CN106557354A - The method and computer equipment of the property parameters of privately owned mirror image are set - Google Patents
The method and computer equipment of the property parameters of privately owned mirror image are set Download PDFInfo
- Publication number
- CN106557354A CN106557354A CN201611014963.2A CN201611014963A CN106557354A CN 106557354 A CN106557354 A CN 106557354A CN 201611014963 A CN201611014963 A CN 201611014963A CN 106557354 A CN106557354 A CN 106557354A
- Authority
- CN
- China
- Prior art keywords
- mirror image
- privately owned
- virtual machine
- computer equipment
- owned mirror
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 44
- 238000013515 script Methods 0.000 claims abstract description 29
- 230000008859 change Effects 0.000 claims abstract description 11
- 238000012545 processing Methods 0.000 claims description 20
- 230000004048 modification Effects 0.000 claims description 17
- 238000012986 modification Methods 0.000 claims description 17
- 238000003860 storage Methods 0.000 claims description 15
- 238000004590 computer program Methods 0.000 claims description 12
- 230000008569 process Effects 0.000 description 12
- 238000004891 communication Methods 0.000 description 11
- 238000010586 diagram Methods 0.000 description 11
- 230000006870 function Effects 0.000 description 8
- 239000011800 void material Substances 0.000 description 6
- 238000005516 engineering process Methods 0.000 description 5
- 238000004519 manufacturing process Methods 0.000 description 3
- 230000003287 optical effect Effects 0.000 description 3
- 238000004364 calculation method Methods 0.000 description 2
- 238000002347 injection Methods 0.000 description 2
- 239000007924 injection Substances 0.000 description 2
- 239000004973 liquid crystal related substance Substances 0.000 description 2
- 238000007726 management method Methods 0.000 description 2
- 230000003068 static effect Effects 0.000 description 2
- 241000208340 Araliaceae Species 0.000 description 1
- 241000196324 Embryophyta Species 0.000 description 1
- 235000005035 Panax pseudoginseng ssp. pseudoginseng Nutrition 0.000 description 1
- 235000003140 Panax quinquefolius Nutrition 0.000 description 1
- 238000007792 addition Methods 0.000 description 1
- 108010038083 amyloid fibril protein AS-SAM Proteins 0.000 description 1
- 229940104697 arixtra Drugs 0.000 description 1
- 230000033228 biological regulation Effects 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 239000003795 chemical substances by application Substances 0.000 description 1
- 238000004140 cleaning Methods 0.000 description 1
- 230000006835 compression Effects 0.000 description 1
- 238000007906 compression Methods 0.000 description 1
- 238000012217 deletion Methods 0.000 description 1
- 230000037430 deletion Effects 0.000 description 1
- 230000001419 dependent effect Effects 0.000 description 1
- 230000004069 differentiation Effects 0.000 description 1
- 238000009826 distribution Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- KANJSNBRCNMZMV-ABRZTLGGSA-N fondaparinux Chemical compound O[C@@H]1[C@@H](NS(O)(=O)=O)[C@@H](OC)O[C@H](COS(O)(=O)=O)[C@H]1O[C@H]1[C@H](OS(O)(=O)=O)[C@@H](O)[C@H](O[C@@H]2[C@@H]([C@@H](OS(O)(=O)=O)[C@H](O[C@H]3[C@@H]([C@@H](O)[C@H](O[C@@H]4[C@@H]([C@@H](O)[C@H](O)[C@@H](COS(O)(=O)=O)O4)NS(O)(=O)=O)[C@H](O3)C(O)=O)O)[C@@H](COS(O)(=O)=O)O2)NS(O)(=O)=O)[C@H](C(O)=O)O1 KANJSNBRCNMZMV-ABRZTLGGSA-N 0.000 description 1
- 235000008434 ginseng Nutrition 0.000 description 1
- 230000008676 import Effects 0.000 description 1
- 238000009434 installation Methods 0.000 description 1
- 230000014759 maintenance of location Effects 0.000 description 1
- 230000005055 memory storage Effects 0.000 description 1
- 239000000203 mixture Substances 0.000 description 1
- 238000012856 packing Methods 0.000 description 1
- 230000008439 repair process Effects 0.000 description 1
- 230000001960 triggered effect Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/455—Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
- G06F9/45533—Hypervisors; Virtual machine monitors
- G06F9/45558—Hypervisor-specific management and integration aspects
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/455—Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
- G06F9/45533—Hypervisors; Virtual machine monitors
- G06F9/45558—Hypervisor-specific management and integration aspects
- G06F2009/45595—Network integration; Enabling network access in virtual machine instances
Landscapes
- Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Stored Programmes (AREA)
Abstract
The application is related to the method to set up and computer equipment of the property parameters of privately owned mirror image in IT technical fields, more particularly to public cloud field.In the technical scheme that the application is provided, computer equipment obtains the registry file path in the privately owned mirror image;The computer equipment configures the virtual machine automated log on registration table and virtual machine start automatic scripts registry in the privately owned mirror image according to the registry file path.The technical scheme provided by the application, user do not need manual operation just change the attribute information of privately owned mirror image, reduce the loaded down with trivial details manual configuration of user, improve Consumer's Experience.
Description
Technical field
The application is related to the setting of the property parameters of privately owned mirror image in IT technical fields, more particularly to public cloud technical field
Method and computer equipment.
Background technology
Intel Virtualization Technology is one of key technology of field of cloud calculation, the physical resource of physical machine can be invented multiple void
Plan machine (Virtual Machine, VM), physical resource are virtualized platform in the form of virtualization pool, are supplied to each virtual
Machine, different virtual machines can distribute to different users, and physical resource is shared between virtual machine.
Virtual machine can be considered as by software simulate it is with complete hardware system function, and operate in one completely every
Complete computer in environment.Virtual machine image is a Cloud Server masterplate for containing software and necessary configuration.
Virtual machine image includes at least operating system, can also include application software such as database software.
In public cloud technical field, virtual machine image can be divided into two kinds of public mirror image and privately owned mirror image.Public mirror image is to be
The default image that system is provided, is the common base mirror image that standard operation system is provided by cloud platform official, visible to all users.
And privately owned mirror image is then the mirror image that user creates, it is the personal mirror image created based on Cloud Server or system disk backup, only user
Itself is visible;Privately owned mirror image can include privately owned application of standard operation system, the common application context of pre-installation and user etc..
In a particular application, user can use public mirror image or privately owned mirror image application elasticity Cloud Server, it is also possible to by existing
Cloud Server create privately owned mirror image.
Under public cloud scene, publicly-owned cloud platform passes through clonal fashion or mirror image lead-in mode generates privately owned mirror image, uses
The privately owned mirror image creates virtual machine and distributes to user's use.During virtual machine is created, or user passes through public cloud
During platform imports the privately owned mirror image of oneself, user can not be configured to the property parameters of privately owned mirror image in advance, such as set
Put original password of privately owned mirror image etc..If user have forgotten the original password of privately owned mirror image, user cannot log in use and be somebody's turn to do
The virtual machine created by privately owned mirror image.
Due to configuring to the property parameters of virtual machine in advance, prior art cannot meet public cloud technical field
The individual demand of user in lower practical business, such as user requirement of different safeties etc. under different production environments.
The content of the invention
Embodiment described herein provides the method to set up and computer of the property parameters of privately owned mirror image in public cloud
Equipment, to improve Consumer's Experience.
On the one hand, this application provides in public cloud the property parameters of privately owned mirror image method to set up, including:Computer sets
The standby registry file path obtained in the privately owned mirror image;
The computer equipment is changed the virtual machine in the privately owned mirror image according to the registry file path and is stepped on automatically
Record registration table and virtual machine start automatic scripts registry.
In a kind of possible mode, the computer equipment obtains the dummy machine system file in the privately owned mirror image,
The dummy machine system file is backed up, and clear operation is performed to the dummy machine system file.
In another possible mode, the computer equipment changes the close event tracking journey in the privately owned mirror image
Sequence registration table so that the virtual machine created using the privately owned mirror image does not show the dialogue of close event tracing program upon actuation
Frame.
In alternatively possible mode, the computer equipment changes described privately owned according to the registry file path
After virtual machine automated log on registration table and virtual machine start automatic scripts registry in mirror image, methods described is also wrapped
Include:The computer equipment creates virtual machine according to amended privately owned mirror image.
In alternatively possible mode, the computer equipment obtains the registry file path in the privately owned mirror image
Before, methods described also includes:The computer equipment using the privately owned mirror image as ephemeral data disk carry in interim main frame
On;The computer equipment changes the virtual machine automated log on registration in the privately owned mirror image according to the registry file path
After table and virtual machine start automatic scripts registry, methods described also includes:Face described in the computer equipment unloading
When main frame the ephemeral data disk, and be mounted to the corresponding void of the privately owned mirror image using the ephemeral data disk as system disk
On plan machine.
On the other hand, this application provides a kind of computer equipment, including acquisition module and processing module:
The acquisition module is used to obtain the registry file path in privately owned mirror image;
The processing module is automatic for the virtual machine in the privately owned mirror image is changed according to the registry file path
Login Register table and virtual machine start automatic scripts registry.
In a kind of possible mode, the acquisition module is further used for obtaining the virtual machine system in the privately owned mirror image
System file;The processing module is further used for backing up the dummy machine system file, and the dummy machine system file is held
Row clear operation.
In another possible mode, the processing module is further used for changing the closing thing in the privately owned mirror image
Part tracing program registration table.
In alternatively possible mode, the computer equipment also includes virtual machine creating module, for according to modification
Privately owned mirror image afterwards creates virtual machine.
In alternatively possible mode, the computer equipment also includes Virtual machine control module, for obtaining described
Before delivery block obtains the registry file path in the privately owned mirror image, using the privately owned mirror image as ephemeral data disk carry
On interim main frame;The Virtual machine control module is further used in the processing module according to the registry file path
After changing the virtual machine automated log on registration table and virtual machine start automatic scripts registry in the privately owned mirror image, unload
The ephemeral data disk on the interim main frame is carried, and the privately owned mirror is mounted to using the ephemeral data disk as system disk
As on corresponding virtual machine.
On the other hand, this application provides a kind of computer equipment, the computer equipment include an at least processor and
An at least memorizer, at least one memorizer are used to store computer program, described at least one computing device
The computer equipment is caused to perform the method described in the application after computer program.
On the other hand, a kind of computer-readable storage medium of the application, saves as computer on the computer-readable storage medium soft
Part is instructed, and makes computer perform the method described in the application after the computer software instructions operation.
Compared to prior art, the technical scheme provided by the embodiment of the present application, by computer equipment perform script journey
Sequence, user can be modified to the property parameters of privately owned mirror image under off-line state, so as to meet user in practical business
Individual demand, improves Consumer's Experience.
Description of the drawings
To illustrate the embodiment of the present application or technical scheme of the prior art, below will be to embodiment or description of the prior art
Needed for accompanying drawing to be used be briefly described.It should be evident that what is reflected in accompanying drawings below is only of the application
Divide embodiment, for those of ordinary skill in the art, without having to pay creative labor, can be with according to this
A little accompanying drawings obtain the other embodiment of the application.And all these embodiments or embodiment are all in the protection domain of the application
Within.
Fig. 1 is a kind of possible system structure diagram for realizing the embodiment of the present application;
Fig. 2 is the computer equipment schematic diagram that provides for the embodiment of the present application;
The method flow schematic diagram of the virtual machine entry password of the privately owned mirror image of modification that Fig. 3 is provided for the embodiment of the present application;
A kind of structural representation of computer equipment that Fig. 4 is provided for the embodiment of the present application.
Specific embodiment
Below in conjunction with accompanying drawing, the technical scheme in the embodiment of the present application is described.Obviously, described embodiment
The embodiment of only some embodiments of the present application, rather than whole.Based on the embodiment in the application, the common skill in this area
The every other embodiment obtained under the premise of creative work is not paid by art personnel, belongs to the model of the application protection
Enclose.
The network architecture and business scenario of the embodiment of the present application description is for the technical side for illustrating the embodiment of the present application
Case, does not constitute the restriction of the technical scheme provided for the embodiment of the present application, and those of ordinary skill in the art understand, with net
The differentiation of network framework and the appearance of new business scene, the embodiment of the present application provide technical scheme for similar technical problem,
It is equally applicable.
As shown in figure 1, this application provides a kind of system architecture schematic diagram of cloud service system, user operation client
106 access cloud service by network 104, log in virtual machine.The cloud service system includes main frame 102.
Client 106:User is connected to cloud service system by the client 106, and user can pass through 106 Shen of client
Please open cloud service business, application virtual machine and application and reset the business such as virtual machine OS login passwords.The client 106 can
With based on various types of platforms, including but not limited to Web Portal, IOS, ARIXTRA, Linux and windows platform etc..
The client 106 is may be mounted on user equipment, and the user equipment involved by the application can include various with communication
The handheld device of function, mobile unit, wearable device, computing device are connected to the processing equipment of disparate networks, and respectively
Plant form mobile station (Mobile station, abbreviation MS), terminal (terminal), terminal unit (Terminal
Equipment) etc..For convenience of describing, in the application, apparatus mentioned above is referred to as user equipment.
Main frame 102:Can be various types of physical servers, for providing physical resource.Operation on main frame 102 has void
Plan machine monitor (Virtual Machine Monitor, VMM) 1020.VMM 1020 is positioned at operating system and hardware 1022
Between code.After virtual machine technique, hardware 1022 is divided into multiple virtual machines (Virtual Machine, VM), such as
VM1, VM2, VM3 ... VMn in Fig. 1.Virtual machine is a virtual computer for simulating out, namely in logic
Computer.VMM 1020 can isolate and manage multiple virtual machines of upper strata operation, arbitrate their access to bottom hardware,
And for the virtual a set of virtual hardware environment independently of actual hardware of each virtual machine, such as processor, internal memory, I/O equipment etc..
Fig. 2 show the computer equipment schematic diagram of the embodiment of the present application offer.Computer equipment 200 includes at least one
Processor 201, communication bus 202, at least one memorizer 203 and at least one communication interface 204.
Processor 201 can be general central processor (CPU), microprocessor, an ASIC
(application-specific integrated circuit, ASIC), or one or more be used for control application scheme
The integrated circuit of program performing.
Communication bus 202 may include a path, the transmission information between said modules.The communication interface 204, Ke Yishi
Using the device of one class of any transceiver, for the communication between other equipment or communication network.Here communication network can
To be Ethernet, wireless access network (Radio Access Network, RAN), WLAN (Wireless Local
Area Networks, WLAN) etc..
Memorizer 203 can be read only memory (read-only memory, ROM), can store static information and instruction
Static storage device, random access memory (random access memory, RAM) or can storage information and instruction
Dynamic memory, or EEPROM (Electrically Erasable
Programmable Read-Only Memory, EEPROM), read-only optical disc (Compact Disc Read-Only Memory,
CD-ROM) or other optical disc storages, laser disc storage (include compression laser disc, laser disc, laser disc, Digital Versatile Disc, Blu-ray Disc
Deng), magnetic disk storage medium or other magnetic storage apparatus or can be used in carrying or storing that there is instruction or data structure shape
The desired program code of formula simultaneously can be by any other medium of computer access, but not limited to this.Memorizer 203 can be
It is individually present, is connected with processor 201 by communication bus 202;Memorizer 203 can also be integrated in one with processor 201
Rise.
Above-mentioned memorizer 203 can be used to store the application code for performing application scheme;Processor 201 can be used to hold
The application code stored in line storage 203.
Used as a kind of embodiment for implementing, computer equipment 200 can include multiple processors, such as in Fig. 2
Processor 201 and processor 208.Each in these processors can be monokaryon (single-CPU) processor, also may be used
Being multinuclear (multi-CPU) processor.Each processor itself, such as processor 201 can include one or more CPU, example
Such as CPU0 and CPU1.
Computer equipment 200 can also include outut device 205 and input equipment 206.Outut device 205 and processor
201 communications, can carry out display information in many ways.Outut device 205 can be liquid crystal display (liquid crystal
Display, LCD), Light-Emitting Diode (light emitting diode, LED) display device, cathode ray tube (cathode
Ray tube, CRT) display device or projector (projector) etc..Input equipment 206 and processor 201 communicate, can be with
The input of various ways receive user.Input equipment 206 can be mouse, keyboard, touch panel device or sensing equipment etc..
Computer equipment 200 can be general purpose computing device or dedicated computing machine equipment.In implementing, meter
It can be desktop computer, portable computer, the webserver, palm PC (Personal Digital to calculate machine equipment 200
Assistant, PDA), cell phone, panel computer, wireless terminal device, communication equipment or embedded device etc..The application
Embodiment does not limit the type of computer equipment 200.
It should be noted that the computer equipment 200 shown in Fig. 2 be only give each several part in cloud service system can
The hardware implementation mode of energy, according to the different or change of system components function, can be to the nextport hardware component NextPort of computer equipment
Additions and deletions are carried out, so that being matched with the function of system components.
During user is using virtual machine, user can change the attribute ginseng of virtual machine with manual modification registry entry
Number.By taking the acquiescence login password that user changes virtual machine as an example, user can proceed as follows:
1) launch " HKEY_LOCAL_MACHINE manually>SOFTWARE>Microsoft>Windows NT>
CurrentVersion>Winlogon " is changed with showing all of registry entry under " Winlogon "
" AutoAdminLogon " is simultaneously revised as 1 by the value of " DefaultPassword ";
2) launch " HKEY_LOCAL_MACHINE manually>SOFTWARE>Microsoft>Windows>
CurrentVersion>Run " showing all of registry entry under " Run ", double-click " (Default) " after pop-up dialogue box
" C is input in numeric data item:\setpass.vbs”.
By operation above, user is artificially configured with the acquiescence login password of virtual machine, can be with the virtual machine conduct
Mirror image template creates other new virtual machines, so as to realize the self-defining login password used in the virtual machine of the new establishment.
Certainly similarly, user can also be belonged to change accordingly by finding the corresponding registry entry of other property parameters of virtual machine
The value of property parameter.
During implementing, user can also not need manual operation, but change privately owned mirror by shell script
The attribute information of picture such as virtual machine entry password;So as to, after new virtual machine is created as privately owned mirror image with the virtual machine, use
The login password that family can be set with use logs in the virtual machine of the new establishment.With reference to Fig. 3, the void to changing privately owned mirror image
The embodiment of plan machine login password is described in detail.
Step 301:Computer equipment obtains the system password file in privately owned mirror image and registry file path.
In the realization of step 301, computer equipment can first according to the catalogue of the privately owned mirror image of carry be " $ rootPath "
To recognize the OS Type of the privately owned mirror image of carry.If mount directory is " $ rootPath/Windows/ ", the void is illustrated
Plan machine uses Windows systems;If mount directory is " $ rootPath/root/ ", illustrate that the virtual machine is used
(SuSE) Linux OS.
By taking Windows systems as an example, system password file path is " $ rootPath/Windows/System32/
Config/SAM ", registry file path are " $ rootPath/Windows/System32/config/SOFTWARE ".To retouch
State conveniently, " Windows/System32/config/ " in the application can be represented with " $ configPath/ ", and
" Windows/System32/config/SOFTWARE " then can be represented with " $ systemSoftwarePath ".
Step 302:Computer equipment first backs up said system cryptogam, then performs password to system password file clear
Division operation.
Specifically by taking Windows systems as an example, computer equipment is first backed up " $ rootPath/Windows/System32/
System password file under config/ " catalogues such as SAM files, are then operated the SAM files using chntpw
The password of Administrator user is emptied.The following is the example pseudo-code for realizing step 302:
cp-f$rootPath/$configPath/SAM$rootPath/$configPath/SAM_BAK
chntpw-u Administrator$rootPath/$configPath/SAM<<EOF
>1
>y
>EOF
It should be noted that the step 302 Computer device backup system password file is for security consideration, once
The operation that the virtual machine entry password of privately owned mirror image is changed in the present embodiment is unsuccessful, the state before can also returning to..
Step 303:The virtual machine automated log on registration table and virtual machine that computer equipment is changed in privately owned mirror image is started shooting certainly
It is dynamic to start scripts registry.
By taking Windows systems as an example, the example of virtual machine automated log on registration table is as follows:
Windows Registry Editor Version 5.00
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows
NT\CurrentVersion\Winlogon]
" AutoAdminLogon "=" 1 "
" DefaultUserName "=" Administrator "
" DefaultPassword "=" "
The example of the virtual machine start automatic scripts registry by taking Windows systems as an example is as follows:
Windows Registry Editor Version 5.00
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
" InitScript "=" c:\\setpass.vbs"
Step 303 Computer equipment can use the false code modification virtual machine automated log on registration table of following example:
reged-I$rootPath/$systemSoftwarePath HKEY_LOCAL_MACHINE\\SOFTWARE/
opt/
ecs_scripts/winlogon.reg–C
In the step 303, computer equipment can use the false code modification virtual machine start automatic of following example
Scripts registry:
reged-I$rootPath/$systemSoftwarePath HKEY_LOCAL_MACHINE\\SOFTWARE/
opt/
ecs_scripts/runsetpass.reg–C
Step 304:Computer equipment changes the close event tracing program registration table in privately owned mirror image so that virtual machine exists
The dialog box of close event tracing program is not shown after startup.
The example of the close event tracing program registration table by taking Windows systems as an example is as follows:
Windows Registry Editor Version 5.00
[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows NT\
Reliability]
" ShutdownReasonOn "=dword:00000000
In step 304, computer equipment can use the false code modification close event tracing program note of following example
Volume table:
reged-I$rootPath/$systemSoftwarePath HKEY_LOCAL_MACHINE\\SOFTWARE/
opt/
ecs_scripts/reliability.reg–C
By changing the close event tracing program registration table in privately owned mirror image in step 304, it is possible to reduce to virtual machine
Automated log on flow process impact, improve Consumer's Experience.
It should be noted that before above-mentioned steps 302, computer equipment can also be detected to privately owned mirror image, sentenced
Whether the virtual machine entry password of the disconnected privately owned mirror image has been modified.Such as the virtual machine entry password of the privately owned mirror image has been
It is modified, then the computer equipment is not modified to the virtual machine entry password of the virtual machine;Only in the privately owned mirror image
Virtual machine entry password be not modified in the case of, computer equipment just performs the privately owned mirror image of modification shown in above-mentioned Fig. 3
Virtual machine entry password embodiment.For example, computer equipment can utilize reged orders by SOFTWARE registry files
In automatic running program register button derive after, judge whether the virtual machine entry password of the privately owned mirror image is changed
Cross.If in the automatic running program register button simultaneously comprising " setpass.vbs " and " InitScript ", then the virtual machine
Privately owned mirror image is to be " InitScript "=" C:Setpass.vbs " configuration privately owned mirror image.Implement puppet
Example code is as follows:
Using the above-described embodiment shown in the application Fig. 3, by computer equipment perform script program, user can from
The property parameters of privately owned mirror image are modified under line states, such that it is able to meet the individual demand of user in practical business,
The requirement of such as user different safeties under different production environments, improves Consumer's Experience.
Such as user is created privately owned mirror image or user by clonal fashion and the privately owned mirror of oneself is imported by publicly-owned cloud platform
During picture, user is without the need for going manually to configure the property parameters of privately owned mirror image, it is possible to directly creating virtual using the privately owned mirror image
The injection of virtual machine initial log password is completed during machine.With based on the Windows virtual machines under the virtualized publicly-owned cloud platforms of XEN
As a example by, user can be passed through with self-defined initial login password, the login password when by public cloud interface creating virtual machine
The interface of cloud computing management platform OpenStack is sent to virtual management platform, by virtual management platform in calculate node
Agency (Computing Node Agent, CNA) on by the image file carry of Window system disk on Domain0, and
Identify the catalogue that SAM files and SOFTWARE registration tablies are located, virtual management platform is by the script file of starting up
Setpass.vbs and password configuration file passwd.inf copy to privately owned mirror image, and (i.e. the mirror image of Window system disk is literary
Part) mount directory under, i.e., under the C packing catalogues of Windows systems, while virtual management platform modifying hangs over the carry mesh
The property parameters of the image file of the Window system disk under record.So virtual machine can just be triggered after starting and perform start
Automatic script setpass.vbs, realizes the setting of the property parameters such as virtual machine entry password to privately owned mirror image, Ran Houqing
Above-mentioned password configuration file passwd.inf and start automatic script setpass.vbs is managed, and reduces registration table to realize
To opening the cleaning for starting that scripts registry and automated log on registration table are arranged, so as to restoring scene environment, virtual machine is restarted, will
One clean virtual machine entry window presents to user.
On the other hand, in scene of the user using public cloud virtual machine, if to have forgotten Virtual Machine Manager person close for user
Code, it is also possible to realize resetting the login password of virtual machine by the above-described embodiment shown in the application Fig. 3.Calculate
The privately owned mirror image of user is first imported to publicly-owned cloud platform by mirroring service management platform by machine equipment, and with this privately owned mirror image
Create virtual machine instance before using the system image file of virtual machine as ephemeral data disk carry in pre-prepd interim master
On machine.Still with Windows virtual machine instances, user can first prepare an interim Linux virtual machine as above-mentioned interim main frame
With standby, and the login password of virtual machine is reset by following operation:
1) the secure group rule of Windows virtual machines is changed, 3389 ports of " TCP " agreement item is such as closed, to prevent which
His IP address accesses the virtual machine;
2) Windows virtual machines are closed, unloads the private of the system disk as Windows virtual machines of the Windows virtual machines
There is mirror image, and be mounted to the system disk as ephemeral data disk on pre-prepd interim Linux virtual machines;
3) Telnet interim Linux virtual machines, install the ephemeral data disk of above-mentioned carry, prop up such as in ephemeral data disk
Hold the instrument of the software kit and modification windows registration tablies of new technology file system;
4) perform the script of modification Windows virtual machine entry passwords;The original login for removing Windows virtual machines is close
Code;
5) the ephemeral data disk i.e. system disk of original Windows virtual machines of interim Linux virtual machines is unloaded online, and should
Ephemeral data disk be Windows virtual machines system disk again carry return original Windows virtual machines on;
6) original Windows virtual machines are opened, and recover it is above-mentioned 1) in the safety regulation changed, such as opening " TCP " agreement
3389 ports of item.
The above embodiments of the present application only as a example by arranging the login password of virtual machine, also may be used by other property parameters of virtual machine
Arrange with by similar mode.Increase the operation sheet that machine name and IP address are set such as in setpass.vbs scripts
Invention above-described embodiment can be used for configuring machine name in privately owned mirror image, IP address information etc..It is specific as follows:
1) before virtual machine is created with privately owned mirror image, privately owned mirror image can be mounted on Domain0, and it is logical in bottom
The mode automated log on of off-line arrangement is crossed, start automatic script is write in registration table, while being set according to user oneself
Virtual machine entry password, one or a combination set of property parameters such as machine name and IP address are transmitted by the interface of OpenStack
Get off, generate corresponding custom profile such as passwd.inf, network.inf, hostname.inf etc.;And by these
Custom profile is injected under root i.e. " the $ rootPath " of Windows systems.
2) after virtual machine starts automated log on, i.e. triggering performs start automatic script setpass.vbs, therefrom reads
Custom profile passwd.inf, network.inf, hostname.inf etc. are carrying out matching somebody with somebody for virtual machine attribute parameter
Put.
3) above-mentioned custom profile and setpass.vbs scripts are deleted, and reduces registration table.
As shown in figure 4, a kind of structural representation of the computer equipment 400 provided for the embodiment of the present application, the computer
Equipment 400 includes acquisition module 402 and processing module 404.Wherein:
Acquisition module 402 is used to obtain the registry file path in privately owned mirror image;
Processing module 404 is then automatic for the virtual machine in above-mentioned privately owned mirror image is changed according to above-mentioned registry file path
Login Register table and virtual machine start automatic scripts registry.
By the computer equipment shown in Fig. 4, user can arrange the property parameters of privately owned mirror image without the need for manual operation.
By taking the virtual machine entry password in the privately owned mirror image of modification as an example, processing module 404 can use the embodiment shown in the application Fig. 3
In method realizing.It is in implementing, unsuccessful because there is operating for the virtual machine entry password for changing privately owned mirror image
Situation, is security consideration, and it is above-mentioned that the acquisition module 402 in the computer equipment 400 of the application can also be further used for acquisition
Dummy machine system file in privately owned mirror image, is used to back up, and is performed removing by 404 pairs of dummy machine system files of processing module
Operation.
To reduce the impact of the automated log on flow process to virtual machine, Consumer's Experience, the process in computer equipment 400 are improved
Module 404 can also change the close event tracing program registration table in privately owned mirror image so that virtual machine is not shown upon actuation
The dialog box of close event tracing program.
The computer equipment 400 of the application can also include virtual machine creating module 406, for according to amended privately owned
Mirror image creates virtual machine.So when user is being used by the privately owned mirror image of clonal fashion establishment or imported by publicly-owned cloud platform
Creating during virtual machine, using the computer equipment 400 of the application, user is without the need for go configuration privately owned manually for the privately owned mirror image of oneself
The property parameters of mirror image, it is possible to the setting of property parameters is directly completed when virtual machine is created, such as virtual machine initial log is close
The injection of code.And after property parameters are set up, restoring scene environment, restart virtual machine, by a clean virtual machine entry
Window presents to user, so as to improve Consumer's Experience.
The computer equipment 400 of the application can also include Virtual machine control module 408.Virtual machine control module 408 is used
In before the registry file path that acquisition module 402 obtains in above-mentioned privately owned mirror image, using the system disk of the virtual machine as
Ephemeral data disk carry is on interim main frame;Further, Virtual machine control module 408 is additionally operable in 404 basis of processing module
Change the virtual machine automated log on registration table and virtual machine start automatic foot in above-mentioned privately owned mirror image in registry file path
After this registration table, the ephemeral data disk on interim main frame is unloaded, and above-mentioned private is mounted to using ephemeral data disk as system disk
Have on the corresponding virtual machine of mirror image.Above-mentioned Virtual machine control module 408 can be also used for closing the corresponding void of above-mentioned privately owned mirror image
Plan machine.
In scene of the user using public cloud virtual machine, if user have forgotten Virtual Machine Manager person's password, by upper
The cooperation of Virtual machine control module 408 is stated, computer equipment 400 can pass through the above-described embodiment shown in the application Fig. 3 and realize
The property parameters such as login password of virtual machine is reset.
It should be noted that above-mentioned a kind of computer 400 of the application can be deposited including an at least processor and at least
Reservoir, after the computer program of above-mentioned at least one memory storage of above-mentioned at least one computing device, computer equipment 400
The method for performing the property parameters of the setting virtual machine that the above embodiments of the present application are provided.
The embodiment of the present application additionally provides a kind of computer-readable storage medium, and for storing computer software instructions, which includes
For performing the program designed by the application said method embodiment.By the program for performing storage, it is possible to achieve the application is carried
For setting virtual machine property parameters method.
Although here is described to the application with reference to each embodiment, however, implementing the application required for protection
During, those skilled in the art are by checking the accompanying drawing, disclosure and appended claims, it will be appreciated that and it is real
Other changes of the existing open embodiment.In the claims, " include " that (comprising) word is not excluded for other compositions
Part or step, "a" or "an" are not excluded for multiple situations.Single processor or other units can realize claim
In some functions enumerating.Mutually different has been recited in mutually different dependent some measures, it is not intended that these are arranged
Apply to combine and produce good effect.
It will be understood by those skilled in the art that embodiments herein can be provided as method, device (equipment), or computer journey
Sequence product.Therefore, the application can adopt complete hardware embodiment, complete software embodiment or with reference to software and hardware in terms of
The form of embodiment.And, the application can be using the calculating for wherein including computer usable program code at one or more
The computer program implemented in machine usable storage medium (including but not limited to disk memory, CD-ROM, optical memory etc.)
The form of product.Computer program is stored/distributed in suitable medium, is provided or as the one of hardware together with other hardware
Part, it would however also be possible to employ other distribution forms, such as passes through Internet or other wired or wireless telecommunication systems.
The application be with reference to the embodiment of the present application method, device (equipment) and computer program flow chart with/
Or block diagram is describing.It should be understood that can by each flow process in computer program instructions flowchart and/or block diagram and/
Or the combination of square frame and flow chart and/or flow process and/or square frame in block diagram.These computer program instructions can be provided
Processor to general purpose computer, special-purpose computer, Embedded Processor or other programmable data processing devices is producing one
Individual machine so that produced for realizing by the instruction of computer or the computing device of other programmable data processing devices
The device of the function of specifying in one flow process of flow chart or one square frame of multiple flow processs and/or block diagram or multiple square frames.
These computer program instructions may be alternatively stored in and can guide computer or other programmable data processing devices with spy
Determine in the computer-readable memory that mode works so that the instruction being stored in the computer-readable memory is produced to be included referring to
Make the manufacture of device, the command device realize in one flow process of flow chart or one square frame of multiple flow processs and/or block diagram or
The function of specifying in multiple square frames.
These computer program instructions can be also loaded in computer or other programmable data processing devices so that in meter
Series of operation steps is performed on calculation machine or other programmable devices to produce computer implemented process, so as in computer or
The instruction performed on other programmable devices is provided for realizing in one flow process of flow chart or multiple flow processs and/or block diagram one
The step of function of specifying in individual square frame or multiple square frames.
Although being described to the application with reference to specific features and embodiment, it is clear that, without departing from this Shen
In the case of spirit and scope please, various modifications and combinations can be carried out to which.Correspondingly, the specification and drawings are only institute
The exemplary illustration of the application that attached claim is defined, and be considered as cover in the range of the application any and all and repair
Change, change, combining or equivalent.Obviously, those skilled in the art the application can be carried out it is various change and modification and not
Depart from spirit and scope.So, if the application these modification and modification belong to the application claim and its
Within the scope of equivalent technologies, then the application is also intended to comprising these changes and modification.
Claims (12)
1. in public cloud the property parameters of privately owned mirror image method to set up, it is characterised in that include:
Computer equipment obtains the registry file path in the privately owned mirror image;
The computer equipment changes the virtual machine automated log on note in the privately owned mirror image according to the registry file path
Volume table and virtual machine start automatic scripts registry.
2. the method for claim 1, it is characterised in that methods described also includes:
The computer equipment obtains the dummy machine system file in the privately owned mirror image, backs up the dummy machine system file,
And clear operation is performed to the dummy machine system file.
3. method as claimed in claim 1 or 2, it is characterised in that methods described also includes:
The computer equipment changes the close event tracing program registration table in the privately owned mirror image so that using described privately owned
The virtual machine that mirror image is created does not show the dialog box of close event tracing program upon actuation.
4. the method as described in claim 1 or 2 or 3, it is characterised in that the computer equipment is according to the registry file
Path change virtual machine automated log on registration table and virtual machine start automatic scripts registry in the privately owned mirror image it
Afterwards, methods described also includes:
The computer equipment creates virtual machine according to amended privately owned mirror image.
5. the method as described in claim 1 or 2 or 3, it is characterised in that the computer equipment is obtained in the privately owned mirror image
Registry file path before, methods described also includes:
The computer equipment using the privately owned mirror image as ephemeral data disk carry on interim main frame;
The computer equipment changes the virtual machine automated log on note in the privately owned mirror image according to the registry file path
After volume table and virtual machine start automatic scripts registry, methods described also includes:
The computer equipment unloads the ephemeral data disk of the interim main frame, and using the ephemeral data disk as system
Disk is mounted on the corresponding virtual machine of the privately owned mirror image.
6. a kind of computer equipment, it is characterised in that the computer equipment includes acquisition module and processing module:
The acquisition module is used to obtain the registry file path in privately owned mirror image;
The processing module is for according to the virtual machine automated log in the registry file path modification privately owned mirror image
Registration table and virtual machine start automatic scripts registry.
7. computer equipment as claimed in claim 6, it is characterised in that the acquisition module is further used for obtaining the private
The dummy machine system file having in mirror image;
The processing module is further used for backing up the dummy machine system file, and the dummy machine system file is performed clear
Division operation.
8. computer equipment as claimed in claims 6 or 7, it is characterised in that the processing module is further used for changing institute
State the close event tracing program registration table in privately owned mirror image.
9. the computer equipment as described in claim 6 or 7 or 8, it is characterised in that the computer equipment also includes virtual machine
Creation module, for creating virtual machine according to amended privately owned mirror image.
10. the method as described in claim 6 or 7 or 8, it is characterised in that the computer equipment is also controlled including virtual machine
Module, for before the registry file path that the acquisition module obtains in the privately owned mirror image, by the privately owned mirror image
As ephemeral data disk carry on interim main frame;
The Virtual machine control module is further used in the processing module according to the modification of the registry file path
After virtual machine automated log on registration table and virtual machine start automatic scripts registry in privately owned mirror image, face described in unloading
When main frame on the ephemeral data disk, and it is corresponding that the ephemeral data disk is mounted to the privately owned mirror image as system disk
On virtual machine.
11. a kind of computer equipments, it is characterised in that the computer equipment includes an at least processor and an at least storage
Device, at least one memorizer are used to store computer program, computer program described at least one computing device
Afterwards so that the computer equipment perform claim requires the method described in 1 to 5 any one.
A kind of 12. computer-readable storage mediums, save as computer software instructions, the computer on the computer-readable storage medium
Computer perform claim is made to require the method described in 1 to 5 any one after software instruction operation.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611014963.2A CN106557354B (en) | 2016-11-17 | 2016-11-17 | Method for setting attribute parameters of private image and computer equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611014963.2A CN106557354B (en) | 2016-11-17 | 2016-11-17 | Method for setting attribute parameters of private image and computer equipment |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106557354A true CN106557354A (en) | 2017-04-05 |
CN106557354B CN106557354B (en) | 2020-12-25 |
Family
ID=58444857
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201611014963.2A Active CN106557354B (en) | 2016-11-17 | 2016-11-17 | Method for setting attribute parameters of private image and computer equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106557354B (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109445709A (en) * | 2018-11-05 | 2019-03-08 | 郑州云海信息技术有限公司 | The management method and device of storage resource in virtualization system |
CN109684028A (en) * | 2017-10-18 | 2019-04-26 | 中兴通讯股份有限公司 | A kind of method, device and equipment that operating system is separated with user data |
CN113296873A (en) * | 2020-05-15 | 2021-08-24 | 阿里巴巴集团控股有限公司 | Mirror image construction method and device, terminal equipment and computer storage medium |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101414274A (en) * | 2007-10-18 | 2009-04-22 | 上海广联电子有限公司 | Method for rapidly recovering picking machine system |
US7996414B2 (en) * | 2008-02-29 | 2011-08-09 | International Business Machines Corporation | Method and system for separating file system metadata from other metadata in virtual machine image format |
CN102402446A (en) * | 2011-11-22 | 2012-04-04 | 成都市华为赛门铁克科技有限公司 | Method and device for installing application software |
CN102637144A (en) * | 2012-03-31 | 2012-08-15 | 奇智软件(北京)有限公司 | System fault processing method and device |
CN103514023A (en) * | 2013-10-22 | 2014-01-15 | 中国科学院信息工程研究所 | Method and system for off-line and automatically installing software of virtual machine |
US8839228B2 (en) * | 2010-04-21 | 2014-09-16 | Ca, Inc. | System and method for updating an offline virtual machine |
CN104182257A (en) * | 2011-11-22 | 2014-12-03 | 华为数字技术(成都)有限公司 | Application software installation method and device |
-
2016
- 2016-11-17 CN CN201611014963.2A patent/CN106557354B/en active Active
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101414274A (en) * | 2007-10-18 | 2009-04-22 | 上海广联电子有限公司 | Method for rapidly recovering picking machine system |
US7996414B2 (en) * | 2008-02-29 | 2011-08-09 | International Business Machines Corporation | Method and system for separating file system metadata from other metadata in virtual machine image format |
US8839228B2 (en) * | 2010-04-21 | 2014-09-16 | Ca, Inc. | System and method for updating an offline virtual machine |
CN102402446A (en) * | 2011-11-22 | 2012-04-04 | 成都市华为赛门铁克科技有限公司 | Method and device for installing application software |
CN104182257A (en) * | 2011-11-22 | 2014-12-03 | 华为数字技术(成都)有限公司 | Application software installation method and device |
CN102637144A (en) * | 2012-03-31 | 2012-08-15 | 奇智软件(北京)有限公司 | System fault processing method and device |
CN103514023A (en) * | 2013-10-22 | 2014-01-15 | 中国科学院信息工程研究所 | Method and system for off-line and automatically installing software of virtual machine |
Non-Patent Citations (3)
Title |
---|
HONGLINGZUOA: ""修改镜像注册表"", 《百度文库》 * |
张洪斌 等: ""编程修改注册表网络参数"", 《河北工业科技》 * |
杨勐YM: ""修改gho文件办法 做属于自己个性的gho系统"", 《百度文库》 * |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109684028A (en) * | 2017-10-18 | 2019-04-26 | 中兴通讯股份有限公司 | A kind of method, device and equipment that operating system is separated with user data |
CN109684028B (en) * | 2017-10-18 | 2024-04-12 | 中兴通讯股份有限公司 | Method, device and equipment for separating operating system from user data |
CN109445709A (en) * | 2018-11-05 | 2019-03-08 | 郑州云海信息技术有限公司 | The management method and device of storage resource in virtualization system |
CN113296873A (en) * | 2020-05-15 | 2021-08-24 | 阿里巴巴集团控股有限公司 | Mirror image construction method and device, terminal equipment and computer storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN106557354B (en) | 2020-12-25 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20210314223A1 (en) | Managing Virtual Network Functions | |
US10437280B2 (en) | Controlling system clocks in virtual machines | |
US8930542B2 (en) | Dynamically building a set of compute nodes to host the user's workload | |
US11023267B2 (en) | Composite virtual machine template for virtualized computing environment | |
US20190087244A1 (en) | Hyperconverged system including a user interface, a services layer and a core layer equipped with an operating system kernel | |
US20140245394A1 (en) | Trust-based computing resource authorization in a networked computing environment | |
US9710292B2 (en) | Allowing management of a virtual machine by multiple cloud providers | |
US9354894B2 (en) | Pluggable cloud enablement boot device and method that determines hardware resources via firmware | |
US10021111B2 (en) | Location based authentication of users to a virtual machine in a computer system | |
US10394971B2 (en) | Hybrid simulation of a computing solution in a cloud computing environment with a simplified computing solution and a simulation model | |
CN114341847B (en) | Correspondence of external operations to containers with abrupt events | |
US20150106521A1 (en) | Pluggable cloud enablement boot device and method | |
Lowe | Mastering VMware vSphere 4 | |
US11321077B1 (en) | Live updating of firmware behavior | |
CN106557354A (en) | The method and computer equipment of the property parameters of privately owned mirror image are set | |
US20220207165A1 (en) | Information processing method, system, electronic device and computer readable storage medium | |
US20140229566A1 (en) | Storage resource provisioning for a test framework | |
US10754660B2 (en) | Rack level server boot | |
Gavanda et al. | Mastering VMware vSphere 6.7: Effectively deploy, manage, and monitor your virtual datacenter with VMware vSphere 6.7 | |
Wu et al. | EVCS: An edge-assisted virtual computing and storage approach for heterogeneous desktop deployment | |
Vetter et al. | IBM Power Systems HMC Implementation and Usage Guide | |
Mackey et al. | XenServer Administration Handbook: Practical Recipes for Successful Deployments | |
Kusek et al. | VMware vSphere 5 Administration Instant Reference | |
Apolinário | Learning Hyper-V | |
Windom et al. | Virtualizing Microsoft Tier 1 Applications with VMware VSphere 4 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right |
Effective date of registration: 20220215 Address after: 550025 Huawei cloud data center, jiaoxinggong Road, Qianzhong Avenue, Gui'an New District, Guiyang City, Guizhou Province Patentee after: Huawei Cloud Computing Technologies Co.,Ltd. Address before: 518129 Bantian HUAWEI headquarters office building, Longgang District, Guangdong, Shenzhen Patentee before: HUAWEI TECHNOLOGIES Co.,Ltd. |
|
TR01 | Transfer of patent right |