Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Cluster security management method, device and storage medium based on kubernetes and network domain

A security management and network domain technology, applied in the field of cluster security management and computer-readable storage media, can solve problems such as high use cost, information leakage, platform crash, etc., to facilitate business management and enhance network security.

Active Publication Date: 2022-02-01
PING AN TECH (SHENZHEN) CO LTD
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] At present, in the process of building application platforms in the financial field, there are many problems such as network risks, network vulnerabilities and unstable factors, which inevitably generate some security risks and problems, which lead to information leakage, illegal intrusion, platform crashes, viruses, etc. network security issues
At present, the problem of network security is still solved by manual management, which has been unable to adapt to the current situation. Regarding the current network security problem, many financial companies have been using virtualized cloud platforms to run applications, that is, virtual machines. isolation and control, but the cost of use is higher

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cluster security management method, device and storage medium based on kubernetes and network domain
  • Cluster security management method, device and storage medium based on kubernetes and network domain
  • Cluster security management method, device and storage medium based on kubernetes and network domain

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0036] The invention provides a cluster security management method based on Kubernetes and network domain. In this embodiment, the banking system includes a configuration management system and a banking business subsystem, and there is an item path corresponding to each item in the banking system. refer to figure 1 As shown, it is a schematic flowchart of a cluster security management method based on Kubernetes and a network domain provided by an embodiment of the present invention. The method may be performed by a device, and the device may be implemented by software and / or hardware.

[0037] In this embodiment, the cluster security management method based on Kubernetes and network domain includes:

[0038] Step A: Determine the configuration information required for the Kubernetes cluster. Wherein, the Kubernete...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention relates to the field of cloud security technology, and provides a cluster security management method, device, and computer-readable storage medium based on Kubernetes and network domains. The method includes: determining the configuration information required by the Kubernetes cluster, and opening the The corresponding container service creates a business cluster associated with the network domain according to the configuration information, and deploys the corresponding application container according to the configuration information; wherein, the step of "creating a cluster associated with the network domain according to the configuration information" is performed. When creating a business cluster", it includes: creating a security group and creating a namespace namespace resource object; the network domains in the business cluster communicate through the security group; the namespace resource object is used for the application that will be deployed in the network domain isolation. The invention solves the technical problem of mutual isolation and mutual access between different network domains, facilitates business management and enhances network security.

Description

technical field [0001] The present invention relates to the technical field of cloud security, in particular to a cluster security management method, device and computer-readable storage medium based on Kubernetes and network domains. Background technique [0002] Kubernetes is an open source containerized application for managing multiple hosts in a cloud platform, and it is also a container orchestration engine. Kubernetes supports automated deployment, large-scale scalability, and application container management. When an application is deployed in a production environment, multiple instances of the application are usually deployed to load balance application requests. In Kubernetes, multiple containers can be created, each container runs an application instance, and then through the built-in load balancing strategy, the management, discovery, and access of this group of application instances are realized, and these details do not require operation and maintenance person...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40
CPCH04L63/02
Inventor 琚汝强
Owner PING AN TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products