Application isolation method, system and device and computer readable storage medium
A target application and strategy technology, applied in the field of application isolation, can solve problems such as application isolation
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0056] The following will clearly and completely describe the technical solutions in the embodiments of the application with reference to the drawings in the embodiments of the application. Apparently, the described embodiments are only some of the embodiments of the application, not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the scope of protection of this application.
[0057] see figure 1 , figure 1 It is a flow chart of an application isolation method provided in the embodiment of this application.
[0058] An application isolation method provided in an embodiment of this application may include the following steps:
[0059] Step S101: Determine the target application to be isolated in Kubernetes.
[0060] In practical applications, the target application to be isolated in Kubernetes can be determined first, the type and quantity of the target...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


