Supercharge Your Innovation With Domain-Expert AI Agents!

Intranet penetration proxy method, system, host and computer-readable storage medium

A technology of intranet penetration and agent program, which is applied in the computer field to achieve the effect of reducing task load, saving cost and improving efficiency

Active Publication Date: 2022-03-01
深圳市明源云科技有限公司
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] An intranet penetration proxy method, system, host computer and computer-readable storage medium proposed by the present invention aim to solve the technical problem of how to achieve intranet penetration and secure proxy management of k8s clusters

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Intranet penetration proxy method, system, host and computer-readable storage medium
  • Intranet penetration proxy method, system, host and computer-readable storage medium
  • Intranet penetration proxy method, system, host and computer-readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] It is to be understood that the specific embodiments described herein are intended to explain the present invention and is not intended to limit the invention.

[0042] Such as figure 1 Distance figure 1 A terminal structure of the hardware operating environment of the host according to the embodiment of the present invention.

[0043] Such as figure 1 As shown, the terminal may include a processor 1001, such as a CPU, a network port 1004, a user port 1003, a memory 1005, a communication bus 1002. The communication bus 1002 is used to implement connection communication between these components. User port 1003 can include a display, an input unit such as a control panel, and optionally user port 1003 can also include a standard wired port, a wireless port. Network port 1004 can include a standard wired port, a wireless port (such as a 5G port). Memory 1005 can be a high speed RAM memory, or a stable memory (Non-VolatileMemory), such as a disk memory. The memory 1005 can also...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an intranet penetration proxy method, comprising the steps of: receiving request information input by a caller connected to the server through a preset first service port, and parsing the request information to generate an event data packet; Create a corresponding event coroutine according to the event data packet, and send the event data packet to the client connected to the server through the second service port according to the event coroutine; through the first service port receiving a return data packet fed back by the client based on the event data packet, parsing the return data packet to obtain a return result, and sending the return result to the calling end. The invention also discloses an intranet penetration agent system, a host computer and a computer-readable storage medium. Through the present invention, the k8s cluster can be managed through the intranet penetration agent.

Description

Technical field [0001] The present invention relates to the field of computer, in particular to an intranet penetrating agent method, a system, a host, and a computer readable storage medium. Background technique [0002] At present, with the fact that the container technology and cloud comes becomes more and more popular, Kubernetes (hereinafter referred to as K8S) is an increasingly widely widely widely widely used by the fact that the fact standards for the maximum container management, automatic deployment and expansion of open source systems and container. use. In real estate and other fields, many large companies' systems are deployed by K8S, which are used inside the company. For the consideration of network security, some companies' K8S clusters are privately deployed, that is, not exposed ports to public online. At this point, the deployment, upgrade, management instructions of each application in the cluster need to be issued by a safe and efficient intact tool. The tra...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F9/54G06F8/65G06F8/71
CPCG06F9/547G06F9/542G06F8/65G06F8/71
Inventor 钱文军
Owner 深圳市明源云科技有限公司
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More