Unlock instant, AI-driven research and patent intelligence for your innovation.

A method and device for controlling the authority of tenants to access container instances

A technology of access rights and tenants, applied in the computer field, can solve problems such as poor flexibility, achieve the effect of improving flexibility and solving poor flexibility

Active Publication Date: 2022-05-06
BEIJING KINGSOFT CLOUD NETWORK TECH CO LTD
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The present application provides a method and device for controlling the permission of tenants to access container instances, so as to at least solve the technical problem in the related art that tenants have poor flexibility in accessing and managing container instances

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and device for controlling the authority of tenants to access container instances
  • A method and device for controlling the authority of tenants to access container instances
  • A method and device for controlling the authority of tenants to access container instances

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0049] In order to enable those skilled in the art to better understand the solution of the present application, the technical solution in the embodiment of the application will be clearly and completely described below in conjunction with the accompanying drawings in the embodiment of the application. Obviously, the described embodiment is only It is an embodiment of a part of the application, but not all of the embodiments. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without creative efforts shall fall within the scope of protection of this application.

[0050] It should be noted that the terms "first" and "second" in the description and claims of the present application and the above drawings are used to distinguish similar objects, but not necessarily used to describe a specific sequence or sequence. It is to be understood that the data so used are interchangeable under appropriate circumstances such...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present application relates to a method and device for controlling the authority of tenants to access container instances, which is applied to a container management platform in a container cluster, wherein the container cluster also includes multiple container instances, and the multiple container instances belong to at least two different tenants , container instances of different tenants are deployed in different network spaces to isolate each other, the method includes: receiving a container creation request from a target tenant; creating a target user account in a container cluster for the target tenant; creating an authentication certificate corresponding to the target user account; Generate the target configuration file corresponding to the target user account. The target configuration file is used to use the management tools provided by the container management platform to operate the container instance created by the target tenant in the container cluster. The target tenant and authentication certificate are recorded in the target configuration file certificate information. The present application solves the technical problem of poor flexibility for tenants to access and manage container instances in the related art.

Description

technical field [0001] The present application relates to the computer field, and in particular to a method and device for controlling a tenant's permission to access a container instance. Background technique [0002] In public cloud computing scenarios, traditionally, container services are provided to tenants in units of container clusters, which include container management platforms. Tenants can create container instances based on various ecological tools of the container management platform (such as kubernetes) (such as kubectl client, kubernetes client library, etc.), deploy their own applications in the container instance, and add, delete, and modify container instances as needed Check and other management operations. In this scenario, the network isolation policy between different tenants is at the cluster level, that is, a tenant can only access its own container cluster and cannot access container clusters of other tenants. In the container cluster of the same te...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40H04L9/32
CPCH04L63/10H04L63/0823H04L9/3268G06F9/5077G06F9/5072
Inventor 杨傲寒
Owner BEIJING KINGSOFT CLOUD NETWORK TECH CO LTD