Login| Sign Up| Help| Contact|

Patent Searching and Data


Title:
A TECHNIQUE FOR OPERATING A SYSTEM CONTROLLER OF A VIRTUALIZED APPLICATION CLUSTER
Document Type and Number:
WIPO Patent Application WO/2015/117669
Kind Code:
A1
Abstract:
A technique for operating a system controller of a virtualized application cluster is presented. The cluster comprises one or multiple virtual machines. In a method embodiment the system controller receives, from outside the cluster, control information defining a function associated with a virtual machine. It further receives, from the virtual machine, a request message including an identifier of the virtual machine. The method also comprises determining, based on the identifier included in the request message, the function associated with the virtual machine and booting information associated with the function. The booting information is then sent in a response message to the virtual machine.

Inventors:
QUINET RAPHAEL (BE)
MARTÍNEZ PERALLÓN ROSA MARÍA (DE)
WOERNDLE PETER (DE)
Application Number:
PCT/EP2014/052466
Publication Date:
August 13, 2015
Filing Date:
February 07, 2014
Export Citation:
Click for automatic bibliography generation   Help
Assignee:
ERICSSON TELEFON AB L M (SE)
International Classes:
G06F9/44; G06F9/455; G06F9/50
Foreign References:
US20080089338A12008-04-17
US20130346576A12013-12-26
Other References:
None
Attorney, Agent or Firm:
RÖTHINGER, Rainer (München, DE)
Download PDF:
Claims:
Claims

A method of operating a system controller (40) of a virtualized application cluster (20), the cluster comprising at least one virtual machine (50), the method comprising:

receiving (306), from outside the cluster (30), control information defining a function associated with a virtual machine;

receiving (308), from the virtual machine, a request message including an identifier of the virtual machine;

determining (310), based on the identifier included in the request message, the function associated with the virtual machine;

determining (312) booting information associated with the function; and

sending (314) a response message comprising the booting information to the virtual machine.

The method of claim 1, wherein

the control information defines a mapping between the identifier of the virtual machine and the function associated with the virtual machine.

The method of claim 1 or 2, wherein

the control information is received prior to the request message.

The method of claim 1 or 2, further comprising

sending, towards outside the cluster, the identifier included in the request message, wherein the control information is received responsive to the sending of the identifier.

The method of claim 4, wherein

the identifier is sent in response to determining that the identifier included in the response message is unknown or that no function can determined for the identifier.

The method of any of the preceding claims, wherein

the control information is received from a cluster manager (30) in charge of deploying the system controller and the at least one virtual machine. The method of any of the preceding claims, wherein

the control information is received from a managing entity (70) functionally located between the system controller and a cluster manager (80) in charge of deploying the system controller and the virtual machine, wherein the managing entity is configured to generate the control information based on an observation of the cluster manager.

The method of any of the preceding claims, further comprising maintaining a mapping between one or more identifiers and one or more functions.

The method of any of the preceding claims, further comprising maintaining a mapping between different functions associated with virtual machines and different items of booting information.

The method of any of the preceding claims, wherein

the booting information defines at least one of an address of a boot server configured to provide one or more boot files to the virtual machine and a file path to the one or more boot files.

The method of claim 10, wherein

the system controller is configured as the boot server.

The method of claim 10 or 11, wherein

the one or more boot files define a configuration of the virtual machine in terms of at least one of memory resources and processing resources allocated to the virtual machine.

The method of any of the preceding claims, wherein

the system controller is a virtual machine within the cluster.

The method of any of the preceding claims, wherein

the identifier is a Layer 2 address of the virtual machine.

The method of any of the preceding claims, wherein

at least one of the request message and the response message is compliant with the Dynamic Host Configuration Protocol, DHCP.

16. A method of operating a managing component (30) of a virtualized application cluster (20), the cluster comprising a system controller (40) and at least one virtual machine (50), the method comprising:

sending, to the system controller, control information defining a function associated with the virtual machine.

17. The method of claim 16, wherein

the method is performed by a cluster manager (30) in charge of deploying the system controller and the at least one virtual machine.

18. The method of claim 17, further comprising

deploying, by the cluster manager, the at least one virtual machine; and

programming, at deployment time, the at least one virtual machine to comprise the identifier assigned thereto.

19. The method of claim 16, wherein

the method is performed by a managing entity (70) functionally located between the system controller and a cluster manager (80) in charge of deploying the system controller and the at least one virtual machine, wherein the managing entity is configured to generate the control information based on an observation of the cluster manager. 20. The method of any of claims 16 to 19, further comprising

reading, by the cluster manager, a descriptor of the virtualized application cluster; and

deploying the at least one virtual machine in accordance with deployment information comprised in the descriptor.

21. The method of claim 20, wherein

the descriptor defines the function associated with the virtual machine.

22. The method of any of claims 16 to 21, wherein

the control information defines a mapping between an identifier of the virtual machine and the function associated with the virtual machine. The method of any of claims 16 to 22, further comprising

receiving, from the system controller, an identity of the virtual machine, wherein the control information is sent responsive to the receipt of the identifier.

A computer program product comprising program code portions for performing the steps of any of claims 1 to 23 when the computer program product is executed on a computing device.

The computer program product of claim 24, stored on a computer readable recording medium.

