Method and device for organizing files based on containers

A container and file technology, applied in the Internet field, can solve problems such as insufficient security, certificate leakage, non-encryption, etc., and achieve the effects of reducing security risks, solving data security, and reducing size

Active Publication Date: 2022-06-03
ALIBABA CLOUD COMPUTING LTD
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Usually, container orchestration files deployed on cloud hosts can be imported through the industry standard UserData, that is, user data, and the cloud host internally uses cloudinit to process the orchestration files as needed. However, due to the limited size of UserData in this solution, currently The industry generally limits it to 16k, and mainstream container orchestration frameworks generally pass in certificate information that may exceed 16k. In this way, the general solution is compression, and the development cost is relatively high
In addition, the transmission process is not encrypted, the data is stolen and tampered with, the security is not high enough, and there is a risk of certificate leakage and tampering
[0004] For the above-mentioned data security problems that exist when deploying container orchestration files on cloud hosts due to existing technologies, no effective solutions have been proposed so far

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for organizing files based on containers
  • Method and device for organizing files based on containers
  • Method and device for organizing files based on containers

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0033] According to an embodiment of the present invention, an embodiment of a method for arranging files based on a container is also provided. It should be noted that the steps shown in the flowcharts of the accompanying drawings can be executed in a computer system such as a set of computer-executable instructions , and, although a logical order is shown in the flowcharts, in some cases the steps shown or described may be performed in an order different from that shown or described herein.

[0034] The method embodiment provided in Embodiment 1 of the present application may be executed in a mobile terminal, a computer terminal, or a similar computing device. Take running on a computer terminal as an example, figure 1 It is a block diagram of hardware structure of a computer terminal according to a container-based method for arranging files in an embodiment of the present invention. like figure 1 As shown, the computer terminal 10 may include one or more (only one is show...

Embodiment 2

[0059] According to an embodiment of the present invention, there is also provided an apparatus for implementing the above container-based method for arranging files, such as Figure 4 shown, Figure 4 It is a schematic structural diagram of an apparatus for arranging files based on a container according to Embodiment 2 of the present invention, and the apparatus includes:

[0060] The receiving module 42 is used to receive the access request processed in any one or more of the following ways: verification processing, address update, and encryption processing, wherein the access request is initiated by the host of the container; the authentication module 44 is used for based on The processed access request performs identity authentication on the host; the orchestration module 46 is configured to allow the file to be programmed on the host when the host passes the identity authentication.

[0061] Optionally, the device further includes: a sending module, configured to send th...

Embodiment 3

[0065] According to yet another aspect of the embodiments of the present invention, a storage medium is further provided, the storage medium includes a stored program, wherein when the program is run, the device where the storage medium is located is controlled to execute the method for arranging files based on a container in the foregoing embodiment 1 .

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a container-based method and device for arranging files. Wherein, the method includes: the container scheduling system receives the access request processed by any one or more of the following methods: verification processing, address update, and encryption processing, wherein the access request is initiated by the host machine of the container; the container scheduling system is based on The processed access request authenticates the host machine; when the host machine passes the identity authentication, the container scheduling system allows files to be arranged on the host machine. The invention solves the technical problem of data security existing when deploying container arrangement files on cloud hosts due to the prior art.

Description

technical field [0001] The present invention relates to the technical field of the Internet, in particular to a container-based method and device for arranging files. Background technique [0002] With the rapid development of container technology, more and more containers are running on physical machines and virtual machines. At the same time, more and more IaaS vendors are gradually building container clusters on their cloud hosts to provide PaaS-like services. Serverless container services have begun to emerge. In this mode, users do not need to pay attention to the server and scheduling of containers and only need to import container orchestration files. Cloud vendors schedule containers according to the orchestration files passed in by users. Currently, mainstream container orchestration frameworks such as kubernetes Internal component communication often requires a certificate, and the certificate file is usually relatively large. The user's incoming certificate may be...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L67/1001
CPCH04L67/1001
Inventor 杨泽强
Owner ALIBABA CLOUD COMPUTING LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products