WO2019237576A1 - Method and apparatus for verifying communication performance of virtual machine - Google Patents
Method and apparatus for verifying communication performance of virtual machine Download PDFInfo
- Publication number
- WO2019237576A1 WO2019237576A1 PCT/CN2018/108290 CN2018108290W WO2019237576A1 WO 2019237576 A1 WO2019237576 A1 WO 2019237576A1 CN 2018108290 W CN2018108290 W CN 2018108290W WO 2019237576 A1 WO2019237576 A1 WO 2019237576A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- virtual machine
- communication service
- communication
- proxy server
- registration
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
- H04L43/08—Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
- H04L43/0805—Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters by checking availability
- H04L43/0817—Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters by checking availability by checking functioning
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/08—Configuration management of networks or network elements
- H04L41/0803—Configuration setting
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
Definitions
- the present application relates to the field of computer technology, and in particular, to a method and device for verifying communication performance of a virtual machine.
- the verification process includes: the tester manually enters the login account and password of the virtual machine, logs in to the virtual machine on which the communication service is deployed, and then starts the communication service deployed on the virtual machine to start the communication performance verification of the virtual machine.
- the inventors realized that the above verification process mainly depends on manual implementation. Once the number of virtual machines to be verified is large, it is not only easy to make mistakes, the verification efficiency is low, but also requires high professional skills of testers, resulting in Inspection costs remain high.
- an object of the present application is to provide a method and device for verifying communication performance of a virtual machine.
- a method for verifying communication performance of a virtual machine includes: a proxy server deploying a communication service script for a virtual machine created in advance; registering a virtual machine in a proxy server where the communication service script is deployed; Machine completes registration and runs the communication service script to start the communication service configured for the virtual machine in the communication service script; and performs communication performance verification on the virtual machine through the started communication service.
- an apparatus for verifying communication performance of a virtual machine includes a script deployment module for a proxy server to deploy a communication service script for a pre-created virtual machine, and a virtual machine registration module for deploying the communication service.
- Virtual machine registration in a scripted proxy server includes a service startup module for waiting for the virtual machine to complete registration, and running the communication service script to start a communication service configured for the virtual machine in the communication service script; communication performance calibration An inspection module, configured to verify communication performance of the virtual machine through the started communication service.
- a device for verifying the communication performance of a virtual machine includes a processor and a memory, and the memory stores computer-readable instructions. When the computer-readable instructions are executed by the processor, the above-mentioned implementation is implemented. Method for verifying the communication performance of a virtual machine.
- a computer-readable storage medium has stored thereon a computer program that, when executed by a processor, implements the method for verifying communication performance of a virtual machine as described above.
- the proxy server will deploy a communication service script for the virtual machine and register the virtual machine. After the virtual machine has completed registration, run the communication service script to start the communication service script configured for the virtual machine.
- the communication service verifies the communication performance of the virtual machine through the started communication service. Therefore, the communication service script can automatically perform the communication performance verification on the virtual machine created in advance, thereby avoiding the manual implementation of the communication performance verification of the virtual machine.
- the virtual machine registration enables secret-free communication between the virtual machine and the proxy server, avoiding manually entering the login account and login password of the virtual machine manually, which further improves the automation of virtual machine communication performance verification.
- FIG. 1 is a schematic diagram of an implementation environment according to the present application.
- Fig. 2 is a block diagram showing a hardware structure of a proxy server according to an exemplary embodiment.
- Fig. 3 is a flow chart showing a method for verifying communication performance of a virtual machine according to an exemplary embodiment.
- Fig. 4 is a flow chart showing another method for verifying communication performance of a virtual machine according to an exemplary embodiment.
- Fig. 5 is a flow chart showing another method for verifying communication performance of a virtual machine according to an exemplary embodiment.
- FIG. 6 is a flowchart of an embodiment of step 330 in the embodiment corresponding to FIG. 3.
- FIG. 7 is a flowchart of an embodiment of step 370 in the embodiment corresponding to FIG. 3.
- Fig. 8 is a flow chart showing another method for verifying communication performance of a virtual machine according to an exemplary embodiment.
- Fig. 9 is a block diagram of a device for checking communication performance of a virtual machine according to an exemplary embodiment.
- Fig. 10 is a block diagram of a hardware structure of an apparatus for verifying communication performance of a virtual machine according to an exemplary embodiment.
- FIG. 1 is a schematic diagram of an implementation environment involved in a method for verifying communication performance of a virtual machine.
- the implementation environment includes a virtual machine 110, a proxy server 130, and an automation platform 150.
- the proxy server 130 and the automation platform 150 establish a communication connection through wired or wireless, so as to realize the interaction between the proxy server 130 and the automation platform 150.
- the automation platform 150 uploads the communication service script to the proxy server 130.
- the communication service script is deployed for the virtual machine 110 created in advance, and the communication performance verification of the virtual machine 110 is automatically completed based on the communication service script.
- Fig. 2 is a block diagram showing a hardware structure of a proxy server according to an exemplary embodiment.
- the proxy server is only an example adapted to the present application and cannot be considered to provide any limitation on the scope of use of the present application.
- This proxy server also cannot be interpreted as needing to rely on or having to have one or more components in the exemplary proxy server 200 shown in FIG. 2.
- the hardware structure of the proxy server 200 may vary greatly due to different configurations or performances.
- the proxy server 200 includes: a power supply 210, an interface 230, at least one memory 250, and at least one central processing unit ( CPU, Central Processing Units) 270.
- CPU Central Processing Unit
- the power supply 210 is used to provide working voltages for each hardware device on the proxy server 200.
- the interface 230 includes at least one wired or wireless network interface 231, at least one serial-to-parallel conversion interface 233, at least one input-output interface 235, and at least one USB interface 237, etc., for communicating with external devices.
- the memory 250 serves as a carrier for resource storage, and may be a read-only memory, a random access memory, a magnetic disk, or an optical disk.
- the resources stored on the memory 250 include an operating system 251, an application program 253, and data 255.
- the storage method may be temporary storage or permanent storage.
- the operating system 251 is used to manage and control various hardware devices and application programs 253 on the proxy server 200 to implement the calculation and processing of the massive data 255 by the central processing unit 270, which may be Windows ServerTM, Mac OS XTM, UnixTM, LinuxTM, FreeBSDTM, etc.
- the application program 253 is a computer program that completes at least one specific task based on the operating system 251.
- the application program 253 may include at least one module (not shown in FIG. 2), and each module may separately include a series of procedures for the proxy server 200.
- the data 255 may be photos, pictures, and the like stored on the disk.
- the central processing unit 270 may include one or more processors, and is configured to communicate with the memory 250 through a bus, for calculating and processing the massive data 255 in the memory 250.
- the proxy server 200 applicable to the present application will complete the method for verifying the communication performance of the virtual machine by reading the series of computer-readable instructions stored in the memory 250 through the central processing unit 270.
- the present application can also be implemented by a hardware circuit or a hardware circuit in combination with software. Therefore, the implementation of the present application is not limited to any specific hardware circuit, software, or a combination of the two.
- a method for verifying communication performance of a virtual machine is applicable to a proxy server of the implementation environment shown in FIG. 1, and the structure of the proxy server may be shown in FIG. 2.
- This method for checking the communication performance of a virtual machine may be executed by a proxy server, and may include the following steps:
- Step 310 The proxy server deploys a communication service script for the virtual machine created in advance.
- the communication service script is stored in the proxy server and is used to perform communication performance verification for the pre-created virtual machine.
- the communication performance verification is to verify whether the data transmission between the pre-created virtual machine and the external device is normal.
- the external device may be a proxy server or another virtual machine.
- This supplementary explanation is that in this embodiment, if the external device is another virtual machine, the data transmitted by the virtual machine is forwarded to the other virtual machine through the proxy server, so that the proxy server can be based on the deployed communication service script And the communication performance verification of this virtual machine.
- the data transmission between the virtual machine and the external device follows a communication protocol, and this communication protocol includes the http protocol (Hypertext Transfer Protocol, Hypertext Transfer Protocol), tcp protocol (Transmission Control Protocol, Transmission Control Protocol), and udp protocol (User Datagram Protocol (User Datagram Protocol) and so on.
- http protocol Hypertext Transfer Protocol
- tcp protocol Transmission Control Protocol
- udp protocol User Datagram Protocol (User Datagram Protocol) and so on.
- the type of data transmitted between the virtual machine and the external device is different, and the communication protocol followed is different.
- the communication server script configures the corresponding communication service for the virtual machine according to the communication protocol followed by the virtual machine.
- the communication protocol may be the http protocol, the tcp protocol, or the udp protocol.
- the communication service configured by the communication server for the virtual machine may be the http service, the tcp service, or the udp service.
- the communication service script is uploaded by the tester to the proxy server through an automation platform, thereby improving the automation of communication verification.
- the automation platform may be a client running on a user device (such as a laptop), and the client may be in the form of an application program or a web page, which is not limited herein.
- the communication service script can correspond one-to-one with a pre-created virtual machine, that is, the communication service script is configured with a communication service only for this virtual machine, or it can be shared by multiple pre-created virtual machines. That is, the communication service script includes multiple communication services configured for multiple virtual machines, which are not limited herein.
- Step 330 Register a virtual machine in a proxy server where a communication service script is deployed.
- the virtual machine registration realizes the confidential communication between the proxy server and the virtual machine, so that the registered virtual machine can directly call the communication service configured for the virtual machine in the communication service script deployed by the proxy server, and then according to the called communication service Perform communication performance verification on the virtual machine to avoid testers manually entering account numbers and passwords during the verification process, further improving the automation of virtual machine communication performance verification.
- the virtual machine registration can be implemented through SSH (Secure Shell) commands, and it can also be implemented by means of a key pair to verify the identity of the virtual machine, which is not limited here.
- SSH Secure Shell
- Step 350 After the virtual machine is registered, the communication service script is run to start the communication service configured for the virtual machine in the communication service script.
- the service startup is to enable the proxy server to perform corresponding functions. Since the proxy server needs to perform many functions, in order to ensure the startup efficiency of the proxy server, not all services are started as the proxy server is started. In other words, the proxy server can start the corresponding service only when it needs to perform a certain function.
