CN113886027B - Virtual machine template creation method, virtual machine access method, virtual machine template creation device and storage medium - Google Patents

Virtual machine template creation method, virtual machine access method, virtual machine template creation device and storage medium Download PDF

Info

Publication number
CN113886027B
CN113886027B CN202111483254.XA CN202111483254A CN113886027B CN 113886027 B CN113886027 B CN 113886027B CN 202111483254 A CN202111483254 A CN 202111483254A CN 113886027 B CN113886027 B CN 113886027B
Authority
CN
China
Prior art keywords
virtual machine
ceph
data storage
creating
iscsi
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202111483254.XA
Other languages
Chinese (zh)
Other versions
CN113886027A (en
Inventor
袁玉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Jinhe Technology Co ltd
Original Assignee
Guangzhou Jinhe Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Jinhe Technology Co ltd filed Critical Guangzhou Jinhe Technology Co ltd
Priority to CN202111483254.XA priority Critical patent/CN113886027B/en
Publication of CN113886027A publication Critical patent/CN113886027A/en
Application granted granted Critical
Publication of CN113886027B publication Critical patent/CN113886027B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • G06F9/45533Hypervisors; Virtual machine monitors
    • G06F9/45558Hypervisor-specific management and integration aspects
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • G06F9/45533Hypervisors; Virtual machine monitors
    • G06F9/45558Hypervisor-specific management and integration aspects
    • G06F2009/45562Creating, deleting, cloning virtual machine instances
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • G06F9/45533Hypervisors; Virtual machine monitors
    • G06F9/45558Hypervisor-specific management and integration aspects
    • G06F2009/45583Memory management, e.g. access or allocation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • G06F9/45533Hypervisors; Virtual machine monitors
    • G06F9/45558Hypervisor-specific management and integration aspects
    • G06F2009/45595Network integration; Enabling network access in virtual machine instances

Abstract

The application relates to a virtual machine template creation method, a virtual machine entry method, a virtual machine template creation device and a storage medium, wherein the virtual machine template creation method comprises the following steps: in an ESxi server, creating a first data storage area; creating a first virtual machine, wherein disk data of the first virtual machine is stored in the first data storage area; entering a first virtual machine system of the first virtual machine; creating a memory snapshot for the first virtual machine system, and completing the creation of the virtual machine template; and the memory snapshot is used for realizing the second-level access to the virtual machine system. The method and the device are used for achieving second-level virtual machine creation and starting to enter the system.

Description

Virtual machine template creation method, virtual machine access method, virtual machine template creation device and storage medium
Technical Field
The present application relates to the field of virtual machine technologies, and in particular, to a method and an apparatus for creating a virtual machine template and accessing a virtual machine, and a storage medium.
Background
In the internet today, cloud computing is absolutely a popular technology. The things are interconnected, especially. As an underlying application of cloud computing technology, virtualization is one of the most important technologies. Through the virtualization technology, one hardware server or a common PC can be virtualized into a plurality of virtual machines, and the virtual machines can operate independently without any influence. In an enterprise-level virtualization solution, a vSphere virtualization suite introduced by VMware is famous for characteristics of simplicity, easiness in use, stability, reliability and the like, and is deeply favored by various large internet companies.
In the vSphere virtualization suite, the two most important core components are the ESXi server and the virtual center server vcenter server. ESXi acts as a hypervsior (virtual monitor) allowing a running virtual machine and associated virtual machine devices to be created thereon. The vCenterServer is used as management software and is responsible for managing and maintaining a plurality of ESxi hosts and related resources on the ESxi hosts. Based on the two core components, hundreds of virtual machines can be easily created, and the whole life cycle of the virtual machines can be managed.
Currently, in the vSphere virtualization suite, a virtual machine can be created by several methods:
1. creating an empty virtual machine through a newly-built virtual machine function provided by ESxi, and then loading an iso mirror image through starting up to carry out system installation on the empty virtual machine;
2. the creation of the virtual machine is realized by importing the previously exported virtual machine template into the ESxi through an ovf deployment function provided by the ESxi;
3. cloning the existing virtual machine or virtual machine template through vCenter Server management software to realize the creation of the virtual machine;
4. copying and copying the folder of the existing virtual machine through a file copying function provided by DataStore in the ESxi, and then re-registering the copied virtual machine into the ESxi to realize the creation of the virtual machine;
5. based on ssh (secure shell protocol) connection to the ESxi host, the virtual machine is copied to the target ESxi by means of scp remote virtual machine folder copy, and then the virtual machine is registered in the target ESxi to the list to realize the creation of the virtual machine.
In the implementation method, the deployment mode through ovf is fastest under the same virtual machine configuration (generally referred to as disk capacity). For example, the capacity of the virtual machine disk is 40G, and the capacity of the disk after the reduction and the standby is 10G is derived ovf. It takes about several minutes to import it into ESXi by way of ovf deployment. This is only the time of booting, and after booting, the virtual machine needs to be booted, and the whole booting process also needs 1 minute at least.
With the method for creating a virtual machine provided in the existing vSphere virtualization suite, the creation of a second-level virtual machine and the startup of the virtual machine into a system cannot be realized at all. Therefore, how to create the second-level virtual machine and start the system is a technical problem that needs to be solved urgently by those skilled in the art.
Disclosure of Invention
The application provides a virtual machine template creating method, a virtual machine entering device and a virtual machine entering storage medium, and aims to solve the problem that in the prior art, the virtual machine entering speed is low.
In a first aspect, an embodiment of the present application provides a method for creating a virtual machine template, including:
in an ESxi server, creating a first data storage area;
creating a first virtual machine, wherein disk data of the first virtual machine is stored in the first data storage area;
entering a first virtual machine system of the first virtual machine;
creating a memory snapshot for the first virtual machine system, and completing the creation of the virtual machine template; and the memory snapshot is used for realizing the second-level access to the virtual machine system.
Optionally, the creating, in the ESXi server, a first data storage area includes:
deploying a Ceph environment and creating a Ceph rbd block in the Ceph environment;
accessing the Ceph rbd block to the ESxi server to create a first data storage area at the ESxi server; wherein a storage capacity of the first data storage area is the same as a storage capacity of the Ceph rbd block.
Optionally, the deploying a Ceph environment includes:
initializing an ESxi server;
newly building a second virtual machine in the ESxi server;
installing a second virtual machine system on the second virtual machine;
and configuring a Ceph environment on the second virtual machine system.
Optionally, the configuring the Ceph environment includes:
deploying a Ceph rbd cluster; wherein the deployed Ceph rbd cluster is to create at least one of the Ceph rbd blocks;
deploying iSCSI Target service; wherein, the iSCSI Target service is used for accessing the Ceph rbd blocks in the Ceph rbd cluster into the ESxi server to complete the configuration of a Ceph environment.
Optionally, the deploying a Ceph rbd cluster includes:
installing a component package when the Ceph environment is deployed;
and deploying mon nodes, osd nodes and mgr nodes based on the component package to obtain the Ceph rbd cluster.
Optionally, the number of mon nodes is 1, the number of osd nodes is 1, and the number of mgr nodes is 1.
Optionally, the deploying the iSCSI Target service includes:
installing a tcmu-runner kit; wherein the tcmu-runner toolkit is used to support creation of the first data storage area;
installing a Ceph-iSCSI protocol package; wherein, the ceph-iSCSI protocol packet is used for providing an iSCSI protocol;
configuring and starting an iSCSI gateway; wherein, the iSCSI gateway is used for the Ceph rbd block to access the ESxi server based on iSCSI protocol;
configuring iSCSI Target service; wherein the iSCSI Target service is used to provide storage resources.
Optionally, the configuring the iSCSI Target service includes:
under a Ceph environment, a first service end is established; the first server is used for accessing an ESxi server;
and creating a first client, and setting a user name and a password of the first client, wherein the first client is used for authentication based on the user name and the password when the ESxi server is accessed.
Optionally, the accessing the Ceph rbd block to the ESXi server includes:
adding an iSCSI storage adapter in the Ceph environment;
configuring the name of the iSCSI storage adapter as the name of the first client as a second client;
acquiring address information of the first service end to enable the second client to access the ESxi server;
configuring a user name and a password of the second client;
dynamically discovering the Ceph rbd block after passing the authentication based on the user name and password of the second client, and creating a first data storage area in the ESxi server based on the Ceph rbd block.
Optionally, the configuring the username and the password of the second client includes:
and configuring the user name and the password of the second client according to the user name and the password of the first client.
Optionally, the dynamically discovering the Ceph rbd block, and creating a first data storage area in the ESXi server based on the Ceph rbd block includes:
dynamically discovering the Ceph rbd blocks;
and adding the Ceph rbd block as a storage with the type of a disk or a LUN into the ESxi server, and formatting to obtain the first data storage area.
Optionally, the first virtual machine system entering the first virtual machine includes:
and installing a virtual machine enhancement tool on the first virtual machine, acquiring a starting-up instruction, and entering the first virtual machine system based on the starting-up instruction.
Optionally, the disk capacity of the first virtual machine is the same as the storage capacity of the Ceph rbd block.
In a second aspect, an embodiment of the present application provides a virtual machine entry method, including:
