Safety management and control method, device and equipment of cluster system and storage medium

A security control and cluster system technology, applied in the field of network security, can solve the complex and difficult problems of network security management

Active Publication Date: 2020-07-10
TENCENT CLOUD COMPUTING BEIJING CO LTD
View PDF6 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] With the continuous development of modern information technology, the scale of data computing, processing and storage is also increasing, and the requirements for network security management capabilities are also getting higher and higher. It is becoming more and more stretched, and a distributed cluster architecture built by various emerging technologies is gradually emerging. A complete set of services often consists of different clusters composed of server applications with different functions. The clusters interact with each other through the network. At the same time, it is necessary to solve cluster network security problems through well-designed firewall rules and hardware. In actual production activities, with the continuous increase of cluster types and scale, network security management becomes more and more complicated and difficult.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safety management and control method, device and equipment of cluster system and storage medium
  • Safety management and control method, device and equipment of cluster system and storage medium
  • Safety management and control method, device and equipment of cluster system and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0067] In order to make the purpose, technical solution and advantages of the present invention clearer, the present invention will be described in further detail below in conjunction with the accompanying drawings, and the described embodiments should not be considered as limiting the present invention, and those of ordinary skill in the art do not make any All other embodiments obtained under the premise of creative labor belong to the protection scope of the present invention.

[0068] In the following description, references to "some embodiments" describe a subset of all possible embodiments, but it is understood that "some embodiments" may be the same subset or a different subset of all possible embodiments, and Can be combined with each other without conflict.

[0069] Unless otherwise defined, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the technical field of the invention. The terms used herei...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a security management and control method and device for a cluster system, electronic equipment and a storage medium. The cluster system comprises at least two sub-clusters usedfor supporting a network application, and the method comprises the steps that each node in each sub-cluster in the at least two sub-clusters obtains a node list of the sub-cluster to which the node belongs; a firewall rule of the sub-clusters are generated according to the security policies of the nodes and the node list; and the firewall rule is applied to construct a firewall between the sub-cluster to which the node belongs and an external sub-cluster, and an intercommunication permission between the node and the node in the node list is opened. Through adoption of the method and the device, fine-grained isolation of the sub-cluster in the cluster system can be realized, and automatic management of a security policy is realized.

Description

technical field [0001] The present invention relates to network security technology, in particular to a security management and control method, device, electronic equipment and storage medium of a cluster system. Background technique [0002] With the continuous development of modern information technology, the scale of data computing, processing and storage is also increasing, and the requirements for network security management capabilities are also getting higher and higher. It is becoming more and more stretched, and a distributed cluster architecture built by various emerging technologies is gradually emerging. A complete set of services often consists of different clusters composed of server applications with different functions. The clusters interact with each other through the network. At the same time, it is necessary to solve the problem of cluster network security through well-designed firewall rules and hardware. In actual production activities, with the continuo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/02H04L63/0263H04L63/10H04L63/20H04L67/10H04L67/1095
Inventor 高永伟
Owner TENCENT CLOUD COMPUTING BEIJING CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products