WO2019237576A1 - Procédé et appareil de vérifications de performances de communication d'une machine virtuelle - Google Patents

Procédé et appareil de vérifications de performances de communication d'une machine virtuelle Download PDF

Info

Publication number
WO2019237576A1
WO2019237576A1 PCT/CN2018/108290 CN2018108290W WO2019237576A1 WO 2019237576 A1 WO2019237576 A1 WO 2019237576A1 CN 2018108290 W CN2018108290 W CN 2018108290W WO 2019237576 A1 WO2019237576 A1 WO 2019237576A1
Authority
WO
WIPO (PCT)
Prior art keywords
virtual machine
communication service
communication
proxy server
registration
Prior art date
Application number
PCT/CN2018/108290
Other languages
English (en)
Chinese (zh)
Inventor
陈聪
陈泽冰
Original Assignee
平安科技(深圳)有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 平安科技(深圳)有限公司 filed Critical 平安科技(深圳)有限公司
Publication of WO2019237576A1 publication Critical patent/WO2019237576A1/fr

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/08Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
    • H04L43/0805Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters by checking availability
    • H04L43/0817Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters by checking availability by checking functioning
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0803Configuration setting
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities

Definitions

  • the present application relates to the field of computer technology, and in particular, to a method and device for verifying communication performance of a virtual machine.
  • the verification process includes: the tester manually enters the login account and password of the virtual machine, logs in to the virtual machine on which the communication service is deployed, and then starts the communication service deployed on the virtual machine to start the communication performance verification of the virtual machine.
  • the inventors realized that the above verification process mainly depends on manual implementation. Once the number of virtual machines to be verified is large, it is not only easy to make mistakes, the verification efficiency is low, but also requires high professional skills of testers, resulting in Inspection costs remain high.
  • an object of the present application is to provide a method and device for verifying communication performance of a virtual machine.
  • a method for verifying communication performance of a virtual machine includes: a proxy server deploying a communication service script for a virtual machine created in advance; registering a virtual machine in a proxy server where the communication service script is deployed; Machine completes registration and runs the communication service script to start the communication service configured for the virtual machine in the communication service script; and performs communication performance verification on the virtual machine through the started communication service.
  • an apparatus for verifying communication performance of a virtual machine includes a script deployment module for a proxy server to deploy a communication service script for a pre-created virtual machine, and a virtual machine registration module for deploying the communication service.
  • Virtual machine registration in a scripted proxy server includes a service startup module for waiting for the virtual machine to complete registration, and running the communication service script to start a communication service configured for the virtual machine in the communication service script; communication performance calibration An inspection module, configured to verify communication performance of the virtual machine through the started communication service.
  • a device for verifying the communication performance of a virtual machine includes a processor and a memory, and the memory stores computer-readable instructions. When the computer-readable instructions are executed by the processor, the above-mentioned implementation is implemented. Method for verifying the communication performance of a virtual machine.
  • a computer-readable storage medium has stored thereon a computer program that, when executed by a processor, implements the method for verifying communication performance of a virtual machine as described above.
  • the proxy server will deploy a communication service script for the virtual machine and register the virtual machine. After the virtual machine has completed registration, run the communication service script to start the communication service script configured for the virtual machine.
  • the communication service verifies the communication performance of the virtual machine through the started communication service. Therefore, the communication service script can automatically perform the communication performance verification on the virtual machine created in advance, thereby avoiding the manual implementation of the communication performance verification of the virtual machine.
  • the virtual machine registration enables secret-free communication between the virtual machine and the proxy server, avoiding manually entering the login account and login password of the virtual machine manually, which further improves the automation of virtual machine communication performance verification.
  • FIG. 1 is a schematic diagram of an implementation environment according to the present application.
  • Fig. 2 is a block diagram showing a hardware structure of a proxy server according to an exemplary embodiment.
  • Fig. 3 is a flow chart showing a method for verifying communication performance of a virtual machine according to an exemplary embodiment.
  • Fig. 4 is a flow chart showing another method for verifying communication performance of a virtual machine according to an exemplary embodiment.
  • Fig. 5 is a flow chart showing another method for verifying communication performance of a virtual machine according to an exemplary embodiment.
  • FIG. 6 is a flowchart of an embodiment of step 330 in the embodiment corresponding to FIG. 3.
  • FIG. 7 is a flowchart of an embodiment of step 370 in the embodiment corresponding to FIG. 3.
  • Fig. 8 is a flow chart showing another method for verifying communication performance of a virtual machine according to an exemplary embodiment.
  • Fig. 9 is a block diagram of a device for checking communication performance of a virtual machine according to an exemplary embodiment.
  • Fig. 10 is a block diagram of a hardware structure of an apparatus for verifying communication performance of a virtual machine according to an exemplary embodiment.
  • FIG. 1 is a schematic diagram of an implementation environment involved in a method for verifying communication performance of a virtual machine.
  • the implementation environment includes a virtual machine 110, a proxy server 130, and an automation platform 150.
  • the proxy server 130 and the automation platform 150 establish a communication connection through wired or wireless, so as to realize the interaction between the proxy server 130 and the automation platform 150.
  • the automation platform 150 uploads the communication service script to the proxy server 130.
  • the communication service script is deployed for the virtual machine 110 created in advance, and the communication performance verification of the virtual machine 110 is automatically completed based on the communication service script.
  • Fig. 2 is a block diagram showing a hardware structure of a proxy server according to an exemplary embodiment.
  • the proxy server is only an example adapted to the present application and cannot be considered to provide any limitation on the scope of use of the present application.
  • This proxy server also cannot be interpreted as needing to rely on or having to have one or more components in the exemplary proxy server 200 shown in FIG. 2.
  • the hardware structure of the proxy server 200 may vary greatly due to different configurations or performances.
  • the proxy server 200 includes: a power supply 210, an interface 230, at least one memory 250, and at least one central processing unit ( CPU, Central Processing Units) 270.
  • CPU Central Processing Unit
  • the power supply 210 is used to provide working voltages for each hardware device on the proxy server 200.
  • the interface 230 includes at least one wired or wireless network interface 231, at least one serial-to-parallel conversion interface 233, at least one input-output interface 235, and at least one USB interface 237, etc., for communicating with external devices.
  • the memory 250 serves as a carrier for resource storage, and may be a read-only memory, a random access memory, a magnetic disk, or an optical disk.
  • the resources stored on the memory 250 include an operating system 251, an application program 253, and data 255.
  • the storage method may be temporary storage or permanent storage.
  • the operating system 251 is used to manage and control various hardware devices and application programs 253 on the proxy server 200 to implement the calculation and processing of the massive data 255 by the central processing unit 270, which may be Windows ServerTM, Mac OS XTM, UnixTM, LinuxTM, FreeBSDTM, etc.
  • the application program 253 is a computer program that completes at least one specific task based on the operating system 251.
  • the application program 253 may include at least one module (not shown in FIG. 2), and each module may separately include a series of procedures for the proxy server 200.
  • the data 255 may be photos, pictures, and the like stored on the disk.
  • the central processing unit 270 may include one or more processors, and is configured to communicate with the memory 250 through a bus, for calculating and processing the massive data 255 in the memory 250.
  • the proxy server 200 applicable to the present application will complete the method for verifying the communication performance of the virtual machine by reading the series of computer-readable instructions stored in the memory 250 through the central processing unit 270.
  • the present application can also be implemented by a hardware circuit or a hardware circuit in combination with software. Therefore, the implementation of the present application is not limited to any specific hardware circuit, software, or a combination of the two.
  • a method for verifying communication performance of a virtual machine is applicable to a proxy server of the implementation environment shown in FIG. 1, and the structure of the proxy server may be shown in FIG. 2.
  • This method for checking the communication performance of a virtual machine may be executed by a proxy server, and may include the following steps:
  • Step 310 The proxy server deploys a communication service script for the virtual machine created in advance.
  • the communication service script is stored in the proxy server and is used to perform communication performance verification for the pre-created virtual machine.
  • the communication performance verification is to verify whether the data transmission between the pre-created virtual machine and the external device is normal.
  • the external device may be a proxy server or another virtual machine.
  • This supplementary explanation is that in this embodiment, if the external device is another virtual machine, the data transmitted by the virtual machine is forwarded to the other virtual machine through the proxy server, so that the proxy server can be based on the deployed communication service script And the communication performance verification of this virtual machine.
  • the data transmission between the virtual machine and the external device follows a communication protocol, and this communication protocol includes the http protocol (Hypertext Transfer Protocol, Hypertext Transfer Protocol), tcp protocol (Transmission Control Protocol, Transmission Control Protocol), and udp protocol (User Datagram Protocol (User Datagram Protocol) and so on.
  • http protocol Hypertext Transfer Protocol
  • tcp protocol Transmission Control Protocol
  • udp protocol User Datagram Protocol (User Datagram Protocol) and so on.
  • the type of data transmitted between the virtual machine and the external device is different, and the communication protocol followed is different.
  • the communication server script configures the corresponding communication service for the virtual machine according to the communication protocol followed by the virtual machine.
  • the communication protocol may be the http protocol, the tcp protocol, or the udp protocol.
  • the communication service configured by the communication server for the virtual machine may be the http service, the tcp service, or the udp service.
  • the communication service script is uploaded by the tester to the proxy server through an automation platform, thereby improving the automation of communication verification.
  • the automation platform may be a client running on a user device (such as a laptop), and the client may be in the form of an application program or a web page, which is not limited herein.
  • the communication service script can correspond one-to-one with a pre-created virtual machine, that is, the communication service script is configured with a communication service only for this virtual machine, or it can be shared by multiple pre-created virtual machines. That is, the communication service script includes multiple communication services configured for multiple virtual machines, which are not limited herein.
  • Step 330 Register a virtual machine in a proxy server where a communication service script is deployed.
  • the virtual machine registration realizes the confidential communication between the proxy server and the virtual machine, so that the registered virtual machine can directly call the communication service configured for the virtual machine in the communication service script deployed by the proxy server, and then according to the called communication service Perform communication performance verification on the virtual machine to avoid testers manually entering account numbers and passwords during the verification process, further improving the automation of virtual machine communication performance verification.
  • the virtual machine registration can be implemented through SSH (Secure Shell) commands, and it can also be implemented by means of a key pair to verify the identity of the virtual machine, which is not limited here.
  • SSH Secure Shell
  • Step 350 After the virtual machine is registered, the communication service script is run to start the communication service configured for the virtual machine in the communication service script.
  • the service startup is to enable the proxy server to perform corresponding functions. Since the proxy server needs to perform many functions, in order to ensure the startup efficiency of the proxy server, not all services are started as the proxy server is started. In other words, the proxy server can start the corresponding service only when it needs to perform a certain function.
  • the communication service configured for the virtual machine in the communication service script is started so that the proxy server can perform the communication performance verification function for the virtual machine.
  • the communication service configured for the virtual machine can be started by running the communication service script, so as to verify whether the data transmission between the virtual machine and the external device is normal through the communication service, that is, Go to step 370.
  • controlling the execution of the communication performance verification of the virtual machine through the service startup mode will help improve the processing efficiency of the proxy server and avoid unnecessary memory loss.
  • Step 370 Perform communication performance verification on the virtual machine through the started communication service.
  • the virtual machine and the external device will perform data transmission in accordance with the corresponding communication protocol of the communication service, so as to determine whether the virtual machine passes the communication performance check based on whether the data transmission is normal.
  • the communication performance verification of the virtual machine is automated, and through the registration of the virtual machine, the secret communication between the virtual machine and the proxy server is realized, avoiding manually entering the login account and password of the virtual machine manually.
  • the automation of communication performance verification of virtual machines is further improved.
  • the method described above may further include the following steps:
  • Step 410 Obtain an IP address used to identify the location of the virtual machine in the network, and configure the access right of the virtual machine for the network where the communication object of the virtual machine is located.
  • IP Internet Protocol
  • the network may be a public network, such as an external network, or a private network, such as an intranet dedicated line or a local area network. Therefore, this IP address may belong to a public network or a private network.
  • the IP address can be obtained automatically or manually by a tester, which is not limited here.
  • a virtual machine can transfer data not only with a proxy server, but also with other virtual machines, if the virtual machine to which the data is transferred belongs to a different network, it cannot be directly communicated due to security considerations.
  • the communication object of virtual machine A is virtual machine B
  • virtual machine A is on a public network and virtual machine B is on a private network
  • set the access right of virtual machine A to virtual machine B to be read-only, and virtual machine B to The access right of virtual machine A is read and write.
  • the access of the virtual machine A to the virtual machine B is limited.
  • the communication object of the virtual machine A is the virtual machine C
  • the virtual machine A and the virtual machine C are on a public network
  • set the access right of the virtual machine A to the virtual machine C to read and write
  • the virtual machine C to the virtual machine
  • the access right of A is read and write, that is, virtual machine A and virtual machine C can access each other.
  • data transmission between virtual machines is based on a proxy server, that is, forwarded by the proxy server.
  • a proxy server that is, forwarded by the proxy server.
  • communication between virtual machines is transparent, and the sender does not feel that the data passes through the proxy server. Forwarding, which fully guarantees the user's data transmission experience.
  • Step 430 Create a virtual machine according to the virtual machine's IP address and access authority.
  • the virtual machine can perform data transmission in accordance with the access rights of the virtual machine between the virtual machine and the external device based on the IP address.
  • the creation of a virtual machine is implemented based on an automation platform call. Specifically, the tester invokes the automation platform and enters virtual machine parameters into the API interface provided by the automation platform to complete the creation of the virtual machine, where the virtual machine parameters include the IP address and access rights of the virtual machine.
  • step 310 the method described above may further include the following steps:
  • Step 510 Create a communication service script.
  • the communication service script is essentially an editable file. Therefore, the creation of the communication service script is equivalent to creating a new editable file, so that the related content used to verify the communication performance of the virtual machine can be stored in the newly editable file.
  • the related content includes a communication service for executing a communication protocol, and a transmission port corresponding to the communication service.
  • Step 530 Configure the communication service to the communication service script according to the communication protocol followed by the virtual machine.
  • the communication service indicates the communication protocol followed by the virtual machine, so that when the communication service starts, the data transmission between the virtual machine and the external device follows this communication protocol.
  • Step 550 Configure a transmission port corresponding to the communication service in the communication service script.
