Container configuration method and computing node

A technology for computing nodes and containers, applied in the network field, can solve the problems of IP address persistence and migration that cannot support containers

Active Publication Date: 2019-04-05
HUAWEI CLOUD COMPUTING TECH CO LTD
View PDF8 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] This application provides a container configuration method and a computing node, which can solve the prob

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Container configuration method and computing node
  • Container configuration method and computing node
  • Container configuration method and computing node

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0061] In order to make the purpose, technical solution and advantages of the present application clearer, the implementation manner of the present application will be further described in detail below in conjunction with the accompanying drawings.

[0062] Before explaining and describing the embodiments of the present invention in detail, the application scenarios and implementation environments involved in the embodiments of the present invention will be described.

[0063] First, the application scenarios involved in the embodiments of the present invention are described.

[0064] The embodiments of the present invention can be applied to container configuration scenarios, and specifically can be applied to the scenario of configuring network attributes (such as IP address, MAC address, etc.) and transmission attributes (such as data transmission mode, etc.) of the container after the container is created. For example, after receiving a configuration instruction triggered ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a container configuration method and a computing node, and belongs to the technical field of network. The method applied to any computing node provided with a virtual machine and a bridge configuration module comprises that the virtual machine receives a container configuration instruction for configuring a target container; the virtual machine generates a network resourcecreating request with a target network identification, and sends the network resource creating request to a control node; and when the virtual machine and bridge configuration module receive the network resource information from the control node, a target container created in the virtual machine is configured according to the network resource information. Each container in the multiple computing nodes owns independent network resources, when the container of certain computing node is transferred to another computing node, the container can carry out communication needless of changing the usingnetwork resources, and the network resource used by the container is durable and can be migrated.

Description

technical field [0001] The present application relates to the field of network technology, in particular to a container configuration method and computing nodes. Background technique [0002] The container was born with the development of lightweight virtualization. It is located between the underlying operating system and the upper-layer application. It can shield the details of the underlying operating system and present a consistent interface to application developers. After the host creates the container, it can configure the Internet Protocol (Internet Protocol, IP) address of the container, etc., and the host can use the container after the configuration is completed. [0003] At present, the IP address of the container is managed based on a single host, that is, each host can configure an internal IP address for the created container. like figure 1 As shown, host 1 with IP address 10.10.10.1 can configure internal IP addresses 172.28.0.2 and 172.28.0.3 for the creat...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/12H04L29/08H04L12/46
CPCH04L12/4633H04L12/4641H04L61/2503H04L61/5007H04L2101/622H04L67/563
Inventor 李涛胡斐然贾应波
Owner HUAWEI CLOUD COMPUTING TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products