CN108712316B - Access configuration method, device and system of virtual machine - Google Patents

Access configuration method, device and system of virtual machine Download PDF

Info

Publication number
CN108712316B
CN108712316B CN201810542583.9A CN201810542583A CN108712316B CN 108712316 B CN108712316 B CN 108712316B CN 201810542583 A CN201810542583 A CN 201810542583A CN 108712316 B CN108712316 B CN 108712316B
Authority
CN
China
Prior art keywords
edge device
virtual machine
target edge
accessed
vtep
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810542583.9A
Other languages
Chinese (zh)
Other versions
CN108712316A (en
Inventor
黄李伟
王伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou H3C Technologies Co Ltd
Original Assignee
Hangzhou H3C Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou H3C Technologies Co Ltd filed Critical Hangzhou H3C Technologies Co Ltd
Priority to CN201810542583.9A priority Critical patent/CN108712316B/en
Publication of CN108712316A publication Critical patent/CN108712316A/en
Application granted granted Critical
Publication of CN108712316B publication Critical patent/CN108712316B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/46Interconnection of networks
    • H04L12/4641Virtual LANs, VLANs, e.g. virtual private networks [VPN]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/46Interconnection of networks
    • H04L12/4633Interconnection of networks using encapsulation techniques, e.g. tunneling
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/66Layer 2 routing, e.g. in Ethernet based MAN's

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The application provides an access configuration method of a virtual machine, which is applied to a target edge device in an edge device group, wherein the edge device group comprises two or more than two edge devices, and the method comprises the following steps: when detecting the access of a virtual machine, determining whether the virtual machine is only accessed to the target edge device; if the virtual machine is only accessed to the target edge device, routing information including the private address of the target edge device is sent to a virtual extensible local area network VXLAN tunnel endpoint VTEP of the data center where the virtual machine is located, so that the VTEP establishes a VXLAN tunnel and uses the VXLAN tunnel as a forwarding interface from the VTEP to the virtual machine, and the private address is used for distinguishing the target edge device from other edge devices in the edge device group.

