CN106557354A - The method and computer equipment of the property parameters of privately owned mirror image are set - Google Patents

The method and computer equipment of the property parameters of privately owned mirror image are set Download PDF

Info

Publication number
CN106557354A
CN106557354A CN201611014963.2A CN201611014963A CN106557354A CN 106557354 A CN106557354 A CN 106557354A CN 201611014963 A CN201611014963 A CN 201611014963A CN 106557354 A CN106557354 A CN 106557354A
Authority
CN
China
Prior art keywords
mirror image
privately owned
virtual machine
computer equipment
owned mirror
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201611014963.2A
Other languages
Chinese (zh)
Other versions
CN106557354B (en
Inventor
罗思标
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Cloud Computing Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Priority to CN201611014963.2A priority Critical patent/CN106557354B/en
Publication of CN106557354A publication Critical patent/CN106557354A/en
Application granted granted Critical
Publication of CN106557354B publication Critical patent/CN106557354B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • G06F9/45533Hypervisors; Virtual machine monitors
    • G06F9/45558Hypervisor-specific management and integration aspects
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • G06F9/45533Hypervisors; Virtual machine monitors
    • G06F9/45558Hypervisor-specific management and integration aspects
    • G06F2009/45595Network integration; Enabling network access in virtual machine instances

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Stored Programmes (AREA)

Abstract

The application is related to the method to set up and computer equipment of the property parameters of privately owned mirror image in IT technical fields, more particularly to public cloud field.In the technical scheme that the application is provided, computer equipment obtains the registry file path in the privately owned mirror image;The computer equipment configures the virtual machine automated log on registration table and virtual machine start automatic scripts registry in the privately owned mirror image according to the registry file path.The technical scheme provided by the application, user do not need manual operation just change the attribute information of privately owned mirror image, reduce the loaded down with trivial details manual configuration of user, improve Consumer's Experience.

Description

The method and computer equipment of the property parameters of privately owned mirror image are set
Technical field
The application is related to the setting of the property parameters of privately owned mirror image in IT technical fields, more particularly to public cloud technical field Method and computer equipment.
Background technology
Intel Virtualization Technology is one of key technology of field of cloud calculation, the physical resource of physical machine can be invented multiple void Plan machine (Virtual Machine, VM), physical resource are virtualized platform in the form of virtualization pool, are supplied to each virtual Machine, different virtual machines can distribute to different users, and physical resource is shared between virtual machine.
Virtual machine can be considered as by software simulate it is with complete hardware system function, and operate in one completely every Complete computer in environment.Virtual machine image is a Cloud Server masterplate for containing software and necessary configuration. Virtual machine image includes at least operating system, can also include application software such as database software.
In public cloud technical field, virtual machine image can be divided into two kinds of public mirror image and privately owned mirror image.Public mirror image is to be The default image that system is provided, is the common base mirror image that standard operation system is provided by cloud platform official, visible to all users. And privately owned mirror image is then the mirror image that user creates, it is the personal mirror image created based on Cloud Server or system disk backup, only user Itself is visible;Privately owned mirror image can include privately owned application of standard operation system, the common application context of pre-installation and user etc.. In a particular application, user can use public mirror image or privately owned mirror image application elasticity Cloud Server, it is also possible to by existing Cloud Server create privately owned mirror image.
Under public cloud scene, publicly-owned cloud platform passes through clonal fashion or mirror image lead-in mode generates privately owned mirror image, uses The privately owned mirror image creates virtual machine and distributes to user's use.During virtual machine is created, or user passes through public cloud During platform imports the privately owned mirror image of oneself, user can not be configured to the property parameters of privately owned mirror image in advance, such as set Put original password of privately owned mirror image etc..If user have forgotten the original password of privately owned mirror image, user cannot log in use and be somebody's turn to do The virtual machine created by privately owned mirror image.
Due to configuring to the property parameters of virtual machine in advance, prior art cannot meet public cloud technical field The individual demand of user in lower practical business, such as user requirement of different safeties etc. under different production environments.
The content of the invention
Embodiment described herein provides the method to set up and computer of the property parameters of privately owned mirror image in public cloud Equipment, to improve Consumer's Experience.
On the one hand, this application provides in public cloud the property parameters of privately owned mirror image method to set up, including:Computer sets The standby registry file path obtained in the privately owned mirror image;
The computer equipment is changed the virtual machine in the privately owned mirror image according to the registry file path and is stepped on automatically Record registration table and virtual machine start automatic scripts registry.
In a kind of possible mode, the computer equipment obtains the dummy machine system file in the privately owned mirror image, The dummy machine system file is backed up, and clear operation is performed to the dummy machine system file.
In another possible mode, the computer equipment changes the close event tracking journey in the privately owned mirror image Sequence registration table so that the virtual machine created using the privately owned mirror image does not show the dialogue of close event tracing program upon actuation Frame.
In alternatively possible mode, the computer equipment changes described privately owned according to the registry file path After virtual machine automated log on registration table and virtual machine start automatic scripts registry in mirror image, methods described is also wrapped Include:The computer equipment creates virtual machine according to amended privately owned mirror image.
In alternatively possible mode, the computer equipment obtains the registry file path in the privately owned mirror image Before, methods described also includes:The computer equipment using the privately owned mirror image as ephemeral data disk carry in interim main frame On;The computer equipment changes the virtual machine automated log on registration in the privately owned mirror image according to the registry file path After table and virtual machine start automatic scripts registry, methods described also includes:Face described in the computer equipment unloading When main frame the ephemeral data disk, and be mounted to the corresponding void of the privately owned mirror image using the ephemeral data disk as system disk On plan machine.
On the other hand, this application provides a kind of computer equipment, including acquisition module and processing module:
The acquisition module is used to obtain the registry file path in privately owned mirror image;
The processing module is automatic for the virtual machine in the privately owned mirror image is changed according to the registry file path Login Register table and virtual machine start automatic scripts registry.
In a kind of possible mode, the acquisition module is further used for obtaining the virtual machine system in the privately owned mirror image System file;The processing module is further used for backing up the dummy machine system file, and the dummy machine system file is held Row clear operation.
In another possible mode, the processing module is further used for changing the closing thing in the privately owned mirror image Part tracing program registration table.
In alternatively possible mode, the computer equipment also includes virtual machine creating module, for according to modification Privately owned mirror image afterwards creates virtual machine.
In alternatively possible mode, the computer equipment also includes Virtual machine control module, for obtaining described Before delivery block obtains the registry file path in the privately owned mirror image, using the privately owned mirror image as ephemeral data disk carry On interim main frame;The Virtual machine control module is further used in the processing module according to the registry file path After changing the virtual machine automated log on registration table and virtual machine start automatic scripts registry in the privately owned mirror image, unload The ephemeral data disk on the interim main frame is carried, and the privately owned mirror is mounted to using the ephemeral data disk as system disk As on corresponding virtual machine.
On the other hand, this application provides a kind of computer equipment, the computer equipment include an at least processor and An at least memorizer, at least one memorizer are used to store computer program, described at least one computing device The computer equipment is caused to perform the method described in the application after computer program.
On the other hand, a kind of computer-readable storage medium of the application, saves as computer on the computer-readable storage medium soft Part is instructed, and makes computer perform the method described in the application after the computer software instructions operation.
