Unlock instant, AI-driven research and patent intelligence for your innovation.

Application isolation method, system and device and computer readable storage medium

A target application and strategy technology, applied in the field of application isolation, can solve problems such as application isolation

Active Publication Date: 2020-09-25
LANGCHAO ELECTRONIC INFORMATION IND CO LTD
View PDF7 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In the application process of Kubernetes, sometimes for the purpose of safety and network traffic restriction, it is necessary to control the connectivity between entities, such as isolating applications, etc., but there is no method for isolating applications in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Application isolation method, system and device and computer readable storage medium
  • Application isolation method, system and device and computer readable storage medium
  • Application isolation method, system and device and computer readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0056] The following will clearly and completely describe the technical solutions in the embodiments of the application with reference to the drawings in the embodiments of the application. Apparently, the described embodiments are only some of the embodiments of the application, not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the scope of protection of this application.

[0057] see figure 1 , figure 1 It is a flow chart of an application isolation method provided in the embodiment of this application.

[0058] An application isolation method provided in an embodiment of this application may include the following steps:

[0059] Step S101: Determine the target application to be isolated in Kubernetes.

[0060] In practical applications, the target application to be isolated in Kubernetes can be determined first, the type and quantity of the target...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an application isolation method, system and device and a computer readable storage medium. The method comprises the steps: determining a to-be-isolated target application in Kubernetes; obtaining an isolation strategy of each component in the target application; creating an initial network security policy corresponding to the target application; modifying a stack-in rule, astack-out rule and a matching label of the initial network security policy based on the isolation policy to obtain a target network security policy; converting the target network security policy intoan Iptables rule matched with the Kubernetes; and isolating the target application based on the Iptables rule. In the present application, the initial network security policy is modified according tothe isolation policy of the component to obtain a target network security policy conforming to the isolation policy, and then the target network security policy is converted into an Iptables rule matched with the Kubernetes, thereby realizing isolation of applications in the Kubernetes.

Description

technical field [0001] The present application relates to the technical field of application isolation, and more specifically, relates to an application isolation method, system, device, and computer-readable storage medium. Background technique [0002] Kubernetes, referred to as K8s, is an abbreviation formed by using 8 instead of 8 characters "ubernete". It is an open source and is used to manage containerized applications on multiple hosts in the cloud platform. The application is simple and efficient (powerful), Kubernetes provides a mechanism for application deployment, planning, updating, and maintenance. [0003] In the application process of Kubernetes, sometimes for the purpose of security and network traffic limitation, it is necessary to control the connectivity between entities, such as isolating applications, etc., but there is no method for isolating applications in the prior art. [0004] To sum up, how to implement application isolation in Kubernetes is an ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/50
CPCG06F21/50H04L63/20G06F21/629G06F21/53
Inventor 张强刘正伟
Owner LANGCHAO ELECTRONIC INFORMATION IND CO LTD