Intranet penetration proxy method and system, host and computer readable storage medium

A technology of intranet penetration and agent program, which is applied in the computer field to achieve the effect of cost saving, task reduction and efficiency improvement

Active Publication Date: 2021-12-24
深圳市明源云科技有限公司
View PDF9 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] An intranet penetration proxy method, system, host computer and computer-readable storage medium proposed by the present invention aim to solve the technical problem of how to achieve intranet penetration and secure proxy management of k8s clusters

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Intranet penetration proxy method and system, host and computer readable storage medium
  • Intranet penetration proxy method and system, host and computer readable storage medium
  • Intranet penetration proxy method and system, host and computer readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0042] Such as figure 1 as shown, figure 1 It is a schematic diagram of the terminal structure of the hardware operating environment of the host involved in the solution of the embodiment of the present invention.

[0043] Such as figure 1 As shown, the terminal may include: a processor 1001 such as a CPU, a network port 1004 , a user port 1003 , a memory 1005 , and a communication bus 1002 . Wherein, the communication bus 1002 is used to realize connection and communication between these components. The user port 1003 may include a display (Display), an input unit such as a control panel, and the optional user port 1003 may also include a standard wired port and a wireless port. Optionally, the network port 1004 may include a standard wired port and a wireless port (such as a 5G port). The memory 1005 may be a h...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an intranet penetration proxy method, which comprises the following steps of: receiving request information input by a calling end connected with a server through a preset first server port, and analyzing the request information to generate an event data packet; creating a corresponding event coroutine according to the event data packet, and sending the event data packet to a client connected with the server through a second service port according to the event coroutine; and receiving a return data packet fed back by the client based on the event data packet through the first service port, analyzing the return data packet to obtain a return result, and sending the return result to the calling end. The invention also discloses an intranet penetration proxy system, a host and a computer readable storage medium. According to the invention, the k8s cluster can be managed by the intranet through the agent.

Description

technical field [0001] The present invention relates to the field of computers, in particular to an intranet penetration proxy method, system, host and computer-readable storage medium. Background technique [0002] At present, with the increasing popularity of container technology and cloud native, kubernetes (hereinafter referred to as k8s), as the largest open source system for container management, automatic deployment and expansion, and the de facto standard for container orchestration, has become more and more widely used by major enterprises. use. In real estate and other fields, various systems of many large companies are deployed using k8s, and these systems are used within the enterprise. For the sake of network security, some enterprises' k8s clusters are deployed privately, that is, the ports are not exposed to the public network. At this time, the deployment, upgrade, and management instructions for each application in the cluster need to be issued through a s...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F9/54G06F8/65G06F8/71
CPCG06F9/547G06F9/542G06F8/65G06F8/71
Inventor 钱文军
Owner 深圳市明源云科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products