Unlock instant, AI-driven research and patent intelligence for your innovation.

An application isolation method, system, device, and computer-readable storage medium

A target application and strategy technology, applied in the field of application isolation, can solve problems such as application isolation

Active Publication Date: 2022-06-07
GUANGDONG INSPUR BIG DATA RES CO LTD +1
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In the application process of Kubernetes, sometimes for the purpose of safety and network traffic restriction, it is necessary to control the connectivity between entities, such as isolating applications, etc., but there is no method for isolating applications in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An application isolation method, system, device, and computer-readable storage medium
  • An application isolation method, system, device, and computer-readable storage medium
  • An application isolation method, system, device, and computer-readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0056] The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application. Obviously, the described embodiments are only a part of the embodiments of the present application, but not all of the embodiments. Based on the embodiments in the present application, all other embodiments obtained by those of ordinary skill in the art without creative efforts shall fall within the protection scope of the present application.

[0057] see figure 1 , figure 1 This is a flowchart of an application isolation method provided in an embodiment of the present application.

[0058] An application isolation method provided by the embodiment of the present application may include the following steps:

[0059] Step S101: Determine the target application to be isolated in Kubernetes.

[0060] In practical applications, the target applications to be isolated in Kubernete...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The application discloses an application isolation method, system, device, and computer-readable storage medium, which determine the target application to be isolated in Kubernetes; obtain the isolation policy of each component in the target application; create an initial network security policy corresponding to the target application ; Based on the isolation policy, modify the inbound rules, outbound rules and matching labels of the initial network security policy to obtain the target network security policy; convert the target network security policy into Iptables rules that match Kubernetes; isolate the target application based on Iptables rules. In this application, the initial network security policy is modified according to the isolation policy of the component to obtain the target network security policy that matches the isolation policy, and then the target network security policy is converted into an Iptables rule that matches Kubernetes, realizing the isolation of applications in Kubernetes .

Description

technical field [0001] The present application relates to the technical field of application isolation, and more particularly, to an application isolation method, system, device, and computer-readable storage medium. Background technique [0002] Kubernetes, abbreviated as K8s, is an abbreviation formed by replacing the 8-character "ubernete" with 8. It is an open source and is used to manage containerized applications on multiple hosts in the cloud platform. The goal of Kubernetes is to deploy containerized applications. The application is simple and efficient (powerful), Kubernetes provides a mechanism for application deployment, planning, updating, and maintenance. [0003] In the application process of Kubernetes, sometimes for the purpose of security and restricting network traffic, it is necessary to control the connectivity between entities, such as isolating applications. However, there is no method for isolating applications in the prior art. [0004] To sum up, ho...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/50
CPCG06F21/50H04L63/20G06F21/629G06F21/53
Inventor 张强刘正伟
Owner GUANGDONG INSPUR BIG DATA RES CO LTD