Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Cluster security management method and device based on Kubernetes and network domain and storage medium

A technology of security management and network domain, applied in the field of cluster security management and computer-readable storage medium, can solve the problems of high use cost, information leakage, illegal intrusion, etc., and achieve the effect of facilitating business management and enhancing network security.

Active Publication Date: 2019-12-03
PING AN TECH (SHENZHEN) CO LTD
View PDF6 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] At present, in the process of building application platforms in the financial field, there are many problems such as network risks, network vulnerabilities and unstable factors, which inevitably generate some security risks and problems, which lead to information leakage, illegal intrusion, platform crashes, viruses, etc. network security issues
At present, the problem of network security is still solved by manual management, which has been unable to adapt to the current situation. Regarding the current network security problem, many financial companies have been using virtualized cloud platforms to run applications, that is, virtual machines. isolation and control, but the cost of use is higher

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cluster security management method and device based on Kubernetes and network domain and storage medium
  • Cluster security management method and device based on Kubernetes and network domain and storage medium
  • Cluster security management method and device based on Kubernetes and network domain and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0036] The invention provides a cluster security management method based on Kubernetes and network domain. In this embodiment, the banking system includes a configuration management system and a banking business subsystem, and there is an item path corresponding to each item in the banking system. refer to figure 1 As shown, it is a schematic flowchart of a cluster security management method based on Kubernetes and a network domain provided by an embodiment of the present invention. The method may be performed by a device, and the device may be implemented by software and / or hardware.

[0037] In this embodiment, the cluster security management method based on Kubernetes and network domain includes:

[0038] Step A: Determine the configuration information required for the Kubernetes cluster. Wherein, the Kubernete...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the technical field of cloud security, and provides a cluster security management method and device based on Kubernetes and a network domain, and a computer readable storage medium. The method comprises the following steps: determining configuration information required by a Kubernetes cluster, opening a corresponding container service according to the configuration information, creating a service cluster associated with a network domain according to the configuration information, and deploying a corresponding application container according to the configuration information, wherein when the step of creating the service cluster associated with the network domain according to the configuration information is executed, the method comprises the following steps: creating a security group and creating a namespace namespace resource object; enabling the network domains in the service cluster to communicate with each other through a security group; using the namespaceresource object for isolating an application program deployed in the network domain. According to the invention, the technical problems of mutual isolation and mutual access among different network domains are solved, the service management is facilitated, and the network security is enhanced.

Description

technical field [0001] The present invention relates to the technical field of cloud security, in particular to a cluster security management method, device and computer-readable storage medium based on Kubernetes and network domains. Background technique [0002] Kubernetes is an open source containerized application for managing multiple hosts in a cloud platform, and it is also a container orchestration engine. Kubernetes supports automated deployment, large-scale scalability, and application container management. When an application is deployed in a production environment, multiple instances of the application are usually deployed to load balance application requests. In Kubernetes, multiple containers can be created, each container runs an application instance, and then through the built-in load balancing strategy, the management, discovery, and access of this group of application instances are realized, and these details do not require operation and maintenance person...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
CPCH04L63/02
Inventor 琚汝强
Owner PING AN TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products