Movatterモバイル変換


[0]ホーム

URL:


CN106169994B - Security control method and device for communication between containers - Google Patents

Security control method and device for communication between containers
Download PDF

Info

Publication number
CN106169994B
CN106169994BCN201610503071.2ACN201610503071ACN106169994BCN 106169994 BCN106169994 BCN 106169994BCN 201610503071 ACN201610503071 ACN 201610503071ACN 106169994 BCN106169994 BCN 106169994B
Authority
CN
China
Prior art keywords
container
gateway
virtual
docker
virtual container
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610503071.2A
Other languages
Chinese (zh)
Other versions
CN106169994A (en
Inventor
田新雪
马书惠
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China United Network Communications Group Co Ltd
Original Assignee
China United Network Communications Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China United Network Communications Group Co LtdfiledCriticalChina United Network Communications Group Co Ltd
Priority to CN201610503071.2ApriorityCriticalpatent/CN106169994B/en
Publication of CN106169994ApublicationCriticalpatent/CN106169994A/en
Application grantedgrantedCritical
Publication of CN106169994BpublicationCriticalpatent/CN106169994B/en
Activelegal-statusCriticalCurrent
Anticipated expirationlegal-statusCritical

Links

Classifications

Landscapes

Abstract

The embodiment of the present invention provides the method for controlling security and device communicated between a kind of container.This method comprises: the first virtual container gateway receives the access request that Docker container in source is sent;First virtual container gateway obtains the address information of the second virtual container gateway corresponding with the first virtual container gateway, and the second virtual container gateway is corresponding with target Docker container;Access request is sent to the second virtual container gateway according to the address information of the second virtual container gateway by the first virtual container gateway, so that access request is transmitted to target Docker container by the second virtual container gateway.The embodiment of the present invention may be implemented the beam communication between Docker container, ensure that the reliability communicated between Docker container by the beam communication between virtual container gateway.

Description

The method of controlling security and device communicated between container
Technical field
The present embodiments relate to the method for controlling security and dress that communicate between field of communication technology more particularly to a kind of containerIt sets.
Background technique
Docker is that the application container engine of an open source can be Docker's after installing Docker on physical hostOn the basis of carry multiple containers, mutually isolated between multiple containers, multiple containers share the operating system of physical host, each containerIt can place and execute different application programs.
The physical host for being equipped with Docker container is known as Docker server, such as Docker container 1 in DockerIn server 1, Docker container 2 is in Docker server 2, when Docker container 1 needs to access Docker as clientWhen container 2,1 request to create message of Docker container, the source IP address of the request message is the IP address of Docker server 1,Purpose IP address is the IP address of Docker server 2.
But after Docker container 2 moves to other Docker servers from Docker server 2, Docker container 1It will be unable to be communicated with Docker container 2, reduce the reliability communicated between Docker container, and then not can guaranteeBeam communication between Docker container.
Summary of the invention
The embodiment of the present invention provides the method for controlling security and device communicated between a kind of container, with improve Docker container itBetween the reliability that communicates, guarantee the beam communication between Docker container.
The one aspect of the embodiment of the present invention is to provide the method for controlling security communicated between a kind of container, comprising:
First virtual container gateway receives the access request that Docker container in source is sent, and the access request includes targetFirst subnet address of Docker container;
The first virtual container gateway obtains the second virtual container gateway corresponding with the first virtual container gatewayAddress information, the second virtual container gateway is corresponding with the target Docker container;
The first virtual container gateway is according to the address information of the second virtual container gateway, by the access requestIt is sent to the second virtual container gateway, so that the access request is transmitted to the mesh by the second virtual container gatewayMark Docker container.
The other side of the embodiment of the present invention is to provide the safety control communicated between a kind of container, comprising:
Receiving module, for receiving the access request of source Docker container transmission, the access request includes targetFirst subnet address of Docker container;
Module is obtained, the address for obtaining the second virtual container gateway corresponding with the first virtual container gateway is believedBreath, the second virtual container gateway are corresponding with the target Docker container;
The access request is sent to by sending module for the address information according to the second virtual container gatewayThe second virtual container gateway, so that the access request is transmitted to the target by the second virtual container gatewayDocker container.
The method of controlling security and device communicated between container provided in an embodiment of the present invention, by between virtual container gatewayBeam communication, instant source Docker container and target Docker container are migrated, are moved from a Docker serverAnother Docker server, the corresponding virtual appearance of opisthogenesis Docker container and target Docker container of migration are moved on toDevice gateway is changed, but by the beam communication between virtual container gateway, still may be implemented Docker container itBetween beam communication, ensure that the reliability communicated between Docker container.
Detailed description of the invention
The method of controlling security flow chart that Fig. 1 is communicated between container provided in an embodiment of the present invention;
The applicable network structure of the method for controlling security that Fig. 2 is communicated between container provided in an embodiment of the present invention;
Fig. 3 be another embodiment of the present invention provides container between the method for controlling security flow chart that communicates;
The structure chart for the safety control that Fig. 4 is communicated between container provided in an embodiment of the present invention;
Fig. 5 be another embodiment of the present invention provides container between the structure chart of safety control that communicates.
Specific embodiment
The method of controlling security flow chart that Fig. 1 is communicated between container provided in an embodiment of the present invention;Fig. 2 is that the present invention is implementedThe applicable network structure of the method for controlling security communicated between the container that example provides.The embodiment of the present invention, which is directed to, works as Docker containerAfter 2 move to other Docker servers from Docker server 2, Docker container 1 will be unable to be led to Docker container 2Letter, reduces the reliability communicated between Docker container, and then not can guarantee the beam communication between Docker container, providesThe method of controlling security communicated between container, the method steps are as follows:
Step S101, the first virtual container gateway receives the access request that Docker container in source is sent, the access requestThe first subnet address including target Docker container;
As shown in Fig. 2, Docker container 21, Docker container 22 and Docker engine 31 are located at Docker server 11,Docker engine 32 is located at Docker server 12, and Docker container 22 can move to Docker service from Docker server 11Device 12, container gateway 40 can be communicated with Docker engine 31 and Docker engine 32 respectively, composer 30 can respectively with DockerServer 11 and Docker server 12 communicate.
In the present embodiment, it in container gateway 40 may include multiple virtual container gateways, and virtually hold in container gateway 40The number of the number of device gateway subnet according to belonging to the container connecting with container gateway 40 determines, for example, Docker container 21Subnet address be 192.168.0.X, the subnet address of Docker container 22 is 192.168.1.X, if 192.168.0.X andIt may include two virtual container gateways, two virtual container nets when 192.168.1.X belonging to different subnets, in container gateway 40Close includes the first virtual container gateway and the second virtual container gateway, it is assumed that the first virtual container gateway corresponds to Docker container21, the second virtual container gateway corresponds to Docker container 22.
In the present embodiment, Docker container 21 is source Docker container, and Docker container 22 is target Docker container, meshFirst subnet address of mark Docker container is the subnet address i.e. 192.168.1.X of Docker container 22.Docker container 21Docker container 22 is accessed, is communicated with Docker container 22.Specifically, Docker container 21 is previously stored with first virtuallyThe IP address and port numbers of container gateway, Docker container 21 send access request, the access request to the first virtual container netIn include Docker container 22 subnet address, that is, 192.168.1.X.
Step S102, it is virtual that the described first virtual container gateway obtains corresponding with the first virtual container gateway secondThe address information of container gateway, the second virtual container gateway are corresponding with the target Docker container;
Specifically, the first virtual container gateway inquires acl rule, obtains corresponding with the first virtual container gatewayThe second virtual container gateway address information, the acl rule include the first virtual container gateway address information withThe corresponding relationship of the address information of the second virtual container gateway.
The first virtual container gateway can be set in the present embodiment in composer 30 in advance and the second virtual container gateway is logicalAccesses control list (Access Control List, the abbreviation ACL) rule of letter, such as the acl rule allow first virtually to holdDevice gateway and the second virtual container gateway communication, in addition, the acl rule may also include the address information of the first virtual container gatewayWith the corresponding relationship of the address information of the second virtual container gateway, the address information and the second void of the first virtual container gateway are indicatedIt can be communicated between the address information of quasi- container gateway.
Step S103, the described first virtual container gateway is according to the address information of the second virtual container gateway, by instituteIt states access request and is sent to the second virtual container gateway, so that the second virtual container gateway turns the access requestIssue the target Docker container.
After first virtual container gateway gets the address information of the second virtual container gateway, access request is sent toTwo virtual container gateways, the destination address that the second virtual container gateway is checked in access request are the subnets of Docker container 22The access request is then sent to Docker container 22 by location, that is, 192.168.1.X.
In addition, the communication mode between the first virtual container gateway and source Docker container can be tunnel in the present embodimentRoad mode, the communication mode between the second virtual container gateway and target Docker container are also possible to tunnel style.
The embodiment of the present invention passes through the beam communication between virtual container gateway, instant source Docker container and targetDocker container is migrated, from a Docker server migration to another Docker server, after migrationSource Docker container and the corresponding virtual container gateway of target Docker container are changed, but pass through virtual containerThe beam communication between Docker container still may be implemented in beam communication between gateway, ensure that between Docker containerThe reliability of communication.
Fig. 3 be another embodiment of the present invention provides container between the method for controlling security flow chart that communicates;As shown in figure 3,On the basis of embodiment shown in Fig. 1, specific step is as follows for the method for controlling security communicated between container provided in this embodiment:
Step S301, the described first virtual container gateway gives the second subnet address of the source Docker container allocation;
In the present embodiment, Docker container 21 and Docker container 22 be in the same subnet, then the first virtual containerGateway can distribute the second subnet address such as 192.168.0.1 to Docker container 21, can also distribute to Docker container 22First subnet address such as 192.168.0.2.
Step S302, the described first virtual container gateway stores the second subnet address of the source Docker container;
Second subnet address 192.168.0.1 and Docker of the first virtual container gateway storage Docker container 21First subnet address 192.168.0.2 of container 22.
Step S303, the first virtual container gateway receives the access request that Docker container in source is sent, the access requestThe first subnet address including target Docker container;
When source Docker container, that is, Docker container 21 needs and target Docker container, that is, Docker container 22 communicates,Access request is sent to the first virtual container gateway by tunnel style, includes the first of target Docker container in access requestThe second subnet address, that is, 192.168.0.1 of subnet address, that is, 192.168.0.2 and source Docker container.
Step S304, the described first virtual container gateway is according to the first subnet address of the target Docker container, reallyWhether the fixed target Docker container and the source Docker container are in same subnet;
After first virtual container gateway receives the access request, the first of target Docker container is obtained from access requestThe second subnet address, that is, 192.168.0.1 of subnet address, that is, 192.168.0.2 and source Docker container, determine targetWhether the first subnet address of Docker container and the second subnet address of source Docker container are in the same subnet.
If step S305, the described target Docker container and the source Docker container, will be described in same subnetAccess request is sent to the target Docker container.
Since 192.168.0.2 and 192.168.0.1 is in the same subnet, then the first virtual container gateway does not need to look intoThe second virtual container gateway corresponding with the first virtual container gateway is ask, access request is directly sent to target Docker container?.
In the present embodiment, after the first virtual container gateway receives the access request of source Docker container transmission, mesh is obtainedThe first subnet address for marking Docker container, according to the of the first subnet address of target Docker container and source Docker containerTwo subnet address determine target Docker container and source Docker container whether in the same subnet, if asking accessIt asks and is transmitted directly to target Docker container, do not need inquiry the second virtual container net corresponding with the first virtual container gatewayIt closes, improves the forward efficiency of access request.
The structure chart for the safety control that Fig. 4 is communicated between container provided in an embodiment of the present invention.The embodiment of the present inventionThe safety control communicated between the container of offer can execute the place that the method for controlling security embodiment communicated between container providesProcess is managed, as shown in figure 4, the safety control 40 communicated between container includes: receiving module 41, obtains module 42, sends mouldBlock 43, wherein receiving module 41 is used to receive the access request of source Docker container transmission, and the access request includes targetFirst subnet address of Docker container;It is empty for obtaining corresponding with the first virtual container gateway second to obtain module 42The address information of quasi- container gateway, the second virtual container gateway are corresponding with the target Docker container;Sending module 43For the address information according to the second virtual container gateway, the access request is sent to the second virtual container netIt closes, so that the access request is transmitted to the target Docker container by the second virtual container gateway.
The safety control communicated between container provided in an embodiment of the present invention can be specifically used for the above-mentioned Fig. 1 of execution and be mentionedThe embodiment of the method for confession, details are not described herein again for concrete function.
The embodiment of the present invention passes through the beam communication between virtual container gateway, instant source Docker container and targetDocker container is migrated, from a Docker server migration to another Docker server, after migrationSource Docker container and the corresponding virtual container gateway of target Docker container are changed, but pass through virtual containerThe beam communication between Docker container still may be implemented in beam communication between gateway, ensure that between Docker containerThe reliability of communication.
Fig. 5 be another embodiment of the present invention provides container between the structure chart of safety control that communicates.Such as Fig. 5 instituteShow, on the basis of the embodiment shown in fig. 4, obtaining module 42 includes query unit 421, acquiring unit 422, wherein cargo tracerMember 421 is for inquiring acl rule;Acquiring unit 422 is virtual for obtaining corresponding with the first virtual container gateway secondThe address information of container gateway, the acl rule include the address information and second void of the first virtual container gatewayThe corresponding relationship of the address information of quasi- container gateway.
The safety control 40 communicated between container further includes distribution module 44 and memory module 45, wherein distribution module44 for giving the source Docker container allocation the second subnet address, and memory module 45 is for storing the source Docker containerSecond subnet address.
Further, the access request further includes the second subnet address of the source Docker container;It is communicated between containerSafety control 40 further include determining module 46, determining module 46 is used for the first son according to the target Docker containerWhether net address determines the target Docker container and the source Docker container in same subnet.
It, will when sending module 43 is also used to the target Docker container and the source Docker container in same subnetThe access request is sent to the target Docker container.
The safety control communicated between container provided in an embodiment of the present invention can be specifically used for the above-mentioned Fig. 3 of execution and be mentionedThe embodiment of the method for confession, details are not described herein again for concrete function.
In the present embodiment, after the first virtual container gateway receives the access request of source Docker container transmission, mesh is obtainedThe first subnet address for marking Docker container, according to the of the first subnet address of target Docker container and source Docker containerTwo subnet address determine target Docker container and source Docker container whether in the same subnet, if asking accessIt asks and is transmitted directly to target Docker container, do not need inquiry the second virtual container net corresponding with the first virtual container gatewayIt closes, improves the forward efficiency of access request.
In conclusion the embodiment of the present invention passes through the beam communication between virtual container gateway, instant source Docker containerIt is migrated with target Docker container, from a Docker server migration to another Docker server, is movedThe corresponding virtual container gateway of opisthogenesis Docker container and target Docker container of shifting is changed, but passes through voidBeam communication between quasi- container gateway, still may be implemented the beam communication between Docker container, ensure that Docker holdsThe reliability communicated between device;After first virtual container gateway receives the access request of source Docker container transmission, mesh is obtainedThe first subnet address for marking Docker container, according to the of the first subnet address of target Docker container and source Docker containerTwo subnet address determine target Docker container and source Docker container whether in the same subnet, if asking accessIt asks and is transmitted directly to target Docker container, do not need inquiry the second virtual container net corresponding with the first virtual container gatewayIt closes, improves the forward efficiency of access request.
In several embodiments provided by the present invention, it should be understood that disclosed device and method can pass through itIts mode is realized.For example, the apparatus embodiments described above are merely exemplary, for example, the division of the unit, onlyOnly a kind of logical function partition, there may be another division manner in actual implementation, such as multiple units or components can be tiedAnother system is closed or is desirably integrated into, or some features can be ignored or not executed.Another point, it is shown or discussedMutual coupling, direct-coupling or communication connection can be through some interfaces, the INDIRECT COUPLING or logical of device or unitLetter connection can be electrical property, mechanical or other forms.
The unit as illustrated by the separation member may or may not be physically separated, aobvious as unitThe component shown may or may not be physical unit, it can and it is in one place, or may be distributed over multipleIn network unit.It can select some or all of unit therein according to the actual needs to realize the mesh of this embodiment scheme's.
It, can also be in addition, the functional units in various embodiments of the present invention may be integrated into one processing unitIt is that each unit physically exists alone, can also be integrated in one unit with two or more units.Above-mentioned integrated listMember both can take the form of hardware realization, can also realize in the form of hardware adds SFU software functional unit.
The above-mentioned integrated unit being realized in the form of SFU software functional unit can store and computer-readable deposit at oneIn storage media.Above-mentioned SFU software functional unit is stored in a storage medium, including some instructions are used so that a computerIt is each that equipment (can be personal computer, server or the network equipment etc.) or processor (processor) execute the present inventionThe part steps of embodiment the method.And storage medium above-mentioned includes: USB flash disk, mobile hard disk, read-only memory (Read-Only Memory, ROM), random access memory (Random Access Memory, RAM), magnetic or disk etc. it is variousIt can store the medium of program code.
Those skilled in the art can be understood that, for convenience and simplicity of description, only with above-mentioned each functional moduleDivision progress for example, in practical application, can according to need and above-mentioned function distribution is complete by different functional modulesAt the internal structure of device being divided into different functional modules, to complete all or part of the functions described above.OnThe specific work process for stating the device of description, can refer to corresponding processes in the foregoing method embodiment, and details are not described herein.
Finally, it should be noted that the above embodiments are only used to illustrate the technical solution of the present invention., rather than its limitations;To the greatest extentPipe present invention has been described in detail with reference to the aforementioned embodiments, those skilled in the art should understand that: its according toSo be possible to modify the technical solutions described in the foregoing embodiments, or to some or all of the technical features intoRow equivalent replacement;And these are modified or replaceed, various embodiments of the present invention technology that it does not separate the essence of the corresponding technical solutionThe range of scheme.

Claims (8)

Translated fromChinese
1.一种容器间通信的安全控制方法,其特征在于,包括:1. A security control method for communication between containers, comprising:第一虚拟容器网关接收源Docker容器发送的访问请求,所述访问请求包括目标Docker容器的第一子网地址;The first virtual container gateway receives the access request sent by the source Docker container, and the access request includes the first subnet address of the target Docker container;所述第一虚拟容器网关获取与所述第一虚拟容器网关对应的第二虚拟容器网关的地址信息,所述第二虚拟容器网关与所述目标Docker容器对应;The first virtual container gateway obtains address information of a second virtual container gateway corresponding to the first virtual container gateway, and the second virtual container gateway corresponds to the target Docker container;所述第一虚拟容器网关根据所述第二虚拟容器网关的地址信息,将所述访问请求发送给所述第二虚拟容器网关,以使所述第二虚拟容器网关将所述访问请求转发给所述目标Docker容器;The first virtual container gateway sends the access request to the second virtual container gateway according to the address information of the second virtual container gateway, so that the second virtual container gateway forwards the access request to the target Docker container;其中,所述第一虚拟容器网关获取与所述第一虚拟容器网关对应的第二虚拟容器网关的地址信息,包括:Wherein, the first virtual container gateway obtains the address information of the second virtual container gateway corresponding to the first virtual container gateway, including:所述第一虚拟容器网关查询ACL规则,获取与所述第一虚拟容器网关对应的第二虚拟容器网关的地址信息,所述ACL规则包括所述第一虚拟容器网关的地址信息与所述第二虚拟容器网关的地址信息的对应关系。The first virtual container gateway queries the ACL rule to obtain address information of the second virtual container gateway corresponding to the first virtual container gateway, and the ACL rule includes the address information of the first virtual container gateway and the first virtual container gateway. The corresponding relationship between the address information of the two virtual container gateways.2.根据权利要求1所述的方法,其特征在于,所述第一虚拟容器网关接收源Docker容器发送的访问请求之前,还包括:2. The method according to claim 1, wherein before the first virtual container gateway receives the access request sent by the source Docker container, further comprising:所述第一虚拟容器网关给所述源Docker容器分配第二子网地址;The first virtual container gateway allocates a second subnet address to the source Docker container;所述第一虚拟容器网关存储所述源Docker容器的第二子网地址。The first virtual container gateway stores the second subnet address of the source Docker container.3.根据权利要求2所述的方法,其特征在于,所述访问请求还包括所述源Docker容器的第二子网地址;3. The method according to claim 2, wherein the access request further comprises the second subnet address of the source Docker container;所述第一虚拟容器网关接收源Docker容器发送的访问请求之后,还包括:After the first virtual container gateway receives the access request sent by the source Docker container, it also includes:所述第一虚拟容器网关根据所述目标Docker容器的第一子网地址,确定所述目标Docker容器和所述源Docker容器是否在同一子网内。The first virtual container gateway determines whether the target Docker container and the source Docker container are in the same subnet according to the first subnet address of the target Docker container.4.根据权利要求3所述的方法,其特征在于,所述确定所述目标Docker容器和所述源Docker容器是否在同一子网内之后,包括:4. The method according to claim 3, wherein after the determining whether the target Docker container and the source Docker container are in the same subnet, comprising:若所述目标Docker容器和所述源Docker容器在同一子网内,则所述第一虚拟容器网关将所述访问请求发送给所述目标Docker容器。If the target Docker container and the source Docker container are in the same subnet, the first virtual container gateway sends the access request to the target Docker container.5.一种容器间通信的安全控制装置,所述安全控制装置为第一虚拟容器网关,其特征在于,包括:5. A security control device for inter-container communication, the security control device being a first virtual container gateway, characterized by comprising:接收模块,用于接收源Docker容器发送的访问请求,所述访问请求包括目标Docker容器的第一子网地址;A receiving module, configured to receive an access request sent by the source Docker container, where the access request includes the first subnet address of the target Docker container;获取模块,用于获取与所述第一虚拟容器网关对应的第二虚拟容器网关的地址信息,所述第二虚拟容器网关与所述目标Docker容器对应;an obtaining module, configured to obtain address information of a second virtual container gateway corresponding to the first virtual container gateway, where the second virtual container gateway corresponds to the target Docker container;发送模块,用于根据所述第二虚拟容器网关的地址信息,将所述访问请求发送给所述第二虚拟容器网关,以使所述第二虚拟容器网关将所述访问请求转发给所述目标Docker容器;a sending module, configured to send the access request to the second virtual container gateway according to the address information of the second virtual container gateway, so that the second virtual container gateway forwards the access request to the target Docker container;其中,所述获取模块包括:Wherein, the acquisition module includes:查询单元,用于查询ACL规则;Query unit, used to query ACL rules;获取单元,用于获取与所述第一虚拟容器网关对应的第二虚拟容器网关的地址信息,所述ACL规则包括所述第一虚拟容器网关的地址信息与所述第二虚拟容器网关的地址信息的对应关系。an obtaining unit, configured to obtain address information of a second virtual container gateway corresponding to the first virtual container gateway, and the ACL rule includes the address information of the first virtual container gateway and the address of the second virtual container gateway Correspondence of information.6.根据权利要求5所述的容器间通信的安全控制装置,其特征在于,还包括:6. The safety control device for communication between containers according to claim 5, further comprising:分配模块,用于给所述源Docker容器分配第二子网地址;an allocation module for allocating a second subnet address to the source Docker container;存储模块,用于存储所述源Docker容器的第二子网地址。A storage module, configured to store the second subnet address of the source Docker container.7.根据权利要求6所述的容器间通信的安全控制装置,其特征在于,所述访问请求还包括所述源Docker容器的第二子网地址;7. The security control device for communication between containers according to claim 6, wherein the access request further comprises the second subnet address of the source Docker container;所述容器间通信的安全控制装置还包括:The safety control device for communication between containers further includes:确定模块,用于根据所述目标Docker容器的第一子网地址,确定所述目标Docker容器和所述源Docker容器是否在同一子网内。A determination module, configured to determine whether the target Docker container and the source Docker container are in the same subnet according to the first subnet address of the target Docker container.8.根据权利要求7所述的容器间通信的安全控制装置,其特征在于,所述发送模块还用于所述目标Docker容器和所述源Docker容器在同一子网内时,将所述访问请求发送给所述目标Docker容器。8. The security control device for inter-container communication according to claim 7, wherein the sending module is further configured to send the access to the target Docker container and the source Docker container when the target Docker container and the source Docker container are in the same subnet. The request is sent to the target Docker container.
CN201610503071.2A2016-06-292016-06-29 Security control method and device for communication between containersActiveCN106169994B (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
CN201610503071.2ACN106169994B (en)2016-06-292016-06-29 Security control method and device for communication between containers

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
CN201610503071.2ACN106169994B (en)2016-06-292016-06-29 Security control method and device for communication between containers

Publications (2)

Publication NumberPublication Date
CN106169994A CN106169994A (en)2016-11-30
CN106169994Btrue CN106169994B (en)2019-02-26

Family

ID=58064731

Family Applications (1)

Application NumberTitlePriority DateFiling Date
CN201610503071.2AActiveCN106169994B (en)2016-06-292016-06-29 Security control method and device for communication between containers

Country Status (1)

CountryLink
CN (1)CN106169994B (en)

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN108469986B (en)2017-02-232021-04-09华为技术有限公司 A data migration method and device
CN107508795B (en)*2017-07-262020-03-13中国联合网络通信集团有限公司Cross-container cluster access processing device and method
CN108234215B (en)*2018-01-122019-12-31平安科技(深圳)有限公司Gateway creating method and device, computer equipment and storage medium
CN108390812B (en)*2018-05-302020-07-07新华三技术有限公司Message forwarding method and device
CN110858821B (en)*2018-08-232022-01-07阿里巴巴集团控股有限公司Container communication method and device
CN111917588B (en)*2020-08-102023-06-06南方电网数字电网科技(广东)有限公司Edge device management method, device, edge gateway device and storage medium
CN113489770B (en)*2021-06-302022-08-19深圳壹账通智能科技有限公司Inter-container communication method, electronic device, and computer-readable storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN105376303A (en)*2015-10-232016-03-02深圳前海达闼云端智能科技有限公司Docker implementation system and communication method thereof
CN105491123A (en)*2015-12-042016-04-13北京航空航天大学Communication method and device among containers
CN105591820A (en)*2015-12-312016-05-18北京轻元科技有限公司 A highly scalable container network management system and method

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US9843533B2 (en)*2014-03-062017-12-12Trilio Data Inc.Elastic compute cloud based on underutilized server resources using a distributed container system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN105376303A (en)*2015-10-232016-03-02深圳前海达闼云端智能科技有限公司Docker implementation system and communication method thereof
CN105491123A (en)*2015-12-042016-04-13北京航空航天大学Communication method and device among containers
CN105591820A (en)*2015-12-312016-05-18北京轻元科技有限公司 A highly scalable container network management system and method

Also Published As

Publication numberPublication date
CN106169994A (en)2016-11-30

Similar Documents

PublicationPublication DateTitle
CN106169994B (en) Security control method and device for communication between containers
CN106067858B (en) Communication method, device and system between containers
EP3618352B1 (en)Virtual machine management
CN106095533B (en) Server expansion method and device
CN113268308B (en)Information processing method, device and storage medium
CN108777722B (en) Multi-system networking communication method, device, mobile terminal and storage medium
CN105591820B (en) A highly scalable container network management system and method
CN109818867B (en)Configuration method and device
CN107005441B (en) Dial-testing method, dial-testing system and computing node
CN104539681B (en)The processing method of distributed GIS acceleration systems and GIS service
CN106130990A (en)The control method of container access and device
CN102780601A (en)Method and system of virtual managed network
CN113810230B (en)Method, device and system for carrying out network configuration on containers in container cluster
US10237235B1 (en)System for network address translation
JP2018516022A (en) Message transfer processing method, apparatus and system
JP2021536627A (en) Systems and methods for migrating live stateful containers
WO2016184317A1 (en)Method, device and system for allocating ap
WO2017185992A1 (en)Method and apparatus for transmitting request message
CN114143090A (en)Firewall deployment method, device, equipment and medium based on network security architecture
CN111327668A (en)Network management method, device, equipment and storage medium
CN114153607A (en) Cross-node edge computing load balancing method, device, and readable storage medium
CN112243036B (en)Data processing method and device for PaaS service, equipment and storage medium
CN105988922A (en)Testing method and device of application program as well as server
CN105791370B (en)A kind of data processing method and associated server
CN115622742B (en) Resource access control method and device

Legal Events

DateCodeTitleDescription
C06Publication
PB01Publication
C10Entry into substantive examination
SE01Entry into force of request for substantive examination
GR01Patent grant
GR01Patent grant

[8]ページ先頭

©2009-2025 Movatter.jp