CN109445902B - Data operation method and system - Google Patents

Data operation method and system Download PDF

Info

Publication number
CN109445902B
CN109445902B CN201811039796.6A CN201811039796A CN109445902B CN 109445902 B CN109445902 B CN 109445902B CN 201811039796 A CN201811039796 A CN 201811039796A CN 109445902 B CN109445902 B CN 109445902B
Authority
CN
China
Prior art keywords
virtual machine
volume
operation authority
hash value
management platform
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201811039796.6A
Other languages
Chinese (zh)
Other versions
CN109445902A (en
Inventor
钟晋明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
New H3C Cloud Technologies Co Ltd
Original Assignee
New H3C Cloud Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by New H3C Cloud Technologies Co Ltd filed Critical New H3C Cloud Technologies Co Ltd
Priority to CN201811039796.6A priority Critical patent/CN109445902B/en
Publication of CN109445902A publication Critical patent/CN109445902A/en
Application granted granted Critical
Publication of CN109445902B publication Critical patent/CN109445902B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • G06F9/45533Hypervisors; Virtual machine monitors
    • G06F9/45558Hypervisor-specific management and integration aspects
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • G06F9/45533Hypervisors; Virtual machine monitors
    • G06F9/45558Hypervisor-specific management and integration aspects
    • G06F2009/45562Creating, deleting, cloning virtual machine instances
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Abstract

The application provides a data operation method, which is applied to a virtual machine in a cluster management platform and comprises the following steps: the virtual machine sends a data access request to a storage management platform, wherein the data access request comprises a target hash value of the virtual machine, so that the storage management platform inquires a pre-stored storage volume list and determines whether a volume identifier and an operation authority corresponding to the target hash value of the virtual machine exist or not, the storage volume list comprises the corresponding relation among the volume identifier, the hash value of the virtual machine and the operation authority, and the hash value of the virtual machine corresponds to the virtual machine in a cluster management platform; receiving a data access request response returned by the storage management platform; and if the data access request response comprises the volume identification and the operation authority corresponding to the hash value of the virtual machine, operating the data in the volume corresponding to the volume identification according to the operation authority.

Description

Data operation method and system
Technical Field
The present application relates to the field of communications technologies, and in particular, to a data operation method and system.
Background
The cluster management platform can manage a plurality of hosts, each host is provided with a plurality of virtual machines, and the virtual machines read and write data by accessing the virtual disks. The file format of the virtual disk is generally based on a RADOS externally-provided Block storage protocol (RBD) format, and the virtual disk can be read and written by a plurality of hosts at the same time, but when a virtual machine of one host accesses the virtual disk a and another virtual machine also accesses the virtual disk a, for example, data is written or formatted, so that original data is damaged.
In the prior art, for a host in one cluster management platform, the cluster management platform may limit that multiple virtual machines in the corresponding host cannot access the same virtual disk, but for different cluster management platforms, because different cluster management platforms are independent from each other, one cluster management platform cannot limit access to virtual machines in other cluster management platforms, which may cause that virtual machines in different cluster management platforms access the same virtual disk, resulting in data damage in the virtual machine disk. For example, the host in the host cluster 1 corresponds to the cluster management platform 1, and the host in the host cluster 2 corresponds to the cluster management platform 2, so that the host in the host cluster 2 is not managed by the cluster management platform 1, and when the virtual machine in the host cluster 1 accesses the virtual disk a, the host in the host cluster 2 is not limited by the cluster management platform 1, and the virtual machine in the host cluster 2 can still access the virtual disk, which may cause data damage in the virtual disk.
Disclosure of Invention
In view of this, an object of the present application is to provide a data operation method and system, which are used to solve the problem in the prior art that the possibility of data damage caused by simultaneous access of multiple virtual machines in different cluster management platforms to a same virtual disk is reduced.
In a first aspect, an embodiment of the present application provides a data operation method, which is applied to a virtual machine in a cluster management platform, and the method includes:
the virtual machine sends a data access request to a storage management platform, wherein the data access request comprises a target hash value of the virtual machine, so that the storage management platform inquires a pre-stored storage volume list and determines whether a volume identifier and an operation authority corresponding to the target hash value of the virtual machine exist or not, the storage volume list comprises the corresponding relation among the volume identifier, the hash value of the virtual machine and the operation authority, and the hash value of the virtual machine corresponds to the virtual machine in a cluster management platform;
receiving a data access request response returned by the storage management platform;
and if the data access request response comprises the volume identification and the operation authority corresponding to the hash value of the virtual machine, operating the data in the volume corresponding to the volume identification according to the operation authority.
Optionally, before the virtual machine sends the data access request to the storage management platform, the method further includes:
inquiring whether a volume identifier and an operation authority corresponding to the target hash value of the virtual machine are stored in a local configuration file;
if not, executing the step that the virtual machine sends a data access request to a storage management platform;
if so, accessing the volume corresponding to the volume identifier in the local configuration file according to the operation authority in the local configuration file;
after determining that the data access request response includes the volume identifier and the operation authority corresponding to the hash value of the virtual machine, the method further includes:
and storing the target hash value of the virtual machine and the volume identification and the operation authority included in the data access request response in the local configuration file.
Optionally, before the sending the data access request to the storage management platform, the method further includes:
sending a volume operation authority configuration request to the storage management platform, wherein the volume operation authority configuration request carries a target volume identifier to be accessed by the virtual machine, a target hash value of the virtual machine and a target operation authority to be configured, so that the storage management platform determines whether authority conflict exists between the target operation authority to be configured and an operation authority corresponding to the target volume identifier to be accessed in the storage volume list based on the received target volume identifier to be accessed by the virtual machine, and stores the target hash value and the target operation authority corresponding to the target volume identifier in the storage volume list if the authority conflict does not exist;
receiving a volume operation authority configuration request response sent by the storage management platform;
and if the volume operation authority configuration request response comprises the target volume identification and the target operation authority corresponding to the target hash value, storing the target volume identification and the target operation authority which are included in the volume operation authority configuration request response into a local configuration file.
Optionally, the target hash value of the virtual machine is obtained by performing hash operation on an identifier of a cluster management platform to which the virtual machine belongs and a feature code of the virtual machine, and the feature code of the virtual machine is obtained by performing hash operation on the identifier of the virtual machine and attribute information of the virtual machine.
In a second aspect, an embodiment of the present application provides a data operation method, which is applied to a storage management platform, and the method includes:
the storage management platform analyzes a received data access request sent by a virtual machine, and acquires a target hash value of the virtual machine included in the data access request;
inquiring whether a volume identification and an operation authority corresponding to a target hash value of the virtual machine exist in a pre-stored storage volume list, wherein the storage volume list comprises the corresponding relation among the volume identification, the hash value of the virtual machine and the operation authority, and the hash value of the virtual machine corresponds to the virtual machine in a cluster management platform;
and if so, carrying the volume identification and the operation authority corresponding to the target hash value of the virtual machine in a data access request response, and sending the data access request response to the virtual machine so that the virtual machine operates the data in the volume corresponding to the volume identification according to the operation authority.
Optionally, before the storage management platform parses the received data access request sent by the virtual machine, the method further includes:
receiving a volume operation authority configuration request, wherein the volume operation authority configuration request carries a volume identifier which needs to be accessed by a virtual machine, a hash value of the virtual machine and an operation authority which needs to be configured;
determining whether the operation authority required to be configured and the operation authority corresponding to the volume identification required to be accessed in the storage volume list have authority conflict or not based on the received volume identification required to be accessed by the virtual machine;
if no permission conflict exists, storing the hash value of the virtual machine corresponding to the volume identifier which the virtual machine needs to access and the operation permission which needs to be configured in the storage volume list;
and carrying the hash value of the virtual machine corresponding to the volume identifier to be accessed by the virtual machine and the operation authority to be configured in a volume operation authority configuration request response, and sending the volume operation authority configuration request to the virtual machine sending the volume operation authority configuration request.
In a third aspect, an embodiment of the present application provides a computer device including a memory, a processor, and a computer program stored on the memory and executable on the processor, where the processor implements the steps of the method when executing the computer program.
In a fourth aspect, the present application provides a computer device including a memory, a processor, and a computer program stored on the memory and executable on the processor, wherein the processor implements the steps of the method when executing the computer program.
In a fifth aspect, an embodiment of the present application provides a data operating system, including at least one cluster management platform, a storage management platform, and virtual disks, where each cluster management platform includes at least one virtual machine, the virtual machine is configured to execute the data operating method, the storage management platform is configured to execute the data operating method, and the virtual disks are represented by volume identifiers.
According to the data operation method provided by the embodiment of the application, a storage volume list stored in advance by a storage management platform comprises a volume identifier, a corresponding relation between a hash value and an operation authority of a virtual machine, the hash value of the virtual machine corresponds to the virtual machine in a cluster management platform, a host sends a data access request comprising a target hash value of the virtual machine to the storage management platform, so that the storage management platform inquires the storage volume list stored in advance, determines whether the volume identifier and the operation authority corresponding to the target hash value of the virtual machine exist or not, receives a data access request response, and operates data in a volume corresponding to the volume identifier if the data access request response comprises the volume identifier and the operation authority corresponding to the hash value of the virtual machine according to the operation authority. Therefore, the operating authorities of the virtual machines in different cluster management platforms are stored in the storage management platform, the possibility of authority conflict of the operating authorities is reduced, the virtual machines in different cluster management platforms can access the volume in the same virtual disk at the same time, and the probability of data damage when the virtual machines in different cluster management platforms access the same volume at the same time is reduced.
In order to make the aforementioned objects, features and advantages of the present application more comprehensible, preferred embodiments accompanied with figures are described in detail below.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings that are required to be used in the embodiments will be briefly described below, it should be understood that the following drawings only illustrate some embodiments of the present application and therefore should not be considered as limiting the scope, and for those skilled in the art, other related drawings can be obtained from the drawings without inventive effort.
Fig. 1 is a schematic structural diagram of a data operating system according to an embodiment of the present application;
