Request processing method and device, electronic equipment and storage medium
A request processing and processor technology, applied in the computer field, can solve problems such as the inability to start the daemon process on the host machine, and the existence of security holes.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0026] Figure 1a It is a flow chart of the request processing method provided by Embodiment 1 of the present invention. This embodiment is applicable to the situation where the application program in the common container needs to perform privileged operations on the host machine, for example, the application program in the common container accesses the kernel of the host machine and a device, the method may be executed by a request processing device, which may be implemented in software and / or hardware, and may be integrated on an electronic device, such as a container host.
[0027] Such as Figure 1a As shown, the request processing method specifically includes:
[0028] S101. Monitor in real time the operation requests sent by the application programs in each container based on the proxy execution program, wherein the proxy execution program is a system daemon process running on the host computer.
[0029] In the embodiment of the present invention, the container is based ...
Embodiment 2
[0037] figure 2 It is a schematic flowchart of the request processing method provided by Embodiment 2 of the present invention. This embodiment is optimized on the basis of the above embodiments, as shown in figure 2 As shown, the request processing method includes:
[0038] S201. Monitor in real time the operation requests sent by the application programs in each container based on the proxy execution program, wherein the proxy execution program is a system daemon process running on the host machine.
[0039]S202. If the target operation request sent by the application program in the target container is monitored, determine the privileged instruction included in the target operation request based on the proxy execution program.
[0040] In the embodiment of the present invention, in order to further ensure the security of the container host, a whitelist or blacklist can be pre-configured. Figure 1b The configuration controls on the container host are set. The white list ...
Embodiment 3
[0046] image 3 It is a schematic structural diagram of the request processing device in Embodiment 3 of the present invention. The device is configured on a container host machine, and the container host machine includes at least one container, and an application program is installed in each container, such as image 3 As shown, the device includes:
[0047] The monitoring module 301 is configured to monitor in real time the operation requests sent by the application programs in each container based on the proxy execution program, wherein the proxy execution program is a system daemon process running on the host computer;
[0048] An instruction determination module 302, configured to determine the privileged instruction included in the target operation request based on the proxy execution program if the target operation request sent by the application program in the target container is monitored;
[0049] The execution module 303 is configured to execute the corresponding p...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


