CN109842530A - VNF configuration method, device, electronic equipment and computer-readable medium - Google Patents
VNF configuration method, device, electronic equipment and computer-readable medium Download PDFInfo
- Publication number
- CN109842530A CN109842530A CN201910300651.5A CN201910300651A CN109842530A CN 109842530 A CN109842530 A CN 109842530A CN 201910300651 A CN201910300651 A CN 201910300651A CN 109842530 A CN109842530 A CN 109842530A
- Authority
- CN
- China
- Prior art keywords
- configuration
- target
- vnf
- direct
- mentioned
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Landscapes
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
The embodiment of the present application discloses VNF configuration method, device, electronic equipment and computer-readable medium.The embodiment of this method includes: the VNF configuring request for receiving configuration center and sending, wherein, it include the configuration message of the Extended Protocol based on NETCONF in the VNF configuring request, the Extended Protocol supports the update to the configuration file of VNF to operate, which includes the more new command of the configuration-direct to target VNF and the target configuration file to target VNF;The more new command is executed to be updated to the target configuration file, and executes the configuration-direct to configure target VNF.The embodiment supports configuration of the Extended Protocol based on NETCONF to VNF, reduces the complexity of the operation of configuration center.
Description
Technical field
The invention relates to field of computer technology, and in particular to VNF configuration method, device, electronic equipment and meter
Calculation machine readable medium.
Background technique
NFV (Network function virtualization, network function virtualization) refers to by using x86 etc.
General purpose hardware and virtualization technology, to carry very multi-functional software processing.To reduce the equipment cost of network valuableness,
Network equipment function is set to be no longer dependent on specialized hardware, resource sufficiently can flexibly be shared.Wherein, VNF (Virtual
Network function, virtual network function) be NFV core, refer to software form realize originally by all kinds of
The function (such as firewall) that network hardware is realized.VNF is configurable on one or more virtual machines, and virtual machine may operate at
In the electronic equipments such as server, interaction machine, memory.
Existing mode is usually to be configured in the middle part of virtual machine (such as x86 virtual machine) by modes such as script, proprietary protocols
The VNF of administration, so that VNF provides required network function.However, since usual hardware device uses NETCONF (Network
Configuration Protocol, network configuration protocol) configuration, thus, VNF is configured by modes such as script, proprietary protocols,
Cause the configuration mode to hardware device with VNF different, causes the complexity of operation performed by configuration center larger.
Summary of the invention
The embodiment of the present application proposes VNF configuration method, device, electronic equipment and computer-readable medium, existing to solve
There is the larger technical problem of the complexity of operation performed by configuration center in technology.
In a first aspect, the embodiment of the present application provides a kind of VNF configuration method, set applied to the electronics for being deployed with virtual machine
Standby, virtual machine is for configuring VNF, this method comprises: receiving the VNF configuring request that configuration center is sent, wherein VNF configuration is asked
It include the configuration message of the Extended Protocol based on network configuration protocol NETCONF in asking, Extended Protocol supports the configuration text to VNF
The update of part operates, and configuration message includes referring to the configuration-direct of target VNF and to the update of the target configuration file of target VNF
It enables;More new command is executed to be updated to target configuration file, and executes configuration-direct to configure target VNF.
Second aspect, the embodiment of the present application provide a kind of VNF configuration device, set applied to the electronics for being deployed with virtual machine
Standby, for virtual machine for configuring VNF, device includes: receiving unit, is configured to receive the VNF configuring request of configuration center transmission,
It wherein, include the configuration message of the Extended Protocol based on network configuration protocol NETCONF, Extended Protocol branch in VNF configuring request
The operation of the update to the configuration file of VNF is held, configuration message includes the configuration-direct to target VNF and the target to target VNF
The more new command of configuration file;Configuration unit is configured to execute more new command to be updated to target configuration file, and holds
Row configuration-direct is to configure target VNF.
The third aspect, the embodiment of the present application provide a kind of electronic equipment, comprising: one or more processors;Storage dress
Set, be stored thereon with one or more programs, when one or more programs are executed by one or more processors so that one or
Multiple processors realize the method such as any embodiment in above-mentioned first aspect.
Fourth aspect, the embodiment of the present application provide a kind of computer-readable medium, are stored thereon with computer program, should
The method such as any embodiment in above-mentioned first aspect is realized when program is executed by processor.
VNF configuration method, device, electronic equipment and computer-readable medium provided by the embodiments of the present application, pass through reception
The VNF configuring request that configuration center is sent, so as to obtain the matching based on NETCONF Extended Protocol in VNF configuring request
Set message.Then by executing the more new command in configuration message, so as to be updated to target configuration file, Yi Jitong
The configuration-direct executed in configuration message is crossed, so as to configure target VNF.Since the Extended Protocol of NETCONF is supported to VNF
Configuration file update operation, it is thus possible to realize configuration of the Extended Protocol based on NETCONF to VNF.Due to usually hard
Part equipment is configured using NETCONF, and the Extended Protocol of NETCONF supports the configuration to VNF, and configuration center can be with as a result,
Hardware device is carried out using unified agreement and configuration mode and VNF is configured, and reduces the complexity of the operation of configuration center.
Detailed description of the invention
By reading a detailed description of non-restrictive embodiments in the light of the attached drawings below, the application's is other
Feature, objects and advantages will become more apparent upon:
Fig. 1 is the flow chart according to one embodiment of the VNF configuration method of the application;
Fig. 2 is the flow chart according to another embodiment of the VNF configuration method of the application;
Fig. 3 is the structural schematic diagram according to one embodiment of the VNF configuration device of the application;
Fig. 4 is adapted for the structural schematic diagram for the computer system for realizing the electronic equipment of the embodiment of the present application.
