Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Service deployment method and device based on K8S, electronic equipment and storage medium

A device and server-side technology, applied in the computer field, can solve data security risks, inability to solve user camouflage, lack of scalability and flexibility, etc., to achieve the effect of improving security, solving security problems, and solving camouflage

Pending Publication Date: 2022-01-04
PING AN TECH (SHENZHEN) CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Based on this, the security framework of the existing authentication and authorization framework is completely self-realizing, lacking in scalability and flexibility
At the same time, the existing authentication and authorization framework cannot solve the problem of user masquerade, and there are certain risks in data security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Service deployment method and device based on K8S, electronic equipment and storage medium
  • Service deployment method and device based on K8S, electronic equipment and storage medium
  • Service deployment method and device based on K8S, electronic equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

specific Embodiment approach

[0067] Specifically, this implementation mode provides a specific implementation mode for implementing the solution of adding an anti-counterfeiting watermark to the deployment request, and the code is as follows:

[0068]

[0069]

[0070] 205: The server adds inspection rules to the initial container to obtain the deployment container.

[0071] Enterprise big data hadoop applications have security controls on data access. In this embodiment, HMS system (hadoop user system) is used to establish corresponding virtual users for real users who need to access data, and then access hadoop through virtual users Data in a big data cluster. Therefore, user information for deploying applications is particularly important.

[0072] In this embodiment, to prevent user information from being tampered with, that is, it is mandatory to use the virtual user corresponding to the real user to start the container application. For other users, the user who has completely started the con...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a K8S-based service deployment method and device, electronic equipment and a storage medium. The method can be applied to service deployment equipment. The service deployment equipment comprises a server side and a user side, and specifically, the method comprises steps that the server side creates a user role according to a role creation request submitted by the user side; the user side obtains a deployment token according to the user role, and the deployment token comprises a user name of the user; the user side submits a deployment request to the server side through the deployment token; the server side adds an anti-counterfeiting watermark into the deployment request, and packages the deployment request added with the anti-counterfeiting watermark into a container to obtain an initial container; the server side adds an inspection rule into the initial container to obtain a deployment container; and the user side calls the deployment container to complete service deployment in the K8S environment.

Description

technical field [0001] The present invention relates to the field of computer technology, in particular to a K8S-based service deployment method, device, electronic equipment and storage medium. Background technique [0002] In the existing authentication and authorization frameworks, such as: Shiro, Spring-security, Oauth2.0, Sa-token, etc., it is relatively easy to realize the login authentication and GBD authorized access based on the unified WEB front end. However, for K8S (Kubernetes) native technology stack restapi call, official open source client call, big data open source component K8S native deployment, operatorhub community K8S deployment, and open source community PASS platform support, etc., developers need to implement it by themselves Docking work on K8S official, community, and all open source interfaces of the platform. Based on this, the security framework of the existing authentication and authorization framework is completely self-realizing and lacks sca...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/33G06F9/50
CPCG06F21/33G06F9/5077
Inventor 刘键袁胜王博蒋英明万书武
Owner PING AN TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products