A system controller (40) of a virtualized application cluster (20), the cluster comprising at least one virtual machine (50), the system controller comprising:

a first interface (42) configured to receive, from outside the cluster (30), control information defining a function associated a virtual machine; a second interface (46) configured to receive, from the virtual machine, a request message including an identifier of the virtual machine;

a processor (44) configured to determine, based on the identifier included in the request message, the function associated with the virtual machine and further configured to determine booting information associated with the function; and

a third interface (46) configured to send a response message

comprising the booting information to the virtual machine.

A managing component (30) of a virtualized application cluster (20), the cluster comprising a system controller (40) and at least one virtual machine (50), the managing component comprising:

an interface (34) configured to send, to the system controller, control information defining a function associated with the virtual machine.

A virtualized computing system (10) comprising the system controller of claim 26 and the managing component of claim 27.

Description:
A TECHNIQUE FOR OPERATING A SYSTEM CONTROLLER OF A

VIRTUALIZED APPLICATION CLUSTER

Technical Field

The present disclosure generally relates to virtualized application clusters. In particular, a technique for managing deployment of a virtualized application cluster is described. The technique can be implemented as a method, a software solution, a hardware solution, or a combination thereof.

Background

In computing, booting is the initial set of operations a computer system performs after its start. When a computer system boots via a network connection, the

Dynamic Host Configuration Protocol (DHCP) is often used to gather an Internet Protocol (IP) address by the booting computer system. To this end, the computer system sends an initial DHCP request and queries another computer system, the DHCP server, for an IP address. When the DHCP server has a valid entry for the requesting computer system in its configuration database, it will send out a DHCP response with the IP address assigned to the requesting computer system.

The IP address provided by the DHCP server can be assigned randomly or based on a system identifier contained in the DHCP request. Often, a Media Access Control (MAC) address of the requesting computer system is used by the DHCP server to assign a specific IP address to it. To this end, a mapping between MAC addresses and IP addresses can be configured by an operator after the installation of the computer systems. The mapping can also be performed automatically. When, for example, the computer systems are part of a physical blade system with multiple blade servers, the MAC addresses of the blade servers can automatically be discovered or assigned according to their physical positions in a chassis or shelf.

In a virtualized environment, such as a virtualized application cluster with multiple virtual machines, the virtual "hardware" of the virtual machines cannot be based on physical parameters identifying the physical hardware (such as a position in a chassis). However, identifying parameters can be generated automatically at deployment time of the virtual machines. Each new virtual machine can be assigned a random MAC address when it is created. This also means that the MAC address cannot be entered in a configuration database of the DHCP server before the actual deployment of the virtual machine takes place.

In a virtualized environment, a DHCP server can therefore not easily recognize the MAC address or other DHCP options of its clients (i.e., the virtual machines). This fact makes it difficult to automate the deployment of new virtual machines in a virtual environment, even though virtual environments are suitable and actually intended to exploit automated procedures. This problem applies to both legacy application clusters that are ported to a cloud or virtualized environment, and to new application clusters that are designed to work in both virtualized and physical deployments.

A possible workaround for the initial deployment of a virtualized application cluster requires human intervention. After all virtual machines have been created, an administrator may edit the configuration database of a virtual DHCP server within the cluster and give it a list of MAC addresses that have been assigned to the virtual machines. However, this solution is not suitable for fully automated deployments. Also, it requires all virtual machines to be persistent, and it makes it difficult to increase the capacity of the cluster at a later point in time by adding new virtual machines to it because the required human intervention limits the opportunities for automatic scaling.

Summary

There is a need for a technique that permits an efficient deployment of virtual machines within a virtualized application cluster.

According to a first aspect, a method of operating a system controller of a virtualized application cluster which comprises at least one virtual machine is provided. The method comprises receiving, from outside the cluster, control information defining a function associated with a virtual machine and receiving, from the virtual machine, a request message including an identifier of the virtual machine. These two receiving steps can be performed in any order. The method further comprises determining, based on the identifier included in the request message, the function associated with the virtual machine and determining booting information associated with the function. Further, the method comprises sending a response message comprising the booting information to the virtual machine. The control information may be received from any software or hardware entity outside the virtualized application cluster. The entity outside the cluster may be the entity in charge of deploying the system controller and the at least one virtual machine, or may be co-located with the deploying entity.

The control information may define a mapping between the identifier of the virtual machine and the function associated with the virtual machine. As will be appreciated, the control information may comprise a single mapping for an individual virtual machine or a plurality of such mappings for a plurality of virtual machines

The control information may be received prior to the request message, after the request massage or substantially simultaneously therewith. In one variant, the control information is received prior to the request message. In another variant, the control information may be received responsive to sending the identifier included in the request message towards outside the cluster. Specifically, the identifier may be sent in response to determining that the identifier is unknown or that no function can be determined for the identifier. In the latter variant, a mapping between the identifier of the virtual machine and the function associated with the virtual machine may be established, or generated, by the system controller based on the input from outside the cluster on the one hand and from the virtual machine on the other hand.

The system controller may generally maintain (e.g., generate, update, etc.) a mapping between one or more identifiers and one or more functions. Furthermore, the system controller may maintain (e.g., generate, update, etc.) a mapping between different functions associated with virtual machines and different items of booting information. The mapping(s) may be maintained using a data structure such as a table.

It will be appreciated that the virtual machines within the cluster may have two or more different functions, and that two or more virtual machines within the cluster may have the same function. Therefore, multiple different identifiers could be mapped to the same function. A function may generally refer to a role of a virtual machine within the cluster.

The booting information may define various items of information required by the virtual machine for performing one or more operations after its initial deployment. The booting information may, for example enable the virtual machine to obtain the required software to assume its dedicated function within the cluster. As an example, the booting information may define an address of a boot server configured to provide one or more boot files to the virtual machine. Additionally, or as an alternative, the booting information may comprise a file path to the one or more boot files (e.g., on the boot server). In one realization, the system controller may also assume the role of the boot server. The boot server may generally be configured to provide the one or more boot files via one or more Trivial File Transfer Protocol (TFTP) messages.

In certain realizations, the one or more boot files may define a configuration of the virtual machine. Such a configuration may be defined in terms of at least one of memory resources and processing resources allocated to the virtual machine.

As stated above, the control information may be received from an entity outside the cluster. In a first example, the control information is received from a cluster manager in charge of deploying the system controller and the at least one virtual machine. In another realization, the control information is received from a managing entity functionally located between the system controller and the cluster manager. The managing entity may be configured to generate the control information based on an observation of the cluster manager. In the latter realization, the managing entity may be co-located with the cluster manager.

The system controller may itself be a component of the virtualized application cluster. As such, the system controller may be a virtual machine within the cluster that takes over central tasks for one or more other virtual machines within the cluster. These tasks may comprise one or more of DHCP services, boot services and TFTP services.

The identifier of the virtual machine may have any format. As an example, the identifier may take the form of a Layer 2 address of the virtual machine. The Layer 2 address may, for example, be the MAC address of the virtual machine. In another variant, the identifier may be different from the Layer 2 address of the virtual machine. In such a case, the request message received from the virtual machine may comprise the identifier of the virtual machine in addition to its Layer 2 address. Generally, the identifier of the virtual machine may at least locally be unique (e.g., within the virtualized application cluster of the virtual machine or within multiple virtualized application clusters deployed by the same entity). At least one of the request message received by the system controller and the response message sent by the system controller may be compliant with DHCP. As such, the system controller may provide DHCP services.

According to a further aspect a method of operating a managing component of a virtualized application cluster comprising a system controller and at least one virtual machine is provided. The method comprises sending control information to the system controller. The control information defines a function associated with the virtual machine.

The method may be performed by a cluster manager in charge of deploying the system controller and the at least one virtual machine. In such a case, the method may further comprise deploying the at least one virtual machine by the cluster manager and programming, at deployment time, the at least one virtual machine to comprise the identifier assigned thereto. The programming may be performed prior to the virtual machine sending the request message to the system controller. As an example, the cluster manager may program firmware of a (virtual) network card of the at least virtual machine to include the identifier assigned thereto.

In a further variant, the method is performed by a managing entity functionally located between the system controller and the cluster manager. In such a case the managing entity may be configured to observe the cluster manager and to generate the control information based on its observation. The cluster manager may be observed to acquire virtual machine identifiers of virtual machines managed by the cluster manager.

In one realization, the method further comprises reading by the managing component a descriptor of the virtualized application cluster. The cluster manager may have access to the descriptor via a file containing the descriptor or via suitable operator settings. The method may also comprise deploying the at least one virtual machine and, optionally, the system controller in accordance with information comprised in the descriptor.

In one example, the descriptor defines the function associated with the virtual machine. In such a case the managing component may read the function from the descriptor. The function may define booting information associated with the virtual machine. - -

The managing component may inform the system controller of a mapping between an identifier of the virtual machine and the function associated with the virtual machine. To this end an information message with the required control information may be sent from the managing component to the system controller.

In one variant, the method performed by the managing component comprises receiving from the system controller an identity of the virtual machine. The control information may then be sent responsive to receipt of the identifier from the system controller. In this context, the managing component may either locally consult a mapping between the identifier of the virtual machine and the function associated therewith so as to determine the function of the virtual machine that is to be sent as control information to the system controller. In another variant, the managing component sends the mapping between the identifier of the virtual machine and the function associated therewith as control information to the system controller. The system controller may thus locally consult the received mapping to determine whether the function associated with the virtual machine form which it has previously received a request message.

Also provided is a computer program product comprising program code portions for performing the steps of any methods and method aspects disclosed herein when the computer program product is executed on at least one computing device. It will be appreciated that the computer program product may also be executed in a distributed manner on multiple computer devices. The computer program product may be stored on a computer-readable recording medium, such as a semiconductor memory, DVD or CD-ROM. The computer program product may also be provided for download via a communications network.

Further provided is a system controller of a virtualized application cluster comprising at least one virtual machine. The system controller comprises a first interface configured to receive, from outside the cluster, control information defining a function associated with a virtual machine and a second interface configured to receive, from the virtual machine, a request message including an identifier of the virtual machine. The system controller further comprises a processor configured to determine, based on the identifier included in the request message, the function associated with the virtual machine and further configured to determine booting information associated with the function. Still further, the system controller comprises a third interface configured to send a response message comprising the booting information to the virtual machine. - -

Moreover, a managing component of a virtualized application cluster is provided, wherein the cluster comprises a system controller and at least one virtual machine. The managing component comprises an interface configured to send, to the system controller, control information defining a function associated with the virtual machine.

The system controller and the managing component may additionally be configured to perform any of the methods and method aspects presented herein. Those methods and method aspects may be performed by the associated processor

(optionally in combination with an associated interface).

The interfaces of the system controller and the managing component may be realized in the form of software, in the form of hardware, or as a software/hardware combination. Moreover, two or more of the interfaces of the system controller may be combined to a single interface as needed.

Also provided is a virtualized computing system comprising the system controller and the managing component presented herein. The virtualized application cluster may represent a network node of a telecommunications network. In such a realization, the virtual machines of the virtualized application cluster may run different network node applications.

Brief Description of the Drawings

Further aspects, details and advantages of the present disclosure will become apparent from the following description of exemplary embodiments in conjunction with the accompanying drawings, wherein:

Fig. 1 schematically shows components of a virtualized computing system according to an embodiment of the present disclosure;

Fig. 2 schematically shows block diagrams of embodiments of a managing

component and a system controller of the virtualized computing system of Fig.

1;

Fig. 3 is a flow diagram illustrating method embodiments for operating the managing component and the system controller of Fig. 2; Fig. 4 is a schematic diagram illustrating another embodiment of a virtualized computing system;

Fig. 5 is a schematic diagram of a first signaling embodiment;

Fig. 6 is a schematic diagram of a second signaling embodiment;

Fig. 7 is a schematic diagram showing a still further embodiment of a virtualized computing system according to the present disclosure.

Detailed Description

In the following description of exemplary embodiments, for purposes of explanation and not limitation, specific details are set forth, such as particular methods, functions and procedures, in order to provide a thorough understanding of the technique presented herein. It will apparent to one skilled in the art that this technique may be practiced in other embodiments that depart from these specific details. For example, while the following embodiments will primarily be described with respect to exemplary protocols (e.g., DHCP, TFTP, etc.) and particular identifier types (e.g., MAC addresses, etc.), it will be evident that the present disclosure can also be practiced using different protocols and different identifiers.

Moreover, those skilled in the art will appreciate that the methods, functions and procedures explained herein may be implemented using software functioning in conjunction with one or more programmed processors, an Application Specific Integrated Circuit (ASIC), a Digital Signal Processor (DSP) or general purpose computers. It will also be appreciated that while the following embodiments will primarily be described in the context of methods and virtual or physical devices, the present disclosure may also be embodied in a computer program product which can be loaded to run on a computer or a distributed computer system comprising one or more processors and one or more memories functioning as storage, wherein the one or more memories are configured to store one or more programs that realize the technique presented herein when the one or more programs are executed on one or more computers.

The following embodiments describe aspects in connection with the deployment of one or more virtual machines in a virtualized application cluster. The virtual machines typically assume dedicated functions, or roles, within the cluster. Those functions rely on dedicated software and/or hardware configurations that are defined in initial booting procedures. The booting procedures may involve request/response

messaging with a system controller, for example in an initial discovery phase to request IP or other network addresses by the virtual machines. In such requests, the virtual machines may signal their identifiers, such as their MAC addresses.

When booting a new virtual machine that is part of a clustered application, the system controller of that cluster may get requests from multiple virtual machines but it often does not know anything about the virtual machines issuing these requests (e.g., it sees unknown MAC addresses). As a result, the system controller cannot infer what kind of software should be installed on the virtual machines, and it cannot even be sure that a particular virtual machine should be part of the cluster at all, or if the request was received from a virtual machine that was not supposed to boot on a specific subnet (e.g., the one associated with the system controller).

This situation can cause problems because although all virtual machines may start booting in the same way, they may need to have different characteristics which require that each virtual machine gets exactly the function, or role, (and the corresponding software) that was allocated to it. Exemplary characteristics that can differ from one virtual machine to another include one or more of the amount of memory, the number of virtual Central Processing Unit (CPU) cores, the number of virtual network cards and the way they are connected to the virtual switches, and so on. If the system controller cannot assign the right function (and software) to the right virtual machine, then the cluster may fail to boot or fail to run correctly.

Some of the following embodiments are thus directed to deploying a virtualized application cluster in a cloud and letting a system controller of that cluster know about the function, or role, of each of the virtual machines. Booting of these virtual machines involves the system controller, which therefore has to know how to assign the appropriate booting information (e.g., in terms of an Operating System, OS, kernel and other software) to each virtual machine. As said, in a virtual environment, the MAC addresses of the virtual machines may not be known in advance by the system controller, so the system controller has to be enabled to recognize the virtual machines belonging to the cluster. Various approaches for gaining such knowledge will now be described in more detail. This knowledge can also be useful after an initial deployment of the cluster, when new virtual machines are added via automatic or manual scaling, or in general for all lifecycle management operations on virtual machines belonging to that cluster.

Fig. 1 illustrates an embodiment of a virtualized computing system 10. As shown in Fig. 1, the virtualized computing system 10 comprises a virtualized application cluster 20 and a managing component 30 outside the cluster 20. The cluster 20, in turn, comprises a system controller 40 and one or more virtual machines 50. The system controller 40 may be a dedicated virtual machine itself. The clustered application may realize one or more functions of a telecommunications node. Exemplary

telecommunications nodes in this regard include MSC-S BC, CSCF, MTAS, and so on.

The managing component 30 of the virtualized computing system 10 may take various forms. As an example, the managing component 30 may be a cluster manager. Since virtualized environments are sometimes also referred to as "clouds", the cluster manager is sometimes also referred to as cloud manager, or cloud orchestrator.

The managing component 30 is in one variant configured to deploy the cluster 20, and in particular the system controller 40 and the one or more virtual machines 50. It will be appreciated that the managing component 30 may be configured to deploy, and manage, multiple such clusters 20. Cluster deployment by the managing component 30 may be performed on the basis of control information received in the form of a file 60 or otherwise (e.g, via an operator setting). The managing

component 30 can be operated for the initial deployment of the cluster 20 with the virtual machines 50, or when an additional virtual machine 50 is added a later point in time to the cluster 20 (e.g., to provide elasticity or application scaling).

The managing component 30 can generally be realized in the form of a software entity that provides an abstraction layer above a virtualization layer comprising the virtualized application cluster 20. As such, external applications requesting services provided by the cluster 20 may only see the abstraction layer. The abstraction layer with the managing component 30 may manage accesses to the underlying physical infrastructure and physical resources.

The system controller 40 within the virtualized application cluster 20 can also be realized in the form of a software entity. The system controller 40 may be a dedicated virtual machine itself. As such, the system controller 40 may be located together with the virtual machine 50 in the virtualization layer. The virtual machines 50 may be realized in the form of software entities without disc space, which will be loaded only at run time. Since the virtual machines 50 at initial deployment will not have any software (e.g., an operating system) thereon, they rely on the system controller 40 for loading the required software and other configuration information at boot time depending on their function within the cluster 20.

The virtual machines 50 that form the virtualized application cluster 20 will then, upon booting from the system controller 40, be given dedicated network addresses (e.g., IP addresses) and various functions with the appropriate software and configuration information. Once the cluster 20 is ready (e.g., all virtual machines 50 have fully been booted), it will typically be visible to other systems as a single large system instead of a collection of individual virtual machines.

The virtual machines 50 are in one variant deployed using control information conforming to the Open Virtualization Format (OVF). OVF is an open standard defined by the Distributed Management Task Force (DMTF) and used for packaging and distributing virtual applications by way of OVF files (see reference numeral 60 in Fig. 1).

An OVF file is a descriptor file 60 in XML (Extensible Markup Language) format which describes the virtual hardware requirements and characteristics of the different virtual machines 50 forming the virtualized application cluster 20. As will be appreciated, there exist several other proposed standards and proprietary formats for descriptor files.

The descriptor file 60 is used as input for the managing component 30, such as a cloud manager. The descriptor file 60 is read by the cloud manager and controls the cloud manager when deploying the set of virtual machines 50 fulfilling the requested functions or services.

For the booting procedure, including the initial installation of software in the virtualized environment shown in Fig. 1, DHCP can be used, optionally, in

combination with TFTP or a similar protocol. TFTP is a simple protocol that allows a virtual machine 50 to obtain the files that it needs for booting. For the installation process, an at least locally unique identifier needs to be associated with each virtual machine 50. The unique identifier makes it possible for a DHCP server to recognize an individual virtual machine 50 (i.e., its function) in order to assign an IP address to - -

it and provide the right software and other configuration for that particular virtual machine 50.

Thus, DHCP may not only used to assign IP addresses but also to pass booting information (and other information about available services) to a requesting virtual machine 50 that needs to be booted. This information can include, but is not limited to, the addresses of routers, time servers, TFTP boot servers and file paths. Based on these parameters, the virtual machine 50 fetches all required data and software for the boot process and executes the boot process.

In the exemplary implementation of Fig. 1, the DHCP boot services and, optionally, the TFTP boot services, are provided by the system controller 40. It will be appreciated that those services could alternatively be provided by any other component inside or outside the virtualized application cluster 20.

The general boot process for the virtualized application cluster 20 in one or more of the embodiments described herein can be described with the example of a Preboot Execution Environment (PXE) boot process of a single virtual machine (VM) 50. In the following, it will be assumed that there is a running DHCP server in the same Layer 2 domain as the booting virtual machine 50:

1. VM 50 is deployed within the virtualized application cluster 20

2. VM 50 runs PXE boot program in firmware of a virtual network card

3. VM 50 sends out initial DHCP request message (with its identifier) to a broadcast address

4. VM 50 receives from the DHCP server a response message containing IP address, TFTP server address, and path to initial kernel (e.g., a linux kernel)

5. VM 50 sends TFTP get to a TFTP server for initial OS kernel (e.g., pxelinux.0)

6. VM 50 sends TFTP get to TFTP server for boot configuration (e.g., pxelinux.cfg/...) 7. VM 50 receives from TFTP server the initial kernel

8. VM 50 receives from TFTP server a configuration file

9. VM 50 executes the initial kernel

10. VM 50 sends TFTP get to TFTP server for modules and an initial

ramdisk (initrd)

11. VM 50 receives from TFTP server the initial ramdisk

12. VM 50 loads ramdisk and executes the content

13. VM 50 executes further boot scripts

It can be easily understood that the booting information (in particular the TFTP server address and the path to the initial OS kernel) contained in the DHCP response determines the initial software loaded by the virtual machine 50. Therefore, this DHCP messaging may in one implementation be used to define the function, or role, the virtual machine 50 should execute in the virtualized application cluster 20 after it is booted. Details thereof will be described below.

In order to be able to assign the appropriate IP address, software and other configuration to the virtual machines 50 belonging to the cluster 20, the system controller 40 must know the individual functions, or roles, that these machines 50 have in the cluster 20. This knowledge can be obtained in several ways, such as dynamically configuring the system controller 40 with the at least locally unique identifiers of the virtual machines 50 belonging to that cluster 20 and their corresponding functions.

Fig. 2 illustrates block diagrams of the managing component 30 and the system controller 40 of Fig. 1. The block diagrams will now be explained in more detail in conjunction with the flow diagram of Fig. 3. Fig. 3 illustrates methods of operating the managing component 30 and the system controller 40 of Fig. 1

As shown in Fig. 2, the managing component 30 comprises a processor 32 that is configured to determine a function assigned to one of the virtual machines 50 (step 302). The function is in the present embodiment determined from control

information read from the file 60 (see Fig. 1).

The processor 32 is further configured to determine an identifier of that virtual machine 50. The identifier may be determined by the managing component 30 autonomously (e.g., it may be assigned dynamically at deployment time) or based on control information read from the file 60. In one variant, the control information contained in the file 60 maps individual identifiers of virtual machines 50 to individual functions of those virtual machines 50 within the virtualized application cluster 20.

The managing component 30 further comprises an interface 34 configured to send an information message with control information to the system controller 40 (step 304). The control information comprises at least the function of a particular virtual machine 50. It will be appreciated that the control information may also comprise the identifier of the particular virtual machine 50 to which the function is assigned.

The system controller 40 comprises an interface 42 configured to receive the information message from the managing component 30 (i.e., from outside the cluster 20), see step 306. The system controller 40 comprises a further interface 44 configured to receive a request message from one of the virtual machines 50 (e.g., an initial DHCP request), see step 308. Steps 306 and 308 can be performed in any order.

A processor 44 of the system controller 40 is configured to determine, based on the identifier in the request message and the control information received from the managing component 30, the function associated with the virtual machine (step 310). The function may be derived from the mapping defined between the identifier in the request message and the function of the virtual machine 50 within the cluster 20. That mapping may be maintained by the system controller 40 on the basis of the control information contained in the information message received from the managing component 30. It will be appreciated that multiple identifiers (i.e., virtual machines 50) may be mapped on the same function.

The processor 44 is further configured to determine, in step 312, booting information associated with the function that was determined in step 310. To this end, a one-to- one mapping between functions and items of booting information may be consulted by the processor 44. The booting information thus determined is sent in a response message via an interface 46 to the virtual machine 50 (step 314). The booting information may in one variant conform to RFC 2132 of the Internet Engineering Task Force (IETF).

The interfaces 34, 42 between the managing component 30 and the system controller 40 a communication link (e.g., an "event bus") for communication between the managing component 30 and the system controller 40. The interfaces 34, 42 may thus be the endpoints of a (e.g., direct) communication link that permits the managing component 30 to inform the system controller 40 about the function and, optionally, the associated identity of a virtual machine that has been or will be newly deployed by the managing component 30. This information permits the system controller 40 to recognize a particular virtual machine 50 from the identifier in a request message received from the virtual machine 50, and to return the appropriate booting information to that virtual machine 50.

In an embodiment depicted in Fig. 4, the managing component 30 of Fig. 2 is realized in the form of an event bus manager 70 situated between a so-called cloud manager 80 and the virtualized application cluster 20. The event bus manager 70 is responsible for controlling accesses to the event bus. As an example, the event bus manager 70 may provide authorization functions and, optionally, filtering of events coming from the cloud manager 80. In case the cloud manager 80 is not configured to generate such events, then the event bus manager 70 could also be the entity generating these events by observing the actions of the cloud manager 80. The cloud manager 80, in turn, is responsible for deployment of the system controller 40 and the (other) virtual machines 50.

In Fig. 4, the event bus manager 70 is co-located with the cloud manager 80 to form a single managing component 30. It will be understood that the event bus manager 70 is optional. In scenarios in which the event bus manager 70 does not exist as separate entity, its functionality can be integrated into the cloud manager 80.

In the following, two exemplary deployment scenarios for the virtual machines 50 will be described in more detail with reference to the signaling diagrams illustrated in Figs. 5 and 6. Those signaling diagrams can be realized in connection with any of the embodiments discussed above with reference to Figs. 1 to 4.

The signaling diagrams of Figs. 5 and 6 assume that there is a communication protocol in place between the managing component 30 and the system controller 40 that allows the former to send one or more information messages with control - -

information to the latter. This communication protocol can be unidirectional if there is no need for the system controller 40 to confirm that it has correctly processed the information messages received from the managing component 30. The

communication protocol can also be bidirectional and may allow the system controller 40 to confirm that it has correctly processed the information contained in the information messages. A bidirectional communication protocol may also be used to request the control information by the system controller 40 or to request that the control information be refreshed (e.g., when the system controller 40 restarts).

The communication protocol used between the managing component 30 and the system controller 40 may, for example, be based on any message queue protocol or any protocol suitable for sending notifications. In one implementation, the Hypertext Transfer Protocol (HTTP) can be used as communication, or transport, protocol (e.g., for REST-style requests to a predefined port number on the system controller 40). In another realization, a publish/subscribe mechanism could be used by which the system controller 40 connects to the managing component 30, for example to the event bus manager 70 of Fig. 4, and subscribes to events related to the virtual machines 50 of the particular cluster 20 controlled by the system controller 40.

With reference to Fig. 5, the signaling diagram illustrated therein is based on a unidirectional communication protocol. Specifically, the signaling diagram of Fig. 5 illustrates a "push" type message flow from the managing component 30 to the system controller 40. It will be appreciated that in alternative implementations a bidirectional communication protocol may be used.

In a first step shown in Fig. 5, the managing component 30 is triggered to deploy a new clustered application from an OVF file or any other kind of package format file 60 that defines one or multiple virtual machines 50. In a second step, the managing component 30 first deploys the system controller 40 of the clustered application. Deployment of the system controller 40 (and any of the further virtual machines 50) may comprise the creation of one or more virtual hardware elements, such as a virtual network card or a virtual Electronically Erasable Programmable Read-Only Memory (EEPROM).

Then, in a further step, the managing component 30 informs the system controller 40, typically before deploying the (further) virtual machines 50, of functions assigned to the virtual machines 50 using one or more information messages. Each function may be defined by an abstract identifier (e.g., as read from the file 60) and may apply to a single virtual machine 50 or a group of virtual machines 50 within the cluster 20. The managing component 30 does not have to know the meaning of that identifier and/or function, which is only relevant for the system controller 40.

Control information processed by the managing component 30 and/or received by the system controller 40 from the managing component 40 may associate, or map, the MAC address of each virtual machine 50 with the function this virtual machine 50 should have within the cluster 20. The following table schematically illustrates an exemplary data structure that may be read by the managing component 30 from the file 60 and/or signaled as control information to the system controller 40:

The above table pertains to an exemplary cluster 20 comprising four virtual machines 50 (plus the system controller 40). The four virtual machines 50 are associated with the four MAC addresses MAC1 to MAC4 (or any alternative identifier that need not necessarily be a network address), respectively. Each MAC address is mapped on a dedicated function of the associated virtual machine 50 within the cluster 20. In the above example, the three virtual machines 50 with MAC addresses MAC1 to MAC3 provide (the same) file services within the cluster 20, while the fourth virtual machine 50 provides application services. As stated above, each function in the above table could also be expressed by an abstract function identifier.

In certain implementations the above table may be extended by an individual IP address that has been assigned to an individual virtual machine 50. There may exist a one-to-one mapping between MAC addresses and associated IP addresses.

The control information illustrated in the above table is received by the system controller 40 in the form of one or multiple information messages after its

deployment and is kept, or maintained, by the system controller 40 so that it can recognize the virtual machines 50 belonging to the virtualized application cluster 20.

Returning to Fig. 5, after having sent the control information to the system controller 40, the managing component 30 deploys one or more virtual machines 50 and - -

configures the virtual machines 50 based on the MAC addresses (or alternative identifiers) assigned to them (see the above table). When a virtual machine 50 starts to boot (e.g., using the PXE boot process described above) and sends a DHCP request message with its pre-configured MAC address to the system controller 40 in a further step, the system controller 40 tries to map the MAC address of the virtual machine 50 to a function the virtual machine 50 should have within the cluster 20 (see the table above).

The system controller 40 then tries to determine the required booting information. To this end, a further mapping table may be maintained by the system controller 40 as shown below:

In the above table, different booting packages are mapped on different virtual machine functions in the cluster 20. A booting package may define a TFTP server address (which may optionally be the same for all packages) and one or more file paths to one or more boot files on the TFTP server (which typically differ for different packages), see also RFC 2132. It will be appreciated that the above two tables can be combined as needed and that the association defined in both tables could alternatively be expressed in any other form, such as individual data sets dedicated to individual virtual machines.

Still referring to Fig. 5, the system controller 40 returns the determined booting information (TFTP server address and path to one or more boot files on the TFTP server) for the function to be fulfilled by the requesting virtual machine 50 in a DHCP response. The DHCP response message also contains the IP address(es) assigned to the virtual machine 50, as explained above. In the present embodiment, the system controller 40 further functions as TFTP server, so that in further signaling steps the virtual machine 50 can retrieve the required software via TFTP messaging from the system controller 40.

It should be noted that an information message (e.g., in the form of an information file) can be sent to the system controller 40 by the managing component 30 before booting the first virtual machine 50 as shown in Fig. 5. In such a case, the

information message may contain information (identifiers, functions, etc.) pertaining to multiple virtual machines 50 at a time. Alternatively, the information message can be sent separately for each virtual machine 50 just before it is booted. In such a case an information message typically only contains control information pertaining to a single virtual machine 50. If new virtual machines 50 are added to the cluster 20 at a later point in time, further information messages may be sent to the system controller 40.

The alternative signaling scenario illustrated in Fig. 6 is similar to the signaling scenario described above with reference to Fig. 5, except that the managing component 30 does not have to send one or more information messages (e.g., information files) to the system controller 40 before deploying the first virtual machine 50. Instead, the system controller 40 will specifically request the managing component 30 to provide the control information the system controller 40 requires to identify a particular virtual machine 50 from which the system controller 40 has received a DHCP request. The signaling scenario of Fig. 6 thus requires a

bidirectional communication protocol between the managing component 30 and the system controller 40 to implement a "pull" type communication.

With respect to the signaling diagram illustrated in Fig. 6, the system controller 40 may request control information from the managing component 30 when the system controller 40 has been deployed and boots, which would then be very similar to the "push" type communication, except that the communication is initiated by the system controller 40. Alternatively, the system controller 40 may request the information on demand each time it gets a new DHCP request from an unknown MAC address as specifically shown in Fig. 6. That is, upon receipt of a DHCP request from a virtual machine 50, the system controller 40 may determine that the DHCP request contains an unknown MAC address (e.g., one that cannot be resolved using an existing mapping table as shown above, or that cannot be resolved because no or only an empty mapping table is maintained by the system controller 40). In this case the system controller 40 sends a request message (that optionally includes the unknown MAC address) to the managing component 30 as shown in Fig. 6. The managing component 30 then responds with an information message that contains control information defining the function of the requesting virtual machine 50.

In the scenario of Fig. 6, the system controller 40 may thus internally associate the unknown MAC address received from the virtual machine 50 with the assigned function signaled by the managing component 30. To this end, the system controller 40 may create a new mapping table or a new entry in an existing mapping table. As an example, the system controller 40 may in a first step fill in the unknown MAC address received from a virtual machine 50 in the mapping table and send the request message to the managing component 40. When the managing component 40 answers with the function associated with the unknown MAC address, the system controller 40 will in a second step complete the table entry with that function.

It will be appreciated that the system controller 40 may maintain a session context for a particular messaging sequence so that the managing component 30 does not have to return the unknown MAC address in connection with the function associated therewith. Moreover, it has again to be stressed that MAC addresses may be replaced by any other identifier (e.g., a Layer 3 identifier) capable of distinguishing the virtual machines 50 within the cluster 20.

It should be noted that the signaling diagrams illustrated in Figs. 5 and 6 can be combined as needed. In other words, for a particular virtualized application cluster 20 one or more information messages may be sent by the managing component 30 based on a "push" type communication, while one or more further information messages may be sent using a "pull" type mechanism.

Fig. 7 illustrates a further embodiment of the present disclosure, wherein a unique identifier different from a MAC address is used to differentiate each virtual machine 50. In the present embodiment, the uniqueness of the identifier is guaranteed by the managing component 30 and the virtual machine 50 itself. As an example, each virtual machine 50 may have a unique virtual EEPROM, a unique network card firmware or a unique Basic Input Output System (BIOS) that may be configured (e.g., programmed) at a deployment time by the managing component 30. With respect to the particular system embodiment illustrated in Fig. 7, the network card firmware of an individual virtual machine 50 is modified at deployment time in order to make this virtual machine 50 unique.

Initially, the managing component 30 again accesses a descriptor file 60, which defines the virtualized application cluster 20. The descriptor file 60 contains control information indicative of the functions of the virtual machines 50 to be deployed. In one variant, the descriptor file 60 further specifies the unique identifier of each virtual machine 50 to be deployed. In an alternative embodiment, a unique identifier is dynamically selected, or assigned, by the managing component 30. The managing component 30 then deploys the system controller 40 first, followed by a deployment of the multiple virtual machines 50. The deployment of the system controller 40 and the virtual machine 50 follows the control information contained in the descriptor file 60. Upon creation of each individual virtual machine 50, the managing component 30 programs the network card firmware of each virtual machine 50 such that it includes the unique identifier assigned thereto. In the exemplary scenario illustrated in Fig. 7, different identifiers are represented by circles with different fillings.

During the boot process, each virtual machine 50 will send its identifier as a parameter in its initial DHCP request to the system controller 40. The DHCP request will typically include the unique identifier of the virtual machine 50 in addition to its (source) MAC address. The MAC address may have been randomly selected by the virtual machine 50.

It will be appreciated that the initial DHCP request will normally be sent to a broadcast address. As stated above, the system controller 40 can be part of the same Layer 2 domain as the virtual machine 50 and will thus receive the DHCP request containing both the unique identifier of the virtual machine 50 and its MAC address.

Once the system controller 40 has received the MAC address and the unique identifier of the virtual machine 50, it can match the unique identifier with the function the virtual machine 50 will have within the cluster 20. This matching can be performed based on control information received by the system controller 40 in one or multiple information messages from the managing component 30. Exemplary scenarios in this regard have been discussed above with reference to Figs. 5 and 6.

Based on the matching process within the system controller 40, the system controller 40 will then return a dedicated IP address together with booting information (TFTP server address and path to one or more files) to the requesting virtual machine 50. The virtual machine 50 is thus enabled to boot with the appropriate software and configuration for its specific role within the cluster 20.

As has become apparent from the above description of exemplary embodiments, the technique presented herein permits a deployment of clustered applications in a cloud environment and a booting without requiring manual intervention. The technique - -

also facilitates an increase or decrease of a cluster size by adding or removing virtual machines without manual intervention.

In certain variants, unique identifiers (e.g., MAC addresses) can be dynamically assigned to the virtual machines when they are created, instead of requiring the identifiers (e.g., MAC addresses) to be static and pre-configured. This approach is useful to allow two or more application clusters of the same type to be deployed (e.g., in the same network) without having conflicting identifiers (e.g., conflicting MAC addresses).

The technique presented herein can be useful for legacy application clusters that are to be ported to a cloud or virtualization environment and for new application clusters that are designed to work in both virtualized and physical deployments.

Modifications of the disclosed embodiments will come to mind to one skilled in the art having the benefit of the teachings presented in the foregoing description and the associated drawings. Therefore, it is to be understood that the present invention is not to be limited to the specific embodiments disclosed herein, and that modifications are intended to be included within the scope of this disclosure. Although specific terms may be employed herein, they are used in a generic and descriptive sense only and not for purposes of limitation.