Container cloud policy scheduling method and device

A dispatching method and a dispatching device technology, which are applied in the field of network security, can solve problems such as threats and attacks, and achieve the effect of realizing safe deployment and reducing potential security risks

Pending Publication Date: 2022-03-29
CHINA TELECOM CORP LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

When the container resources already running on the node have security threats, if the new container application is deployed on such an insecure node, it will be attacked by potential threats

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Container cloud policy scheduling method and device
  • Container cloud policy scheduling method and device
  • Container cloud policy scheduling method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] Various exemplary embodiments of the present disclosure will now be described in detail with reference to the accompanying drawings. It should be noted that the relative arrangement of the components and steps set forth in these embodiments, unless otherwise specified, the digital expression and the numerical value are not limited to the scope of the disclosure.

[0026] At the same time, it should be understood that in order to facilitate the description, the dimensions of the respective portions shown in the drawings are not drawn in accordance with the actual ratio relationship.

[0027] The following description of at least one exemplary embodiment is actually illustrative only, and it is not necessary to use any limits to the present disclosure and its application or use.

[0028] For technical, methods, and equipment known to those of ordinary skill in the art may not be discussed in detail, in appropriate, the techniques, methods and equipment should be considered pa...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a container cloud policy scheduling method and device, and relates to the field of network security. The method comprises the following steps: analyzing security log data of each node and a container in a container cloud to obtain a security level of each node; setting a security label value for each node according to the security level of each node; and selecting a matched security label value according to a container application deployment requirement, and deploying the container application to a node corresponding to the matched security label value. According to the method, the security level of the node is analyzed based on the security log data of the node and the container which are operated in the container cloud, and the optimal and secure node resource is dynamically selected for the container application, so that potential security risks faced by the container application during container cloud deployment are reduced, and secure deployment is realized.

Description

Technical field [0001] The present disclosure relates to the field of network security, and more particularly to a container cloud policy scheduling method and apparatus. Background technique [0002] Container clouds have achieved rapid development in its lightweight, resource-elastic telescopic, continuous integration / delivery. The container cloud based on the micro-service architecture is lightweight, and the resource scheduling of the elastic expansion capacity through the scheduling strategy will be one of the important implementation technologies of the 5GMEC (Multi-Access Edge Computing, Multiple Access Edge). The K8S scheduler as the brain of the container cluster, solves the resource utilization of the cluster, thereby ensuring the stability operation of the service in the cluster. At present, the K8S container cloud node resource allocation is based on the availability of resources and the health status of the node, and the container application is deployed in the nod...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F9/455G06F9/50
CPCG06F9/45558G06F9/5027G06F2009/4557
Inventor 吴国威何明沈军樊宁潘家铭李柯张蔚茵汪来富金华敏
Owner CHINA TELECOM CORP LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products