Method and apparatus for orchestrating files based on containers

A container and file technology, applied in the Internet field, can solve problems such as insufficient security, data security problems, data theft and tampering, etc.

Active Publication Date: 2020-06-12
ALIBABA GRP HLDG LTD
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Usually, container orchestration files deployed on cloud hosts can be imported through the industry standard UserData, that is, user data, and the cloud host internally uses cloudinit to process the orchestration files as needed. However, due to the limited size of UserData in this solution, currently The industry generally limits it to 16k, and mainstream container orchestration frameworks generally pass in certificate information that may exceed 16k. In this way, the general solution is compression, and the development cost is relatively high
In addition, the transmission process is not encrypted, the data is stolen and tampered with, the security is not high enough, and there is a risk of certificate leakage and tampering
[0004] For the above-mentioned data security problems that exist when deploying container orchestration files on cloud hosts due to existing technologies, no effective solutions have been proposed so far

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and apparatus for orchestrating files based on containers
  • Method and apparatus for orchestrating files based on containers
  • Method and apparatus for orchestrating files based on containers

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0033] According to an embodiment of the present invention, an embodiment of a method for arranging files based on a container is also provided. It should be noted that the steps shown in the flowcharts of the accompanying drawings can be executed in a computer system such as a set of computer-executable instructions , and, although a logical order is shown in the flowcharts, in some cases the steps shown or described may be performed in an order different from that shown or described herein.

[0034] The method embodiment provided in Embodiment 1 of the present application may be executed in a mobile terminal, a computer terminal, or a similar computing device. Take running on a computer terminal as an example, figure 1 It is a block diagram of hardware structure of a computer terminal according to a container-based method for arranging files in an embodiment of the present invention. like figure 1 As shown, the computer terminal 10 may include one or more (only one is show...

Embodiment 2

[0059] According to an embodiment of the present invention, there is also provided a device for implementing the above container-based method for arranging files, such as Figure 4 as shown, Figure 4 is a schematic structural diagram of a device for arranging files based on a container according to Embodiment 2 of the present invention, and the device includes:

[0060] The receiving module 42 is configured to receive an access request processed by any one or more of the following methods: verification processing, address update, and encryption processing, wherein the access request is initiated by the host of the container; the authentication module 44 is configured to The processed access request performs identity authentication on the host machine; the arrangement module 46 is configured to allow the arrangement of files on the host machine when the host machine passes the identity authentication.

[0061] Optionally, the device further includes: a sending module, configu...

Embodiment 3

[0065] According to still another aspect of the embodiments of the present invention, there is also provided a storage medium, the storage medium includes a stored program, wherein, when the program is running, the device where the storage medium is located is controlled to execute the container-based method for arranging files in the first embodiment above .

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method and device for arranging files based on containers. The method comprises the steps that a container scheduling system receives an access request processed in any one or more of the following modes: verification processing, address updating and encryption processing, and the access request is initiated by a host machine of a container; the container scheduling system performs identity authentication on the host machine based on the processed access request; in the event that the host machine passes the identity authentication, the container scheduling system allows the files to be orchestrated on the host machine. According to the invention, the technical problem of data security when the container orchestration file is deployed on the cloud host in the prior art is solved.

Description

technical field [0001] The present invention relates to the technical field of the Internet, in particular to a container-based method and device for arranging files. Background technique [0002] With the rapid development of container technology, more and more containers are running on physical machines and virtual machines. At the same time, more and more IaaS vendors are gradually building container clusters on their cloud hosts to provide PaaS-like services. Serverless container services have begun to emerge. In this mode, users do not need to pay attention to the server and scheduling of containers and only need to import container orchestration files. Cloud vendors schedule containers according to the orchestration files passed in by users. Currently, mainstream container orchestration frameworks such as kubernetes Internal component communication often requires a certificate, and the certificate file is usually relatively large. The user's incoming certificate may be...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/08
CPCH04L67/1001
Inventor 杨泽强
Owner ALIBABA GRP HLDG LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products