fig. 2 is a first flowchart illustrating a data operation method according to an embodiment of the present application;
fig. 3 is a second flowchart of a data operation method according to an embodiment of the present application;
fig. 4 is a schematic diagram illustrating a first structure of a data operation device according to an embodiment of the present disclosure;
fig. 5 is a second structural diagram of a data operation device according to an embodiment of the present application;
fig. 6 is a schematic structural diagram of a computer device 600 according to an embodiment of the present application;
fig. 7 is a schematic structural diagram of a computing device 700 according to yet another embodiment of the present application.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all the embodiments. The components of the embodiments of the present application, generally described and illustrated in the figures herein, can be arranged and designed in a wide variety of different configurations. Thus, the following detailed description of the embodiments of the present application, presented in the accompanying drawings, is not intended to limit the scope of the claimed application, but is merely representative of selected embodiments of the application. All other embodiments, which can be derived by a person skilled in the art from the embodiments of the present application without making any creative effort, shall fall within the protection scope of the present application.
An embodiment of the present application provides a data operating system, as shown in fig. 1, the system includes: each cluster management platform 11 includes at least one virtual machine 112, where the cluster management platform 11 may be applied to a computer device, a mobile terminal, and other devices, the storage management platform 12 may be applied to a computer device, a mobile terminal, and other devices, the virtual disk 13 may be applied to a computer device, a mobile terminal, and other devices, the virtual machine 112 may be applied to a computer device, a mobile terminal, and other devices, the cluster management platform 11, the storage management platform 12, and the virtual disk 13 may be applied to the same computer device, or may be applied to different computer devices, or any one of the cluster management platform 11 and the storage management platform and the virtual disk may be applied to the same computer device, which is not limited in this application.
Each cluster management platform 11 includes a plurality of virtual machines 112, different virtual machines 112 in different cluster management platforms 11 access a volume in the virtual disk 13 based on their own operating authority, the virtual disk includes a plurality of volumes, the different volumes are represented by different volume identifiers, and each volume has a volume storage path.
The description will be given by taking an example in which one virtual machine in one cluster management platform 11 performs data operations in a volume.
The virtual machine 112 sends a data access request to the storage management platform 12, the storage management platform 12 queries, according to the received data access request, a volume identifier and a corresponding operation authority corresponding to a target hash value of the virtual machine 112 in a storage volume list pre-stored in the storage management platform, and if the volume identifier and the corresponding operation authority are queried, the queried volume identifier and operation authority are carried in a data access request response and sent to the virtual machine 112, or a queried volume storage path is carried in a data access request response and sent to the virtual machine 112.
If the data access request response carries the volume identifier and the operation authority, after receiving the data access request response, the virtual machine 112 may access the volume corresponding to the volume identifier in the virtual disk 13 according to the operation authority in the data access request response. The virtual machine 112 may also store the received operational rights and volume identification in a local configuration file.
If the data access request response carries the volume storage path, after receiving the data access request response, the virtual machine 112 may query, based on the volume storage path, the operation authority of the virtual machine in the storage management platform, and access the corresponding virtual disk based on the queried operation authority, or may store the volume storage path in the data access request response in a local configuration file, and when the virtual machine needs to access the virtual disk next time, may directly query, according to the volume storage path in the local configuration file, the operation authority of the virtual machine, and access the corresponding virtual disk.
The local configuration file may be a configuration file in the virtual machine, or a configuration file in a host to which the virtual machine belongs, and after the local configuration file is stored in the virtual machine or the host to which the virtual machine belongs in the local configuration file, the virtual machine 112 may access the volume in the disk of the virtual machine based on the operation authority and the volume identifier in the local configuration file; alternatively, after the local configuration file stores the corresponding volume storage path, the virtual machine 112 may access the corresponding volume in the virtual disk based on the volume storage path in the local configuration file. If the local configuration file is a configuration file in the host, storing a corresponding relation among the hash value, the volume identifier and the operation authority of the virtual machine in the configuration file, or storing a corresponding relation between a path and the hash value of the virtual machine in a storage volume; if the local configuration file is a configuration file in the virtual machine, in this case, only the volume identifier and the operation authority corresponding to the virtual machine may be saved in the configuration file, or only the volume storage path corresponding to the virtual machine may be saved.
In addition, the information carried in the data access request response may also be stored in a database of the cluster management platform to which the virtual machine belongs, and when the information is stored in the database, a corresponding relationship between the hash value of the virtual machine, the volume identifier, and the operation authority may be stored, or a corresponding relationship between the hash value of the virtual machine and the volume storage path may be stored.
The storage volume list stored in the storage management platform 12 may store a list of storage volumes that the virtual machines 112 in different cluster management platforms 11 configure operation permissions for their own included virtual machines through the storage management platform 12, and after receiving a volume operation permission configuration request of each virtual machine, the storage management platform 12 configures permissions for each virtual machine on the premise of avoiding conflict of operation permissions existing when different virtual machines access the same volume as much as possible. In this way, when the virtual machine 112 accesses a volume in a disk of the virtual machine, data in the volume can be operated according to the operation authority of the volume that can be accessed by the virtual machine, the storage management platform 12 configures the operation authority for each virtual machine, and the operation authority for controlling the virtual machine is flexible, so that authority conflicts that may occur in the operation authority are reduced, and therefore, the probability that the virtual machines in different cluster management platforms access the same volume at the same time is also reduced, and the probability that the data in the possible volume is damaged is reduced.
In order to make the aforementioned objects, features and advantages of the present disclosure more comprehensible, the present disclosure is described in further detail with reference to the accompanying drawings and the detailed description.
In the embodiment of the present disclosure, the device executing the data operation method is a virtual machine and a storage management platform in the cluster management platform, respectively. The following describes a data operation method provided by the embodiment of the present disclosure, where the execution subject is a virtual machine in a cluster management platform.
An embodiment of the present application provides a data operation method, as shown in fig. 2, the method includes the following steps:
s201, a virtual machine sends a data access request to a storage management platform, wherein the data access request comprises a target hash value of the virtual machine, so that the storage management platform queries a pre-stored storage volume list and determines whether a volume identifier and an operation authority corresponding to the target hash value of the virtual machine exist or not, the storage volume list comprises the corresponding relation among the volume identifier, the hash value of the virtual machine and the operation authority, and the hash value of the virtual machine corresponds to the virtual machine in a cluster management platform;
here, the target hash value of the virtual machine is obtained by performing hash operation on the identifier of the cluster management platform to which the virtual machine belongs and the feature code of the virtual machine, and the feature code of the virtual machine is obtained by performing hash operation on the identifier of the virtual machine and the attribute information of the virtual machine, where the attribute information of the virtual machine includes information such as creation time of the virtual machine, host identifier of a host to which the virtual machine belongs, and the manner of performing hash operation has been described in detail in the prior art, and will not be described herein; hash values of virtual machines in different cluster management platforms are stored in a storage volume list, the hash value of each virtual machine corresponds to a volume identifier and an operation authority which the virtual machine needs to access, the operation authority characterizes the authority of an operation which the virtual machine can execute in a virtual machine disk, and the operation authority includes an exclusive authority, a read-write authority, a write authority and the like, wherein an exclusive (exception) authority characterizes volume can be only read and written by one virtual machine, and can be represented by e.
When hash calculation is performed on the feature codes of the virtual machines, the feature codes of the virtual machines are generally calculated by using the creation time of the virtual machines, virtual machine identifiers and random numbers generated randomly, if the creation time of different virtual machines in the same cluster management platform is different, whether random numbers are applied or not, the finally obtained feature codes of each virtual machine are unique, and if the creation time of different virtual machines in the same cluster management platform is the same, the feature codes of each virtual machine can be guaranteed to be unique by applying for the random numbers.
When hash values of the virtual machines are subjected to hash calculation, the hash values of the virtual machines are generally calculated through identification of a cluster to which the virtual machines belong and feature codes of the virtual machines obtained through calculation, and the feature codes of the virtual machines obtained through calculation are different, so that the hash values of the virtual machines obtained through calculation are different whether the virtual machines belong to the same cluster management platform or different cluster management platforms.
S202, the virtual machine receives a data access request response returned by the storage management platform;
s203, if the data access request response comprises the volume identification and the operation authority corresponding to the hash value of the virtual machine, the virtual machine operates the data in the volume corresponding to the volume identification according to the operation authority.
Before executing S201, that is, before the virtual machine sends the data access request to the storage management platform, the method further includes:
sending a volume operation authority configuration request to the storage management platform, wherein the volume operation authority configuration request carries a target volume identifier to be accessed by the virtual machine, a target hash value of the virtual machine and a target operation authority to be configured, so that the storage management platform determines whether authority conflict exists between the target operation authority to be configured and an operation authority corresponding to the target volume identifier to be accessed in the storage volume list based on the received target volume identifier to be accessed by the virtual machine, and stores the target hash value and the target operation authority corresponding to the target volume identifier in the storage volume list if the authority conflict does not exist;
receiving a volume operation authority configuration request response sent by the storage management platform;
and if the volume operation authority configuration request response comprises the target volume identification and the target operation authority corresponding to the target hash value, storing the target volume identification and the target operation authority which are included in the volume operation authority configuration request response into a local configuration file.
Here, the operation permission of each virtual machine may be configured before the virtual machine sends the data access request, or a new operation permission may be configured for the virtual machine in the process of accessing the virtual disk by the virtual machine, which is not limited in the present application; when one volume is configured to the exclusive right of the virtual machine, the operation right is not allowed to be configured for other virtual machines, if other virtual machines apply any operation right of the volume, the right conflict is considered to occur, and after the right conflict occurs, the operation right is not distributed to the virtual machine which applies the operation right of the volume later.
In specific implementation, a virtual machine sends an operation authority configuration request carrying a target volume identifier which the virtual machine needs to access, a target hash value of the virtual machine and a target operation authority volume which needs to be configured to a storage management platform, and the storage management platform judges whether authority conflict exists between the target operation authority which needs to be configured and an operation authority corresponding to the target volume identifier which needs to be accessed in a storage volume list based on the received target volume identifier which the virtual machine needs to access.
If no permission conflict exists, namely the operation permission of the current volume is not exclusive permission, storing a target hash value and a target operation permission corresponding to the target volume identification in a storage volume list; if the permission conflict exists, that is, the operation permission of the current volume is the exclusive permission, the operation permission applied by the virtual machine will not be configured for the virtual machine.
The storage management platform can send a volume operation authority configuration request response to the virtual machine, wherein the volume operation authority configuration request response is used for informing whether the virtual machine configuration authority is successful or not; after the operation authority configured for the virtual machine is successful, the storage management platform can carry the target volume identifier and the target operation authority corresponding to the target hash value in the volume operation authority configuration request response and send the volume identifier and the target operation authority to the virtual machine, and the virtual machine can store the volume identifier and the target authority in a local configuration file according to the target hash value and the target authority limitation in the volume operation authority configuration request, or can carry the volume storage path of the volume corresponding to the target volume identifier in the volume operation authority configuration request response and send the volume storage path to the virtual machine; after the storage management platform fails to configure the operation authority for the virtual machine, the content carried in the volume operation authority configuration request response is the set character, after the virtual machine receives the volume operation authority configuration request with the content being the set character, the virtual machine can determine that the storage management platform fails to configure the operation authority for the virtual machine, the virtual machine can give an alarm, and after receiving the alarm, a system administrator can determine whether the storage management platform configures the currently applied operation authority for the virtual machine based on the priority of the virtual machine. The set character indicates that the storage management platform does not find the volume identifier and the operation authority, and the set character may be failure, null or 0, and may be determined according to an actual situation, which is not limited by the present application.
It should be noted here that when the virtual machines in different cluster management platforms can perform read-write operations on the same volume at the same time, or when the virtual machines in different cluster management platforms can perform read-write operations and write operations on the same volume, the probability that different virtual machines perform write operations on the same position in the volume at the same time is relatively low, and therefore, it is considered that the two cases are not permission conflicts, and the read-write permission and the write permission of the same volume can also be simultaneously allocated to different virtual machines. If different virtual machines write to the same position in the volume at the same time, at this time, the application software on the upper layer of the system performs distributed lock control, so that two virtual machines do not write to the same position at the same time. Therefore, the problem of data damage caused by simultaneous write operation of the two virtual machines to the volume can not occur.
For example, a virtual machine a sends a volume operation authority configuration request to a storage management platform, the volume operation authority configuration request carries a target hash value of AS11, a volume identifier is RBD1-1, and an operation authority is rw, the storage management platform queries stored operation authority corresponding to RBD1-1 from a storage volume list after receiving the volume operation authority configuration request, if the stored operation authority corresponding to RBD1-1 is rw, it is indicated that the RBD1-1 volume is occupied by a virtual machine, when the virtual machine a applies for the rw operation authority, it is considered that an authority conflict exists, the storage management platform does not assign rw operation authority to the virtual machine a, sends a volume operation authority configuration request response with null content to the virtual machine a to notify a user that the operation authority configuration is failed, if the stored operation authority corresponding to RBD1-1 is queried AS another operation authority, and if the virtual machine A does not have the permission conflict when applying for the rw operation permission, the storage management platform allocates the rw operation permission for the virtual machine A, sends a volume operation permission configuration request response to the virtual machine A to inform a user that the operation permission configuration is successful, or carries RBD1-1 and rw in the volume operation permission configuration request response and sends the volume operation permission configuration request response to the virtual machine A, or carries a volume storage path of RBD1-1 in the volume operation permission configuration request response and sends the volume storage path to the virtual machine A.
After configuring the operation authority for each virtual machine, before the virtual machine sends a data access request to the storage management platform, the method further comprises the following steps:
inquiring whether a volume identifier and an operation authority corresponding to the target hash value of the virtual machine are stored in a local configuration file;
if not, executing the step that the virtual machine sends a data access request to a storage management platform;
if so, accessing the volume corresponding to the volume identifier in the local configuration file according to the operation authority in the local configuration file;
after determining that the data access request response includes the volume identifier and the operation authority corresponding to the hash value of the virtual machine, the method further includes:
and storing the target hash value of the virtual machine and the volume identification and the operation authority included in the data access request response in the local configuration file.
Here, the local configuration file may be a local configuration file in the virtual machine, or may be a local configuration file of a host to which the virtual machine belongs, which is not limited in this application.
In a specific implementation, before sending a data access request to a storage management platform, a virtual machine queries whether a volume identifier and an operation authority corresponding to a target hash value of the virtual machine are stored in a local configuration file of a host to which the virtual machine belongs, or the virtual machine determines whether the volume identifier and the operation authority corresponding to the virtual machine are stored by using the local configuration file of the virtual machine, or the virtual machine queries whether a volume storage path corresponding to the target hash value of the virtual machine is stored in the local configuration file of the host to which the virtual machine belongs, or the virtual machine determines whether the volume storage path corresponding to the virtual machine is stored by using the local configuration file of the virtual machine.
Aiming at the conditions of the storage volume identification and the operation authority in the local configuration file:
if the volume identification and the operation authority corresponding to the virtual machine are not stored, the virtual machine can directly send a data access request to a storage management platform;
if the volume identifier and the operation authority corresponding to the virtual machine are stored, and the volume identifier and the operation authority corresponding to the target hash value are searched in the local configuration file of the host machine aiming at the condition that the volume identifier and the operation authority are stored in the local configuration file of the host machine to which the virtual machine belongs, and the volume corresponding to the searched volume identifier is accessed according to the searched access authority; and directly operating the data corresponding to the stored volume identifier according to the operation authority stored in the local configuration file in the virtual machine aiming at the condition that the volume identifier and the operation authority are stored in the local configuration file of the virtual machine.
For the case of a storage volume storage path in a local configuration file:
if the volume storage path corresponding to the virtual machine is not stored, the virtual machine can directly send a data access request to the storage management platform;
if the volume storage path corresponding to the virtual machine is stored, searching the volume storage path corresponding to the target hash value in the local configuration file of the host machine of the virtual machine aiming at the condition that the volume storage path is stored in the local configuration file of the host machine to which the virtual machine belongs, acquiring the volume identifier to be accessed by the virtual machine and the corresponding operation authority on the storage management platform according to the searched volume storage path, and accessing the volume corresponding to the acquired volume identifier according to the acquired operation authority; and directly acquiring the volume identification and the corresponding operation authority according to the volume storage path stored in the local configuration file in the virtual machine aiming at the condition that the volume storage path is stored in the local configuration file of the virtual machine, and accessing the volume corresponding to the acquired volume identification according to the acquired operation authority.
When the virtual machine sends a data access request carrying a target hash value to the storage management platform, the storage management platform analyzes the received data access request to obtain the target hash value, inquires a storage volume list according to the target hash value obtained by analysis, and determines whether a volume identifier and an operation authority corresponding to the target hash value of the virtual machine exist.
After the volume identification and the operation authority corresponding to the target hash value of the virtual machine are found, carrying the found volume identification and operation authority in a data access request response, and sending the data access request response to the corresponding virtual machine; and if the hash value is not found, returning a data access request response carrying the set character to the virtual machine. The setting characters are the same as the above setting characters, and the description thereof is omitted.
After receiving a data access request response returned by the storage management platform, if the virtual machine is determined to carry the set character in the virtual machine access response request, the virtual machine cannot access the virtual disk; if it is determined that the data access request response carries the volume identifier and the operation authority, the volume corresponding to the volume identifier may be operated according to the fed-back operation authority, or the returned volume identifier and the operation authority may be stored in the local configuration file, or if it is determined that the data access request response carries the volume storage path, the volume identifier and the operation authority may be queried on the storage management platform according to the fed-back volume storage path, the data operation may be performed on the queried volume according to the queried operation authority, or the returned volume storage path may be stored in the local configuration file.
Taking a tape volume identifier and an operation authority in a data access request response AS an example, a virtual machine a sends a data access request to a storage management platform, the data access request carries a target hash value AS11 of the virtual machine a, a storage volume list in the storage management platform stores a corresponding relation among a hash value AS11, a volume identifier RBD1-1 and an operation authority rw, of course, the storage volume list also stores corresponding relations among hash values, volume identifiers and operation authorities of virtual machines in other cluster management platforms, which is not an example, after receiving the hash value AS11, the storage management platform determines a volume identifier RBD1-1 and an operation authority rw corresponding to the virtual machine a from the storage volume list, carries the RBD1-1 and the rw in the data access request response and sends the data access request response to the virtual machine a, and after the virtual machine a receives the RBD1-1 and the rw, the data in the RBD1-1 can be subjected to exclusive operation directly according to rw; and if the volume identification and the corresponding operation authority which can be accessed by the virtual machine A are not stored in the local configuration file of the virtual machine A, storing the received RBDs 1-1 and rw into the local configuration file of the virtual machine A. In this way, when the virtual machine a operates on the data in the RBD1-1, the virtual machine a can directly perform data operation on the corresponding volume based on the operation authority in the local configuration file, thereby reducing interaction with the storage management platform.
If the volume storage path is carried in the data access request response, and when the virtual machine a stores the volume storage path of the volume RBD1-1 in the local configuration file, the add storage RBD1-1 command may be executed by a libvirt tool, and the volume storage path of the volume RBD1-1 is stored in the local configuration file.
According to the data operation method provided by the embodiment of the application, a storage volume list stored in advance by a storage management platform comprises a volume identifier, a corresponding relation between a hash value and an operation authority of a virtual machine, the hash value of the virtual machine corresponds to the virtual machine in a cluster management platform, a host sends a data access request comprising a target hash value of the virtual machine to the storage management platform, so that the storage management platform inquires the storage volume list stored in advance, determines whether the volume identifier and the operation authority corresponding to the target hash value of the virtual machine exist or not, receives a data access request response, and operates data in a volume corresponding to the volume identifier if the data access request response comprises the volume identifier and the operation authority corresponding to the hash value of the virtual machine according to the operation authority. Therefore, the operating authorities of the virtual machines in different cluster management platforms are stored in the storage management platform, the possibility of authority conflict of the operating authorities is reduced, the virtual machines in different cluster management platforms can access the volume in the same virtual disk at the same time, and the probability of data damage when the virtual machines in different cluster management platforms access the same volume at the same time is reduced.
An embodiment of the present application provides a data operation method, as shown in fig. 3, which is applied to a storage management platform, and the method includes:
s301, a storage management platform analyzes a received data access request sent by a virtual machine, and obtains a target hash value of the virtual machine included in the data access request;
s302, the storage management platform inquires whether a volume identifier and an operation authority corresponding to a target hash value of the virtual machine exist in a pre-stored storage volume list, wherein the storage volume list comprises the corresponding relation among the volume identifier, the hash value of the virtual machine and the operation authority, and the hash value of the virtual machine corresponds to the virtual machine in a cluster management platform;
and S303, if the storage management platform inquires, carrying the inquired volume identification and the operation authority corresponding to the target hash value of the virtual machine in a data access request response, and sending the data access request response to the virtual machine so that the virtual machine operates the data in the volume corresponding to the volume identification according to the operation authority.
Optionally, before the sending the data access request to the storage management platform, the method further includes:
a storage management platform receives a volume operation authority configuration request, wherein the volume operation authority configuration request carries a volume identifier which a virtual machine needs to access, a hash value of the virtual machine and an operation authority which needs to be configured;
the storage management platform determines whether the operation authority required to be configured and the operation authority corresponding to the volume identification required to be accessed in the storage volume list have authority conflict or not based on the received volume identification required to be accessed by the virtual machine;
if no permission conflict exists, the storage management platform stores the hash value of the virtual machine corresponding to the volume identifier which the virtual machine needs to access and the operation permission which needs to be configured in the storage volume list;
and the storage management platform carries the hash value of the virtual machine corresponding to the volume identifier to be accessed by the virtual machine and the operation authority to be configured in the volume operation authority configuration request response, and sends the hash value and the operation authority to be configured to the virtual machine sending the volume operation authority configuration request.
An embodiment of the present application provides a data operation apparatus, as shown in fig. 4, which is applied to a virtual machine in a cluster management platform, and the apparatus includes:
a sending module 41, configured to send a data access request to a storage management platform, where the data access request includes a target hash value of the virtual machine, so that the storage management platform queries a storage volume list stored in advance, and determines whether a volume identifier and an operation authority corresponding to the target hash value of the virtual machine exist, where the storage volume list includes a correspondence between the volume identifier, the hash value of the virtual machine, and the operation authority, and a hash value of a virtual machine corresponds to a virtual machine in a cluster management platform;
a receiving module 42, configured to receive a data access request response returned by the storage management platform;
and a processing module 43, configured to, if the data access request response includes the volume identifier and the operation authority corresponding to the hash value of the virtual machine, operate the data in the volume corresponding to the volume identifier according to the operation authority.
Optionally, the apparatus further comprises: a query module 44 and a storage module 45, the query module being configured to:
inquiring whether a volume identifier and an operation authority corresponding to the target hash value of the virtual machine are stored in a local configuration file;
the sending module 41 is further configured to execute the step of sending the data access request to the storage management platform by the virtual machine if the data access request is not sent;
the processing module 43 is further configured to access, if yes, a volume corresponding to the volume identifier in the local configuration file according to the operation permission in the local configuration file;
the storage module 45 is configured to:
and storing the target hash value of the virtual machine and the volume identification and the operation authority included in the data access request response in the local configuration file.
Optionally, the sending module 41 is further configured to:
sending a volume operation authority configuration request to the storage management platform, wherein the volume operation authority configuration request carries a target volume identifier to be accessed by the virtual machine, a target hash value of the virtual machine and a target operation authority to be configured, so that the storage management platform determines whether authority conflict exists between the target operation authority to be configured and an operation authority corresponding to the target volume identifier to be accessed in the storage volume list based on the received target volume identifier to be accessed by the virtual machine, and stores the target hash value and the target operation authority corresponding to the target volume identifier in the storage volume list if the authority conflict does not exist;
the receiving module 42 is further configured to receive a volume operation authority configuration request response sent by the storage management platform;
the storage module 45 is further configured to store the volume operation authority configuration request response to a local configuration file if the volume operation authority configuration request response includes a target hash value and a target operation authority corresponding to the target volume identifier.
Optionally, the target hash value of the virtual machine is obtained by performing hash operation on an identifier of a cluster management platform to which the virtual machine belongs and a feature code of the virtual machine, and the feature code of the virtual machine is obtained by performing hash operation on the identifier of the virtual machine and attribute information of the virtual machine.
An embodiment of the present application provides a data operating apparatus, as shown in fig. 5, which is applied to a storage management platform, and the apparatus includes:
the processing module 51 is configured to parse a received data access request sent by a virtual machine, and obtain a target hash value of the virtual machine included in the data access request;
the query module 52 is configured to query whether a volume identifier and an operation authority corresponding to the target hash value of the virtual machine exist in a pre-stored storage volume list, where the storage volume list includes a correspondence between the volume identifier, the hash value of the virtual machine, and the operation authority, and the hash value of a virtual machine corresponds to a virtual machine in a cluster management platform;
and if the volume identifier and the operation authority corresponding to the target hash value of the virtual machine are found, the sending module 53 is configured to carry the found volume identifier and the operation authority corresponding to the target hash value of the virtual machine in a data access request response, and send the data access request response to the virtual machine, so that the virtual machine operates the data in the volume corresponding to the volume identifier according to the operation authority.
Optionally, the apparatus further comprises a storage module 54 and a receiving module 55,
the receiving module 55 is configured to:
receiving a volume operation authority configuration request, wherein the volume operation authority configuration request carries a volume identifier which needs to be accessed by a virtual machine, a hash value of the virtual machine and an operation authority which needs to be configured;
the processing module 51 is further configured to:
determining whether the operation authority required to be configured and the operation authority corresponding to the volume identification required to be accessed in the storage volume list have authority conflict or not based on the received volume identification required to be accessed by the virtual machine;
the storage module 54 is configured to:
if no permission conflict exists, storing the hash value of the virtual machine corresponding to the volume identifier which the virtual machine needs to access and the operation permission which needs to be configured in the storage volume list;
the sending module 53 is further configured to:
and carrying the hash value of the virtual machine corresponding to the volume identifier to be accessed by the virtual machine and the operation authority to be configured in a volume operation authority configuration request response, and sending the volume operation authority configuration request to the virtual machine sending the volume operation authority configuration request.
As shown in fig. 6, an embodiment of the present application provides a computer device 600 for executing the data manipulation method in fig. 2, the device includes a memory 601, a processor 602, and a computer program stored in the memory 601 and executable on the processor 602, wherein the processor 602 implements the steps of the data manipulation method when executing the computer program.
Specifically, the memory 601 and the processor 602 can be general-purpose memories and processors, which are not specifically limited herein, and the processor 602 can perform the data manipulation method when executing the computer program stored in the memory 601, thereby solving the problem.
Corresponding to the data operation method in fig. 2, an embodiment of the present application further provides a computer-readable storage medium, on which a computer program is stored, and the computer program is executed by a processor to perform the steps of the data operation method.
In particular, the storage medium can be a general-purpose storage medium, such as a removable disk, a hard disk, or the like, and the computer program on the storage medium can be executed to perform the above-mentioned data manipulation method when executed, thereby achieving the objective.
As shown in fig. 7, another embodiment of the present application provides a computer device 700 for executing the data operation method in fig. 3, the device includes a memory 701, a processor 702, and a computer program stored in the memory 701 and executable on the processor 702, wherein the processor 702 implements the steps of the data operation method when executing the computer program.
Specifically, the memory 701 and the processor 702 can be general-purpose memories and processors, which are not specifically limited herein, and when the processor 702 runs a computer program stored in the memory 701, the data operation method can be executed, so as to solve the problem in the prior art that the possibility of data corruption caused by multiple virtual machines accessing the same virtual disk simultaneously in different cluster management platforms is reduced, a storage volume list pre-stored by the storage management platform of the present application includes a volume identifier, a corresponding relationship between a hash value of a virtual machine and an operation authority, a hash value of a virtual machine corresponds to a virtual machine in a cluster management platform, the host sends a data access request including a target hash value of the virtual machine to the storage management platform, so that the storage management platform queries the pre-stored storage volume list to determine whether the volume identifier and the operation authority corresponding to the target hash value of the virtual machine exist or not, and receiving a data access request response, and if the data access request response comprises the volume identification and the operation authority corresponding to the hash value of the virtual machine, operating the data in the volume corresponding to the volume identification according to the operation authority. Therefore, the operating authorities of the virtual machines in different cluster management platforms are stored in the storage management platform, the possibility of authority conflict of the operating authorities is reduced, the virtual machines in different cluster management platforms can access the volume in the same virtual disk at the same time, and the probability of data damage when the virtual machines in different cluster management platforms access the same volume at the same time is reduced.
Corresponding to the data operation method in fig. 3, an embodiment of the present application further provides a computer-readable storage medium, on which a computer program is stored, and the computer program is executed by a processor to perform the steps of the data operation method.
Specifically, the storage medium can be a general storage medium, such as a mobile disk, a hard disk, and the like, and when a computer program on the storage medium is executed, the data operation method can be executed, so as to solve the problem in the prior art that the possibility of data damage caused by simultaneous access of multiple virtual machines to the same virtual disk in different cluster management platforms is reduced, a storage volume list pre-stored by the storage management platform of the present application includes a volume identifier, a hash value of a virtual machine and a corresponding operation authority, the hash value of a virtual machine corresponds to a virtual machine in a cluster management platform, the host sends a data access request including a target hash value of the virtual machine to the storage management platform, so that the storage management platform queries the pre-stored storage volume list to determine whether a volume identifier and an operation authority corresponding to the target hash value of the virtual machine exist or not, and receiving a data access request response, and if the data access request response comprises the volume identification and the operation authority corresponding to the hash value of the virtual machine, operating the data in the volume corresponding to the volume identification according to the operation authority. Therefore, the operating authorities of the virtual machines in different cluster management platforms are stored in the storage management platform, the possibility of authority conflict of the operating authorities is reduced, the virtual machines in different cluster management platforms can access the volume in the same virtual disk at the same time, and the probability of data damage when the virtual machines in different cluster management platforms access the same volume at the same time is reduced.
In the embodiments provided in the present application, it should be understood that the disclosed apparatus and method may be implemented in other ways. The above-described embodiments of the apparatus are merely illustrative, and for example, the division of the units is only one logical division, and there may be other divisions when actually implemented, and for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection of devices or units through some communication interfaces, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments provided in the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit.
The functions, if implemented in the form of software functional units and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present application or portions thereof that substantially contribute to the prior art may be embodied in the form of a software product stored in a storage medium and including instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present application. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
It should be noted that: like reference numbers and letters refer to like items in the following figures, and thus once an item is defined in one figure, it need not be further defined and explained in subsequent figures, and moreover, the terms "first", "second", "third", etc. are used merely to distinguish one description from another and are not to be construed as indicating or implying relative importance.
Finally, it should be noted that: the above-mentioned embodiments are only specific embodiments of the present application, and are used for illustrating the technical solutions of the present application, but not limiting the same, and the scope of the present application is not limited thereto, and although the present application is described in detail with reference to the foregoing embodiments, those skilled in the art should understand that: any person skilled in the art can modify or easily conceive the technical solutions described in the foregoing embodiments or equivalent substitutes for some technical features within the technical scope disclosed in the present application; such modifications, changes or substitutions do not depart from the spirit and scope of the present disclosure, which should be construed in light of the above teachings. Are intended to be covered by the scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.

Claims (7)

1. A data operation method is applied to a virtual machine in a cluster management platform, and comprises the following steps:
the virtual machine sends a data access request to a storage management platform, wherein the data access request comprises a target hash value of the virtual machine, so that the storage management platform inquires a pre-stored storage volume list and determines whether a volume identifier and an operation authority corresponding to the target hash value of the virtual machine exist or not, the storage volume list comprises the corresponding relation among the volume identifier, the hash value of the virtual machine and the operation authority, and the hash value of the virtual machine corresponds to the virtual machine in a cluster management platform;
receiving a data access request response returned by the storage management platform;
if the data access request response comprises the volume identification and the operation authority corresponding to the hash value of the virtual machine, operating the data in the volume corresponding to the volume identification according to the operation authority;
before the sending the data access request to the storage management platform, the method further includes:
sending a volume operation authority configuration request to the storage management platform, wherein the volume operation authority configuration request carries a target volume identifier to be accessed by the virtual machine, a target hash value of the virtual machine and a target operation authority to be configured, so that the storage management platform determines whether authority conflict exists between the target operation authority to be configured and an operation authority corresponding to the target volume identifier to be accessed in the storage volume list based on the received target volume identifier to be accessed by the virtual machine, and stores the target hash value and the target operation authority corresponding to the target volume identifier in the storage volume list if the authority conflict does not exist;
receiving a volume operation authority configuration request response sent by the storage management platform;
and if the volume operation authority configuration request response comprises the target volume identification and the target operation authority corresponding to the target hash value, storing the target volume identification and the target operation authority which are included in the volume operation authority configuration request response into a local configuration file.
2. The method of claim 1, wherein prior to the virtual machine sending a data access request to a storage management platform, the method further comprises:
inquiring whether a volume identifier and an operation authority corresponding to the target hash value of the virtual machine are stored in a local configuration file;
if not, executing the step that the virtual machine sends a data access request to a storage management platform;
if so, accessing the volume corresponding to the volume identifier in the local configuration file according to the operation authority in the local configuration file;
after determining that the data access request response includes the volume identifier and the operation authority corresponding to the hash value of the virtual machine, the method further includes:
and storing the target hash value of the virtual machine and the volume identification and the operation authority included in the data access request response in the local configuration file.
3. The method according to claim 1, wherein the target hash value of the virtual machine is obtained by performing a hash operation on an identifier of a cluster management platform to which the virtual machine belongs and a feature code of the virtual machine, and the feature code of the virtual machine is obtained by performing a hash operation on the identifier of the virtual machine and attribute information of the virtual machine.
4. A data operation method is applied to a storage management platform and comprises the following steps:
the storage management platform analyzes a received data access request sent by a virtual machine, and acquires a target hash value of the virtual machine included in the data access request;
inquiring whether a volume identification and an operation authority corresponding to a target hash value of the virtual machine exist in a pre-stored storage volume list, wherein the storage volume list comprises the corresponding relation among the volume identification, the hash value of the virtual machine and the operation authority, and the hash value of the virtual machine corresponds to the virtual machine in a cluster management platform;
if the data access request is inquired, carrying the inquired volume identification and the operation authority corresponding to the target hash value of the virtual machine in a data access request response, and sending the data access request response to the virtual machine so that the virtual machine operates the data in the volume corresponding to the volume identification according to the operation authority;
before the storage management platform analyzes the received data access request sent by the virtual machine, the method further includes:
receiving a volume operation authority configuration request, wherein the volume operation authority configuration request carries a volume identifier which needs to be accessed by a virtual machine, a hash value of the virtual machine and an operation authority which needs to be configured;
determining whether the operation authority required to be configured and the operation authority corresponding to the volume identification required to be accessed in the storage volume list have authority conflict or not based on the received volume identification required to be accessed by the virtual machine;
if no permission conflict exists, storing the hash value of the virtual machine corresponding to the volume identifier which the virtual machine needs to access and the operation permission which needs to be configured in the storage volume list;
and carrying the hash value of the virtual machine corresponding to the volume identifier to be accessed by the virtual machine and the operation authority to be configured in a volume operation authority configuration request response, and sending the volume operation authority configuration request to the virtual machine sending the volume operation authority configuration request.
5. A computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, characterized in that the steps of the method of any of the preceding claims 1 to 3 are implemented by the processor when executing the computer program.
6. A computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, characterized in that the steps of the method as claimed in claim 4 are implemented when the processor executes the computer program.
7. A data operating system comprising at least one cluster management platform, storage management platforms and virtual disks, each of said cluster management platforms comprising at least one virtual machine for performing the method of any of claims 1 to 3, said storage management platforms for performing the method of claim 4, said virtual disks characterized by a volume identifier.
CN201811039796.6A 2018-09-06 2018-09-06 Data operation method and system Active CN109445902B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811039796.6A CN109445902B (en) 2018-09-06 2018-09-06 Data operation method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811039796.6A CN109445902B (en) 2018-09-06 2018-09-06 Data operation method and system

Publications (2)

Publication Number Publication Date
CN109445902A CN109445902A (en) 2019-03-08
CN109445902B true CN109445902B (en) 2021-05-07

Family

ID=65532699

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811039796.6A Active CN109445902B (en) 2018-09-06 2018-09-06 Data operation method and system

Country Status (1)

Country Link
CN (1) CN109445902B (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110045930B (en) * 2019-04-19 2022-07-22 苏州浪潮智能科技有限公司 Method, device, equipment and medium for virtual platform to manage storage equipment volume
CN110532121B (en) * 2019-08-20 2022-08-26 新华三大数据技术有限公司 Service module positioning method and device
CN110516431B (en) * 2019-08-29 2022-02-18 北京浪潮数据技术有限公司 Method, system, equipment and storage medium for dynamically configuring virtual machine operation authority
CN113625968B (en) * 2021-08-12 2024-03-01 网易(杭州)网络有限公司 File authority management method and device, computer equipment and storage medium
CN114968667B (en) * 2022-05-30 2023-07-25 安超云软件有限公司 Backup management method and system

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9294443B2 (en) * 2005-01-31 2016-03-22 Unisys Corporation Secure integration of hybrid clouds with enterprise networks
EP1818833B1 (en) * 2005-02-14 2017-04-19 Panasonic Intellectual Property Management Co., Ltd. Application executing device, managing method, and program
JP5260081B2 (en) * 2008-02-25 2013-08-14 パナソニック株式会社 Information processing apparatus and control method thereof
CN101452397B (en) * 2008-11-27 2012-08-22 上海交通大学 Forced access control method and apparatus in virtual environment
CN101587524B (en) * 2009-06-23 2015-02-11 宏碁电脑(上海)有限公司 Method for encrypting data memory apparatus based on virtual system
JP5719244B2 (en) * 2011-06-29 2015-05-13 インターナショナル・ビジネス・マシーンズ・コーポレーションInternational Business Machines Corporation Method, program, and computer apparatus for constructing a safely managed virtual machine execution environment
US9076017B2 (en) * 2013-11-27 2015-07-07 Cisco Technology, Inc. Hardware virtualization module for exclusive controlled access to CPU

Also Published As

Publication number Publication date
CN109445902A (en) 2019-03-08

Similar Documents

Publication Publication Date Title
CN109445902B (en) Data operation method and system
CN107273455B (en) Block chain data access method and device
CN108287669B (en) Date storage method, device and storage medium
CN112328435B (en) Method, device, equipment and storage medium for backing up and recovering target data
US7685322B2 (en) Port number emulation for wireless USB connections
CN107911249B (en) Method, device and equipment for sending command line of network equipment
CN102799464A (en) Virtual machine creation method, virtual machine creation system, virtual machine resetting method and virtual machine resetting system
CN104238963A (en) Data storage method, device and system
CN107861691B (en) Load balancing method and device of multi-control storage system
US20220129458A1 (en) Method for generating identification id, and apparatus implementing the same method
CN112256492A (en) Block device backup method, device and storage medium
CN111966287A (en) Data storage method, electronic device and storage medium
US20150127916A1 (en) Dynamic memory allocation
CN107967305B (en) Image file uploading method, server and readable storage medium
US11394748B2 (en) Authentication method for anonymous account and server
CN105144073A (en) Removable storage device identity and configuration information
CN115562590A (en) Method, system, equipment and storage medium for using cloud hard disk by cloud host
CN113132241B (en) ACL template dynamic configuration method and device
CN111737223B (en) File copying method, device, equipment and storage medium
CN111399759B (en) Method for reading data and writing data and object file system
CN109800229B (en) Data access method and related equipment
CN110096232B (en) Processing method of disk lock, creation method of storage unit and related device
CN113656378A (en) Server management method, device and medium
CN111399753A (en) Method and device for writing pictures
CN113296891B (en) Platform-based multi-scene knowledge graph processing method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant