Access method and device of Kubernetes cluster in private network, equipment and medium

A technology of private network and access method, applied in the field of computer and cloud computing, can solve the problems of network inaccessibility and inaccessibility, and achieve the effect of reducing the risk of external attacks

Active Publication Date: 2021-07-20
BEIJING BAIDU NETCOM SCI & TECH CO LTD
View PDF4 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004]However, when the user needs to connect the K8S cluster in the private network environment to the c

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Access method and device of Kubernetes cluster in private network, equipment and medium
  • Access method and device of Kubernetes cluster in private network, equipment and medium
  • Access method and device of Kubernetes cluster in private network, equipment and medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0069] figure 1 It is a flowchart of a method for accessing a Kubernetes cluster in a private network according to Embodiment 1 of the present application. This embodiment is applicable to the case of connecting a Kubernetes cluster in a private network to a cloud platform in a public network. The method can be executed by the access device of the Kubernetes cluster in the private network, and the device can be implemented in the form of software and / or hardware, and integrated on any electronic device with a network communication function. Wherein, the access method of the Kubernetes cluster in this embodiment may be executed by a gateway deployed in a public network.

[0070] Such as figure 1 As shown, the access method of the Kubernetes cluster in the private network provided in the embodiment of the present application includes the following steps:

[0071] S110. Create a transmission tunnel in response to the full-duplex communication connection received from the proxy ...

Embodiment 2

[0098] Figure 4 It is a flowchart of a method for accessing a Kubernetes cluster in a private network according to Embodiment 2 of the present application. The embodiment of the present application is optimized on the basis of the above-mentioned embodiments. The embodiment of the present application can be combined with one or more of the above-mentioned Various optional schemes are combined in the embodiment. The solution of this embodiment is applicable to a situation where a Kubernetes cluster in a private network is connected to a cloud platform in a public network. The method can be executed by the access device of the Kubernetes cluster in the private network, and the device can be implemented in the form of software and / or hardware, and integrated on any electronic device with a network communication function. Wherein, the access method of the Kubernetes cluster in this embodiment may be performed by a proxy server deployed in a private network.

[0099] like Figu...

Embodiment 3

[0115] Figure 5 It is a structural block diagram of an access device for a Kubernetes cluster in a private network for realizing the access method of the Kubernetes cluster in the private network of the embodiment of the present application. This embodiment is applicable to connecting the Kubernetes cluster in the private network to the public The situation of the cloud platform in the network. This method can be carried out by the access device of Kubernetes cluster in the private network, and this device can adopt the mode of software and / or hardware to realize, and be integrated on any electronic equipment with network communication function, the access of the Kubernetes cluster of this embodiment The device is configured in a gateway deployed in a public network.

[0116] Such as Figure 5 As shown, the access device of the Kubernetes cluster in the private network provided in the embodiment of the present application includes: a first tunnel creation module 510 , a fir...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an access method and device of a Kubernetes cluster in a private network, equipment and a medium, and relates to the technical field of computers, in particular to the technical field of cloud computing. The specific implementation scheme is as follows: in response to full duplex communication connection received from a proxy server, creating a transmission tunnel; acquiring a service access request for a target interface server, and if no available virtual connection is detected, creating a new virtual connection in the transmission tunnel; generating a connection creation message according to the ID and the target address of the new virtual connection; sending a connection creation message to the proxy server to instruct the proxy server to execute the following steps: creating a new virtual connection, and creating a communication link between the gateway and the target interface server through the new virtual connection to access the target interface server. By adopting the scheme provided by the invention, the K8S cluster in the private network can be accessed to the cloud platform in the public network, and the public network IP is not needed, so the risk that the K8S cluster is subjected to external attacks can be greatly reduced.

Description

technical field [0001] The embodiment of the present application relates to the field of computer technology, and in particular to a method, device, device and medium for accessing a Kubernetes cluster in a private network in the field of cloud computing technology. Background technique [0002] Kubernetes (K8S for short) cluster is an open source container orchestration management platform for managing containerized applications on multiple hosts in the cloud platform, providing a mechanism for application deployment, planning, updating, and maintenance. [0003] Usually, the cloud platform accesses the cluster through the public network IP exposed by the K8S cluster. This access method not only increases user costs, but also exposes the K8S cluster to the public network, which increases the risk of the K8S cluster being attacked. [0004] However, when the user needs to connect the K8S cluster in the private network environment to the cloud platform, it cannot be directly...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/08H04L12/46H04L12/66
CPCH04L67/141H04L67/10H04L12/4633H04L12/66
Inventor 郭良帅
Owner BEIJING BAIDU NETCOM SCI & TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products