In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-01-19 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Database >
Share
Shulou(Shulou.com)06/01 Report--
The process of creating a virtual machine is as follows:
1. The interface or command line obtains authentication information from keystone through RESTful API.
2.keystone requests authentication information through the user, and generates auth-token to return to the corresponding authentication request.
3. The interface or command line sends a request for boot instance (with auth-token) to nova-api via RESTful API.
After accepting the request, 4.nova-api sends an authentication request to keystone to see if token is a valid user and token.
5.keystone verifies whether the token is valid, and returns valid authentication and corresponding roles if it is valid (Note: some operations require role permissions to operate).
6. After passing the authentication, nova-api communicates with database.
7. Initialize the database record for the new virtual machine.
8.nova-api requests from nova-scheduler through rpc.call whether there are resources (Host ID) to create a virtual machine.
The 9.nova-scheduler process listens to message queues for requests from nova-api.
10.nova-scheduler queries the computing resources in the nova database and calculates the hosts that meet the needs of virtual machine creation through the scheduling algorithm.
11. For hosts that match the creation of virtual machines, nova-scheduler updates the physical host information for the virtual machines in the database.
12.nova-scheduler sends the corresponding request message for creating a virtual machine to nova-compute through rpc.cast.
13.nova-compute gets the message to create the virtual machine request from the corresponding message queue.
14.nova-compute requests a virtual machine message from nova-conductor through rpc.call. (Flavor)
15.nova-conductor gets the nova-compute request message from the message queue.
16.nova-conductor queries the corresponding information of the virtual machine according to the message.
17.nova-conductor obtains the virtual machine correspondence information from the database.
18.nova-conductor sends virtual machine information to the message queue in the form of messages.
19.nova-compute acquires virtual machine information messages from the corresponding message queue.
20.nova-compute gets the authenticated token through keystone's RESTfull API, and requests glance-api to obtain the image needed to create the virtual machine through HTTP.
21.glance-api verifies whether the token is valid to keystone and returns the verification result.
22.token verification passes, and nova-compute obtains virtual machine image information (URL).
23.nova-compute gets the token of authentication k through the RESTfull API of keystone, and requests neutron-server to obtain the network information needed to create the virtual machine through HTTP.
24.neutron-server verifies whether the token is valid to keystone and returns the verification result.
25.token verification passes, and nova-compute obtains virtual machine network information.
26.nova-compute gets the authenticated token through the RESTfull API of keystone, and requests cinder-api to obtain the persistent storage information needed to create the virtual machine through HTTP.
27.cinder-api verifies whether the token is valid to keystone and returns the verification result.
28.token verification passes, and nova-compute obtains the persistent storage information of the virtual machine.
29.nova-compute invokes the configured virtualization driver to create a virtual machine based on the information of instance.
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 303
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
© 2024 shulou.com SLNews company. All rights reserved.