CN106503587A - A kind of hanging method of data disks and monitor of virtual machine - Google Patents
A kind of hanging method of data disks and monitor of virtual machine Download PDFInfo
- Publication number
- CN106503587A CN106503587A CN201611071722.1A CN201611071722A CN106503587A CN 106503587 A CN106503587 A CN 106503587A CN 201611071722 A CN201611071722 A CN 201611071722A CN 106503587 A CN106503587 A CN 106503587A
- Authority
- CN
- China
- Prior art keywords
- virtual machine
- user
- identification information
- monitor
- target data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/06—Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
- G06F3/0601—Interfaces specially adapted for storage systems
- G06F3/0602—Interfaces specially adapted for storage systems specifically adapted to achieve a particular effect
- G06F3/062—Securing storage systems
- G06F3/0623—Securing storage systems in relation to content
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/06—Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
- G06F3/0601—Interfaces specially adapted for storage systems
- G06F3/0628—Interfaces specially adapted for storage systems making use of a particular technique
- G06F3/0629—Configuration or reconfiguration of storage systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/06—Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
- G06F3/0601—Interfaces specially adapted for storage systems
- G06F3/0628—Interfaces specially adapted for storage systems making use of a particular technique
- G06F3/0638—Organizing or formatting or addressing of data
- G06F3/0644—Management of space entities, e.g. partitions, extents, pools
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/455—Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
- G06F9/45533—Hypervisors; Virtual machine monitors
- G06F9/45558—Hypervisor-specific management and integration aspects
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Software Systems (AREA)
- Human Computer Interaction (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Medical Informatics (AREA)
- Databases & Information Systems (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
The embodiment of the invention discloses a kind of hanging method of data disks and monitor of virtual machine.Monitor of virtual machine receive user logs in the login request message of virtual machine, according to the corresponding relation of the identification information and the user for prestoring and data disks of user in login request message, determine after there is the target data disk corresponding with the identification information of user, target data disk is obtained from data disks resource pool, and target data disk is mounted on the virtual machine of User logs in, so as to pass through that the target data disk corresponding with the identification information of user is mounted on the virtual machine of User logs in, achieve the automatic carry of user's private data disk in dynamic virtual desktop application, so that user accesses its privately owned data in the dynamic desktop being randomly assigned, and ensure that private data disk carry on the virtual machine accessed by user so that other users cannot be accessed.
Description
Technical field
The present invention relates to field of computer technology, more particularly to a kind of hanging method of data disks and monitor of virtual machine.
Background technology
Common virtual desktop application system mainly provides a user with two kinds of desktop occupation modes, and one kind is static user
Formula, one kind are dynamic occupation modes.Specifically, static occupation mode is directed to, and user virtual machine is to bind one by one with user
, the virtual machine that user logs in every time is all fixed a certain, and the data of user are stored directly in and are allocated to its virtual machine
In;Be directed to dynamic occupation mode, the virtual machine of all users of same business department be all by unified template generation,
Dynamic desktop resource pool is formed, the virtual desktop that user uses every time is all randomly assigned, and the data of user have data disks
In, it is achieved thereby that user data is separated with virtual machine.Therefore, dynamic occupation mode is more flexible than static occupation mode,
More convenient deployment and maintenance.
However, in dynamic occupation mode, as the virtual desktop that user uses every time is all randomly assigned, how to allow
User accesses its private data in the desktop for obtaining at random, how to be able to protect (user data using the privacy of user data
Can only be accessed by user itself, it is impossible to accessed by other users), this two large problems and the insurmountable words of difficult point are eventually limited
The development of dynamic virtual desktop application.
To sum up, a kind of hanging method of data disks is needed badly at present, for realizing allowing user to visit in the desktop for obtaining at random
Its private data is asked, and protects the privacy of user data.
Content of the invention
The embodiment of the present invention provides a kind of hanging method of data disks and monitor of virtual machine, for realize allowing user with
Its private data is accessed in the desktop that machine is obtained, and protects the privacy of user data.
The embodiment of the present invention provides a kind of hanging method of data disks, and methods described includes:
Monitor of virtual machine receive user logs in the login request message of virtual machine;The login request message includes using
The identification information of the virtual machine of the identification information at family and the User logs in;
Corresponding pass of the monitor of virtual machine according to the identification information of the user and the user for prestoring and data disks
System, determines after there is the target data disk corresponding with the identification information of the user, obtains the mesh from data disks resource pool
Mark data disks;
Identification information of the monitor of virtual machine according to the virtual machine of the User logs in, the target data disk is mounted to
On the virtual machine of the User logs in.
The embodiment of the present invention provides a kind of monitor of virtual machine, and the monitor of virtual machine includes:
Receiver module, for the login request message that receive user logs in virtual machine;The login request message includes
The identification information of the virtual machine of the identification information of user and the User logs in;
Determining module, for the corresponding pass according to the identification information of the user and the user for prestoring and data disks
System, determines after there is the target data disk corresponding with the identification information of the user, obtains the mesh from data disks resource pool
Mark data disks;
Processing module, for the identification information of the virtual machine according to the User logs in, by the target data disk carry
To on the virtual machine of the User logs in.
In the embodiment of the present invention, monitor of virtual machine passes through the target data disk carry corresponding with the identification information of user
To on the virtual machine of User logs in, and according to the unloading of the de-registration request message of user on virtual machine to be nullified carry number
According to disk, so as to realize the automatic carry of user's private data disk and unloading in dynamic virtual desktop application so that user is random
Access its privately owned data in the dynamic desktop of distribution, and ensure that the virtual machine accessed in user by private data disk carry
Above so that other users cannot be accessed.
Description of the drawings
For the technical scheme being illustrated more clearly that in the embodiment of the present invention, below will be to making needed for embodiment description
Accompanying drawing is briefly introduced, it should be apparent that, drawings in the following description are only some embodiments of the present invention, for this
For the those of ordinary skill in field, without having to pay creative labor, can be obtaining which according to these accompanying drawings
His accompanying drawing.
Fig. 1 is a kind of corresponding schematic flow sheet of hanging method of data disks provided in an embodiment of the present invention;
Fig. 2 is that the overall flow of carry and unloading that the virtual monitor device in the embodiment of the present invention carries out data disks is illustrated
Figure;
Fig. 3 is a kind of structural representation of monitor of virtual machine provided in an embodiment of the present invention.
Specific embodiment
In order that the object, technical solutions and advantages of the present invention are clearer, below in conjunction with accompanying drawing the present invention is made into
One step ground is described in detail, it is clear that described embodiment is only a part of embodiment of the invention, rather than whole enforcement
Example.Embodiment in based on the present invention, those of ordinary skill in the art are obtained under the premise of creative work is not made
All other embodiment, belongs to the scope of protection of the invention.
Fig. 1 is a kind of corresponding schematic flow sheet of hanging method of data disks provided in an embodiment of the present invention.Such as Fig. 1 institutes
Show, the method includes:
Step 101, monitor of virtual machine receive user log in the login request message of virtual machine;The login request message
Include the identification information of the identification information of user and the virtual machine of the User logs in;
Step 102, identification information and the user that prestore and data disks of the monitor of virtual machine according to the user
Corresponding relation, determine after there is corresponding with the identification information of the user target data disk, obtain from data disks resource pool
Take the target data disk;
Step 103, identification information of the monitor of virtual machine according to the virtual machine of the User logs in, by the target data
Disk is mounted on the virtual machine of the User logs in.
In the embodiment of the present invention, monitor of virtual machine passes through the target data disk carry corresponding with the identification information of user
To on the virtual machine of User logs in, and according to the unloading of the de-registration request message of user on virtual machine to be nullified carry number
According to disk, so as to realize the automatic carry of user's private data disk and unloading in dynamic virtual desktop application so that user is random
Access its privately owned data in the dynamic desktop of distribution, and ensure that the virtual machine accessed in user by private data disk carry
Above so that other users cannot be accessed.
The hanging method of data disks provided in an embodiment of the present invention is applied to monitor of virtual machine, wherein monitor of virtual machine
In may include virtualizing operating systems privileged domain and equipment driving domain, further, virtualizing operating systems privileged domain includes
The virtual machine user behavior monitoring that virtual machine life cycle monitoring module, virtual disk control module and virtual machine internal are installed
Agency, completes dynamic desktop industry so as to pass through these three modules in virtualizing operating systems privileged domain with equipment driving domain collaboration
The automatic carry of user's private data disk and unloading in business.As shown in Fig. 2 the virtual monitor device in for the embodiment of the present invention is carried out
The carry of data disks and the overall flow schematic diagram for unloading.
Specifically, the startup of virtual machine life cycle monitoring module monitoring virtual machine and closing, virtual machine user are stepped on
Record and cancellation, judge user in the login of certain virtual machine or nullify behavior, transmit user to virtual disk control module and step on
The correspondence relationship information of the virtual machine of record so that virtual disk control module by the private data disk carry of this user to the user
On the virtual machine for being logged in.
Virtual disk control module creates respective virtual block device after the information for obtaining the virtual machine logged in by user,
The virtual machine logged in user by users personal data disk carry;When user is obtained in the message that certain virtual machine is nullified,
Respective virtual block device is destroyed, users personal data disk is unloaded from the virtual machine that is nullified.
Virtual machine user behavior monitoring agency is mounted in Agent in virtual machine, be responsible for capture user login or
The information of cancellation, the user profile for currently being logged in or being nullified pass to the virtual machine Life Cycle in privileged domain by xenstore
Phase monitoring module, after monitoring module monitors User logs in or log-off message, controls carry and unloading user data disk.
Flow process the step of shown in Fig. 1 in the embodiment of the present invention is illustrated with reference to Fig. 2.
Specifically, in step 101, after User logs in virtual machine, user behavior monitoring agent is by the logging request of user
Message writes XenStore, and virtual machine user behavior monitoring submodule monitors XenStore path change, produces and logs in Event
Event, and store in log-in events queue.
In step 102, virtual disk control module obtains login Event events from event queue, to equipment driving domain
It is sent as the Asynchronous Request of the virtual machine carry user data disk logged in by user.Mark of the equipment driving domain according to the user
Information and the user for prestoring and the corresponding relation of data disks, determine there is the mesh corresponding with the identification information of the user
After mark data disks, the target data disk is obtained from data disks resource pool.
In the embodiment of the present invention, if it is determined that there is no the number of targets corresponding with the identification information of the user in equipment driving domain
According to disk, then can be that the user distributes data disks, and using the data disks of distribution as corresponding with the identification information of the user
Target data disk.
In step 103, identification information of the equipment driving domain according to the virtual machine of the User logs in, by the target data
Disk is mounted on the virtual machine of the User logs in;Further, after the success of target data disk carry, virtual disk control module
Cache the corresponding relation of the target data disk and the virtual machine of the target data disk carry.
Said process is the carry process of data disks, correspondingly, also includes the unloading of data disks in the embodiment of the present invention
Journey.Specifically, user determines that monitor of virtual machine receives the de-registration request message of user, user from after virtual machine cancellation
Behavior monitoring is acted on behalf of the de-registration request message write XenStore of user, and virtual machine user behavior monitoring submodule is monitored
XenStore path change, produces and nullifies Event events, and store in Logout Events queue.
Virtual disk control module obtains cancellation Event events from Logout Events queue, is sent as to equipment driving domain
Virtual machine to be nullified unloads the Asynchronous Request of data disks.Identification information and virtuality of the equipment driving domain according to virtual machine to be nullified
Machine and the corresponding relation of data disks, determine the data disks of carry on the virtual machine to be nullified, and treat described in unloading that cancellation is virtual
The data disks of carry on machine;Further, after data disks unloading success, equipment driving domain deletes carry on virtual machine to be nullified
The corresponding relation of data disks and the virtual machine to be nullified.
For said method flow process, the embodiment of the present invention also provides a kind of monitor of virtual machine, the monitor of virtual machine
Particular content is referred to said method enforcement.
Fig. 3 is a kind of structural representation of monitor of virtual machine provided in an embodiment of the present invention, as shown in figure 3, the void
Intending monitor unit includes:
Receiver module 301, for the login request message that receive user logs in virtual machine;Wrap in the login request message
Include the identification information of the identification information of user and the virtual machine of the User logs in;
Determining module 302, for right with data disks according to the identification information of the user and the user for prestoring
Should be related to, determine after there is the target data disk corresponding with the identification information of the user, institute is obtained from data disks resource pool
State target data disk;
Processing module 303, for the identification information of the virtual machine according to the User logs in, the target data disk is hung
It is downloaded on the virtual machine of the User logs in.
Alternatively, the determining module 302 is additionally operable to:
Determine after there is no the target data disk corresponding with the identification information of the user, be user's distribution data
Disk, and using the data disks of distribution as the target data disk corresponding with the identification information of the user.
Alternatively, the monitor of virtual machine also includes memory module 304, for will be described in the processing module 303
After target data disk is mounted on the virtual machine of the User logs in, the target data disk and the number of targets is stored
Corresponding relation according to the virtual machine of disk carry.
Alternatively, the receiver module 301 is additionally operable to:Receive user nullifies the de-registration request message of virtual machine;The note
Pin request message includes the identification information of virtual machine to be nullified;
The determining module 302 is additionally operable to:Identification information and virtual machine and data according to the virtual machine to be nullified
The corresponding relation of disk, determines the data disks of carry on the virtual machine to be nullified, and unloads carry on the virtual machine to be nullified
Data disks.
The processing module 303 is additionally operable to:On virtual machine to be nullified described in deleting, the data disks of carry are waited to nullify with described
The corresponding relation of virtual machine.
It can be seen from the above:In the embodiment of the present invention, monitor of virtual machine receive user logs in stepping on for virtual machine
Record request message, and the identification information according to user in login request message and the user that prestores are corresponding with data disks
Relation, determines after there is the target data disk corresponding with the identification information of user, obtains target data from data disks resource pool
Disk, target data disk is mounted on the virtual machine of User logs in.In the embodiment of the present invention, by by the identification information with user
Corresponding target data disk is mounted on the virtual machine of User logs in, and is treated according to the unloading of the de-registration request message of user
Nullify the data disks of carry on virtual machine, so as to realize in dynamic virtual desktop application the automatic carry of user's private data disk with
Unloading so that user accesses its privately owned data in the dynamic desktop being randomly assigned, and ensure that private data disk carry
So that other users cannot be accessed on the virtual machine accessed by user.
Those skilled in the art are it should be appreciated that embodiments of the invention can be provided as method or computer program.
Therefore, the present invention can adopt complete hardware embodiment, complete software embodiment or with reference to software and hardware in terms of embodiment
Form.And, the present invention can be adopted to can use in one or more computers for wherein including computer usable program code and be deposited
The shape of the upper computer program that implements of storage media (including but not limited to disk memory, CD-ROM, optical memory etc.)
Formula.
The present invention is the flow process with reference to method according to embodiments of the present invention, equipment (system) and computer program
Figure and/or block diagram are describing.It should be understood that can be by computer program instructions flowchart and/or each stream in block diagram
Journey and/or the combination of square frame and flow chart and/or the flow process in block diagram and/or square frame.These computer programs can be provided
Instruct the processor of general purpose computer, special-purpose computer, Embedded Processor or other programmable data processing devices to produce
A raw machine so that produced for reality by the instruction of computer or the computing device of other programmable data processing devices
The device of the function of specifying in present one flow process of flow chart or one square frame of multiple flow processs and/or block diagram or multiple square frames.
These computer program instructions may be alternatively stored in and can guide computer or other programmable data processing devices with spy
Determine in the computer-readable memory that mode works so that the instruction being stored in the computer-readable memory is produced to be included referring to
Make the manufacture of device, the command device realize in one flow process of flow chart or one square frame of multiple flow processs and/or block diagram or
The function of specifying in multiple square frames.
These computer program instructions can be also loaded in computer or other programmable data processing devices so that in meter
Series of operation steps is executed on calculation machine or other programmable devices to produce computer implemented process, so as in computer or
The instruction executed on other programmable devices is provided for realization in one flow process of flow chart or multiple flow processs and/or block diagram one
The step of function of specifying in individual square frame or multiple square frames.
, but those skilled in the art once know basic creation although preferred embodiments of the present invention have been described
Property concept, then can make other change and modification to these embodiments.So, claims are intended to be construed to include excellent
Select embodiment and fall into the had altered of the scope of the invention and change.
Obviously, those skilled in the art can carry out the essence of various changes and modification without deviating from the present invention to the present invention
God and scope.So, if these modifications of the present invention and modification belong to the scope of the claims in the present invention and its equivalent technologies
Within, then the present invention is also intended to comprising these changes and modification.
Claims (8)
1. a kind of hanging method of data disks, it is characterised in that methods described includes:
Monitor of virtual machine receive user logs in the login request message of virtual machine;The login request message includes user's
The identification information of the virtual machine of identification information and the User logs in;
Corresponding relation of the monitor of virtual machine according to the identification information and the user for prestoring and data disks of the user, really
After the fixed presence target data disk corresponding with the identification information of the user, the target data is obtained from data disks resource pool
Disk;
Identification information of the monitor of virtual machine according to the virtual machine of the User logs in, the target data disk is mounted to described
On the virtual machine of User logs in.
2. method according to claim 1, it is characterised in that methods described also includes:
After monitor of virtual machine determination does not have the target data disk corresponding with the identification information of the user, it is the user point
Match somebody with somebody data disks, and using the data disks of distribution as the target data disk corresponding with the identification information of the user.
3. method according to claim 1 and 2, it is characterised in that monitor of virtual machine is by the target data disk carry
After on the virtual machine of the User logs in, also include:
Monitor of virtual machine stores the corresponding relation of the target data disk and the virtual machine of the target data disk carry.
4. method according to claim 3, it is characterised in that monitor of virtual machine store the target data disk with described
After the corresponding relation of the virtual machine of User logs in, also include:
Monitor of virtual machine receive user nullifies the de-registration request message of virtual machine;The de-registration request message includes waiting to nullify
The identification information of virtual machine;
Identification information and virtual machine of the monitor of virtual machine according to the virtual machine to be nullified and the corresponding relation of data disks, really
The data disks of carry on the fixed virtual machine to be nullified, and unload the data disks of carry on the virtual machine to be nullified.
Monitor of virtual machine delete described on virtual machine to be nullified the data disks of carry and the virtual machine to be nullified corresponding pass
System.
5. a kind of monitor of virtual machine, it is characterised in that the monitor of virtual machine includes:
Receiver module, for the login request message that receive user logs in virtual machine;The login request message includes user
Identification information and the User logs in virtual machine identification information;
Determining module, for the corresponding relation according to the identification information of the user and the user for prestoring and data disks,
Determine after there is the target data disk corresponding with the identification information of the user, the number of targets is obtained from data disks resource pool
According to disk;
The target data disk, for the identification information of the virtual machine according to the User logs in, is mounted to institute by processing module
State on the virtual machine of User logs in.
6. monitor of virtual machine according to claim 5, it is characterised in that the determining module is additionally operable to:
Determine after there is no the target data disk corresponding with the identification information of the user, be that the user distributes data disks, and
Using the data disks of distribution as the target data disk corresponding with the identification information of the user.
7. the monitor of virtual machine according to claim 5 or 6, it is characterised in that the monitor of virtual machine also includes depositing
Storage module, after be mounted on the virtual machine of the User logs in by the target data disk, deposits
Store up the corresponding relation of the target data disk and the virtual machine of the target data disk carry.
8. monitor of virtual machine according to claim 7, it is characterised in that the receiver module is additionally operable to:Receive user
Nullify the de-registration request message of virtual machine;The de-registration request message includes the identification information of virtual machine to be nullified;
The determining module is additionally operable to:Corresponding with data disks according to the identification information and virtual machine of the virtual machine to be nullified
Relation, determines the data disks of carry on the virtual machine to be nullified, and unloads the data disks of carry on the virtual machine to be nullified.
The processing module is additionally operable to:The data disks and the virtual machine to be nullified of carry on virtual machine to be nullified described in deleting
Corresponding relation.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611071722.1A CN106503587A (en) | 2016-11-28 | 2016-11-28 | A kind of hanging method of data disks and monitor of virtual machine |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611071722.1A CN106503587A (en) | 2016-11-28 | 2016-11-28 | A kind of hanging method of data disks and monitor of virtual machine |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106503587A true CN106503587A (en) | 2017-03-15 |
Family
ID=58329196
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201611071722.1A Pending CN106503587A (en) | 2016-11-28 | 2016-11-28 | A kind of hanging method of data disks and monitor of virtual machine |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106503587A (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108804038A (en) * | 2018-05-29 | 2018-11-13 | 新华三技术有限公司 | Method, apparatus, server and the computer-readable medium of daily record data migration |
CN109379412A (en) * | 2018-09-27 | 2019-02-22 | 郑州云海信息技术有限公司 | A kind of method and apparatus for deleting cloud host |
CN112631784A (en) * | 2020-12-31 | 2021-04-09 | 联想未来通信科技(重庆)有限公司 | Resource-based allocation/processing method and electronic equipment |
CN113126912A (en) * | 2021-03-15 | 2021-07-16 | 新华三大数据技术有限公司 | Personal disk mounting method and device |
CN113504872A (en) * | 2021-05-14 | 2021-10-15 | 济南浪潮数据技术有限公司 | Method, system, equipment and medium for mounting virtual disk on cloud physical machine |
CN113806007A (en) * | 2020-06-15 | 2021-12-17 | 中兴通讯股份有限公司 | Disk mounting method, disk mounting device, storage medium, and electronic device |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104331375A (en) * | 2014-10-29 | 2015-02-04 | 中国建设银行股份有限公司 | Shared virtualized resource management method and shared virtualized resource management device under shared virtualized resource pool environment |
CN106020795A (en) * | 2016-05-09 | 2016-10-12 | 汉柏科技有限公司 | Realization method and device of VDI desktop personal data disk |
-
2016
- 2016-11-28 CN CN201611071722.1A patent/CN106503587A/en active Pending
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104331375A (en) * | 2014-10-29 | 2015-02-04 | 中国建设银行股份有限公司 | Shared virtualized resource management method and shared virtualized resource management device under shared virtualized resource pool environment |
CN106020795A (en) * | 2016-05-09 | 2016-10-12 | 汉柏科技有限公司 | Realization method and device of VDI desktop personal data disk |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108804038A (en) * | 2018-05-29 | 2018-11-13 | 新华三技术有限公司 | Method, apparatus, server and the computer-readable medium of daily record data migration |
CN109379412A (en) * | 2018-09-27 | 2019-02-22 | 郑州云海信息技术有限公司 | A kind of method and apparatus for deleting cloud host |
CN113806007A (en) * | 2020-06-15 | 2021-12-17 | 中兴通讯股份有限公司 | Disk mounting method, disk mounting device, storage medium, and electronic device |
WO2021254280A1 (en) * | 2020-06-15 | 2021-12-23 | 中兴通讯股份有限公司 | Disk mounting method and device, storage medium, and electronic device |
CN112631784A (en) * | 2020-12-31 | 2021-04-09 | 联想未来通信科技(重庆)有限公司 | Resource-based allocation/processing method and electronic equipment |
CN113126912A (en) * | 2021-03-15 | 2021-07-16 | 新华三大数据技术有限公司 | Personal disk mounting method and device |
CN113504872A (en) * | 2021-05-14 | 2021-10-15 | 济南浪潮数据技术有限公司 | Method, system, equipment and medium for mounting virtual disk on cloud physical machine |
CN113504872B (en) * | 2021-05-14 | 2023-11-03 | 济南浪潮数据技术有限公司 | Method, system, equipment and medium for mounting virtual disk on cloud physical machine |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9898601B2 (en) | Allocation of shared system resources | |
CN106503587A (en) | A kind of hanging method of data disks and monitor of virtual machine | |
US9864636B1 (en) | Allocating processor resources based on a service-level agreement | |
CN104901923B (en) | A kind of virtual machine access mechanism and method | |
CN104662552B (en) | The disk access control of safety | |
US9491112B1 (en) | Allocating processor resources based on a task identifier | |
US9477500B2 (en) | Managing and controlling a distributed network service platform | |
US8955108B2 (en) | Security virtual machine for advanced auditing | |
CN108369504A (en) | It is distributed to the update by model-driven of variation topology | |
US7458066B2 (en) | Computer system and method for transferring executables between partitions | |
US20160364571A1 (en) | Mechanism to augment ips/siem evidence information with process history snapshot and application window capture history | |
US20090307705A1 (en) | Secure multi-purpose computing client | |
RU2501075C2 (en) | Content isolation by processes in application | |
US9785769B2 (en) | Countering attacks on a cache | |
WO2013112151A1 (en) | Data center with continuous world switch security | |
US10587652B2 (en) | Generating false data for suspicious users | |
KR20130000253A (en) | Apparatus and method for controlling memory access in virtualized system | |
CN101378329B (en) | Distributed business operation support system and method for implementing distributed business | |
CN104750623B (en) | A kind of method and device of internal memory virtualization | |
CN117321581A (en) | Techniques for deterministic distributed caching of accelerated SQL queries | |
US11349930B2 (en) | Identifying and deleting idle remote sessions in a distributed file system | |
CN114510321A (en) | Resource scheduling method, related device and medium | |
CN109165078A (en) | A kind of virtual distributed server and its access method | |
US10613986B2 (en) | Adjustment of the number of tasks for a cache storage scan and destage application based on the type of elements to be destaged from the cache storage | |
US7962922B2 (en) | Delivering callbacks into secure application areas |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170315 |