obtaining a Ceph rbd block where a pre-created virtual machine template is located; the method comprises the steps that a memory snapshot is created in advance in a virtual machine template, and the memory snapshot is created in the starting state of the virtual machine template;
performing link cloning on the Ceph rbd block to generate a new Ceph rbd block;
accessing the new Ceph rbd block to an ESxi server to create a second data storage area at the ESxi server;
acquiring a virtual machine registration file corresponding to the virtual machine template in the second data storage area;
registering the virtual machine registration file with the ESxi server to create a target virtual machine;
and executing snapshot recovery operation on the target virtual machine, and entering the target virtual machine system.
Optionally, the performing linked cloning on the Ceph rbd block to generate a new Ceph rbd block includes:
creating a snapshot for the Ceph rbd block to obtain a Ceph rbd block snapshot;
performing protection on the Ceph rbd block snapshot;
performing link cloning based on the protected Ceph rbd block snapshot to generate the new Ceph rbd block.
In a third aspect, an embodiment of the present application provides an apparatus for creating a virtual machine template, including:
the first creating module is used for creating a first data storage area in the ESxi server;
the second creating module is used for creating a first virtual machine, wherein the disk data of the first virtual machine is stored in the first data storage area;
the first entering module is used for entering a first virtual machine system of the first virtual machine;
a third creating module, configured to create a memory snapshot for the first virtual machine system, and complete creation of the virtual machine template; and the memory snapshot is used for realizing the second-level access to the virtual machine system.
In a fourth aspect, an embodiment of the present application provides an entry apparatus for a virtual machine, including:
the first acquisition module is used for acquiring a Ceph rbd block where a pre-created virtual machine template is located; the virtual machine template is created with a memory snapshot in advance;
the generating module is used for performing linked cloning on the Ceph rbd block to generate a new Ceph rbd block;
the fourth creating module is used for accessing the new Ceph rbd block to an ESxi server so as to create a second data storage area in the ESxi server;
a second obtaining module, configured to obtain, in the second data storage area, a virtual machine registration file corresponding to the virtual machine template;
the registration module is used for registering the virtual machine registration file to the ESxi server so as to create a target virtual machine;
and the second entering module is used for executing snapshot recovery operation on the target virtual machine and entering the target virtual machine system.
In a fifth aspect, an embodiment of the present application provides an electronic device, including: the system comprises a processor, a memory and a communication bus, wherein the processor and the memory are communicated with each other through the communication bus;
the memory for storing a computer program;
the processor is configured to execute the program stored in the memory, and implement the method for creating the virtual machine template according to the first aspect or the method for entering the virtual machine according to the second aspect.
In a sixth aspect, an embodiment of the present application provides a computer-readable storage medium, which stores a computer program, and the computer program, when executed by a processor, implements the method for creating a virtual machine template according to the first aspect or the method for entering a virtual machine according to the second aspect.
Compared with the prior art, the technical scheme provided by the embodiment of the application has the following advantages: in the embodiment of the application, after a first virtual machine is created in an ESXi server, the first virtual machine system of the first virtual machine is entered, a memory snapshot is created for the first virtual machine system, and a virtual machine template is obtained, wherein the memory snapshot is used for realizing second-level entry into the virtual machine system, the memory snapshot is created in a state that the virtual machine is started, and the state of the virtual machine template during starting is saved in the memory snapshot, so that the subsequent second-level entry into a target virtual machine system based on snapshot recovery operation becomes possible.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the invention and together with the description, serve to explain the principles of the invention.
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, and it is obvious for those skilled in the art that other drawings can be obtained according to the drawings without inventive exercise.
Fig. 1 is a schematic flowchart of a method for creating a virtual machine template according to an embodiment of the present disclosure;
fig. 2 is a schematic flowchart of an entry method of a virtual machine according to an embodiment of the present disclosure;
fig. 3 is a schematic overall flowchart of creating a virtual machine and entering the virtual machine according to an embodiment of the present application;
fig. 4 is a schematic structural diagram of a virtual machine template creation apparatus according to an embodiment of the present disclosure;
fig. 5 is a schematic structural diagram of an access apparatus of a virtual machine according to an embodiment of the present disclosure;
fig. 6 is a schematic structural diagram of an electronic device according to an embodiment of the present application.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are some embodiments of the present application, but not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
First, before describing the technical solution provided by the present application in detail, the reason for pursuing the creation of a second-class virtual machine or the creation of a virtual machine as fast as possible will be described. For example: if a company develops a product that involves underlying virtualization, such as: the experimental training environment of network training and the scene topology environment of network safety attack and defense training are naturally that the faster the user clicks to enter the experiment, the better the user experience. Therefore, it is necessary to create and enter the second-level virtual machine into the system.
In order to implement second-level virtual machine creation and entry into a system, as shown in fig. 1, an embodiment of the present application provides a virtual machine template creation method, including the following steps:
step 101, in an ESxi server, creating a first data storage area;
wherein, the ESxi server is a core component in the vSphere virtualization suite. The created first data storage area is used for storing disk data of the first virtual machine.
In a specific implementation, creating the first data storage area may be implemented by: deploying a Ceph environment and creating a Ceph rbd block in the Ceph environment; accessing a Ceph rbd block to an ESxi server to create a first data storage area in the ESxi server; wherein the storage capacity of the first data storage area is the same as the storage capacity of the Ceph rbd block.
The Ceph is a very popular open source distributed storage system at present, has the advantages of high expansibility, high performance, high reliability and the like, and provides a block storage service (rbd), an object storage service (rgw) and a file system storage service (cephfs), wherein the Ceph fully utilizes the computing power of storage nodes during storage, and obtains the position of each data through computation during storage, so that the distribution is balanced as much as possible. When creating a Ceph rb block in a Ceph environment, at least one Ceph rb block may be created as needed.
Step 102, creating a first virtual machine, wherein disk data of the first virtual machine is stored in a first data storage area;
specifically, a Windows virtual machine is created by importing or creating a new virtual machine function provided in ESXi, where the disk capacity is 40G, and in addition, during the specific implementation, the storage capacity of the first data storage area created in step 101 may be the same as the disk capacity of the Windows virtual machine, that is, 40G. When creating the first virtual machine selection data storage, the first data storage area created in step 101 needs to be selected as a storage location of the disk data of the first virtual machine.
Step 103, entering a first virtual machine system of a first virtual machine;
specifically, after the Windows virtual machine is created, a VMtools enhancement tool is installed, then a boot instruction is obtained, and the Windows system is accessed based on the boot instruction. The VMtools are mainly used for display optimization and adjustment of the virtual host, and in addition, the interaction between the virtual host and the physical machine can be facilitated, for example, a folder can be shared between the physical machine and the virtual machine, even files can be directly dragged and dropped from the physical host to the virtual host, seamless switching of a mouse, adjustment of display resolution and the like, so that the VMtools are very practical.
104, creating a memory snapshot for the first virtual machine system to complete the creation of a virtual machine template; the memory snapshot is used for realizing second-level access to the virtual machine system.
Wherein step 104 is the key to implementing second level entry into the virtual machine system. In specific implementation, virtual machine templates of different systems can be created as required, for example: a virtual machine template of a Windows 7 system, a virtual machine template of a Windows 10 system, etc. Generally, a template is manufactured once for one system version. For example, win7 template, win8 template, win10 template. Later when it is desired to create a win7 virtual machine, it may be created directly through the win7 template.
In the embodiment of the application, after a first virtual machine is created in an ESXi server, the first virtual machine system of the first virtual machine is entered, a memory snapshot is created for the first virtual machine system, and a virtual machine template is obtained, wherein the memory snapshot is used for achieving second-level entry into the virtual machine system, so that the snapshot is restored for a created target virtual machine subsequently, and second-level entry into the target virtual machine system becomes possible.
As shown in fig. 2, an embodiment of the present application provides a virtual machine entry method, which includes the following steps:
step 201, obtaining a Ceph rbd block where a pre-created virtual machine template is located; the virtual machine template is created with a memory snapshot in advance; and the memory snapshot is created in the startup state of the virtual machine template;
step 202, performing link cloning on the Ceph rbd block to generate a new Ceph rbd block;
in specific implementation, a new Ceph rbd block is created based on a COW (copy-on-write) technology, and the method specifically comprises the following steps: creating a snapshot for the Ceph rbd block to obtain a Ceph rbd block snapshot; performing protection on the Ceph rbd block snapshot; and performing link cloning based on the protected Ceph rbd block snapshot to generate a new Ceph rbd block. The new Ceph rbd block generated by the Link clone is then mapped out by the Ceph iSCSI Target cli command. The purpose of the mapping is to allow the ESxi to interact with the Ceph iSCSI Target through the iSCSI protocol, and further allow the ESxi to access and use a new Ceph rbd block.
Step 203, accessing the new Ceph rbd block to an ESxi server to create a second data storage area in the ESxi server;
and (3) accessing the new Ceph rbd block to an ESxi server through an iSCSI protocol, and after the access is successful, adding a new storage area, namely a second data storage area, in the ESxi again.
Step 204, acquiring a virtual machine registration file corresponding to the virtual machine template in a second data storage area;
and entering a newly added second data storage area, and registering the virtual machine registration file (vmx file of the virtual machine) corresponding to the virtual machine template to the ESxi server, wherein a new virtual machine is successfully created.
Step 205, registering the virtual machine registration file to an ESxi server to create a target virtual machine;
and step 206, executing snapshot recovery operation on the target virtual machine, and entering the target virtual machine system.
Because the memory snapshot is created for the virtual machine system when the virtual machine template is created, after the target virtual machine is created by using the virtual machine template, the snapshot operation is executed for the created target virtual machine, and the target virtual machine system can be accessed in a second level.
In the embodiment of the application, a virtual machine template with a memory snapshot created in advance is adopted, the memory snapshot is created in the starting state of the virtual machine, the starting state of the virtual machine template is stored in the memory snapshot, and the snapshot recovery operation is used for recovering the virtual machine to the starting state of the virtual machine stored in the snapshot, so that the second-level virtual machine creation and system entry are realized.
During specific implementation, the second-level vSphere virtual machine creation and system entry functions are finally achieved through combination of multiple technologies such as ESxi, Ceph rbd, Ceph iSCSI, ESxi iSCSI access, virtual machine memory snapshot, Ceph SDK (distributed file system software installation package) and vSphere SDK programming.
In order to further explain the method for creating a virtual machine at the second level and booting the virtual machine to enter the system provided by the embodiment of the present application, the embodiment of the present application is further explained according to the following three parts.
A first part: the early preparation mainly comprises the environment deployment of a Ceph rbd cluster and a Ceph iSCSI service;
a second part: creating a virtual machine template of a second-level access system;
and a third part: the method comprises the steps that a virtual machine is created in a second level mode and enters a system based on a Ceph rbd and a virtual machine template entering the system in the second level mode;
the first two parts only need to be prepared once, and the second part can be directly realized through the third part when a virtual machine needs to be created in a second level and enters the system.
For convenience of understanding, referring to fig. 3, fig. 3 shows an overall flowchart of creating a virtual machine and entering the virtual machine, taking a single ESXi server, 4T capacity data storage as an example, and the specific implementation steps are as follows:
a first part: the early preparation mainly comprises the following steps of environment deployment of a Ceph rbd cluster and a Ceph iSCSI service:
1.1, initializing an ESxi server: and emptying the ESxi server to ensure that the data storage is empty and no other data occupies the space of the data storage.
1.2, in the ESxi server, newly building a second virtual machine: specifically, a virtual machine of Centos7.x is created through the newly-built virtual machine function provided by ESxi, and the disk capacity of the virtual machine is configured to be 4T, so that the disk capacity of the virtual machine occupies the space of the whole data storage (usually only 3.9T).
1.3, installing a second virtual machine system on the second virtual machine: the disk partitions are divided such that the system disk occupies 100G (/ dev/sda1), and the remainder are all divided into a separate partition for the data storage disk of Ceph (/ dev/sda 2).
1.4, configuring a Ceph environment on the second virtual machine system:
1.4.1, deploying a Ceph rbd cluster; wherein deploying the Ceph rbd cluster is used to create at least one Ceph rbd block; specifically, a Ceph-deployment automation deployment tool is used for deploying a Ceph rbd cluster with the number of nodes being 1 mon node, 1 mgr node and 1 osd node, wherein the rbd cluster is used for providing disk storage services for virtual machines created at the next second level.
1.4.1.1 installation of ceph related component packages: the package of components is installed by yum, where yum is a package manager under centos, and the ceph-deployment package of components is installed by yum.
1.4.1.2 deploy mon, mgr and osd nodes.
The mon node is a manager of the cluster state, and maintains the state of the whole cluster. The primary function of the mgr node is to expose some of the indices of the cluster to outside use. osd is an object storage resource in Ceph.
1.4.2, deploying an iSCSI Target service, wherein the iSCSI Target service is used for accessing the Ceph rbd blocks in the Ceph rbd cluster into an ESxi server.
Specifically, the iSCSI Target service is deployed to map the Ceph rbd block out using the standard iSCSI protocol, so that ESXi can access the mapped Ceph rbd block through the iSCSI protocol, and the specific deployment mode is as follows:
1.4.2.1 install tcmu-runner kit;
the tcmu-runner toolkit is used for transferring kernel read-write operations to a user mode layer based on kernel-user mode communication, and the tcmu-runner supports a plurality of plug-ins including ceph rbd.
1.4.2.2 installing a Ceph-iSCSI protocol package;
wherein the Ceph-iSCSI protocol package provides iSCSI protocol.
Also for 1.4.2.1 and 1.4.2.2, yum means.
1.4.2.3 configuring and initiating an iSCSI gateway; the iSCSI gateway is used for enabling a Ceph rbd block to access to an ESxi server based on an iSCSI protocol;
1.4.2.4 configuring iSCSI Target service; the iSCSI Target service is used for providing storage resources, and specifically includes:
creating a first service end;
creating a first client, and setting a user name and a password of the first client for verification during ESxi access; and the user name and the password of the first client are used for configuring the iSCSI storage adapter in the second part.
Thus, the preliminary preparation work is completed.
And a second part, creating a virtual machine template with a second level entering the virtual machine system:
2.1, in a Ceph environment, creating a Ceph rbd block and mapping the block out through a Ceph iSCSI Target service (taking a windows virtual machine template with the disk capacity of 40G as an example).
Specifically, a Ceph rbd block is created through a Ceph iSCSI cli command line, and the created rbd block is mapped out.
2.2, accessing the 40G Ceph rbd block created in the last step in the ESxi through an iSCSI protocol, wherein after the access is successful, the ESxi shows that one more data storage with the capacity of 40G is added in the data storage of the ESxi.
2.2.1 adding iSCSI storage adapter;
2.2.2 configuring an iSCSI storage adapter;
selecting a newly added iSCSI adapter, and then clicking the lower right corner attribute; configuring the name of an iSCSI client in a conventional configuration, and configuring the name of the iSCSI client as the name of a first client in a first part as a second client;
2.2.3 configuring iSCSI Target information;
the iSCSI Target may be understood as a server, a second server is added in the dynamic discovery, and the address information of the second server is configured to be the same as that of the first server, because the address of the server needs to be known when communication is to be achieved;
and clicking the CHAP to configure the identity authentication information, configuring the CHAP authentication information, and using the user and the password set by the first client in the first part.
2.2.4 adding iSCSI data storage (first data storage area);
2.2.4.1 rescanning the storage area entirely to find a mapped Ceph rbd block;
2.2.4.2 adding Ceph rbd block as disk or LUN type memory to ESxi server, and formatting to obtain first data storage region.
At this time, a first newly added data storage area can be seen in the data storage list of the ESxi, and the first data storage area is used for storing relevant data of the virtual machine template;
2.3 through the function of the newly-built virtual machine provided by the import or ESxi, a Windows virtual machine is created, the disk capacity is 40G, it is noted that when selecting the data storage, the newly-added data storage (the first data storage area) in the previous step needs to be selected, so as to finally realize the storage of the disk data of the virtual machine in the Ceph rbd block.
2.4. After the Windows virtual machine is successfully established, a VMtools enhancing tool is installed, and then the Windows virtual machine is started to enter a Windows system desktop;
2.5. after entering the system, the operation of creating the memory snapshot is executed on the Windows virtual machine system, which is a very critical step for realizing the second-level entry of the system.
And a third part: the method comprises the following steps that a virtual machine is created at a second level and enters a system based on a Ceph rbd block and a virtual machine template of the second-level entry system:
3.1, link cloning is executed on a Ceph rbd block where a second level enters a system virtual machine template through an rbd command, so that the second level creates a new Ceph rbd block based on a COW (copy-on-write) technology, and the method specifically comprises the following steps:
3.1.1 creating an rbd snapshot;
3.1.2 executing protection to the snapshot;
3.1.3 creating a clone of link (clone) based on the protected snapshot, at which time a new rbd block will be generated;
3.2, mapping out a new rbd block generated by the link clone through a Ceph iSCSI Target cli command line;
3.3, accessing the rbd block mapped in the previous step to ESxi through an iSCSI protocol, wherein the ESxi adds a new data storage area, namely a second data storage area;
3.4, into the newly added data store, it is registered into ESxi by the virtual machine' s. vmx file. At this time, a new virtual machine is successfully created, and a newly created target virtual machine is obtained.
And 3.5, executing snapshot recovery operation on the target virtual machine, and realizing second-level access to the target virtual machine system.
In addition, it should be noted that, in the process of creating the template virtual machine and entering the target virtual machine system, a problem occurs in any step, and if the execution is not successful, the creation fails, and the relevant resources are released, for example: deleting the rbd blocks created based on the linked clone; deleting the rbd block derived by the iSCSI protocol; delete the newly added second data storage area in ESXi, and so on, to recreate the target virtual machine after the resources are released.
The embodiment of the application describes the process of creating a virtual machine and entering a system based on the vSphere virtualization suite (ESXi) second level. Based on the method provided by the embodiment of the application, the creation starting time of the virtual machine can be greatly saved, and the user experience is improved.
Based on the same concept, an apparatus for creating a virtual machine template is provided in this embodiment of the present application, and specific implementation of the apparatus may refer to the description of the method embodiment, and repeated details are not described again, as shown in fig. 4, the apparatus mainly includes:
a first creating module 401, configured to create, in the ESXi server, a first data storage area;
a second creating module 402, configured to create a first virtual machine, where disk data of the first virtual machine is stored in a first data storage area;
a first entering module 403, configured to enter a first virtual machine system of a first virtual machine;
a third creating module 404, configured to create a memory snapshot for the first virtual machine system, and complete creation of the virtual machine template; the memory snapshot is used for realizing second-level access to the virtual machine system.
In a particular embodiment, a first creation module 401 is configured to deploy a Ceph environment and create a Ceph rbd block in the Ceph environment; accessing a Ceph rbd block to an ESxi server to create a first data storage area in the ESxi server; wherein the storage capacity of the first data storage area is the same as the storage capacity of the Ceph rbd block. Wherein the disk capacity of the first virtual machine is the same as the storage capacity of the Ceph rbd block.
In a specific embodiment, the first creating module 401 is specifically configured to initialize an ESXi server; establishing a second virtual machine in the ESxi server; installing a second virtual machine system on the second virtual machine; on the second virtual machine system, a Ceph environment is configured.
In a specific embodiment, the first creating module 401 is specifically configured to deploy a Ceph rbd cluster; wherein deploying the Ceph rbd cluster is used to create at least one Ceph rbd block; deploying iSCSI Target service; the iSCSI Target service is used for accessing the Ceph rbd blocks in the Ceph rbd cluster into the ESxi server to complete the configuration of the Ceph environment.
In a specific embodiment, the first creating module 401 is specifically configured to install a component package when the Ceph environment is deployed; deploying mon nodes, osd nodes and mgr nodes based on the component package to obtain a Ceph rbd cluster; wherein, the number of mon nodes is 1, the number of osd nodes is 1, and the number of mgr nodes is 1.
In a particular embodiment, the first creation module 401 is specifically configured to install a tcmu-runner toolkit; wherein the tcmu-runner toolkit is used to support creation of the first data storage area; installing a Ceph-iSCSI protocol package; wherein, the ceph-iSCSI protocol packet is used for providing an iSCSI protocol; configuring and starting an iSCSI gateway; the iSCSI gateway is used for enabling a Ceph rbd block to access to an ESxi server based on an iSCSI protocol; configuring iSCSI Target service; wherein the iSCSI Target service is used to provide storage resources.
In a specific embodiment, the first creating module 401 is specifically configured to create a first service end in a Ceph environment; the first server is used for accessing the ESxi server; and creating a first client, and setting a user name and a password of the first client, wherein the first client is used for authentication based on the user name and the password when the ESxi server is accessed.
In a specific embodiment, the first creating module 401 is specifically configured to add an iSCSI storage adapter in a Ceph environment; configuring the name of the iSCSI storage adapter as the name of the first client as a second client; acquiring address information of a first service end to enable a second client to access an ESxi server; configuring a user name and a password of a second client; and after the authentication based on the user name and the password of the second client passes, dynamically discovering a Ceph rbd block, and creating a first data storage area in the ESxi server based on the Ceph rbd block. And configuring the user name and the password of the second client according to the user name and the password of the first client.
In a particular embodiment, the first creation module 401 is specifically configured to dynamically discover a Ceph rbd block; and adding the Ceph rbd block as a storage with the type of a disk or a LUN into an ESxi server, and formatting to obtain a first data storage area.
In an embodiment, the first entering module 403 is configured to install a virtual machine enhancement tool on the first virtual machine, obtain a boot instruction, and enter the first virtual machine system based on the boot instruction.
Based on the same concept, an access apparatus for a virtual machine is provided in the embodiments of the present application, and specific implementation of the apparatus may refer to the description of the method embodiment, and repeated details are not repeated, as shown in fig. 5, the apparatus mainly includes:
a first obtaining module 501, configured to obtain a Ceph rbd block where a pre-created virtual machine template is located; the virtual machine template is created with a memory snapshot in advance;
a generating module 502, configured to perform link cloning on the Ceph rbd block to generate a new Ceph rbd block;
a fourth creating module 503, configured to access the new Ceph rbd block to the ESXi server, so as to create a second data storage area in the ESXi server;
a second obtaining module 504, configured to obtain, in a second data storage area, a virtual machine registration file corresponding to the virtual machine template;
a registration module 505, configured to register the virtual machine registration file with the ESXi server to create a target virtual machine;
and a second entering module 506, configured to perform snapshot recovery operation on the target virtual machine, and enter the target virtual machine system.
In a specific embodiment, the generating module 502 is configured to create a snapshot for a Ceph rbd block, so as to obtain a snapshot of the Ceph rbd block; performing protection on the Ceph rbd block snapshot; and performing link cloning based on the protected Ceph rbd block snapshot to generate a new Ceph rbd block.
Based on the same concept, an embodiment of the present application further provides an electronic device, as shown in fig. 6, the electronic device mainly includes: a processor 601, a memory 602, and a communication bus 603, wherein the processor 601 and the memory 602 communicate with each other via the communication bus 603. The memory 602 stores a program executable by the processor 601, and the processor 601 executes the program stored in the memory 602 to implement the following steps:
in an ESxi server, creating a first data storage area;
creating a first virtual machine, wherein the disk data of the first virtual machine is stored in a first data storage area;
entering a first virtual machine system of a first virtual machine;
creating a memory snapshot for a first virtual machine system, and completing the creation of a virtual machine template; the memory snapshot is used for realizing second-level access to the virtual machine system.
Alternatively, the first and second electrodes may be,
obtaining a Ceph rbd block where a pre-created virtual machine template is located; the method comprises the steps that a memory snapshot is created in advance in a virtual machine template, and the memory snapshot is created in the starting state of the virtual machine template;
performing link cloning on the Ceph rbd block to generate a new Ceph rbd block;
the new Ceph rbd block is accessed to an ESxi server so as to create a second data storage area in the ESxi server;
acquiring a virtual machine registration file corresponding to the virtual machine template in a second data storage area;
registering the virtual machine registration file to an ESxi server to create a target virtual machine;
and executing snapshot recovery operation on the target virtual machine, and entering a target virtual machine system.
The communication bus 603 mentioned in the above electronic device may be a Peripheral Component Interconnect (PCI) bus, an Extended Industry Standard Architecture (EISA) bus, or the like. The communication bus 603 may be divided into an address bus, a data bus, a control bus, etc. For ease of illustration, only one thick line is shown in FIG. 6, but this is not intended to represent only one bus or type of bus.
The Memory 602 may include a Random Access Memory (RAM) or a non-volatile Memory (non-volatile Memory), such as at least one disk Memory. Alternatively, the memory may be at least one storage device located remotely from the processor 601.
The Processor 601 may be a general-purpose Processor, including a Central Processing Unit (CPU), a Network Processor (NP), and the like, and may also be a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), a Field Programmable Gate Array (FPGA) or other Programmable logic devices, discrete gates or transistor logic devices, and discrete hardware components.
In yet another embodiment of the present application, there is also provided a computer-readable storage medium having stored therein a computer program, which, when run on a computer, causes the computer to execute a method of creating a virtual machine template or a method of entering a virtual machine described in the above embodiments.
In the above embodiments, the implementation may be wholly or partially realized by software, hardware, firmware, or any combination thereof. When implemented in software, may be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer instructions. When loaded and executed on a computer, cause the processes or functions described in accordance with the embodiments of the application to occur, in whole or in part. The computer may be a general purpose computer, a special purpose computer, a network of computers, or other programmable device. The computer instructions may be stored on a computer readable storage medium or transmitted from one computer readable storage medium to another, for example, from one website site, computer, server, or data center to another website site, computer, server, or data center via wire (e.g., coaxial cable, fiber optic, Digital Subscriber Line (DSL)) or wirelessly (e.g., infrared, microwave, etc.). The computer-readable storage medium can be any available medium that can be accessed by a computer or a data storage device, such as a server, a data center, etc., that includes one or more of the available media. The available media may be magnetic media (e.g., floppy disks, hard disks, tapes, etc.), optical media (e.g., DVDs), or semiconductor media (e.g., solid state drives), among others.
It is noted that, in this document, relational terms such as "first" and "second," and the like, may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.
The foregoing are merely exemplary embodiments of the present invention, which enable those skilled in the art to understand or practice the present invention. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the invention. Thus, the present invention is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.

Claims (4)

1. A method for accessing a virtual machine, comprising:
in an ESxi server, creating a first data storage area;
creating a first virtual machine, wherein disk data of the first virtual machine is stored in the first data storage area;
entering a first virtual machine system of the first virtual machine;
creating a memory snapshot for the first virtual machine system, and completing the creation of a virtual machine template; the memory snapshot is used for realizing second-level access to the virtual machine system;
obtaining a Ceph rbd block where the virtual machine template is located; the method comprises the steps that a memory snapshot is created in advance in a virtual machine template, and the memory snapshot is created in the starting state of the virtual machine template;
performing link cloning on the Ceph rbd block to generate a new Ceph rbd block;
accessing the new Ceph rbd block to an ESxi server to create a second data storage area at the ESxi server;
acquiring a virtual machine registration file corresponding to the virtual machine template in the second data storage area;
registering the virtual machine registration file with the ESxi server to create a target virtual machine;
executing snapshot recovery operation on the target virtual machine, and entering a target virtual machine system;
wherein, in the ESXi server, creating a first data storage area includes:
deploying a Ceph environment and creating a Ceph rbd block in the Ceph environment;
accessing the Ceph rbd block to the ESxi server to create a first data storage area at the ESxi server; wherein a storage capacity of the first data storage area is the same as a storage capacity of the Ceph rbd block;
wherein the deploying a Ceph environment comprises:
initializing an ESxi server;
newly building a second virtual machine in the ESxi server;
installing a second virtual machine system on the second virtual machine;
configuring a Ceph environment on the second virtual machine system;
wherein the configuring of the Ceph environment comprises:
deploying a Ceph rbd cluster; wherein the deployed Ceph rbd cluster is to create at least one of the Ceph rbd blocks;
deploying iSCSI Target service; the iSCSI Target service is used for accessing the Ceph rbd blocks in the Ceph rbd cluster into the ESxi server to complete the configuration of a Ceph environment;
wherein the deploying the iSCSI Target service comprises:
installing a tcmu-runner kit; wherein the tcmu-runner toolkit is used to support creation of the first data storage area;
installing a Ceph-iSCSI protocol package; wherein, the Ceph-iSCSI protocol packet is used for providing iSCSI protocol;
configuring and starting an iSCSI gateway; wherein, the iSCSI gateway is used for the Ceph rbd block to access the ESxi server based on iSCSI protocol;
configuring iSCSI Target service; wherein the iSCSI Target service is used to provide storage resources.
2. An entry device for a virtual machine, comprising:
the first creating module is used for creating a first data storage area in the ESxi server;
the second creating module is used for creating a first virtual machine, wherein the disk data of the first virtual machine is stored in the first data storage area;
the first entering module is used for entering a first virtual machine system of the first virtual machine;
the third creating module is used for creating a memory snapshot for the first virtual machine system and completing the creation of a virtual machine template; the memory snapshot is used for realizing second-level access to the virtual machine system;
the first acquisition module is used for acquiring a Ceph rbd block where the virtual machine template is located; the virtual machine template is created with a memory snapshot in advance; and the memory snapshot is created in the starting state of the virtual machine template;
the generating module is used for performing linked cloning on the Ceph rbd block to generate a new Ceph rbd block;
the fourth creating module is used for accessing the new Ceph rbd block to an ESxi server so as to create a second data storage area in the ESxi server;
a second obtaining module, configured to obtain, in the second data storage area, a virtual machine registration file corresponding to the virtual machine template;
the registration module is used for registering the virtual machine registration file to the ESxi server so as to create a target virtual machine;
the second entering module is used for executing snapshot recovery operation on the target virtual machine and entering the target virtual machine system;
wherein, in the ESXi server, creating a first data storage area includes:
deploying a Ceph environment and creating a Ceph rbd block in the Ceph environment;
accessing the Ceph rbd block to the ESxi server to create a first data storage area at the ESxi server; wherein a storage capacity of the first data storage area is the same as a storage capacity of the Ceph rbd block;
wherein the deploying a Ceph environment comprises:
initializing an ESxi server;
newly building a second virtual machine in the ESxi server;
installing a second virtual machine system on the second virtual machine;
configuring a Ceph environment on the second virtual machine system;
wherein the configuring of the Ceph environment comprises:
deploying a Ceph rbd cluster; wherein the deployed Ceph rbd cluster is to create at least one of the Ceph rbd blocks;
deploying iSCSI Target service; the iSCSI Target service is used for accessing the Ceph rbd blocks in the Ceph rbd cluster into the ESxi server to complete the configuration of a Ceph environment;
wherein the deploying the iSCSI Target service comprises:
installing a tcmu-runner kit; wherein the tcmu-runner toolkit is used to support creation of the first data storage area;
installing a Ceph-iSCSI protocol package; wherein, the Ceph-iSCSI protocol packet is used for providing iSCSI protocol;
configuring and starting an iSCSI gateway; wherein, the iSCSI gateway is used for the Ceph rbd block to access the ESxi server based on iSCSI protocol;
configuring iSCSI Target service; wherein the iSCSI Target service is used to provide storage resources.
3. An electronic device, comprising: the system comprises a processor, a memory and a communication bus, wherein the processor and the memory are communicated with each other through the communication bus;
the memory for storing a computer program;
the processor is configured to execute the program stored in the memory to implement the virtual machine entry method according to claim 1.
4. A computer-readable storage medium storing a computer program, wherein the computer program, when executed by a processor, implements the entry method for a virtual machine according to claim 1.
CN202111483254.XA 2021-12-07 2021-12-07 Virtual machine template creation method, virtual machine access method, virtual machine template creation device and storage medium Active CN113886027B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111483254.XA CN113886027B (en) 2021-12-07 2021-12-07 Virtual machine template creation method, virtual machine access method, virtual machine template creation device and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111483254.XA CN113886027B (en) 2021-12-07 2021-12-07 Virtual machine template creation method, virtual machine access method, virtual machine template creation device and storage medium

Publications (2)

Publication Number Publication Date
CN113886027A CN113886027A (en) 2022-01-04
CN113886027B true CN113886027B (en) 2022-03-08

Family

ID=79015779

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111483254.XA Active CN113886027B (en) 2021-12-07 2021-12-07 Virtual machine template creation method, virtual machine access method, virtual machine template creation device and storage medium

Country Status (1)

Country Link
CN (1) CN113886027B (en)

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107220002A (en) * 2017-05-26 2017-09-29 郑州云海信息技术有限公司 A kind of storage method and device for supporting memory image data de-duplication

Family Cites Families (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102096596B (en) * 2010-11-29 2013-11-06 华中科技大学 Cloud computing service Cache system based on internal memory template of virtual machine
US9588793B2 (en) * 2013-12-20 2017-03-07 Red Hat Israel, Ltd. Creating new virtual machines based on post-boot virtual machine snapshots
CN105335253B (en) * 2015-10-28 2019-01-15 北京百度网讯科技有限公司 The method and apparatus for creating virtual machine system disk snapshot
CN106775957A (en) * 2017-01-20 2017-05-31 郑州云海信息技术有限公司 A kind of virtual machine snapshot implementation method
CN109376036A (en) * 2018-11-01 2019-02-22 郑州云海信息技术有限公司 A kind of method and apparatus for backup virtual machine
CN109634713B (en) * 2018-11-02 2020-12-08 新华三云计算技术有限公司 Virtual machine starting method and device
CN110196755B (en) * 2019-05-07 2024-03-15 腾讯科技(深圳)有限公司 Virtual machine snapshot management method and device, server and storage medium
CN110704161B (en) * 2019-09-27 2022-05-31 联想(北京)有限公司 Virtual machine creation method and device and computer equipment
CN113014653B (en) * 2021-03-04 2022-09-23 华东理工大学 Online education cloud platform serving distributed experimental teaching environment
CN112988468A (en) * 2021-04-27 2021-06-18 云宏信息科技股份有限公司 Method for virtualizing operating system using Ceph and computer-readable storage medium

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107220002A (en) * 2017-05-26 2017-09-29 郑州云海信息技术有限公司 A kind of storage method and device for supporting memory image data de-duplication

Also Published As

Publication number Publication date
CN113886027A (en) 2022-01-04

Similar Documents

Publication Publication Date Title
US10095496B2 (en) Single, logical, multi-tier application blueprint used for deployment and management of multiple physical applications in a cloud infrastructure
US9710259B2 (en) System and method for customizing a deployment plan for a multi-tier application in a cloud infrastructure
EP3271819B1 (en) Executing commands within virtual machine instances
US11941452B2 (en) System to generate a deployment plan for a cloud infrastructure according to logical, multi-tier application blueprint
US20130232497A1 (en) Execution of a distributed deployment plan for a multi-tier application in a cloud infrastructure
WO2019076369A1 (en) Cloud platform deployment method, device, electronic device, and readable storage medium
JP6388455B2 (en) Expansion of services to virtual data center guests
US9542174B2 (en) Deployment of software images with distinct configuration logic
Toraldo Opennebula 3 cloud computing
KR20170022028A (en) Method and apparatus for security checking of image for container
JP2016515267A5 (en)
EP3149603B1 (en) Customized configuration of cloud-based applications prior to deployment
US20230025529A1 (en) Apparatus and method for managing a distributed system with container image manifest content
EP2972856B1 (en) System and method for generic product wiring in a virtual assembly builder environment
US11113186B1 (en) Testing and publishing of resource handlers in a cloud environment
CN113626133A (en) Virtual machine control method, device, equipment and computer readable storage medium
US11243793B2 (en) Virtual machine management
US11799743B2 (en) Node addition in cloud networks
CN113886027B (en) Virtual machine template creation method, virtual machine access method, virtual machine template creation device and storage medium
US10635467B1 (en) Deployable console-based virtual application deployment and configuration systems and methods
US11449388B1 (en) Synthesized network block devices for recovery of image backups
CN116069584A (en) Extending monitoring services into trusted cloud operator domains
Nguyen et al. A novel approach for developing interoperable services in cloud environment
US11647105B1 (en) Generating multi-layer configuration templates for deployment across multiple infrastructure stack layers
US20230325203A1 (en) Provisioning dpu management operating systems using host and dpu boot coordination

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CP02 Change in the address of a patent holder
CP02 Change in the address of a patent holder

Address after: 510655 room 213, No. 2, xincen Fourth Road, Tianhe District, Guangzhou City, Guangdong Province

Patentee after: Guangzhou Jinhe Technology Co.,Ltd.

Address before: 510655 room 213, No. 2, xincen Fourth Road, Tianhe District, Shenzhen, Guangdong Province

Patentee before: Guangzhou Jinhe Technology Co.,Ltd.