CN113315754A - Intelligent linkage method, device, equipment and medium for firewall of container visit - Google Patents

Intelligent linkage method, device, equipment and medium for firewall of container visit Download PDF

Info

Publication number
CN113315754A
CN113315754A CN202110450592.7A CN202110450592A CN113315754A CN 113315754 A CN113315754 A CN 113315754A CN 202110450592 A CN202110450592 A CN 202110450592A CN 113315754 A CN113315754 A CN 113315754A
Authority
CN
China
Prior art keywords
address
target
content
container
firewall
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202110450592.7A
Other languages
Chinese (zh)
Other versions
CN113315754B (en
Inventor
冯凯
杨鸣
李明利
张立
孟玉立
刘宇
左宇鹏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Minsheng Banking Corp Ltd
Original Assignee
China Minsheng Banking Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Minsheng Banking Corp Ltd filed Critical China Minsheng Banking Corp Ltd
Priority to CN202110450592.7A priority Critical patent/CN113315754B/en
Publication of CN113315754A publication Critical patent/CN113315754A/en
Application granted granted Critical
Publication of CN113315754B publication Critical patent/CN113315754B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • G06F9/45533Hypervisors; Virtual machine monitors
    • G06F9/45558Hypervisor-specific management and integration aspects
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/06Management of faults, events, alarms or notifications
    • H04L41/0631Management of faults, events, alarms or notifications using root cause analysis; using analysis of correlation between notifications, alarms or events based on decision criteria, e.g. hierarchy, tree or time analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/06Management of faults, events, alarms or notifications
    • H04L41/0654Management of faults, events, alarms or notifications using network fault recovery
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies
    • H04L63/0236Filtering by address, protocol, port number or service, e.g. IP-address or URL
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • G06F9/45533Hypervisors; Virtual machine monitors
    • G06F9/45558Hypervisor-specific management and integration aspects
    • G06F2009/45595Network integration; Enabling network access in virtual machine instances

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The application provides an intelligent linkage method, device, equipment and medium for a firewall during container visit, wherein the method comprises the following steps: acquiring an access change request to be processed, wherein the access change request comprises a container cluster identifier and change information of an IP address of a container Pod; determining a target container cluster according to the container cluster identifier, and determining target firewall equipment corresponding to the target container cluster according to the corresponding relation between the container cluster and the firewall equipment; determining a target address set corresponding to the target firewall equipment according to the change information of the IP address, and processing the original IP address content of the target address set to obtain the target IP address content; and generating a change script according to the content of the target IP address, and sending the change script to the target firewall equipment so as to apply the content of the target IP address to the corresponding access relation strategy. The change of the IP address of the Pod can be automatically applied to the access relation strategy of the firewall equipment, so that the labor cost is saved, and the service can be visited without sensing.

Description

Intelligent linkage method, device, equipment and medium for firewall of container visit
Technical Field
The application relates to the technical field of network communication, in particular to an intelligent linkage method, device, equipment and medium for a container visiting firewall.
Background
Containers are a technique for effectively partitioning resources of a single operating system into isolated groups to better balance conflicting resource usage needs among the isolated groups. With the expansion of the scale of a service system, the requirements of basic environment are various, and the requirement of online period is shorter and shorter, so that the large-area popularization of lighter-weight containers is promoted. Also, as the business demands are driven, the network automation system has been greatly developed, and daily changes such as the network access relationship of the firewall have been automated.
After the service system is deployed to a container platform (container cloud), each module of the service system corresponds to one service container Pod of the container platform; the IP address of the service system changes from a static IP address to a dynamic IP address, and the IP address of the service container Pod in the container platform also changes with the environment of the container platform, which may also cause the IP of the service system to change, for example, the IP address different from the original IP address may be obtained after the service container Pod is restarted.
The network access relation of the traditional firewall needs to be opened by using a clear source IP address or a clear destination address, because the container platform is not linked with the network automation system, when the IP address of a service system in the container platform changes, the network access relation of the corresponding firewall can only be changed in a manual operation mode, but the manual operation mode is difficult to realize real-time change, and the manual operation mode also has the problems of large workload, high labor cost and the like, so that the network access relation change of the traditional firewall cannot meet the operation and maintenance requirements of the container platform.
Disclosure of Invention
In view of the above, the present application is provided to provide a method, device, and medium for intelligently linking a firewall for a container visit, which overcome or at least partially solve the above problems, and includes:
an intelligent linkage method for a container visit firewall, the method comprising:
acquiring an access change request to be processed; the access change request comprises a container cluster identifier and change information of an IP address of a container Pod;
determining a target container cluster according to the container cluster identifier, and determining target firewall equipment corresponding to the target container cluster according to the corresponding relation between the container cluster and the firewall equipment;
determining a target address set corresponding to the target firewall equipment according to the change information of the IP address, and processing the original IP address content of the target address set to obtain the target IP address content;
and generating a change script according to the content of the target IP address, and sending the change script to the target firewall equipment so as to apply the content of the target IP address to a corresponding access relation strategy.
Optionally, the determining, according to the correspondence between the container cluster and the firewall device, a target firewall device corresponding to the target container cluster includes:
determining a target network area corresponding to the target container cluster according to the corresponding relation between the container cluster and the network area;
and determining target firewall equipment corresponding to the target network area according to the corresponding relation between the network area and the firewall equipment.
Optionally, the changing information of the IP address of the Pod includes an address set identifier, a target IP address, and an operation type, and the determining, according to the changing information of the IP address, a target address set corresponding to the target firewall device, and processing the original IP address content of the target address set to obtain the target IP address content includes:
determining a target address set corresponding to the target firewall equipment according to the address set identifier;
and acquiring original IP address content of the target address set, and processing the original IP address content according to the target IP address and the corresponding operation type to obtain target IP address content.
Optionally, the operation type includes a creation operation, a deletion operation, and an update operation, and the processing the original IP address content according to the target IP address and the corresponding operation type to obtain the target IP address content includes:
when the operation type is an updating operation, splitting the updating operation into a deleting operation and a creating operation; and/or the presence of a gas in the gas,
when the operation type is a creating operation, adding the target IP address into the original IP address content to obtain the target IP address content; and/or the presence of a gas in the gas,
and when the operation type is a deleting operation, deleting the IP address corresponding to the target IP address in the original IP address content to obtain the target IP address content.
Optionally, before the generating a change script according to the content of the target IP address, the method further includes:
acquiring the current IP address of the container Pod corresponding to the target address set in the target container cluster to obtain the content of the current IP address; the current IP address content comprises current IP addresses of a plurality of the container Pods;
comparing whether the content of the current IP address is consistent with the content of the target IP address;
if not, determining the content of the current IP address as the content of the target IP address.
Optionally, before the generating a change script according to the content of the target IP address, the method further includes:
if the current IP address of the container Pod corresponding to the target address set in the target container cluster fails to be acquired, sending first fault notification information to corresponding operation and maintenance personnel, wherein the first fault notification information comprises a first fault corresponding to the current IP address acquisition failure, so that the operation and maintenance personnel can process the first fault;
when the operation type is a deleting operation, suspending an access change request corresponding to the deleting operation to obtain a suspended access change request;
and after the first fault is processed, re-executing the suspended access change request.
Optionally, the sending the change script to the target firewall device further includes:
if the sending of the change script fails, hanging a sending task corresponding to the sending of the change script;
sending second fault notification information to corresponding operation and maintenance personnel, wherein the second fault notification information comprises a second fault corresponding to the connection failure of the target firewall equipment, so that the operation and maintenance personnel can process the second fault;
and after the second fault is processed, re-executing the sending task.
Optionally, before the obtaining the pending access change request, the method further includes:
receiving an access change request sent by a container platform;
judging whether the access change request meets the requirement of a preset specification;
and if so, storing the access change request as a pending access change request in a data queue.
A container visit firewall intelligent linkage, the device comprising:
the change request acquisition module is used for acquiring the access change request to be processed; the access change request comprises a container cluster identifier and change information of an IP address of a container Pod;
the firewall equipment determining module is used for determining a target container cluster according to the container cluster identifier and determining target firewall equipment corresponding to the target container cluster according to the corresponding relation between the container cluster and the firewall equipment;
the target address set processing module is used for determining a target address set corresponding to the target firewall equipment according to the change information of the IP address and processing the original IP address content of the target address set to obtain the target IP address content;
and the access relation policy updating module generates a change script according to the target IP address content and sends the change script to the target firewall equipment so as to apply the target IP address content to a corresponding access relation policy.
Optionally, the firewall device determining module includes:
a first determining module, configured to determine, according to a correspondence between the container cluster and a network area, a target network area corresponding to the target container cluster;
and the second determining module is used for determining the target firewall equipment corresponding to the target network area according to the corresponding relation between the network area and the firewall equipment.
Optionally, the change information of the IP address of the container Pod includes an address set identifier, a target IP address, and an operation type, and the target address set processing module includes:
the address set determining module is used for determining a target address set corresponding to the target firewall equipment according to the address set identification;
and the content updating module is used for acquiring the original IP address content of the target address set and processing the original IP address content according to the target IP address and the corresponding operation type to obtain the target IP address content.
Optionally, the operation type includes a creation operation, a deletion operation, and an update operation, and the content update module is specifically configured to:
when the operation type is an updating operation, splitting the updating operation into a deleting operation and a creating operation; and/or the presence of a gas in the gas,
when the operation type is a creating operation, adding the target IP address into the original IP address content to obtain the target IP address content; and/or the presence of a gas in the gas,
and when the operation type is a deleting operation, deleting the IP address corresponding to the target IP address in the original IP address content to obtain the target IP address content.
Optionally, the apparatus further comprises:
a current IP address obtaining module, configured to obtain a current IP address of a container Pod corresponding to the target address set in the target container cluster, to obtain current IP address content; the current IP address content comprises current IP addresses of a plurality of the container Pods;
the consistency comparison module is used for comparing whether the content of the current IP address is consistent with the content of the target IP address;
and the address set processing module is used for determining the current IP address content as the target IP address content if the current IP address content is inconsistent with the target IP address content.
Optionally, the apparatus further comprises:
a first failure first processing module, configured to send first failure notification information to a corresponding operation and maintenance worker if acquiring a current IP address of a container Pod corresponding to the target address set in the target container cluster fails, where the first failure notification information includes a first failure corresponding to the current IP address acquisition failure, so that the operation and maintenance worker processes the first failure;
the first failure second processing module is used for suspending the access change request corresponding to the deletion operation when the operation type is the deletion operation, so as to obtain the suspended access change request;
and the first failure third processing module is used for re-executing the suspended access change request after the first failure is processed.
Optionally, the access relationship policy updating module further includes:
the second failure first processing module is used for suspending a sending task corresponding to sending the change script if the change script fails to be sent;
the second fault second processing module is used for sending second fault notification information to corresponding operation and maintenance personnel, wherein the second fault notification information comprises a second fault corresponding to the connection failure of the target firewall equipment, so that the operation and maintenance personnel can process the second fault;
and the second failure third processing module is used for re-executing the sending task after the second failure is processed.
Optionally, the apparatus further comprises:
the access change request receiving module is used for receiving an access change request sent by the container platform;
the standard judgment module is used for judging whether the access change request meets the preset standard requirement;
and the access change request storage module is used for storing the access change request serving as a pending access change request into a data queue if the access change request meets the preset standard requirement.
An electronic device comprising a processor, a memory, and a computer program stored on the memory and executable on the processor, wherein the computer program when executed by the processor implements the steps of the intelligent linking method for a container visit firewall as described above.
A computer readable storage medium having stored thereon a computer program which, when executed by a processor, implements the steps of the container visit firewall intelligent linking method as described above.
The application has the following advantages:
in the embodiment of the application, the network automation system acquires the access change request to be processed, wherein the access change request comprises the container cluster identifier and the change information of the IP address of the container Pod; determining a target container cluster according to the container cluster identifier, and determining target firewall equipment corresponding to the target container cluster according to the corresponding relation between the container cluster and the firewall equipment; determining a target address set corresponding to the target firewall equipment according to the change information of the IP address, and processing the original IP address content of the target address set to obtain the target IP address content; and generating a change script according to the content of the target IP address, and sending the change script to the target firewall equipment so as to apply the content of the target IP address to the corresponding access relation strategy. According to the embodiment of the application, the IP address change of the Pod can be automatically applied to the access relation strategy of the firewall equipment, so that the labor cost is saved, the influence of the random change of the address of the service system on the access relation strategy of the firewall equipment is avoided, the service non-perception visit is realized, and the real-time requirement of the service system visit is met;
further, the current IP address content is obtained by obtaining the current IP address of the Pod corresponding to the target address set, and the current IP address content is compared with the target IP address content of the target address set, so that secondary verification of data is realized, and the accuracy of the data is ensured;
further, when the current IP address of the Pod corresponding to the target address set cannot be obtained, it indicates that the data query interface fails, the access change request with the operation type of deletion operation is suspended, the access change request with the operation type of creation operation is normally processed, and the processing is automatically resumed after the failure of the data query interface is eliminated; when the connection with the firewall equipment fails, suspending a sending task corresponding to the change script, and automatically recovering the processing after the fault is eliminated; therefore, the system has good fault tolerance;
furthermore, when a fault is found, relevant operation and maintenance personnel are timely notified to process the fault, so that the fault can be found in real time and processed in time, and influence and loss are reduced.
Drawings
In order to more clearly illustrate the technical solutions of the present application, the drawings needed to be used in the description of the present application will be briefly introduced below, and it is apparent that the drawings in the following description are only some embodiments of the present application, and it is obvious for those skilled in the art that other drawings can be obtained according to the drawings without inventive labor.
Fig. 1 is a flowchart illustrating steps of an intelligent linking method for a firewall for container visit according to an embodiment of the present disclosure;
FIG. 2 is a flowchart illustrating the steps of preprocessing access change requests according to an embodiment of the present application;
FIG. 3 is a flowchart illustrating steps in processing an access change request according to an embodiment of the present application;
FIG. 4 is a flowchart illustrating steps taken to obtain a target address set according to an embodiment of the present application;
fig. 5 is a schematic overall flow chart of an intelligent linkage method for a container visit firewall according to an embodiment of the present application;
fig. 6 is a block diagram of an intelligent linkage device of a firewall for container visit according to an embodiment of the present application.
Detailed Description
In order to make the aforementioned objects, features and advantages of the present application more comprehensible, the present application is described in further detail with reference to the accompanying drawings and the detailed description. It is to be understood that the embodiments described are only a few embodiments of the present application and not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
First, the terms are defined and explained:
the container technology comprises the following steps: the method refers to that dependencies, class libraries, configuration files and the like required by the application program and the application are injected into a package of a container mirror image for publishing, so that container deployment can span the limitation of an operating system, a system kernel is shared, and multiple processes and multiple application programs are independently run. Compared with the traditional virtualization technology which is realized through hardware simulation or operating system software, the container technology is lighter.
And (4) container Pod: the container Pod is the smallest unit of deployment in the container environment. It may contain one or more closely connected containers, in most cases only one; and a container is a deployed program associated with a business system.
Cluster name: ClsName, the name identification of the container cluster.
A name space: NameSpace, an independent process space within a container cluster. A namespace will typically correspond to a business system.
Applying coding: AppCode, i.e., a business system name code (which serves as a unique identification).
And (3) module coding: ModCode, i.e., name code of business system sub-module (which serves as unique identification).
In the embodiment of the application, when a service system deployed on a container platform is online and applies for a network access relationship, a service address is not clarified, but an application of an address set corresponding to the service system is submitted, and a network automation system automatically generates and executes an access relationship script according to the region to which the address set belongs. After the execution is finished, the network automation system acquires the IP address of the container Pod corresponding to the service system corresponding to the address set according to the data query interface provided by the container platform, updates the IP address of the container Pod to the address set, and realizes the opening of the access relation strategy of the firewall.
Referring to fig. 1, a flowchart illustrating steps of an intelligent linkage method for a container visit firewall according to an embodiment of the present application is shown, where the method may be applied to a network automation system. The method specifically comprises the following steps:
step 101, obtaining an access change request to be processed; the access change request comprises a container cluster identifier and change information of an IP address of a container Pod;
step 102, determining a target container cluster according to the container cluster identifier, and determining target firewall equipment corresponding to the target container cluster according to the corresponding relation between the container cluster and the firewall equipment;
103, determining a target address set corresponding to the target firewall equipment according to the change information of the IP address, and processing original IP address content of the target address set to obtain target IP address content;
and 104, generating a change script according to the target IP address content, and sending the change script to the target firewall equipment so as to apply the target IP address content to a corresponding access relation strategy.
In the embodiment of the application, the network automation system acquires the access change request to be processed, wherein the access change request comprises the container cluster identifier and the change information of the IP address of the container Pod; determining a target container cluster according to the container cluster identifier, and determining target firewall equipment corresponding to the target container cluster according to the corresponding relation between the container cluster and the firewall equipment; determining a target address set corresponding to the target firewall equipment according to the change information of the IP address, and processing the original IP address content of the target address set to obtain the target IP address content; and generating a change script according to the content of the target IP address, and sending the change script to the target firewall equipment so as to apply the content of the target IP address to the corresponding access relation strategy. According to the embodiment of the application, the IP address change of the Pod can be automatically applied to the access relation strategy of the firewall equipment, so that the labor cost is saved, the influence of the random address change of the service system on the access relation strategy of the firewall equipment is avoided, the service non-perception visit is realized, and the real-time requirement of the service system visit is met.
Next, the intelligent linkage method of the container visit firewall in the present exemplary embodiment will be further described.
In step 101, obtaining a pending access change request; the access change request includes a container cluster identifier and change information of an IP address of the container Pod.
In this embodiment of the present application, a container cluster may be divided into a plurality of namespaces, and each namespace generally corresponds to one business system. Each namespace includes a plurality of containers Pod, and the containers Pod in different namespaces are isolated from each other. When the IP address of the container Pod corresponding to the service system in the container platform changes, the container platform may automatically generate a corresponding access change request, and send the access change request to the network automation system in real time through the request push interface, and the network automation system receives the access change request pushed by the container platform in real time through the corresponding request receive interface.
In this embodiment, the access change request includes a container cluster identifier and change information of an IP address of the container Pod, where the change information of the IP address may include an address set identifier, a target IP address, and an operation type. Specifically, the access change request may include a cluster name, a namespace, an application code, a module code, an operation type, and a target IP address. Therefore, the container cluster identifier is the cluster name; the cluster name, the name space, the application code and the module code can be spliced into an address set name as an address set identifier, so that the address set identifier is a splicing result of the cluster name, the name space, the application code and the module code.
Specifically, referring to fig. 2, fig. 2 is a flowchart illustrating steps of access change request preprocessing in an embodiment of the present application; after receiving an access change request sent by a container platform, a network automation system first performs data format check on the access change request, for example, data of the access change request must meet requirements of an interface specification document, where the requirements of the interface specification document include that a key field cannot be empty, an IP address format is correct, and an operation type must be one of specified operation types.
For example, taking the above access change request including the cluster name, the namespace, the application code, the module code, the operation type, and the target IP address as an example, the specific data format verification content may include: and judging whether the cluster name, the name space, the application code, the module code, the operation type and the target IP address are correctly filled, and whether an address set formed by the cluster name, the name space, the application code and the module code creates a corresponding access relation strategy in the network automation system.
When the access change request fails to be verified, corresponding verification failure information is returned to the container platform; when the access change request passes the verification, the network automation system stores the verified access change request into the data queue, and obtains a preset number of or all the access change requests from the data queue for processing at preset time intervals (for example, every two seconds).
Therefore, before the obtaining of the pending access change request, the method may further include:
receiving an access change request sent by a container platform;
judging whether the access change request meets the requirement of a preset specification;
if so, the access change request is taken as a pending access change request and stored in a data queue, so that the pending access change request is obtained from the data queue.
In step 102, a target container cluster is determined according to the container cluster identifier, and a target firewall device corresponding to the target container cluster is determined according to the corresponding relationship between the container cluster and the firewall device.
In this embodiment of the present application, a correspondence between a container cluster and a firewall device may be stored in a network automation system, and used to locate the firewall device corresponding to the container cluster.
In practical application, the network automation system stores the corresponding relationship between the container cluster and the network area, and the corresponding relationship exists between the network area and the firewall device, when the access relationship policy related to the container cluster needs to be opened, the network automation system can determine the network area according to the corresponding relationship between the container cluster and the network area, and then determine the firewall device according to the corresponding relationship between the network area and the firewall device, and then perform issuing operation of the related access relationship policy on the firewall device.
For example, taking the container cluster CLS01 corresponding to the I4 network area as an example, when the access relationship policy of the container cluster CLS01 needs to be opened, the corresponding I4 network area firewall device may be found to issue the relevant policy.
Specifically, when the container cluster needs to open the relevant access relationship policy, the access work order relevant to the container cluster can be uploaded in the network automation system, and the network automation system can automatically generate the access relationship policy opening script corresponding to the firewall device according to the received information of the container cluster in the access work order and send the access relationship policy opening script to the corresponding firewall device. The firewall device stores a firewall address set, and the firewall address set comprises a source address, a destination address and a destination port of an access relationship, and is a main element of an access relationship policy of the firewall device. In the embodiment of the present application, the source address and the destination address may use an address object. And associating the needed IP address, the network segment and the like in the address object, and then calling the address object in the access relation policy, wherein the address object is the firewall address set. When the address set is updated, the policy for calling the address set is automatically changed.
When the access relation policy is opened, the IP address of the Pod in the Pod cluster is changed, and the content of the IP address in the firewall address set corresponding to the Pod in the firewall device corresponding to the Pod cluster needs to be synchronously changed, so that the service system with the changed IP address can normally visit.
Therefore, in the embodiment of the present application, when the network automation system receives the access change request, since the access change request includes the container cluster identifier, the corresponding target container cluster may be determined according to the container cluster identifier, then the target network area corresponding to the target container cluster may be determined according to the correspondence between the container cluster and the network area, and then the target firewall device corresponding to the target area may be determined according to the correspondence between the network area and the firewall device; the IP address content of the address set corresponding to the target firewall equipment is updated in the subsequent steps, so that the IP address content of the address set of the target firewall equipment is matched with the IP address of the corresponding container Pod in the container cluster, and the service system corresponding to the container cluster can be normally visited.
In step 103, a destination address set corresponding to the destination firewall device is determined according to the change information of the IP address, and the original IP address content of the destination address set is processed to obtain the destination IP address content.
In this embodiment, the database of the network automation system stores an address set of the firewall device; the change information of the IP address comprises an address set identifier, a target IP address and an operation type; and determining a target address set according to the address set identification, further acquiring original IP address content of the corresponding target address set from the database, and then processing the original IP address content according to the target IP address and the operation type to obtain the target IP address content.
Specifically, the operation types may include a Create (Create) operation, a Delete (Delete) operation, and an Update (Update) operation, wherein the Update operation may be split into one Delete operation and one Create operation. Therefore, the processing the original IP address content according to the target IP address and the corresponding operation type to obtain the target IP address content may include:
when the operation type is an updating operation, splitting the updating operation into a deleting operation and a creating operation; and/or the presence of a gas in the gas,
when the operation type is a creating operation, adding the target IP address into the original IP address content to obtain the target IP address content; and/or the presence of a gas in the gas,
and when the operation type is a deleting operation, deleting the IP address corresponding to the target IP address in the original IP address content to obtain the target IP address content.
In a specific implementation, when the operation type is an update operation, the target IP address includes a first target IP address and a second target IP address which are associated; the first target IP address is an IP address in the original IP address content, and the second target IP address is a new IP address; processing the original IP address content according to the target IP address and the corresponding operation type, and obtaining the target IP address content may specifically be: and deleting the IP address corresponding to the first target IP address in the original IP address content, and adding the second target IP address into the original IP address content of which the first target IP address is deleted to obtain the target IP address content. It should be noted that, in this embodiment, the target IP address and the target IP address content are different, the target IP address refers to a single IP address to be processed related to the operation type, and the target IP address content refers to the original IP address content in the target address set, and after the change information of the IP address is processed, the obtained corresponding IP address content is related to all the IP addresses in the processed target address set.
Referring to FIG. 3, FIG. 3 is a flow chart illustrating the steps of processing an access change request in one embodiment of the present application; in a specific implementation, the network automation system acquires all pending access change requests at regular time (e.g., every two seconds), where the pending access change requests include unprocessed and pending access change requests; classifying and screening data of the access change requests to be processed aiming at the access change requests to be processed of the same container cluster according to operation types, processing the requests of three types of creation, deletion and update, and searching an address set according to cluster names, name spaces, application codes and module codes in the access change requests. If the access change request of the creation operation and the access change request of the deletion operation can be offset, the access change request of the creation operation and the access change request of the deletion operation are not retained, for example, if the creation operation and the deletion operation are performed on the same IP address, the access change request of the creation operation and the access change request of the deletion operation on the IP address are deleted at the same time. Thereby reducing the amount of processing of the requested data. In order to reduce the times of connecting firewall equipment in the process of sending the subsequent change script and improve the change efficiency, the access change request to be processed is classified, screened and the like, and finally, a change script is generated for each firewall equipment to be sent.
Further, in an optional embodiment of the present application, in order to ensure data accuracy, after the processing the original IP address content of the target address set to obtain the target IP address content, the method may further include:
acquiring the current IP address of the container Pod corresponding to the target address set in the target container cluster to obtain the content of the current IP address; the current IP address content comprises current IP addresses of a plurality of the container Pods;
comparing whether the content of the current IP address is consistent with the content of the target IP address;
if not, determining the content of the current IP address as the content of the target IP address.
In this embodiment, after updating the IP address content of the target address set in the database to obtain the target IP address content, the network automation system may obtain the current IP address of the container Pod corresponding to the target address set in the target container cluster through a data query interface provided by the container platform, and determine the current IP addresses of all the container pods corresponding to the target address set as the current IP address content, which may be considered that the current IP address content is formed by the current IP addresses of all the container pods corresponding to the target address set; comparing whether the current IP address content is consistent with the target IP address content of the target address set in the network automation system, if so, generating a change script according to the target IP address content of the target address set in the network automation system; if the current IP address content is inconsistent with the target IP address content in the network automation system, the method takes the current IP address content obtained from the container platform as the standard, namely the target IP address content of the target address set is replaced according to the current IP address content in the container platform, and finally a change script is generated according to the target IP address content.
Further, in the process of obtaining the current IP address of the container Pod corresponding to the target address set in the target container cluster to obtain the content of the current IP address, when the data query interface provided by the container platform is invalid, the current IP address of the container Pod is failed to be obtained; correspondingly, the method may further include:
if the current IP address of the container Pod corresponding to the target address set in the target container cluster fails to be acquired, sending first fault notification information to corresponding operation and maintenance personnel, wherein the first fault notification information comprises a first fault corresponding to the current IP address acquisition failure, so that the operation and maintenance personnel can process the first fault;
when the operation type is a deleting operation, suspending an access change request corresponding to the deleting operation to obtain a suspended access change request;
and after the first fault is processed, re-executing the suspended access change request.
In this embodiment, when the network automation system fails to acquire the current IP address of the container Pod corresponding to the target address set in the target container cluster, it means that the data reference is lost, at this time, the network automation system uses the local database as a reference, stops processing the access change request of the deletion operation type, only processes the creation operation to ensure that the access of the service system is not affected, and simultaneously sends a corresponding first fault notification message to the corresponding operation and maintenance staff, so that the operation and maintenance staff can find the fault in time and process the first fault. After the first fault is processed, the network automation system can process the access change request corresponding to the suspended deletion operation without manual triggering.
Illustratively, in conjunction with fig. 4, fig. 4 shows a flowchart of steps for obtaining the content of the target IP address according to an embodiment of the present application. When a data query interface provided by a container platform is normal and a network automation system can obtain the content of a current IP address, comparing whether the content of the current IP address is consistent with the content of a target IP address, if so, generating a corresponding update script according to the content of the target IP address, wherein the update script can correspond to the difference between the content of the target IP address and the content of an original IP address and also can correspond to the total amount of the content of the target IP address; if not, generating a corresponding update script based on the content of the current IP address, wherein the update script can correspond to the whole content of the current IP address or the difference between the content of the current IP address and the content of the original IP address. When a data query interface provided by a container platform fails, the current IP address content cannot be acquired, at the moment, a task corresponding to an access change request for deleting an operation type is suspended, the access request for creating the operation type is normally processed to obtain target IP address content, and a corresponding update script is generated based on the target IP address content, wherein the update script can correspond to the difference between the target IP address content and the original IP address content and can also correspond to the total amount of the target IP address content. After the update script is generated, the update script can be automatically issued to the corresponding target firewall equipment.
Generally, in order to save data processing resources, when the content of the current IP address is consistent with the content of the target IP address and the current IP address fails to be obtained, a corresponding update script can be generated based on the processed access change request; specifically, when the current IP address content coincides with the target IP address content and when the current IP address content acquisition fails, the processed access change request is considered to be correct, and the processed access change request records the difference between the target IP address content and the original IP address content, and therefore, the update script can be generated according to the processed access change request. When the content of the current IP address is inconsistent with the content of the target IP address, generating a corresponding change script by using the total amount of the content of the current IP address; or when the content of the current IP address is inconsistent with the content of the target IP address, determining the difference between the content of the current IP address and the content of the original IP address, and generating a corresponding change script according to the difference.
In step 104, a change script is generated according to the target IP address content, and the change script is sent to the target firewall device, so that the target IP address content is applied to a corresponding access relationship policy.
In this embodiment, the network automation system generates a change script according to the content of the target IP address, specifically, the change script may be generated according to the total content of the target IP address, or the change script may be generated according to the difference between the content of the target IP address and the content of the original IP address; and then, the change script is issued to the corresponding firewall equipment, so that the target IP address of the service system can be centralized in the address of the firewall equipment, and the normal visit of the service system is realized.
In specific implementation, the network automation system may connect the target firewall device in an SSH (Secure Shell, Secure Shell protocol) manner, and execute an issuing operation of the change script, so that the target firewall device applies the target IP address content in the target address set to the corresponding access relationship policy according to the change script; optionally, in the process of executing the issuing operation of the change script, the execution return value of each line of script may be judged, so as to ensure that the issuing process is accurate.
In practical application, when a target firewall device fails and the network automation system cannot be connected to the target firewall device, namely the network automation system cannot issue the change script to the target firewall device, at the moment, the network automation system can suspend the sending task of issuing the change script and simultaneously inform corresponding network operation and maintenance personnel of processing the failure, and after the failure is processed, the network automation system can automatically process the suspended sending task without manual triggering. Therefore, the sending the change script to the target firewall device may further include:
if the sending of the change script fails, hanging a sending task corresponding to the sending of the change script;
sending second fault notification information to corresponding operation and maintenance personnel, wherein the second fault notification information comprises a second fault corresponding to the connection failure of the target firewall equipment, so that the operation and maintenance personnel can process the second fault;
and after the second fault is processed, re-executing the sending task.
Further, when the network automation system cannot receive the access change request sent by the container platform, the container platform may adopt a data retransmission mechanism to ensure that data is not lost, and simultaneously send corresponding third fault notification information to notify corresponding application operation and maintenance personnel to process the third fault, after the fault processing is completed, the container platform restarts sending the access change request to the network automation system without manual triggering.
Optionally, the Interface related in this embodiment may be a standard REST API (Representational State Transfer Programming Interface), which is a design and development manner for network applications, and may reduce complexity of development, improve scalability of the system, and may perform authentication through a username and a password, ensure accuracy of a data source, and implement Interface security.
In the embodiment of the application, the network automation system acquires the access change request to be processed, wherein the access change request comprises the container cluster identifier and the change information of the IP address of the container Pod; determining a target container cluster according to the container cluster identifier, and determining target firewall equipment corresponding to the target container cluster according to the corresponding relation between the container cluster and the firewall equipment; determining a target address set corresponding to the target firewall equipment according to the change information of the IP address, and processing the original IP address content of the target address set to obtain the target IP address content; and generating a change script according to the content of the target IP address, and sending the change script to the target firewall equipment so as to apply the content of the target IP address to the corresponding access relation strategy. According to the embodiment of the application, the IP address change of the Pod can be automatically applied to the access relation strategy of the firewall equipment, so that the labor cost is saved, the influence of the random change of the address of the service system on the access relation strategy of the firewall equipment is avoided, the service non-perception visit is realized, and the real-time requirement of the service system visit is met;
further, the current IP address content is obtained by obtaining the current IP address of the Pod corresponding to the target address set, and the current IP address content is compared with the target IP address content of the target address set, so that secondary verification of data is realized, and the accuracy of the data is ensured;
further, when the current IP address of the Pod corresponding to the target address set cannot be obtained, it indicates that the data query interface fails, the access change request with the operation type of deletion operation is suspended, the access change request with the operation type of creation operation is normally processed, and the processing is automatically resumed after the failure of the data query interface is eliminated; when the connection with the firewall equipment fails, suspending a sending task corresponding to the change script, and automatically recovering the processing after the fault is eliminated; therefore, the system has good fault tolerance;
furthermore, when a fault is found, relevant operation and maintenance personnel are timely notified to process the fault, so that the fault can be found in real time and processed in time, and influence and loss are reduced.
For facilitating those skilled in the art to understand the intelligent linkage method for the firewall for the container visit provided in the embodiment of the present application, the following description will exemplarily describe the intelligent linkage method for the firewall for the container visit from the perspective of the intelligent linkage system for the firewall for the container visit from the node where the service system is first on-line.
The intelligent linkage system of the firewall for the container visit comprises a container platform, a network automation system and the firewall. And the container platform pushes the access change request to a network automation system through an interface, and the network automation system acquires the IP address of the latest container Pod of the service system based on the received access change request and automatically opens the visiting access relation of the service system.
Specifically, referring to fig. 5, an overall flowchart of the intelligent linkage method for the container visit firewall according to the embodiment of the present application is shown.
When the service system is on-line, an access relation application is firstly required, that is, when the service system is on-line, an access relation policy of corresponding firewall equipment needs to be applied to the network automation system, which is the basis for realizing the visit of the service system.
The network automation system realizes the opening of the access relation of the service system by setting a firewall. At this time, the IP address associated with the address object in the firewall address set in the access relationship policy corresponding to the service system in the firewall device may be null.
After the service system access relationship is opened for the first time, a first update application needs to be performed, that is, the IP address associated with the address object in the firewall address set needs to be supplemented.
The container platform can send the address data of the business system to the network automation system so that the network automation system updates the address data to the firewall address set, and therefore the normal visit of the current business system can be achieved.
In the operation process, when the service system has a fault, the container platform can perform container Pod switching and address updating corresponding to the service system.
The container platform may push an address update request, i.e., an access change request, to the network automation system.
After the network automation system successfully receives the address updating request, data analysis processing is carried out according to the address updating request and existing data in an original database, meanwhile, the latest address data of the service system is obtained from the container platform, the obtained latest address data of the service system is compared with the address data after the data analysis processing, the address data which is finally used for updating a firewall address set in the access relation strategy is determined, and the access relation strategy of the firewall equipment is updated according to the finally determined address data.
According to the intelligent linkage method for the container visit firewall, the container platform and the network automation system are interacted through the API, the service system of the container platform does not need manual intervention when visiting externally, the IP address change of the container Pod can be directly pushed to the network automation system through the API, then the network automation system applies the new IP address after the change to the firewall strategy, the requirement that the service system visits rapidly is met, and the IP address change cannot be basically sensed by the service system. Therefore, the problem that the traditional network cannot cope with the change of the IP address of the container environment is solved.
It should be noted that, for simplicity of description, the method embodiments are described as a series of acts or combination of acts, but those skilled in the art will recognize that the embodiments are not limited by the order of acts described, as some steps may occur in other orders or concurrently depending on the embodiments. Further, those skilled in the art will also appreciate that the embodiments described in the specification are presently preferred and that no particular act is required of the embodiments of the application.
Referring to fig. 6, a block diagram of an embodiment of an intelligent linkage device for a container visit firewall according to the present application is shown, and in the embodiment of the present application, the device may specifically include the following modules:
a change request obtaining module 601, configured to obtain an access change request to be processed; the access change request comprises a container cluster identifier and change information of an IP address of a container Pod;
a firewall device determining module 602, configured to determine a target container cluster according to the container cluster identifier, and determine a target firewall device corresponding to the target container cluster according to a correspondence between the container cluster and a firewall device;
a destination address set processing module 603, configured to determine, according to the change information of the IP address, a destination address set corresponding to the destination firewall device, and process an original IP address content of the destination address set to obtain a destination IP address content;
and the access relationship policy updating module 604 generates a change script according to the content of the target IP address, and sends the change script to the target firewall device, so that the content of the target IP address is applied to a corresponding access relationship policy.
Optionally, the firewall device determining module 602 includes:
a first determining module, configured to determine, according to a correspondence between the container cluster and a network area, a target network area corresponding to the target container cluster;
and the second determining module is used for determining the target firewall equipment corresponding to the target network area according to the corresponding relation between the network area and the firewall equipment.
Optionally, the change information of the IP address of the container Pod includes an address set identifier, a target IP address, and an operation type, and the target address set processing module 603 includes:
the address set determining module is used for determining a target address set corresponding to the target firewall equipment according to the address set identification;
and the content updating module is used for acquiring the original IP address content of the target address set and processing the original IP address content according to the target IP address and the corresponding operation type to obtain the target IP address content.
Optionally, the operation type includes a creation operation, a deletion operation, and an update operation, and the content update module is specifically configured to:
when the operation type is an updating operation, splitting the updating operation into a deleting operation and a creating operation; and/or the presence of a gas in the gas,
when the operation type is a creating operation, adding the target IP address into the original IP address content to obtain the target IP address content; and/or the presence of a gas in the gas,
and when the operation type is a deleting operation, deleting the IP address corresponding to the target IP address in the original IP address content to obtain the target IP address content.
Optionally, the apparatus further comprises:
a current IP address obtaining module, configured to obtain a current IP address of a container Pod corresponding to the target address set in the target container cluster, to obtain current IP address content; the current IP address content comprises current IP addresses of a plurality of the container Pods;
the consistency comparison module is used for comparing whether the content of the current IP address is consistent with the content of the target IP address;
and the address set processing module is used for determining the current IP address content as the target IP address content if the current IP address content is inconsistent with the target IP address content.
Optionally, the apparatus further comprises:
a first failure first processing module, configured to send first failure notification information to a corresponding operation and maintenance worker if acquiring a current IP address of a container Pod corresponding to the target address set in the target container cluster fails, where the first failure notification information includes a first failure corresponding to the current IP address acquisition failure, so that the operation and maintenance worker processes the first failure;
the first failure second processing module is used for suspending the access change request corresponding to the deletion operation when the operation type is the deletion operation, so as to obtain the suspended access change request;
and the first failure third processing module is used for re-executing the suspended access change request after the first failure is processed.
Optionally, the access relationship policy updating module 604 further includes:
the second failure first processing module is used for suspending a sending task corresponding to sending the change script if the change script fails to be sent;
the second fault second processing module is used for sending second fault notification information to corresponding operation and maintenance personnel, wherein the second fault notification information comprises a second fault corresponding to the connection failure of the target firewall equipment, so that the operation and maintenance personnel can process the second fault;
and the second failure third processing module is used for re-executing the sending task after the second failure is processed.
Optionally, the apparatus further comprises:
the access change request receiving module is used for receiving an access change request sent by the container platform;
the standard judgment module is used for judging whether the access change request meets the preset standard requirement;
and the access change request storage module is used for storing the access change request serving as a pending access change request into a data queue if the access change request meets the preset standard requirement.
For the device embodiment, since it is basically similar to the method embodiment, the description is simple, and for the relevant points, refer to the partial description of the method embodiment.
The embodiment of the application also discloses electronic equipment, which comprises a processor, a memory and a computer program which is stored on the memory and can run on the processor, wherein when the computer program is executed by the processor, the steps of the intelligent linkage method for the container visiting firewall are realized.
The embodiment of the application also discloses a computer readable storage medium, wherein a computer program is stored on the computer readable storage medium, and when the computer program is executed by a processor, the steps of the intelligent linkage method for the firewall for the container visit are realized.
The embodiments in the present specification are described in a progressive manner, each embodiment focuses on differences from other embodiments, and the same and similar parts among the embodiments are referred to each other.
As will be appreciated by one of skill in the art, embodiments of the present application may be provided as a method, apparatus, or computer program product. Accordingly, embodiments of the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, embodiments of the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
Embodiments of the present application are described with reference to flowchart illustrations and/or block diagrams of methods, terminal devices (systems), and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing terminal to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing terminal, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing terminal to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing terminal to cause a series of operational steps to be performed on the computer or other programmable terminal to produce a computer implemented process such that the instructions which execute on the computer or other programmable terminal provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
While preferred embodiments of the present application have been described, additional variations and modifications of these embodiments may occur to those skilled in the art once they learn of the basic inventive concepts. Therefore, it is intended that the appended claims be interpreted as including the preferred embodiment and all such alterations and modifications as fall within the true scope of the embodiments of the application.
Finally, it should also be noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or terminal that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or terminal. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or terminal that comprises the element.
The foregoing detailed description is provided for an intelligent linkage method, an intelligent linkage device, an apparatus and a medium for a firewall for container visit, which are provided by the present application, and specific examples are applied herein to explain the principle and the implementation of the present application, and the descriptions of the foregoing examples are only used to help understand the method and the core idea of the present application; meanwhile, for a person skilled in the art, according to the idea of the present application, there may be variations in the specific embodiments and the application scope, and in summary, the content of the present specification should not be construed as a limitation to the present application.

Claims (11)

1. An intelligent linkage method for a container visiting firewall is characterized by comprising the following steps:
acquiring an access change request to be processed; the access change request comprises a container cluster identifier and change information of an IP address of a container Pod;
determining a target container cluster according to the container cluster identifier, and determining target firewall equipment corresponding to the target container cluster according to the corresponding relation between the container cluster and the firewall equipment;
determining a target address set corresponding to the target firewall equipment according to the change information of the IP address, and processing the original IP address content of the target address set to obtain the target IP address content;
and generating a change script according to the content of the target IP address, and sending the change script to the target firewall equipment so as to apply the content of the target IP address to a corresponding access relation strategy.
2. The method according to claim 1, wherein the determining a target firewall device corresponding to the target container cluster according to the correspondence between the container cluster and the firewall device comprises:
determining a target network area corresponding to the target container cluster according to the corresponding relation between the container cluster and the network area;
and determining target firewall equipment corresponding to the target network area according to the corresponding relation between the network area and the firewall equipment.
3. The method according to claim 1, wherein the change information of the IP address of the Pod includes an address set identifier, a destination IP address, and an operation type, and the determining, according to the change information of the IP address, a destination address set corresponding to the destination firewall device and processing an original IP address content of the destination address set to obtain a destination IP address content includes:
determining a target address set corresponding to the target firewall equipment according to the address set identifier;
and acquiring original IP address content of the target address set, and processing the original IP address content according to the target IP address and the corresponding operation type to obtain target IP address content.
4. The method of claim 3, wherein the operation types include a create operation, a delete operation, and an update operation, and wherein the processing the original IP address content according to the target IP address and the corresponding operation type to obtain the target IP address content comprises:
when the operation type is an updating operation, splitting the updating operation into a deleting operation and a creating operation; and/or the presence of a gas in the gas,
when the operation type is a creating operation, adding the target IP address into the original IP address content to obtain the target IP address content; and/or the presence of a gas in the gas,
and when the operation type is a deleting operation, deleting the IP address corresponding to the target IP address in the original IP address content to obtain the target IP address content.
5. The method of claim 4, wherein prior to said generating a change script based on said target IP address content, said method further comprises:
acquiring the current IP address of the container Pod corresponding to the target address set in the target container cluster to obtain the content of the current IP address; the current IP address content comprises current IP addresses of a plurality of the container Pods;
comparing whether the content of the current IP address is consistent with the content of the target IP address;
if not, determining the content of the current IP address as the content of the target IP address.
6. The method of claim 5, wherein prior to said generating a change script based on said target IP address content, said method further comprises:
if the current IP address of the container Pod corresponding to the target address set in the target container cluster fails to be acquired, sending first fault notification information to corresponding operation and maintenance personnel, wherein the first fault notification information comprises a first fault corresponding to the current IP address acquisition failure, so that the operation and maintenance personnel can process the first fault;
when the operation type is a deleting operation, suspending an access change request corresponding to the deleting operation to obtain a suspended access change request;
and after the first fault is processed, re-executing the suspended access change request.
7. The method of claim 1, wherein sending the change script to the target firewall device further comprises:
if the sending of the change script fails, hanging a sending task corresponding to the sending of the change script;
sending second fault notification information to corresponding operation and maintenance personnel, wherein the second fault notification information comprises a second fault corresponding to the connection failure of the target firewall equipment, so that the operation and maintenance personnel can process the second fault;
and after the second fault is processed, re-executing the sending task.
8. The method of claim 1, wherein prior to obtaining the pending access change request, further comprising:
receiving an access change request sent by a container platform;
judging whether the access change request meets the requirement of a preset specification;
and if so, storing the access change request as a pending access change request in a data queue.
9. A firewall intelligent linkage device for container visits, the device comprising:
the change request acquisition module is used for acquiring the access change request to be processed; the access change request comprises a container cluster identifier and change information of an IP address of a container Pod;
the firewall equipment determining module is used for determining a target container cluster according to the container cluster identifier and determining target firewall equipment corresponding to the target container cluster according to the corresponding relation between the container cluster and the firewall equipment;
the target address set processing module is used for determining a target address set corresponding to the target firewall equipment according to the change information of the IP address and processing the original IP address content of the target address set to obtain the target IP address content;
and the access relation policy updating module generates a change script according to the target IP address content and sends the change script to the target firewall equipment so as to apply the target IP address content to a corresponding access relation policy.
10. An electronic device comprising a processor, a memory, and a computer program stored on the memory and executable on the processor, the computer program when executed by the processor implementing the steps of the container visit firewall intelligent linking method according to any one of claims 1 to 8.
11. A computer-readable storage medium, on which a computer program is stored, which, when executed by a processor, carries out the steps of the container visiting firewall intelligent linkage method according to any one of claims 1 to 8.
CN202110450592.7A 2021-04-25 2021-04-25 Intelligent linkage method, device, equipment and medium for firewall of container visit Active CN113315754B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110450592.7A CN113315754B (en) 2021-04-25 2021-04-25 Intelligent linkage method, device, equipment and medium for firewall of container visit

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110450592.7A CN113315754B (en) 2021-04-25 2021-04-25 Intelligent linkage method, device, equipment and medium for firewall of container visit

Publications (2)

Publication Number Publication Date
CN113315754A true CN113315754A (en) 2021-08-27
CN113315754B CN113315754B (en) 2022-07-12

Family

ID=77371011

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110450592.7A Active CN113315754B (en) 2021-04-25 2021-04-25 Intelligent linkage method, device, equipment and medium for firewall of container visit

Country Status (1)

Country Link
CN (1) CN113315754B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114039751A (en) * 2021-10-26 2022-02-11 杭州博盾习言科技有限公司 Network dynamic sensing device, system and method
CN114374543A (en) * 2021-12-20 2022-04-19 北京北信源软件股份有限公司 Network security protection method, system, device, security switch and storage medium
CN117811838A (en) * 2024-02-29 2024-04-02 博上(山东)网络科技有限公司 HAproxy server IP white list synchronization method and system

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080148380A1 (en) * 2006-10-30 2008-06-19 Microsoft Corporation Dynamic updating of firewall parameters
US20140150050A1 (en) * 2007-05-22 2014-05-29 Skybox Security Inc. Method, a system, and a computer program product for managing access change assurance
US20180176185A1 (en) * 2016-12-19 2018-06-21 Nicira, Inc. Firewall rule management for hierarchical entities
CN108369525A (en) * 2015-12-15 2018-08-03 微软技术许可有限责任公司 scalable tenant network
EP3547134A1 (en) * 2018-03-29 2019-10-02 Hewlett-Packard Enterprise Development LP Container cluster management
CN111614605A (en) * 2019-02-26 2020-09-01 瞻博网络公司 Automatic configuration of boundary firewall based on security group information of SDN virtual firewall
US20200351309A1 (en) * 2019-04-30 2020-11-05 Palo Alto Networks, Inc. Security policy enforcement and visibility for network architectures that mask external source addresses

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080148380A1 (en) * 2006-10-30 2008-06-19 Microsoft Corporation Dynamic updating of firewall parameters
US20140150050A1 (en) * 2007-05-22 2014-05-29 Skybox Security Inc. Method, a system, and a computer program product for managing access change assurance
CN108369525A (en) * 2015-12-15 2018-08-03 微软技术许可有限责任公司 scalable tenant network
US20180176185A1 (en) * 2016-12-19 2018-06-21 Nicira, Inc. Firewall rule management for hierarchical entities
EP3547134A1 (en) * 2018-03-29 2019-10-02 Hewlett-Packard Enterprise Development LP Container cluster management
US20190306231A1 (en) * 2018-03-29 2019-10-03 Hewlett Packard Enterprise Development Lp Container cluster management
CN111614605A (en) * 2019-02-26 2020-09-01 瞻博网络公司 Automatic configuration of boundary firewall based on security group information of SDN virtual firewall
US20200351309A1 (en) * 2019-04-30 2020-11-05 Palo Alto Networks, Inc. Security policy enforcement and visibility for network architectures that mask external source addresses

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
代向东等: "基于Ponder语言的防火墙策略描述方法研究", 《计算机应用与软件》 *

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114039751A (en) * 2021-10-26 2022-02-11 杭州博盾习言科技有限公司 Network dynamic sensing device, system and method
CN114039751B (en) * 2021-10-26 2024-06-14 杭州博盾习言科技有限公司 Network dynamic sensing device, system and method
CN114374543A (en) * 2021-12-20 2022-04-19 北京北信源软件股份有限公司 Network security protection method, system, device, security switch and storage medium
CN114374543B (en) * 2021-12-20 2023-10-13 北京北信源软件股份有限公司 Network security protection method, system, device, security switch and storage medium
CN117811838A (en) * 2024-02-29 2024-04-02 博上(山东)网络科技有限公司 HAproxy server IP white list synchronization method and system
CN117811838B (en) * 2024-02-29 2024-05-17 博上(山东)网络科技有限公司 HAProxy server IP white list synchronization method and system

Also Published As

Publication number Publication date
CN113315754B (en) 2022-07-12

Similar Documents

Publication Publication Date Title
CN113315754B (en) Intelligent linkage method, device, equipment and medium for firewall of container visit
CN111966305B (en) Persistent volume allocation method and device, computer equipment and storage medium
US11689638B2 (en) Embedded database as a microservice for distributed container cloud platform
CN109491776B (en) Task arranging method and system
EP3667500B1 (en) Using a container orchestration service for dynamic routing
US11368407B2 (en) Failover management using availability groups
CN110825420A (en) Configuration parameter updating method, device, equipment and storage medium for distributed cluster
CN108959385B (en) Database deployment method, device, computer equipment and storage medium
CN111324571A (en) Container cluster management method, device and system
CN103473696A (en) Method and system for collecting, analyzing and distributing internet business information
US10673694B2 (en) Private network mirroring
CN111464603B (en) Server capacity expansion method and system
CN106484321A (en) A kind of date storage method and data center
CN106790131B (en) Parameter modification method and device and distributed platform
CN113961312A (en) Target service deployment method and device and electronic equipment
CN110581893A (en) data transmission method and device, routing equipment, server and storage medium
CN111831567A (en) Application test environment configuration method, device, system and medium
CN111552494B (en) Method, device, system and medium for managing container group
CN114282210A (en) Sandbox automatic construction method and system, computer equipment and readable storage medium
CN110933184B (en) Resource publishing platform and resource publishing method
CN112631727A (en) Method and device for monitoring pod
CN114168179B (en) Micro-service management method, micro-service management device, computer equipment and storage medium
CN115103028B (en) SaaS application request processing method and device and computer equipment
WO2022001203A1 (en) Mirror image distribution method, electronic device, and storage medium
CN116225617A (en) Management migration method and device for container instance, electronic equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant