in
In order for the user to generate clones (copies) of virtual machines 161 to 16n that are the same as the virtual machines 161 to 16n, the user inverts a virtual machine name for which the clone is to be generated out of virtual machine names displayed in the virtual machine name display area 28c of the user virtual machine list screen illustrated in
When the clone execution button is clicked, although not illustrated in the figure, a clone confirmation screen is displayed on the displays 23 of the user servers 191 to 19n. On the clone confirmation screen, a virtual machine name display area in which a virtual machine name of the clone source is displayed, a capacity display area in which the number of CPUs of the clone, the memory size, the disk capacity, and the OS template are displayed, a clone confirmation button, and a cancel button are displayed.
When the clone confirmation button is clicked, the system 10 (the management machine 21) generates the clones of the virtual machines 161 to 16n on the physical servers (clone generating means) and assigns the generated clones of the virtual machines 161 to 16n to the user (second virtual machine assigning means). The management machine 21 generates a predetermined IP address for each one of the clones of the virtual machines 161 to 16n assigned by the second virtual machine assigning means and sets the generated IP addresses to the virtual machines 161 to 16n (second IP address setting means).
The management machine 21 stores the user identifier, the virtual machine name of the clone source, and the virtual machine name of the clone (for example, a machine name+clone 1, a machine name+clone 2, or the like) in the hard disk in the state being associated with one another and stores the user identifier and the number of CPUs, the memory size, the number of disks, the disk capacity, the OS template, the global network address, the private network address, and the IP address of the clone in the hard disk in the state being associated with each other. On the displays 23 of the user servers 191 to 19n, the user virtual machine list screen illustrated in
Next, in a case where a console function is set to the virtual machine 161 to 16n and the clones that have been assigned, the user inverts a virtual machine name to which the console function is to be set out of the virtual machine names displayed in the virtual machine name display area 28c of the user virtual machine list screen illustrated in
On the user network detail screen illustrated in
On the event log display screen for each user that is illustrated in
On the user operating status display screen illustrated in
In the state display area 31d, the states of the virtual machines 161 to 16n are displayed. Here, “◯” displayed in the state display area 31d represents a good state, “Δ” displayed in the state display area 31d represents an attentive state, and “X” displayed in the state display area 31d represents a defective state. Alternatively, similar to the traffic light, it may be configured such that a blue display is used in a case where the state is good, a yellow display is used in a case where the state is attentive, and a red display is used in a case where the state is defective. In the memory use status display area 31e, the current memory use rates of the virtual machines 161 to 16n are displayed, and, in the CPU use status display area 31f, the current CPU use rates of the virtual machines 161 to 16, are displayed. In the latest power-on date and time display area 31h, the latest date and time of power-on in each one of the virtual machines 161 to 16n is displayed, and, in the latest power-off date and time display area 31i, the latest date and time of power-off in each one of the virtual machines 161 to 16n is displayed.
In a case where the operating status for each machine of the virtual machines 161 to 16n is to be displayed, the user inverts a machine name of the operating status display target out of machine names displayed in the virtual machine name display area 31c of the user operating status display screen illustrated in
On the operating status display screen for each machine, a user name display area in which a user name is displayed, a user number display area in which a user No. is displayed, a virtual machine name display area in which a virtual machine name is displayed, a state display area in which a machine state is displayed, a memory use status display area in which a memory use status is displayed, a CPU use status display area in which a CPU use status is displayed, an operating time display area in which an operating time of a virtual machine is displayed, a private network use rate display area in which a private network use rate is displayed, a display date and time display area in which display date and time is displayed, and a redisplay button are displayed. In addition, a memory size display area in which a memory size is displayed, a CPU number display area in which the number of CPUs is displayed, a disk number display area in which the number of disks is displayed, a disk capacity display area in which a disk capacity is displayed, a print button, and a close button are displayed (refer to
In a case where the memory use rate for each machine of the virtual machines 161 to 16n is to be displayed in a time series, the user inverts a machine name of the memory use rate display target out of machine names displayed in the virtual machine name display area 31c of the user operating status display screen illustrated in
In a case where the CPU use rate for each machine of the virtual machines 161 to 16n is to be displayed in a time series, the user inverts a machine name of the CPU use rate display target out of machine names displayed in the virtual machine name display area 31c of the user operating status display screen illustrated in
In a case where the private network use rate is to be displayed in a time series, the user inverts a private network address (or a machine name) of the private network use rate display target out of private network addresses (or machine names) displayed in the private network address name display area 31g (or the virtual machine name display area 31c) of the user operating status display screen illustrated in
On the private network use rate time-series display screen, a user name display area in which a user name is displayed, a user number display area in which a user No. is displayed, a private network address display area in which a private network address is displayed, and a private network use rate graph representing the private network use rate of the private network in a time series are displayed, and a print button and a close button are displayed. By checking the private network use rate time-series display screen, the user can acquire the private network use rates of the past to the present for the virtual machines 161 to 16n in time series.
According to the system 10 for providing virtual machines, the memory use rates of the virtual machines 161 to 16n are individually displayed for each user, and accordingly, each user can acquire the memory use rates of the virtual machines 161 to 161, thereby accurately determining the maintenance of the memories of the virtual machines 161 to 16n and an increase/decrease in the memories. In addition, according to the system 10, since the memory use rates of the virtual machines 161 to 16n are configured not to be visible to the other users, the memory use rates of the virtual machines 161 to 16n are not acquired by the other users, and the memory use status of each user can be kept in secret, and thereby the other users are prevented from arbitrarily increasing/decreasing the memories of the virtual machines 161 to 16n.
According to the system 10 for providing virtual machines, the CPU use rates of the virtual machines 161 to 16n are individually displayed for each user, and accordingly, each user can acquire the CPU use rates of the virtual machines 161 to 16n, thereby accurately determining the maintenance of the number of CPUs of the virtual machines 161 to 16n and an increase/decrease in the number of CPUs. In addition, according to the system 10, since the CPU use rates of the virtual machines 161 to 16n are configured not to be visible to the other users, the CPU use rates of the virtual machines 161 to 16n are not acquired by the other users, and the CPU use status of each user can be kept in secret, and thereby the other users are prevented from arbitrarily increasing/decreasing the number of CPUs of the virtual machines 161 to 16n.
According to the system 10 for providing virtual machines, the private network use rates of the virtual machines 161 to 16n are individually displayed for each user, and accordingly, each user can acquire the private network use rates of the virtual machines 161 to 16n, thereby accurately determining the maintenance of the private networks of the virtual machines 161 to 16n and the addition or removal of the private networks. In addition, according to the system 10, since the private network use rates of the virtual machines 161 to 16n are configured not to be visible to the other users, the private network use rates of the virtual machines 161 to 16n are not acquired by the other users, and the private network use status of each user can be kept in secret, and thereby the other users are prevented from arbitrarily adding/removing the private network.
According to the system 10 for providing virtual machines, the operating time and the on/off date and time of each one of the virtual machines 161 to 16n are individually displayed for each user, and accordingly, each user can acquire the operating time and the on/off date and time of each one of the virtual machines 161 to 16n, thereby accurately determining the addition/removal of the virtual machines 161 to 16n or the addition, change, or removal of the capacities of the virtual machines 161 to 16n. In addition, according to the system 10, since the operating time and the on/off date and time of each one of the virtual machines 161 to 16n are configured not to be visible to the other users, the operating time and the on/off date and time of each one of the virtual machines 161 to 16n are not acquired by the other users, and the use status of the virtual machines 161 to 16n in each user can be kept in secret, and thereby the other users are prevented from arbitrarily adding/removing the virtual machines 161 to 16n or adding, changing, or removing the capacities of the virtual machines 161 to 16n.
Number | Date | Country | Kind |
---|---|---|---|
2011-115911 | May 2011 | JP | national |
Filing Document | Filing Date | Country | Kind | 371c Date |
---|---|---|---|---|
PCT/JP2012/062888 | 5/21/2012 | WO | 00 | 4/10/2014 |