CN109981351A - A kind of private clound dispositions method - Google Patents
A kind of private clound dispositions method Download PDFInfo
- Publication number
- CN109981351A CN109981351A CN201910167020.0A CN201910167020A CN109981351A CN 109981351 A CN109981351 A CN 109981351A CN 201910167020 A CN201910167020 A CN 201910167020A CN 109981351 A CN109981351 A CN 109981351A
- Authority
- CN
- China
- Prior art keywords
- mirror image
- cluster
- warehouse
- build
- private clound
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/60—Software deployment
- G06F8/65—Updates
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/455—Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
- G06F9/45504—Abstract machines for programme code execution, e.g. Java virtual machine [JVM], interpreters, emulators
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/50—Network service management, e.g. ensuring proper service fulfilment according to agreements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1097—Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/51—Discovery or management thereof, e.g. service location protocol [SLP] or web services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0863—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving passwords or one-time passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0869—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The invention discloses a kind of private clound dispositions methods, belong to computer field, the technical problem to be solved in the present invention is the management how realized to container, publication, maintenance private clound application, guarantee all data all under the control of oneself, safety and privacy have absolute guarantee, the technical solution of use are as follows: steps are as follows: it S1, relies on Linux system and builds management cluster: relying on the released version of the centos ubuntu in linux, kubernetes cluster is constructed, the High Availabitity of application is realized by kubernetes;S2, reference Open-Source Tools build CI/CD process, issue itself mirror image: being created that the program bag of suitable kubernetes cluster environment operation, the application for needing to run is packaged into the mirror image that can be operated in kubernetes cluster environment;S3, reference open source publishing tool build privately owned mirror image warehouse, manage the mirror image installation kit of oneself;S4, the privately owned warehouse helm, management mirror image publication packet are built;S5, privately owned cluster run mirror image, provide service.
Description
Technical field
The present invention relates to computer field, specifically a kind of private clound dispositions method.
Background technique
Under current internet environment, container with its light weight, it is convenient many advantages, such as, tied up traditional application publication rapidly
Mode space, more and more services start containerizations, in this context, how realize using container realize Devops at
Current hot spot;Major Internet company also proposed the solution of oneself, become the actual execution of container in docker
On the basis of standard, these containers how are managed as new technology pain spot;Therefore how to realize the management to container, publication, dimension
Protecting smuggling has cloud application, guarantees all data all under the control of oneself, it is mesh that safety, which has absolute guarantee with privacy,
The technical issues of preceding urgent need to resolve in the prior art.
Summary of the invention
Technical assignment of the invention is to provide a kind of private clound dispositions method, to solve how to realize the management to container,
Publication, maintenance private clound application guarantee all data all under the control of oneself, and safety and privacy have absolute guarantor
The problem of barrier.
Technical assignment of the invention realizes that a kind of private clound dispositions method, steps are as follows in the following manner:
S1, it relies on Linux system and builds management cluster: relying on the release of the centos ubuntu in linux
This, constructs kubernetes cluster, and the High Availabitity of application is realized by kubernetes;
S2, reference Open-Source Tools build CI/CD process, issue itself mirror image: being created that suitable kubernetes collection group rings
The application for needing to run is packaged into the mirror image that can be operated in kubernetes cluster environment by the program bag of border operation;
S3, reference open source publishing tool build privately owned mirror image warehouse, manage the mirror image installation kit of oneself: providing a unification
Mirror image warehouse, all packed program bags unified managements are got up, the update of program bag is facilitated;
S4, the privately owned warehouse helm is built, management mirror image publication packet: a unified publication is provided and assures reason warehouse, will be sent out
Required dependence item column are clear when cloth program;
S5, privately owned cluster run mirror image, provide service.
Preferably, relied in the step S1 Linux system build management cluster specific step is as follows:
S101, installation company-data storage service etcd;
S102, working node installation docker service: docker service is installed by way of adding the source yun to worker
Node;
S103, installation network plug-in: according to the actual conditions of itself, selecting suitable double layer network plug-in unit, such as
Flannel calico etc..
S104, installation cluster.
More preferably, specific step is as follows by installation company-data storage service etcd in the S101:
S10101, oneself signature is done to the machine for needing to build etcd cluster using cfssl openssl tool, generates
Certificate;
S10102, newest document version is pulled from the warehouse github of etcd, installed according to the content of readme file
Etcd cluster.
More preferably, specific step is as follows for installation cluster in the S104:
S10401, service is installed on master and worker node respectively;
S10402, master node installation kube-apiserver, kube-controller-manager and kube-
Schedule service;
S10403, worker node installation kubelet and kube-proxy service, complete cluster building.
Preferably, quoting the use GitLab that Open-Source Tools build CI/CD process in the step S2, specific steps are such as
Under:
S201, GitLab CI are the integrated CI functions of GitLab default, and GitLab CI passes through the .gitlab- in project
Ci.yaml configuration file reads CI task and carries out respective handling;
S202, GitLab CI carry out build operation by the Agent end of referred to as GitLab Runner;
S203, Runner use Docker image starting;
S203, Runner host build or empty by newly creation directly where Runner when carrying out build operation
Quasi- machine (vmware, virtualbox) carries out build;Runner supports Docker as build supplier simultaneously, i.e., every time
Build newly starts container and carries out build;
S204, the CI/CD tool by gitlab, configuration need gitlab runner to be used, are created that application program
Foundation image, and mirror image is uploaded in privately owned mirror image warehouse.
Preferably, reference open source publishing tool builds privately owned mirror image warehouse structure by way of container in the step S3
Build mirror image warehouse.
More preferably, reference open source publishing tool builds privately owned mirror image warehouse specific step is as follows in the step S3:
S301, registry mirror image is pulled;
S302, starting mirror image: addition domain name mapping and ssl certificate are built into the mirror image warehouse that public network opens access.
Preferably, building warehouse in the S4, specific step is as follows for management mirror image publication packet:
S401, it assures in reason warehouse to pull from unified publication and issues packet;
Dependence in S402, parsing publication packet;
S403, required mirror image is pulled from mirror image warehouse according to dependence;
S404, according to publication packet in configuration information, installation rely on, final operation service.
Preferably, according to application characteristic, writing charts text after the step S1 to step S5 completes environmental structure
Part describes the dependence between application by charts file, will be applied by helm and be deployed to kubernetes cluster
In.
More preferably, described to be specifically referred to using kubernetes cluster is deployed to by mysql database portion by helm
It affixes one's name in kubernetes cluster, the specific steps are as follows:
(1), Mysql database passes through secret configuration database login user name password;
(2), the password for doing complexity at random is generated;
(3), mysql database is disposed.
A kind of private clound dispositions method of the invention has the advantage that
(1), the present invention realizes management to container by means of the kubernetes cluster of Google, issue, safeguard it is privately owned
Cloud application provides the scheme of a kind of deployment of private clound and application management, solves the one of medium-and-large-sized companies deployment and Management and Application
Kind method, the various open source resources to make full use of internet are either realized in upper or maintenance all with easy to get started, easy to maintain
The characteristics of, framework is clear, can basically meet various types of application managements and O&M;
(2), the present invention realizes the exploitation from application program, packing, installation dependence combing, building running environment, operation
Using etc. a whole set of private clound deploying step the High Availabitity of application may be implemented by the O&M to private clound;
(3), the present invention is the solution of system architecture layer, provides the solution that cluster is installed to cluster O&M the whole series
Scheme can solve overwhelming majority application deployment, O&M problem, be especially suitable for having the team for constructing middle-size and small-size private clound demand,
Enjoy public cloud all it is convenient on the basis of, ensure that all data all under the control of oneself, safety and secret
Property has absolute guarantee;Also it is suitble to the team for being badly in need of constructing oneself devops environment simultaneously, covers from exploitation to the whole of publication
A life cycle.
Detailed description of the invention
The following further describes the present invention with reference to the drawings.
Attached drawing 1 is the block diagram representation quoted Open-Source Tools and build CI/CD process.
Specific embodiment
A kind of private clound dispositions method of the invention is said in detail below referring to Figure of description and specific embodiment
It is bright.
Embodiment:
The environment that deployment cluster needs is described as follows shown in table:
Wherein, database server is responsible for storing all data into group, and serves as the master node of cluster, is
Worker node provides service;Application server is mainly responsible for the service for running actual application;NAS, which is stored, is responsible for storage cluster
In application data, load-balanced server such as F5 etc. is optional facility, is not embodied in this example.
Private clound dispositions method of the invention, steps are as follows:
S1, it relies on Linux system and builds management cluster: relying on the release of the centos ubuntu in linux
This, constructs kubernetes cluster, and the High Availabitity of application is realized by kubernetes;Specific step is as follows:
S101, installation company-data storage service etcd;Specific step is as follows:
S10101, oneself signature is done to the machine for needing to build etcd cluster using cfssl openssl tool, generates
Certificate;
S10102, newest document version is pulled from the warehouse github of etcd, installed according to the content of readme file
Etcd cluster.
More preferably, specific step is as follows for installation cluster in the S104:
S10401, service is installed on master and worker node respectively;
S10402, master node installation kube-apiserver, kube-controller-manager and kube-
Schedule service;
S10403, worker node installation kubelet and kube-proxy service, complete cluster building.
S102, working node installation docker service: docker service is installed by way of adding the source yun to worker
Node;
S103, installation network plug-in: according to the actual conditions of itself, selecting suitable double layer network plug-in unit, such as
Flannel calico etc..
S104, installation cluster.
S2, reference Open-Source Tools build CI/CD process, issue itself mirror image: being created that suitable kubernetes collection group rings
The application for needing to run is packaged into the mirror image that can be operated in kubernetes cluster environment by the program bag of border operation;Reference
Open-Source Tools build the use GitLab of CI/CD process, as shown in Fig. 1, the specific steps are as follows:
S201, GitLab CI are the integrated CI functions of GitLab default, and GitLab CI passes through the .gitlab- in project
Ci.yaml configuration file reads CI task and carries out respective handling;
S202, GitLab CI carry out build operation by the Agent end of referred to as GitLab Runner;
S203, Runner use Docker image starting;
S203, Runner host build or empty by newly creation directly where Runner when carrying out build operation
Quasi- machine (vmware, virtualbox) carries out build;Runner supports Docker as build supplier simultaneously, i.e., every time
Build newly starts container and carries out build;
S204, the CI/CD tool by gitlab, configuration need gitlab runner to be used, are created that application program
Foundation image, and mirror image is uploaded in privately owned mirror image warehouse.
Wherein, Gitlab Server is exactly the server of a gitlab, and gitlab is a set of version management, persistently opens
The frame of hair, continuous integrating, it can be understood as a more complicated software systems;
Runner is exactly literal meaning, and obstructed runner has different functions, each runner is equivalent to one
The worker to work;
Build is exactly composer, and VM is virtual machine, and VM build is exactly a virtual machine composer, can construct one
Virtual machine, and run
Docker is a technical term, is responsible for being packaged program, docker bulid is exactly to construct one to be packaged journey
Sequence is the environment of a docker mirror image, and program is packaged into a docker mirror image, is serviced by docker this journey
Sequence runs.
S3, reference open source publishing tool build privately owned mirror image warehouse, manage the mirror image installation kit of oneself: providing a unification
Mirror image warehouse, all packed program bags unified managements are got up, the update of program bag is facilitated;Specific steps are such as
Under:
S301, registry mirror image is pulled;Key code: docker pull registry:2;
S302, starting mirror image: addition domain name mapping and ssl certificate are built into the mirror image warehouse that public network opens access;Crucial generation
Code: docker run-d-p 5000:5000--name registry-v/mnt/docker/data/registry:/var/
lib/registry registry:2。
S4, the privately owned warehouse helm is built, management mirror image publication packet: a unified publication is provided and assures reason warehouse, will be sent out
Required dependence item column are clear when cloth program;Specific step is as follows:
S401, it assures in reason warehouse to pull from unified publication and issues packet;
Dependence in S402, parsing publication packet;
S403, required mirror image is pulled from mirror image warehouse according to dependence;
S404, according to publication packet in configuration information, installation rely on, final operation service.
Wherein, it builds the warehouse private helm and constructs the privately owned warehouse charts referring to the official website helm, and select according to their needs
Select suitable UI, such as Monocular UI.
S5, privately owned cluster run mirror image, provide service.
Wherein, after step S1 to step S5 completes environmental structure, according to application characteristic, charts file is write, is passed through
Charts file describes the dependence between application, will be applied and is deployed in kubernetes cluster by helm.Pass through
Helm will specifically refer to for mysql database being deployed in kubernetes cluster using kubernetes cluster is deployed to, and have
Steps are as follows for body:
(1), Mysql database passes through secret configuration database login user name password;Key code: kubectl
Create secret generic emm-mysql--from-literal mysql-password=$ (head-c 16/
Dev/urandom | od-An-t x | tr-d ") -- from-literal mysql-root-password=$ (head-c 16/
dev/urandom|od-An-t x|tr-d");
(2), the password for doing complexity at random is generated;
(3), mysql database is disposed;Key code: Helm install stable/mysql mysql.
It is as follows to dispose result:
NAME READY STATUS RESTARTS AGE
mysql-5bf46d589d-zx8lw 1/1Running 0 13s
Finally, it should be noted that the above embodiments are only used to illustrate the technical solution of the present invention., rather than its limitations;To the greatest extent
Pipe present invention has been described in detail with reference to the aforementioned embodiments, those skilled in the art should understand that: its according to
So be possible to modify the technical solutions described in the foregoing embodiments, or to some or all of the technical features into
Row equivalent replacement;And these are modified or replaceed, various embodiments of the present invention technology that it does not separate the essence of the corresponding technical solution
The range of scheme.
Claims (10)
1. a kind of private clound dispositions method, which is characterized in that steps are as follows:
S1, it relies on Linux system and builds management cluster: relying on the released version of the centos ubuntu in linux, structure
Kubernetes cluster is built, the High Availabitity of application is realized by kubernetes;
S2, reference Open-Source Tools build CI/CD process, issue itself mirror image: being created that suitable kubernetes cluster environment fortune
The application for needing to run is packaged into the mirror image that can be operated in kubernetes cluster environment by capable program bag;
S3, reference open source publishing tool build privately owned mirror image warehouse, manage the mirror image installation kit of oneself: providing a unified mirror
As warehouse, all packed program bag unified managements are got up, the update of program bag is facilitated;
S4, the privately owned warehouse helm is built, management mirror image publication packet: a unified publication is provided and assures reason warehouse, journey will be issued
Required dependence item column are clear when sequence;
S5, privately owned cluster run mirror image, provide service.
2. private clound dispositions method according to claim 1, which is characterized in that rely on linux system in the step S1
System builds management cluster, and specific step is as follows:
S101, installation company-data storage service etcd;
S102, working node installation docker service: docker service is installed by way of adding the source yun and is saved to worker
Point;
S103, installation network plug-in: according to the actual conditions of itself, suitable double layer network plug-in unit is selected.
S104, installation cluster.
3. private clound dispositions method according to claim 2, which is characterized in that install company-data storage in the S101
Servicing etcd, specific step is as follows:
S10101, oneself signature is done to the machine for needing to build etcd cluster using cfssl openssl tool, generates certificate;
S10102, newest document version is pulled from the warehouse github of etcd, etcd collection is installed according to the content of readme file
Group.
4. private clound dispositions method according to claim 2 or 3, which is characterized in that install the tool of cluster in the S104
Steps are as follows for body:
S10401, service is installed on master and worker node respectively;
S10402, master node installation kube-apiserver, kube-controller-manager and kube-
Schedule service;
S10403, worker node installation kubelet and kube-proxy service, complete cluster building.
5. private clound dispositions method according to claim 1, which is characterized in that quote Open-Source Tools in the step S2 and take
That builds CI/CD process uses GitLab, the specific steps are as follows:
S201, GitLab CI are the integrated CI functions of GitLab default, and GitLab CI passes through the .gitlab- in project
Ci.yaml configuration file reads CI task and carries out respective handling;
S202, GitLab CI carry out build operation by the Agent end of referred to as GitLab Runner;
S203, Runner use Docker image starting;
S203, Runner host build or by newly creating virtual machine directly where Runner when carrying out build operation
Carry out build;Runner supports Docker as build supplier simultaneously, i.e., each build newly starts container and carries out build;
S204, the CI/CD tool by gitlab, configuration need gitlab runner to be used, are created that the base of application program
Plinth mirror image, and mirror image is uploaded in privately owned mirror image warehouse.
6. private clound dispositions method according to claim 1, which is characterized in that reference open source publication work in the step S3
Tool builds privately owned mirror image warehouse and constructs mirror image warehouse by way of container.
7. private clound dispositions method according to claim 1 or 6, which is characterized in that reference open source hair in the step S3
Cloth tool builds privately owned mirror image warehouse, and specific step is as follows:
S301, registry mirror image is pulled;
S302, starting mirror image: addition domain name mapping and ssl certificate are built into the mirror image warehouse that public network opens access.
8. private clound dispositions method according to claim 1, which is characterized in that build warehouse in the S4, manage mirror image
Specific step is as follows for publication packet:
S401, it assures in reason warehouse to pull from unified publication and issues packet;
Dependence in S402, parsing publication packet;
S403, required mirror image is pulled from mirror image warehouse according to dependence;
S404, according to publication packet in configuration information, installation rely on, final operation service.
9. private clound dispositions method according to claim 1, which is characterized in that the step S1 to step S5 completes environment
After building, according to application characteristic, charts file is write, by charts file, the dependence between application is described, passes through
Helm will be applied and will be deployed in kubernetes cluster.
10. private clound dispositions method according to claim 9, which is characterized in that described will be applied by helm is deployed to
Kubernetes cluster specifically refers to for mysql database being deployed in kubernetes cluster, the specific steps are as follows:
(1), Mysql database passes through secret configuration database login user name password;
(2), the password for doing complexity at random is generated;
(3), mysql database is disposed.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910167020.0A CN109981351A (en) | 2019-03-06 | 2019-03-06 | A kind of private clound dispositions method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910167020.0A CN109981351A (en) | 2019-03-06 | 2019-03-06 | A kind of private clound dispositions method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109981351A true CN109981351A (en) | 2019-07-05 |
Family
ID=67078035
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910167020.0A Pending CN109981351A (en) | 2019-03-06 | 2019-03-06 | A kind of private clound dispositions method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109981351A (en) |
Cited By (26)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110531987A (en) * | 2019-07-30 | 2019-12-03 | 平安科技(深圳)有限公司 | Management method, device and computer readable storage medium based on Kubernetes cluster |
CN110808857A (en) * | 2019-10-31 | 2020-02-18 | 深圳前海环融联易信息科技服务有限公司 | Network intercommunication method, device, equipment and storage medium for realizing Kubernetes cluster |
CN111090437A (en) * | 2019-11-19 | 2020-05-01 | 平安科技(深圳)有限公司 | Application deployment method and device and computer readable storage medium |
CN111142881A (en) * | 2019-12-27 | 2020-05-12 | 浪潮云信息技术有限公司 | Kubernets-based charts automation deployment system and method |
CN111158859A (en) * | 2019-12-30 | 2020-05-15 | 中电工业互联网有限公司 | Application management system based on kylin operating system and implementation and use method thereof |
CN111273960A (en) * | 2020-01-20 | 2020-06-12 | 山东汇贸电子口岸有限公司 | Method for realizing cloud native MIPS architecture container cloud |
CN111338657A (en) * | 2020-02-26 | 2020-06-26 | 山东汇贸电子口岸有限公司 | Template-based palm parameter batch configuration method |
CN111399855A (en) * | 2020-03-09 | 2020-07-10 | 山东汇贸电子口岸有限公司 | Automatic application instance publishing method based on container technology |
CN111427600A (en) * | 2020-03-20 | 2020-07-17 | 成都千立网络科技有限公司 | Docker-based platform system deployment and upgrade method and system |
CN111443993A (en) * | 2020-04-01 | 2020-07-24 | 山东汇贸电子口岸有限公司 | Method for realizing large-scale container cluster |
CN111475260A (en) * | 2020-04-10 | 2020-07-31 | 杭州趣维科技有限公司 | Flexible CICD method based on jenkins and kubernets platform |
CN111708608A (en) * | 2020-06-19 | 2020-09-25 | 浪潮云信息技术股份公司 | Container large cluster rapid deployment method and system based on infrastructure |
CN112199164A (en) * | 2020-10-19 | 2021-01-08 | 国网新疆电力有限公司信息通信公司 | Method for ensuring container mirror image consistency |
CN112650560A (en) * | 2021-01-18 | 2021-04-13 | 济南浪潮高新科技投资发展有限公司 | Container design-based cloud robot model issuing method |
CN112711426A (en) * | 2019-10-24 | 2021-04-27 | 北京车和家信息技术有限公司 | Embedded system installation package generation method and device and server |
CN112860335A (en) * | 2021-01-25 | 2021-05-28 | 启明星辰信息技术集团股份有限公司 | Docker mirror image information acquisition system and method for private warehouse |
CN113094151A (en) * | 2021-04-23 | 2021-07-09 | 汇能云科技(宁波)有限公司 | Helm-based micro-service application deployment system and method |
CN113238928A (en) * | 2021-04-23 | 2021-08-10 | 杭州电子科技大学 | End cloud collaborative evaluation system for audio and video big data task |
CN113507489A (en) * | 2020-09-30 | 2021-10-15 | 西部证券股份有限公司 | Visual deployment, operation and maintenance method of financial private cloud |
CN113590305A (en) * | 2021-05-14 | 2021-11-02 | 西安交通大学 | Edge computing application capacity deployment method based on k3s |
CN113779477A (en) * | 2021-09-13 | 2021-12-10 | 科大国创云网科技有限公司 | Assembly line publishing method and system based on PaaS cloud platform |
CN113805899A (en) * | 2021-08-25 | 2021-12-17 | 浪潮卓数大数据产业发展有限公司 | Automatic software deployment method |
CN114020288A (en) * | 2021-11-04 | 2022-02-08 | 四川启睿克科技有限公司 | Method for deploying Kubernetes cluster offline |
CN114157658A (en) * | 2021-12-06 | 2022-03-08 | 京东科技信息技术有限公司 | Mirror image warehouse deployment method and device, electronic equipment and computer readable medium |
CN115129429A (en) * | 2022-09-01 | 2022-09-30 | 南京翼辉爱智物联技术有限公司 | Container application management method and device, electronic equipment and storage medium |
CN116610330A (en) * | 2022-11-29 | 2023-08-18 | 天翼数字生活科技有限公司 | Method and system for quickly constructing iOS development third-party dependence |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106873975A (en) * | 2016-12-30 | 2017-06-20 | 武汉默联股份有限公司 | Devops based on Docker persistently pays and automated system and method |
CN106888254A (en) * | 2017-01-20 | 2017-06-23 | 华南理工大学 | A kind of exchange method between container cloud framework based on Kubernetes and its each module |
CN108874650A (en) * | 2017-05-09 | 2018-11-23 | 上海秦苍信息科技有限公司 | A kind of continuous integrating automated testing method |
CN109032645A (en) * | 2018-07-28 | 2018-12-18 | 烽火云科技有限公司 | The method and system of continuous integrating and deployment based on Kubernetes |
CN109062655A (en) * | 2018-06-05 | 2018-12-21 | 腾讯科技(深圳)有限公司 | A kind of containerization cloud platform and server |
CN109358858A (en) * | 2018-09-19 | 2019-02-19 | 网易(杭州)网络有限公司 | Automatically dispose method, apparatus, medium and electronic equipment |
-
2019
- 2019-03-06 CN CN201910167020.0A patent/CN109981351A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106873975A (en) * | 2016-12-30 | 2017-06-20 | 武汉默联股份有限公司 | Devops based on Docker persistently pays and automated system and method |
CN106888254A (en) * | 2017-01-20 | 2017-06-23 | 华南理工大学 | A kind of exchange method between container cloud framework based on Kubernetes and its each module |
CN108874650A (en) * | 2017-05-09 | 2018-11-23 | 上海秦苍信息科技有限公司 | A kind of continuous integrating automated testing method |
CN109062655A (en) * | 2018-06-05 | 2018-12-21 | 腾讯科技(深圳)有限公司 | A kind of containerization cloud platform and server |
CN109032645A (en) * | 2018-07-28 | 2018-12-18 | 烽火云科技有限公司 | The method and system of continuous integrating and deployment based on Kubernetes |
CN109358858A (en) * | 2018-09-19 | 2019-02-19 | 网易(杭州)网络有限公司 | Automatically dispose method, apparatus, medium and electronic equipment |
Non-Patent Citations (1)
Title |
---|
YGQYGQ2: "Gitlab在Kubernetes上的CI/CD", 《51CTO博客》 * |
Cited By (42)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2021017301A1 (en) * | 2019-07-30 | 2021-02-04 | 平安科技(深圳)有限公司 | Management method and apparatus based on kubernetes cluster, and computer-readable storage medium |
CN110531987A (en) * | 2019-07-30 | 2019-12-03 | 平安科技(深圳)有限公司 | Management method, device and computer readable storage medium based on Kubernetes cluster |
CN112711426B (en) * | 2019-10-24 | 2023-12-26 | 北京车和家信息技术有限公司 | Embedded system installation package generation method, device and server |
CN112711426A (en) * | 2019-10-24 | 2021-04-27 | 北京车和家信息技术有限公司 | Embedded system installation package generation method and device and server |
CN110808857A (en) * | 2019-10-31 | 2020-02-18 | 深圳前海环融联易信息科技服务有限公司 | Network intercommunication method, device, equipment and storage medium for realizing Kubernetes cluster |
CN110808857B (en) * | 2019-10-31 | 2022-06-07 | 深圳前海环融联易信息科技服务有限公司 | Network intercommunication method, device, equipment and storage medium for realizing Kubernetes cluster |
WO2021098392A1 (en) * | 2019-11-19 | 2021-05-27 | 平安科技(深圳)有限公司 | Application deployment method and apparatus, electronic device and storage medium |
CN111090437A (en) * | 2019-11-19 | 2020-05-01 | 平安科技(深圳)有限公司 | Application deployment method and device and computer readable storage medium |
CN111090437B (en) * | 2019-11-19 | 2024-03-12 | 平安科技(深圳)有限公司 | Application deployment method and device and computer readable storage medium |
CN111142881A (en) * | 2019-12-27 | 2020-05-12 | 浪潮云信息技术有限公司 | Kubernets-based charts automation deployment system and method |
CN111142881B (en) * | 2019-12-27 | 2023-10-27 | 浪潮云信息技术股份公司 | Kubernetes-based system and kubernetes-based method for automatic deployment of orchestration charts |
CN111158859B (en) * | 2019-12-30 | 2023-09-26 | 中电工业互联网有限公司 | Application management system based on kylin operating system and implementation and use method thereof |
CN111158859A (en) * | 2019-12-30 | 2020-05-15 | 中电工业互联网有限公司 | Application management system based on kylin operating system and implementation and use method thereof |
CN111273960A (en) * | 2020-01-20 | 2020-06-12 | 山东汇贸电子口岸有限公司 | Method for realizing cloud native MIPS architecture container cloud |
CN111338657B (en) * | 2020-02-26 | 2023-12-01 | 山东汇贸电子口岸有限公司 | Template-based palm parameter batch configuration method |
CN111338657A (en) * | 2020-02-26 | 2020-06-26 | 山东汇贸电子口岸有限公司 | Template-based palm parameter batch configuration method |
CN111399855B (en) * | 2020-03-09 | 2023-10-20 | 山东省电子口岸有限公司 | Automatic application instance publishing method based on container technology |
CN111399855A (en) * | 2020-03-09 | 2020-07-10 | 山东汇贸电子口岸有限公司 | Automatic application instance publishing method based on container technology |
CN111427600A (en) * | 2020-03-20 | 2020-07-17 | 成都千立网络科技有限公司 | Docker-based platform system deployment and upgrade method and system |
CN111443993A (en) * | 2020-04-01 | 2020-07-24 | 山东汇贸电子口岸有限公司 | Method for realizing large-scale container cluster |
CN111475260A (en) * | 2020-04-10 | 2020-07-31 | 杭州趣维科技有限公司 | Flexible CICD method based on jenkins and kubernets platform |
CN111708608A (en) * | 2020-06-19 | 2020-09-25 | 浪潮云信息技术股份公司 | Container large cluster rapid deployment method and system based on infrastructure |
CN111708608B (en) * | 2020-06-19 | 2023-04-25 | 浪潮云信息技术股份公司 | Container large cluster rapid deployment method and system based on stable |
CN113507489A (en) * | 2020-09-30 | 2021-10-15 | 西部证券股份有限公司 | Visual deployment, operation and maintenance method of financial private cloud |
CN113507489B (en) * | 2020-09-30 | 2022-10-14 | 西部证券股份有限公司 | Visual deployment, operation and maintenance method of financial private cloud |
CN112199164A (en) * | 2020-10-19 | 2021-01-08 | 国网新疆电力有限公司信息通信公司 | Method for ensuring container mirror image consistency |
CN112650560A (en) * | 2021-01-18 | 2021-04-13 | 济南浪潮高新科技投资发展有限公司 | Container design-based cloud robot model issuing method |
CN112650560B (en) * | 2021-01-18 | 2022-10-18 | 山东浪潮科学研究院有限公司 | Container design-based cloud robot model issuing method |
CN112860335A (en) * | 2021-01-25 | 2021-05-28 | 启明星辰信息技术集团股份有限公司 | Docker mirror image information acquisition system and method for private warehouse |
CN112860335B (en) * | 2021-01-25 | 2024-02-20 | 启明星辰信息技术集团股份有限公司 | Private warehouse Docker mirror image information acquisition system and acquisition method thereof |
CN113238928B (en) * | 2021-04-23 | 2022-05-06 | 杭州电子科技大学 | End cloud collaborative evaluation system for audio and video big data task |
CN113238928A (en) * | 2021-04-23 | 2021-08-10 | 杭州电子科技大学 | End cloud collaborative evaluation system for audio and video big data task |
CN113094151A (en) * | 2021-04-23 | 2021-07-09 | 汇能云科技(宁波)有限公司 | Helm-based micro-service application deployment system and method |
CN113590305A (en) * | 2021-05-14 | 2021-11-02 | 西安交通大学 | Edge computing application capacity deployment method based on k3s |
CN113805899A (en) * | 2021-08-25 | 2021-12-17 | 浪潮卓数大数据产业发展有限公司 | Automatic software deployment method |
CN113805899B (en) * | 2021-08-25 | 2024-01-26 | 浪潮卓数大数据产业发展有限公司 | Automatic software deployment method |
CN113779477A (en) * | 2021-09-13 | 2021-12-10 | 科大国创云网科技有限公司 | Assembly line publishing method and system based on PaaS cloud platform |
CN114020288A (en) * | 2021-11-04 | 2022-02-08 | 四川启睿克科技有限公司 | Method for deploying Kubernetes cluster offline |
CN114157658B (en) * | 2021-12-06 | 2024-03-01 | 京东科技信息技术有限公司 | Mirror warehouse deployment method, apparatus, electronic device and computer readable medium |
CN114157658A (en) * | 2021-12-06 | 2022-03-08 | 京东科技信息技术有限公司 | Mirror image warehouse deployment method and device, electronic equipment and computer readable medium |
CN115129429A (en) * | 2022-09-01 | 2022-09-30 | 南京翼辉爱智物联技术有限公司 | Container application management method and device, electronic equipment and storage medium |
CN116610330A (en) * | 2022-11-29 | 2023-08-18 | 天翼数字生活科技有限公司 | Method and system for quickly constructing iOS development third-party dependence |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109981351A (en) | A kind of private clound dispositions method | |
US11237812B2 (en) | Deploying an application in a cloud computing environment | |
US9639338B2 (en) | Computer-implemented method, system and computer program product for deploying an application on a computing resource | |
US10303450B2 (en) | Systems and methods for a policy-driven orchestration of deployment of distributed applications | |
CN105323282A (en) | Enterprise application deployment and management system for multiple tenants | |
CN103218574A (en) | Hash tree-based data dynamic operation verifiability method | |
CN109906597B (en) | Storing and retrieving restricted and unrestricted data sets to and from a cloud network | |
CN103718164A (en) | Virtual computer and service | |
CN103167041A (en) | System and method for supporting cloud environment application cluster automation deployment | |
CN102638566A (en) | BLOG system running method based on cloud storage | |
CN112099917B (en) | Regulation and control system containerized application operation management method, system, equipment and medium | |
CN102375734A (en) | Application product development system, method and device and operation system, method and device | |
US10606480B2 (en) | Scale-out container volume service for multiple frameworks | |
Alsaeed et al. | Towards cloud computing services for higher educational institutions: Concepts & literature review | |
KR102035071B1 (en) | System and method for constructing on-demand virtual cluster | |
CN106873969A (en) | A kind of development approach and development platform of J2EE projects | |
US9342527B2 (en) | Sharing electronic file metadata in a networked computing environment | |
CN114760088B (en) | Flight plan data management method, system, electronic device and storage medium | |
US20210406227A1 (en) | Linking, deploying, and executing distributed analytics with distributed datasets | |
Wang et al. | Architecting a distributed bioinformatics platform with iRODS and iPlant Agave API | |
US11860980B2 (en) | Cognitive method to split monolithic architecture into microservice architecture | |
CN117076038A (en) | Mirror image construction method, device, electronic equipment and storage medium | |
CN116233221A (en) | Method, device, equipment and medium for deploying domain name system cloud resolution service | |
CN103853501A (en) | Computer implementation method and computer system for identifying redundant data for disk image streaming | |
CN113674126A (en) | Block chain-based government affair information processing method and device and electronic equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190705 |