Specific embodiment
The application is described in further detail with reference to the accompanying drawings and examples.It is understood that this place is retouched
The specific embodiment stated is used only for explaining related invention, rather than the restriction to the invention.It also should be noted that in order to
Convenient for description, part relevant to related invention is illustrated only in attached drawing.
It should be noted that in the absence of conflict, the features in the embodiments and the embodiments of the present application can phase
Mutually combination.The application is described in detail below with reference to the accompanying drawings and in conjunction with the embodiments.
Referring to FIG. 1, it illustrates the processes 100 according to one embodiment of the VNF configuration method of the application.The VNF
Configuration method, comprising the following steps:
Step 101, the VNF configuring request that configuration center is sent is received.
In the present embodiment, the execution of VNF (Virtual network function, virtual network function) configuration method
Main body (such as being deployed with the electronic equipment of virtual machine, above-mentioned virtual machine is used to configure VNF) can receive configuration center transmission
VNF configuring request.Wherein, above-mentioned configuration center can be one for configuring network element (such as VNF, hardware net equipment etc.)
Or multiple servers.
It herein, may include based on NETCONF (Network Configuration in above-mentioned VNF configuring request
Protocol, network configuration protocol) Extended Protocol configuration message.Above-mentioned configuration message may include matching to target VNF
Set the more new command of instruction and the target configuration file to above-mentioned target VNF.Wherein, above-mentioned target VNF can be currently wait match
The VNF set.Above-mentioned target configuration file is the configuration file of above-mentioned target VNF.
In practice, above-mentioned configuration-direct can serve to indicate that the configuration to target VNF.For example, above-mentioned configuration-direct can be with
It also may include indicating that reading target again matches including indicating that above-mentioned executing subject configures certain softwares to execute the instruction of required function
Set the instruction etc. of file.Above-mentioned more new command, which can serve to indicate that, to be increased the content in target configuration file, is deleted
Modification.
Herein, above-mentioned Extended Protocol can support the update to the configuration file of VNF to operate.In practice, above-mentioned extension association
View can be on the basis of NETCONF, expand the operation being updated to the configuration file of VNF, that is, NETCONF's
On the basis of define the message structure of the configuration message (conf) that VNF is communicated with configuration center.
As an example, above-mentioned message structure can be according to as follows:
Wherein, Configuration of vnf is the title of target configuration file;Id can be used for unique identification, and this matches
It sets message and shows this configuration message request purposes;Path can be worth the path of target configuration file;Mode can refer to target
The update mode (such as incremental update or full dose update etc.) of configuration file;Pre-exec-rules, which can refer to, to be needed to update
The configuration-direct executed before target configuration file;Old-persist-rules can refer to that needs are deleted from target configuration file
Content;New-persist-rules can refer to needs increased content in target configuration file;post-exec-rules
It can refer to the configuration-direct executed after updating target configuration file.
It should be noted that above-mentioned Struct expression structure, string expression array, list expression list, Struct,
String, list are common data type, are not repeated herein.
In practice, the RPC (Remote that can be communicated with above-mentioned executing subject using pre-set configuration center
Procedure Call, remote procedure call) the above-mentioned VNF configuring request of message format transmission.In above-mentioned message format, it can wrap
Include RPC interface, configuration message, return instruction etc..
Step 102, more new command is executed to be updated to target configuration file, and executes configuration-direct to configure target
VNF。
In the present embodiment, the content in target configuration file is increased since above-mentioned more new command can serve to indicate that
The modification such as add, delete, and, above-mentioned configuration-direct can serve to indicate that the configuration to target VNF, therefore, above-mentioned executing subject
More new command can be executed to be updated to target configuration file, and execute configuration-direct to configure target VNF.
In some optional implementations of the present embodiment, above-mentioned configuration-direct may include the first configuration-direct and/
Or second configuration-direct.Wherein, above-mentioned first configuration-direct can be the configuration executed before updating above-mentioned target configuration file
Instruction.Above-mentioned second configuration-direct is the configuration-direct executed after updating above-mentioned target configuration file.Above-mentioned first configuration
Instruction can be used for configure run on above-mentioned target VNF application (such as existing application Quagga, Netfilter,
OpenvSwitch etc.) to realize required function.Above-mentioned second configuration-direct is used to indicate the updated target configuration text of load
Part.
Optionally, in above-mentioned implementation, above-mentioned executing subject can execute following steps: match in response to determination is above-mentioned
Setting instruction includes above-mentioned first configuration-direct, executes the first configuration-direct;Above-mentioned more new command is then executed to above-mentioned target
Configuration file is updated;Include finally above-mentioned second configuration-direct in response to the above-mentioned configuration-direct of determination, executes above-mentioned second
Configuration-direct, to realize the configuration of target VNF.
Optionally, in above-mentioned implementation, above-mentioned executing subject can also be before every execution configuration-direct, first really
Whether the fixed configuration-direct had been configured.Specifically, following steps can be executed: includes in response to the above-mentioned configuration-direct of determination
Above-mentioned first configuration-direct and above-mentioned first configuration-direct is not configured executes above-mentioned first configuration-direct;It then executes above-mentioned
More new command is to be updated above-mentioned target configuration file;It include finally above-mentioned second matching in response to the above-mentioned configuration-direct of determination
It sets instruction and above-mentioned second configuration-direct is not configured, execute above-mentioned second configuration-direct.
It should be noted that then can no longer execute first configuration determining that above-mentioned first configuration-direct has been configured
Instruction.Similarly, it is determining that above-mentioned second configuration-direct has been configured, then can no longer execute second configuration-direct.In practice,
The structure that configuration-direct can be preset makes it first check whether to be configured, if configured mistake, abandons executing.
Since some do not support idempotent (i.e. repeatedly configuration is identical as the result once configured) using (such as Netfilter), cause in weight
After multiple configuration-direct is repeatedly issued, it will lead to configuration and mistake occur.For example, being advised since firewall rule has a large amount of repetitions
Then, firewall rule is caused to occur abnormal, it cannot be it is anticipated that completing access configuration task.As a result, by executing configuration every
It before instruction, determines whether the configuration-direct had been configured, in the case where determining be not configured, executes the configuration-direct, it can
To realize the idempotence of configuration-direct.
In some optional implementations of the present embodiment, above-mentioned target configuration file can be each with behavior unit
Row is a configuration line.At this point it is possible to carry out the update of target configuration file using incremental update mode.It is above-mentioned in practice
More new command may include deleting instruction and/or increasing to instruct.Above-mentioned deletion instruction, which is used to indicate, deletes above-mentioned target configuration text
Configuration line to be deleted in part.Above-mentioned increase instruction is used to indicate the increase target configuration line in above-mentioned target configuration file.This
When, above-mentioned executing subject can execute above-mentioned more new command as follows to be updated to above-mentioned target configuration file:
Firstly, including that above-mentioned deletion instructs in response to the above-mentioned more new command of determination, above-mentioned deletion instruction is executed, is matched with deleting above-mentioned target
Set the configuration line to be deleted in file.Then, include that above-mentioned increase instructs in response to the above-mentioned more new command of determination, execute above-mentioned increasing
Add instruction, to increase above-mentioned target configuration line in above-mentioned target configuration file.
In some optional implementations of the present embodiment, what above-mentioned target configuration file can also be updated using full dose
Mode is updated.At this point, if desired carrying out content alteration to target configuration file, then can directly be configured using new target
File is replaced original target configuration file.
The method provided by the above embodiment of the application, the VNF configuring request sent by receiving configuration center, so as to
Enough obtain the configuration message based on NETCONF Extended Protocol in VNF configuring request.Then by executing in configuration message more
New command, so as to be updated to above-mentioned target configuration file, and by executing the configuration-direct in configuration message, from
And above-mentioned target VNF can be configured.Since the Extended Protocol of NETCONF supports the update to the configuration file of VNF to operate, thus
It can be realized configuration of the Extended Protocol based on NETCONF to VNF.Since usual hardware device is configured using NETCONF, and
The Extended Protocol of NETCONF supports the configuration to VNF, and configuration center can use unified agreement and configuration mode as a result,
Hardware device and VNF configuration are carried out, the complexity of the operation of configuration center is reduced.
With further reference to Fig. 2, it illustrates the processes 200 of another embodiment of VNF configuration method.The configuration side VNF
The process 200 of method, comprising the following steps:
Step 201, the VNF configuring request that configuration center is sent is received.
In the present embodiment, the executing subject of VNF configuration method (such as is deployed with the electronic equipment of virtual machine, above-mentioned void
Quasi- machine is used to configure VNF) it can receive the VNF configuring request that configuration center is sent.Wherein, above-mentioned configuration center, which can be, is used for
Configure one or more servers of network element (such as VNF, hardware net equipment etc.).
It herein, may include the configuration of the Extended Protocol based on network configuration protocol NETCONF in above-mentioned VNF configuring request
Message.Above-mentioned Extended Protocol can support the update to the configuration file of VNF to operate.Above-mentioned configuration message may include to target
The more new command of the configuration-direct of VNF and the target configuration file to above-mentioned target VNF.
Herein, above-mentioned more new command may include deleting instruction and/or increasing to instruct.Above-mentioned deletion instruction, which is used to indicate, deletes
Except the configuration line to be deleted in above-mentioned target configuration file.Above-mentioned increase instruction is used to indicate to be increased in above-mentioned target configuration file
Add target configuration line.
Herein, above-mentioned configuration-direct may include the first configuration-direct and/or the second configuration-direct.Wherein, above-mentioned first
Configuration-direct can be the configuration-direct executed before updating above-mentioned target configuration file.Above-mentioned second configuration-direct is to update
The configuration-direct executed after above-mentioned target configuration file.Above-mentioned first configuration-direct, which can be used for configuring, runs on above-mentioned target
The application of VNF is to realize required function.Above-mentioned second configuration-direct is used to indicate the updated target configuration file of load.
Step 202, it in response to determining that configuration-direct includes the first configuration-direct and the first configuration-direct is not configured, executes
First configuration-direct.
It in the present embodiment, include above-mentioned first configuration-direct and above-mentioned first configuration in response to the above-mentioned configuration-direct of determination
Instruction is not configured, and above-mentioned executing subject can execute above-mentioned first configuration-direct, to update to above-mentioned target configuration file
Configuration runs on the application of above-mentioned target VNF before, to realize required function.
Step 203, it in response to determining that more new command includes deleting instruction, executes and deletes instruction, text is configured with delete target
Configuration line to be deleted in part.
