CN109842530A - VNF configuration method, device, electronic equipment and computer-readable medium - Google Patents

VNF configuration method, device, electronic equipment and computer-readable medium Download PDF

Info

Publication number
CN109842530A
CN109842530A CN201910300651.5A CN201910300651A CN109842530A CN 109842530 A CN109842530 A CN 109842530A CN 201910300651 A CN201910300651 A CN 201910300651A CN 109842530 A CN109842530 A CN 109842530A
Authority
CN
China
Prior art keywords
configuration
target
vnf
direct
mentioned
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910300651.5A
Other languages
Chinese (zh)
Inventor
陈佳业
苑中梁
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Netease Hangzhou Network Co Ltd
Original Assignee
Netease Hangzhou Network Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Netease Hangzhou Network Co Ltd filed Critical Netease Hangzhou Network Co Ltd
Priority to CN201910300651.5A priority Critical patent/CN109842530A/en
Publication of CN109842530A publication Critical patent/CN109842530A/en
Pending legal-status Critical Current

Links

Landscapes

  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The embodiment of the present application discloses VNF configuration method, device, electronic equipment and computer-readable medium.The embodiment of this method includes: the VNF configuring request for receiving configuration center and sending, wherein, it include the configuration message of the Extended Protocol based on NETCONF in the VNF configuring request, the Extended Protocol supports the update to the configuration file of VNF to operate, which includes the more new command of the configuration-direct to target VNF and the target configuration file to target VNF;The more new command is executed to be updated to the target configuration file, and executes the configuration-direct to configure target VNF.The embodiment supports configuration of the Extended Protocol based on NETCONF to VNF, reduces the complexity of the operation of configuration center.

Description

VNF configuration method, device, electronic equipment and computer-readable medium
Technical field
The invention relates to field of computer technology, and in particular to VNF configuration method, device, electronic equipment and meter Calculation machine readable medium.
Background technique
NFV (Network function virtualization, network function virtualization) refers to by using x86 etc. General purpose hardware and virtualization technology, to carry very multi-functional software processing.To reduce the equipment cost of network valuableness, Network equipment function is set to be no longer dependent on specialized hardware, resource sufficiently can flexibly be shared.Wherein, VNF (Virtual Network function, virtual network function) be NFV core, refer to software form realize originally by all kinds of The function (such as firewall) that network hardware is realized.VNF is configurable on one or more virtual machines, and virtual machine may operate at In the electronic equipments such as server, interaction machine, memory.
Existing mode is usually to be configured in the middle part of virtual machine (such as x86 virtual machine) by modes such as script, proprietary protocols The VNF of administration, so that VNF provides required network function.However, since usual hardware device uses NETCONF (Network Configuration Protocol, network configuration protocol) configuration, thus, VNF is configured by modes such as script, proprietary protocols, Cause the configuration mode to hardware device with VNF different, causes the complexity of operation performed by configuration center larger.
Summary of the invention
The embodiment of the present application proposes VNF configuration method, device, electronic equipment and computer-readable medium, existing to solve There is the larger technical problem of the complexity of operation performed by configuration center in technology.
In a first aspect, the embodiment of the present application provides a kind of VNF configuration method, set applied to the electronics for being deployed with virtual machine Standby, virtual machine is for configuring VNF, this method comprises: receiving the VNF configuring request that configuration center is sent, wherein VNF configuration is asked It include the configuration message of the Extended Protocol based on network configuration protocol NETCONF in asking, Extended Protocol supports the configuration text to VNF The update of part operates, and configuration message includes referring to the configuration-direct of target VNF and to the update of the target configuration file of target VNF It enables;More new command is executed to be updated to target configuration file, and executes configuration-direct to configure target VNF.
Second aspect, the embodiment of the present application provide a kind of VNF configuration device, set applied to the electronics for being deployed with virtual machine Standby, for virtual machine for configuring VNF, device includes: receiving unit, is configured to receive the VNF configuring request of configuration center transmission, It wherein, include the configuration message of the Extended Protocol based on network configuration protocol NETCONF, Extended Protocol branch in VNF configuring request The operation of the update to the configuration file of VNF is held, configuration message includes the configuration-direct to target VNF and the target to target VNF The more new command of configuration file;Configuration unit is configured to execute more new command to be updated to target configuration file, and holds Row configuration-direct is to configure target VNF.
The third aspect, the embodiment of the present application provide a kind of electronic equipment, comprising: one or more processors;Storage dress Set, be stored thereon with one or more programs, when one or more programs are executed by one or more processors so that one or Multiple processors realize the method such as any embodiment in above-mentioned first aspect.
Fourth aspect, the embodiment of the present application provide a kind of computer-readable medium, are stored thereon with computer program, should The method such as any embodiment in above-mentioned first aspect is realized when program is executed by processor.
VNF configuration method, device, electronic equipment and computer-readable medium provided by the embodiments of the present application, pass through reception The VNF configuring request that configuration center is sent, so as to obtain the matching based on NETCONF Extended Protocol in VNF configuring request Set message.Then by executing the more new command in configuration message, so as to be updated to target configuration file, Yi Jitong The configuration-direct executed in configuration message is crossed, so as to configure target VNF.Since the Extended Protocol of NETCONF is supported to VNF Configuration file update operation, it is thus possible to realize configuration of the Extended Protocol based on NETCONF to VNF.Due to usually hard Part equipment is configured using NETCONF, and the Extended Protocol of NETCONF supports the configuration to VNF, and configuration center can be with as a result, Hardware device is carried out using unified agreement and configuration mode and VNF is configured, and reduces the complexity of the operation of configuration center.
Detailed description of the invention
By reading a detailed description of non-restrictive embodiments in the light of the attached drawings below, the application's is other Feature, objects and advantages will become more apparent upon:
Fig. 1 is the flow chart according to one embodiment of the VNF configuration method of the application;
Fig. 2 is the flow chart according to another embodiment of the VNF configuration method of the application;
Fig. 3 is the structural schematic diagram according to one embodiment of the VNF configuration device of the application;
Fig. 4 is adapted for the structural schematic diagram for the computer system for realizing the electronic equipment of the embodiment of the present application.
Specific embodiment
The application is described in further detail with reference to the accompanying drawings and examples.It is understood that this place is retouched The specific embodiment stated is used only for explaining related invention, rather than the restriction to the invention.It also should be noted that in order to Convenient for description, part relevant to related invention is illustrated only in attached drawing.
It should be noted that in the absence of conflict, the features in the embodiments and the embodiments of the present application can phase Mutually combination.The application is described in detail below with reference to the accompanying drawings and in conjunction with the embodiments.
Referring to FIG. 1, it illustrates the processes 100 according to one embodiment of the VNF configuration method of the application.The VNF Configuration method, comprising the following steps:
Step 101, the VNF configuring request that configuration center is sent is received.
In the present embodiment, the execution of VNF (Virtual network function, virtual network function) configuration method Main body (such as being deployed with the electronic equipment of virtual machine, above-mentioned virtual machine is used to configure VNF) can receive configuration center transmission VNF configuring request.Wherein, above-mentioned configuration center can be one for configuring network element (such as VNF, hardware net equipment etc.) Or multiple servers.
It herein, may include based on NETCONF (Network Configuration in above-mentioned VNF configuring request Protocol, network configuration protocol) Extended Protocol configuration message.Above-mentioned configuration message may include matching to target VNF Set the more new command of instruction and the target configuration file to above-mentioned target VNF.Wherein, above-mentioned target VNF can be currently wait match The VNF set.Above-mentioned target configuration file is the configuration file of above-mentioned target VNF.
In practice, above-mentioned configuration-direct can serve to indicate that the configuration to target VNF.For example, above-mentioned configuration-direct can be with It also may include indicating that reading target again matches including indicating that above-mentioned executing subject configures certain softwares to execute the instruction of required function Set the instruction etc. of file.Above-mentioned more new command, which can serve to indicate that, to be increased the content in target configuration file, is deleted Modification.
Herein, above-mentioned Extended Protocol can support the update to the configuration file of VNF to operate.In practice, above-mentioned extension association View can be on the basis of NETCONF, expand the operation being updated to the configuration file of VNF, that is, NETCONF's On the basis of define the message structure of the configuration message (conf) that VNF is communicated with configuration center.
As an example, above-mentioned message structure can be according to as follows:
Wherein, Configuration of vnf is the title of target configuration file;Id can be used for unique identification, and this matches It sets message and shows this configuration message request purposes;Path can be worth the path of target configuration file;Mode can refer to target The update mode (such as incremental update or full dose update etc.) of configuration file;Pre-exec-rules, which can refer to, to be needed to update The configuration-direct executed before target configuration file;Old-persist-rules can refer to that needs are deleted from target configuration file Content;New-persist-rules can refer to needs increased content in target configuration file;post-exec-rules It can refer to the configuration-direct executed after updating target configuration file.
It should be noted that above-mentioned Struct expression structure, string expression array, list expression list, Struct, String, list are common data type, are not repeated herein.
In practice, the RPC (Remote that can be communicated with above-mentioned executing subject using pre-set configuration center Procedure Call, remote procedure call) the above-mentioned VNF configuring request of message format transmission.In above-mentioned message format, it can wrap Include RPC interface, configuration message, return instruction etc..
Step 102, more new command is executed to be updated to target configuration file, and executes configuration-direct to configure target VNF。
In the present embodiment, the content in target configuration file is increased since above-mentioned more new command can serve to indicate that The modification such as add, delete, and, above-mentioned configuration-direct can serve to indicate that the configuration to target VNF, therefore, above-mentioned executing subject More new command can be executed to be updated to target configuration file, and execute configuration-direct to configure target VNF.
In some optional implementations of the present embodiment, above-mentioned configuration-direct may include the first configuration-direct and/ Or second configuration-direct.Wherein, above-mentioned first configuration-direct can be the configuration executed before updating above-mentioned target configuration file Instruction.Above-mentioned second configuration-direct is the configuration-direct executed after updating above-mentioned target configuration file.Above-mentioned first configuration Instruction can be used for configure run on above-mentioned target VNF application (such as existing application Quagga, Netfilter, OpenvSwitch etc.) to realize required function.Above-mentioned second configuration-direct is used to indicate the updated target configuration text of load Part.
Optionally, in above-mentioned implementation, above-mentioned executing subject can execute following steps: match in response to determination is above-mentioned Setting instruction includes above-mentioned first configuration-direct, executes the first configuration-direct;Above-mentioned more new command is then executed to above-mentioned target Configuration file is updated;Include finally above-mentioned second configuration-direct in response to the above-mentioned configuration-direct of determination, executes above-mentioned second Configuration-direct, to realize the configuration of target VNF.
Optionally, in above-mentioned implementation, above-mentioned executing subject can also be before every execution configuration-direct, first really Whether the fixed configuration-direct had been configured.Specifically, following steps can be executed: includes in response to the above-mentioned configuration-direct of determination Above-mentioned first configuration-direct and above-mentioned first configuration-direct is not configured executes above-mentioned first configuration-direct;It then executes above-mentioned More new command is to be updated above-mentioned target configuration file;It include finally above-mentioned second matching in response to the above-mentioned configuration-direct of determination It sets instruction and above-mentioned second configuration-direct is not configured, execute above-mentioned second configuration-direct.
It should be noted that then can no longer execute first configuration determining that above-mentioned first configuration-direct has been configured Instruction.Similarly, it is determining that above-mentioned second configuration-direct has been configured, then can no longer execute second configuration-direct.In practice, The structure that configuration-direct can be preset makes it first check whether to be configured, if configured mistake, abandons executing. Since some do not support idempotent (i.e. repeatedly configuration is identical as the result once configured) using (such as Netfilter), cause in weight After multiple configuration-direct is repeatedly issued, it will lead to configuration and mistake occur.For example, being advised since firewall rule has a large amount of repetitions Then, firewall rule is caused to occur abnormal, it cannot be it is anticipated that completing access configuration task.As a result, by executing configuration every It before instruction, determines whether the configuration-direct had been configured, in the case where determining be not configured, executes the configuration-direct, it can To realize the idempotence of configuration-direct.
In some optional implementations of the present embodiment, above-mentioned target configuration file can be each with behavior unit Row is a configuration line.At this point it is possible to carry out the update of target configuration file using incremental update mode.It is above-mentioned in practice More new command may include deleting instruction and/or increasing to instruct.Above-mentioned deletion instruction, which is used to indicate, deletes above-mentioned target configuration text Configuration line to be deleted in part.Above-mentioned increase instruction is used to indicate the increase target configuration line in above-mentioned target configuration file.This When, above-mentioned executing subject can execute above-mentioned more new command as follows to be updated to above-mentioned target configuration file: Firstly, including that above-mentioned deletion instructs in response to the above-mentioned more new command of determination, above-mentioned deletion instruction is executed, is matched with deleting above-mentioned target Set the configuration line to be deleted in file.Then, include that above-mentioned increase instructs in response to the above-mentioned more new command of determination, execute above-mentioned increasing Add instruction, to increase above-mentioned target configuration line in above-mentioned target configuration file.
In some optional implementations of the present embodiment, what above-mentioned target configuration file can also be updated using full dose Mode is updated.At this point, if desired carrying out content alteration to target configuration file, then can directly be configured using new target File is replaced original target configuration file.
The method provided by the above embodiment of the application, the VNF configuring request sent by receiving configuration center, so as to Enough obtain the configuration message based on NETCONF Extended Protocol in VNF configuring request.Then by executing in configuration message more New command, so as to be updated to above-mentioned target configuration file, and by executing the configuration-direct in configuration message, from And above-mentioned target VNF can be configured.Since the Extended Protocol of NETCONF supports the update to the configuration file of VNF to operate, thus It can be realized configuration of the Extended Protocol based on NETCONF to VNF.Since usual hardware device is configured using NETCONF, and The Extended Protocol of NETCONF supports the configuration to VNF, and configuration center can use unified agreement and configuration mode as a result, Hardware device and VNF configuration are carried out, the complexity of the operation of configuration center is reduced.
With further reference to Fig. 2, it illustrates the processes 200 of another embodiment of VNF configuration method.The configuration side VNF The process 200 of method, comprising the following steps:
Step 201, the VNF configuring request that configuration center is sent is received.
In the present embodiment, the executing subject of VNF configuration method (such as is deployed with the electronic equipment of virtual machine, above-mentioned void Quasi- machine is used to configure VNF) it can receive the VNF configuring request that configuration center is sent.Wherein, above-mentioned configuration center, which can be, is used for Configure one or more servers of network element (such as VNF, hardware net equipment etc.).
It herein, may include the configuration of the Extended Protocol based on network configuration protocol NETCONF in above-mentioned VNF configuring request Message.Above-mentioned Extended Protocol can support the update to the configuration file of VNF to operate.Above-mentioned configuration message may include to target The more new command of the configuration-direct of VNF and the target configuration file to above-mentioned target VNF.
Herein, above-mentioned more new command may include deleting instruction and/or increasing to instruct.Above-mentioned deletion instruction, which is used to indicate, deletes Except the configuration line to be deleted in above-mentioned target configuration file.Above-mentioned increase instruction is used to indicate to be increased in above-mentioned target configuration file Add target configuration line.
Herein, above-mentioned configuration-direct may include the first configuration-direct and/or the second configuration-direct.Wherein, above-mentioned first Configuration-direct can be the configuration-direct executed before updating above-mentioned target configuration file.Above-mentioned second configuration-direct is to update The configuration-direct executed after above-mentioned target configuration file.Above-mentioned first configuration-direct, which can be used for configuring, runs on above-mentioned target The application of VNF is to realize required function.Above-mentioned second configuration-direct is used to indicate the updated target configuration file of load.
Step 202, it in response to determining that configuration-direct includes the first configuration-direct and the first configuration-direct is not configured, executes First configuration-direct.
It in the present embodiment, include above-mentioned first configuration-direct and above-mentioned first configuration in response to the above-mentioned configuration-direct of determination Instruction is not configured, and above-mentioned executing subject can execute above-mentioned first configuration-direct, to update to above-mentioned target configuration file Configuration runs on the application of above-mentioned target VNF before, to realize required function.
Step 203, it in response to determining that more new command includes deleting instruction, executes and deletes instruction, text is configured with delete target Configuration line to be deleted in part.
In the present embodiment, in response to determining that more new command includes deleting instruction, above-mentioned executing subject can execute above-mentioned Instruction is deleted, to delete the above-mentioned configuration line to be deleted in above-mentioned target configuration file.
In the present embodiment, Hash table can be set in above-mentioned executing subject.Above-mentioned Hash table can be used on caching State the configuration file (can be one or more) of target VNF.Record has each configuration text of above-mentioned target VNF in above-mentioned Hash table The cryptographic Hash of part and the corresponding sequence of hash values of each configuration file.Wherein, the cryptographic Hash of each configuration file can be by right The path of the configuration file carries out Hash calculation generation (such as being input to hash function, obtain cryptographic Hash).Each configuration text The corresponding sequence of hash values of part may include the cryptographic Hash of each configuration line in the configuration file.
Above-mentioned executing subject can delete the configuration line to be deleted in above-mentioned target configuration file as follows:
The first step determines the cryptographic Hash of above-mentioned configuration line to be deleted, as the first cryptographic Hash.In practice, it can be input to Pre-set hash function obtains the first cryptographic Hash.
Second step determines in the above-mentioned target sequence of hash values in above-mentioned Hash table with the presence or absence of above-mentioned first cryptographic Hash.
Third step, in response to determining there are above-mentioned first cryptographic Hash, above-mentioned first deleted in above-mentioned target cryptographic Hash is breathed out Uncommon value.May be implemented in and determine in above-mentioned target configuration file there are in the case where above-mentioned configuration line to be deleted as a result, by it is above-mentioned to Configuration line is deleted to delete, thus, it avoids that target configuration file is caused to repeat to update when repeatedly issuing identical configuration message, keeps away Exempt to lead to CPU (Central Processing Unit, central processing unit) and magnetic disc i/o due to largely reading and writing configuration file The loss of (Input/Output, input/output).
In some optional implementations of the present embodiment, before executing above-mentioned deletion content instruction, above-mentioned execution Main body can also determine the target cryptographic Hash that whether there is above-mentioned target configuration file in above-mentioned Hash table.It is not deposited in response to determination , it is believed that uncached target configuration file, at this point it is possible to read above-mentioned target configuration text from above-mentioned target store path Part determines the cryptographic Hash of each configuration line in above-mentioned target configuration file.To which the cryptographic Hash of identified each configuration line is included into Target sequence of hash values.In turn, above-mentioned target cryptographic Hash and above-mentioned target sequence of hash values are recorded to above-mentioned Hash table.
Step 204, it in response to determining that more new command includes increasing instruction, executes and increases instruction, in target configuration file Middle increase target configuration line.
In the present embodiment, in response to determining that more new command includes increasing instruction, above-mentioned executing subject can execute above-mentioned Increase instruction, to increase above-mentioned target configuration line in above-mentioned target configuration file.
Above-mentioned executing subject can increase above-mentioned target configuration line in above-mentioned target configuration file as follows:
The first step determines the cryptographic Hash of above-mentioned target configuration line, as the second cryptographic Hash.In practice, it can be input to pre- The hash function being first arranged obtains the first cryptographic Hash.
Second step determines in the above-mentioned target sequence of hash values in above-mentioned Hash table with the presence or absence of above-mentioned second cryptographic Hash.
Third step is not present above-mentioned second cryptographic Hash in response to determining, above-mentioned second cryptographic Hash is increased to above-mentioned target In sequence of hash values.It is may be implemented in determining above-mentioned target configuration file as a result, in the case where above-mentioned target configuration line is not present, Increase above-mentioned target configuration line, thus, it avoids that target configuration file is caused to repeat more when repeatedly issuing identical configuration message Newly, avoiding leads to the loss of CPU and magnetic disc i/o due to largely reading and writing configuration file.
In the above-mentioned increase instruction of above-mentioned execution, after increasing above-mentioned target configuration line in above-mentioned target configuration file, The above method further include:
In some optional implementations of the present embodiment, above-mentioned executing subject is in response to detecting in above-mentioned Hash table Above-mentioned target sequence of hash values there is change, each cryptographic Hash is corresponding matches in the target sequence of hash values after can determining change Row is set, and above-mentioned target configuration file is updated based on identified configuration line.In practice, Hash table modification can be previously provided with Above-mentioned Hash table can be modified label and be set as by label after the target sequence of hash values in Hash table has change "True".It, can be by judging that current Hash table modification marks whether to come true for " True " after updating instruction execution Fixed above-mentioned target sequence of hash values is with the presence or absence of change.
Step 205, it in response to determining that configuration-direct includes the second configuration-direct and the second configuration-direct is not configured, executes Second configuration-direct.
It in the present embodiment, include above-mentioned second configuration-direct and above-mentioned second configuration in response to the above-mentioned configuration-direct of determination Instruction is not configured, and above-mentioned executing subject can execute above-mentioned second configuration-direct, to update to above-mentioned target configuration file Updated target configuration file is loaded later.
From figure 2 it can be seen that compared with the corresponding embodiment of Fig. 1, the process of the VNF configuration method in the present embodiment 200 relate to based on update Hash table come the step of updating target configuration file.The scheme of the present embodiment description can be kept away as a result, Exempt from that target configuration file is caused to repeat to update when repeatedly issuing identical configuration message, avoids due to largely reading and writing configuration text Part leads to the loss of CPU and magnetic disc i/o.
With further reference to Fig. 3, as the realization to method shown in above-mentioned each figure, this application provides a kind of VNF configurations to fill The one embodiment set, the Installation practice is corresponding with embodiment of the method shown in FIG. 1, which specifically can be applied to respectively Kind is deployed with the electronic equipment of virtual machine, and the virtual machine is for configuring VNF.
As shown in figure 3, VNF configuration device 300 described in the present embodiment includes: receiving unit 301, it is configured to receive and matches Set the VNF configuring request of center transmission, wherein include the expansion based on network configuration protocol NETCONF in above-mentioned VNF configuring request The configuration message of agreement is opened up, above-mentioned Extended Protocol supports the update to the configuration file of VNF to operate, and above-mentioned configuration message includes pair The more new command of the configuration-direct of target VNF and the target configuration file to above-mentioned target VNF;Configuration unit 302, is configured to Above-mentioned more new command is executed to be updated to above-mentioned target configuration file, and executes above-mentioned configuration-direct to configure above-mentioned target VNF。
In some optional implementations of the present embodiment, above-mentioned more new command includes deleting instruction and/or increasing to refer to It enables, above-mentioned deletion instruction is used to indicate the configuration line to be deleted deleted in above-mentioned target configuration file, and above-mentioned increase instruction is used for Instruction increases target configuration line in above-mentioned target configuration file;And above-mentioned configuration unit 302, comprising: removing module is (in figure It is not shown), it is configured in response to determine that above-mentioned more new command includes above-mentioned deletion instruction, above-mentioned deletion instruction is executed, to delete Except the configuration line to be deleted in above-mentioned target configuration file;Increase module (not shown), is configured in response to determine Stating more new command includes above-mentioned increase instruction, above-mentioned increase instruction is executed, to increase above-mentioned mesh in above-mentioned target configuration file Mark configuration line.
In some optional implementations of the present embodiment, above-mentioned electronic equipment is provided with Hash table, above-mentioned Hash table For caching the configuration file of above-mentioned target VNF, record has the Hash of each configuration file of above-mentioned target VNF in above-mentioned Hash table It is worth sequence of hash values corresponding with each configuration file, wherein the cryptographic Hash of each configuration file passes through to the configuration file Path carries out Hash calculation generation, and the corresponding sequence of hash values of each configuration file includes each configuration line in the configuration file Cryptographic Hash.
It further include above-mentioned target configuration file in above-mentioned configuration message in some optional implementations of the present embodiment Target store path;And above-mentioned apparatus further include: determination unit (not shown) is configured to determine above-mentioned Hash It whether there is the target cryptographic Hash of above-mentioned target configuration file in table;Recording unit (not shown), is configured in response to Determination is not present, and reads above-mentioned target configuration file from above-mentioned target store path, determines each in above-mentioned target configuration file The cryptographic Hash of identified each configuration line is included into target sequence of hash values by the cryptographic Hash of configuration line, by above-mentioned target cryptographic Hash It records with above-mentioned target sequence of hash values to above-mentioned Hash table.
In some optional implementations of the present embodiment, above-mentioned removing module is further configured to: being determined above-mentioned The cryptographic Hash of configuration line to be deleted, as the first cryptographic Hash;Determining in the above-mentioned target sequence of hash values in above-mentioned Hash table is It is no that there are above-mentioned first cryptographic Hash;In response to determining that there are above-mentioned first cryptographic Hash, delete above-mentioned in above-mentioned target cryptographic Hash First cryptographic Hash.
In some optional implementations of the present embodiment, above-mentioned increase module is further configured to: determining above-mentioned The cryptographic Hash of target configuration line, as the second cryptographic Hash;Determine in the above-mentioned target sequence of hash values in above-mentioned Hash table whether There are above-mentioned second cryptographic Hash;Above-mentioned second cryptographic Hash is not present in response to determining, above-mentioned second cryptographic Hash is increased to above-mentioned In target sequence of hash values.
In some optional implementations of the present embodiment, above-mentioned apparatus further include: updating unit (not shown), It is configured in response to detect that the above-mentioned target sequence of hash values in above-mentioned Hash table has change, the target after determining change The corresponding configuration line of each cryptographic Hash in sequence of hash values updates above-mentioned target configuration file based on identified configuration line.
In some optional implementations of the present embodiment, above-mentioned configuration-direct includes the first configuration-direct and/or the Two configuration-directs, wherein above-mentioned first configuration-direct is the configuration-direct executed before updating above-mentioned target configuration file, above-mentioned Second configuration-direct is the configuration-direct executed after updating above-mentioned target configuration file, and above-mentioned first configuration-direct is for matching The function of running on the application of above-mentioned target VNF is set, above-mentioned second configuration-direct is used to indicate the updated target configuration of load File.
In some optional implementations of the present embodiment, above-mentioned configuration unit 302, comprising: the first configuration module (figure In be not shown), be configured in response to determine that above-mentioned configuration-direct includes above-mentioned first configuration-direct and above-mentioned first configuration refers to Order is not configured, executes above-mentioned first configuration-direct;Update module is configured to execute above-mentioned more new command to above-mentioned target Configuration file is updated;Second configuration module (not shown) is configured in response to determine that above-mentioned configuration-direct includes Above-mentioned second configuration-direct and above-mentioned second configuration-direct is not configured executes above-mentioned second configuration-direct.
The device provided by the above embodiment of the application, the VNF configuring request sent by receiving configuration center, so as to Enough obtain the configuration message based on NETCONF Extended Protocol in VNF configuring request.Then by executing in configuration message more New command, so as to be updated to above-mentioned target configuration file, and by executing the configuration-direct in configuration message, from And above-mentioned target VNF can be configured.Since the Extended Protocol of NETCONF supports the update to the configuration file of VNF to operate, thus It can be realized configuration of the Extended Protocol based on NETCONF to VNF.Since usual hardware device is configured using NETCONF, and The Extended Protocol of NETCONF supports the configuration to VNF, and configuration center can use unified agreement and configuration mode as a result, Hardware device and VNF configuration are carried out, the complexity of the operation of configuration center is reduced.
Below with reference to Fig. 4, it illustrates the computer systems 400 for the electronic equipment for being suitable for being used to realize the embodiment of the present application Structural schematic diagram.Electronic equipment shown in Fig. 4 is only an example, function to the embodiment of the present application and should not use model Shroud carrys out any restrictions.
As shown in figure 4, computer system 400 includes central processing unit (CPU) 401, it can be read-only according to being stored in Program in memory (ROM) 402 or be loaded into the program in random access storage device (RAM) 403 from storage section 408 and Execute various movements appropriate and processing.In RAM 403, also it is stored with system 400 and operates required various programs and data. CPU 401, ROM 402 and RAM 403 are connected with each other by bus 404.Input/output (I/O) interface 405 is also connected to always Line 404.
I/O interface 405 is connected to lower component: the importation 406 including keyboard, mouse etc.;Including such as liquid crystal Show the output par, c 407 of device (LCD) etc. and loudspeaker etc.;Storage section 408 including hard disk etc.;And including such as LAN The communications portion 409 of the network interface card of card, modem etc..Communications portion 409 is executed via the network of such as internet Communication process.Driver 410 is also connected to I/O interface 405 as needed.Detachable media 411, such as disk, CD, magneto-optic Disk, semiconductor memory etc. are mounted on as needed on driver 410, in order to from the computer program root read thereon According to needing to be mounted into storage section 408.
Particularly, in accordance with an embodiment of the present disclosure, it may be implemented as computer above with reference to the process of flow chart description Software program.For example, embodiment of the disclosure includes a kind of computer program product comprising be carried on computer-readable medium On computer program, which includes the program code for method shown in execution flow chart.In such reality It applies in example, which can be downloaded and installed from network by communications portion 409, and/or from detachable media 411 are mounted.When the computer program is executed by central processing unit (CPU) 401, limited in execution the present processes Above-mentioned function.It should be noted that computer-readable medium described herein can be computer-readable signal media or Computer readable storage medium either the two any combination.Computer readable storage medium for example can be --- but Be not limited to --- electricity, magnetic, optical, electromagnetic, infrared ray or semiconductor system, device or device, or any above combination. The more specific example of computer readable storage medium can include but is not limited to: have one or more conducting wires electrical connection, Portable computer diskette, hard disk, random access storage device (RAM), read-only memory (ROM), erasable type may be programmed read-only deposit Reservoir (EPROM or flash memory), optical fiber, portable compact disc read-only memory (CD-ROM), light storage device, magnetic memory Part or above-mentioned any appropriate combination.In this application, computer readable storage medium, which can be, any include or stores The tangible medium of program, the program can be commanded execution system, device or device use or in connection.And In the application, computer-readable signal media may include in a base band or the data as the propagation of carrier wave a part are believed Number, wherein carrying computer-readable program code.The data-signal of this propagation can take various forms, including but not It is limited to electromagnetic signal, optical signal or above-mentioned any appropriate combination.Computer-readable signal media can also be computer Any computer-readable medium other than readable storage medium storing program for executing, the computer-readable medium can send, propagate or transmit use In by the use of instruction execution system, device or device or program in connection.Include on computer-readable medium Program code can transmit with any suitable medium, including but not limited to: wireless, electric wire, optical cable, RF etc., Huo Zheshang Any appropriate combination stated.
Flow chart and block diagram in attached drawing are illustrated according to the system of the various embodiments of the application, method and computer journey The architecture, function and operation in the cards of sequence product.In this regard, each box in flowchart or block diagram can generation A part of one module, program segment or code of table, a part of the module, program segment or code include one or more use The executable instruction of the logic function as defined in realizing.It should also be noted that in some implementations as replacements, being marked in box The function of note can also occur in a different order than that indicated in the drawings.For example, two boxes succeedingly indicated are actually It can be basically executed in parallel, they can also be executed in the opposite order sometimes, and this depends on the function involved.Also it to infuse Meaning, the combination of each box in block diagram and or flow chart and the box in block diagram and or flow chart can be with holding The dedicated hardware based system of functions or operations as defined in row is realized, or can use specialized hardware and computer instruction Combination realize.
Being described in unit involved in the embodiment of the present application can be realized by way of software, can also be by hard The mode of part is realized.Described unit also can be set in the processor, wherein the title of these units is in certain situation Under do not constitute restriction to the unit itself.
As on the other hand, present invention also provides a kind of computer-readable medium, which be can be Included in device described in above-described embodiment;It is also possible to individualism, and without in the supplying device.Above-mentioned calculating Machine readable medium carries one or more program, when said one or multiple programs are executed by the device, so that should Device: the VNF configuring request that configuration center is sent is received;The more new command is executed to be updated to the target configuration file, And the configuration-direct is executed to configure target VNF.
Above description is only the preferred embodiment of the application and the explanation to institute's application technology principle.Those skilled in the art Member is it should be appreciated that invention scope involved in the application, however it is not limited to technology made of the specific combination of above-mentioned technical characteristic Scheme, while should also cover in the case where not departing from foregoing invention design, it is carried out by above-mentioned technical characteristic or its equivalent feature Any combination and the other technical solutions formed.Such as features described above has similar function with (but being not limited to) disclosed herein Can technical characteristic replaced mutually and the technical solution that is formed.

Claims (12)

1. a kind of virtual network function VNF configuration method, which is characterized in that applied to the electronic equipment for being deployed with virtual machine, institute Virtual machine is stated for configuring VNF, which comprises
Receive the VNF configuring request that configuration center is sent, wherein include being based on network configuration protocol in the VNF configuring request The configuration message of the Extended Protocol of NETCONF, the Extended Protocol supports the update to the configuration file of VNF to operate, described to match Set the more new command that message includes the configuration-direct to target VNF and the target configuration file to the target VNF;
The more new command is executed to be updated to the target configuration file, and it is described to configure to execute the configuration-direct Target VNF.
2. VNF configuration method according to claim 1, which is characterized in that the more new command include delete instruction and/or Increase instruction, the configuration line to be deleted deleting instruction and being used to indicate in the deletion target configuration file, the increase refers to Order is used to indicate the increase target configuration line in the target configuration file;And
More new command described in the execution is to be updated the target configuration file, comprising:
In response to determining that the more new command includes the deletion instruction, the deletion instruction is executed, is matched with deleting the target Set the configuration line to be deleted in file;
In response to determining that the more new command includes the increase instruction, the increase instruction is executed, to configure in the target Increase the target configuration line in file.
3. VNF configuration method according to claim 2, which is characterized in that the electronic equipment is provided with Hash table, described Hash table is used to cache the configuration file of the target VNF, and record has each configuration file of the target VNF in the Hash table Cryptographic Hash and the corresponding sequence of hash values of each configuration file, wherein the cryptographic Hash of each configuration file passes through to the configuration The path of file carries out Hash calculation generation, and the corresponding sequence of hash values of each configuration file includes respectively matching in the configuration file Set capable cryptographic Hash.
4. VNF configuration method according to claim 3, which is characterized in that further include the target in the configuration message The target store path of configuration file;And
Before the execution deletion content instruction, the method also includes:
Determine the target cryptographic Hash that whether there is the target configuration file in the Hash table;
It is not present in response to determination, reads the target configuration file from the target store path, determine that the target is matched The cryptographic Hash of identified each configuration line is included into target sequence of hash values by the cryptographic Hash for setting each configuration line in file, will be described Target cryptographic Hash and the target sequence of hash values are recorded to the Hash table.
5. VNF configuration method according to claim 4, which is characterized in that it is described to execute the deletion instruction, to delete State the configuration line to be deleted in target configuration file, comprising:
The cryptographic Hash for determining the configuration line to be deleted, as the first cryptographic Hash;
It determines in the target sequence of hash values in the Hash table with the presence or absence of first cryptographic Hash;
In response to determining there are first cryptographic Hash, first cryptographic Hash in the target cryptographic Hash is deleted.
6. VNF configuration method according to claim 4, which is characterized in that it is described to execute the increase instruction, described Increase the target configuration line in target configuration file, comprising:
The cryptographic Hash for determining the target configuration line, as the second cryptographic Hash;
It determines in the target sequence of hash values in the Hash table with the presence or absence of second cryptographic Hash;
Second cryptographic Hash is not present in response to determining, second cryptographic Hash is increased into the target sequence of hash values In.
7. VNF configuration method according to claim 4, which is characterized in that the method also includes:
In response to detecting that the target sequence of hash values in the Hash table has change, the target Hash after changing is determined The corresponding configuration line of each cryptographic Hash in value sequence updates the target configuration file based on identified configuration line.
8. VNF configuration method according to claim 1, which is characterized in that the configuration-direct includes the first configuration-direct And/or second configuration-direct, wherein first configuration-direct is that the configuration executed before updating the target configuration file refers to It enables, second configuration-direct is the configuration-direct executed after updating the target configuration file, and first configuration refers to The function for configuring the application for running on the target VNF is enabled, it is updated that second configuration-direct is used to indicate load Target configuration file.
9. VNF configuration method according to claim 8, which is characterized in that more new command is to described described in the execution Target configuration file is updated, and executes the configuration-direct to configure the target VNF, comprising:
In response to the determination configuration-direct include first configuration-direct and first configuration-direct is not configured, is executed First configuration-direct;
The more new command is executed to be updated to the target configuration file;
In response to the determination configuration-direct include second configuration-direct and second configuration-direct is not configured, is executed Second configuration-direct.
10. a kind of virtual network function VNF configuration device, which is characterized in that applied to the electronic equipment for being deployed with virtual machine, institute Virtual machine is stated for configuring VNF, described device includes:
Receiving unit is configured to receive the VNF configuring request of configuration center transmission, wherein include in the VNF configuring request The configuration message of Extended Protocol based on network configuration protocol NETCONF, the Extended Protocol are supported to the configuration file of VNF Update operation, the configuration message include the configuration-direct to target VNF and the target configuration file to the target VNF more New command;
Configuration unit is configured to execute the more new command to be updated to the target configuration file, and described in execution Configuration-direct is to configure the target VNF.
11. a kind of electronic equipment characterized by comprising
One or more processors;
Storage device is stored thereon with one or more programs,
When one or more of programs are executed by one or more of processors, so that one or more of processors are real The now method as described in any in claim 1-9.
12. a kind of computer-readable medium, is stored thereon with computer program, which is characterized in that the program is executed by processor Method of the Shi Shixian as described in any in claim 1-9.
CN201910300651.5A 2019-04-15 2019-04-15 VNF configuration method, device, electronic equipment and computer-readable medium Pending CN109842530A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910300651.5A CN109842530A (en) 2019-04-15 2019-04-15 VNF configuration method, device, electronic equipment and computer-readable medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910300651.5A CN109842530A (en) 2019-04-15 2019-04-15 VNF configuration method, device, electronic equipment and computer-readable medium

Publications (1)

Publication Number Publication Date
CN109842530A true CN109842530A (en) 2019-06-04

Family

ID=66887102

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910300651.5A Pending CN109842530A (en) 2019-04-15 2019-04-15 VNF configuration method, device, electronic equipment and computer-readable medium

Country Status (1)

Country Link
CN (1) CN109842530A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111343267A (en) * 2020-02-24 2020-06-26 深圳木成林科技有限公司 Configuration management method and system

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160359805A1 (en) * 2015-06-05 2016-12-08 Cisco Technology, Inc. Addressing and managing an internal network of a virtual branch node
CN108063735A (en) * 2017-12-22 2018-05-22 新华三技术有限公司 The distribution method and device of VNF clusters
US20180212855A1 (en) * 2015-09-08 2018-07-26 At&T Intellectual Property I, L.P. Low-Impact Proactive Monitoring of Customer Access to Virtualized Network Elements in a Cloud Platform
CN108650144A (en) * 2018-08-27 2018-10-12 郑州云海信息技术有限公司 A kind of management method and device of Virtual NE
US20190028350A1 (en) * 2017-07-20 2019-01-24 Cisco Technology, Inc. Dynamic and customizable virtual network functions
US20190097889A1 (en) * 2017-09-27 2019-03-28 Intel Corporation Interworking of legacy appliances in virtualized networks

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160359805A1 (en) * 2015-06-05 2016-12-08 Cisco Technology, Inc. Addressing and managing an internal network of a virtual branch node
US20180212855A1 (en) * 2015-09-08 2018-07-26 At&T Intellectual Property I, L.P. Low-Impact Proactive Monitoring of Customer Access to Virtualized Network Elements in a Cloud Platform
US20190028350A1 (en) * 2017-07-20 2019-01-24 Cisco Technology, Inc. Dynamic and customizable virtual network functions
US20190097889A1 (en) * 2017-09-27 2019-03-28 Intel Corporation Interworking of legacy appliances in virtualized networks
CN108063735A (en) * 2017-12-22 2018-05-22 新华三技术有限公司 The distribution method and device of VNF clusters
CN108650144A (en) * 2018-08-27 2018-10-12 郑州云海信息技术有限公司 A kind of management method and device of Virtual NE

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111343267A (en) * 2020-02-24 2020-06-26 深圳木成林科技有限公司 Configuration management method and system
CN111343267B (en) * 2020-02-24 2022-08-12 深圳木成林科技有限公司 Configuration management method and system

Similar Documents

Publication Publication Date Title
US9525592B2 (en) Client/server network environment setup method and system
CN110096424B (en) Test processing method and device, electronic equipment and storage medium
CN108234641A (en) Data read-write method and device based on distributed consensus protocol realization
CN108228818A (en) Web page resources loading method and device, electronic equipment and storage medium
CN109697075A (en) File updating method, system and device
CN103475682B (en) File transfer method and file transfer equipment
US10592312B2 (en) Message oriented middleware with integrated rules engine
CN108282529A (en) Publication and system, the method and apparatus for subscribing to data
CN109564527A (en) The security configuration of cloud computing node
CN110519379A (en) Request processing method and equipment based on micro services
US9158520B2 (en) Development of platform independent applications
CN108733720A (en) The on-line testing method and check system of the SQL query of multiple database type
CN107835181A (en) Right management method, device, medium and the electronic equipment of server cluster
CN109104368B (en) Connection request method, device, server and computer readable storage medium
CN113709810A (en) Method, device and medium for configuring network service quality
CN108804121A (en) Method for edition management, device, medium in distributed system and electronic equipment
CN110460584A (en) Access request processing method, device, electronic equipment and computer-readable medium
CN112748962B (en) Application loading method, device, electronic equipment and computer readable medium
CN108399046A (en) File operation requests treating method and apparatus
CN109842530A (en) VNF configuration method, device, electronic equipment and computer-readable medium
CN109491721A (en) Method and apparatus for load information
US11924295B2 (en) Serving assets in a networked environment
CN111459506A (en) Deployment method, device, medium and electronic equipment of deep learning platform cluster
CN106445700B (en) A kind of URL matching process and device
CN112181470B (en) Patch deployment method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20190604

RJ01 Rejection of invention patent application after publication