Network isolation method and device for container instances in same container cluster

A container cluster and network isolation technology, applied in the computer field, can solve the problem of low network isolation strength

Pending Publication Date: 2020-11-13
BEIJING KINGSOFT CLOUD NETWORK TECH CO LTD
View PDF3 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] This application provides a method and device for network isolation of container instances in the same container cluster, to at least solve the

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network isolation method and device for container instances in same container cluster
  • Network isolation method and device for container instances in same container cluster
  • Network isolation method and device for container instances in same container cluster

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0048] In order to enable those skilled in the art to better understand the solution of the present application, the technical solution in the embodiment of the application will be clearly and completely described below in conjunction with the accompanying drawings in the embodiment of the application. Obviously, the described embodiment is only It is an embodiment of a part of the application, but not all of the embodiments. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without creative efforts shall fall within the scope of protection of this application.

[0049] It should be noted that the terms "first" and "second" in the description and claims of the present application and the above drawings are used to distinguish similar objects, but not necessarily used to describe a specific sequence or sequence. It is to be understood that the data so used are interchangeable under appropriate circumstances such...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a network isolation method and device for container instances in the same container cluster. The method comprises the steps that under the condition that a first creation request initiated by a target tenant is detected, a virtual interface of a target network space is created, the first creation request is used for requesting creation of a target container instance, and the target network space is a network space corresponding to the target tenant; target address information of the virtual interface is obtained; target network equipment is created by using the targetaddress information, wherein the address information of the target network equipment is the target address information, and the target network equipment is used as an instance network card of the target container instance. According to the method and the device, the technical problem of relatively low network isolation strength among the container instances in a cluster for deploying the containerinstances in related technologies is solved.

Description

technical field [0001] The present application relates to the computer field, and in particular to a method and device for network isolation of container instances in the same container cluster. Background technique [0002] In public cloud computing scenarios, traditionally, container services are provided to tenants in units of container clusters, which include container management platforms. Tenants can create container instances based on the container management platform, deploy their own applications in container instances, and perform management operations such as adding, deleting, modifying, and querying container instances as needed. In this scenario, the network isolation policies of different tenants are at the cluster level, that is, a tenant can only access its own container cluster and cannot access container clusters of other tenants. Previously no isolation was required. [0003] There is a new way to provide container services. Instead of using container cl...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L12/24H04L29/06H04L29/08H04L29/12
CPCH04L41/0823H04L63/0236H04L63/0876H04L67/1097H04L61/50
Inventor 杨傲寒
Owner BEIJING KINGSOFT CLOUD NETWORK TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products