Container management system across hardware architecture

A container management, cross-hardware technology, applied in the field of virtualization of computer application technology, can solve the problems of large system resource consumption, unrealized deployment, and failure to reduce the volume and magnitude of application instances to a certain extent, so as to ensure continuous sexual effect

Active Publication Date: 2021-07-13
EAST CHINA INST OF COMPUTING TECH
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] Both of the above two papers use virtualization technology and Docker container management technology, but the deployment of cross-hardware architectures has not been realized, and the physical resources of cross-hardware architectures have not been independently managed, and the volume and magnitude of application instances have not been reduced to a certain extent. The consumption of system resources is relatively large

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Container management system across hardware architecture

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] The present invention will be described in detail below in conjunction with specific embodiments. The following examples will help those skilled in the art to further understand the present invention, but do not limit the present invention in any form. It should be noted that those skilled in the art can make several changes and improvements without departing from the concept of the present invention. These all belong to the protection scope of the present invention.

[0025] The present invention adopts container / container group cross-hardware architecture management, so that the "one-way transparent" attack based on the target object vulnerability backdoor loses the deterministic effect, and the container group can be arbitrarily scheduled and migrated between nodes without service failure Online, real-time monitoring of resource usage of physical servers and containers / container groups to prevent abnormal crashes of application instances.

[0026]According to a cro...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention provides a container management system across hardware architecture, including a storage module, a copy controller module, and a service module; the storage module realizes the separate configuration service of storage volumes and persistent storage volumes, and the configuration of storage volumes is configured by the cluster administrator and is persistent The configuration of the storage volume is configured by the service administrator; the copy controller module monitors the running container group to ensure the high availability of the container group, including API objects to ensure the high availability of the container group; the service module realizes the high availability of services and application instances in the system , the services for clients to access correspond to valid virtual IPs inside the system, and clients access services through virtual IPs. Realize service security from the underlying architecture, compatible with both X86 and arm64 architectures; realize lightweight applications, uninterrupted hot migration of applications, and ensure continuity of services; realize threshold setting of the number of application instances to deal with sudden increase in service visits Situation; isolate most of the means of attack, so as to prevent problems before they happen.

Description

technical field [0001] The invention relates to the virtualization of computer application technology, in particular to a cross-hardware architecture container management system. Background technique [0002] Today, human society is entering the information age at an unprecedented speed. The information technology promoted by the digital revolution has fully penetrated into every corner of human society, creating a network space where everything is connected and explosively expands. At the same time, the security of cyberspace has increasingly become one of the most serious challenges in the information age. [0003] Although network problems manifest in various ways, the essential reason is very simple and clear. First, the existing scientific and technological capabilities of human beings are still unable to completely avoid the loopholes caused by software and hardware design defects of information systems; second, it is impossible to fundamentally eliminate the backdoor...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L12/24H04L29/06H04L29/08G06F9/48
CPCG06F9/4856H04L41/0803H04L63/02H04L63/1441H04L63/16H04L67/10
Inventor 谢彬徐李定应飞尹道明凌颖王晓虹陈静陈希
Owner EAST CHINA INST OF COMPUTING TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products