CN103902422B - Method and device for monitoring user operation behaviors and cloud computer system - Google Patents

Method and device for monitoring user operation behaviors and cloud computer system Download PDF

Info

Publication number
CN103902422B
CN103902422B CN201210572984.1A CN201210572984A CN103902422B CN 103902422 B CN103902422 B CN 103902422B CN 201210572984 A CN201210572984 A CN 201210572984A CN 103902422 B CN103902422 B CN 103902422B
Authority
CN
China
Prior art keywords
virtual machine
snapshot
snapshot document
monitoring
user operation
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201210572984.1A
Other languages
Chinese (zh)
Other versions
CN103902422A (en
Inventor
江峰
雷葆华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Telecom Corp Ltd
Original Assignee
China Telecom Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Telecom Corp Ltd filed Critical China Telecom Corp Ltd
Priority to CN201210572984.1A priority Critical patent/CN103902422B/en
Publication of CN103902422A publication Critical patent/CN103902422A/en
Application granted granted Critical
Publication of CN103902422B publication Critical patent/CN103902422B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The invention relates to a method and device for monitoring user operation behaviors and a cloud computer system. The method includes the steps that after a virtual machine is created in the cloud computer system, a monitoring request sent by a user is received, and virtual machine identification information is carried in the monitoring request; a corresponding virtual display card is obtained according to the virtual machine identification information; data of the virtual display card are snapshot and recorded according to a set time interval, and are stored in different files; duplicate removal operation is carried out on the stored files so as to delete the same snapshoot files. By means of the method and device for monitoring the user operation behaviors and the cloud computer system, real-time monitoring of the user operation behaviors can be guaranteed.

Description

Method, device and the cloud computer system that user operation behavior is monitored
Technical field
It relates to cloud computing application, especially, is related to a kind of method, device being monitored to user operation behavior With cloud computer system.
Background technology
Intel Virtualization Technology be it is a kind of using software come the technology of analog computer hardware, computing element is on the basis of virtual Rather than it is real on the basis of run, such that it is able to be planned again limited fixed resource according to different demands, to reach Maximize to resource utilization.Since Intel Virtualization Technology obtains the support of hardware vendor, this software analog hardware Performance obtains huge lifting.
In Intel Virtualization Technology, physical hardware is referred to as PM(Physical Machine, physical machine), virtual hardware claimed For VM(Virtual Machine virtual machines), the operating system run on a virtual machine is referred to as GOS(Guest OS, Bin Kecao Make system), manage virtual machine software be referred to as VMM(Virtual Machine Monitor virtual machine managers).
The performance of virtual machine can be dynamically adjusted by Intel Virtualization Technology.In a physical machine for configuring higher, can It is multiple with different configuration of virtual machine to create.For taking the less application of computer resource, can only distribution one it is low The virtual machine of configuration;And the application more for computer resource is taken, then can distribute the virtual machine of a high configuration.When should When load changes, the configuration of virtual machine can also be dynamically changed to meet demand.
Had based on the cloud computer system of Intel Virtualization Technology inexpensive with elastomeric advantage.In terms of cost, as long as with Family can be with access network, it is possible to connect cloud computer by multiple terminal, so that enterprise can be by purchasing low side PC Mode reducing hardware acquisition cost.Further, since cloud computer build with safeguard etc. work all transfer to service provider to complete, Also follow-up human cost is saved for enterprise.In terms of elasticity, when business expansion, user can apply for more cloud computers Rapidly to meet demand;And be not in the spare time of hardware resource as long as reducing the rental of cloud computer when business is shunk Put.When current cloud computer configuration is unsatisfactory for demand, it is also possible to easily change configuration.
In view of above-mentioned advantage, existing some companies have carried out similar service.But the field higher for some safety requirements Scape, for example, O&M of production system etc. needs to be monitored the behavior of operator, to ensure the safe O&M of system.In order to Ensure safe O&M, the method for adopting at present is one monitoring software of installation on GOS, however these softwares be easy to by around Open, especially when operator has administrator right.For example, operator can with the operation of the temporary close software, so as to Monitor in real time cannot be carried out.Further, since monitoring software wide variety, is not that every kind of monitoring software can support various operations System, accordingly, it is possible to the incompatible situation of software occurs.
The content of the invention
The disclosure is in view of at least one of problem above proposes new technical scheme.
The disclosure its on one side provide a kind of method that user operation behavior is monitored, it can be ensured that to Family operation behavior carries out monitor in real time.
The disclosure its on the other hand provide a kind of device that user operation behavior is monitored, it can be ensured that to Family operation behavior carries out monitor in real time.
The disclosure provides a kind of cloud computer system at its another aspect, it can be ensured that user operation behavior is carried out in real time Monitoring.
According to the disclosure, there is provided a kind of method being monitored to user operation behavior, including:
After virtual machine is created in cloud computer system, the monitoring request that receive user is initiated is taken in monitoring request Band virtual machine identification information;
Corresponding virtual video card is obtained according to virtual machine identification information;
Being spaced the data to virtual video card according to setting time carries out snapshot record, and is saved on different files;
File to being preserved carries out deduplication operation, to delete identical snapshot document.
In some embodiments of the present disclosure, the method also includes:
Archival compression is carried out to remaining snapshot document, to form complete video monitoring file.
In some embodiments of the present disclosure, the file to being preserved carries out deduplication operation, to delete identical snapshot text The step of part, includes:
Carrying out to the data of virtual video card every time after snapshot record finishes, by the snapshot document of new record with it is the last The snapshot document of record is compared;
If adjacent snapshot document twice is identical, the snapshot document of new record is deleted.
According to the disclosure, a kind of device being monitored to user operation behavior is additionally provided, including:
Monitoring request reception unit, for creating virtual machine in cloud computer system after, receive user initiate prison Control request, in monitoring request virtual machine identification information is carried;
Virtual video card acquiring unit, for obtaining corresponding virtual video card according to virtual machine identification information;
Snapshot recording unit, for being spaced the data to virtual video card according to setting time snapshot record is carried out, and is preserved To on different files;
File duplicate removal unit, for carrying out deduplication operation to the file for being preserved, to delete identical snapshot document.
In some embodiments of the present disclosure, the device also includes:
Archival compression unit, for carrying out archival compression to remaining snapshot document, to form complete video monitoring text Part.
In some embodiments of the present disclosure, file duplicate removal unit includes:
Snapshot document comparing subunit, for carrying out to the data of virtual video card every time after snapshot record finishes, will be new The snapshot document of record is compared with the snapshot document of the last record;
Delete processing subelement, if identical for adjacent snapshot document twice, deletes the snapshot of new record File.
In the technical scheme of the disclosure, due to being not that monitoring software is arranged on inside GOS, and GOS is provided in Below, i.e. monitoring data is directly obtained by the virtual video card being connected with virtual machine, this mode can avoid having pipe The operator of reason device authority closes monitoring function, and then causes behavior that can not be in real time to operator to be monitored, and reduces certain The security of a little application scenarios.
Description of the drawings
Accompanying drawing described herein is used for providing further understanding of the disclosure, constitutes the part of the application.Attached In figure:
Fig. 1 is the structural representation of disclosure cloud computer system.
Fig. 2 is the schematic flow sheet of the method being monitored to user operation behavior of disclosure one embodiment.
Fig. 3 is the schematic flow sheet of the method being monitored to user operation behavior of another embodiment of the disclosure.
Fig. 4 is the structural representation of the device being monitored to user operation behavior of disclosure one embodiment.
Fig. 5 is the structural representation of the device being monitored to user operation behavior of another embodiment of the disclosure.
Fig. 6 is the structural representation of the device being monitored to user operation behavior of the another embodiment of the disclosure.
Fig. 7 is the structural representation of the cloud computer system of disclosure one embodiment.
Specific embodiment
The disclosure is described below with reference to accompanying drawings.It should be noted that description below is only in itself explanatory and shows Example property, never as to the disclosure and its application or any restriction for using.Unless stated otherwise, otherwise, implementing The part illustrated in example and the positioned opposite and numerical expression and numerical value of step are not intended to limit the scope of the present disclosure.In addition, Technology well known by persons skilled in the art, method and apparatus may not be discussed in detail, but be meant as in appropriate circumstances A part for specification.
Inventors noted that the low cost of cloud computing technology, high resiliency, the easily characteristic such as deployment, easy care are enterprise's IT bases The erection of Infrastructure brings great convenience, therefore, many enterprises are wished to from the operation mode of this rental IT services Benefit is obtained, for example, there is provided the enterprise of monitoring service.
At present existing monitoring software is all mounted in inside GOS, and GOS allows to be used by an operator, therefore This there is the risk that GOS is changed by operator.For example, if operator is familiar with the use of GOS, the monitoring can be closed Software, causes monitoring to be normally carried out.In addition, there is some to use some special instructions based on the monitoring software of GOS And environment so that it is not compatible with other application.
And the following embodiments of the disclosure are then based on Hypervisor(It is that one kind operates in basic physicses server and operation Intermediate software layer between system, can allow multiple operating systems and Application share hardware, also referred to as VMM)Layer technology, GOS Do not know that the virtual hardware environment for oneself being run has been trapped completely, operator unlikely carry out it is any forbid monitor , there is no any compatibility issue, as shown in Figure 1 in action yet.
Fig. 2 is the schematic flow sheet of the method being monitored to user operation behavior of disclosure one embodiment.
As shown in Fig. 2 the embodiment may comprise steps of:
S202, after virtual machine is created in cloud computer system, the monitoring request that receive user is initiated please in the monitoring Seek middle carrying virtual machine identification information;
S204, according to virtual machine identification information inquiry corresponding virtual video card is obtained;
Data in virtual video card are carried out snapshot record by S206 according to setting time interval, and each snapshot is recorded It is saved on different files;
S208, the different files to being preserved carry out deduplication operation, to delete identical snapshot document.
In this embodiment, due to being not that monitoring software is arranged on inside GOS, and it is provided in below GOS, That is, monitoring data is directly obtained by the virtual video card being connected with virtual machine, this mode can avoid being weighed with manager The operator of limit closes monitoring function, and then causes behavior that can not be in real time to operator to be monitored, and reduces some applications The security of scene.
After step S208, archival compression can also be carried out to remaining snapshot document, to form complete video prison Control file.
In step S208, the file to being preserved carries out deduplication operation, can the step of to delete identical snapshot document To include:
Carrying out to the data of virtual video card every time after snapshot record finishes, by the snapshot document of new record with it is the last The snapshot document of record is compared;
If adjacent snapshot document twice is identical, the snapshot document of new record is deleted.
Fig. 3 is the schematic flow sheet of the method being monitored to user operation behavior of another embodiment of the disclosure.
As shown in figure 3, the embodiment may comprise steps of:
S302, cloud computer system receives the startup cloud computer request that user sends;
S304, user profile of the cloud computer system in request creates a corresponding virtual machine on backstage;
S306, cloud computer system receives the monitoring request that user sends, and in the monitoring request virtual machine mark is carried;
S308, cloud computer system identifies the virtual video card information for obtaining designated virtual machine according to virtual machine;
S310, cloud computer system carries out snapshot record to the data in the virtual video card of virtual machine, and is saved on file;
S312, at set intervals execution step S210, obtains continuous virtual video card snapshot document;
S314, because the picture that monitored may be not changed within a period of time, i.e., continuous two width or multi-picture The same, therefore, need to listed files in each file carry out deduplication operation, i.e. delete duplicate snapshot document;
S316, archival compression is carried out to remaining snapshot document, forms a video file.
Next, being described in detail by an instantiation.
Step one, it is assumed that virtual machine uses VirtualBox, when cloud computer system receives user cloud computer is started A virtual machine can be created after request, call instruction is as follows:
VBoxManage createvm--name<name>[--uuid<uuid>]
Wherein, in the operation of cloud computer system, cloud computer system can at any time inquire the virtual machine being currently running, and call Order is as follows:
VBoxManage list[--long|-l]vms|runningvms
Step 2, when cloud computer system receives Client-initiated monitoring request, in the virtual video card of designated virtual machine Data carry out shot operation, call instruction is as follows:
VBoxManage controlvm<uuid>screenshotpng<file>
The shot operation being continually performed in step 2, will obtain a series of files, and the filename of these files is all Be with timestamp as suffix, for example, 142-sf-134134.20120404161345.Wherein, 142-sf-134134 is virtual The UUID of machine(Universal Unique Identifier, universal unique identifier), suffix 20120404161345 represents 45 seconds April 4 day 16 point 13 minute in 2012.
These files during sectional drawing, are scanned two-by-two in real time by step 3, if adjacent two pictures are removed adopted Collection time point is different outer, and image content is identical, then delete file corresponding with latter pictures.For example, if 142-sf- 134134.20120404161345 it is identical with the picture recorded in 142-sf-134134.20120404161354, then by the latter Delete, after processing by this series of duplicate removal, a series of new sectional drawing files can be obtained, in the sectional drawing file no longer The pictorial information of the identical content comprising redundancy.
Duplicate removal process in step 3 is carried out simultaneously with above-mentioned sectional drawing process, and such file will not accumulate excessive.
Step 4, these is carried out the sectional drawing file after duplicate removal process and is packed into video file, is available for watching in the future.
It will appreciated by the skilled person that realize the whole and part steps of said method embodiment can pass through Completing, aforesaid program can be stored in a computing device read/write memory medium the related hardware of programmed instruction, the journey Sequence upon execution, performs the step of including said method embodiment, and aforesaid storage medium can include ROM, RAM, magnetic disc It is various with CD etc. can be with the medium of store program codes.
Fig. 4 is the structural representation of the device being monitored to user operation behavior of disclosure one embodiment.
As shown in figure 4, the device 40 in the embodiment can include that monitoring request reception unit 402, virtual video card is obtained Unit 404, snapshot recording unit 406 and file duplicate removal unit 408.Wherein,
Monitoring request reception unit 402, for creating virtual machine in cloud computer system after, receive user initiate Monitoring request, in monitoring request virtual machine identification information is carried;
Virtual video card acquiring unit 404, for obtaining corresponding virtual video card according to virtual machine identification information;
Snapshot recording unit 406, for being spaced the data to virtual video card according to setting time snapshot record is carried out, and is protected It is stored on different files;
File duplicate removal unit 408, for carrying out deduplication operation to the file for being preserved, to delete identical snapshot document.
In this embodiment, due to being not that monitoring software is arranged on inside GOS, and it is provided in below GOS, That is, monitoring data is directly obtained by the virtual video card being connected with virtual machine, this mode can avoid being weighed with manager The operator of limit closes monitoring function, and then causes behavior that can not be in real time to operator to be monitored, and reduces some applications The security of scene.
Fig. 5 is the structural representation of the device being monitored to user operation behavior of another embodiment of the disclosure.
As shown in figure 5, compared with the embodiment in Fig. 4, the device 50 in the embodiment can also include:
Archival compression unit 502, for carrying out archival compression to remaining snapshot document, to form complete video monitoring File.
Fig. 6 is the structural representation of the device being monitored to user operation behavior of the another embodiment of the disclosure.
As shown in fig. 6, compared with the embodiment in Fig. 4, the file duplicate removal unit 602 in the device 60 in the embodiment can With including snapshot document comparing subunit 602a and delete processing subelement 602b.Wherein,
Snapshot document comparing subunit 602a, for carrying out to the data of virtual video card every time after snapshot record finishes, The snapshot document of new record is compared with the snapshot document of the last record;
Delete processing subelement 602b, if identical for adjacent snapshot document twice, deletes new record Snapshot document.
Fig. 7 is the structural representation of the cloud computer system of disclosure one embodiment.
As shown in fig. 7, the system 70 in the embodiment can include virtual machine 702 and virtual machine manager 704, virtual Virtual video card 704a being connected with virtual machine 702 can be included in machine manager 704 and user operation behavior is monitored Device 704b.
Wherein, the device 704b being monitored to user operation behavior can be realized using previous embodiment.
Each embodiment is described by the way of progressive in this specification, and what each embodiment was stressed is and it The difference of his embodiment, identical and similar part can be with cross-reference between each embodiment.For device embodiment For, due to itself and embodiment of the method basic simlarity, so description is fairly simple, related part may refer to embodiment of the method Partial explanation.
Disclosure above-described embodiment not only can cause user's unaware when the operation behavior to user is monitored, And can also be without the person of being managed user and controlled, video monitoring truly can be realized.
Although describing the disclosure with reference to exemplary embodiment, it should be appreciated that the disclosure is not limited to above-mentioned exemplary Embodiment.It will be obvious to those skilled in the art that can change under conditions of without departing substantially from the scope of the present disclosure and spirit Exemplary embodiments mentioned above.The scope of appended claim should be endowed most wide explanation, such to repair comprising all The 26S Proteasome Structure and Function for changing and being equal to.

Claims (7)

1. a kind of method that user operation behavior is monitored, it is characterised in that include:
After virtual machine is created in cloud computer system, the monitoring request that receive user is initiated is taken in the monitoring request Band virtual machine identification information;
Corresponding virtual video card is obtained according to the virtual machine identification information;
Being spaced the data to the virtual video card according to setting time carries out snapshot record, and is saved on different files;
File to being preserved carries out deduplication operation, to delete identical snapshot document.
2. the method that user operation behavior is monitored according to claim 1, it is characterised in that methods described is also wrapped Include:
Archival compression is carried out to remaining snapshot document, to form complete video monitoring file.
3. the method that user operation behavior is monitored according to claim 1, it is characterised in that described to being preserved File carry out deduplication operation, include the step of to delete identical snapshot document:
Carrying out to the data of the virtual video card every time after snapshot record finishes, by the snapshot document of new record with it is the last The snapshot document of record is compared;
If adjacent snapshot document twice is identical, the snapshot document of new record is deleted.
4. a kind of device that user operation behavior is monitored, it is characterised in that include:
Monitoring request reception unit, for creating virtual machine in cloud computer system after, receive user initiate monitoring please Ask, in the monitoring request virtual machine identification information is carried;
Virtual video card acquiring unit, for obtaining corresponding virtual video card according to the virtual machine identification information;
Snapshot recording unit, for being spaced the data to the virtual video card according to setting time snapshot record is carried out, and is preserved To on different files;
File duplicate removal unit, for carrying out deduplication operation to the file for being preserved, to delete identical snapshot document.
5. the device that user operation behavior is monitored according to claim 4, it is characterised in that also include:
Archival compression unit, for carrying out archival compression to remaining snapshot document, to form complete video monitoring file.
6. the device that user operation behavior is monitored according to claim 4, it is characterised in that the file duplicate removal Unit includes:
Snapshot document comparing subunit, for carrying out to the data of the virtual video card every time after snapshot record finishes, will be new The snapshot document of record is compared with the snapshot document of the last record;
Delete processing subelement, if identical for adjacent snapshot document twice, deletes the snapshot document of new record.
7. a kind of cloud computer system, it is characterised in that including virtual machine and virtual machine manager, in the virtual machine manager Including carrying out to user operation behavior any one of the virtual video card and claim 4-6 being connected with the virtual machine The device of monitoring.
CN201210572984.1A 2012-12-25 2012-12-25 Method and device for monitoring user operation behaviors and cloud computer system Active CN103902422B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210572984.1A CN103902422B (en) 2012-12-25 2012-12-25 Method and device for monitoring user operation behaviors and cloud computer system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210572984.1A CN103902422B (en) 2012-12-25 2012-12-25 Method and device for monitoring user operation behaviors and cloud computer system

Publications (2)

Publication Number Publication Date
CN103902422A CN103902422A (en) 2014-07-02
CN103902422B true CN103902422B (en) 2017-05-10

Family

ID=50993758

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210572984.1A Active CN103902422B (en) 2012-12-25 2012-12-25 Method and device for monitoring user operation behaviors and cloud computer system

Country Status (1)

Country Link
CN (1) CN103902422B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9946605B2 (en) * 2015-11-25 2018-04-17 Veritas Technologies Llc Systems and methods for taking snapshots in a deduplicated virtual file system
CN109074692A (en) * 2016-04-11 2018-12-21 开利公司 When interacting with multiple access control apparatus, capturing behavior user is intended to
CN108647284B (en) * 2018-05-03 2021-07-23 网易宝有限公司 Method and device for recording user behavior, medium and computing equipment
WO2021012331A1 (en) * 2019-07-24 2021-01-28 南京智能制造研究院有限公司 Edge computing system and data storage method

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101334751B (en) * 2007-06-29 2010-04-14 联想(北京)有限公司 Method and device for virtual machine monitor recognizing client operating system progress
WO2009052424A2 (en) * 2007-10-19 2009-04-23 Kubisys Inc. Virtual computing environments
US8195980B2 (en) * 2009-03-31 2012-06-05 Oracle America, Inc. Virtual machine snapshotting and damage containment
CN101894150B (en) * 2010-07-05 2012-03-28 优视科技有限公司 Internet web page audio/video acquisition method and system for mobile communication equipment terminal
CN102713860B (en) * 2011-12-30 2014-07-30 华为技术有限公司 User experience index monitoring method and monitoring virtual machine

Also Published As

Publication number Publication date
CN103902422A (en) 2014-07-02

Similar Documents

Publication Publication Date Title
US10824343B2 (en) Managing access of multiple executing programs to non-local block data storage
US10691554B2 (en) Providing access to stored computing snapshots
US8448219B2 (en) Securely hosting workloads in virtual computing environments
US11281393B2 (en) Envoy for multi-tenant compute infrastructure
US20200351345A1 (en) Data storage management system for holistic protection of serverless applications across multi-cloud computing environments
US10169173B2 (en) Preserving management services with distributed metadata through the disaster recovery life cycle
CN102214127B (en) Method for intensively storing and backing up data based on operating system virtualization theory
US20200034240A1 (en) Network block device based continuous replication for kubernetes container management systems
US8412678B2 (en) Systems and methods for providing business continuity services
US8683484B2 (en) Intelligently pre-placing data for local consumption by workloads in a virtual computing environment
US20140172783A1 (en) System and method for providing computing environment delivery service with offline operations
US11573863B2 (en) Virtual machine backup and restore coordinator
CN102447723A (en) Client-side virtualization framework
US10909000B2 (en) Tagging data for automatic transfer during backups
US9203700B2 (en) Monitoring client information in a shared environment
US10223218B2 (en) Disaster recovery of managed systems
CN103902422B (en) Method and device for monitoring user operation behaviors and cloud computer system
US10628070B2 (en) Selecting and compressing target files to obtain additional free data storage space to perform an operation in a virtual machine
CN103309720A (en) Virtual machine management system for maintaining virtual data center
Coyne et al. IBM Software-Defined Storage Guide
CA3183412A1 (en) Methods and systems for managing computing virtual machine instances
CN115485677A (en) Secure data replication in a distributed data storage environment
Kotka et al. E-government services migration to the public cloud: Experiments and technical findings
CN103870748A (en) Method and device for safety processing of virtual machine
CN109857345B (en) System and method for realizing disk mounting interface scheduling management based on concurrency

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant