CN109471658A - A method of the fast construction target drone environment based on container - Google Patents
A method of the fast construction target drone environment based on container Download PDFInfo
- Publication number
- CN109471658A CN109471658A CN201811375937.1A CN201811375937A CN109471658A CN 109471658 A CN109471658 A CN 109471658A CN 201811375937 A CN201811375937 A CN 201811375937A CN 109471658 A CN109471658 A CN 109471658A
- Authority
- CN
- China
- Prior art keywords
- target drone
- environment
- loophole
- container
- mirror image
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/70—Software maintenance or management
- G06F8/71—Version control; Configuration management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/70—Software maintenance or management
Abstract
The method of the invention discloses a kind of fast construction target drone environment based on container, comprising steps of A. builds container cloud infrastructure using open source kubernetes technology;B. target drone environment Dockerfile file is write, target drone mirror image is constructed using docker build, the Version Control of target drone is carried out by the tag label of mirror image;C. step B is repeated to each loophole and builds standard target drone mirror image, kubernetes API is called to write each loophole target drone environment constructed in key deployment program creation web program unified management step B;D. it submits publication to write the Dockerfile file finished, automation building mirrored procedure is realized by pipeline pipeline, the mirror image of building is published in the target drone image listing of web terminal and service is provided.Method of the invention the building come unified target drone loophole environment using containerization technique docker, is included in management for docker container customize in conjunction with container orchestration technology kubernetes, has the advantages that with with burning after building use.
Description
Technical field
The present invention relates to target drone environmental structure technical field, in particular to a kind of fast construction target drone environment based on container
Method.
Background technique
Currently, the mode for now generalling use conventional virtual machine deployment in industry builds target drone environment, virtual machine builds operation
Complexity, preparation process is long, even if build still can lead to the ring built because of the factor of various environment in the same fashion
Border is different, and distributing target drone by way of virtual machine image can be limited by mirror image size.
And another vagrant technology used is built involved in scheme and this patent of target drone environment on the market
Docker technology, which is compared, also lacks certain ease for use.The docker technology referred in patent is widely used currently on the market,
There are many reliable container cloud containerization application is deployed in items in commerce, is a kind of more mature technology choosing
Type, and our information security field target drone environment also lack standard, the target that leak analysis personnel are respectively built by various technologies
Machine can not effectively integration get up with the target drone of help company or community distribution, dispose, test.
Summary of the invention
It is insufficient in above-mentioned background technique the purpose of the present invention is overcoming, a kind of fast construction target drone ring based on container is provided
The method in border using containerization technique docker building come unified target drone loophole environment, and combines container orchestration technology
The docker container customized is included in management by kubernetes, with with building, is burnt after, is rationally utilized server resource,
More easily distribution target drone environment assists leak analysis personnel, and penetration testing personnel learn reproduction, analysis, study loophole technology.
In order to reach above-mentioned technical effect, the present invention takes following technical scheme:
A method of the fast construction target drone environment based on container, comprising the following steps:
A. container cloud infrastructure is built using open source kubernetes technology, that is, establishes target drone environmental infrastructure;
B. target drone environment Dockerfile file is write, target drone mirror image is constructed using docker build, specifically such as in standard
It executes instruction under the target drone associated documents catalogue got ready such as `docker build-tsome-vul:lastest-f
Mirror image building can be completed in Dockerfile.`, is become by the some-vul:latest in the tag label such as above-metioned instruction of mirror image
More latest is v1.0, Version Control of the customized tag label such as v2.0 to target drone;
In this step, when writing target drone environment Dockerfile file, which can make target drone build process complete
Automation after constructing target drone mirror image using docker build, can pay attention to excellent by mirror image persistent storage, and during customizing
Change, mirror image size can be effectively reduced, the mirror image of building can arbitrarily be distributed, and ensure that each personnel got get standard
The target drone of change reduces unnecessary trouble, while the Version Control of target drone can be carried out by the tag label of mirror image;
C. step B is repeated to each loophole and builds standard target drone mirror image, kubernetes API is called to write a key portion
The each loophole target drone environment constructed in administration program creation web program unified management step B;
Concrete principle are as follows: the docker mirror for being built us using kubernetes API Calls docker daemon
As operation is at docker container, it is easily accessible that kubernetes can provide interim port for target drone environmental chamber, can using API
The ip of container is easily got, the occupation condition monitoring information of the network informations such as port and current container is convenient for
The scheduling of machine resources equally can use after the test of target drone environmental chamber or research of operation to be utilized
Mono- key pin of kubernetes API is disfeatured device, recycling machine resource;
D. it submits publication to write the Dockerfile file finished, automation building mirror image is realized by pipeline pipeline
Process, while the mirror image of building being published in the target drone image listing of web terminal, service is provided;Loophole target drone environment can be completed
Container cloud foundation.
Further, target drone environment Dockerfile file write in the step B be specifically includes the following steps:
S1. specific target drone environment is established for loophole, document is described according to loophole and is reappeared using virtual machine simulation loophole
Required environment;
S2. it records operating system, be related to the element of component, environment configurations, the process of record debugging loophole reproduction environment
In used instruction;
S3. dockerfile is write as loophole target drone environment scripting according to record, is abstracted the artificial build process of target drone
Dockerlize is docker container, and same loophole target drone environment is constructed by dockerfile;It then may make loophole environment
It is standardized, and is distributed using dockerfile, transmitted, reconstruct is founded a capital very convenient, and is easy to achieve.
Further, submit publication that can call continuous integrating when writing the Dockerfile file finished in the step D
Tool, in the prior art existing continuous integrating tool.
Further, the continuous integrating tool is jenkins.
Compared with prior art, the present invention have it is below the utility model has the advantages that
The method of fast construction target drone environment based on container of the invention, solves the target drone ring needed in penetration testing
Border can not rapid deployment, delete, pollute hosted environment, generate the technical problems such as insecurity factor, in technical solution of the present invention
This is solved the problems, such as using containerization technique currently popular, is disposed when reaching use, is burnt after, guarantees host safety
Effect;
And in combination with each company's situation realize a key deployment, with build with, have the characteristics that be easily managed, for establish public affairs
The loophole target drone environment data base of department, assist infiltration tester study etc. have very big help.It is realized using container technique
Occupied space is smaller, transmission of being more convenient for, the effect shared, in conjunction with the container orchestration technology such as kubernetes etc. of existing maturation,
Easy-to-use standardization " target drone cloud " can be achieved, there are certain market prospects.
Detailed description of the invention
Fig. 1 is the loophole target drone environment mirror building flow diagram in one embodiment of the present of invention.
Specific embodiment
Below with reference to the embodiment of the present invention, the invention will be further elaborated.
As shown in Figure 1, a kind of method of the fast construction target drone environment based on container, possesses and once builds, use at any time,
Be conveniently distributed, i.e. the characteristics of burning after, can help information safety staff with low O&M cost, the mode of fast and flexible is built
Target drone is used to study and test, and can effectively solve target drone method complicated difficult of manually building traditional in information security field and use, nothing
The full-automatic scripting of method realizes that the target drone environment built lacks standard, and not easy to maintain, O&M cost is high, is not easy to distribute etc. and ask
Topic.
Basic technology stack employed in the method for the fast construction target drone environment based on container of the present embodiment mainly wraps
It includes: instantly popular container technique docker and container orchestration technology kubernetes, instantly with being related in extensive DevOps
And the automatic flow thought that arrives and in scripting target drone environmental structure process, reduction manually adjusts, and establishes standardization loophole
Target drone enviroline introduces the technical essential of community's contribution.
Specifically, in conjunction with above-mentioned technology stack, the side of the fast construction target drone environment based on container of the present embodiment
Method the following steps are included:
Step 1. establishes target drone environmental infrastructure;Container cloud infrastructure is built using open source kubernetes technology.
Specifically, container cloud infrastructure builds the complete kubernetes container cloud environment that usable cloud manufacturer provides
Or it is built in self-built computer room by kubernetes official document (https: //kubernetes.io/docs/setup/) guide
Kubernetes environment, building for docker environment is precondition in the process, has deployment in detail in official document
Guidance, when specific implementation, can be used as reference, and details are not described herein again.
Step 2. writes target drone environment Dockerfile file, which be fully automated target drone build process, uses
After docker build constructs target drone mirror image, can mirror image persistent storage be paid attention to optimization during customizing, can be effectively reduced
Mirror image size adds rm instruction and cleans up the caching generated in current building stage stage in time when such as writing Dockerfile
Rubbish, downloading remnants etc. reach optimization purpose, and the mirror image constructed can arbitrarily be distributed, and ensure that compress mirror image size
The personnel each got get standardized target drone, reduce unnecessary trouble, while as above by the tag label of mirror image
The some-vul:latest change latest stated in instruction is v1.0, version control of the customized tag label such as v2.0 to target drone
System.
Specific target drone environment specially is established for loophole, describing document or specific condition manual type according to loophole makes
The environment needed for virtual machine simulation loophole reproduction, records operating system (OS), is related to component (Component), environment is matched
Elements such as (env config) are set, instruction used during debugging loophole reproduction environment is recorded, is write as according to record
Loophole target drone environment scripting, specific embodiment can refer to phase when target drone is built in following embodiments by dockerfile
Step is closed, being abstracted the artificial build process dockerlize of target drone is docker container, and same loophole target drone environment is thus
Dockerfile building so that loophole environment is standardized, and is distributed using dockerfile, is transmitted, reconstruct is founded a capital
It is very convenient, it is easy to achieve.
It is as follows that specific target drone builds example:
Specifically with Apache Synapse Remote Code Execution Vulnerability (vulnerability number: CVE-2017- in the present embodiment
15708) target drone illustrates for building:
S1.1. loophole document (http://cve.mitre.org/cgi-bin/cvename.cgi is read? name=CVE-
2017-15708) and other relevant documentations, it is simulated in the present embodiment especially by virtual machine Ubuntu 16.04LTS is built,
Impacted ApacheSynapse version are as follows: 3.0.0,2.1.0,2.0.0,1.2,1.1.2,1.1.1,
S1.2. corresponding Java version can be obtained from loophole document, and the corresponding Java version used is obtained in the present embodiment
This is 1.8.0_112,
S1.3. it is downloaded containing leaky Apache Synapse version 3 .0.0 from official website according to aforementioned selection one
Apache Synapse 3.0.0, (http://synapse.apache.org/download/3.0.0/download.cgi),
Entering under installation directory bin after decompression, operation ./synapse.sh starting service checks 1099 port opens,
S1.4. target drone builds completion, whether checks target drone using poc corresponding to the loophole (Proof of Concept)
Success is built, if poc executes the desired effect for failing to obtain the description of loophole document, repeatedly above step, describes according to document
Gradually adjustment reappears the condition of loophole triggering, until the target drone finally built generates poc and executes desired result.
Above-mentioned steps S1.1 to S1.4 is converted into Dockerfile file by S1.5, specific as follows:
1FROM java:8u111-alpine
2ADD synapse-3.0.0-bin.tar.gz/opt/software
3EXPOSE 1099
4CMD[“sh”,“/opt/software/synapse-3.0.0/bin/synapse.sh”]
S1.6. using the standardization target drone of docker build instruction one loophole of building, ` is executed instruction
The Wait Orders such as dockerbuilf-t some-vul:latest-f Dockerfile.` execute instruction ` after being finished again
Docker run--rm some-vul` run a target drone container, to the container execute poc check docker mirror image whether structure
Build up function;
Step 3: each loophole repeats step 2 and builds standard target drone mirror image, and kubernetes API is called to create web journey
Sequence is managed collectively each loophole target drone environment constructed in step 2, and the open source container tube of Google is specifically used in the present embodiment
Reason scheme kubernetes implements the management and monitoring of target drone container, and complete Container Management side has been provided in kubernetes
Case can be created, be monitored, dispatching, destroying target drone container, and principle is that docker API can be called to control using kubernetes
Docker daemon runs the docker mirror image built in advance at docker container, and mentions automatically for target drone environmental chamber
It is easily accessible for port, and the ip of these containers can be got using kubernetes API, the network informations such as port, and work as
The occupation condition monitoring information of preceding container, it is fixed that these information provide being customized of behaviors such as creation, publication, destruction
The foundation of system, entire customization procedure combine the thought of DevOps using provided by continuous integrating software jenkins
Entire customization procedure is together in series by pipeline, illustrates this by taking the whole life cycle of a target drone container as an example below
Customization process is core of the present invention:
A. after Dockerfile is committed to code storage by target drone founder in step 2, set out jenkins's
Pipeline, it is automatic to construct mirror image and mirror image deposit docker registry, container instance is finally run into, such as:
B. the container instance in (a) can by kubernetes API acquire monitoring information, api interface such as:
GET/apis/apps/v1/namespaces/{namespace}/deployments/{name}/status
C. it by the occupation condition information and own service demand that obtain in (b), needs to close after being such as completed
The demand for destroying container recycling computing resource, calls kubernetes API to realize this operation:
Interface is as follows:
$kubectl proxy
$curl-X DELETE-H'Content-Type:application/yaml'--data'
gracePeriodSeconds:0
orphanDependents:false
''http://127.0.0.1:8001/apis/apps/v1/namespaces/default/deployments/
deployment-example'
It is so that can easily create to construct in web program unified management step 2 using kubernetes API
Each loophole target drone environment flexibly builds distribution target drone and fills company's slack resources to researcher or tester, while also
Divide to use and build the not high target drone container of calculating demand, has saved company's O&M cost, and penetration testing personnel and loophole
Analysis personnel flexibly and easily can be studied, exchange and be analyzed using target drone environment.
Step 4: the mirror image of building is published to in the target drone image listing of web terminal the service that provides, integration intra-company power
Amount and community's strength are established container cloud -- " the target drone cloud " of loophole target drone environment jointly, back feeding community, study people for Community Safety
Member provides fast and easily target drone usage experience, attracts more community's strength contribution target drones to build script with this.
It is understood that the principle that embodiment of above is intended to be merely illustrative of the present and the exemplary implementation that uses
Mode, however the present invention is not limited thereto.For those skilled in the art, essence of the invention is not being departed from
In the case where mind and essence, various changes and modifications can be made therein, these variations and modifications are also considered as protection scope of the present invention.
Claims (4)
1. a kind of method of the fast construction target drone environment based on container, which comprises the following steps:
A. container cloud infrastructure is built using open source kubernetes technology, that is, establishes target drone environmental infrastructure;
B. target drone environment Dockerfile file is write, constructs target drone mirror image using docker build, is marked by the tag of mirror image
Label carry out the Version Control of target drone;
C. step B is repeated to each loophole and builds standard target drone mirror image, call kubernetes API creation web program unified
The each loophole target drone environment constructed in management process B;
D. it submits publication to write the Dockerfile file finished, automation building target drone mirror image is realized by pipeline pipeline
Process, while the target drone mirror image of building being published in the target drone image listing of web terminal, service is provided.
2. a kind of method of fast construction target drone environment based on container according to claim 1, which is characterized in that described
Write target drone environment Dockerfile file in step B and be specifically includes the following steps:
S1. specific target drone environment is established for loophole, document is described according to loophole and is used needed for virtual machine simulation loophole reproduction
Environment;
S2. it records operating system, be related to the element of component, environment configurations, institute during record debugging loophole reproduction environment
The instruction used;
S3. dockerfile is write as loophole target drone environment scripting according to the record of step S2, abstract target drone was manually built
Journey dockerlize is docker container, and same loophole target drone environment is constructed by dockerfile.
3. a kind of method of fast construction target drone environment based on container according to claim 1 or 2, which is characterized in that
Continuous integrating tool can be called when realizing automation building target drone mirrored procedure by pipeline pipeline in the step D.
4. a kind of method of fast construction target drone environment based on container according to claim 3, which is characterized in that described
Continuous integrating tool is jenkins.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811375937.1A CN109471658A (en) | 2018-11-19 | 2018-11-19 | A method of the fast construction target drone environment based on container |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811375937.1A CN109471658A (en) | 2018-11-19 | 2018-11-19 | A method of the fast construction target drone environment based on container |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109471658A true CN109471658A (en) | 2019-03-15 |
Family
ID=65673067
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811375937.1A Pending CN109471658A (en) | 2018-11-19 | 2018-11-19 | A method of the fast construction target drone environment based on container |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109471658A (en) |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110888655A (en) * | 2019-11-14 | 2020-03-17 | 中国民航信息网络股份有限公司 | Application publishing method and device |
CN111259406A (en) * | 2020-01-14 | 2020-06-09 | 中国传媒大学 | Automatic construction method and system for cloud native application vulnerability reproduction environment |
CN111273926A (en) * | 2020-01-14 | 2020-06-12 | 一飞智控(天津)科技有限公司 | Airport client remote upgrade management method, system, storage medium and unmanned aerial vehicle |
CN111708610A (en) * | 2020-06-19 | 2020-09-25 | 北京神州泰岳软件股份有限公司 | Database client construction method and database operation method |
CN112468463A (en) * | 2020-11-13 | 2021-03-09 | 福建福诺移动通信技术有限公司 | Device and method for arranging scene capacity based on cloud native capacity gateway |
CN113162954A (en) * | 2021-06-23 | 2021-07-23 | 西南石油大学 | Target drone creating method and network attack and defense training system |
CN113157550A (en) * | 2020-01-23 | 2021-07-23 | 北京华顺信安科技有限公司 | Vulnerability environment management method and system based on container |
CN113760448A (en) * | 2021-04-30 | 2021-12-07 | 中科天玑数据科技股份有限公司 | Big data management platform based on kubernets |
US11500980B2 (en) | 2020-02-11 | 2022-11-15 | International Business Machines Corporation | Automated and auditable framework to control software component changes in an application build process |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102436390A (en) * | 2012-01-09 | 2012-05-02 | 华为数字技术有限公司 | Method and equipment for upgrading software of multi-core processor |
CN104410617A (en) * | 2014-11-21 | 2015-03-11 | 西安邮电大学 | Information safety attack and defense system structure of cloud platform |
CN106406849A (en) * | 2015-07-27 | 2017-02-15 | 索尼互动娱乐美国有限责任公司 | Backward compatibility by algorithm matching, disabling features, or throttling performance |
CN106873975A (en) * | 2016-12-30 | 2017-06-20 | 武汉默联股份有限公司 | Devops based on Docker persistently pays and automated system and method |
CN106888254A (en) * | 2017-01-20 | 2017-06-23 | 华南理工大学 | A kind of exchange method between container cloud framework based on Kubernetes and its each module |
US20170242689A1 (en) * | 2016-02-22 | 2017-08-24 | International Business Machines Corporation | Language-Independent Program Composition using Containers |
CN107179938A (en) * | 2017-05-12 | 2017-09-19 | 北京理工大学 | A kind of information security technology contest attacking and defending environment automatic deployment method |
CN107409126A (en) * | 2015-02-24 | 2017-11-28 | 思科技术公司 | System and method for protecting enterprise computing environment safety |
CN108512935A (en) * | 2018-04-16 | 2018-09-07 | 腾讯科技(深圳)有限公司 | data service system, method, server and computer readable storage medium |
-
2018
- 2018-11-19 CN CN201811375937.1A patent/CN109471658A/en active Pending
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102436390A (en) * | 2012-01-09 | 2012-05-02 | 华为数字技术有限公司 | Method and equipment for upgrading software of multi-core processor |
CN104410617A (en) * | 2014-11-21 | 2015-03-11 | 西安邮电大学 | Information safety attack and defense system structure of cloud platform |
CN107409126A (en) * | 2015-02-24 | 2017-11-28 | 思科技术公司 | System and method for protecting enterprise computing environment safety |
CN106406849A (en) * | 2015-07-27 | 2017-02-15 | 索尼互动娱乐美国有限责任公司 | Backward compatibility by algorithm matching, disabling features, or throttling performance |
US20170242689A1 (en) * | 2016-02-22 | 2017-08-24 | International Business Machines Corporation | Language-Independent Program Composition using Containers |
CN106873975A (en) * | 2016-12-30 | 2017-06-20 | 武汉默联股份有限公司 | Devops based on Docker persistently pays and automated system and method |
CN106888254A (en) * | 2017-01-20 | 2017-06-23 | 华南理工大学 | A kind of exchange method between container cloud framework based on Kubernetes and its each module |
CN107179938A (en) * | 2017-05-12 | 2017-09-19 | 北京理工大学 | A kind of information security technology contest attacking and defending environment automatic deployment method |
CN108512935A (en) * | 2018-04-16 | 2018-09-07 | 腾讯科技(深圳)有限公司 | data service system, method, server and computer readable storage medium |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110888655A (en) * | 2019-11-14 | 2020-03-17 | 中国民航信息网络股份有限公司 | Application publishing method and device |
CN111259406A (en) * | 2020-01-14 | 2020-06-09 | 中国传媒大学 | Automatic construction method and system for cloud native application vulnerability reproduction environment |
CN111273926A (en) * | 2020-01-14 | 2020-06-12 | 一飞智控(天津)科技有限公司 | Airport client remote upgrade management method, system, storage medium and unmanned aerial vehicle |
CN113157550A (en) * | 2020-01-23 | 2021-07-23 | 北京华顺信安科技有限公司 | Vulnerability environment management method and system based on container |
US11500980B2 (en) | 2020-02-11 | 2022-11-15 | International Business Machines Corporation | Automated and auditable framework to control software component changes in an application build process |
CN111708610A (en) * | 2020-06-19 | 2020-09-25 | 北京神州泰岳软件股份有限公司 | Database client construction method and database operation method |
CN111708610B (en) * | 2020-06-19 | 2024-02-27 | 北京神州泰岳软件股份有限公司 | Database client construction method and database operation method |
CN112468463A (en) * | 2020-11-13 | 2021-03-09 | 福建福诺移动通信技术有限公司 | Device and method for arranging scene capacity based on cloud native capacity gateway |
CN112468463B (en) * | 2020-11-13 | 2023-04-11 | 福建福诺移动通信技术有限公司 | Device and method for arranging scene capacity based on cloud native capacity gateway |
CN113760448A (en) * | 2021-04-30 | 2021-12-07 | 中科天玑数据科技股份有限公司 | Big data management platform based on kubernets |
CN113162954A (en) * | 2021-06-23 | 2021-07-23 | 西南石油大学 | Target drone creating method and network attack and defense training system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109471658A (en) | A method of the fast construction target drone environment based on container | |
EP3115902B1 (en) | Framework for automated testing of mobile apps | |
US10462018B2 (en) | Managing a number of secondary clouds by a master cloud service manager | |
CN104750487B (en) | A kind of development approach and starting method of mobile terminal APP | |
US20140129457A1 (en) | An interactive organizational decision-making and compliance facilitation portal | |
US20120233588A1 (en) | Blended service creation, test, and deployment environment for multiple service endpoints | |
US20120233589A1 (en) | Software development kit for blended services | |
van Beek et al. | Digital forensics as a service: Stepping up the game | |
CN113434158B (en) | Custom management method, device, equipment and medium for big data component | |
CN105556505A (en) | Legacy system | |
Dobrica et al. | Experiencing native mobile health applications development | |
US20240086239A1 (en) | Services development and deployment for backend system integration | |
US20210232494A1 (en) | Network application testing using domain-specific natural language | |
KR102173137B1 (en) | Method for providing remote test service for mobile application | |
Chowhan | Hands-on Serverless Computing: Build, Run and Orchestrate Serverless Applications Using AWS Lambda, Microsoft Azure Functions, and Google Cloud Functions | |
Chen et al. | On developing and deploying large-file upload services of personal cloud storage | |
CN115543491A (en) | Microservice processing method and device | |
Sreeram | Azure Serverless Computing Cookbook: Build and monitor Azure applications hosted on serverless architecture using Azure functions | |
Dumont et al. | A mobile distributed system for remote resource access | |
CN110083589A (en) | A kind of ability warehouse towards avionics system | |
Yuen et al. | GitOps and Kubernetes: Continuous Deployment with Argo CD, Jenkins X, and Flux | |
Sen et al. | Using DevOps paradigm to deploy web applications. | |
CN109960649A (en) | Automatization test system | |
CN109167826A (en) | The restocking method, apparatus and system of WEB application | |
Mustafa | Understanding DevOps Concepts |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190315 |