  • the virtual machine needs to know which transmission port provided by the proxy server is used for data to be transmitted. Based on this, when the communication service script is configured, the configuration of the corresponding transmission port of the communication service needs to be completed.
  • the communication service script runs, the communication service starts, and accordingly, the transmission port corresponding to the communication service is occupied by the communication service to transfer data between the virtual machine and the proxy server.
  • the transmission port refers to a port conforming to the TCP / IP protocol, and the corresponding port number ranges from 0 to 65535. Further, since the ports corresponding to the port numbers 0 to 1023 cannot usually be dynamically allocated, the ports with the port numbers 1024 to 65535 are used as the transmission ports configurable to the communication service.
  • the data received through the transmission port is the data package encapsulated by the virtual machine according to the transmission protocol (such as TCP / IP protocol) that the transmission port complies with.
  • the transmission protocol such as TCP / IP protocol
  • the data transmitted in the transmission port first needs to follow the communication protocol indicated by the corresponding communication service, and also needs to follow the transmission protocol that the transmission port complies with.
  • the communication service script is configured with the http service and the corresponding transmission port A. Therefore, the data to be transmitted by the virtual machine is firstly encapsulated according to the http protocol indicated by the http service, and then based on the transmission that the transmission port A complies with. The protocol was encapsulated for the second time, and then transmitted from transmission port A to the proxy server.
  • step 330 may include the following steps:
  • the registration command is an SSH command generated by a tester in advance, such as the sshpass command, and the virtual machine registration is implemented by the sshpass command.
  • the sshpass command is as follows:
  • -p password parameter, which indicates the virtual machine login password
  • "% s" password parameter, corresponding to the password argument
  • scp% s file parameter, corresponding to the src_file argument, which is used to indicate the storage virtual machine login Account file
  • root @% s The ip address parameter, corresponding to the ip actual parameter, is used to indicate the IP address of the virtual machine to be registered.
  • the virtual machine identified by the actual parameter "ip” is automatically based on the login account in the file identified by the actual parameter "src_file” and the login account identified by the actual parameter "password” Log in to achieve secret-free communication with the proxy server and avoid manually entering the login account and password of the virtual machine.
  • step 330 may include the following steps:
  • Step 331 Receive the public key sent by the virtual machine.
  • the public key belongs to the key pair generated by the virtual machine for registration.
  • the virtual machine in order to register the virtual machine with the proxy server, the virtual machine will generate a key pair according to an asymmetric encryption algorithm, and this key pair includes a private key that performs encryption and a public key that performs decryption.
  • This asymmetric encryption algorithm includes, but is not limited to: RSA algorithm, Elgamal algorithm, backpack algorithm, Rabin algorithm, D-H algorithm, ECC (Elliptic Curve Cryptography) algorithm, etc., which are not limited here.
  • the virtual machine if it wishes to register the virtual machine with the proxy server, it will send the public key of the key pair to perform decryption to the proxy server.
  • step 333 when an authentication request initiated by the virtual machine according to the private key in the key pair is received, the virtual machine is authenticated according to the public key in response to the authentication request.
  • the identity verification performed by the virtual machine is essentially a process of encrypting and decrypting according to a key pair.
  • the virtual machine side generates encrypted information according to the private key in the key pair, and uses this to initiate an identity verification request.
  • the proxy server After receiving the authentication request, the proxy server extracts the encrypted information from it and decrypts the encrypted information according to the public key in the key pair.
  • step 335 is executed.
  • the decryption fails, the authentication of the virtual machine fails, which indicates that the virtual machine has not been registered with the proxy server, and therefore the secret communication between the virtual machine and the proxy server is not allowed.
  • step 335 if the virtual machine passes the authentication, registration of the virtual machine in the proxy server is completed.
  • step 370 may include the following steps:
  • Step 371 Monitor the transmission port corresponding to the communication service, and establish a transmission link between the virtual machine and the proxy server.
  • Step 373 Receive a data transmission request initiated by the virtual machine through a transmission link.
  • a transmission port is used to establish a transmission link between the virtual machine and the proxy server to implement data transmission between the virtual machine and the proxy server.
  • the virtual machine will initiate a data transmission request to the proxy server, so that the proxy server responds to the data transmission request, and then performs the communication performance verification function of the virtual machine.
  • Step 375 Perform response processing on the data transmission request, and return a request response to the virtual machine through the transmission link, so as to determine whether the virtual machine passes the communication performance check according to the request response.
  • the virtual machine can perform data transmission between the proxy server and other virtual machines, that is, the target receiver of the data carried by the data transmission request, that is, the communication object of the virtual machine May be different.
  • the proxy server After the proxy server receives the data transmission request, it can learn the target receiver carrying the data according to the data transmission request, and then respond to the data transmission request according to the target receiver.
  • the proxy server receives the data transfer request and returns a request response to the virtual machine.
  • the proxy server If the data transfer request is sent to another virtual machine, the proxy server first forwards the data transfer request to other virtual machines, and then returns a request response to the virtual machine.
  • the request response is used to indicate that the proxy server has completed response processing to the received data transmission request.
  • the request response may be a request response returned to the virtual machine after the data transmission request is forwarded to the other virtual machine.
  • the request response is that the request response is returned to the virtual machine only after it is determined that other virtual machines have received the data transmission request.
  • a virtual machine if a request response is received, it can be considered that the virtual machine and the external device can normally send and receive data, and it is further determined that the virtual machine passes the communication performance check.
  • the method described above may further include the following steps:
  • Step 610 If the virtual machine receives the request response, obtain log information for recording the operation behavior of the virtual machine.
  • the virtual machine operation behavior includes, but is not limited to, a request initiation behavior, a request response reception behavior, and the like.
  • the log information includes but is not limited to: the time when the virtual machine sends the request, the time when the virtual machine receives the request response, the byte stream transmitted, the transmission status, and so on.
  • the time difference between the time when the virtual machine sends the request and the time when the virtual machine receives the request response is calculated to determine the request transmission time of the current data transmission request.
  • the transmission byte stream indicates the number of bytes transmitted per second during data transmission. Different communication protocols have corresponding restrictions on the transmission byte stream.
  • the transmission status is basically used to characterize the transmission speed in the data transmission process. According to the user's tolerance for the transmission speed, it can be determined whether the transmission status of the virtual machine is abnormal.
  • the above information recorded in the log information can be used to determine whether the virtual machine passes the communication performance check.
  • Step 630 Determine whether the virtual machine passes the communication performance check according to the log information.
  • the virtual machine passes the communication performance check. and / or,
  • the transmission speed represented by the transmission status in the log information is not less than the set speed threshold, it is considered that the transmission status of the virtual machine is normal, and it is further determined that the virtual machine passes the communication performance check.
  • the set time threshold and the set speed threshold can be flexibly adjusted according to the requirements of the actual application scenario. For example, in an application scenario with high requirements for the communication performance of a virtual machine, the smaller configuration is a set time threshold, and a larger set speed threshold is configured.
  • the operation behavior of the virtual machine recorded in the log information is used to determine whether the virtual machine passes the communication performance check, which avoids manual implementation. This not only fully ensures the accuracy of the virtual machine communication performance check, but further Conducive to improving the automation of virtual machine communication performance verification.
  • the following is a device embodiment of the present application, which can be used to execute the method for verifying communication performance of a virtual machine involved in the present application.
  • the method for verifying communication performance of a virtual machine involved in the present application please refer to the embodiments of the method for checking the communication performance of a virtual machine involved in this application.
  • an apparatus 900 for verifying communication performance of a virtual machine includes, but is not limited to, a script deployment module 910, a virtual machine registration module 930, a service startup module 950, and a communication performance verification module. 970.
  • the script deployment module 910 is used by a proxy server to deploy a communication service script for a virtual machine created in advance.
  • the virtual machine registration module 930 is configured to perform virtual machine registration in a proxy server where a communication service script is deployed.
  • the service startup module 950 is configured to wait for the virtual machine to complete registration and run a communication service script to start a communication service configured for the virtual machine in the communication service script.
  • the communication performance verification module 970 is configured to verify the communication performance of the virtual machine through the started communication service.
  • the device for verifying the communication performance of a virtual machine when performing the process of verifying the communication performance of a virtual machine, only uses the above-mentioned division of functional modules as an example for illustration. In actual applications, it can be based on needs.
  • the above function allocation is completed by different function modules, that is, the internal structure of the device for checking the communication performance of the virtual machine is divided into different function modules to complete all or part of the functions described above.
  • the embodiments of the device for verifying the communication performance of a virtual machine and the method for verifying the communication performance of a virtual machine provided by the foregoing embodiments belong to the same concept, and the specific manner in which each module performs an operation has been described in detail in the method embodiment , Will not repeat them here.
  • an apparatus 1000 for verifying communication performance of a virtual machine includes a processor 1001 and a memory 1002, and further includes at least one storage bus 1003.
  • the memory 1002 stores computer-readable instructions, and the processor 1001 reads the computer-readable instructions from the memory 1002 through at least one storage bus 1003.
  • a computer-readable storage medium stores a computer program thereon.
  • the computer program is executed by a processor, the method for verifying communication performance of a virtual machine in the foregoing embodiments is implemented.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Environmental & Geological Engineering (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer And Data Communications (AREA)

Abstract

L'invention concerne un procédé et un appareil de vérification de performances de communication d'une machine virtuelle. Le procédé de vérification de performances de communication d'une machine virtuelle comprend les étapes suivantes : un serveur mandataire déploie un script de service de communication pour une machine virtuelle pré-créée; enregistrer la machine virtuelle dans le serveur mandataire qui déploie le script de service de communication; après que la machine virtuelle est enregistrée, exécuter le script de service de communication, de façon à activer un service de communication configuré pour la machine virtuelle dans le script de service de communication; et vérifier les performances de communication de la machine virtuelle au moyen du service de communication activé. L'utilisation du procédé et de l'appareil de vérification de performances de communication d'une machine virtuelle fournis dans la présente invention peut efficacement éviter une vérification manuelle pour des performances de communication d'une machine virtuelle.
PCT/CN2018/108290 2018-06-13 2018-09-28 Procédé et appareil de vérifications de performances de communication d'une machine virtuelle WO2019237576A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201810605024.8A CN108900324B (zh) 2018-06-13 2018-06-13 校验虚拟机通信性能的方法及装置
CN201810605024.8 2018-06-13

Publications (1)

Publication Number Publication Date
WO2019237576A1 true WO2019237576A1 (fr) 2019-12-19

Family

ID=64344849

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2018/108290 WO2019237576A1 (fr) 2018-06-13 2018-09-28 Procédé et appareil de vérifications de performances de communication d'une machine virtuelle

Country Status (2)

Country Link
CN (1) CN108900324B (fr)
WO (1) WO2019237576A1 (fr)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113938474A (zh) * 2021-10-13 2022-01-14 网易(杭州)网络有限公司 一种虚拟机访问方法、装置、电子设备和存储介质
CN114189527A (zh) * 2021-10-28 2022-03-15 海南视联通信技术有限公司 一种信息同步方法、装置、电子设备与存储介质

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111435919B (zh) * 2019-01-15 2023-08-08 菜鸟智能物流控股有限公司 一种配置参数的管理方法、装置及系统
CN110058920B (zh) * 2019-03-04 2023-01-31 平安科技(深圳)有限公司 虚拟机性能检测方法及装置、电子设备、存储介质
CN112905304A (zh) * 2021-03-08 2021-06-04 深信服科技股份有限公司 一种虚拟机间通信方法、装置、物理主机及介质

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140204734A1 (en) * 2013-01-18 2014-07-24 Hitachi, Ltd. Node device, communication system, and method for switching virtual switch
CN104333488A (zh) * 2014-11-04 2015-02-04 哈尔滨工业大学 云服务平台性能测试方法
CN105357038A (zh) * 2015-10-26 2016-02-24 北京百度网讯科技有限公司 监控虚拟机集群的方法和系统
CN107632937A (zh) * 2017-10-10 2018-01-26 郑州云海信息技术有限公司 一种对虚拟机集群进行测试的方法、装置、可读存储介质

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103248535B (zh) * 2013-04-28 2016-03-09 华为技术有限公司 一种云系统测试方法及装置
CN104461856B (zh) * 2013-09-22 2018-04-20 阿里巴巴集团控股有限公司 基于云计算平台的性能测试方法、装置及系统

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140204734A1 (en) * 2013-01-18 2014-07-24 Hitachi, Ltd. Node device, communication system, and method for switching virtual switch
CN104333488A (zh) * 2014-11-04 2015-02-04 哈尔滨工业大学 云服务平台性能测试方法
CN105357038A (zh) * 2015-10-26 2016-02-24 北京百度网讯科技有限公司 监控虚拟机集群的方法和系统
CN107632937A (zh) * 2017-10-10 2018-01-26 郑州云海信息技术有限公司 一种对虚拟机集群进行测试的方法、装置、可读存储介质

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113938474A (zh) * 2021-10-13 2022-01-14 网易(杭州)网络有限公司 一种虚拟机访问方法、装置、电子设备和存储介质
CN113938474B (zh) * 2021-10-13 2024-05-10 网易(杭州)网络有限公司 一种虚拟机访问方法、装置、电子设备和存储介质
CN114189527A (zh) * 2021-10-28 2022-03-15 海南视联通信技术有限公司 一种信息同步方法、装置、电子设备与存储介质

Also Published As

Publication number Publication date
CN108900324A (zh) 2018-11-27
CN108900324B (zh) 2021-10-15

Similar Documents

Publication Publication Date Title
US9571279B2 (en) Systems and methods for secured backup of hardware security modules for cloud-based web services
US20150358313A1 (en) Systems and methods for secured communication hardware security module and network-enabled devices
US20200004946A1 (en) Secretless and secure authentication of network resources
WO2019237576A1 (fr) Procédé et appareil de vérifications de performances de communication d'une machine virtuelle
US11303614B2 (en) System and method for providing improved optimization for secure session connections
CN111819824A (zh) 在无中间人代理的情况下解密传输层安全流量
US9215227B2 (en) Systems and methods for network communications
US10257171B2 (en) Server public key pinning by URL
US10045212B2 (en) Method and apparatus for providing provably secure user input/output
CN115086306B (zh) 一种数据传输方法、装置、电子设备和存储介质
TW201638822A (zh) 進程的身份認證方法和裝置
US20190028559A1 (en) Tcp fast open hardware support in proxy devices
US20240146728A1 (en) Access control method, access control system, and related device
WO2019120231A1 (fr) Procédé et dispositif permettant de déterminer un état de confiance d'un tpm et support de stockage
US20080092206A1 (en) Security protocol control apparatus and security protocol control method
US9071596B2 (en) Securely establishing a communication channel between a switch and a network-based application using a unique identifier for the network-based application
CN115499177A (zh) 云桌面访问方法、零信任网关、云桌面客户端和服务端
US11658941B2 (en) Server for detecting a proxy device in a communications path and related methods
US11611541B2 (en) Secure method to replicate on-premise secrets in a cloud environment
US20230403138A1 (en) Agentless single sign-on techniques
WO2023024540A1 (fr) Procédés et appareil de traitement de message et d'obtention d'informations sa, système et support
Zhao et al. The Mobile Terminal Security Access System Based on IPSec VPN

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 18922167

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 08/04/2021)

122 Ep: pct application non-entry in european phase

Ref document number: 18922167

Country of ref document: EP

Kind code of ref document: A1