In the present embodiment, in response to determining that more new command includes deleting instruction, above-mentioned executing subject can execute above-mentioned
Instruction is deleted, to delete the above-mentioned configuration line to be deleted in above-mentioned target configuration file.
In the present embodiment, Hash table can be set in above-mentioned executing subject.Above-mentioned Hash table can be used on caching
State the configuration file (can be one or more) of target VNF.Record has each configuration text of above-mentioned target VNF in above-mentioned Hash table
The cryptographic Hash of part and the corresponding sequence of hash values of each configuration file.Wherein, the cryptographic Hash of each configuration file can be by right
The path of the configuration file carries out Hash calculation generation (such as being input to hash function, obtain cryptographic Hash).Each configuration text
The corresponding sequence of hash values of part may include the cryptographic Hash of each configuration line in the configuration file.
Above-mentioned executing subject can delete the configuration line to be deleted in above-mentioned target configuration file as follows:
The first step determines the cryptographic Hash of above-mentioned configuration line to be deleted, as the first cryptographic Hash.In practice, it can be input to
Pre-set hash function obtains the first cryptographic Hash.
Second step determines in the above-mentioned target sequence of hash values in above-mentioned Hash table with the presence or absence of above-mentioned first cryptographic Hash.
Third step, in response to determining there are above-mentioned first cryptographic Hash, above-mentioned first deleted in above-mentioned target cryptographic Hash is breathed out
Uncommon value.May be implemented in and determine in above-mentioned target configuration file there are in the case where above-mentioned configuration line to be deleted as a result, by it is above-mentioned to
Configuration line is deleted to delete, thus, it avoids that target configuration file is caused to repeat to update when repeatedly issuing identical configuration message, keeps away
Exempt to lead to CPU (Central Processing Unit, central processing unit) and magnetic disc i/o due to largely reading and writing configuration file
The loss of (Input/Output, input/output).
In some optional implementations of the present embodiment, before executing above-mentioned deletion content instruction, above-mentioned execution
Main body can also determine the target cryptographic Hash that whether there is above-mentioned target configuration file in above-mentioned Hash table.It is not deposited in response to determination
, it is believed that uncached target configuration file, at this point it is possible to read above-mentioned target configuration text from above-mentioned target store path
Part determines the cryptographic Hash of each configuration line in above-mentioned target configuration file.To which the cryptographic Hash of identified each configuration line is included into
Target sequence of hash values.In turn, above-mentioned target cryptographic Hash and above-mentioned target sequence of hash values are recorded to above-mentioned Hash table.
Step 204, it in response to determining that more new command includes increasing instruction, executes and increases instruction, in target configuration file
Middle increase target configuration line.
In the present embodiment, in response to determining that more new command includes increasing instruction, above-mentioned executing subject can execute above-mentioned
Increase instruction, to increase above-mentioned target configuration line in above-mentioned target configuration file.
Above-mentioned executing subject can increase above-mentioned target configuration line in above-mentioned target configuration file as follows:
The first step determines the cryptographic Hash of above-mentioned target configuration line, as the second cryptographic Hash.In practice, it can be input to pre-
The hash function being first arranged obtains the first cryptographic Hash.
Second step determines in the above-mentioned target sequence of hash values in above-mentioned Hash table with the presence or absence of above-mentioned second cryptographic Hash.
Third step is not present above-mentioned second cryptographic Hash in response to determining, above-mentioned second cryptographic Hash is increased to above-mentioned target
In sequence of hash values.It is may be implemented in determining above-mentioned target configuration file as a result, in the case where above-mentioned target configuration line is not present,
Increase above-mentioned target configuration line, thus, it avoids that target configuration file is caused to repeat more when repeatedly issuing identical configuration message
Newly, avoiding leads to the loss of CPU and magnetic disc i/o due to largely reading and writing configuration file.
In the above-mentioned increase instruction of above-mentioned execution, after increasing above-mentioned target configuration line in above-mentioned target configuration file,
The above method further include:
In some optional implementations of the present embodiment, above-mentioned executing subject is in response to detecting in above-mentioned Hash table
Above-mentioned target sequence of hash values there is change, each cryptographic Hash is corresponding matches in the target sequence of hash values after can determining change
Row is set, and above-mentioned target configuration file is updated based on identified configuration line.In practice, Hash table modification can be previously provided with
Above-mentioned Hash table can be modified label and be set as by label after the target sequence of hash values in Hash table has change
"True".It, can be by judging that current Hash table modification marks whether to come true for " True " after updating instruction execution
Fixed above-mentioned target sequence of hash values is with the presence or absence of change.
Step 205, it in response to determining that configuration-direct includes the second configuration-direct and the second configuration-direct is not configured, executes
Second configuration-direct.
It in the present embodiment, include above-mentioned second configuration-direct and above-mentioned second configuration in response to the above-mentioned configuration-direct of determination
Instruction is not configured, and above-mentioned executing subject can execute above-mentioned second configuration-direct, to update to above-mentioned target configuration file
Updated target configuration file is loaded later.
From figure 2 it can be seen that compared with the corresponding embodiment of Fig. 1, the process of the VNF configuration method in the present embodiment
200 relate to based on update Hash table come the step of updating target configuration file.The scheme of the present embodiment description can be kept away as a result,
Exempt from that target configuration file is caused to repeat to update when repeatedly issuing identical configuration message, avoids due to largely reading and writing configuration text
Part leads to the loss of CPU and magnetic disc i/o.
With further reference to Fig. 3, as the realization to method shown in above-mentioned each figure, this application provides a kind of VNF configurations to fill
The one embodiment set, the Installation practice is corresponding with embodiment of the method shown in FIG. 1, which specifically can be applied to respectively
Kind is deployed with the electronic equipment of virtual machine, and the virtual machine is for configuring VNF.
As shown in figure 3, VNF configuration device 300 described in the present embodiment includes: receiving unit 301, it is configured to receive and matches
Set the VNF configuring request of center transmission, wherein include the expansion based on network configuration protocol NETCONF in above-mentioned VNF configuring request
The configuration message of agreement is opened up, above-mentioned Extended Protocol supports the update to the configuration file of VNF to operate, and above-mentioned configuration message includes pair
The more new command of the configuration-direct of target VNF and the target configuration file to above-mentioned target VNF;Configuration unit 302, is configured to
Above-mentioned more new command is executed to be updated to above-mentioned target configuration file, and executes above-mentioned configuration-direct to configure above-mentioned target
VNF。
In some optional implementations of the present embodiment, above-mentioned more new command includes deleting instruction and/or increasing to refer to
It enables, above-mentioned deletion instruction is used to indicate the configuration line to be deleted deleted in above-mentioned target configuration file, and above-mentioned increase instruction is used for
Instruction increases target configuration line in above-mentioned target configuration file;And above-mentioned configuration unit 302, comprising: removing module is (in figure
It is not shown), it is configured in response to determine that above-mentioned more new command includes above-mentioned deletion instruction, above-mentioned deletion instruction is executed, to delete
Except the configuration line to be deleted in above-mentioned target configuration file;Increase module (not shown), is configured in response to determine
Stating more new command includes above-mentioned increase instruction, above-mentioned increase instruction is executed, to increase above-mentioned mesh in above-mentioned target configuration file
Mark configuration line.
In some optional implementations of the present embodiment, above-mentioned electronic equipment is provided with Hash table, above-mentioned Hash table
For caching the configuration file of above-mentioned target VNF, record has the Hash of each configuration file of above-mentioned target VNF in above-mentioned Hash table
It is worth sequence of hash values corresponding with each configuration file, wherein the cryptographic Hash of each configuration file passes through to the configuration file
Path carries out Hash calculation generation, and the corresponding sequence of hash values of each configuration file includes each configuration line in the configuration file
Cryptographic Hash.
It further include above-mentioned target configuration file in above-mentioned configuration message in some optional implementations of the present embodiment
Target store path;And above-mentioned apparatus further include: determination unit (not shown) is configured to determine above-mentioned Hash
It whether there is the target cryptographic Hash of above-mentioned target configuration file in table;Recording unit (not shown), is configured in response to
Determination is not present, and reads above-mentioned target configuration file from above-mentioned target store path, determines each in above-mentioned target configuration file
The cryptographic Hash of identified each configuration line is included into target sequence of hash values by the cryptographic Hash of configuration line, by above-mentioned target cryptographic Hash
It records with above-mentioned target sequence of hash values to above-mentioned Hash table.
In some optional implementations of the present embodiment, above-mentioned removing module is further configured to: being determined above-mentioned
The cryptographic Hash of configuration line to be deleted, as the first cryptographic Hash;Determining in the above-mentioned target sequence of hash values in above-mentioned Hash table is
It is no that there are above-mentioned first cryptographic Hash;In response to determining that there are above-mentioned first cryptographic Hash, delete above-mentioned in above-mentioned target cryptographic Hash
First cryptographic Hash.
In some optional implementations of the present embodiment, above-mentioned increase module is further configured to: determining above-mentioned
The cryptographic Hash of target configuration line, as the second cryptographic Hash;Determine in the above-mentioned target sequence of hash values in above-mentioned Hash table whether
There are above-mentioned second cryptographic Hash;Above-mentioned second cryptographic Hash is not present in response to determining, above-mentioned second cryptographic Hash is increased to above-mentioned
In target sequence of hash values.
In some optional implementations of the present embodiment, above-mentioned apparatus further include: updating unit (not shown),
It is configured in response to detect that the above-mentioned target sequence of hash values in above-mentioned Hash table has change, the target after determining change
The corresponding configuration line of each cryptographic Hash in sequence of hash values updates above-mentioned target configuration file based on identified configuration line.
In some optional implementations of the present embodiment, above-mentioned configuration-direct includes the first configuration-direct and/or the
Two configuration-directs, wherein above-mentioned first configuration-direct is the configuration-direct executed before updating above-mentioned target configuration file, above-mentioned
Second configuration-direct is the configuration-direct executed after updating above-mentioned target configuration file, and above-mentioned first configuration-direct is for matching
The function of running on the application of above-mentioned target VNF is set, above-mentioned second configuration-direct is used to indicate the updated target configuration of load
File.
In some optional implementations of the present embodiment, above-mentioned configuration unit 302, comprising: the first configuration module (figure
In be not shown), be configured in response to determine that above-mentioned configuration-direct includes above-mentioned first configuration-direct and above-mentioned first configuration refers to
Order is not configured, executes above-mentioned first configuration-direct;Update module is configured to execute above-mentioned more new command to above-mentioned target
Configuration file is updated;Second configuration module (not shown) is configured in response to determine that above-mentioned configuration-direct includes
Above-mentioned second configuration-direct and above-mentioned second configuration-direct is not configured executes above-mentioned second configuration-direct.
The device provided by the above embodiment of the application, the VNF configuring request sent by receiving configuration center, so as to
Enough obtain the configuration message based on NETCONF Extended Protocol in VNF configuring request.Then by executing in configuration message more
New command, so as to be updated to above-mentioned target configuration file, and by executing the configuration-direct in configuration message, from
And above-mentioned target VNF can be configured.Since the Extended Protocol of NETCONF supports the update to the configuration file of VNF to operate, thus
It can be realized configuration of the Extended Protocol based on NETCONF to VNF.Since usual hardware device is configured using NETCONF, and
The Extended Protocol of NETCONF supports the configuration to VNF, and configuration center can use unified agreement and configuration mode as a result,
Hardware device and VNF configuration are carried out, the complexity of the operation of configuration center is reduced.
Below with reference to Fig. 4, it illustrates the computer systems 400 for the electronic equipment for being suitable for being used to realize the embodiment of the present application
Structural schematic diagram.Electronic equipment shown in Fig. 4 is only an example, function to the embodiment of the present application and should not use model
Shroud carrys out any restrictions.
As shown in figure 4, computer system 400 includes central processing unit (CPU) 401, it can be read-only according to being stored in
Program in memory (ROM) 402 or be loaded into the program in random access storage device (RAM) 403 from storage section 408 and
Execute various movements appropriate and processing.In RAM 403, also it is stored with system 400 and operates required various programs and data.
CPU 401, ROM 402 and RAM 403 are connected with each other by bus 404.Input/output (I/O) interface 405 is also connected to always
Line 404.
I/O interface 405 is connected to lower component: the importation 406 including keyboard, mouse etc.;Including such as liquid crystal
Show the output par, c 407 of device (LCD) etc. and loudspeaker etc.;Storage section 408 including hard disk etc.;And including such as LAN
The communications portion 409 of the network interface card of card, modem etc..Communications portion 409 is executed via the network of such as internet
Communication process.Driver 410 is also connected to I/O interface 405 as needed.Detachable media 411, such as disk, CD, magneto-optic
Disk, semiconductor memory etc. are mounted on as needed on driver 410, in order to from the computer program root read thereon
According to needing to be mounted into storage section 408.
Particularly, in accordance with an embodiment of the present disclosure, it may be implemented as computer above with reference to the process of flow chart description
Software program.For example, embodiment of the disclosure includes a kind of computer program product comprising be carried on computer-readable medium
On computer program, which includes the program code for method shown in execution flow chart.In such reality
It applies in example, which can be downloaded and installed from network by communications portion 409, and/or from detachable media
411 are mounted.When the computer program is executed by central processing unit (CPU) 401, limited in execution the present processes
Above-mentioned function.It should be noted that computer-readable medium described herein can be computer-readable signal media or
Computer readable storage medium either the two any combination.Computer readable storage medium for example can be --- but
Be not limited to --- electricity, magnetic, optical, electromagnetic, infrared ray or semiconductor system, device or device, or any above combination.
The more specific example of computer readable storage medium can include but is not limited to: have one or more conducting wires electrical connection,
Portable computer diskette, hard disk, random access storage device (RAM), read-only memory (ROM), erasable type may be programmed read-only deposit
Reservoir (EPROM or flash memory), optical fiber, portable compact disc read-only memory (CD-ROM), light storage device, magnetic memory
Part or above-mentioned any appropriate combination.In this application, computer readable storage medium, which can be, any include or stores
The tangible medium of program, the program can be commanded execution system, device or device use or in connection.And
In the application, computer-readable signal media may include in a base band or the data as the propagation of carrier wave a part are believed
Number, wherein carrying computer-readable program code.The data-signal of this propagation can take various forms, including but not
It is limited to electromagnetic signal, optical signal or above-mentioned any appropriate combination.Computer-readable signal media can also be computer
Any computer-readable medium other than readable storage medium storing program for executing, the computer-readable medium can send, propagate or transmit use
In by the use of instruction execution system, device or device or program in connection.Include on computer-readable medium
Program code can transmit with any suitable medium, including but not limited to: wireless, electric wire, optical cable, RF etc., Huo Zheshang
Any appropriate combination stated.
Flow chart and block diagram in attached drawing are illustrated according to the system of the various embodiments of the application, method and computer journey
The architecture, function and operation in the cards of sequence product.In this regard, each box in flowchart or block diagram can generation
A part of one module, program segment or code of table, a part of the module, program segment or code include one or more use
The executable instruction of the logic function as defined in realizing.It should also be noted that in some implementations as replacements, being marked in box
The function of note can also occur in a different order than that indicated in the drawings.For example, two boxes succeedingly indicated are actually
It can be basically executed in parallel, they can also be executed in the opposite order sometimes, and this depends on the function involved.Also it to infuse
Meaning, the combination of each box in block diagram and or flow chart and the box in block diagram and or flow chart can be with holding
The dedicated hardware based system of functions or operations as defined in row is realized, or can use specialized hardware and computer instruction
Combination realize.
Being described in unit involved in the embodiment of the present application can be realized by way of software, can also be by hard
The mode of part is realized.Described unit also can be set in the processor, wherein the title of these units is in certain situation
Under do not constitute restriction to the unit itself.
As on the other hand, present invention also provides a kind of computer-readable medium, which be can be
Included in device described in above-described embodiment;It is also possible to individualism, and without in the supplying device.Above-mentioned calculating
Machine readable medium carries one or more program, when said one or multiple programs are executed by the device, so that should
Device: the VNF configuring request that configuration center is sent is received;The more new command is executed to be updated to the target configuration file,
And the configuration-direct is executed to configure target VNF.
Above description is only the preferred embodiment of the application and the explanation to institute's application technology principle.Those skilled in the art
Member is it should be appreciated that invention scope involved in the application, however it is not limited to technology made of the specific combination of above-mentioned technical characteristic
Scheme, while should also cover in the case where not departing from foregoing invention design, it is carried out by above-mentioned technical characteristic or its equivalent feature
Any combination and the other technical solutions formed.Such as features described above has similar function with (but being not limited to) disclosed herein
Can technical characteristic replaced mutually and the technical solution that is formed.
Claims (12)
1. a kind of virtual network function VNF configuration method, which is characterized in that applied to the electronic equipment for being deployed with virtual machine, institute
Virtual machine is stated for configuring VNF, which comprises
Receive the VNF configuring request that configuration center is sent, wherein include being based on network configuration protocol in the VNF configuring request
The configuration message of the Extended Protocol of NETCONF, the Extended Protocol supports the update to the configuration file of VNF to operate, described to match
Set the more new command that message includes the configuration-direct to target VNF and the target configuration file to the target VNF;
The more new command is executed to be updated to the target configuration file, and it is described to configure to execute the configuration-direct
Target VNF.
2. VNF configuration method according to claim 1, which is characterized in that the more new command include delete instruction and/or
Increase instruction, the configuration line to be deleted deleting instruction and being used to indicate in the deletion target configuration file, the increase refers to
Order is used to indicate the increase target configuration line in the target configuration file;And
More new command described in the execution is to be updated the target configuration file, comprising:
In response to determining that the more new command includes the deletion instruction, the deletion instruction is executed, is matched with deleting the target
Set the configuration line to be deleted in file;
In response to determining that the more new command includes the increase instruction, the increase instruction is executed, to configure in the target
Increase the target configuration line in file.
3. VNF configuration method according to claim 2, which is characterized in that the electronic equipment is provided with Hash table, described
Hash table is used to cache the configuration file of the target VNF, and record has each configuration file of the target VNF in the Hash table
Cryptographic Hash and the corresponding sequence of hash values of each configuration file, wherein the cryptographic Hash of each configuration file passes through to the configuration
The path of file carries out Hash calculation generation, and the corresponding sequence of hash values of each configuration file includes respectively matching in the configuration file
Set capable cryptographic Hash.
4. VNF configuration method according to claim 3, which is characterized in that further include the target in the configuration message
The target store path of configuration file;And
Before the execution deletion content instruction, the method also includes:
Determine the target cryptographic Hash that whether there is the target configuration file in the Hash table;
It is not present in response to determination, reads the target configuration file from the target store path, determine that the target is matched
The cryptographic Hash of identified each configuration line is included into target sequence of hash values by the cryptographic Hash for setting each configuration line in file, will be described
Target cryptographic Hash and the target sequence of hash values are recorded to the Hash table.
5. VNF configuration method according to claim 4, which is characterized in that it is described to execute the deletion instruction, to delete
State the configuration line to be deleted in target configuration file, comprising:
The cryptographic Hash for determining the configuration line to be deleted, as the first cryptographic Hash;
It determines in the target sequence of hash values in the Hash table with the presence or absence of first cryptographic Hash;
In response to determining there are first cryptographic Hash, first cryptographic Hash in the target cryptographic Hash is deleted.
6. VNF configuration method according to claim 4, which is characterized in that it is described to execute the increase instruction, described
Increase the target configuration line in target configuration file, comprising:
The cryptographic Hash for determining the target configuration line, as the second cryptographic Hash;
It determines in the target sequence of hash values in the Hash table with the presence or absence of second cryptographic Hash;
Second cryptographic Hash is not present in response to determining, second cryptographic Hash is increased into the target sequence of hash values
In.
7. VNF configuration method according to claim 4, which is characterized in that the method also includes:
In response to detecting that the target sequence of hash values in the Hash table has change, the target Hash after changing is determined
The corresponding configuration line of each cryptographic Hash in value sequence updates the target configuration file based on identified configuration line.
8. VNF configuration method according to claim 1, which is characterized in that the configuration-direct includes the first configuration-direct
And/or second configuration-direct, wherein first configuration-direct is that the configuration executed before updating the target configuration file refers to
It enables, second configuration-direct is the configuration-direct executed after updating the target configuration file, and first configuration refers to
The function for configuring the application for running on the target VNF is enabled, it is updated that second configuration-direct is used to indicate load
Target configuration file.
9. VNF configuration method according to claim 8, which is characterized in that more new command is to described described in the execution
Target configuration file is updated, and executes the configuration-direct to configure the target VNF, comprising:
In response to the determination configuration-direct include first configuration-direct and first configuration-direct is not configured, is executed
First configuration-direct;
The more new command is executed to be updated to the target configuration file;
In response to the determination configuration-direct include second configuration-direct and second configuration-direct is not configured, is executed
Second configuration-direct.
10. a kind of virtual network function VNF configuration device, which is characterized in that applied to the electronic equipment for being deployed with virtual machine, institute
Virtual machine is stated for configuring VNF, described device includes:
Receiving unit is configured to receive the VNF configuring request of configuration center transmission, wherein include in the VNF configuring request
The configuration message of Extended Protocol based on network configuration protocol NETCONF, the Extended Protocol are supported to the configuration file of VNF
Update operation, the configuration message include the configuration-direct to target VNF and the target configuration file to the target VNF more
New command;
Configuration unit is configured to execute the more new command to be updated to the target configuration file, and described in execution
Configuration-direct is to configure the target VNF.
11. a kind of electronic equipment characterized by comprising
One or more processors;
Storage device is stored thereon with one or more programs,
When one or more of programs are executed by one or more of processors, so that one or more of processors are real
The now method as described in any in claim 1-9.
12. a kind of computer-readable medium, is stored thereon with computer program, which is characterized in that the program is executed by processor
Method of the Shi Shixian as described in any in claim 1-9.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910300651.5A CN109842530A (en) | 2019-04-15 | 2019-04-15 | VNF configuration method, device, electronic equipment and computer-readable medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910300651.5A CN109842530A (en) | 2019-04-15 | 2019-04-15 | VNF configuration method, device, electronic equipment and computer-readable medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109842530A true CN109842530A (en) | 2019-06-04 |
Family
ID=66887102
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910300651.5A Pending CN109842530A (en) | 2019-04-15 | 2019-04-15 | VNF configuration method, device, electronic equipment and computer-readable medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109842530A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111343267A (en) * | 2020-02-24 | 2020-06-26 | 深圳木成林科技有限公司 | Configuration management method and system |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20160359805A1 (en) * | 2015-06-05 | 2016-12-08 | Cisco Technology, Inc. | Addressing and managing an internal network of a virtual branch node |
CN108063735A (en) * | 2017-12-22 | 2018-05-22 | 新华三技术有限公司 | The distribution method and device of VNF clusters |
US20180212855A1 (en) * | 2015-09-08 | 2018-07-26 | At&T Intellectual Property I, L.P. | Low-Impact Proactive Monitoring of Customer Access to Virtualized Network Elements in a Cloud Platform |
CN108650144A (en) * | 2018-08-27 | 2018-10-12 | 郑州云海信息技术有限公司 | A kind of management method and device of Virtual NE |
US20190028350A1 (en) * | 2017-07-20 | 2019-01-24 | Cisco Technology, Inc. | Dynamic and customizable virtual network functions |
US20190097889A1 (en) * | 2017-09-27 | 2019-03-28 | Intel Corporation | Interworking of legacy appliances in virtualized networks |
-
2019
- 2019-04-15 CN CN201910300651.5A patent/CN109842530A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20160359805A1 (en) * | 2015-06-05 | 2016-12-08 | Cisco Technology, Inc. | Addressing and managing an internal network of a virtual branch node |
US20180212855A1 (en) * | 2015-09-08 | 2018-07-26 | At&T Intellectual Property I, L.P. | Low-Impact Proactive Monitoring of Customer Access to Virtualized Network Elements in a Cloud Platform |
US20190028350A1 (en) * | 2017-07-20 | 2019-01-24 | Cisco Technology, Inc. | Dynamic and customizable virtual network functions |
US20190097889A1 (en) * | 2017-09-27 | 2019-03-28 | Intel Corporation | Interworking of legacy appliances in virtualized networks |
CN108063735A (en) * | 2017-12-22 | 2018-05-22 | 新华三技术有限公司 | The distribution method and device of VNF clusters |
CN108650144A (en) * | 2018-08-27 | 2018-10-12 | 郑州云海信息技术有限公司 | A kind of management method and device of Virtual NE |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111343267A (en) * | 2020-02-24 | 2020-06-26 | 深圳木成林科技有限公司 | Configuration management method and system |
CN111343267B (en) * | 2020-02-24 | 2022-08-12 | 深圳木成林科技有限公司 | Configuration management method and system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9525592B2 (en) | Client/server network environment setup method and system | |
CN110096424B (en) | Test processing method and device, electronic equipment and storage medium | |
CN108234641A (en) | Data read-write method and device based on distributed consensus protocol realization | |
CN108228818A (en) | Web page resources loading method and device, electronic equipment and storage medium | |
CN109697075A (en) | File updating method, system and device | |
CN103475682B (en) | File transfer method and file transfer equipment | |
US10592312B2 (en) | Message oriented middleware with integrated rules engine | |
CN108282529A (en) | Publication and system, the method and apparatus for subscribing to data | |
CN109564527A (en) | The security configuration of cloud computing node | |
CN110519379A (en) | Request processing method and equipment based on micro services | |
US9158520B2 (en) | Development of platform independent applications | |
CN108733720A (en) | The on-line testing method and check system of the SQL query of multiple database type | |
CN107835181A (en) | Right management method, device, medium and the electronic equipment of server cluster | |
CN109104368B (en) | Connection request method, device, server and computer readable storage medium | |
CN113709810A (en) | Method, device and medium for configuring network service quality | |
CN108804121A (en) | Method for edition management, device, medium in distributed system and electronic equipment | |
CN110460584A (en) | Access request processing method, device, electronic equipment and computer-readable medium | |
CN112748962B (en) | Application loading method, device, electronic equipment and computer readable medium | |
CN108399046A (en) | File operation requests treating method and apparatus | |
CN109842530A (en) | VNF configuration method, device, electronic equipment and computer-readable medium | |
CN109491721A (en) | Method and apparatus for load information | |
US11924295B2 (en) | Serving assets in a networked environment | |
CN111459506A (en) | Deployment method, device, medium and electronic equipment of deep learning platform cluster | |
CN106445700B (en) | A kind of URL matching process and device | |
CN112181470B (en) | Patch deployment method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190604 |
|
RJ01 | Rejection of invention patent application after publication |