Compared to prior art, the technical scheme provided by the embodiment of the present application, by computer equipment perform script journey Sequence, user can be modified to the property parameters of privately owned mirror image under off-line state, so as to meet user in practical business Individual demand, improves Consumer's Experience.
Description of the drawings
To illustrate the embodiment of the present application or technical scheme of the prior art, below will be to embodiment or description of the prior art Needed for accompanying drawing to be used be briefly described.It should be evident that what is reflected in accompanying drawings below is only of the application Divide embodiment, for those of ordinary skill in the art, without having to pay creative labor, can be with according to this A little accompanying drawings obtain the other embodiment of the application.And all these embodiments or embodiment are all in the protection domain of the application Within.
Fig. 1 is a kind of possible system structure diagram for realizing the embodiment of the present application;
Fig. 2 is the computer equipment schematic diagram that provides for the embodiment of the present application;
The method flow schematic diagram of the virtual machine entry password of the privately owned mirror image of modification that Fig. 3 is provided for the embodiment of the present application;
A kind of structural representation of computer equipment that Fig. 4 is provided for the embodiment of the present application.
Specific embodiment
Below in conjunction with accompanying drawing, the technical scheme in the embodiment of the present application is described.Obviously, described embodiment The embodiment of only some embodiments of the present application, rather than whole.Based on the embodiment in the application, the common skill in this area The every other embodiment obtained under the premise of creative work is not paid by art personnel, belongs to the model of the application protection Enclose.
The network architecture and business scenario of the embodiment of the present application description is for the technical side for illustrating the embodiment of the present application Case, does not constitute the restriction of the technical scheme provided for the embodiment of the present application, and those of ordinary skill in the art understand, with net The differentiation of network framework and the appearance of new business scene, the embodiment of the present application provide technical scheme for similar technical problem, It is equally applicable.
As shown in figure 1, this application provides a kind of system architecture schematic diagram of cloud service system, user operation client 106 access cloud service by network 104, log in virtual machine.The cloud service system includes main frame 102.
Client 106:User is connected to cloud service system by the client 106, and user can pass through 106 Shen of client Please open cloud service business, application virtual machine and application and reset the business such as virtual machine OS login passwords.The client 106 can With based on various types of platforms, including but not limited to Web Portal, IOS, ARIXTRA, Linux and windows platform etc.. The client 106 is may be mounted on user equipment, and the user equipment involved by the application can include various with communication The handheld device of function, mobile unit, wearable device, computing device are connected to the processing equipment of disparate networks, and respectively Plant form mobile station (Mobile station, abbreviation MS), terminal (terminal), terminal unit (Terminal Equipment) etc..For convenience of describing, in the application, apparatus mentioned above is referred to as user equipment.
Main frame 102:Can be various types of physical servers, for providing physical resource.Operation on main frame 102 has void Plan machine monitor (Virtual Machine Monitor, VMM) 1020.VMM 1020 is positioned at operating system and hardware 1022 Between code.After virtual machine technique, hardware 1022 is divided into multiple virtual machines (Virtual Machine, VM), such as VM1, VM2, VM3 ... VMn in Fig. 1.Virtual machine is a virtual computer for simulating out, namely in logic Computer.VMM 1020 can isolate and manage multiple virtual machines of upper strata operation, arbitrate their access to bottom hardware, And for the virtual a set of virtual hardware environment independently of actual hardware of each virtual machine, such as processor, internal memory, I/O equipment etc..
Fig. 2 show the computer equipment schematic diagram of the embodiment of the present application offer.Computer equipment 200 includes at least one Processor 201, communication bus 202, at least one memorizer 203 and at least one communication interface 204.
Processor 201 can be general central processor (CPU), microprocessor, an ASIC (application-specific integrated circuit, ASIC), or one or more be used for control application scheme The integrated circuit of program performing.
Communication bus 202 may include a path, the transmission information between said modules.The communication interface 204, Ke Yishi Using the device of one class of any transceiver, for the communication between other equipment or communication network.Here communication network can To be Ethernet, wireless access network (Radio Access Network, RAN), WLAN (Wireless Local Area Networks, WLAN) etc..
Memorizer 203 can be read only memory (read-only memory, ROM), can store static information and instruction Static storage device, random access memory (random access memory, RAM) or can storage information and instruction Dynamic memory, or EEPROM (Electrically Erasable Programmable Read-Only Memory, EEPROM), read-only optical disc (Compact Disc Read-Only Memory, CD-ROM) or other optical disc storages, laser disc storage (include compression laser disc, laser disc, laser disc, Digital Versatile Disc, Blu-ray Disc Deng), magnetic disk storage medium or other magnetic storage apparatus or can be used in carrying or storing that there is instruction or data structure shape The desired program code of formula simultaneously can be by any other medium of computer access, but not limited to this.Memorizer 203 can be It is individually present, is connected with processor 201 by communication bus 202;Memorizer 203 can also be integrated in one with processor 201 Rise.
Above-mentioned memorizer 203 can be used to store the application code for performing application scheme;Processor 201 can be used to hold The application code stored in line storage 203.
Used as a kind of embodiment for implementing, computer equipment 200 can include multiple processors, such as in Fig. 2 Processor 201 and processor 208.Each in these processors can be monokaryon (single-CPU) processor, also may be used Being multinuclear (multi-CPU) processor.Each processor itself, such as processor 201 can include one or more CPU, example Such as CPU0 and CPU1.
Computer equipment 200 can also include outut device 205 and input equipment 206.Outut device 205 and processor 201 communications, can carry out display information in many ways.Outut device 205 can be liquid crystal display (liquid crystal Display, LCD), Light-Emitting Diode (light emitting diode, LED) display device, cathode ray tube (cathode Ray tube, CRT) display device or projector (projector) etc..Input equipment 206 and processor 201 communicate, can be with The input of various ways receive user.Input equipment 206 can be mouse, keyboard, touch panel device or sensing equipment etc..
Computer equipment 200 can be general purpose computing device or dedicated computing machine equipment.In implementing, meter It can be desktop computer, portable computer, the webserver, palm PC (Personal Digital to calculate machine equipment 200 Assistant, PDA), cell phone, panel computer, wireless terminal device, communication equipment or embedded device etc..The application Embodiment does not limit the type of computer equipment 200.
It should be noted that the computer equipment 200 shown in Fig. 2 be only give each several part in cloud service system can The hardware implementation mode of energy, according to the different or change of system components function, can be to the nextport hardware component NextPort of computer equipment Additions and deletions are carried out, so that being matched with the function of system components.
During user is using virtual machine, user can change the attribute ginseng of virtual machine with manual modification registry entry Number.By taking the acquiescence login password that user changes virtual machine as an example, user can proceed as follows:
1) launch " HKEY_LOCAL_MACHINE manually>SOFTWARE>Microsoft>Windows NT> CurrentVersion>Winlogon " is changed with showing all of registry entry under " Winlogon " " AutoAdminLogon " is simultaneously revised as 1 by the value of " DefaultPassword ";
2) launch " HKEY_LOCAL_MACHINE manually>SOFTWARE>Microsoft>Windows> CurrentVersion>Run " showing all of registry entry under " Run ", double-click " (Default) " after pop-up dialogue box " C is input in numeric data item:\setpass.vbs”.
By operation above, user is artificially configured with the acquiescence login password of virtual machine, can be with the virtual machine conduct Mirror image template creates other new virtual machines, so as to realize the self-defining login password used in the virtual machine of the new establishment. Certainly similarly, user can also be belonged to change accordingly by finding the corresponding registry entry of other property parameters of virtual machine The value of property parameter.
During implementing, user can also not need manual operation, but change privately owned mirror by shell script The attribute information of picture such as virtual machine entry password;So as to, after new virtual machine is created as privately owned mirror image with the virtual machine, use The login password that family can be set with use logs in the virtual machine of the new establishment.With reference to Fig. 3, the void to changing privately owned mirror image The embodiment of plan machine login password is described in detail.
Step 301:Computer equipment obtains the system password file in privately owned mirror image and registry file path.
In the realization of step 301, computer equipment can first according to the catalogue of the privately owned mirror image of carry be " $ rootPath " To recognize the OS Type of the privately owned mirror image of carry.If mount directory is " $ rootPath/Windows/ ", the void is illustrated Plan machine uses Windows systems;If mount directory is " $ rootPath/root/ ", illustrate that the virtual machine is used (SuSE) Linux OS.
By taking Windows systems as an example, system password file path is " $ rootPath/Windows/System32/ Config/SAM ", registry file path are " $ rootPath/Windows/System32/config/SOFTWARE ".To retouch State conveniently, " Windows/System32/config/ " in the application can be represented with " $ configPath/ ", and " Windows/System32/config/SOFTWARE " then can be represented with " $ systemSoftwarePath ".
Step 302:Computer equipment first backs up said system cryptogam, then performs password to system password file clear Division operation.
Specifically by taking Windows systems as an example, computer equipment is first backed up " $ rootPath/Windows/System32/ System password file under config/ " catalogues such as SAM files, are then operated the SAM files using chntpw The password of Administrator user is emptied.The following is the example pseudo-code for realizing step 302:
cp-f$rootPath/$configPath/SAM$rootPath/$configPath/SAM_BAK
chntpw-u Administrator$rootPath/$configPath/SAM<<EOF
>1
>y
>EOF
It should be noted that the step 302 Computer device backup system password file is for security consideration, once The operation that the virtual machine entry password of privately owned mirror image is changed in the present embodiment is unsuccessful, the state before can also returning to..
Step 303:The virtual machine automated log on registration table and virtual machine that computer equipment is changed in privately owned mirror image is started shooting certainly It is dynamic to start scripts registry.
By taking Windows systems as an example, the example of virtual machine automated log on registration table is as follows:
Windows Registry Editor Version 5.00
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows
NT\CurrentVersion\Winlogon]
" AutoAdminLogon "=" 1 "
" DefaultUserName "=" Administrator "
" DefaultPassword "=" "
The example of the virtual machine start automatic scripts registry by taking Windows systems as an example is as follows:
Windows Registry Editor Version 5.00
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
" InitScript "=" c:\\setpass.vbs"
Step 303 Computer equipment can use the false code modification virtual machine automated log on registration table of following example:
reged-I$rootPath/$systemSoftwarePath HKEY_LOCAL_MACHINE\\SOFTWARE/ opt/
ecs_scripts/winlogon.reg–C
In the step 303, computer equipment can use the false code modification virtual machine start automatic of following example Scripts registry:
reged-I$rootPath/$systemSoftwarePath HKEY_LOCAL_MACHINE\\SOFTWARE/ opt/
ecs_scripts/runsetpass.reg–C
Step 304:Computer equipment changes the close event tracing program registration table in privately owned mirror image so that virtual machine exists The dialog box of close event tracing program is not shown after startup.
The example of the close event tracing program registration table by taking Windows systems as an example is as follows:
Windows Registry Editor Version 5.00
[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows NT\ Reliability]
" ShutdownReasonOn "=dword:00000000
In step 304, computer equipment can use the false code modification close event tracing program note of following example Volume table:
reged-I$rootPath/$systemSoftwarePath HKEY_LOCAL_MACHINE\\SOFTWARE/ opt/
ecs_scripts/reliability.reg–C
By changing the close event tracing program registration table in privately owned mirror image in step 304, it is possible to reduce to virtual machine Automated log on flow process impact, improve Consumer's Experience.
It should be noted that before above-mentioned steps 302, computer equipment can also be detected to privately owned mirror image, sentenced Whether the virtual machine entry password of the disconnected privately owned mirror image has been modified.Such as the virtual machine entry password of the privately owned mirror image has been It is modified, then the computer equipment is not modified to the virtual machine entry password of the virtual machine;Only in the privately owned mirror image Virtual machine entry password be not modified in the case of, computer equipment just performs the privately owned mirror image of modification shown in above-mentioned Fig. 3 Virtual machine entry password embodiment.For example, computer equipment can utilize reged orders by SOFTWARE registry files In automatic running program register button derive after, judge whether the virtual machine entry password of the privately owned mirror image is changed Cross.If in the automatic running program register button simultaneously comprising " setpass.vbs " and " InitScript ", then the virtual machine Privately owned mirror image is to be " InitScript "=" C:Setpass.vbs " configuration privately owned mirror image.Implement puppet Example code is as follows:
Using the above-described embodiment shown in the application Fig. 3, by computer equipment perform script program, user can from The property parameters of privately owned mirror image are modified under line states, such that it is able to meet the individual demand of user in practical business, The requirement of such as user different safeties under different production environments, improves Consumer's Experience.
Such as user is created privately owned mirror image or user by clonal fashion and the privately owned mirror of oneself is imported by publicly-owned cloud platform During picture, user is without the need for going manually to configure the property parameters of privately owned mirror image, it is possible to directly creating virtual using the privately owned mirror image The injection of virtual machine initial log password is completed during machine.With based on the Windows virtual machines under the virtualized publicly-owned cloud platforms of XEN As a example by, user can be passed through with self-defined initial login password, the login password when by public cloud interface creating virtual machine The interface of cloud computing management platform OpenStack is sent to virtual management platform, by virtual management platform in calculate node Agency (Computing Node Agent, CNA) on by the image file carry of Window system disk on Domain0, and Identify the catalogue that SAM files and SOFTWARE registration tablies are located, virtual management platform is by the script file of starting up Setpass.vbs and password configuration file passwd.inf copy to privately owned mirror image, and (i.e. the mirror image of Window system disk is literary Part) mount directory under, i.e., under the C packing catalogues of Windows systems, while virtual management platform modifying hangs over the carry mesh The property parameters of the image file of the Window system disk under record.So virtual machine can just be triggered after starting and perform start Automatic script setpass.vbs, realizes the setting of the property parameters such as virtual machine entry password to privately owned mirror image, Ran Houqing Above-mentioned password configuration file passwd.inf and start automatic script setpass.vbs is managed, and reduces registration table to realize To opening the cleaning for starting that scripts registry and automated log on registration table are arranged, so as to restoring scene environment, virtual machine is restarted, will One clean virtual machine entry window presents to user.
On the other hand, in scene of the user using public cloud virtual machine, if to have forgotten Virtual Machine Manager person close for user Code, it is also possible to realize resetting the login password of virtual machine by the above-described embodiment shown in the application Fig. 3.Calculate The privately owned mirror image of user is first imported to publicly-owned cloud platform by mirroring service management platform by machine equipment, and with this privately owned mirror image Create virtual machine instance before using the system image file of virtual machine as ephemeral data disk carry in pre-prepd interim master On machine.Still with Windows virtual machine instances, user can first prepare an interim Linux virtual machine as above-mentioned interim main frame With standby, and the login password of virtual machine is reset by following operation:
1) the secure group rule of Windows virtual machines is changed, 3389 ports of " TCP " agreement item is such as closed, to prevent which His IP address accesses the virtual machine;
2) Windows virtual machines are closed, unloads the private of the system disk as Windows virtual machines of the Windows virtual machines There is mirror image, and be mounted to the system disk as ephemeral data disk on pre-prepd interim Linux virtual machines;
3) Telnet interim Linux virtual machines, install the ephemeral data disk of above-mentioned carry, prop up such as in ephemeral data disk Hold the instrument of the software kit and modification windows registration tablies of new technology file system;
4) perform the script of modification Windows virtual machine entry passwords;The original login for removing Windows virtual machines is close Code;
5) the ephemeral data disk i.e. system disk of original Windows virtual machines of interim Linux virtual machines is unloaded online, and should Ephemeral data disk be Windows virtual machines system disk again carry return original Windows virtual machines on;
6) original Windows virtual machines are opened, and recover it is above-mentioned 1) in the safety regulation changed, such as opening " TCP " agreement 3389 ports of item.
The above embodiments of the present application only as a example by arranging the login password of virtual machine, also may be used by other property parameters of virtual machine Arrange with by similar mode.Increase the operation sheet that machine name and IP address are set such as in setpass.vbs scripts Invention above-described embodiment can be used for configuring machine name in privately owned mirror image, IP address information etc..It is specific as follows:
1) before virtual machine is created with privately owned mirror image, privately owned mirror image can be mounted on Domain0, and it is logical in bottom The mode automated log on of off-line arrangement is crossed, start automatic script is write in registration table, while being set according to user oneself Virtual machine entry password, one or a combination set of property parameters such as machine name and IP address are transmitted by the interface of OpenStack Get off, generate corresponding custom profile such as passwd.inf, network.inf, hostname.inf etc.;And by these Custom profile is injected under root i.e. " the $ rootPath " of Windows systems.
2) after virtual machine starts automated log on, i.e. triggering performs start automatic script setpass.vbs, therefrom reads Custom profile passwd.inf, network.inf, hostname.inf etc. are carrying out matching somebody with somebody for virtual machine attribute parameter Put.
3) above-mentioned custom profile and setpass.vbs scripts are deleted, and reduces registration table.
As shown in figure 4, a kind of structural representation of the computer equipment 400 provided for the embodiment of the present application, the computer Equipment 400 includes acquisition module 402 and processing module 404.Wherein:
Acquisition module 402 is used to obtain the registry file path in privately owned mirror image;
Processing module 404 is then automatic for the virtual machine in above-mentioned privately owned mirror image is changed according to above-mentioned registry file path Login Register table and virtual machine start automatic scripts registry.
By the computer equipment shown in Fig. 4, user can arrange the property parameters of privately owned mirror image without the need for manual operation. By taking the virtual machine entry password in the privately owned mirror image of modification as an example, processing module 404 can use the embodiment shown in the application Fig. 3 In method realizing.It is in implementing, unsuccessful because there is operating for the virtual machine entry password for changing privately owned mirror image Situation, is security consideration, and it is above-mentioned that the acquisition module 402 in the computer equipment 400 of the application can also be further used for acquisition Dummy machine system file in privately owned mirror image, is used to back up, and is performed removing by 404 pairs of dummy machine system files of processing module Operation.
To reduce the impact of the automated log on flow process to virtual machine, Consumer's Experience, the process in computer equipment 400 are improved Module 404 can also change the close event tracing program registration table in privately owned mirror image so that virtual machine is not shown upon actuation The dialog box of close event tracing program.
The computer equipment 400 of the application can also include virtual machine creating module 406, for according to amended privately owned Mirror image creates virtual machine.So when user is being used by the privately owned mirror image of clonal fashion establishment or imported by publicly-owned cloud platform Creating during virtual machine, using the computer equipment 400 of the application, user is without the need for go configuration privately owned manually for the privately owned mirror image of oneself The property parameters of mirror image, it is possible to the setting of property parameters is directly completed when virtual machine is created, such as virtual machine initial log is close The injection of code.And after property parameters are set up, restoring scene environment, restart virtual machine, by a clean virtual machine entry Window presents to user, so as to improve Consumer's Experience.
The computer equipment 400 of the application can also include Virtual machine control module 408.Virtual machine control module 408 is used In before the registry file path that acquisition module 402 obtains in above-mentioned privately owned mirror image, using the system disk of the virtual machine as Ephemeral data disk carry is on interim main frame;Further, Virtual machine control module 408 is additionally operable in 404 basis of processing module Change the virtual machine automated log on registration table and virtual machine start automatic foot in above-mentioned privately owned mirror image in registry file path After this registration table, the ephemeral data disk on interim main frame is unloaded, and above-mentioned private is mounted to using ephemeral data disk as system disk Have on the corresponding virtual machine of mirror image.Above-mentioned Virtual machine control module 408 can be also used for closing the corresponding void of above-mentioned privately owned mirror image Plan machine.
In scene of the user using public cloud virtual machine, if user have forgotten Virtual Machine Manager person's password, by upper The cooperation of Virtual machine control module 408 is stated, computer equipment 400 can pass through the above-described embodiment shown in the application Fig. 3 and realize The property parameters such as login password of virtual machine is reset.
It should be noted that above-mentioned a kind of computer 400 of the application can be deposited including an at least processor and at least Reservoir, after the computer program of above-mentioned at least one memory storage of above-mentioned at least one computing device, computer equipment 400 The method for performing the property parameters of the setting virtual machine that the above embodiments of the present application are provided.
The embodiment of the present application additionally provides a kind of computer-readable storage medium, and for storing computer software instructions, which includes For performing the program designed by the application said method embodiment.By the program for performing storage, it is possible to achieve the application is carried For setting virtual machine property parameters method.
Although here is described to the application with reference to each embodiment, however, implementing the application required for protection During, those skilled in the art are by checking the accompanying drawing, disclosure and appended claims, it will be appreciated that and it is real Other changes of the existing open embodiment.In the claims, " include " that (comprising) word is not excluded for other compositions Part or step, "a" or "an" are not excluded for multiple situations.Single processor or other units can realize claim In some functions enumerating.Mutually different has been recited in mutually different dependent some measures, it is not intended that these are arranged Apply to combine and produce good effect.
It will be understood by those skilled in the art that embodiments herein can be provided as method, device (equipment), or computer journey Sequence product.Therefore, the application can adopt complete hardware embodiment, complete software embodiment or with reference to software and hardware in terms of The form of embodiment.And, the application can be using the calculating for wherein including computer usable program code at one or more The computer program implemented in machine usable storage medium (including but not limited to disk memory, CD-ROM, optical memory etc.) The form of product.Computer program is stored/distributed in suitable medium, is provided or as the one of hardware together with other hardware Part, it would however also be possible to employ other distribution forms, such as passes through Internet or other wired or wireless telecommunication systems.
The application be with reference to the embodiment of the present application method, device (equipment) and computer program flow chart with/ Or block diagram is describing.It should be understood that can by each flow process in computer program instructions flowchart and/or block diagram and/ Or the combination of square frame and flow chart and/or flow process and/or square frame in block diagram.These computer program instructions can be provided Processor to general purpose computer, special-purpose computer, Embedded Processor or other programmable data processing devices is producing one Individual machine so that produced for realizing by the instruction of computer or the computing device of other programmable data processing devices The device of the function of specifying in one flow process of flow chart or one square frame of multiple flow processs and/or block diagram or multiple square frames.
These computer program instructions may be alternatively stored in and can guide computer or other programmable data processing devices with spy Determine in the computer-readable memory that mode works so that the instruction being stored in the computer-readable memory is produced to be included referring to Make the manufacture of device, the command device realize in one flow process of flow chart or one square frame of multiple flow processs and/or block diagram or The function of specifying in multiple square frames.
These computer program instructions can be also loaded in computer or other programmable data processing devices so that in meter Series of operation steps is performed on calculation machine or other programmable devices to produce computer implemented process, so as in computer or The instruction performed on other programmable devices is provided for realizing in one flow process of flow chart or multiple flow processs and/or block diagram one The step of function of specifying in individual square frame or multiple square frames.
Although being described to the application with reference to specific features and embodiment, it is clear that, without departing from this Shen In the case of spirit and scope please, various modifications and combinations can be carried out to which.Correspondingly, the specification and drawings are only institute The exemplary illustration of the application that attached claim is defined, and be considered as cover in the range of the application any and all and repair Change, change, combining or equivalent.Obviously, those skilled in the art the application can be carried out it is various change and modification and not Depart from spirit and scope.So, if the application these modification and modification belong to the application claim and its Within the scope of equivalent technologies, then the application is also intended to comprising these changes and modification.

Claims (12)

1. in public cloud the property parameters of privately owned mirror image method to set up, it is characterised in that include:
Computer equipment obtains the registry file path in the privately owned mirror image;
The computer equipment changes the virtual machine automated log on note in the privately owned mirror image according to the registry file path Volume table and virtual machine start automatic scripts registry.
2. the method for claim 1, it is characterised in that methods described also includes:
The computer equipment obtains the dummy machine system file in the privately owned mirror image, backs up the dummy machine system file, And clear operation is performed to the dummy machine system file.
3. method as claimed in claim 1 or 2, it is characterised in that methods described also includes:
The computer equipment changes the close event tracing program registration table in the privately owned mirror image so that using described privately owned The virtual machine that mirror image is created does not show the dialog box of close event tracing program upon actuation.
4. the method as described in claim 1 or 2 or 3, it is characterised in that the computer equipment is according to the registry file Path change virtual machine automated log on registration table and virtual machine start automatic scripts registry in the privately owned mirror image it Afterwards, methods described also includes:
The computer equipment creates virtual machine according to amended privately owned mirror image.
5. the method as described in claim 1 or 2 or 3, it is characterised in that the computer equipment is obtained in the privately owned mirror image Registry file path before, methods described also includes:
The computer equipment using the privately owned mirror image as ephemeral data disk carry on interim main frame;
The computer equipment changes the virtual machine automated log on note in the privately owned mirror image according to the registry file path After volume table and virtual machine start automatic scripts registry, methods described also includes:
The computer equipment unloads the ephemeral data disk of the interim main frame, and using the ephemeral data disk as system Disk is mounted on the corresponding virtual machine of the privately owned mirror image.
6. a kind of computer equipment, it is characterised in that the computer equipment includes acquisition module and processing module:
The acquisition module is used to obtain the registry file path in privately owned mirror image;
The processing module is for according to the virtual machine automated log in the registry file path modification privately owned mirror image Registration table and virtual machine start automatic scripts registry.
7. computer equipment as claimed in claim 6, it is characterised in that the acquisition module is further used for obtaining the private The dummy machine system file having in mirror image;
The processing module is further used for backing up the dummy machine system file, and the dummy machine system file is performed clear Division operation.
8. computer equipment as claimed in claims 6 or 7, it is characterised in that the processing module is further used for changing institute State the close event tracing program registration table in privately owned mirror image.
9. the computer equipment as described in claim 6 or 7 or 8, it is characterised in that the computer equipment also includes virtual machine Creation module, for creating virtual machine according to amended privately owned mirror image.
10. the method as described in claim 6 or 7 or 8, it is characterised in that the computer equipment is also controlled including virtual machine Module, for before the registry file path that the acquisition module obtains in the privately owned mirror image, by the privately owned mirror image As ephemeral data disk carry on interim main frame;
The Virtual machine control module is further used in the processing module according to the modification of the registry file path After virtual machine automated log on registration table and virtual machine start automatic scripts registry in privately owned mirror image, face described in unloading When main frame on the ephemeral data disk, and it is corresponding that the ephemeral data disk is mounted to the privately owned mirror image as system disk On virtual machine.
11. a kind of computer equipments, it is characterised in that the computer equipment includes an at least processor and an at least storage Device, at least one memorizer are used to store computer program, computer program described at least one computing device Afterwards so that the computer equipment perform claim requires the method described in 1 to 5 any one.
A kind of 12. computer-readable storage mediums, save as computer software instructions, the computer on the computer-readable storage medium Computer perform claim is made to require the method described in 1 to 5 any one after software instruction operation.
CN201611014963.2A 2016-11-17 2016-11-17 Method for setting attribute parameters of private image and computer equipment Active CN106557354B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201611014963.2A CN106557354B (en) 2016-11-17 2016-11-17 Method for setting attribute parameters of private image and computer equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611014963.2A CN106557354B (en) 2016-11-17 2016-11-17 Method for setting attribute parameters of private image and computer equipment

Publications (2)

Publication Number Publication Date
CN106557354A true CN106557354A (en) 2017-04-05
CN106557354B CN106557354B (en) 2020-12-25

Family

ID=58444857

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611014963.2A Active CN106557354B (en) 2016-11-17 2016-11-17 Method for setting attribute parameters of private image and computer equipment

Country Status (1)

Country Link
CN (1) CN106557354B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109445709A (en) * 2018-11-05 2019-03-08 郑州云海信息技术有限公司 The management method and device of storage resource in virtualization system
CN109684028A (en) * 2017-10-18 2019-04-26 中兴通讯股份有限公司 A kind of method, device and equipment that operating system is separated with user data
CN113296873A (en) * 2020-05-15 2021-08-24 阿里巴巴集团控股有限公司 Mirror image construction method and device, terminal equipment and computer storage medium

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101414274A (en) * 2007-10-18 2009-04-22 上海广联电子有限公司 Method for rapidly recovering picking machine system
US7996414B2 (en) * 2008-02-29 2011-08-09 International Business Machines Corporation Method and system for separating file system metadata from other metadata in virtual machine image format
CN102402446A (en) * 2011-11-22 2012-04-04 成都市华为赛门铁克科技有限公司 Method and device for installing application software
CN102637144A (en) * 2012-03-31 2012-08-15 奇智软件(北京)有限公司 System fault processing method and device
CN103514023A (en) * 2013-10-22 2014-01-15 中国科学院信息工程研究所 Method and system for off-line and automatically installing software of virtual machine
US8839228B2 (en) * 2010-04-21 2014-09-16 Ca, Inc. System and method for updating an offline virtual machine
CN104182257A (en) * 2011-11-22 2014-12-03 华为数字技术(成都)有限公司 Application software installation method and device

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101414274A (en) * 2007-10-18 2009-04-22 上海广联电子有限公司 Method for rapidly recovering picking machine system
US7996414B2 (en) * 2008-02-29 2011-08-09 International Business Machines Corporation Method and system for separating file system metadata from other metadata in virtual machine image format
US8839228B2 (en) * 2010-04-21 2014-09-16 Ca, Inc. System and method for updating an offline virtual machine
CN102402446A (en) * 2011-11-22 2012-04-04 成都市华为赛门铁克科技有限公司 Method and device for installing application software
CN104182257A (en) * 2011-11-22 2014-12-03 华为数字技术(成都)有限公司 Application software installation method and device
CN102637144A (en) * 2012-03-31 2012-08-15 奇智软件(北京)有限公司 System fault processing method and device
CN103514023A (en) * 2013-10-22 2014-01-15 中国科学院信息工程研究所 Method and system for off-line and automatically installing software of virtual machine

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
HONGLINGZUOA: ""修改镜像注册表"", 《百度文库》 *
张洪斌 等: ""编程修改注册表网络参数"", 《河北工业科技》 *
杨勐YM: ""修改gho文件办法 做属于自己个性的gho系统"", 《百度文库》 *

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109684028A (en) * 2017-10-18 2019-04-26 中兴通讯股份有限公司 A kind of method, device and equipment that operating system is separated with user data
CN109684028B (en) * 2017-10-18 2024-04-12 中兴通讯股份有限公司 Method, device and equipment for separating operating system from user data
CN109445709A (en) * 2018-11-05 2019-03-08 郑州云海信息技术有限公司 The management method and device of storage resource in virtualization system
CN113296873A (en) * 2020-05-15 2021-08-24 阿里巴巴集团控股有限公司 Mirror image construction method and device, terminal equipment and computer storage medium

Also Published As

Publication number Publication date
CN106557354B (en) 2020-12-25

Similar Documents

Publication Publication Date Title
US20210314223A1 (en) Managing Virtual Network Functions
US10437280B2 (en) Controlling system clocks in virtual machines
US8930542B2 (en) Dynamically building a set of compute nodes to host the user&#39;s workload
US11023267B2 (en) Composite virtual machine template for virtualized computing environment
US20190087244A1 (en) Hyperconverged system including a user interface, a services layer and a core layer equipped with an operating system kernel
US20140245394A1 (en) Trust-based computing resource authorization in a networked computing environment
US9710292B2 (en) Allowing management of a virtual machine by multiple cloud providers
US9354894B2 (en) Pluggable cloud enablement boot device and method that determines hardware resources via firmware
US10021111B2 (en) Location based authentication of users to a virtual machine in a computer system
US10394971B2 (en) Hybrid simulation of a computing solution in a cloud computing environment with a simplified computing solution and a simulation model
CN114341847B (en) Correspondence of external operations to containers with abrupt events
US20150106521A1 (en) Pluggable cloud enablement boot device and method
Lowe Mastering VMware vSphere 4
US11321077B1 (en) Live updating of firmware behavior
CN106557354A (en) The method and computer equipment of the property parameters of privately owned mirror image are set
US20220207165A1 (en) Information processing method, system, electronic device and computer readable storage medium
US20140229566A1 (en) Storage resource provisioning for a test framework
US10754660B2 (en) Rack level server boot
Gavanda et al. Mastering VMware vSphere 6.7: Effectively deploy, manage, and monitor your virtual datacenter with VMware vSphere 6.7
Wu et al. EVCS: An edge-assisted virtual computing and storage approach for heterogeneous desktop deployment
Vetter et al. IBM Power Systems HMC Implementation and Usage Guide
Mackey et al. XenServer Administration Handbook: Practical Recipes for Successful Deployments
Kusek et al. VMware vSphere 5 Administration Instant Reference
Apolinário Learning Hyper-V
Windom et al. Virtualizing Microsoft Tier 1 Applications with VMware VSphere 4

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20220215

Address after: 550025 Huawei cloud data center, jiaoxinggong Road, Qianzhong Avenue, Gui'an New District, Guiyang City, Guizhou Province

Patentee after: Huawei Cloud Computing Technologies Co.,Ltd.

Address before: 518129 Bantian HUAWEI headquarters office building, Longgang District, Guangdong, Shenzhen

Patentee before: HUAWEI TECHNOLOGIES Co.,Ltd.

TR01 Transfer of patent right