CN109981351A - A kind of private clound dispositions method - Google Patents

A kind of private clound dispositions method Download PDF

Info

Publication number
CN109981351A
CN109981351A CN201910167020.0A CN201910167020A CN109981351A CN 109981351 A CN109981351 A CN 109981351A CN 201910167020 A CN201910167020 A CN 201910167020A CN 109981351 A CN109981351 A CN 109981351A
Authority
CN
China
Prior art keywords
mirror image
cluster
warehouse
build
private clound
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910167020.0A
Other languages
Chinese (zh)
Inventor
魏星
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Inspur General Software Co Ltd
Original Assignee
Inspur General Software Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Inspur General Software Co Ltd filed Critical Inspur General Software Co Ltd
Priority to CN201910167020.0A priority Critical patent/CN109981351A/en
Publication of CN109981351A publication Critical patent/CN109981351A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/60Software deployment
    • G06F8/65Updates
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • G06F9/45504Abstract machines for programme code execution, e.g. Java virtual machine [JVM], interpreters, emulators
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/50Network service management, e.g. ensuring proper service fulfilment according to agreements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/51Discovery or management thereof, e.g. service location protocol [SLP] or web services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0863Generation of secret information including derivation or calculation of cryptographic keys or passwords involving passwords or one-time passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention discloses a kind of private clound dispositions methods, belong to computer field, the technical problem to be solved in the present invention is the management how realized to container, publication, maintenance private clound application, guarantee all data all under the control of oneself, safety and privacy have absolute guarantee, the technical solution of use are as follows: steps are as follows: it S1, relies on Linux system and builds management cluster: relying on the released version of the centos ubuntu in linux, kubernetes cluster is constructed, the High Availabitity of application is realized by kubernetes;S2, reference Open-Source Tools build CI/CD process, issue itself mirror image: being created that the program bag of suitable kubernetes cluster environment operation, the application for needing to run is packaged into the mirror image that can be operated in kubernetes cluster environment;S3, reference open source publishing tool build privately owned mirror image warehouse, manage the mirror image installation kit of oneself;S4, the privately owned warehouse helm, management mirror image publication packet are built;S5, privately owned cluster run mirror image, provide service.

Description

A kind of private clound dispositions method
Technical field
The present invention relates to computer field, specifically a kind of private clound dispositions method.
Background technique
Under current internet environment, container with its light weight, it is convenient many advantages, such as, tied up traditional application publication rapidly Mode space, more and more services start containerizations, in this context, how realize using container realize Devops at Current hot spot;Major Internet company also proposed the solution of oneself, become the actual execution of container in docker On the basis of standard, these containers how are managed as new technology pain spot;Therefore how to realize the management to container, publication, dimension Protecting smuggling has cloud application, guarantees all data all under the control of oneself, it is mesh that safety, which has absolute guarantee with privacy, The technical issues of preceding urgent need to resolve in the prior art.
Summary of the invention
Technical assignment of the invention is to provide a kind of private clound dispositions method, to solve how to realize the management to container, Publication, maintenance private clound application guarantee all data all under the control of oneself, and safety and privacy have absolute guarantor The problem of barrier.
Technical assignment of the invention realizes that a kind of private clound dispositions method, steps are as follows in the following manner:
S1, it relies on Linux system and builds management cluster: relying on the release of the centos ubuntu in linux This, constructs kubernetes cluster, and the High Availabitity of application is realized by kubernetes;
S2, reference Open-Source Tools build CI/CD process, issue itself mirror image: being created that suitable kubernetes collection group rings The application for needing to run is packaged into the mirror image that can be operated in kubernetes cluster environment by the program bag of border operation;
S3, reference open source publishing tool build privately owned mirror image warehouse, manage the mirror image installation kit of oneself: providing a unification Mirror image warehouse, all packed program bags unified managements are got up, the update of program bag is facilitated;
S4, the privately owned warehouse helm is built, management mirror image publication packet: a unified publication is provided and assures reason warehouse, will be sent out Required dependence item column are clear when cloth program;
S5, privately owned cluster run mirror image, provide service.
Preferably, relied in the step S1 Linux system build management cluster specific step is as follows:
S101, installation company-data storage service etcd;
S102, working node installation docker service: docker service is installed by way of adding the source yun to worker Node;
S103, installation network plug-in: according to the actual conditions of itself, selecting suitable double layer network plug-in unit, such as Flannel calico etc..
S104, installation cluster.
More preferably, specific step is as follows by installation company-data storage service etcd in the S101:
S10101, oneself signature is done to the machine for needing to build etcd cluster using cfssl openssl tool, generates Certificate;
S10102, newest document version is pulled from the warehouse github of etcd, installed according to the content of readme file Etcd cluster.
More preferably, specific step is as follows for installation cluster in the S104:
S10401, service is installed on master and worker node respectively;
S10402, master node installation kube-apiserver, kube-controller-manager and kube- Schedule service;
S10403, worker node installation kubelet and kube-proxy service, complete cluster building.
Preferably, quoting the use GitLab that Open-Source Tools build CI/CD process in the step S2, specific steps are such as Under:
S201, GitLab CI are the integrated CI functions of GitLab default, and GitLab CI passes through the .gitlab- in project Ci.yaml configuration file reads CI task and carries out respective handling;
S202, GitLab CI carry out build operation by the Agent end of referred to as GitLab Runner;
S203, Runner use Docker image starting;
S203, Runner host build or empty by newly creation directly where Runner when carrying out build operation Quasi- machine (vmware, virtualbox) carries out build;Runner supports Docker as build supplier simultaneously, i.e., every time Build newly starts container and carries out build;
S204, the CI/CD tool by gitlab, configuration need gitlab runner to be used, are created that application program Foundation image, and mirror image is uploaded in privately owned mirror image warehouse.
Preferably, reference open source publishing tool builds privately owned mirror image warehouse structure by way of container in the step S3 Build mirror image warehouse.
More preferably, reference open source publishing tool builds privately owned mirror image warehouse specific step is as follows in the step S3:
S301, registry mirror image is pulled;
S302, starting mirror image: addition domain name mapping and ssl certificate are built into the mirror image warehouse that public network opens access.
Preferably, building warehouse in the S4, specific step is as follows for management mirror image publication packet:
S401, it assures in reason warehouse to pull from unified publication and issues packet;
Dependence in S402, parsing publication packet;
S403, required mirror image is pulled from mirror image warehouse according to dependence;
S404, according to publication packet in configuration information, installation rely on, final operation service.
Preferably, according to application characteristic, writing charts text after the step S1 to step S5 completes environmental structure Part describes the dependence between application by charts file, will be applied by helm and be deployed to kubernetes cluster In.
More preferably, described to be specifically referred to using kubernetes cluster is deployed to by mysql database portion by helm It affixes one's name in kubernetes cluster, the specific steps are as follows:
(1), Mysql database passes through secret configuration database login user name password;
(2), the password for doing complexity at random is generated;
(3), mysql database is disposed.
A kind of private clound dispositions method of the invention has the advantage that
(1), the present invention realizes management to container by means of the kubernetes cluster of Google, issue, safeguard it is privately owned Cloud application provides the scheme of a kind of deployment of private clound and application management, solves the one of medium-and-large-sized companies deployment and Management and Application Kind method, the various open source resources to make full use of internet are either realized in upper or maintenance all with easy to get started, easy to maintain The characteristics of, framework is clear, can basically meet various types of application managements and O&M;
(2), the present invention realizes the exploitation from application program, packing, installation dependence combing, building running environment, operation Using etc. a whole set of private clound deploying step the High Availabitity of application may be implemented by the O&M to private clound;
(3), the present invention is the solution of system architecture layer, provides the solution that cluster is installed to cluster O&M the whole series Scheme can solve overwhelming majority application deployment, O&M problem, be especially suitable for having the team for constructing middle-size and small-size private clound demand, Enjoy public cloud all it is convenient on the basis of, ensure that all data all under the control of oneself, safety and secret Property has absolute guarantee;Also it is suitble to the team for being badly in need of constructing oneself devops environment simultaneously, covers from exploitation to the whole of publication A life cycle.
Detailed description of the invention
The following further describes the present invention with reference to the drawings.
Attached drawing 1 is the block diagram representation quoted Open-Source Tools and build CI/CD process.
Specific embodiment
A kind of private clound dispositions method of the invention is said in detail below referring to Figure of description and specific embodiment It is bright.
Embodiment:
The environment that deployment cluster needs is described as follows shown in table:
Wherein, database server is responsible for storing all data into group, and serves as the master node of cluster, is Worker node provides service;Application server is mainly responsible for the service for running actual application;NAS, which is stored, is responsible for storage cluster In application data, load-balanced server such as F5 etc. is optional facility, is not embodied in this example.
Private clound dispositions method of the invention, steps are as follows:
S1, it relies on Linux system and builds management cluster: relying on the release of the centos ubuntu in linux This, constructs kubernetes cluster, and the High Availabitity of application is realized by kubernetes;Specific step is as follows:
S101, installation company-data storage service etcd;Specific step is as follows:
S10101, oneself signature is done to the machine for needing to build etcd cluster using cfssl openssl tool, generates Certificate;
S10102, newest document version is pulled from the warehouse github of etcd, installed according to the content of readme file Etcd cluster.
More preferably, specific step is as follows for installation cluster in the S104:
S10401, service is installed on master and worker node respectively;
S10402, master node installation kube-apiserver, kube-controller-manager and kube- Schedule service;
S10403, worker node installation kubelet and kube-proxy service, complete cluster building.
S102, working node installation docker service: docker service is installed by way of adding the source yun to worker Node;
S103, installation network plug-in: according to the actual conditions of itself, selecting suitable double layer network plug-in unit, such as Flannel calico etc..
S104, installation cluster.
S2, reference Open-Source Tools build CI/CD process, issue itself mirror image: being created that suitable kubernetes collection group rings The application for needing to run is packaged into the mirror image that can be operated in kubernetes cluster environment by the program bag of border operation;Reference Open-Source Tools build the use GitLab of CI/CD process, as shown in Fig. 1, the specific steps are as follows:
S201, GitLab CI are the integrated CI functions of GitLab default, and GitLab CI passes through the .gitlab- in project Ci.yaml configuration file reads CI task and carries out respective handling;
S202, GitLab CI carry out build operation by the Agent end of referred to as GitLab Runner;
S203, Runner use Docker image starting;
S203, Runner host build or empty by newly creation directly where Runner when carrying out build operation Quasi- machine (vmware, virtualbox) carries out build;Runner supports Docker as build supplier simultaneously, i.e., every time Build newly starts container and carries out build;
S204, the CI/CD tool by gitlab, configuration need gitlab runner to be used, are created that application program Foundation image, and mirror image is uploaded in privately owned mirror image warehouse.
Wherein, Gitlab Server is exactly the server of a gitlab, and gitlab is a set of version management, persistently opens The frame of hair, continuous integrating, it can be understood as a more complicated software systems;
Runner is exactly literal meaning, and obstructed runner has different functions, each runner is equivalent to one The worker to work;
Build is exactly composer, and VM is virtual machine, and VM build is exactly a virtual machine composer, can construct one Virtual machine, and run
Docker is a technical term, is responsible for being packaged program, docker bulid is exactly to construct one to be packaged journey Sequence is the environment of a docker mirror image, and program is packaged into a docker mirror image, is serviced by docker this journey Sequence runs.
S3, reference open source publishing tool build privately owned mirror image warehouse, manage the mirror image installation kit of oneself: providing a unification Mirror image warehouse, all packed program bags unified managements are got up, the update of program bag is facilitated;Specific steps are such as Under:
S301, registry mirror image is pulled;Key code: docker pull registry:2;
S302, starting mirror image: addition domain name mapping and ssl certificate are built into the mirror image warehouse that public network opens access;Crucial generation Code: docker run-d-p 5000:5000--name registry-v/mnt/docker/data/registry:/var/ lib/registry registry:2。
S4, the privately owned warehouse helm is built, management mirror image publication packet: a unified publication is provided and assures reason warehouse, will be sent out Required dependence item column are clear when cloth program;Specific step is as follows:
S401, it assures in reason warehouse to pull from unified publication and issues packet;
Dependence in S402, parsing publication packet;
S403, required mirror image is pulled from mirror image warehouse according to dependence;
S404, according to publication packet in configuration information, installation rely on, final operation service.
Wherein, it builds the warehouse private helm and constructs the privately owned warehouse charts referring to the official website helm, and select according to their needs Select suitable UI, such as Monocular UI.
S5, privately owned cluster run mirror image, provide service.
Wherein, after step S1 to step S5 completes environmental structure, according to application characteristic, charts file is write, is passed through Charts file describes the dependence between application, will be applied and is deployed in kubernetes cluster by helm.Pass through Helm will specifically refer to for mysql database being deployed in kubernetes cluster using kubernetes cluster is deployed to, and have Steps are as follows for body:
(1), Mysql database passes through secret configuration database login user name password;Key code: kubectl Create secret generic emm-mysql--from-literal mysql-password=$ (head-c 16/ Dev/urandom | od-An-t x | tr-d ") -- from-literal mysql-root-password=$ (head-c 16/ dev/urandom|od-An-t x|tr-d");
(2), the password for doing complexity at random is generated;
(3), mysql database is disposed;Key code: Helm install stable/mysql mysql.
It is as follows to dispose result:
NAME READY STATUS RESTARTS AGE
mysql-5bf46d589d-zx8lw 1/1Running 0 13s
Finally, it should be noted that the above embodiments are only used to illustrate the technical solution of the present invention., rather than its limitations;To the greatest extent Pipe present invention has been described in detail with reference to the aforementioned embodiments, those skilled in the art should understand that: its according to So be possible to modify the technical solutions described in the foregoing embodiments, or to some or all of the technical features into Row equivalent replacement;And these are modified or replaceed, various embodiments of the present invention technology that it does not separate the essence of the corresponding technical solution The range of scheme.

Claims (10)

1. a kind of private clound dispositions method, which is characterized in that steps are as follows:
S1, it relies on Linux system and builds management cluster: relying on the released version of the centos ubuntu in linux, structure Kubernetes cluster is built, the High Availabitity of application is realized by kubernetes;
S2, reference Open-Source Tools build CI/CD process, issue itself mirror image: being created that suitable kubernetes cluster environment fortune The application for needing to run is packaged into the mirror image that can be operated in kubernetes cluster environment by capable program bag;
S3, reference open source publishing tool build privately owned mirror image warehouse, manage the mirror image installation kit of oneself: providing a unified mirror As warehouse, all packed program bag unified managements are got up, the update of program bag is facilitated;
S4, the privately owned warehouse helm is built, management mirror image publication packet: a unified publication is provided and assures reason warehouse, journey will be issued Required dependence item column are clear when sequence;
S5, privately owned cluster run mirror image, provide service.
2. private clound dispositions method according to claim 1, which is characterized in that rely on linux system in the step S1 System builds management cluster, and specific step is as follows:
S101, installation company-data storage service etcd;
S102, working node installation docker service: docker service is installed by way of adding the source yun and is saved to worker Point;
S103, installation network plug-in: according to the actual conditions of itself, suitable double layer network plug-in unit is selected.
S104, installation cluster.
3. private clound dispositions method according to claim 2, which is characterized in that install company-data storage in the S101 Servicing etcd, specific step is as follows:
S10101, oneself signature is done to the machine for needing to build etcd cluster using cfssl openssl tool, generates certificate;
S10102, newest document version is pulled from the warehouse github of etcd, etcd collection is installed according to the content of readme file Group.
4. private clound dispositions method according to claim 2 or 3, which is characterized in that install the tool of cluster in the S104 Steps are as follows for body:
S10401, service is installed on master and worker node respectively;
S10402, master node installation kube-apiserver, kube-controller-manager and kube- Schedule service;
S10403, worker node installation kubelet and kube-proxy service, complete cluster building.
5. private clound dispositions method according to claim 1, which is characterized in that quote Open-Source Tools in the step S2 and take That builds CI/CD process uses GitLab, the specific steps are as follows:
S201, GitLab CI are the integrated CI functions of GitLab default, and GitLab CI passes through the .gitlab- in project Ci.yaml configuration file reads CI task and carries out respective handling;
S202, GitLab CI carry out build operation by the Agent end of referred to as GitLab Runner;
S203, Runner use Docker image starting;
S203, Runner host build or by newly creating virtual machine directly where Runner when carrying out build operation Carry out build;Runner supports Docker as build supplier simultaneously, i.e., each build newly starts container and carries out build;
S204, the CI/CD tool by gitlab, configuration need gitlab runner to be used, are created that the base of application program Plinth mirror image, and mirror image is uploaded in privately owned mirror image warehouse.
6. private clound dispositions method according to claim 1, which is characterized in that reference open source publication work in the step S3 Tool builds privately owned mirror image warehouse and constructs mirror image warehouse by way of container.
7. private clound dispositions method according to claim 1 or 6, which is characterized in that reference open source hair in the step S3 Cloth tool builds privately owned mirror image warehouse, and specific step is as follows:
S301, registry mirror image is pulled;
S302, starting mirror image: addition domain name mapping and ssl certificate are built into the mirror image warehouse that public network opens access.
8. private clound dispositions method according to claim 1, which is characterized in that build warehouse in the S4, manage mirror image Specific step is as follows for publication packet:
S401, it assures in reason warehouse to pull from unified publication and issues packet;
Dependence in S402, parsing publication packet;
S403, required mirror image is pulled from mirror image warehouse according to dependence;
S404, according to publication packet in configuration information, installation rely on, final operation service.
9. private clound dispositions method according to claim 1, which is characterized in that the step S1 to step S5 completes environment After building, according to application characteristic, charts file is write, by charts file, the dependence between application is described, passes through Helm will be applied and will be deployed in kubernetes cluster.
10. private clound dispositions method according to claim 9, which is characterized in that described will be applied by helm is deployed to Kubernetes cluster specifically refers to for mysql database being deployed in kubernetes cluster, the specific steps are as follows:
(1), Mysql database passes through secret configuration database login user name password;
(2), the password for doing complexity at random is generated;
(3), mysql database is disposed.
CN201910167020.0A 2019-03-06 2019-03-06 A kind of private clound dispositions method Pending CN109981351A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910167020.0A CN109981351A (en) 2019-03-06 2019-03-06 A kind of private clound dispositions method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910167020.0A CN109981351A (en) 2019-03-06 2019-03-06 A kind of private clound dispositions method

Publications (1)

Publication Number Publication Date
CN109981351A true CN109981351A (en) 2019-07-05

Family

ID=67078035

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910167020.0A Pending CN109981351A (en) 2019-03-06 2019-03-06 A kind of private clound dispositions method

Country Status (1)

Country Link
CN (1) CN109981351A (en)

Cited By (26)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110531987A (en) * 2019-07-30 2019-12-03 平安科技(深圳)有限公司 Management method, device and computer readable storage medium based on Kubernetes cluster
CN110808857A (en) * 2019-10-31 2020-02-18 深圳前海环融联易信息科技服务有限公司 Network intercommunication method, device, equipment and storage medium for realizing Kubernetes cluster
CN111090437A (en) * 2019-11-19 2020-05-01 平安科技(深圳)有限公司 Application deployment method and device and computer readable storage medium
CN111142881A (en) * 2019-12-27 2020-05-12 浪潮云信息技术有限公司 Kubernets-based charts automation deployment system and method
CN111158859A (en) * 2019-12-30 2020-05-15 中电工业互联网有限公司 Application management system based on kylin operating system and implementation and use method thereof
CN111273960A (en) * 2020-01-20 2020-06-12 山东汇贸电子口岸有限公司 Method for realizing cloud native MIPS architecture container cloud
CN111338657A (en) * 2020-02-26 2020-06-26 山东汇贸电子口岸有限公司 Template-based palm parameter batch configuration method
CN111399855A (en) * 2020-03-09 2020-07-10 山东汇贸电子口岸有限公司 Automatic application instance publishing method based on container technology
CN111427600A (en) * 2020-03-20 2020-07-17 成都千立网络科技有限公司 Docker-based platform system deployment and upgrade method and system
CN111443993A (en) * 2020-04-01 2020-07-24 山东汇贸电子口岸有限公司 Method for realizing large-scale container cluster
CN111475260A (en) * 2020-04-10 2020-07-31 杭州趣维科技有限公司 Flexible CICD method based on jenkins and kubernets platform
CN111708608A (en) * 2020-06-19 2020-09-25 浪潮云信息技术股份公司 Container large cluster rapid deployment method and system based on infrastructure
CN112199164A (en) * 2020-10-19 2021-01-08 国网新疆电力有限公司信息通信公司 Method for ensuring container mirror image consistency
CN112650560A (en) * 2021-01-18 2021-04-13 济南浪潮高新科技投资发展有限公司 Container design-based cloud robot model issuing method
CN112711426A (en) * 2019-10-24 2021-04-27 北京车和家信息技术有限公司 Embedded system installation package generation method and device and server
CN112860335A (en) * 2021-01-25 2021-05-28 启明星辰信息技术集团股份有限公司 Docker mirror image information acquisition system and method for private warehouse
CN113094151A (en) * 2021-04-23 2021-07-09 汇能云科技(宁波)有限公司 Helm-based micro-service application deployment system and method
CN113238928A (en) * 2021-04-23 2021-08-10 杭州电子科技大学 End cloud collaborative evaluation system for audio and video big data task
CN113507489A (en) * 2020-09-30 2021-10-15 西部证券股份有限公司 Visual deployment, operation and maintenance method of financial private cloud
CN113590305A (en) * 2021-05-14 2021-11-02 西安交通大学 Edge computing application capacity deployment method based on k3s
CN113779477A (en) * 2021-09-13 2021-12-10 科大国创云网科技有限公司 Assembly line publishing method and system based on PaaS cloud platform
CN113805899A (en) * 2021-08-25 2021-12-17 浪潮卓数大数据产业发展有限公司 Automatic software deployment method
CN114020288A (en) * 2021-11-04 2022-02-08 四川启睿克科技有限公司 Method for deploying Kubernetes cluster offline
CN114157658A (en) * 2021-12-06 2022-03-08 京东科技信息技术有限公司 Mirror image warehouse deployment method and device, electronic equipment and computer readable medium
CN115129429A (en) * 2022-09-01 2022-09-30 南京翼辉爱智物联技术有限公司 Container application management method and device, electronic equipment and storage medium
CN116610330A (en) * 2022-11-29 2023-08-18 天翼数字生活科技有限公司 Method and system for quickly constructing iOS development third-party dependence

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106873975A (en) * 2016-12-30 2017-06-20 武汉默联股份有限公司 Devops based on Docker persistently pays and automated system and method
CN106888254A (en) * 2017-01-20 2017-06-23 华南理工大学 A kind of exchange method between container cloud framework based on Kubernetes and its each module
CN108874650A (en) * 2017-05-09 2018-11-23 上海秦苍信息科技有限公司 A kind of continuous integrating automated testing method
CN109032645A (en) * 2018-07-28 2018-12-18 烽火云科技有限公司 The method and system of continuous integrating and deployment based on Kubernetes
CN109062655A (en) * 2018-06-05 2018-12-21 腾讯科技(深圳)有限公司 A kind of containerization cloud platform and server
CN109358858A (en) * 2018-09-19 2019-02-19 网易(杭州)网络有限公司 Automatically dispose method, apparatus, medium and electronic equipment

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106873975A (en) * 2016-12-30 2017-06-20 武汉默联股份有限公司 Devops based on Docker persistently pays and automated system and method
CN106888254A (en) * 2017-01-20 2017-06-23 华南理工大学 A kind of exchange method between container cloud framework based on Kubernetes and its each module
CN108874650A (en) * 2017-05-09 2018-11-23 上海秦苍信息科技有限公司 A kind of continuous integrating automated testing method
CN109062655A (en) * 2018-06-05 2018-12-21 腾讯科技(深圳)有限公司 A kind of containerization cloud platform and server
CN109032645A (en) * 2018-07-28 2018-12-18 烽火云科技有限公司 The method and system of continuous integrating and deployment based on Kubernetes
CN109358858A (en) * 2018-09-19 2019-02-19 网易(杭州)网络有限公司 Automatically dispose method, apparatus, medium and electronic equipment

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
YGQYGQ2: "Gitlab在Kubernetes上的CI/CD", 《51CTO博客》 *

Cited By (42)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2021017301A1 (en) * 2019-07-30 2021-02-04 平安科技(深圳)有限公司 Management method and apparatus based on kubernetes cluster, and computer-readable storage medium
CN110531987A (en) * 2019-07-30 2019-12-03 平安科技(深圳)有限公司 Management method, device and computer readable storage medium based on Kubernetes cluster
CN112711426B (en) * 2019-10-24 2023-12-26 北京车和家信息技术有限公司 Embedded system installation package generation method, device and server
CN112711426A (en) * 2019-10-24 2021-04-27 北京车和家信息技术有限公司 Embedded system installation package generation method and device and server
CN110808857A (en) * 2019-10-31 2020-02-18 深圳前海环融联易信息科技服务有限公司 Network intercommunication method, device, equipment and storage medium for realizing Kubernetes cluster
CN110808857B (en) * 2019-10-31 2022-06-07 深圳前海环融联易信息科技服务有限公司 Network intercommunication method, device, equipment and storage medium for realizing Kubernetes cluster
WO2021098392A1 (en) * 2019-11-19 2021-05-27 平安科技(深圳)有限公司 Application deployment method and apparatus, electronic device and storage medium
CN111090437A (en) * 2019-11-19 2020-05-01 平安科技(深圳)有限公司 Application deployment method and device and computer readable storage medium
CN111090437B (en) * 2019-11-19 2024-03-12 平安科技(深圳)有限公司 Application deployment method and device and computer readable storage medium
CN111142881A (en) * 2019-12-27 2020-05-12 浪潮云信息技术有限公司 Kubernets-based charts automation deployment system and method
CN111142881B (en) * 2019-12-27 2023-10-27 浪潮云信息技术股份公司 Kubernetes-based system and kubernetes-based method for automatic deployment of orchestration charts
CN111158859B (en) * 2019-12-30 2023-09-26 中电工业互联网有限公司 Application management system based on kylin operating system and implementation and use method thereof
CN111158859A (en) * 2019-12-30 2020-05-15 中电工业互联网有限公司 Application management system based on kylin operating system and implementation and use method thereof
CN111273960A (en) * 2020-01-20 2020-06-12 山东汇贸电子口岸有限公司 Method for realizing cloud native MIPS architecture container cloud
CN111338657B (en) * 2020-02-26 2023-12-01 山东汇贸电子口岸有限公司 Template-based palm parameter batch configuration method
CN111338657A (en) * 2020-02-26 2020-06-26 山东汇贸电子口岸有限公司 Template-based palm parameter batch configuration method
CN111399855B (en) * 2020-03-09 2023-10-20 山东省电子口岸有限公司 Automatic application instance publishing method based on container technology
CN111399855A (en) * 2020-03-09 2020-07-10 山东汇贸电子口岸有限公司 Automatic application instance publishing method based on container technology
CN111427600A (en) * 2020-03-20 2020-07-17 成都千立网络科技有限公司 Docker-based platform system deployment and upgrade method and system
CN111443993A (en) * 2020-04-01 2020-07-24 山东汇贸电子口岸有限公司 Method for realizing large-scale container cluster
CN111475260A (en) * 2020-04-10 2020-07-31 杭州趣维科技有限公司 Flexible CICD method based on jenkins and kubernets platform
CN111708608A (en) * 2020-06-19 2020-09-25 浪潮云信息技术股份公司 Container large cluster rapid deployment method and system based on infrastructure
CN111708608B (en) * 2020-06-19 2023-04-25 浪潮云信息技术股份公司 Container large cluster rapid deployment method and system based on stable
CN113507489A (en) * 2020-09-30 2021-10-15 西部证券股份有限公司 Visual deployment, operation and maintenance method of financial private cloud
CN113507489B (en) * 2020-09-30 2022-10-14 西部证券股份有限公司 Visual deployment, operation and maintenance method of financial private cloud
CN112199164A (en) * 2020-10-19 2021-01-08 国网新疆电力有限公司信息通信公司 Method for ensuring container mirror image consistency
CN112650560A (en) * 2021-01-18 2021-04-13 济南浪潮高新科技投资发展有限公司 Container design-based cloud robot model issuing method
CN112650560B (en) * 2021-01-18 2022-10-18 山东浪潮科学研究院有限公司 Container design-based cloud robot model issuing method
CN112860335A (en) * 2021-01-25 2021-05-28 启明星辰信息技术集团股份有限公司 Docker mirror image information acquisition system and method for private warehouse
CN112860335B (en) * 2021-01-25 2024-02-20 启明星辰信息技术集团股份有限公司 Private warehouse Docker mirror image information acquisition system and acquisition method thereof
CN113238928B (en) * 2021-04-23 2022-05-06 杭州电子科技大学 End cloud collaborative evaluation system for audio and video big data task
CN113238928A (en) * 2021-04-23 2021-08-10 杭州电子科技大学 End cloud collaborative evaluation system for audio and video big data task
CN113094151A (en) * 2021-04-23 2021-07-09 汇能云科技(宁波)有限公司 Helm-based micro-service application deployment system and method
CN113590305A (en) * 2021-05-14 2021-11-02 西安交通大学 Edge computing application capacity deployment method based on k3s
CN113805899A (en) * 2021-08-25 2021-12-17 浪潮卓数大数据产业发展有限公司 Automatic software deployment method
CN113805899B (en) * 2021-08-25 2024-01-26 浪潮卓数大数据产业发展有限公司 Automatic software deployment method
CN113779477A (en) * 2021-09-13 2021-12-10 科大国创云网科技有限公司 Assembly line publishing method and system based on PaaS cloud platform
CN114020288A (en) * 2021-11-04 2022-02-08 四川启睿克科技有限公司 Method for deploying Kubernetes cluster offline
CN114157658B (en) * 2021-12-06 2024-03-01 京东科技信息技术有限公司 Mirror warehouse deployment method, apparatus, electronic device and computer readable medium
CN114157658A (en) * 2021-12-06 2022-03-08 京东科技信息技术有限公司 Mirror image warehouse deployment method and device, electronic equipment and computer readable medium
CN115129429A (en) * 2022-09-01 2022-09-30 南京翼辉爱智物联技术有限公司 Container application management method and device, electronic equipment and storage medium
CN116610330A (en) * 2022-11-29 2023-08-18 天翼数字生活科技有限公司 Method and system for quickly constructing iOS development third-party dependence

Similar Documents

Publication Publication Date Title
CN109981351A (en) A kind of private clound dispositions method
US11237812B2 (en) Deploying an application in a cloud computing environment
US9639338B2 (en) Computer-implemented method, system and computer program product for deploying an application on a computing resource
US10303450B2 (en) Systems and methods for a policy-driven orchestration of deployment of distributed applications
CN105323282A (en) Enterprise application deployment and management system for multiple tenants
CN103218574A (en) Hash tree-based data dynamic operation verifiability method
CN109906597B (en) Storing and retrieving restricted and unrestricted data sets to and from a cloud network
CN103718164A (en) Virtual computer and service
CN103167041A (en) System and method for supporting cloud environment application cluster automation deployment
CN102638566A (en) BLOG system running method based on cloud storage
CN112099917B (en) Regulation and control system containerized application operation management method, system, equipment and medium
CN102375734A (en) Application product development system, method and device and operation system, method and device
US10606480B2 (en) Scale-out container volume service for multiple frameworks
Alsaeed et al. Towards cloud computing services for higher educational institutions: Concepts & literature review
KR102035071B1 (en) System and method for constructing on-demand virtual cluster
CN106873969A (en) A kind of development approach and development platform of J2EE projects
US9342527B2 (en) Sharing electronic file metadata in a networked computing environment
CN114760088B (en) Flight plan data management method, system, electronic device and storage medium
US20210406227A1 (en) Linking, deploying, and executing distributed analytics with distributed datasets
Wang et al. Architecting a distributed bioinformatics platform with iRODS and iPlant Agave API
US11860980B2 (en) Cognitive method to split monolithic architecture into microservice architecture
CN117076038A (en) Mirror image construction method, device, electronic equipment and storage medium
CN116233221A (en) Method, device, equipment and medium for deploying domain name system cloud resolution service
CN103853501A (en) Computer implementation method and computer system for identifying redundant data for disk image streaming
CN113674126A (en) Block chain-based government affair information processing method and device and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20190705