- the communication service configured for the virtual machine in the communication service script is started so that the proxy server can perform the communication performance verification function for the virtual machine.
- the communication service configured for the virtual machine can be started by running the communication service script, so as to verify whether the data transmission between the virtual machine and the external device is normal through the communication service, that is, Go to step 370.
- controlling the execution of the communication performance verification of the virtual machine through the service startup mode will help improve the processing efficiency of the proxy server and avoid unnecessary memory loss.
- Step 370 Perform communication performance verification on the virtual machine through the started communication service.
- the virtual machine and the external device will perform data transmission in accordance with the corresponding communication protocol of the communication service, so as to determine whether the virtual machine passes the communication performance check based on whether the data transmission is normal.
- the communication performance verification of the virtual machine is automated, and through the registration of the virtual machine, the secret communication between the virtual machine and the proxy server is realized, avoiding manually entering the login account and password of the virtual machine manually.
- the automation of communication performance verification of virtual machines is further improved.
- the method described above may further include the following steps:
- Step 410 Obtain an IP address used to identify the location of the virtual machine in the network, and configure the access right of the virtual machine for the network where the communication object of the virtual machine is located.
- IP Internet Protocol
- the network may be a public network, such as an external network, or a private network, such as an intranet dedicated line or a local area network. Therefore, this IP address may belong to a public network or a private network.
- the IP address can be obtained automatically or manually by a tester, which is not limited here.
- a virtual machine can transfer data not only with a proxy server, but also with other virtual machines, if the virtual machine to which the data is transferred belongs to a different network, it cannot be directly communicated due to security considerations.
- the communication object of virtual machine A is virtual machine B
- virtual machine A is on a public network and virtual machine B is on a private network
- set the access right of virtual machine A to virtual machine B to be read-only, and virtual machine B to The access right of virtual machine A is read and write.
- the access of the virtual machine A to the virtual machine B is limited.
- the communication object of the virtual machine A is the virtual machine C
- the virtual machine A and the virtual machine C are on a public network
- set the access right of the virtual machine A to the virtual machine C to read and write
- the virtual machine C to the virtual machine
- the access right of A is read and write, that is, virtual machine A and virtual machine C can access each other.
- data transmission between virtual machines is based on a proxy server, that is, forwarded by the proxy server.
- a proxy server that is, forwarded by the proxy server.
- communication between virtual machines is transparent, and the sender does not feel that the data passes through the proxy server. Forwarding, which fully guarantees the user's data transmission experience.
- Step 430 Create a virtual machine according to the virtual machine's IP address and access authority.
- the virtual machine can perform data transmission in accordance with the access rights of the virtual machine between the virtual machine and the external device based on the IP address.
- the creation of a virtual machine is implemented based on an automation platform call. Specifically, the tester invokes the automation platform and enters virtual machine parameters into the API interface provided by the automation platform to complete the creation of the virtual machine, where the virtual machine parameters include the IP address and access rights of the virtual machine.
- step 310 the method described above may further include the following steps:
- Step 510 Create a communication service script.
- the communication service script is essentially an editable file. Therefore, the creation of the communication service script is equivalent to creating a new editable file, so that the related content used to verify the communication performance of the virtual machine can be stored in the newly editable file.
- the related content includes a communication service for executing a communication protocol, and a transmission port corresponding to the communication service.
- Step 530 Configure the communication service to the communication service script according to the communication protocol followed by the virtual machine.
- the communication service indicates the communication protocol followed by the virtual machine, so that when the communication service starts, the data transmission between the virtual machine and the external device follows this communication protocol.
- Step 550 Configure a transmission port corresponding to the communication service in the communication service script.
- the virtual machine needs to know which transmission port provided by the proxy server is used for data to be transmitted. Based on this, when the communication service script is configured, the configuration of the corresponding transmission port of the communication service needs to be completed.
- the communication service script runs, the communication service starts, and accordingly, the transmission port corresponding to the communication service is occupied by the communication service to transfer data between the virtual machine and the proxy server.
- the transmission port refers to a port conforming to the TCP / IP protocol, and the corresponding port number ranges from 0 to 65535. Further, since the ports corresponding to the port numbers 0 to 1023 cannot usually be dynamically allocated, the ports with the port numbers 1024 to 65535 are used as the transmission ports configurable to the communication service.
- the data received through the transmission port is the data package encapsulated by the virtual machine according to the transmission protocol (such as TCP / IP protocol) that the transmission port complies with.
- the transmission protocol such as TCP / IP protocol
- the data transmitted in the transmission port first needs to follow the communication protocol indicated by the corresponding communication service, and also needs to follow the transmission protocol that the transmission port complies with.
- the communication service script is configured with the http service and the corresponding transmission port A. Therefore, the data to be transmitted by the virtual machine is firstly encapsulated according to the http protocol indicated by the http service, and then based on the transmission that the transmission port A complies with. The protocol was encapsulated for the second time, and then transmitted from transmission port A to the proxy server.
- step 330 may include the following steps:
- the registration command is an SSH command generated by a tester in advance, such as the sshpass command, and the virtual machine registration is implemented by the sshpass command.
- the sshpass command is as follows:
- -p password parameter, which indicates the virtual machine login password
- "% s" password parameter, corresponding to the password argument
- scp% s file parameter, corresponding to the src_file argument, which is used to indicate the storage virtual machine login Account file
- root @% s The ip address parameter, corresponding to the ip actual parameter, is used to indicate the IP address of the virtual machine to be registered.
- the virtual machine identified by the actual parameter "ip” is automatically based on the login account in the file identified by the actual parameter "src_file” and the login account identified by the actual parameter "password” Log in to achieve secret-free communication with the proxy server and avoid manually entering the login account and password of the virtual machine.
- step 330 may include the following steps:
- Step 331 Receive the public key sent by the virtual machine.
- the public key belongs to the key pair generated by the virtual machine for registration.
- the virtual machine in order to register the virtual machine with the proxy server, the virtual machine will generate a key pair according to an asymmetric encryption algorithm, and this key pair includes a private key that performs encryption and a public key that performs decryption.
- This asymmetric encryption algorithm includes, but is not limited to: RSA algorithm, Elgamal algorithm, backpack algorithm, Rabin algorithm, D-H algorithm, ECC (Elliptic Curve Cryptography) algorithm, etc., which are not limited here.
- the virtual machine if it wishes to register the virtual machine with the proxy server, it will send the public key of the key pair to perform decryption to the proxy server.
- step 333 when an authentication request initiated by the virtual machine according to the private key in the key pair is received, the virtual machine is authenticated according to the public key in response to the authentication request.
- the identity verification performed by the virtual machine is essentially a process of encrypting and decrypting according to a key pair.
- the virtual machine side generates encrypted information according to the private key in the key pair, and uses this to initiate an identity verification request.
- the proxy server After receiving the authentication request, the proxy server extracts the encrypted information from it and decrypts the encrypted information according to the public key in the key pair.
- step 335 is executed.
- the decryption fails, the authentication of the virtual machine fails, which indicates that the virtual machine has not been registered with the proxy server, and therefore the secret communication between the virtual machine and the proxy server is not allowed.
- step 335 if the virtual machine passes the authentication, registration of the virtual machine in the proxy server is completed.
- step 370 may include the following steps:
- Step 371 Monitor the transmission port corresponding to the communication service, and establish a transmission link between the virtual machine and the proxy server.
- Step 373 Receive a data transmission request initiated by the virtual machine through a transmission link.
- a transmission port is used to establish a transmission link between the virtual machine and the proxy server to implement data transmission between the virtual machine and the proxy server.
- the virtual machine will initiate a data transmission request to the proxy server, so that the proxy server responds to the data transmission request, and then performs the communication performance verification function of the virtual machine.
- Step 375 Perform response processing on the data transmission request, and return a request response to the virtual machine through the transmission link, so as to determine whether the virtual machine passes the communication performance check according to the request response.
- the virtual machine can perform data transmission between the proxy server and other virtual machines, that is, the target receiver of the data carried by the data transmission request, that is, the communication object of the virtual machine May be different.
- the proxy server After the proxy server receives the data transmission request, it can learn the target receiver carrying the data according to the data transmission request, and then respond to the data transmission request according to the target receiver.
- the proxy server receives the data transfer request and returns a request response to the virtual machine.
- the proxy server If the data transfer request is sent to another virtual machine, the proxy server first forwards the data transfer request to other virtual machines, and then returns a request response to the virtual machine.
- the request response is used to indicate that the proxy server has completed response processing to the received data transmission request.
- the request response may be a request response returned to the virtual machine after the data transmission request is forwarded to the other virtual machine.
- the request response is that the request response is returned to the virtual machine only after it is determined that other virtual machines have received the data transmission request.
- a virtual machine if a request response is received, it can be considered that the virtual machine and the external device can normally send and receive data, and it is further determined that the virtual machine passes the communication performance check.
- the method described above may further include the following steps:
- Step 610 If the virtual machine receives the request response, obtain log information for recording the operation behavior of the virtual machine.
- the virtual machine operation behavior includes, but is not limited to, a request initiation behavior, a request response reception behavior, and the like.
- the log information includes but is not limited to: the time when the virtual machine sends the request, the time when the virtual machine receives the request response, the byte stream transmitted, the transmission status, and so on.
- the time difference between the time when the virtual machine sends the request and the time when the virtual machine receives the request response is calculated to determine the request transmission time of the current data transmission request.
- the transmission byte stream indicates the number of bytes transmitted per second during data transmission. Different communication protocols have corresponding restrictions on the transmission byte stream.
- the transmission status is basically used to characterize the transmission speed in the data transmission process. According to the user's tolerance for the transmission speed, it can be determined whether the transmission status of the virtual machine is abnormal.
- the above information recorded in the log information can be used to determine whether the virtual machine passes the communication performance check.
- Step 630 Determine whether the virtual machine passes the communication performance check according to the log information.
- the virtual machine passes the communication performance check. and / or,
- the transmission speed represented by the transmission status in the log information is not less than the set speed threshold, it is considered that the transmission status of the virtual machine is normal, and it is further determined that the virtual machine passes the communication performance check.
- the set time threshold and the set speed threshold can be flexibly adjusted according to the requirements of the actual application scenario. For example, in an application scenario with high requirements for the communication performance of a virtual machine, the smaller configuration is a set time threshold, and a larger set speed threshold is configured.
- the operation behavior of the virtual machine recorded in the log information is used to determine whether the virtual machine passes the communication performance check, which avoids manual implementation. This not only fully ensures the accuracy of the virtual machine communication performance check, but further Conducive to improving the automation of virtual machine communication performance verification.
- the following is a device embodiment of the present application, which can be used to execute the method for verifying communication performance of a virtual machine involved in the present application.
- the method for verifying communication performance of a virtual machine involved in the present application please refer to the embodiments of the method for checking the communication performance of a virtual machine involved in this application.
- an apparatus 900 for verifying communication performance of a virtual machine includes, but is not limited to, a script deployment module 910, a virtual machine registration module 930, a service startup module 950, and a communication performance verification module. 970.
- the script deployment module 910 is used by a proxy server to deploy a communication service script for a virtual machine created in advance.
- the virtual machine registration module 930 is configured to perform virtual machine registration in a proxy server where a communication service script is deployed.
- the service startup module 950 is configured to wait for the virtual machine to complete registration and run a communication service script to start a communication service configured for the virtual machine in the communication service script.
- the communication performance verification module 970 is configured to verify the communication performance of the virtual machine through the started communication service.
- the device for verifying the communication performance of a virtual machine when performing the process of verifying the communication performance of a virtual machine, only uses the above-mentioned division of functional modules as an example for illustration. In actual applications, it can be based on needs.
- the above function allocation is completed by different function modules, that is, the internal structure of the device for checking the communication performance of the virtual machine is divided into different function modules to complete all or part of the functions described above.
- the embodiments of the device for verifying the communication performance of a virtual machine and the method for verifying the communication performance of a virtual machine provided by the foregoing embodiments belong to the same concept, and the specific manner in which each module performs an operation has been described in detail in the method embodiment , Will not repeat them here.
- an apparatus 1000 for verifying communication performance of a virtual machine includes a processor 1001 and a memory 1002, and further includes at least one storage bus 1003.
- the memory 1002 stores computer-readable instructions, and the processor 1001 reads the computer-readable instructions from the memory 1002 through at least one storage bus 1003.
- a computer-readable storage medium stores a computer program thereon.
- the computer program is executed by a processor, the method for verifying communication performance of a virtual machine in the foregoing embodiments is implemented.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Environmental & Geological Engineering (AREA)
- Computer And Data Communications (AREA)
Abstract
Description
本申请要求2018年6月13日递交、申请名称为“校验虚拟机通信性能的方法及装置”的中国专利申请201810605024.8的优先权,在此通过引用将其全部内容合并于此。This application claims priority from Chinese patent application 201810605024.8, filed on June 13, 2018, and entitled "Method and Device for Verifying Communication Performance of Virtual Machines", the entire contents of which are incorporated herein by reference.
本申请涉及计算机技术领域,尤其涉及一种校验虚拟机通信性能的方法及装置。The present application relates to the field of computer technology, and in particular, to a method and device for verifying communication performance of a virtual machine.
虚拟机创建后,通常需要对虚拟机的通信性能进行校验。目前,校验过程包括:测试人员手动输入虚拟机的登录账号和登录密码,登录部署了通信服务的虚拟机,然后启动虚拟机上部署的通信服务开始虚拟机的通信性能校验。After the virtual machine is created, it is usually necessary to verify the communication performance of the virtual machine. Currently, the verification process includes: the tester manually enters the login account and password of the virtual machine, logs in to the virtual machine on which the communication service is deployed, and then starts the communication service deployed on the virtual machine to start the communication performance verification of the virtual machine.
然而,发明人意识到:上述校验过程主要依赖于人工实现,一旦待校验的虚拟机数量较大,不仅容易出错,校验效率低下,而且对测试人员的专业技能要求较高,导致校验成本居高不下。However, the inventors realized that the above verification process mainly depends on manual implementation. Once the number of virtual machines to be verified is large, it is not only easy to make mistakes, the verification efficiency is low, but also requires high professional skills of testers, resulting in Inspection costs remain high.
为了解决上述技术问题,本申请的一个目的在于提供一种校验虚拟机通信性能的方法及装置。In order to solve the above technical problems, an object of the present application is to provide a method and device for verifying communication performance of a virtual machine.
其中,本申请所采用的技术方案为:Among them, the technical solutions used in this application are:
一方面,一种校验虚拟机通信性能的方法,包括:代理服务器为预先创建的虚拟机部署通信服务脚本;在部署了所述通信服务脚本的代理服务器中进行虚拟机注册;待所述虚拟机完成注册,运行所述通信服务脚本,以启动所述通信服务脚本中为所述虚拟机配置的通信服务;通过启动的通信服务对所述虚拟机进行通信性能校验。In one aspect, a method for verifying communication performance of a virtual machine includes: a proxy server deploying a communication service script for a virtual machine created in advance; registering a virtual machine in a proxy server where the communication service script is deployed; Machine completes registration and runs the communication service script to start the communication service configured for the virtual machine in the communication service script; and performs communication performance verification on the virtual machine through the started communication service.
另一方面,一种校验虚拟机通信性能的装置,包括:脚本部署模块,用于代理服务器为预先创建的虚拟机部署通信服务脚本;虚拟机注册模块,用于在部署了所述通信服务脚本的代理服务器中进行虚拟机注册;服务启动模块,用于待所述虚拟机完成注册,运行所述通信服务脚本,以启动所述通信服务脚本中为虚拟机配置的通信服务;通信性能校验模块,用于通过启动的通信服务对所述虚拟机进行通信性能校验。In another aspect, an apparatus for verifying communication performance of a virtual machine includes a script deployment module for a proxy server to deploy a communication service script for a pre-created virtual machine, and a virtual machine registration module for deploying the communication service. Virtual machine registration in a scripted proxy server; a service startup module for waiting for the virtual machine to complete registration, and running the communication service script to start a communication service configured for the virtual machine in the communication service script; communication performance calibration An inspection module, configured to verify communication performance of the virtual machine through the started communication service.
另一方面,一种校验虚拟机通信性能的装置,包括处理器及存储器,所述存储器上存储有计算机可读指令,所述计算机可读指令被所述处理器执行时实现如上所述的校验虚拟机通信性能的方法。On the other hand, a device for verifying the communication performance of a virtual machine includes a processor and a memory, and the memory stores computer-readable instructions. When the computer-readable instructions are executed by the processor, the above-mentioned implementation is implemented. Method for verifying the communication performance of a virtual machine.
另一方面,一种计算机可读存储介质,其上存储有计算机程序,所述计算机程序被处理器执行时实现如上所述的校验虚拟机通信性能的方法。In another aspect, a computer-readable storage medium has stored thereon a computer program that, when executed by a processor, implements the method for verifying communication performance of a virtual machine as described above.
上述技术方案中,虚拟机创建之后,代理服务器将为此虚拟机部署通信服务脚本,并注册此虚拟机,待虚拟机完成注册,运行通信服务脚本,以启动通信服务脚本中为虚拟机配置的通信服务,通过启动的通信服务对虚拟机进行通信性能校验,由此,通过通信服务脚本即可自动对预先创建的虚拟机执行通信性能校验,避免人工实现虚拟机的通信性能校验。In the above technical solution, after the virtual machine is created, the proxy server will deploy a communication service script for the virtual machine and register the virtual machine. After the virtual machine has completed registration, run the communication service script to start the communication service script configured for the virtual machine. The communication service verifies the communication performance of the virtual machine through the started communication service. Therefore, the communication service script can automatically perform the communication performance verification on the virtual machine created in advance, thereby avoiding the manual implementation of the communication performance verification of the virtual machine.
此外,通过虚拟机注册使得虚拟机与代理服务器之间实现免密通信,避免人工手动输入虚拟机的登录账号和登录密码,进一步提高了虚拟机通信性能校验的自动化。In addition, the virtual machine registration enables secret-free communication between the virtual machine and the proxy server, avoiding manually entering the login account and login password of the virtual machine manually, which further improves the automation of virtual machine communication performance verification.
应当理解的是,以上的一般描述和后文的细节描述仅是示例性和解释性的,并不能限制本申请。It should be understood that the above general description and the following detailed description are merely exemplary and explanatory, and should not limit the present application.
此处的附图被并入说明书中并构成本说明书的一部分,示出了符合本申请的实施例,并于说明书一起用于解释本申请的原理。The drawings herein are incorporated in and constitute a part of the specification, illustrate embodiments consistent with the present application, and together with the description serve to explain the principles of the application.
图1是根据本申请所涉及的实施环境的示意图。FIG. 1 is a schematic diagram of an implementation environment according to the present application.
图2是根据一示例性实施例示出的一种代理服务器的硬件结构框图。Fig. 2 is a block diagram showing a hardware structure of a proxy server according to an exemplary embodiment.
图3是根据一示例性实施例示出的一种校验虚拟机通信性能的方法的流程图。Fig. 3 is a flow chart showing a method for verifying communication performance of a virtual machine according to an exemplary embodiment.
图4是根据一示例性实施例示出的另一种校验虚拟机通信性能的方法的流程图。Fig. 4 is a flow chart showing another method for verifying communication performance of a virtual machine according to an exemplary embodiment.
图5是根据一示例性实施例示出的另一种校验虚拟机通信性能的方法的流程图。Fig. 5 is a flow chart showing another method for verifying communication performance of a virtual machine according to an exemplary embodiment.
图6是图3对应实施例中步骤330在一个实施例的流程图。FIG. 6 is a flowchart of an embodiment of step 330 in the embodiment corresponding to FIG. 3.
图7是图3对应实施例中步骤370在一个实施例的流程图。FIG. 7 is a flowchart of an embodiment of step 370 in the embodiment corresponding to FIG. 3.
图8是根据一示例性实施例示出的另一种校验虚拟机通信性能的方法的流程图。Fig. 8 is a flow chart showing another method for verifying communication performance of a virtual machine according to an exemplary embodiment.
图9是根据一示例性实施例示出的一种校验虚拟机通信性能的装置的框图。Fig. 9 is a block diagram of a device for checking communication performance of a virtual machine according to an exemplary embodiment.
图10是根据一示例性实施例示出的一种校验虚拟机通信性能的装置的硬件结构框图。Fig. 10 is a block diagram of a hardware structure of an apparatus for verifying communication performance of a virtual machine according to an exemplary embodiment.
通过上述附图,已示出本申请明确的实施例,后文中将有更详细的描述,这些附图和文字描述并不是为了通过任何方式限制本申请构思的范围,而是通过参考特定实施例为本领域技术人员说明本申请的概念。Through the above drawings, specific embodiments of the present application have been shown, which will be described in more detail later. These drawings and text descriptions are not intended to limit the scope of the concept of the present application in any way, but by referring to specific embodiments. Those skilled in the art will explain the concepts of this application.
这里将详细地对示例性实施例执行说明,其示例表示在附图中。下面的描述涉及附图时,除非另有表示,不同附图中的相同数字表示相同或相似的要素。以下示例性实施例中所描述的实施方式并不代表与本申请相一致的所有实施方式。相反,它们仅是与如所附权利要求书中所详述的、本申请的一些方面相一致的装置和方法的例子。Exemplary embodiments will be described in detail herein, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numerals in different drawings represent the same or similar elements unless otherwise indicated. The implementations described in the following exemplary embodiments do not represent all implementations consistent with this application. Rather, they are merely examples of devices and methods consistent with certain aspects of the application as detailed in the appended claims.
图1为一种校验虚拟机通信性能的方法所涉及的实施环境的示意图。该实施环境包括虚拟机110、代理服务器130和自动化平台150。FIG. 1 is a schematic diagram of an implementation environment involved in a method for verifying communication performance of a virtual machine. The implementation environment includes a virtual machine 110, a proxy server 130, and an automation platform 150.
其中,代理服务器130与自动化平台150之间通过有线或者无线建立通信连接,实现代理服务器130与自动化平台150之间的交互。Among them, the proxy server 130 and the automation platform 150 establish a communication connection through wired or wireless, so as to realize the interaction between the proxy server 130 and the automation platform 150.
通过代理服务器130与自动化平台150之间的交互,自动化平台150将通信服务脚本上传至代理服务器130。Through the interaction between the proxy server 130 and the automation platform 150, the automation platform 150 uploads the communication service script to the proxy server 130.
对于代理服务器130而言,在接收到通信服务脚本之后,便为预先创建的虚拟机110部署通信服务脚本,进而基于通信服务脚本自动完成虚拟机110的通信性能校验。For the proxy server 130, after receiving the communication service script, the communication service script is deployed for the virtual machine 110 created in advance, and the communication performance verification of the virtual machine 110 is automatically completed based on the communication service script.
图2是根据一示例性实施例示出的一种代理服务器的硬件结构框图。需要说明的是,该代理服务器只是一个适配于本申请的示例,不能认为是提供了对本申请的使用范围的任何限制。该代理服务器也不能解释为需要依赖于或者必须具有图2中示出的示例性的代理服务器200中的一个或者多个组件。Fig. 2 is a block diagram showing a hardware structure of a proxy server according to an exemplary embodiment. It should be noted that the proxy server is only an example adapted to the present application and cannot be considered to provide any limitation on the scope of use of the present application. This proxy server also cannot be interpreted as needing to rely on or having to have one or more components in the exemplary proxy server 200 shown in FIG. 2.
该代理服务器200的硬件结构可因配置或者性能的不同而产生较大的差异,如图2所示,代理服务器200包括:电源210、接口230、至少一存储器250、以及至少一中央处理器(CPU, Central Processing Units)270。The hardware structure of the proxy server 200 may vary greatly due to different configurations or performances. As shown in FIG. 2, the proxy server 200 includes: a power supply 210, an interface 230, at least one memory 250, and at least one central processing unit ( CPU, Central Processing Units) 270.
其中,电源210用于为代理服务器200上的各硬件设备提供工作电压。The power supply 210 is used to provide working voltages for each hardware device on the proxy server 200.
接口230包括至少一有线或无线网络接口231、至少一串并转换接口233、至少一输入输出接口235以及至少一USB接口237等,用于与外部设备通信。The interface 230 includes at least one wired or wireless network interface 231, at least one serial-to-parallel conversion interface 233, at least one input-output interface 235, and at least one USB interface 237, etc., for communicating with external devices.
存储器250作为资源存储的载体,可以是只读存储器、随机存储器、磁盘或者光盘等,其上所存储的资源包括操作系统251、应用程序253及数据255等,存储方式可以是短暂存储或者永久存储。其中,操作系统251用于管理与控制代理服务器200上的各硬件设备以及应用程序253,以实现中央处理器270对海量数据255的计算与处理,其可以是Windows ServerTM、Mac OS XTM、UnixTM、LinuxTM、FreeBSDTM等。应用程序253是基于操作系统251之上完成至少一项特定工作的计算机程序,其可以包括至少一模块(图2中未示出),每个模块都可以分别包含有对代理服务器200的一系列计算机可读指令。数据255可以是存储于磁盘中的照片、图片等。The memory 250 serves as a carrier for resource storage, and may be a read-only memory, a random access memory, a magnetic disk, or an optical disk. The resources stored on the memory 250 include an operating system 251, an application program 253, and data 255. The storage method may be temporary storage or permanent storage. . The operating system 251 is used to manage and control various hardware devices and application programs 253 on the proxy server 200 to implement the calculation and processing of the massive data 255 by the central processing unit 270, which may be Windows ServerTM, Mac OS XTM, UnixTM, LinuxTM, FreeBSDTM, etc. The application program 253 is a computer program that completes at least one specific task based on the operating system 251. The application program 253 may include at least one module (not shown in FIG. 2), and each module may separately include a series of procedures for the proxy server 200. Computer readable instructions. The data 255 may be photos, pictures, and the like stored on the disk.
中央处理器270可以包括一个或多个以上的处理器,并设置为通过总线与存储器250通信,用于运算与处理存储器250中的海量数据255。The central processing unit 270 may include one or more processors, and is configured to communicate with the memory 250 through a bus, for calculating and processing the massive data 255 in the memory 250.
如上面所详细描述的,适用本申请的代理服务器200将通过中央处理器270读取存储器250中存储的一系列计算机可读指令的形式来完成校验虚拟机通信性能的方法。As described in detail above, the proxy server 200 applicable to the present application will complete the method for verifying the communication performance of the virtual machine by reading the series of computer-readable instructions stored in the memory 250 through the central processing unit 270.
此外,通过硬件电路或者硬件电路结合软件也能同样实现本申请,因此,实现本申请并不限于任何特定硬件电路、软件以及两者的组合。In addition, the present application can also be implemented by a hardware circuit or a hardware circuit in combination with software. Therefore, the implementation of the present application is not limited to any specific hardware circuit, software, or a combination of the two.
请参阅图3,在一示例性实施例中,一种校验虚拟机通信性能的方法适用于图1所示实施环境的代理服务器,该代理服务器的结构可以如图2所示。Referring to FIG. 3, in an exemplary embodiment, a method for verifying communication performance of a virtual machine is applicable to a proxy server of the implementation environment shown in FIG. 1, and the structure of the proxy server may be shown in FIG. 2.
该种校验虚拟机通信性能的方法可以由代理服务器执行,可以包括以下步骤:This method for checking the communication performance of a virtual machine may be executed by a proxy server, and may include the following steps:
步骤310,代理服务器为预先创建的虚拟机部署通信服务脚本。Step 310: The proxy server deploys a communication service script for the virtual machine created in advance.
首先说明的是,通信服务脚本,存储于代理服务器中,用于为预先创建的虚拟机执行通信性能校验。First explained is that the communication service script is stored in the proxy server and is used to perform communication performance verification for the pre-created virtual machine.
通信性能校验,实质是校验预先创建的虚拟机与外部设备之间数据传输是否正常,例如,外部设备可以是代理服务器,还可以是其他虚拟机。The communication performance verification is to verify whether the data transmission between the pre-created virtual machine and the external device is normal. For example, the external device may be a proxy server or another virtual machine.
在此补充说明的是,本实施例中,如果外部设备是其他虚拟机,则虚拟机所传输的数据是通过代理服务器转发至其他虚拟机的,以便于代理服务器能够基于所部署的通信服务脚本而对此虚拟机进行通信性能校验。This supplementary explanation is that in this embodiment, if the external device is another virtual machine, the data transmitted by the virtual machine is forwarded to the other virtual machine through the proxy server, so that the proxy server can be based on the deployed communication service script And the communication performance verification of this virtual machine.
应当理解,虚拟机与外部设备之间的数据传输遵循通信协议,此通信协议包括http协议(Hypertext Transfer Protocol,超文本传输协议)、tcp协议(Transmission Control Protocol,传输控制协议)、udp协议(User Datagram Protocol,用户数据报协议)等等,换而言之,虚拟机与外部设备之间传输数据的类型不同,所遵循的通信协议则有所区别。It should be understood that the data transmission between the virtual machine and the external device follows a communication protocol, and this communication protocol includes the http protocol (Hypertext Transfer Protocol, Hypertext Transfer Protocol), tcp protocol (Transmission Control Protocol, Transmission Control Protocol), and udp protocol (User Datagram Protocol (User Datagram Protocol) and so on. In other words, the type of data transmitted between the virtual machine and the external device is different, and the communication protocol followed is different.
例如,虚拟机与代理服务器之间进行业务数据传输时,将遵循http协议,而虚拟机与代理服务器之间进行信令传输时,则可以遵循tcp协议或者udp协议。For example, when business data is transmitted between the virtual machine and the proxy server, it will follow the http protocol, while when signaling is transmitted between the virtual machine and the proxy server, it can follow the tcp protocol or udp protocol.
为此,通信服务器脚本将根据虚拟机遵循的通信协议为虚拟机配置相应的通信服务。例如,通信协议可以是http协议、tcp协议、或者udp协议,相应地,通信服务器为虚拟机配置的通信服务可以是http服务、tcp服务、或者udp服务。To this end, the communication server script configures the corresponding communication service for the virtual machine according to the communication protocol followed by the virtual machine. For example, the communication protocol may be the http protocol, the tcp protocol, or the udp protocol. Accordingly, the communication service configured by the communication server for the virtual machine may be the http service, the tcp service, or the udp service.
由上可知,在代理服务器中为预先创建的虚拟机部署了通信服务脚本之后,即可根据通信服务脚本中为虚拟机配置的通信服务校验此虚拟机与外部设备之间的数据传输是否正常。It can be known from the above that after the communication service script is deployed for the pre-created virtual machine in the proxy server, it can be checked whether the data transmission between this virtual machine and the external device is normal according to the communication service configured for the virtual machine in the communication service script .
在一实施例的具体实现中,对于代理服务器而言,通信服务脚本是测试人员调用自动化平台上传至代理服务器的,以此提高通信校验的自动化。其中,自动化平台可以是运行于用户设备(例如笔记本电脑)的客户端,此客户端可以是应用程序形式,还可以是网页形式,在此不进行限定。In a specific implementation of an embodiment, for the proxy server, the communication service script is uploaded by the tester to the proxy server through an automation platform, thereby improving the automation of communication verification. The automation platform may be a client running on a user device (such as a laptop), and the client may be in the form of an application program or a web page, which is not limited herein.
值得一提的是,通信服务脚本,可以与预先创建的虚拟机一一对应,即通信服务脚本中仅为此虚拟机配置了通信服务,还可以是由预先创建的多个虚拟机共享的,即通信服务脚本中包含为多个虚拟机分别配置的多个通信服务,在此不加以限定。It is worth mentioning that the communication service script can correspond one-to-one with a pre-created virtual machine, that is, the communication service script is configured with a communication service only for this virtual machine, or it can be shared by multiple pre-created virtual machines. That is, the communication service script includes multiple communication services configured for multiple virtual machines, which are not limited herein.
步骤330,在部署了通信服务脚本的代理服务器中进行虚拟机注册。Step 330: Register a virtual machine in a proxy server where a communication service script is deployed.
虚拟机注册,实现了代理服务器与虚拟机之间的免密通信,使得完成注册的虚拟机便可以直接调用代理服务器所部署通信服务脚本中为虚拟机配置的通信服务,进而根据所调用通信服务对虚拟机进行通信性能校验,以此避免测试人员在校验过程中手动输入账号和密码,进一步提高了虚拟机通信性能校验的自动化。The virtual machine registration realizes the confidential communication between the proxy server and the virtual machine, so that the registered virtual machine can directly call the communication service configured for the virtual machine in the communication service script deployed by the proxy server, and then according to the called communication service Perform communication performance verification on the virtual machine to avoid testers manually entering account numbers and passwords during the verification process, further improving the automation of virtual machine communication performance verification.
其中,虚拟机注册,可以通过SSH(Secure Shell)命令实现,还可以通过密钥对来验证虚拟机身份的方式实现,在此并未加以限定。Among them, the virtual machine registration can be implemented through SSH (Secure Shell) commands, and it can also be implemented by means of a key pair to verify the identity of the virtual machine, which is not limited here.
步骤350,待虚拟机完成注册,运行通信服务脚本,以启动通信服务脚本中为虚拟机配置的通信服务。Step 350: After the virtual machine is registered, the communication service script is run to start the communication service configured for the virtual machine in the communication service script.
应当理解,服务启动是为了代理服务器能够执行相应的功能,由于代理服务器需要执行的功能很多,为了保证代理服务器的开机效率,并非所有服务都随着代理服务器的开机而启动。换而言之,代理服务器可以在需要执行某个功能时,方才启动相应的服务。It should be understood that the service startup is to enable the proxy server to perform corresponding functions. Since the proxy server needs to perform many functions, in order to ensure the startup efficiency of the proxy server, not all services are started as the proxy server is started. In other words, the proxy server can start the corresponding service only when it needs to perform a certain function.
基于此,通信服务脚本中为虚拟机配置的通信服务启动,是为了代理服务器能够对此虚拟机执行通信性能校验功能。Based on this, the communication service configured for the virtual machine in the communication service script is started so that the proxy server can perform the communication performance verification function for the virtual machine.
具体地,当虚拟机完成注册,便可通过通信服务脚本的运行使得为此虚拟机配置的通信服务启动,以便于通过通信服务校验此虚拟机与外部设备之间的数据传输是否正常,即跳转执行步骤370。Specifically, when the virtual machine is registered, the communication service configured for the virtual machine can be started by running the communication service script, so as to verify whether the data transmission between the virtual machine and the external device is normal through the communication service, that is, Go to step 370.
上述过程,通过服务启动模式来控制虚拟机通信性能校验的执行,将有利于提高代理服务器的处理效率,避免不必要的内存损耗。In the above process, controlling the execution of the communication performance verification of the virtual machine through the service startup mode will help improve the processing efficiency of the proxy server and avoid unnecessary memory loss.
步骤370,通过启动的通信服务对虚拟机进行通信性能校验。Step 370: Perform communication performance verification on the virtual machine through the started communication service.
也就是说,随着通信服务启动,虚拟机与外部设备之间将遵循通信服务相应的通信协议进行数据传输,以通过数据传输是否正常来判断虚拟机是否通过通信性能校验。That is, as the communication service starts, the virtual machine and the external device will perform data transmission in accordance with the corresponding communication protocol of the communication service, so as to determine whether the virtual machine passes the communication performance check based on whether the data transmission is normal.
通过如上所述的过程,实现了虚拟机通信性能校验的自动化,并且,通过虚拟机注册使得虚拟机与代理服务器之间实现免密通信,避免人工手动输入虚拟机的登录账号和登录密码,进一步地提高了虚拟机通信性能校验的自动化。Through the process described above, the communication performance verification of the virtual machine is automated, and through the registration of the virtual machine, the secret communication between the virtual machine and the proxy server is realized, avoiding manually entering the login account and password of the virtual machine manually. The automation of communication performance verification of virtual machines is further improved.
请参阅图4,在一示例性实施例中,如上所述的方法还可以包括以下步骤:Referring to FIG. 4, in an exemplary embodiment, the method described above may further include the following steps:
步骤410,获取用于标识虚拟机在网络中位置的IP地址,并针对虚拟机的通信对象所在网络配置虚拟机的访问权限。Step 410: Obtain an IP address used to identify the location of the virtual machine in the network, and configure the access right of the virtual machine for the network where the communication object of the virtual machine is located.
IP(Internet Protocol,网络互连协议)地址,用于标识虚拟机在网络中的位置。应当理解,网络可以是公共网络,例如,外网,还可以是私有网络,例如,内网专线或者局域网,由此,此IP地址可以隶属于公共网络,也可以隶属于私有网络。An IP (Internet Protocol) address is used to identify the location of a virtual machine on the network. It should be understood that the network may be a public network, such as an external network, or a private network, such as an intranet dedicated line or a local area network. Therefore, this IP address may belong to a public network or a private network.
针对IP地址的获取,可以是自动获取,还可以是由测试人员人工分配,在此并不进行限定。The IP address can be obtained automatically or manually by a tester, which is not limited here.
进一步地,由于虚拟机不仅可以和代理服务器之间传输数据,还可以和其他虚拟机之间传输数据,如果进行数据传输的虚拟机所属网络不同,处于安全性考虑,是无法直接通信的。Further, since a virtual machine can transfer data not only with a proxy server, but also with other virtual machines, if the virtual machine to which the data is transferred belongs to a different network, it cannot be directly communicated due to security considerations.
基于此,在创建虚拟机之前,还需要针对虚拟机的通信对象所在网络为虚拟机配置访问权限,进而保障数据传输过程的安全性。Based on this, before creating a virtual machine, it is also necessary to configure access rights for the virtual machine for the network where the communication object of the virtual machine is located, thereby ensuring the security of the data transmission process.
例如,当虚拟机A的通信对象为虚拟机B,假设虚拟机A处于公共网络,而虚拟机B处于私有网络,则设置虚拟机A对虚拟机B的访问权限是只读,虚拟机B对虚拟机A的访问权限是读写。也可以理解为,由于虚拟机B处于私有网络,因此,虚拟机A对虚拟机B的访问受限。For example, when the communication object of virtual machine A is virtual machine B, suppose that virtual machine A is on a public network and virtual machine B is on a private network, then set the access right of virtual machine A to virtual machine B to be read-only, and virtual machine B to The access right of virtual machine A is read and write. It can also be understood that, since the virtual machine B is in a private network, the access of the virtual machine A to the virtual machine B is limited.
又或者,当虚拟机A的通信对象为虚拟机C,假设虚拟机A和虚拟机C均处于公共网络,则设置虚拟机A对虚拟机C的访问权限是读写,虚拟机C对虚拟机A的访问权限是读写,即虚拟机A与虚拟机C之间可以相互访问。Or, when the communication object of the virtual machine A is the virtual machine C, assuming that the virtual machine A and the virtual machine C are on a public network, set the access right of the virtual machine A to the virtual machine C to read and write, and the virtual machine C to the virtual machine The access right of A is read and write, that is, virtual machine A and virtual machine C can access each other.
需要说明的是,虚拟机之间的数据传输基于代理服务器,即由代理服务器转发,而对于发送方而言,虚拟机之间的通信是透明的,发送方并不会感知到数据经由代理服务器转发,以此充分保证了用户的数据传输体验。It should be noted that data transmission between virtual machines is based on a proxy server, that is, forwarded by the proxy server. For the sender, communication between virtual machines is transparent, and the sender does not feel that the data passes through the proxy server. Forwarding, which fully guarantees the user's data transmission experience.
步骤430,根据虚拟机的IP地址和访问权限创建虚拟机。Step 430: Create a virtual machine according to the virtual machine's IP address and access authority.
在虚拟机创建完毕之后,虚拟机便可基于IP地址与外部设备之间进行符合虚拟机访问权限的数据传输。After the virtual machine is created, the virtual machine can perform data transmission in accordance with the access rights of the virtual machine between the virtual machine and the external device based on the IP address.
在一实施例的具体实现中,虚拟机的创建,是基于自动化平台调用实现的。具体地,测试人员调用自动化平台,向自动化平台所提供的API接口输入虚拟机参数,以完成虚拟机创建,其中,虚拟机参数包括虚拟机的IP地址和访问权限。In a specific implementation of an embodiment, the creation of a virtual machine is implemented based on an automation platform call. Specifically, the tester invokes the automation platform and enters virtual machine parameters into the API interface provided by the automation platform to complete the creation of the virtual machine, where the virtual machine parameters include the IP address and access rights of the virtual machine.
请参阅图5,在一示例性实施例中,步骤310之前,如上所述的方法还可以包括以下步骤:Referring to FIG. 5, in an exemplary embodiment, before step 310, the method described above may further include the following steps:
步骤510,创建通信服务脚本。Step 510: Create a communication service script.
通信服务脚本实质是一个可编辑文件,由此,通信服务脚本的创建,相当于新建一个可编辑文件,以便于后续在新建的可编辑文件中存储用于校验虚拟机通信性能的相关内容,例如,相关内容包括用于执行通信协议的通信服务、以及与通信服务对应的传输端口。The communication service script is essentially an editable file. Therefore, the creation of the communication service script is equivalent to creating a new editable file, so that the related content used to verify the communication performance of the virtual machine can be stored in the newly editable file. For example, the related content includes a communication service for executing a communication protocol, and a transmission port corresponding to the communication service.
步骤530,按照虚拟机遵循的通信协议配置通信服务至通信服务脚本。Step 530: Configure the communication service to the communication service script according to the communication protocol followed by the virtual machine.
也就是说,通信服务,指示了虚拟机所遵循的通信协议,以使通信服务启动时,虚拟机与外部设备之间的数据传输是遵循此通信协议的。In other words, the communication service indicates the communication protocol followed by the virtual machine, so that when the communication service starts, the data transmission between the virtual machine and the external device follows this communication protocol.
步骤550,在通信服务脚本中配置与通信服务对应的传输端口。Step 550: Configure a transmission port corresponding to the communication service in the communication service script.
应当理解,虚拟机与代理服务器之间的数据传输,虚拟机需要获知待传输的数据将通过代理服务器所提供的哪个传输端口进行传输。基于此,通信服务脚本配置时,需要完成通信服务对应传输端口的配置。It should be understood that for data transmission between a virtual machine and a proxy server, the virtual machine needs to know which transmission port provided by the proxy server is used for data to be transmitted. Based on this, when the communication service script is configured, the configuration of the corresponding transmission port of the communication service needs to be completed.
由此,当通信服务脚本运行时,通信服务启动,相应地,对应于此通信服务的传输端口即被此通信服务所占用,以为虚拟机与代理服务器之间传输数据。Therefore, when the communication service script runs, the communication service starts, and accordingly, the transmission port corresponding to the communication service is occupied by the communication service to transfer data between the virtual machine and the proxy server.
在一实施例的具体实现中,传输端口是指符合TCP/IP协议的端口,其对应的端口号范围是0~65535。进一步地,由于端口号0~1023所对应的端口通常无法动态分配,因此,以端口号1024~65535的端口作为可配置于通信服务的传输端口。In a specific implementation of the embodiment, the transmission port refers to a port conforming to the TCP / IP protocol, and the corresponding port number ranges from 0 to 65535. Further, since the ports corresponding to the port numbers 0 to 1023 cannot usually be dynamically allocated, the ports with the port numbers 1024 to 65535 are used as the transmission ports configurable to the communication service.
对于代理服务器而言,通过传输端口接收到的数据即是虚拟机按照传输端口所符合的传输协议(例如TCP/IP协议)进行数据包封装的。也可以理解为,该传输端口中传输的数据首先需要遵循对应通信服务所指示的通信协议,还需要遵循传输端口所符合的传输协议。For the proxy server, the data received through the transmission port is the data package encapsulated by the virtual machine according to the transmission protocol (such as TCP / IP protocol) that the transmission port complies with. It can also be understood that the data transmitted in the transmission port first needs to follow the communication protocol indicated by the corresponding communication service, and also needs to follow the transmission protocol that the transmission port complies with.
例如,通信服务脚本中配置了http服务及对应的传输端口A,因此,虚拟机待传输的数据首先遵循http服务所指示的http协议进行了第一次封装,然后基于传输端口A所符合的传输协议进行了第二次封装,进而实现由传输端口A传输至代理服务器。For example, the communication service script is configured with the http service and the corresponding transmission port A. Therefore, the data to be transmitted by the virtual machine is firstly encapsulated according to the http protocol indicated by the http service, and then based on the transmission that the transmission port A complies with. The protocol was encapsulated for the second time, and then transmitted from transmission port A to the proxy server.
在一示例性实施例中,步骤330可以包括以下步骤:In an exemplary embodiment, step 330 may include the following steps:
调用预先配置生成的注册命令为虚拟机在代理服务器中注册。Call the pre-configuration registration command to register the virtual machine with the proxy server.
举例来说,注册命令是测试人员预先配置生成的SSH命令,例如sshpass命令,则虚拟机注册通过sshpass命令实现。For example, the registration command is an SSH command generated by a tester in advance, such as the sshpass command, and the virtual machine registration is implemented by the sshpass command.
具体地,sshpass命令如下所示:Specifically, the sshpass command is as follows:
'''sshpass -p "%s" scp %s root@%s:/var/''' %(password, src_file, ip)。'' 'sshpass -p "% s" scp% s root @% s: / var / '' '% (password, src_file, ip).
其中,-p:密码参数,表示虚拟机登录密码;“%s”:密码形参,与password实参对应;scp %s:文件形参,与src_file实参对应,用于指示存储虚拟机登录账号的文件;root @%s:ip地址形参,与ip实参对应,用于指示待注册的虚拟机IP地址。Among them, -p: password parameter, which indicates the virtual machine login password; "% s": password parameter, corresponding to the password argument; scp% s: file parameter, corresponding to the src_file argument, which is used to indicate the storage virtual machine login Account file; root @% s: The ip address parameter, corresponding to the ip actual parameter, is used to indicate the IP address of the virtual machine to be registered.
由此,在代理服务器中执行上述sshpass命令之后,被实参“ip”所标识的虚拟机即按照实参“src_file”所标识文件中的登录账号、实参“password”所标识的登录账号自动登录,进而实现与代理服务器之间的免密通信,避免人工输入虚拟机的登录账号和密码。Therefore, after the above sshpass command is executed in the proxy server, the virtual machine identified by the actual parameter "ip" is automatically based on the login account in the file identified by the actual parameter "src_file" and the login account identified by the actual parameter "password" Log in to achieve secret-free communication with the proxy server and avoid manually entering the login account and password of the virtual machine.
请参阅图6,在一示例性实施例中,步骤330可以包括以下步骤:Referring to FIG. 6, in an exemplary embodiment, step 330 may include the following steps:
步骤331,接收虚拟机发送的公钥。Step 331: Receive the public key sent by the virtual machine.
其中,公钥属于虚拟机为注册生成的密钥对。The public key belongs to the key pair generated by the virtual machine for registration.
也就是说,虚拟机为了在代理服务器中进行虚拟机注册,将根据非对称加密算法生成密钥对,此密钥对包括执行加密的私钥和执行解密的公钥。That is, in order to register the virtual machine with the proxy server, the virtual machine will generate a key pair according to an asymmetric encryption algorithm, and this key pair includes a private key that performs encryption and a public key that performs decryption.
此非对称加密算法包括但不限于:RSA算法、Elgamal算法、背包算法、Rabin算法、D-H算法、ECC(椭圆曲线加密)算法等等,在此并未进行限定。This asymmetric encryption algorithm includes, but is not limited to: RSA algorithm, Elgamal algorithm, backpack algorithm, Rabin algorithm, D-H algorithm, ECC (Elliptic Curve Cryptography) algorithm, etc., which are not limited here.
基于此,如果虚拟机希望在代理服务器中进行虚拟机注册,将向代理服务器发送密钥对中执行解密的公钥。Based on this, if the virtual machine wishes to register the virtual machine with the proxy server, it will send the public key of the key pair to perform decryption to the proxy server.
步骤333,当接收到虚拟机根据密钥对中私钥发起的身份验证请求,响应身份验证请求,根据公钥对虚拟机进行身份验证。In step 333, when an authentication request initiated by the virtual machine according to the private key in the key pair is received, the virtual machine is authenticated according to the public key in response to the authentication request.
虚拟机所进行的身份验证,本质上是根据密钥对进行加密解密的过程。The identity verification performed by the virtual machine is essentially a process of encrypting and decrypting according to a key pair.
具体地,虚拟机侧,根据密钥对中的私钥生成加密信息,并以此发起身份验证请求。Specifically, the virtual machine side generates encrypted information according to the private key in the key pair, and uses this to initiate an identity verification request.
代理服务器侧,在接收到身份验证请求之后,即从中提取加密信息,并根据密钥对中的公钥对加密信息进行解密处理。After receiving the authentication request, the proxy server extracts the encrypted information from it and decrypts the encrypted information according to the public key in the key pair.
如果解密成功,则虚拟机通过身份验证,跳转执行步骤335。If the decryption is successful, the virtual machine passes identity verification, and step 335 is executed.
反之,如果解密失败,则虚拟机身份验证失败,表明此虚拟机并未在代理服务器中进行过虚拟机注册,故而不允许此虚拟机与代理服务器之间进行免密通信。Conversely, if the decryption fails, the authentication of the virtual machine fails, which indicates that the virtual machine has not been registered with the proxy server, and therefore the secret communication between the virtual machine and the proxy server is not allowed.
步骤335,如果虚拟机通过身份验证,则完成虚拟机在代理服务器中的注册。In step 335, if the virtual machine passes the authentication, registration of the virtual machine in the proxy server is completed.
在上述过程中,虚拟机注册之后,就可以不需要每次都由测试人员手动输入虚拟机的登录账号和登录密码进行登录,实现了虚拟机与代理服务器之间的免密通信,有利于提高虚拟机通信性能校验的自动化。In the above process, after the virtual machine is registered, there is no need to manually enter the virtual machine's login account and login password to log in each time by the tester, which realizes the non-secret communication between the virtual machine and the proxy server, which is beneficial to improve Automation of communication performance verification for virtual machines.
请参阅图7,在一示例性实施例中,步骤370可以包括以下步骤:Referring to FIG. 7, in an exemplary embodiment, step 370 may include the following steps:
步骤371,监听通信服务对应的传输端口,建立虚拟机与代理服务器之间的传输链路。Step 371: Monitor the transmission port corresponding to the communication service, and establish a transmission link between the virtual machine and the proxy server.
步骤373,通过传输链路接收虚拟机发起的数据传输请求。Step 373: Receive a data transmission request initiated by the virtual machine through a transmission link.
传输端口,用于在虚拟机与代理服务器之间建立传输链路,以实现虚拟机与代理服务器之间的数据传输。A transmission port is used to establish a transmission link between the virtual machine and the proxy server to implement data transmission between the virtual machine and the proxy server.
基于所建立的传输链路,虚拟机将向代理服务器发起数据传输请求,以使代理服务器对此数据传输请求进行响应处理,进而执行虚拟机的通信性能校验功能。Based on the established transmission link, the virtual machine will initiate a data transmission request to the proxy server, so that the proxy server responds to the data transmission request, and then performs the communication performance verification function of the virtual machine.
步骤375,对数据传输请求进行响应处理,并通过传输链路向虚拟机返回请求响应,以根据请求响应判断虚拟机是否通过通信性能校验。Step 375: Perform response processing on the data transmission request, and return a request response to the virtual machine through the transmission link, so as to determine whether the virtual machine passes the communication performance check according to the request response.
应当理解,虚拟机既可以和代理服务器之间进行数据传输,也可以和其他虚拟机之间进行数据传输,也就是说,数据传输请求所携带的数据的目标接收方,即虚拟机的通信对象可能有所不同。It should be understood that the virtual machine can perform data transmission between the proxy server and other virtual machines, that is, the target receiver of the data carried by the data transmission request, that is, the communication object of the virtual machine May be different.
为此,在代理服务器接收到数据传输请求之后,便能够根据数据传输请求获知其中携带数据的目标接收方,进而根据目标接收方对此数据传输请求进行响应处理。For this reason, after the proxy server receives the data transmission request, it can learn the target receiver carrying the data according to the data transmission request, and then respond to the data transmission request according to the target receiver.
如果数据传输请求是发送给代理服务器的,则代理服务器接收到此数据传输请求,便向虚拟机返回请求响应。If the data transfer request is sent to the proxy server, the proxy server receives the data transfer request and returns a request response to the virtual machine.
如果数据传输请求是发送给其他虚拟机的,则代理服务器先将此数据传输请求转发至其他虚拟机,进而向虚拟机返回请求响应。If the data transfer request is sent to another virtual machine, the proxy server first forwards the data transfer request to other virtual machines, and then returns a request response to the virtual machine.
其中,请求响应用于指示代理服务器已完成对所接收的数据传输请求的响应处理。The request response is used to indicate that the proxy server has completed response processing to the received data transmission request.
进一步地,对于数据的目标接收方为其他虚拟机时,对于代理服务器而言,在一实施例中,请求响应可以是在完成数据传输请求转发至其他虚拟机之后,即返回请求响应至虚拟机,在另一实施例中,请求响应则是在确定其他虚拟机接收到数据传输请求之后,才向虚拟机返回请求响应。Further, when the target receiver of the data is another virtual machine, for the proxy server, in one embodiment, the request response may be a request response returned to the virtual machine after the data transmission request is forwarded to the other virtual machine. In another embodiment, the request response is that the request response is returned to the virtual machine only after it is determined that other virtual machines have received the data transmission request.
由此,对于虚拟机而言,如果接收到请求响应,即可视为虚拟机与外部设备之间能够正常收发数据,进而判定虚拟机通过通信性能校验。Therefore, for a virtual machine, if a request response is received, it can be considered that the virtual machine and the external device can normally send and receive data, and it is further determined that the virtual machine passes the communication performance check.
进一步地,请参阅图8,在一示例性实施例中,如上所述的方法还可以包括以下步骤:Further, referring to FIG. 8, in an exemplary embodiment, the method described above may further include the following steps:
步骤610,如果虚拟机接收到请求响应,则获取用于记录虚拟机操作行为的日志信息。Step 610: If the virtual machine receives the request response, obtain log information for recording the operation behavior of the virtual machine.
首先说明的是,虚拟机操作行为包括但不限于:请求发起行为,请求响应接收行为等等。相应地,日志信息包括但不限于:虚拟机发送请求的时间、虚拟机接收请求响应的时间、传输字节流、传输状态等等。The first explanation is that the virtual machine operation behavior includes, but is not limited to, a request initiation behavior, a request response reception behavior, and the like. Correspondingly, the log information includes but is not limited to: the time when the virtual machine sends the request, the time when the virtual machine receives the request response, the byte stream transmitted, the transmission status, and so on.
其中,针对虚拟机发送请求的时间与虚拟机接收请求响应的时间,计算二者之间的时间差,即可确定本次数据传输请求的请求传输时间。The time difference between the time when the virtual machine sends the request and the time when the virtual machine receives the request response is calculated to determine the request transmission time of the current data transmission request.
传输字节流表示数据传输过程中每秒传输的字节数,不同通信协议对传输字节流有相应的限制。The transmission byte stream indicates the number of bytes transmitted per second during data transmission. Different communication protocols have corresponding restrictions on the transmission byte stream.
传输状态实质上用于表征数据传输过程中的传输速度,根据用户对传输速度的容忍度,即可确定虚拟机的传输状态是否存在异常。The transmission status is basically used to characterize the transmission speed in the data transmission process. According to the user's tolerance for the transmission speed, it can be determined whether the transmission status of the virtual machine is abnormal.
基于此,通过日志信息中记录的上述信息,即可判断虚拟机是否通过通信性能校验。Based on this, the above information recorded in the log information can be used to determine whether the virtual machine passes the communication performance check.
步骤630,根据日志信息判断虚拟机是否通过通信性能校验。Step 630: Determine whether the virtual machine passes the communication performance check according to the log information.
如果日志信息中的请求传输时间未超过设定时间阈值,则判定虚拟机通过通信性能校验。和/或,If the request transmission time in the log information does not exceed the set time threshold, it is determined that the virtual machine passes the communication performance check. and / or,
如果日志信息中的传输字节流符合通信服务所指示的通信协议,则判定虚拟机通过通信性能校验。和/或,If the transmission byte stream in the log information conforms to the communication protocol indicated by the communication service, it is determined that the virtual machine passes the communication performance check. and / or,
如果日志信息中传输状态所表征的传输速度不小于设定速度阈值,则视为虚拟机的传输状态正常,进而判定虚拟机通过通信性能校验。If the transmission speed represented by the transmission status in the log information is not less than the set speed threshold, it is considered that the transmission status of the virtual machine is normal, and it is further determined that the virtual machine passes the communication performance check.
其中,设定时间阈值、设定速度阈值可以根据实际应用场景的需求而灵活地调整。例如,在对虚拟机通信性能要求较高的应用场景,配置较小的是设定时间阈值,并配置较大的设定速度阈值。The set time threshold and the set speed threshold can be flexibly adjusted according to the requirements of the actual application scenario. For example, in an application scenario with high requirements for the communication performance of a virtual machine, the smaller configuration is a set time threshold, and a larger set speed threshold is configured.
在上述实施例的作用下,利用日志信息所记录的虚拟机操作行为来判断虚拟机是否通过通信性能校验,避免人工实现,不仅充分地保证了虚拟机通信性能校验的准确性,而且进一步有利于提高虚拟机通信性能校验的自动化。Under the function of the above embodiment, the operation behavior of the virtual machine recorded in the log information is used to determine whether the virtual machine passes the communication performance check, which avoids manual implementation. This not only fully ensures the accuracy of the virtual machine communication performance check, but further Conducive to improving the automation of virtual machine communication performance verification.
下述为本申请装置实施例,可以用于执行本申请所涉及的校验虚拟机通信性能的方法。对于本申请装置实施例中未披露的细节,请参照本申请所涉及的校验虚拟机通信性能的方法的实施例。The following is a device embodiment of the present application, which can be used to execute the method for verifying communication performance of a virtual machine involved in the present application. For details not disclosed in the device embodiments of this application, please refer to the embodiments of the method for checking the communication performance of a virtual machine involved in this application.
请参阅图9,在一示例性实施例中,一种校验虚拟机通信性能的装置900包括但不限于:脚本部署模块910、虚拟机注册模块930、服务启动模块950和通信性能校验模块970。Referring to FIG. 9, in an exemplary embodiment, an apparatus 900 for verifying communication performance of a virtual machine includes, but is not limited to, a script deployment module 910, a virtual machine registration module 930, a service startup module 950, and a communication performance verification module. 970.
其中,脚本部署模块910用于代理服务器为预先创建的虚拟机部署通信服务脚本。The script deployment module 910 is used by a proxy server to deploy a communication service script for a virtual machine created in advance.
虚拟机注册模块930用于在部署了通信服务脚本的代理服务器中进行虚拟机注册。The virtual machine registration module 930 is configured to perform virtual machine registration in a proxy server where a communication service script is deployed.
服务启动模块950用于待虚拟机完成注册,运行通信服务脚本,以启动通信服务脚本中为虚拟机配置的通信服务。The service startup module 950 is configured to wait for the virtual machine to complete registration and run a communication service script to start a communication service configured for the virtual machine in the communication service script.
通信性能校验模块970用于通过启动的通信服务对虚拟机进行通信性能校验。The communication performance verification module 970 is configured to verify the communication performance of the virtual machine through the started communication service.
需要说明的是,上述实施例所提供的校验虚拟机通信性能的装置在进行校验虚拟机通信性能的处理时,仅以上述各功能模块的划分进行举例说明,实际应用中,可以根据需要而将上述功能分配由不同的功能模块完成,即校验虚拟机通信性能的装置的内部结构将划分为不同的功能模块,以完成以上描述的全部或者部分功能。It should be noted that the device for verifying the communication performance of a virtual machine provided in the foregoing embodiment, when performing the process of verifying the communication performance of a virtual machine, only uses the above-mentioned division of functional modules as an example for illustration. In actual applications, it can be based on needs. The above function allocation is completed by different function modules, that is, the internal structure of the device for checking the communication performance of the virtual machine is divided into different function modules to complete all or part of the functions described above.
另外,上述实施例所提供的校验虚拟机通信性能的装置与校验虚拟机通信性能的方法的实施例属于同一构思,其中各个模块执行操作的具体方式已经在方法实施例中进行了详细描述,此处不再赘述。In addition, the embodiments of the device for verifying the communication performance of a virtual machine and the method for verifying the communication performance of a virtual machine provided by the foregoing embodiments belong to the same concept, and the specific manner in which each module performs an operation has been described in detail in the method embodiment , Will not repeat them here.
请参阅图10,在一示例性实施例中,一种校验虚拟机通信性能的装置1000,包括处理器1001及存储器1002,还包括至少一存储总线1003。Referring to FIG. 10, in an exemplary embodiment, an apparatus 1000 for verifying communication performance of a virtual machine includes a processor 1001 and a memory 1002, and further includes at least one storage bus 1003.
其中,存储器1002上存储有计算机可读指令,处理器1001通过至少一存储总线1003从存储器1002中读取计算机可读指令。The memory 1002 stores computer-readable instructions, and the processor 1001 reads the computer-readable instructions from the memory 1002 through at least one storage bus 1003.
该计算机可读指令被处理器1001执行时实现上述各实施例中的校验虚拟机通信性能的方法。When the computer-readable instructions are executed by the processor 1001, the method for verifying communication performance of a virtual machine in the foregoing embodiments is implemented.
在一示例性实施例中,一种计算机可读存储介质,其上存储有计算机程序,该计算机程序被处理器执行时实现上述各实施例中的校验虚拟机通信性能的方法。In an exemplary embodiment, a computer-readable storage medium stores a computer program thereon. When the computer program is executed by a processor, the method for verifying communication performance of a virtual machine in the foregoing embodiments is implemented.
上述内容,仅为本申请的较佳示例性实施例,并非用于限制本申请的实施方案,本领域普通技术人员根据本申请的主要构思和精神,可以十分方便地进行相应的变通或修改,故本申请的保护范围应以权利要求书所要求的保护范围为准。The above content is only a preferred exemplary embodiment of the present application, and is not intended to limit the implementation of the present application. Those skilled in the art can easily make corresponding variations or modifications according to the main idea and spirit of the present application. Therefore, the protection scope of this application shall be subject to the protection scope claimed in the claims.
Claims (32)
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201810605024.8A CN108900324B (en) | 2018-06-13 | 2018-06-13 | Method and device for checking communication performance of virtual machine |
| CN201810605024.8 | 2018-06-13 |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| WO2019237576A1 true WO2019237576A1 (en) | 2019-12-19 |
Family
ID=64344849
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/CN2018/108290 Ceased WO2019237576A1 (en) | 2018-06-13 | 2018-09-28 | Method and apparatus for verifying communication performance of virtual machine |
Country Status (2)
| Country | Link |
|---|---|
| CN (1) | CN108900324B (en) |
| WO (1) | WO2019237576A1 (en) |
Cited By (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN113938474A (en) * | 2021-10-13 | 2022-01-14 | 网易(杭州)网络有限公司 | Virtual machine access method and device, electronic equipment and storage medium |
| CN114189527A (en) * | 2021-10-28 | 2022-03-15 | 海南视联通信技术有限公司 | Information synchronization method and device, electronic equipment and storage medium |
| CN114286373A (en) * | 2021-12-08 | 2022-04-05 | 湖北电信工程有限公司 | Safety testing method based on 5G communication |
Families Citing this family (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN111435919B (en) * | 2019-01-15 | 2023-08-08 | 菜鸟智能物流控股有限公司 | Method, device and system for managing configuration parameters |
| CN110058920B (en) * | 2019-03-04 | 2023-01-31 | 平安科技(深圳)有限公司 | Virtual machine performance detection method and device, electronic equipment and storage medium |
| CN112905304B (en) * | 2021-03-08 | 2024-07-09 | 深信服科技股份有限公司 | Communication method and device between virtual machines, physical host and medium |
Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20140204734A1 (en) * | 2013-01-18 | 2014-07-24 | Hitachi, Ltd. | Node device, communication system, and method for switching virtual switch |
| CN104333488A (en) * | 2014-11-04 | 2015-02-04 | 哈尔滨工业大学 | Cloud service platform performance test method |
| CN105357038A (en) * | 2015-10-26 | 2016-02-24 | 北京百度网讯科技有限公司 | Method and system for monitoring virtual machine cluster |
| CN107632937A (en) * | 2017-10-10 | 2018-01-26 | 郑州云海信息技术有限公司 | A kind of method, apparatus tested cluster virtual machine, readable storage medium storing program for executing |
Family Cites Families (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN103248535B (en) * | 2013-04-28 | 2016-03-09 | 华为技术有限公司 | A kind of cloud system method of testing and device |
| CN104461856B (en) * | 2013-09-22 | 2018-04-20 | 阿里巴巴集团控股有限公司 | Performance test methods, apparatus and system based on cloud computing platform |
-
2018
- 2018-06-13 CN CN201810605024.8A patent/CN108900324B/en active Active
- 2018-09-28 WO PCT/CN2018/108290 patent/WO2019237576A1/en not_active Ceased
Patent Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20140204734A1 (en) * | 2013-01-18 | 2014-07-24 | Hitachi, Ltd. | Node device, communication system, and method for switching virtual switch |
| CN104333488A (en) * | 2014-11-04 | 2015-02-04 | 哈尔滨工业大学 | Cloud service platform performance test method |
| CN105357038A (en) * | 2015-10-26 | 2016-02-24 | 北京百度网讯科技有限公司 | Method and system for monitoring virtual machine cluster |
| CN107632937A (en) * | 2017-10-10 | 2018-01-26 | 郑州云海信息技术有限公司 | A kind of method, apparatus tested cluster virtual machine, readable storage medium storing program for executing |
Cited By (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN113938474A (en) * | 2021-10-13 | 2022-01-14 | 网易(杭州)网络有限公司 | Virtual machine access method and device, electronic equipment and storage medium |
| CN113938474B (en) * | 2021-10-13 | 2024-05-10 | 网易(杭州)网络有限公司 | Virtual machine access method and device, electronic equipment and storage medium |
| CN114189527A (en) * | 2021-10-28 | 2022-03-15 | 海南视联通信技术有限公司 | Information synchronization method and device, electronic equipment and storage medium |
| CN114286373A (en) * | 2021-12-08 | 2022-04-05 | 湖北电信工程有限公司 | Safety testing method based on 5G communication |
Also Published As
| Publication number | Publication date |
|---|---|
| CN108900324A (en) | 2018-11-27 |
| CN108900324B (en) | 2021-10-15 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US9571279B2 (en) | Systems and methods for secured backup of hardware security modules for cloud-based web services | |
| US20150358313A1 (en) | Systems and methods for secured communication hardware security module and network-enabled devices | |
| WO2019237576A1 (en) | Method and apparatus for verifying communication performance of virtual machine | |
| US11303614B2 (en) | System and method for providing improved optimization for secure session connections | |
| CN115086306B (en) | Data transmission method and device, electronic equipment and storage medium | |
| US20240146728A1 (en) | Access control method, access control system, and related device | |
| CN115499177B (en) | Cloud desktop access method, zero trust gateway, cloud desktop client and server | |
| US9215227B2 (en) | Systems and methods for network communications | |
| WO2015143651A1 (en) | Network function virtualization-based certificate configuration method, apparatus and system | |
| US10257171B2 (en) | Server public key pinning by URL | |
| WO2018010146A1 (en) | Response method, apparatus and system in virtual network computing authentication, and proxy server | |
| US10045212B2 (en) | Method and apparatus for providing provably secure user input/output | |
| CN113614691A (en) | Connection leasing system for use with legacy virtual delivery devices and related methods | |
| CN115603932A (en) | An access control method, access control system and related equipment | |
| TW201638822A (en) | Process identity authentication method and device | |
| CN114500351A (en) | Network performance testing method, device, equipment and storage medium | |
| US20190028559A1 (en) | Tcp fast open hardware support in proxy devices | |
| WO2019120231A1 (en) | Method and device for determining trust state of tpm, and storage medium | |
| US9071596B2 (en) | Securely establishing a communication channel between a switch and a network-based application using a unique identifier for the network-based application | |
| CN113395275B (en) | A cloud platform security protection function management and control method, system and storage medium | |
| CN117749785A (en) | Data transmission method and related equipment | |
| US12316603B2 (en) | Remote command access in a hybrid cloud to on-premises devices | |
| US12432048B2 (en) | Agentless single sign-on techniques | |
| CN210578645U (en) | Encryption communication device and terminal | |
| WO2023059386A1 (en) | Remote command access in a hybrid cloud to on-premises devices |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 18922167 Country of ref document: EP Kind code of ref document: A1 |
|
| NENP | Non-entry into the national phase |
Ref country code: DE |
|
| 32PN | Ep: public notification in the ep bulletin as address of the adressee cannot be established |
Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 08/04/2021) |
|
| 122 | Ep: pct application non-entry in european phase |
Ref document number: 18922167 Country of ref document: EP Kind code of ref document: A1 |