Description

Access configuration method, device and system of virtual machine
Technical Field
The present application relates to the field of communications technologies, and in particular, to a method, an apparatus, and a system for access configuration of a virtual machine.
Background
Ethernet Virtual Private Network (EVPN) is a two-layer Virtual Private Network (VPN) technology. The current EVPN network mainly includes: a Virtual extended Local Area Network (VXLAN), a VXLAN Tunnel Endpoint (VTEP), and a VXLAN Tunnel; wherein, VTEP is used for carrying out EVPN correlation processing; a VXLAN tunnel is a point-to-point logical tunnel between two VTEPs for enabling data transfer between the VTEPs. The customer Network may include hosts distributed among multiple VTEPs in different geographic locations, which may be connected by VXLAN tunnels over the backbone Network, providing a two-layer Virtual Private Network (VPN) for the hosts in the customer Network, forming a VXLAN Network.
At present, when forwarding a message in an EVPN network, a VTEP in the EVPN network generally selects an edge device from a plurality of edge devices in the EVPN network based on a traffic balancing principle, and forwards the message to be forwarded to a corresponding virtual machine through the selected edge device, but if a virtual machine receiving data only accesses one edge device, the VTEP may select an edge device not connected to the virtual machine based on the traffic balancing principle when forwarding the message to the virtual machine accessing only one edge device, which may result in that the message to be forwarded cannot be forwarded to the corresponding virtual machine, resulting in packet loss.
Disclosure of Invention
In view of this, an object of the present application is to provide an access configuration method, an access configuration device, and an access configuration system for a virtual machine, which are used to solve the problem in the prior art that the communication reliability is low when the virtual machine only accesses one edge device.
In a first aspect, an embodiment of the present application provides an access configuration method for a virtual machine, which is applied to a target edge device in an edge device group, where the edge device group includes two or more edge devices, and the method includes:
when detecting the access of a virtual machine, determining whether the virtual machine is only accessed to the target edge device;
if the virtual machine is determined to be only accessed to the target edge device, routing information including the private address of the target edge device is sent to a virtual extensible local area network VXLAN tunnel endpoint VTEP of the data center where the virtual machine is located, so that the VTEP establishes a VXLAN tunnel and uses the VXLAN tunnel as a forwarding interface from the VTEP to the virtual machine, and the private address is used for distinguishing the target edge device from other edge devices in the edge device group.
Optionally, the method further comprises:
obtaining an access circuit AC interface of the virtual machine accessed to the target edge device;
the determining whether the virtual machine has access only to the target edge device includes:
and if the configuration information of the AC interface is determined to have a set identifier, determining that the virtual machine is only accessed to the target edge device, wherein the set identifier is used for identifying that the virtual machine is only accessed to one edge device.
Optionally, the private address comprises an internet protocol, IP, address and a media access control, MAC, address of the target edge device.
In a second aspect, an embodiment of the present application provides an apparatus for configuring access to a virtual machine, where the apparatus is applied to a target edge device in an edge device group, where the edge device group includes two or more edge devices, and the apparatus includes:
the determining module is used for determining whether the virtual machine is only accessed to the target edge device when the virtual machine access is detected;
a sending module, configured to send routing information including a private address of the target edge device to a virtual extensible local area network VXLAN tunnel endpoint VTEP of a data center where the virtual machine is located if it is determined that the virtual machine is only accessed to the target edge device, so that the VTEP establishes a VXLAN tunnel and uses the VXLAN tunnel as a forwarding interface from the VTEP to the virtual machine, where the private address is used to distinguish the target edge device from other edge devices in an edge device group.
Optionally, the method further comprises: an acquisition module to:
obtaining an access circuit AC interface of the virtual machine accessed to the target edge device;
the determining module is specifically configured to:
and if the configuration information of the AC interface is determined to have a set identifier, determining that the virtual machine is only accessed to the target edge device, wherein the set identifier is used for identifying that the virtual machine is only accessed to one edge device.
Optionally, the private address comprises an internet protocol, IP, address and/or a media access control, MAC, address of the target edge device.
In a third aspect, an embodiment of the present application provides an access configuration system for a virtual machine, including a virtual extensible local area network VXLAN tunnel endpoint VTEP in a data center and a target edge device in an edge device group, where the edge device group includes two or more edge devices, and the system includes;
the target edge device is configured to determine whether the virtual machine is only accessed to the target edge device when detecting that the virtual machine is accessed, and send routing information including a private address of the target edge device to a virtual extensible local area network VXLAN tunnel endpoint VTEP of a data center if determining that the virtual machine is only accessed to the target edge device, where the private address is used to distinguish the target edge device from other edge devices in an edge device group;
the VTEP is configured to establish a VXLAN tunnel from the VXLAN tunnel endpoint to the target edge device with the private address of the target edge device as a destination address, and use the VXLAN tunnel as a forwarding interface from the VXLAN tunnel endpoint to the virtual machine.
In a fourth aspect, the present application provides a computer device, including a memory, a processor, and a computer program stored on the memory and executable on the processor, wherein the processor implements the steps of the above method when executing the computer program.
In the access configuration method for the virtual machine provided in the embodiment of the present application, when determining that the virtual machine only accesses one edge device of the edge device group, the target edge device sends the private IP address of the target edge device accessing the virtual machine to the VTEP, so that the VTEP establishes a VXLAN tunnel from the VTEP to the target edge device, and uses the VXLAN tunnel as a forwarding interface from the VTEP to the virtual machine. Therefore, the phenomenon that the virtual machine is hashed to other edge devices which are not connected with the virtual machine in the load balancing process in the prior art can be avoided, the communication reliability of the virtual machine which is only connected to the target edge device of the edge device group is improved, and the packet loss phenomenon is reduced.
In order to make the aforementioned objects, features and advantages of the present application more comprehensible, preferred embodiments accompanied with figures are described in detail below.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings that are required to be used in the embodiments will be briefly described below, it should be understood that the following drawings only illustrate some embodiments of the present application and therefore should not be considered as limiting the scope, and for those skilled in the art, other related drawings can be obtained from the drawings without inventive effort.
Fig. 1 is a diagram of a virtual machine communication environment according to an embodiment of the present application;
fig. 2 is a schematic structural diagram of an access configuration system of a virtual machine according to an embodiment of the present application;
fig. 3 is a schematic flowchart of an access configuration method for a virtual machine according to an embodiment of the present application;
fig. 4 is a schematic structural diagram of an access configuration apparatus of a virtual machine according to an embodiment of the present application;
fig. 5 is a schematic structural diagram of a computer device 500 according to an embodiment of the present application.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all the embodiments. The components of the embodiments of the present application, generally described and illustrated in the figures herein, can be arranged and designed in a wide variety of different configurations. Thus, the following detailed description of the embodiments of the present application, presented in the accompanying drawings, is not intended to limit the scope of the claimed application, but is merely representative of selected embodiments of the application. All other embodiments, which can be derived by a person skilled in the art from the embodiments of the present application without making any creative effort, shall fall within the protection scope of the present application.
As shown in fig. 1, a virtual machine communication environment diagram according to an embodiment of the present invention includes at least two Data Centers (DC), which are described as an example, a first Data Center includes a first VTEP, a first Route Reflector (RR), and a first Edge Device (ED) group, and a second Data Center includes a second VTEP, a second RR, and a second ED group; each ED group includes two or more ED devices, the ED devices in the same ED group may use the same public Internet Protocol Address (IP Address), and the public IP addresses of the ED groups in different data centers are different; a Virtual Machine (VM) VM1 is communicatively coupled to a first VTEP in a first data center, VM2 is communicatively coupled to a second VTEP in a second data center, and VM3 is communicatively coupled to an edge device (e.g., ED1-1) in a first ED group. VM1 enables communication with VM2, VM3 through VXLAN tunnels of the first VTEP with the first ED group.
For example, taking the ED group including two edge devices as an example, the public IP address of the first ED group (ED1-1 and ED1-2) is 2.2.2.2, the IP address of the first VXLAN tunnel endpoint is 1.1.1.1, the IP address of VM2 is 10.1.1.2, the IP address of VM3 is 12.1.1.3, and VXLAN tunnel 1 between the first VTEP and the first ED group is: the source address is 1.1.1.1, the destination address is 2.2.2.2, and the forwarding table 1 of the first VTEP to VM2 is: VM2:10.1.1.2/32, the next hop is VXLAN tunnel 1, and the forwarding table 2 from the first VTEP to VM3 is: VM3:12.1.1.3/32, next hop is VXLAN tunnel 1.
After receiving a data message of the VM2 to be sent, the first VTEP queries a forwarding table 1 corresponding to a destination IP address of the VM2 carried in the data message, and when performing traffic hashing, the first VTEP hashes any ED device in the first ED group, and finally forwards the data message to the VM2 through the VXLAN tunnel 1.
After receiving a data message to be sent to VM3, a first VTEP queries a forwarding table 2 corresponding to a destination IP address carried in the data message, and when performing traffic hashing, the first VTEP may forward the message through an ED1-2 device in a first ED group, and since there is no communication connection between ED1-1 and ED1-2, the message to be sent to VM3 cannot be sent to VM 3.
When the virtual machine is determined to be only accessed to one ED of the ED group, the private IP address of the ED accessed to the virtual machine is sent to the VTEP, so that the VTEP establishes a VXLAN tunnel from the VTEP to an edge device, and the VXLAN tunnel is used as a forwarding interface from the VTEP to the virtual machine. Therefore, the efficiency of forwarding the message to the virtual machine can be improved, and the phenomenon of packet loss is reduced.
In order to make the aforementioned objects, features and advantages of the present disclosure more comprehensible, the present disclosure is described in further detail with reference to the accompanying drawings and the detailed description.
An embodiment of the present application provides a virtual machine access configuration system, as shown in fig. 2, the system includes: VTEP21 in the data center and destination edge device 221 in the edge device group, the edge device group 22 including two or more of the edge devices, e.g., edge device 222, edge device 223, edge device 224, etc.; since the virtual machine only accesses any edge device in the ED group, the case where the virtual machine only accesses the target edge device is 221 is described as an example.
The target edge device 221 is configured to determine, when detecting that a virtual machine is accessed, whether the virtual machine is only accessed to the target edge device 221, and if it is determined that the virtual machine is only accessed to the target edge device 221, send routing information including a private address of the target edge device to a virtual extensible local area network VXLAN tunnel endpoint VTEP of a data center, where the private address is used to distinguish the target edge device from other edge devices in an edge device group, and the private address is used to uniquely identify an edge device;
the VTEP21 is configured to establish a VXLAN tunnel from the VXLAN tunnel endpoint to the target edge device with the private address of the target edge device as a destination address, and use the VXLAN tunnel as a forwarding interface from the VXLAN tunnel endpoint to the virtual machine.
Specifically, the target edge device may be any one edge device in an edge device group, in the edge device group, different edge devices have different private addresses, and the private addresses may include an Internet Protocol (IP) address and/or a Media Access Control (MAC) address of the target edge device, and in practical applications, the private addresses may only include a private IP address of the target edge device (the private address is described in detail below as the private IP address of the target edge device), may also only include a MAC address of the target edge device, and may also include the IP address and the MAC address of the target edge device, which is not limited in this application; for example, ED1-1 and ED1-2 belonging to the same ED group, ED1-1 has a private IP address of 1.1.1.2, and ED1-2 has a private IP address of 1.1.1.3.
In a specific implementation, when detecting that a virtual machine is accessed, a target edge device learns a forwarding table from an accessed virtual machine, determines whether the virtual machine is only accessed to the target edge device 221 based on the learned forwarding table, and if it is determined that the virtual machine is only accessed to the target edge device, sends routing information including a private IP address of the target edge device to a VTEP of a data center, where the VTEP establishes a VXLAN tunnel from the VTEP to the target edge device by using an IP address of a home terminal as a source address and the private IP address of the target edge device as a destination address, and uses the VXLAN tunnel as a VXLAN forwarding interface from the VTEP to the virtual machine, which is described in detail below.
The virtual machine access configuration method provided by the embodiment of the present disclosure is described below with respect to an execution subject as a target edge device.
An embodiment of the present application provides a virtual machine access configuration method, as shown in fig. 3, where the method is applied to a target edge device in an edge device group, where the edge device group includes two or more edge devices, and the method includes the following steps:
s301, when detecting that a virtual machine is accessed, determining whether the virtual machine is only accessed to the target edge device;
s302, if it is determined that the virtual machine is only accessed to the target edge device, sending routing information including a private address of the target edge device to a virtual extensible local area network VXLAN tunnel endpoint VTEP of the data center, so that the VTEP establishes a VXLAN tunnel and uses the VXLAN tunnel as a forwarding interface from the VTEP to the virtual machine, where the private address is used to distinguish the target edge device from other edge devices in the edge device group.
After detecting that the virtual machine is accessed to the target edge device, the method further comprises the following steps:
obtaining an access circuit AC interface of the virtual machine accessed to the target edge device;
here, when a virtual machine accesses a target edge device, the target edge device learns a forwarding table (also called ARP/MAC forwarding information) corresponding to the virtual machine from the virtual machine, where the ARP/MAC forwarding information carries an IP address, a MAC address, and the like of the virtual machine in addition to an access circuit AC interface of the accessed target edge device. The method for learning the forwarding table from the target edge device is described in detail in the prior art, and will not be described too much here.
For example, referring to fig. 1, ARP/MAC forwarding information learned by the target edge device from the virtual machine is as follows:
an 12.1.1.3/321-1-1 forwarding interface is an access AC interface of ED1-1VM3
Where 12.1.1.3 is the IP address of the virtual machine and 1-1-1 is the MAC address of the virtual machine, the above example is merely illustrative.
After learning ARP/MAC forwarding information from a virtual machine, a target edge device determines whether the virtual machine is only accessed to the target edge device, including:
if the configuration information of the AC interface is determined to have a set identifier, determining that the virtual machine is only accessed to the target edge device, wherein the set identifier is used for identifying that the virtual machine is only accessed to one edge device
Here, the setting identifier is preset, and may be a specific identification character, a specific field, or the like, which may be determined according to actual situations, and the present application does not limit this.
In the specific implementation, after the virtual machine accesses the edge device, configuration information of an AC port of the edge device connected with the virtual machine is set in the edge device, and if the virtual machine is only accessed to one edge device, a setting identifier is set for the AC port of the edge device connected with the virtual machine; if the virtual machine has access to a plurality of edge devices, setting other identifiers (different from the set identifiers) for the AC port of the edge device connected to the virtual machine, and in the case that the virtual machine is connected to a plurality of edge devices, this will not be described in the present application
For example, continuing with the previous example and referring to fig. 1, after detecting that the virtual machine accesses the target edge device, the target edge device may forward the configuration information of the forwarding interface in the ARP/MAC forwarding information, and determine whether the virtual machine only accesses the ED1-1 of the first ED group, and if the configuration information of the forwarding interface has a setting identifier, determine that the virtual machine only accesses the ED1-1, where the setting identifier indicates that the virtual machine only accesses one ED device, and the setting identifier may be a specific identifier character (e.g., D), and so on, which may be determined according to practical situations, and this is not limited by this application.
And after the target edge device determines that the virtual machine is only accessed to the target edge device, the target edge device sends EVPN tunnel establishment routing information and routing synchronization information carrying the private IP address of the target edge device to the VTEP. The EVPN tunnel establishment routing information only carries the private IP address of the target edge device, and the routing synchronization information comprises the IP address and the MAC address of the virtual machine, the encapsulation ID, the next hop IP address and other information.
After receiving the route establishment information and the route synchronization information of the EVPN tunnel, the VTEP establishes a VXLAN tunnel from the VTEP to the target edge device by taking the IP address of the VTEP as a source address and the private IP address of the target edge device as a destination address.
In a specific implementation, a private IP address is set in advance for each edge device in the edge device group.
For example, referring to fig. 1, setting the private IP address of ED1-1 in the first ED group to 1.1.1.2, the first VTEP establishes the VXLAN tunnel from the home end to ED1-1 (the target edge device) as: the source address is 1.1.1.1 and the destination address is 1.1.1.2, and this VXLAN tunnel can be used as VXLAN tunnel 2 (used later).
After the VTEP establishes a VXLAN tunnel from the VTEP to a target edge device by taking the own IP address as a source address and the private IP address of the target edge device as a destination address, if the next hop IP address in the routing synchronization information sent by the target edge device is determined to be consistent with the destination address of the established VXLAN tunnel, the VXLAN tunnel is taken as a forwarding interface from the VTEP to a virtual machine.
In a specific implementation, the VTEP extracts the next-hop IP address and the IP address of the virtual machine from the routing synchronization information sent by the target edge device, queries the VXLAN tunnel corresponding to the extracted next-hop IP address from the VXLAN tunnels stored in the VTEP, and updates the queried VXLAN tunnel to the forwarding-out interface in the forwarding table corresponding to the extracted IP address of the virtual machine.
For example, referring to fig. 1, the first VTEP extracts the next hop IP address from the route synchronization information as 1.1.1.2 and the IP address of the virtual machine 3 as 12.1.1.3, at this time, the first VTEP stores VXLAN tunnel 1 and VXLAN tunnel 2, the first VTEP queries that the VXLAN tunnel corresponding to 1.1.1.2 is VXLAN tunnel 2 according to the next hop IP address 1.1.1.2, and then queries the forwarding table 2 corresponding to 12.1.1.3 based on the IP address 12.1.1.3 of the virtual machine 3, updates the MAC address of the virtual machine 3 to the forwarding table 2, and updates the VXLAN tunnel 2 to the forwarding table 2 forwarding interface. Thus, after receiving the message carrying the IP address (12.1.1.3) of the VM3, the first VTEP queries the forwarding table corresponding to the IP address of the VM3, and at this time, queries the forwarding table 2, and forwards the received message forwarded to the VM3 to the ED1-1 through the VXLAN tunnel 2, and further forwards the message to the virtual machine connected to the ED 1-1. Therefore, the method and the device avoid the condition that the ED which is not connected with the virtual machine is hashed when load balancing is carried out in the prior art, improve the forwarding efficiency of the message and reduce the phenomenon of packet loss.
An embodiment of the present application provides an access configurator apparatus of a virtual machine, as shown in fig. 4, which is applied to a target edge device in an edge device group, where the edge device group includes two or more edge devices, and the apparatus includes:
a determining module 41, configured to determine, when virtual machine access is detected, whether the virtual machine is only accessed to the target edge device;
a sending module 42, configured to send routing information including a private address of the target edge device to a virtual extensible local area network VXLAN tunnel endpoint VTEP of a data center where the virtual machine is located if it is determined that the virtual machine is only accessed to the target edge device, so that the VTEP establishes a VXLAN tunnel and uses the VXLAN tunnel as a forwarding interface from the VTEP to the virtual machine, where the private address is used to distinguish the target edge device from other edge devices in an edge device group.
Optionally, the method further comprises: an obtaining module 43, wherein the obtaining module 43 is configured to:
obtaining an access circuit AC interface of the virtual machine accessed to the target edge device;
the determining module 41 is specifically configured to:
and if the configuration information of the AC interface is determined to have a set identifier, determining that the virtual machine is only accessed to the target edge device, wherein the set identifier is used for identifying that the virtual machine is only accessed to one edge device.
Optionally, the private address comprises an internet protocol, IP, address and/or a MAC address of the destination edge device.
As shown in fig. 5, an embodiment of the present application provides a computer device 500, configured to execute the method for configuring access to the virtual machine in fig. 3, where the device includes a memory 501, a processor 502, and a computer program stored on the memory 501 and executable on the processor 502, where the processor 502 implements the steps of the method for configuring access to the virtual machine when executing the computer program.
Specifically, the memory 501 and the processor 502 can be general-purpose memory and processor, and are not specifically limited herein, when the processor 502 executes the computer program stored in the memory 501, the access configuration method of the virtual machine can be executed, so as to solve the problem of low communication reliability of the virtual machine accessing only one edge device in the prior art, where the target edge device in the present application, when determining that the virtual machine accesses only one edge device of the edge device group, sends the private IP address of the target edge device accessing the virtual machine to the VTEP, so that the VTEP establishes a VXLAN tunnel from the VTEP to the target edge device, and uses the VXLAN tunnel as a forwarding interface from the VTEP to the virtual machine. Therefore, the phenomenon that the virtual machine is hashed to other edge devices which are not connected with the virtual machine in the load balancing process in the prior art can be avoided, the communication reliability of the virtual machine which is only connected to the target edge device of the edge device group is improved, and the packet loss phenomenon is reduced.
In the embodiments provided in the present application, it should be understood that the disclosed apparatus and method may be implemented in other ways. The above-described embodiments of the apparatus are merely illustrative, and for example, the division of the units is only one logical division, and there may be other divisions when actually implemented, and for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection of devices or units through some communication interfaces, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments provided in the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit.
The functions, if implemented in the form of software functional units and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present application or portions thereof that substantially contribute to the prior art may be embodied in the form of a software product stored in a storage medium and including instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present application. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
It should be noted that: like reference numbers and letters refer to like items in the following figures, and thus once an item is defined in one figure, it need not be further defined and explained in subsequent figures, and moreover, the terms "first", "second", "third", etc. are used merely to distinguish one description from another and are not to be construed as indicating or implying relative importance.
Finally, it should be noted that: the above-mentioned embodiments are only specific embodiments of the present application, and are used for illustrating the technical solutions of the present application, but not limiting the same, and the scope of the present application is not limited thereto, and although the present application is described in detail with reference to the foregoing embodiments, those skilled in the art should understand that: any person skilled in the art can modify or easily conceive the technical solutions described in the foregoing embodiments or equivalent substitutes for some technical features within the technical scope disclosed in the present application; such modifications, changes or substitutions do not depart from the spirit and scope of the present disclosure, which should be construed in light of the above teachings. Are intended to be covered by the scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.

Claims (8)

1. An access configuration method for a virtual machine, applied to a target edge device in an edge device group, where the edge device group includes two or more edge devices, includes:
when detecting the access of a virtual machine, determining whether the virtual machine is only accessed to the target edge device;
if the virtual machine is determined to be only accessed to the target edge device, routing information including the private address of the target edge device is sent to a virtual extensible local area network VXLAN tunnel endpoint VTEP of the data center where the virtual machine is located, so that the VTEP establishes a VXLAN tunnel and uses the VXLAN tunnel as a forwarding interface from the VTEP to the virtual machine, and the private address is used for distinguishing the target edge device from other edge devices in the edge device group.
2. The method of claim 1, further comprising:
obtaining an access circuit AC interface of the virtual machine accessed to the target edge device;
the determining whether the virtual machine has access only to the target edge device includes:
and if the configuration information of the AC interface is determined to have a set identifier, determining that the virtual machine is only accessed to the target edge device, wherein the set identifier is used for identifying that the virtual machine is only accessed to one edge device.
3. The method of claim 1, wherein the private address comprises an Internet Protocol (IP) address and/or a Media Access Control (MAC) address of the target edge device.
4. An access configuration device of a virtual machine, applied to a target edge device in an edge device group, where the edge device group includes two or more edge devices, the device comprising:
the determining module is used for determining whether the virtual machine is only accessed to the target edge device when the virtual machine access is detected;
a sending module, configured to send routing information including a private address of the target edge device to a virtual extensible local area network VXLAN tunnel endpoint VTEP of a data center where the virtual machine is located if it is determined that the virtual machine is only accessed to the target edge device, so that the VTEP establishes a VXLAN tunnel and uses the VXLAN tunnel as a forwarding interface from the VTEP to the virtual machine, where the private address is used to distinguish the target edge device from other edge devices in an edge device group.
5. The apparatus of claim 4, further comprising: an acquisition module to:
obtaining an access circuit AC interface of the virtual machine accessed to the target edge device;
the determining module is specifically configured to:
and if the configuration information of the AC interface is determined to have a set identifier, determining that the virtual machine is only accessed to the target edge device, wherein the set identifier is used for identifying that the virtual machine is only accessed to one edge device.
6. The apparatus of claim 4, wherein the private address comprises an Internet Protocol (IP) address and/or a Media Access Control (MAC) address of the target edge device.
7. An access configuration system of a virtual machine is characterized by comprising a virtual extensible local area network (VXLAN) tunnel endpoint (VTEP) in a data center and a target edge device in an edge device group, wherein the edge device group comprises two or more edge devices;
the target edge device is configured to determine whether the virtual machine is only accessed to the target edge device when detecting that the virtual machine is accessed, and send routing information including a private address of the target edge device to a virtual extensible local area network VXLAN tunnel endpoint VTEP of a data center if determining that the virtual machine is only accessed to the target edge device, where the private address is used to distinguish the target edge device from other edge devices in an edge device group;
the VTEP is configured to establish a VXLAN tunnel from the VXLAN tunnel endpoint to the target edge device with the private address of the target edge device as a destination address, and use the VXLAN tunnel as a forwarding interface from the VXLAN tunnel endpoint to the virtual machine.
8. A computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, wherein the processor implements the steps of the method of any one of claims 1 to 3 when executing the computer program.
CN201810542583.9A 2018-05-30 2018-05-30 Access configuration method, device and system of virtual machine Active CN108712316B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810542583.9A CN108712316B (en) 2018-05-30 2018-05-30 Access configuration method, device and system of virtual machine

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810542583.9A CN108712316B (en) 2018-05-30 2018-05-30 Access configuration method, device and system of virtual machine

Publications (2)

Publication Number Publication Date
CN108712316A CN108712316A (en) 2018-10-26
CN108712316B true CN108712316B (en) 2020-12-08

Family

ID=63870919

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810542583.9A Active CN108712316B (en) 2018-05-30 2018-05-30 Access configuration method, device and system of virtual machine

Country Status (1)

Country Link
CN (1) CN108712316B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113328942B (en) * 2021-04-14 2022-04-01 新华三大数据技术有限公司 Configuration issuing method and device and computer equipment

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106878134A (en) * 2016-12-16 2017-06-20 新华三技术有限公司 Data center's interoperability methods and device
CN107612808A (en) * 2017-09-13 2018-01-19 新华三技术有限公司 Tunnel establishing method and device
WO2018090872A1 (en) * 2016-11-16 2018-05-24 新华三技术有限公司 Data processing
CN108092890A (en) * 2017-12-26 2018-05-29 新华三技术有限公司 Method for routing foundation and device

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018090872A1 (en) * 2016-11-16 2018-05-24 新华三技术有限公司 Data processing
CN106878134A (en) * 2016-12-16 2017-06-20 新华三技术有限公司 Data center's interoperability methods and device
CN107612808A (en) * 2017-09-13 2018-01-19 新华三技术有限公司 Tunnel establishing method and device
CN108092890A (en) * 2017-12-26 2018-05-29 新华三技术有限公司 Method for routing foundation and device

Also Published As

Publication number Publication date
CN108712316A (en) 2018-10-26

Similar Documents

Publication Publication Date Title
CN112486627B (en) Virtual machine migration method and device
CN107070691B (en) Cross-host communication method and system of Docker container
CN109729012B (en) Unicast message transmission method and device
EP3451592B1 (en) Packet transmission between vxlan domains
CN106921578B (en) Method and device for generating forwarding table item
CN109412926B (en) Tunnel establishment method and device
WO2014114228A1 (en) Item aggregation in shortest path bridging mac-in-mac mode (spbm) network
CN107682275B (en) Message monitoring method and device
CN108494701B (en) Load sharing method and device
CN106982163B (en) Method and gateway for acquiring route on demand
CN107493222B (en) VXLAN message forwarding method and device
CN110505621B (en) Terminal migration processing method and device
CN109412949B (en) Data message transmission method and device
JP2019521619A (en) Packet forwarding
CN108306825B (en) Equivalent forwarding table item generation method and VTEP device
US20120324536A1 (en) Virtual extended network
CN108777663B (en) Method and device for synchronizing routing information
EP3544244A1 (en) Proxy advertisements in multihomed networks
CN114143257A (en) Method for generating table entry, method, device and system for sending message
CN105657078B (en) A kind of data transmission method, device and multitiered network manager
CN106716870B (en) Local packet switching at satellite device
CN104301446B (en) A kind of message processing method, switch device and system
WO2019011247A1 (en) Mac address information synchronization method, device and storage medium
CN108718276A (en) A kind of message forwarding method and device
CN108712316B (en) Access configuration method, device and system of virtual machine

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant