CN115292250A - Metadata acquisition method, device, equipment and storage medium - Google Patents

Metadata acquisition method, device, equipment and storage medium Download PDF

Info

Publication number
CN115292250A
CN115292250A CN202210836608.2A CN202210836608A CN115292250A CN 115292250 A CN115292250 A CN 115292250A CN 202210836608 A CN202210836608 A CN 202210836608A CN 115292250 A CN115292250 A CN 115292250A
Authority
CN
China
Prior art keywords
metadata
virtual machine
query command
command input
peripheral information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210836608.2A
Other languages
Chinese (zh)
Inventor
佘文生
陈俊
刘宽
夏勇
段江南
黄景平
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tianyi Cloud Technology Co Ltd
Original Assignee
Tianyi Cloud Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tianyi Cloud Technology Co Ltd filed Critical Tianyi Cloud Technology Co Ltd
Priority to CN202210836608.2A priority Critical patent/CN115292250A/en
Publication of CN115292250A publication Critical patent/CN115292250A/en
Priority to PCT/CN2022/141550 priority patent/WO2024011856A1/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/14Details of searching files based on file metadata
    • G06F16/148File search processing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/16File or folder operations, e.g. details of user interfaces specifically adapted to file systems
    • G06F16/164File meta data generation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • G06F9/45533Hypervisors; Virtual machine monitors
    • G06F9/45558Hypervisor-specific management and integration aspects
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • G06F9/45533Hypervisors; Virtual machine monitors
    • G06F9/45558Hypervisor-specific management and integration aspects
    • G06F2009/45575Starting, stopping, suspending or resuming virtual machine instances
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • G06F9/45533Hypervisors; Virtual machine monitors
    • G06F9/45558Hypervisor-specific management and integration aspects
    • G06F2009/45587Isolation or security of virtual machine instances

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Data Mining & Analysis (AREA)
  • Databases & Information Systems (AREA)
  • Library & Information Science (AREA)
  • Human Computer Interaction (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The application relates to the technical field of virtualization, and provides a metadata acquisition method, a metadata acquisition device, metadata acquisition equipment and a storage medium. The method comprises the following steps: acquiring system management peripheral information of a self operating system based on a system query command input by a using object; and then obtaining corresponding metadata from the system management peripheral information, wherein the metadata is used for the initialization configuration operation of the virtual machine. The method provided by the embodiment of the application does not need to plug in the cdrom, does not occupy the cdrom disk identifier, does not open the cdrom operation authority to the use object, and effectively reduces the security risk of loss of the metadata file due to mistaken deletion of the file, leakage of the file and the like. Moreover, the method is executed in the virtual machine, and the corresponding metadata is acquired without network communication with other terminal equipment, so that when the metadata of the virtual machine is acquired in batches, a small network bandwidth can be consumed, and a large amount of metadata can be acquired quickly and accurately.

Description

Metadata acquisition method, device, equipment and storage medium
Technical Field
The application relates to the technical field of virtualization, and provides a metadata acquisition method, a metadata acquisition device, metadata acquisition equipment and a storage medium.
Background
When a virtual machine such as a cloud computer and a cloud desktop is just started, a service such as a cloud-host initialization program (cloud-init) in the virtual machine needs to acquire metadata of the virtual machine and perform initialization configuration operations such as a name, a password and a network. At present, the following two methods are commonly adopted to obtain metadata of a virtual machine:
one is in the form of a Compact Disc Read-Only Memory (cd rom), in which a file containing metadata information is mounted to a virtual machine, and the inside of the virtual machine reads the cd rom information to obtain corresponding metadata of the virtual machine. However, the metadata acquisition method not only occupies the cd rom drive of the virtual machine, so that the virtual machine cannot plug in other cd roms, but also increases the security risk of metadata file loss because the cd rom operation authority is opened to the use object.
The other method is to establish a network channel for the virtual machine to access an external metadata server, and acquire corresponding metadata from the metadata server through the established network channel. However, when metadata is obtained in batch, the virtual machine needs to access the metadata server for multiple times, which occupies a relatively high network bandwidth, which affects the normal network communication function of the virtual machine, and is easy to cause network exception, thereby increasing the failure rate of metadata acquisition.
Disclosure of Invention
The embodiment of the application provides a metadata acquisition method, a metadata acquisition device, metadata acquisition equipment and a metadata acquisition storage medium, and aims to solve the problems of occupying a cdrom drive, occupying higher network bandwidth and having high risk of file loss.
In a first aspect, an embodiment of the present application provides a metadata obtaining method, including:
acquiring system management peripheral information of a self operating system based on a system query command input by a use object;
and obtaining corresponding metadata from the system management peripheral information, wherein the metadata is used for the initialization configuration operation of the virtual machine.
Optionally, the obtaining system management peripheral information of its operating system based on the system query command input by the user object includes:
and acquiring system management peripheral information of the operating system of the user from the starting parameters of the virtual machine based on the system query command input by the using object.
Optionally, before acquiring the system management peripheral information of the operating system of the host device based on the system query command input by using the object, the method further includes:
in response to a command input operation triggered by the usage object, presenting a command input interface to the usage object to cause the usage object to input the system query command in the command input interface.
Optionally, after presenting the command input interface to the object, before acquiring the system management peripheral information of the operating system based on the system query command input by the object, the method further includes:
acquiring a system query command input by the use object;
judging whether the system query command is a legal command, if so, continuing to acquire system management peripheral information of the operating system based on the system query command input by the using object; otherwise, sending alarm information to the object to prompt the other party to re-input new system query command.
Optionally, the following operations are executed to determine whether the system query command is a legal command:
acquiring a corresponding grammar rule based on the system type of the operating system;
judging whether the system query command meets the grammar rule, if so, determining the system query command to be a legal command; otherwise, determining the system query command as an illegal command.
In a second aspect, an embodiment of the present application further provides a metadata obtaining apparatus, including:
the acquisition unit is used for acquiring system management peripheral information of the operating system of the user on the basis of a system query command input by the using object;
and the processing unit is used for obtaining corresponding metadata from the system management peripheral information, and the metadata is used for the initialization configuration operation of the virtual machine.
Optionally, the obtaining unit is configured to:
and acquiring system management peripheral information of the operating system of the user from the starting parameters of the virtual machine based on the system query command input by the using object.
Optionally, before acquiring the system management peripheral information of the operating system of the metadata acquisition apparatus based on the system query command input using the object, the metadata acquisition apparatus further includes an interface presentation unit, and the interface presentation unit is configured to:
in response to a command input operation triggered by the usage object, presenting a command input interface to the usage object to cause the usage object to input the system query command in the command input interface.
Optionally, after presenting the command input interface to the usage object, before acquiring the system management peripheral information of the operating system of the metadata acquisition apparatus based on the system query command input by the usage object, the metadata acquisition apparatus further includes a command auditing unit, where the command auditing unit is configured to:
acquiring a system query command input by the use object;
judging whether the system query command is a legal command, if so, continuing to acquire system management peripheral information of the operating system based on the system query command input by the using object; otherwise, sending alarm information to the object to prompt the other party to re-input new system query command.
Optionally, the command auditing unit may determine whether the system query command is a legal command by performing the following operations:
acquiring a corresponding grammar rule based on the system type of the operating system;
judging whether the system query command meets the grammar rule, if so, determining the system query command to be a legal command; otherwise, determining the system query command as an illegal command.
In a third aspect, an embodiment of the present application further provides a computer device, including a processor and a memory, where the memory stores program codes, and when the program codes are executed by the processor, the processor is caused to execute the steps of any one of the metadata acquisition methods.
In a fourth aspect, an embodiment of the present application further provides a computer-readable storage medium, which includes program code for causing a computer device to perform any of the steps of the metadata acquisition method described above when the program product runs on the computer device.
The beneficial effects of this application are as follows:
the embodiment of the application provides a metadata acquisition method, a metadata acquisition device, metadata acquisition equipment and a storage medium, wherein the method comprises the following steps: acquiring system management peripheral information of a self operating system based on a system query command input by a using object; and obtaining corresponding metadata from the system management peripheral information, wherein the metadata is used for the initialization configuration operation of the virtual machine.
Compared with the traditional metadata acquisition method, the method provided by the embodiment of the application does not need to plug in the cdrom, so that the cdrom drive letter is not occupied, the situations of mistaken deletion of files, leakage of files and the like due to opening of the cdrom operation authority to the use object are avoided, and the security risk of metadata file loss is effectively reduced.
In addition, the method provided by the embodiment of the application is executed inside the virtual machine, and does not need to communicate with other terminal devices through a network to acquire corresponding metadata, so that when the metadata of the virtual machine is acquired in batches, a small network bandwidth is consumed under the condition that the normal network communication function of the virtual machine is not influenced, and a large amount of metadata can be acquired quickly and accurately.
Additional features and advantages of the application will be set forth in the description which follows, and in part will be obvious from the description, or may be learned by the practice of the application. The objectives and other advantages of the application may be realized and attained by the structure particularly pointed out in the written description and claims hereof as well as the appended drawings.
Drawings
The accompanying drawings, which are included to provide a further understanding of the application and are incorporated in and constitute a part of this application, illustrate embodiment(s) of the application and together with the description serve to explain the application and not to limit the application. In the drawings:
fig. 1A is an alternative schematic diagram of an application scenario in an embodiment of the present application;
FIG. 1B is an alternative diagram of another application scenario in an embodiment of the present application;
fig. 2A is a schematic flowchart of acquiring metadata according to an embodiment of the present application;
FIG. 2B is a schematic diagram of a command input interface provided in an embodiment of the present application;
fig. 2C is a schematic diagram of alarm information provided in the embodiment of the present application;
fig. 3A is a schematic flowchart of acquiring metadata in a kvm virtual machine of centros 7 according to an embodiment of the present application;
fig. 3B is a logic diagram illustrating obtaining metadata in a kvm virtual machine of centros 7 according to an embodiment of the present application;
fig. 4 is a schematic structural diagram of a metadata obtaining apparatus according to an embodiment of the present application;
FIG. 5 is a schematic diagram of a component structure of a computer device provided in an embodiment of the present application;
fig. 6 is a schematic structural diagram of a computing device in an embodiment of the present application.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are some embodiments, but not all embodiments, of the technical solutions of the present application. All other embodiments obtained by a person skilled in the art based on the embodiments described in the present application without any creative effort belong to the protection scope of the technical solution of the present application.
Some terms in the embodiments of the present application are explained below to facilitate understanding by those skilled in the art.
1. Cloud host initialization program (cloud-init):
the cloud-init is an open-source cloud initialization program, is widely applied to various large cloud platforms, and is used for initializing and configuring custom information (such as information of host names, passwords, user data and the like) specified in newly created elastic cloud servers.
2. Compact Disc Read-Only Memory (cdrom):
the cd rom belongs to the external memory device and is an optical disk used on a computer. The optical disc can be written with data only once, and the information is permanently stored on the optical disc and read by the optical disc drive when in use.
3. Virtual Machine (Virtual Machine):
the virtual machine is an emulator of a computer system, and can provide the functions of a physical computer by simulating the complete computer system having the functions of a complete hardware system and operating in a completely isolated environment through software.
According to the application scenario of the virtual machine and the correlation with the direct machine, the virtual machine can be divided into a system virtual machine and a program virtual machine. The system virtual machine provides a complete system platform that can run a complete operating system, while the program virtual machine is designed to run a single computer program. However, whatever virtual machine is used, the essence of the virtual machine is software running on the virtual machine, and the virtual machine is limited in the resources provided by the virtual machine.
The following briefly introduces the design concept of the embodiments of the present application:
when a virtual machine such as a cloud computer and a cloud desktop is just started, a cloud-init service in the virtual machine needs to acquire virtual machine metadata and perform initialization configuration operations such as name, password and network. At present, the following two methods are commonly used to obtain metadata of a virtual machine:
one is in a cdrom form, a file containing metadata information is mounted to a virtual machine, and the inside of the virtual machine obtains corresponding virtual machine metadata by reading the cdrom information. However, the metadata acquisition method not only occupies the cd rom drive of the virtual machine, so that the virtual machine cannot plug in other cd roms, but also increases the security risk of metadata file loss because the cd rom operation authority is opened to the use object.
The other method is to establish a network channel for the virtual machine to access an external metadata server, and acquire corresponding metadata from the metadata server through the established network channel. However, when metadata is obtained in batch, the virtual machine needs to access the metadata server for many times, which occupies a higher network bandwidth, which affects the normal network communication function of the virtual machine, and is easy to cause network abnormality, thereby increasing the failure rate of metadata obtaining.
In view of this, an embodiment of the present application provides a metadata obtaining method. The method comprises the following steps: acquiring system management peripheral information of a self operating system based on a system query command input by a use object; and then obtaining corresponding virtual machine metadata from the system management peripheral information, wherein the metadata is used for the initialization configuration operation of the virtual machine.
Compared with the traditional metadata acquisition method, the method provided by the embodiment of the application does not need to plug in the cdrom, so that the cd drive is not occupied, the situations of mistakenly deleting files, revealing files and the like due to the fact that the cdrom operation authority is opened to the use object are avoided, and the safety risk of metadata file loss is effectively reduced.
In addition, the method provided by the embodiment of the application is executed inside the virtual machine, and does not need to communicate with other terminal devices through a network to acquire corresponding metadata, so that when the metadata of the virtual machine is acquired in batches, a small network bandwidth is consumed under the condition that the normal network communication function of the virtual machine is not influenced, and a large amount of metadata can be acquired quickly and accurately.
The preferred embodiments of the present application will be described in conjunction with the drawings of the specification, it should be understood that the preferred embodiments described herein are only for illustrating and explaining the present application, and are not intended to limit the present application, and the embodiments and features of the embodiments in the present application may be combined with each other without conflict.
Fig. 1A illustrates an application scenario of an embodiment of the present application, where the scenario includes multiple physical terminal devices 110. Wired communication or wireless communication is established between each physical terminal device 110, and each physical terminal device 110 may be located in the same local area network or in different local area networks, which is not limited herein.
The physical end device 110 runs the deployed virtual machine software in response to a start operation triggered using the object. When the virtual machine is started, the virtual machine acquires system management peripheral information of an operating system of the virtual machine based on a system query command input by a using object; and then obtaining corresponding metadata from the system management peripheral information, wherein the metadata is used for the initialization configuration operation of the virtual machine.
Fig. 1B shows another application scenario of the embodiment of the present application, which includes two physical terminal devices 110 'and one server 130'. The physical terminal equipment 110 'and the server 130' establish wired communication or wireless communication therebetween, which is not limited herein.
The physical terminal apparatus 110 'presents an access interface 120' thereto in response to an access operation triggered using an object; the virtual machine on the server 130 'is remotely accessed based on information such as the web address input in the access interface 120' using the object. When the virtual machine is started, the virtual machine acquires system management peripheral information of an operating system of the virtual machine based on a system query command input by a using object; and then obtaining corresponding metadata from the system management peripheral information, wherein the metadata is used for the initialization configuration operation of the virtual machine.
The physical terminal device 110 and the physical terminal device 110' of the embodiment of the present application are both computer devices used by a user. The computer device can be a personal computer, a mobile phone, a tablet computer, a notebook, an e-book reader, an intelligent home and other computer devices with certain computing capability.
The server 130' in this embodiment of the application may be an independent physical server, may also be a server cluster or a distributed system formed by a plurality of physical servers, and may also be a cloud server that provides basic cloud computing services such as a cloud service, a cloud database, cloud computing, a cloud function, cloud storage, a Network service, cloud communication, a middleware service, a domain name service, a security service, a Content Delivery Network (CDN), and a big data and artificial intelligence platform, which is not limited herein.
Referring to the flowchart shown in fig. 2A, when the virtual machine is started, the process of acquiring the metadata of the virtual machine is as follows:
s201: and the virtual machine acquires the system management peripheral information of the operating system of the virtual machine based on the system query command input by the using object.
Before executing step 201, the virtual machine presents a command input interface to the usage object in response to a command input operation triggered by the usage object, so that the usage object inputs a system query command in the command input interface.
For example, a user inputs a su command in a terminal interface of the virtual machine and returns, and when the terminal interface has a word "password", the user inputs an account password of the virtual machine, and the command input interface shown in fig. 2B is presented to the user.
Then, after presenting a command input interface to the user object, before executing step 201, the virtual machine obtains a system query command input by the user object, then judges whether the system query command is a legal command, and if so, continues to obtain system management peripheral information of the operating system of the virtual machine based on the system query command input by the user object; otherwise, sending alarm information to the object to prompt the other party to re-input a new system query command.
Specifically, the virtual machine may determine whether the system query command input using the object is a legal command by performing the following operations:
the virtual machine acquires a corresponding grammar rule based on the system type of the operating system; judging whether the system query command meets the grammar rule, if so, determining the system query command to be a legal command; otherwise, determining that the system query command is an illegal command.
In the embodiment of the application, corresponding grammar rules are configured for different types of operating systems. Using a dmidcode command in a virtual machine running a Linux operating system to check system management peripheral information; and using a wmic command in the virtual machine running the Windows operating system to view the system management peripheral information.
Assuming that a Linux operating system is run on a virtual machine, a system query command input by a user is 'wmic-em-string 1', and the command does not conform to a syntax rule of the operating system, therefore, the virtual machine presents warning information 'not an internal or external command or an executable program, please re-input the system command' as shown in fig. 2C to the user in a command input interface, and prompts the other party to re-input a new system query command.
Supposing that a Linux operating system is operated on a virtual machine, a system query command input by a user is dmidcode-item-string 1, the virtual machine determines that the system query command is a legal command because the command accords with a grammar rule of the operating system, and then system management peripheral information of the operating system of the virtual machine is acquired based on the system query command.
In the method for acquiring metadata of a virtual machine provided in the embodiment of the present application, a System administrator adds a custom System Management peripheral (i.e., system Management Basic Input Output System, smbios) field in a virtual machine start parameter in advance. This field contains metadata necessary for the virtual machine startup, and therefore, at the time of virtual machine startup, the system management peripheral information of the own operating system can be acquired from the virtual machine startup parameters by using the system query command input by the object.
For example, taking a kvm virtual machine with a centros 7 as an example, a system management peripheral field "-smbios type =11, value = name = centros 7-test1" is added to a virtual machine start parameter, and the value of this field is metadata "name = centros 7-test1" required when the virtual machine starts.
S202: the virtual machine obtains corresponding metadata from the system management peripheral information, and the metadata is used for the initialization configuration operation of the virtual machine.
Taking the previous example as an example of starting a kvm virtual machine of the centros 7, a system query command input by a user is "dmidcode-item-string 1", and the virtual machine obtains corresponding metadata "name = centros 7-test1" from system management peripheral information based on data information to be queried. Compared with the traditional metadata acquisition method, the method provided by the embodiment of the application does not need to plug in the cdrom, so that the cd drive is not occupied, the situations of mistakenly deleting files, revealing files and the like due to the fact that the cdrom operation authority is opened to the use object are avoided, and the safety risk of metadata file loss is effectively reduced.
In addition, the method provided by the embodiment of the application is executed inside the virtual machine, and does not need to communicate with other terminal devices through a network to acquire corresponding metadata, so that when the metadata of the virtual machine is acquired in batches, a small network bandwidth is consumed under the condition that the normal network communication function of the virtual machine is not influenced, and a large amount of metadata can be acquired quickly and accurately.
Referring to the flowchart shown in fig. 3A and the logic diagram shown in fig. 3B, the process of acquiring metadata in the kvm virtual machine of centros 7 is as follows:
s301: when the virtual machine is started, a user sends a su command to the virtual machine and executes the carriage return operation;
s302: when the virtual machine receives a su command, responding to the carriage return operation triggered by a user, and presenting prompt information of 'inputting a password' in a terminal interface;
s303: a user sends a corresponding account password to a virtual machine;
s304: when the virtual machine receives the account password, a command input interface is presented to a user;
s305: the user sends a system query command "dmidcode-item-string 1" to the virtual machine;
s306: when the virtual machine determines that the system query command is a legal command, the virtual machine acquires system management peripheral information of the operating system of the virtual machine based on the system query command;
s307: the virtual machine obtains corresponding metadata 'name = centros 7-test 1' from the system management peripheral information;
s308: the virtual machine presents the corresponding metadata "name = centros 7-test1" to the user.
The embodiment of the application also provides a metadata acquisition device based on the same inventive concept as the embodiment of the method. As shown in fig. 4, the metadata obtaining apparatus 400 may include:
an obtaining unit 401, configured to obtain system management peripheral information of a self operating system based on a system query command input by a user object;
a processing unit 402, configured to obtain corresponding metadata from the system management peripheral information, where the metadata is used for an initialization configuration operation of the virtual machine.
Optionally, the obtaining unit 401 is configured to:
and acquiring system management peripheral information of the operating system of the user from the virtual machine starting parameters based on a system query command input by using the object.
Optionally, before acquiring the system management peripheral information of the operating system of the metadata acquisition apparatus 400 based on the system query command input by using the object, the metadata acquisition apparatus 400 further includes an interface presentation unit 403, where the interface presentation unit 403 is configured to:
in response to a command input operation triggered by the use object, a command input interface is presented to the use object so that the use object inputs a system query command in the command input interface.
Optionally, after presenting the command input interface to the usage object, before acquiring the system management peripheral information of the operating system of the metadata acquisition apparatus 400 based on the system query command input by the usage object, the metadata acquisition apparatus 400 further includes a command auditing unit 404, where the command auditing unit 404 is configured to:
acquiring a system query command input by using an object;
judging whether the system query command is a legal command, if so, continuing to acquire system management peripheral information of the operating system based on the system query command input by the using object; otherwise, sending alarm information to the object to prompt the other party to re-input a new system query command.
Optionally, the command auditing unit 404 determines whether the system query command is a legal command by performing the following operations:
acquiring a corresponding grammar rule based on the system type of the operating system;
judging whether the system query command meets a grammar rule, if so, determining the system query command as a legal command; otherwise, determining that the system query command is an illegal command.
For convenience of description, the above parts are separately described as modules (or units) according to functional division. Of course, the functionality of the various modules (or units) may be implemented in the same one or more pieces of software or hardware when implementing the present application.
Having described the service platform access method and apparatus of an exemplary embodiment of the present application, a computer device according to another exemplary embodiment of the present application is described next.
As will be appreciated by one skilled in the art, aspects of the present application may be embodied as a system, method or program product. Accordingly, various aspects of the present application may be embodied in the form of: an entirely hardware embodiment, an entirely software embodiment (including firmware, microcode, etc.), or an embodiment combining hardware and software aspects that may all generally be referred to herein as a "circuit," module "or" system.
Based on the same inventive concept as the method embodiment described above, in the embodiment of the present application, a computer device is also provided, and referring to fig. 5, the computer device 500 may at least include a processor 501 and a memory 502. The memory 502 stores therein a program code, which, when executed by the processor 501, causes the processor 501 to perform the steps of any of the above-described metadata acquisition methods.
In some possible implementations, a computing device according to the present application may include at least one processor, and at least one memory. The memory stores program code, which, when executed by the processor, causes the processor to perform the steps of the metadata acquisition method according to various exemplary embodiments of the present application described above in the present specification. For example, a processor may perform the steps as shown in FIG. 2A.
A computing device 600 according to this embodiment of the present application is described below with reference to fig. 6. The computing device 600 of fig. 6 is only one example and should not be used to limit the scope of use and functionality of embodiments of the present application.
As shown in fig. 6, computing device 600 is in the form of a general purpose computing device. Components of computing device 600 may include, but are not limited to: the at least one processing unit 601, the at least one memory unit 602, and a bus 603 that connects the various system components (including the memory unit 602 and the processing unit 601).
Bus 603 represents one or more of any of several types of bus structures, including a memory bus or memory controller, a peripheral bus, a processor, or a local bus using any of a variety of bus architectures.
The storage unit 602 may include readable media in the form of volatile memory, such as Random Access Memory (RAM) 6021 and/or cache memory unit 6022, and may further include Read Only Memory (ROM) 6023.
The memory unit 602 may also include a program/utility 6025 having a set (at least one) of program modules 6024, such program modules 6024 including, but not limited to: an operating system, one or more application programs, other program modules, and program data, each of which or some combination thereof may comprise an implementation of a network environment.
The computing apparatus 600 may also communicate with one or more external devices 604 (e.g., keyboard, pointing device, etc.), with one or more devices that enable a user to interact with the computing apparatus 600, and/or with any devices that enable the computing apparatus 600 to communicate with one or more other computing apparatuses (e.g., router, modem, etc.). Such communication may occur via input/output (I/O) interfaces 605. Moreover, the computing device 600 may also communicate with one or more networks (e.g., a Local Area Network (LAN), a Wide Area Network (WAN), and/or a public network, such as the internet) via the network adapter 606. As shown, the network adapter 606 communicates with the other modules for the computing device 600 over the bus 603. It should be understood that although not shown in the figures, other hardware and/or software modules may be used in conjunction with the computing device 600, including but not limited to: microcode, device drivers, redundant processors, external disk drive arrays, RAID systems, tape drives, and data backup storage systems, among others.
Aspects of the metadata acquisition method provided by the present application may also be implemented in the form of a program product including program code for causing a computer device to perform the steps in the metadata acquisition method according to various exemplary embodiments of the present application described above in this specification when the program product is run on the computer device, for example, the computer device may perform the steps as shown in fig. 2A.
The program product may employ any combination of one or more readable media. The readable medium may be a readable signal medium or a readable storage medium. The readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or a combination of any of the foregoing. More specific examples (a non-exhaustive list) of the readable storage medium include: an electrical connection having one or more wires, a portable disk, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
While the preferred embodiments of the present application have been described, additional variations and modifications in those embodiments may occur to those skilled in the art once they learn of the basic inventive concepts. Therefore, it is intended that the appended claims be interpreted as including the preferred embodiment and all changes and modifications that fall within the scope of the present application.
It will be apparent to those skilled in the art that various changes and modifications may be made in the present application without departing from the spirit and scope of the application. Thus, if such modifications and variations of the present application fall within the scope of the claims of the present application and their equivalents, the present application is intended to include such modifications and variations as well.

Claims (10)

1. A metadata acquisition method, comprising:
acquiring system management peripheral information of a self operating system based on a system query command input by a use object;
and obtaining corresponding metadata from the system management peripheral information, wherein the metadata is used for the initialization configuration operation of the virtual machine.
2. The method of claim 1, wherein the obtaining system management peripheral information of the own operating system based on the system query command input using the object comprises:
and acquiring system management peripheral information of the operating system of the user from the starting parameters of the virtual machine based on the system query command input by the using object.
3. The method of claim 1, before acquiring system management peripheral information of the own operating system based on the system query command input using the object, further comprising:
presenting a command input interface to the use object in response to the command input operation triggered by the use object, so that the use object inputs the system query command in the command input interface.
4. The method of claim 3, wherein after presenting the command input interface to the usage object, before acquiring system management peripheral information of the own operating system based on a system query command input using the usage object, further comprising:
acquiring a system query command input by the use object;
judging whether the system query command is a legal command, if so, continuing to acquire system management peripheral information of the operating system based on the system query command input by the using object; otherwise, sending alarm information to the object to prompt the other party to re-input new system query command.
5. The method of claim 4, wherein determining whether the system query command is a legitimate command is performed by:
acquiring a corresponding grammar rule based on the system type of the operating system;
judging whether the system query command meets the grammar rule, if so, determining the system query command to be a legal command; otherwise, determining that the system query command is an illegal command.
6. A metadata acquisition apparatus, comprising:
the acquisition unit is used for acquiring system management peripheral information of the operating system of the user on the basis of a system query command input by the using object;
and the processing unit is used for obtaining corresponding metadata from the system management peripheral information, and the metadata is used for the initialization configuration operation of the virtual machine.
7. The apparatus of claim 6, wherein the obtaining unit is to:
and acquiring system management peripheral information of the operating system of the user from the starting parameters of the virtual machine based on the system query command input by the using object.
8. The apparatus of claim 6, wherein before acquiring the system management peripheral information of the own operating system based on the system query command input using the object, the metadata acquisition apparatus further comprises an interface presentation unit for:
in response to a command input operation triggered by the usage object, presenting a command input interface to the usage object to cause the usage object to input the system query command in the command input interface.
9. A computer device, characterized in that it comprises a processor and a memory, wherein the memory stores program code which, when executed by the processor, causes the processor to carry out the steps of the method according to any one of claims 1 to 5.
10. A computer-readable storage medium, characterized in that it comprises program code for causing a computer device to perform the steps of the method according to any one of claims 1 to 5, when said program code is run on said computer device.
CN202210836608.2A 2022-07-15 2022-07-15 Metadata acquisition method, device, equipment and storage medium Pending CN115292250A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN202210836608.2A CN115292250A (en) 2022-07-15 2022-07-15 Metadata acquisition method, device, equipment and storage medium
PCT/CN2022/141550 WO2024011856A1 (en) 2022-07-15 2022-12-23 Metadata acquisition method and apparatus, and device and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210836608.2A CN115292250A (en) 2022-07-15 2022-07-15 Metadata acquisition method, device, equipment and storage medium

Publications (1)

Publication Number Publication Date
CN115292250A true CN115292250A (en) 2022-11-04

Family

ID=83821567

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210836608.2A Pending CN115292250A (en) 2022-07-15 2022-07-15 Metadata acquisition method, device, equipment and storage medium

Country Status (2)

Country Link
CN (1) CN115292250A (en)
WO (1) WO2024011856A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2024011856A1 (en) * 2022-07-15 2024-01-18 天翼云科技有限公司 Metadata acquisition method and apparatus, and device and storage medium

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20190034496A1 (en) * 2017-07-27 2019-01-31 Citrix Systems, Inc. Abstract Query Processing Using Metadata on Multiple Complex Data Sources
CN111813504B (en) * 2020-07-13 2024-01-19 北京金山云网络技术有限公司 Method and device for automatically configuring effective virtual machine and electronic equipment
CN112988062B (en) * 2021-01-28 2023-02-14 腾讯科技(深圳)有限公司 Metadata reading limiting method and device, electronic equipment and medium
CN114528255A (en) * 2022-01-13 2022-05-24 深圳爱捷云科技有限公司 Metadata management method, electronic device and computer program product
CN115292250A (en) * 2022-07-15 2022-11-04 天翼云科技有限公司 Metadata acquisition method, device, equipment and storage medium

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2024011856A1 (en) * 2022-07-15 2024-01-18 天翼云科技有限公司 Metadata acquisition method and apparatus, and device and storage medium

Also Published As

Publication number Publication date
WO2024011856A1 (en) 2024-01-18

Similar Documents

Publication Publication Date Title
US5680547A (en) Method and apparatus for controlling network and workstation access prior to workstation boot
CA2776277C (en) Portable desktop device and method of host computer system hardware recognition and configuration
US6658562B1 (en) Method, system, and program for customizing a basic input/output system (“BIOS”) configuration according to the type of user
US11068583B2 (en) Management of login information affected by a data breach
JPH0934838A (en) Method and apparatus for search of user's credentials in distributed computer environment
US11762987B2 (en) Systems and methods for hardening security systems using data randomization
CN109542744A (en) Detect method, apparatus, storage medium and the terminal of terminal booting abnormal problem
CN106203092B (en) Method and device for intercepting shutdown of malicious program and electronic equipment
CN109787959B (en) Account information processing method and related device
CN115374481B (en) Data desensitization processing method and device, storage medium and electronic equipment
US11941127B2 (en) Firmware password management
CN110826036A (en) User operation behavior safety identification method and device and electronic equipment
US11861011B2 (en) Secure boot process
CN115292250A (en) Metadata acquisition method, device, equipment and storage medium
CN111241546B (en) Malicious software behavior detection method and device
CN111857758B (en) Application deployment method, device and medium
CN109639784B (en) Server management information acquisition method, device, client and storage medium
CN110134546A (en) Batch restarts windows systems approach, electronic device and storage medium
CN114003421B (en) Virtual machine timeout mechanism testing method, system, terminal and storage medium
CN113656378A (en) Server management method, device and medium
CN112464225A (en) Request processing method, request processing device and computer readable storage medium
CN111241553A (en) BIOS (basic input output System) permission setting method, device, equipment and storage medium
US10616214B1 (en) Systems and methods for preventing loss of possession factors
US11822690B1 (en) Data egress validation
CN113836547B (en) Method, system and monitoring platform for limiting common user to log on monitoring platform

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination