CN114006753A - Container mirror image layer downloading interception method and device - Google Patents
Container mirror image layer downloading interception method and device Download PDFInfo
- Publication number
- CN114006753A CN114006753A CN202111271511.3A CN202111271511A CN114006753A CN 114006753 A CN114006753 A CN 114006753A CN 202111271511 A CN202111271511 A CN 202111271511A CN 114006753 A CN114006753 A CN 114006753A
- Authority
- CN
- China
- Prior art keywords
- image layer
- mirror image
- host
- cluster
- chainid
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
- 238000000034 method Methods 0.000 title claims abstract description 37
- 230000015654 memory Effects 0.000 claims description 17
- 230000007246 mechanism Effects 0.000 abstract description 3
- 238000007726 management method Methods 0.000 description 6
- 238000004590 computer program Methods 0.000 description 5
- 238000005516 engineering process Methods 0.000 description 5
- 230000006870 function Effects 0.000 description 5
- 230000003287 optical effect Effects 0.000 description 5
- 238000004891 communication Methods 0.000 description 4
- 238000013500 data storage Methods 0.000 description 2
- 238000001514 detection method Methods 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 239000007787 solid Substances 0.000 description 2
- 230000010267 cellular communication Effects 0.000 description 1
- 125000004122 cyclic group Chemical group 0.000 description 1
- 238000002955 isolation Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000002093 peripheral effect Effects 0.000 description 1
- 230000008569 process Effects 0.000 description 1
- 239000002699 waste material Substances 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/30—Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information
- H04L63/308—Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information retaining data, e.g. retaining successful, unsuccessful communication attempts, internet access, or e-mail, internet telephony, intercept related information or call content
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/06—Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/104—Peer-to-peer [P2P] networks
- H04L67/1044—Group management mechanisms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1095—Replication or mirroring of data, e.g. scheduling or transport for data synchronisation between network nodes
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computing Systems (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Technology Law (AREA)
- Physics & Mathematics (AREA)
- Mathematical Physics (AREA)
- Theoretical Computer Science (AREA)
- Stored Programmes (AREA)
Abstract
The disclosure relates to a container mirror image layer downloading interception method, which comprises the following steps: when the container is started and the container mirror image needs to be downloaded from the public network by the arranging and managing system, the host-level interceptor intercepts a container mirror image layer downloading request and judges whether the chainID of the mirror image layer exists or not through a cache table on the host-level interceptor; if the chainID of the mirror image layer exists in the cache table on the host-level interceptor, the mirror image layer is reused without downloading; if the chainID of the mirror image layer does not exist in the cache table on the host level interceptor, the method comprises the following steps: judging whether the chainID of the mirror layer exists or not through a cache table on the cluster-level interceptor; if the chainID of the mirror image layer exists in the cache table on the cluster level interceptor, directing a downloading request of the mirror image layer to a host in the cluster storing the mirror image layer; otherwise, the mirror image layer is downloaded from the public network, thereby avoiding the problem of repeatedly downloading the existing mirror image layer for many times in the existing container mirror image downloading mechanism and saving unnecessary host and cluster resource consumption.
Description
Technical Field
The present disclosure relates to the field of security, and in particular to container technology.
Background
The container technology provides a resource isolation operating environment for the application program, has the characteristics of light weight, cross-platform performance, quick start and the like, and is an important part in a cloud native technology system. The arranging management system can carry out unified arranging management on the containers in the host computer cluster, can automatically select a host computer, download container images, start container examples and destroy container examples, and is a main tool for managing the containers in the host computer cluster at present.
When the container is started by the arrangement management system, only the container mirror image is taken as the granularity for retrieval and the mirror image layer is reused, and the retrieval is not directly taken into consideration by taking the mirror image layer as the granularity; only whether a corresponding container image exists on a host is considered, and the image resources of other hosts in the cluster are not considered. The arrangement management system has restartpolicy, which causes that when a container of a large mirror image is started, the same host machine cannot reuse a downloaded mirror image layer when downloading is attempted for many times; the problem that different host machines repeatedly download the same mirror image can cause the waste of the host machines and cluster resources and influence the availability of other cluster services.
Disclosure of Invention
The following presents a simplified summary of the disclosure in order to provide a basic understanding of some aspects of the disclosure. However, it should be understood that this summary is not an exhaustive overview of the disclosure. It is not intended to identify key or critical elements of the disclosure or to delineate the scope of the disclosure. Its sole purpose is to present some concepts of the disclosure in a simplified form as a prelude to the more detailed description that is presented later.
According to an aspect of the present disclosure, a container mirror layer download intercepting method is provided, which includes the steps of:
when the orchestration management system enables the container and the container image needs to be downloaded from the public network,
a host-level interceptor intercepts a container mirror layer downloading request;
judging whether the chainID of the mirror layer exists or not through a cache table on the host-level interceptor;
if the cache table on the host level interceptor is judged to have the mirror image layer chainID, the mirror image layer is reused without downloading;
if the mirror layer chainID does not exist in the cache table on the host level interceptor, the method comprises the following steps:
judging whether a mirror layer chainID exists or not through a cache table on a cluster-level interceptor;
if the cache table on the cluster level interceptor is judged to have the mirror image layer chainID, the mirror image layer is not downloaded from the public network, but the downloading request of the mirror image layer is guided to the host machine address in the cluster for storing the mirror image layer;
and if the cache table on the cluster level interceptor does not have the mirror image layer chainID, downloading the mirror image layer from the public network.
According to another aspect of the present disclosure, a container mirror layer download intercepting apparatus is provided, including:
a memory having instructions stored thereon; and
a processor configured to execute instructions stored on the memory to perform the above-described method.
According to yet another aspect of the present disclosure, a computer-readable storage medium is presented, comprising computer-executable instructions that, when executed by one or more processors, cause the one or more processors to perform the above-described method.
Other features of the present disclosure and advantages thereof will become apparent from the following detailed description of the preferred embodiments of the present disclosure.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments of the disclosure and together with the description, serve to explain the principles of the disclosure.
The present disclosure may be more clearly understood from the following detailed description with reference to the accompanying drawings, in which:
fig. 1 illustrates a block diagram of a container mirroring layer download intercepting system according to the present disclosure.
Fig. 2 illustrates a flow chart of a container mirror layer download interception method according to the present disclosure.
FIG. 3 illustrates an exemplary configuration of a computing device capable of implementing embodiments in accordance with the present disclosure.
Detailed Description
The following detailed description is made with reference to the accompanying drawings and is provided to assist in a comprehensive understanding of various exemplary embodiments of the disclosure. The following description includes various details to aid understanding, but these details are to be regarded as examples only and are not intended to limit the disclosure, which is defined by the appended claims and their equivalents. The words and phrases used in the following description are used only to provide a clear and consistent understanding of the disclosure. In addition, descriptions of well-known structures, functions, and configurations may be omitted for clarity and conciseness. Those of ordinary skill in the art will recognize that various changes and modifications of the examples described herein can be made without departing from the spirit and scope of the disclosure.
Fig. 1 illustrates a block diagram of a container mirroring layer download intercepting system according to the present disclosure.
As shown in fig. 1, a container mirror layer download intercept system according to the present disclosure includes a host-level interceptor and a cluster-level interceptor.
In some embodiments, multiple (e.g., three) host-level interceptors are communicatively coupled to, for example, one cluster-level interceptor.
In some embodiments, the host-level interceptors may update the cache information to the cluster-level interceptors. For example, when cache information in a host-level interceptor changes, such as when a new container image is downloaded, the host-level interceptor may update the cache information to the cluster-level interceptor. Thus, the cluster-level interceptors may receive updated caching information from the various host-level interceptors to which they are connected.
Fig. 2 illustrates a flow chart of a container mirror layer download interception method according to the present disclosure.
As shown in fig. 2, an exemplary embodiment of the present disclosure includes the following exemplary steps.
The first step is as follows: the pod needs to start the container A, and after judgment, the layer a needs to be downloaded from the public network.
The second step is that: the host level interceptor intercepts the download request of layer a.
The third step: is there a chainID for layer a determined by a cache table on the host-level interceptor? If not, turning to the fourth step; and if so, turning to the seventh step.
The fourth step: is there a chainID for layer a determined by a cache table on the cluster level interceptor? If not, turning to the fifth step; if yes, the sixth step is executed.
The fifth step: after downloading layer a from the public network and displaying "pull complete", the chainID, diffid, cacheID, parentID of layer a are recorded in the host-level interceptor.
And a sixth step: without downloading layer a, the request is directed to the host address of layer a to obtain layer a.
The seventh step: no download is required.
Eighth step: after a period of time, the host-level interceptor updates the cache information to the cluster-level interceptor and attaches the host address.
The method improves the method for intercepting the download of the docker image under the existing k8s cluster environment. In some embodiments, the present disclosure extends the image downloading component, a cluster-level interceptor and a host-level interceptor are newly added in the k8s cluster, and layer information recording and reusing at the host level and the cluster level are realized through "interception", "detection" and "caching", so as to avoid the problems of repeated downloading and wasting of host and cluster resources.
An exemplary embodiment is described in more detail below.
The first step is as follows: pod needs to activate container a, which contains layers a, b, c.
The second step is that: judging whether other local mirror images also contain layer a, if so, turning to the third step; otherwise, go to the fourth step.
The third step: the layer a is not required to be downloaded, and the locally existing layer a is reused. And turning to the first step to continue processing layers b and c.
The fourth step: judging whether the cache of the host level interceptor has the chainID of layer a, if so, turning to the fifth step; otherwise, go to the sixth step.
The fifth step: finding the position of layer a in the memory through the cacheID in the cache of the host-level interceptor, and adding the information of layer a in the cache into rootfs of the container A. And turning to the first step to continue processing layers b and c.
And a sixth step: judging whether the cache of the cluster level interceptor has the chainID of layer a, if so, turning to the seventh step; otherwise, go to the eighth step.
The seventh step: and the layer a is not required to be downloaded, the downloading request is guided to the host address of the layer a, and the layer a is pulled to the local from other hosts in the cluster. At this time, the caches of the cluster-level interceptor and the host-level interceptor are not updated. And turning to the first step to continue processing layers b and c.
Eighth step: downloading layer a from the public network, updating the cache information of the host-level interceptor after displaying "pull complete", and recording the chainID, diffid, cacheID and parentID of layer a. And turning to the first step to continue processing layers b and c.
In existing systems, when k8s is to boot a container based on a large image that does not exist locally:
a restartpolicy mechanism exists in k8s, and if the mirror image is not completely downloaded after several minutes, the pod is automatically restarted and is downloaded again;
k8s calls the image download function of docker, but docker cannot reuse the previously downloaded layers when downloading images multiple times.
The two mechanisms can cause that k8s needs to download the image from the head again, so that the cyclic downloading is easy to be involved, the host resource and the cluster network bandwidth are wasted, and the normal network access of other pod in the host and other nodes in the cluster is affected.
In some embodiments of the present disclosure, the image download component is extended in the docker image download interception method in the existing k8s environment, a cluster-level interceptor and a host-level interceptor are newly added in the k8s cluster, and layer information recording and reuse at the host level and the cluster level is realized through "interception", "detection" and "caching". When a certain pod on the host judges whether the layer needs to be downloaded, if the host level interceptor and the cache of the cluster level interceptor do not exist, the layer needs to be downloaded from the public network. This further avoids the problem of multiple repeated downloads of existing layers, consuming host and cluster resources.
In some embodiments, the host-level interceptor is responsible for caching layer information downloaded on the host, including the layer's chainID, diffid, cacheID, parentID, and the cluster-level interceptor is responsible for caching layer information downloaded within the cluster, including the layer's chainID, host address.
In some embodiments, the host-level interceptors update layer information to the cluster-level interceptors, which enriches the interceptor categories and further enhances the reuse of the layer. In some embodiments, the host-level interceptors update the cache information to the cluster-level interceptors after a period of time, such as after 48 h.
The invention according to the present disclosure includes the following aspects.
(1) A container mirror image layer downloading interception method comprises the following steps:
when the orchestration management system enables the container and the container image needs to be downloaded from the public network,
a host-level interceptor intercepts a container mirror layer downloading request;
judging whether the chainID of the mirror layer exists or not through a cache table on the host-level interceptor;
if the cache table on the host level interceptor is judged to have the mirror image layer chainID, the mirror image layer is reused without downloading;
if the mirror layer chainID does not exist in the cache table on the host level interceptor, the method comprises the following steps:
judging whether a mirror layer chainID exists or not through a cache table on a cluster-level interceptor;
if the cache table on the cluster level interceptor is judged to have the mirror image layer chainID, the mirror image layer is not downloaded from the public network, but the downloading request of the mirror image layer is guided to the host machine address in the cluster for storing the mirror image layer;
and if the cache table on the cluster level interceptor does not have the mirror image layer chainID, downloading the mirror image layer from the public network.
(2) The method according to (1), further comprising the steps of:
after downloading the container image layer from the public network, the chainID, diffid, cacheID and parentID of the image layer are recorded in the host-level interceptor.
(3) The method according to (1), further comprising the steps of:
the host-level interceptors update the cache information to the cluster-level interceptors and attach host addresses.
(4) The method according to (3), wherein,
the host-level interceptors update the cache information to the cluster-level interceptors at intervals.
(5) The method according to (1), further comprising the steps of:
caching the information of the mirror image layer downloaded from the host by the host-level interceptor, wherein the information of the mirror image layer downloaded from the host comprises chainID, diffid, cacheID and parentID of the mirror image layer; and
the cluster-level interceptor caches the image layer information downloaded in the cluster, wherein the image layer information downloaded in the cluster comprises the chainID and the host address of the image layer.
(6) The method according to (1), wherein,
if the chainID of the mirror image layer exists in the cache table on the host level interceptor, finding the position of the mirror image layer in the memory through the cacheID in the cache table on the host level interceptor, and adding the information of the mirror image layer in the cache into rootfs of the container.
(7) The method according to (1), wherein,
and if the cache table on the cluster level interceptor has the chainID of the mirror image layer, directing the downloading request to the host address of the mirror image layer, and pulling the mirror image layer from other hosts in the cluster to the local.
(8) A container mirror layer download interception apparatus, comprising:
a memory having instructions stored thereon; and
a processor configured to execute instructions stored on the memory to perform the method of any of (1) through (7).
(9) A computer-readable storage medium comprising computer-executable instructions that, when executed by one or more processors, cause the one or more processors to perform the method of any one of (1) through (7).
Fig. 3 illustrates an exemplary configuration of a computing device 300 capable of implementing embodiments in accordance with the present disclosure.
As shown in fig. 3, computing device 300 may include one or more elements that may be connected to or in communication with bus 302 via one or more interfaces. Bus 302 can include, but is not limited to, an Industry Standard Architecture (ISA) bus, a Micro Channel Architecture (MCA) bus, an enhanced ISA (eisa) bus, a Video Electronics Standards Association (VESA) local bus, and a Peripheral Component Interconnect (PCI) bus, among others. Computing device 300 may include, for example, one or more processors 304, one or more input devices 306, and one or more output devices 308. The one or more processors 304 may be any kind of processor and may include, but are not limited to, one or more general purpose processors or special purpose processors (such as special purpose processing chips). The processor 304 may be configured, for example, as the method described above. Input device 306 may be any type of input device capable of inputting information to a computing device and may include, but is not limited to, a mouse, a keyboard, a touch screen, a microphone, and/or a remote control. Output device 308 may be any type of device capable of presenting information and may include, but is not limited to, a display, speakers, a video/audio output terminal, a vibrator, and/or a printer.
The computing device 300 may also include or be connected to a non-transitory storage device 314, which non-transitory storage device 314 may be any non-transitory and may implement a storage device for data storage, and may include, but is not limited to, a disk drive, an optical storage device, a solid state memory, a floppy disk, a flexible disk, a hard disk, a magnetic tape, or any other magnetic medium, a compact disk, or any other optical medium, a cache memory, and/or any other memory chip or module, and/or any other medium from which a computer may read data, instructions, and/or code. Computing device 300 may also include Random Access Memory (RAM)310 and Read Only Memory (ROM) 312. The ROM 312 may store programs, utilities or processes to be executed in a nonvolatile manner. The RAM 310 may provide volatile data storage and store instructions related to the operation of the computing device 300. Computing device 300 may also include a network/bus interface 316 coupled to a data link 318. The network/bus interface 316 may be any kind of device or system capable of enabling communication with external devices and/or networks, and may include, but is not limited to, a modem, a network card, an infrared communication device, a wireless communication device, and/or a chipset (such as bluetooth)TMDevices, 802.11 devices, WiFi devices, WiMax devices, cellular communications facilities, etc.).
The present disclosure may be implemented as any combination of apparatus, systems, integrated circuits, and computer programs on non-transitory computer readable media. One or more processors may be implemented as an Integrated Circuit (IC), an Application Specific Integrated Circuit (ASIC), or a large scale integrated circuit (LSI), a system LSI, or a super LSI, or as an ultra LSI package that performs some or all of the functions described in this disclosure.
The present disclosure includes the use of software, applications, computer programs or algorithms. Software, applications, computer programs, or algorithms may be stored on a non-transitory computer readable medium to cause a computer, such as one or more processors, to perform the steps described above and depicted in the figures. For example, one or more memories store software or algorithms in executable instructions and one or more processors may associate a set of instructions to execute the software or algorithms to provide various functionality in accordance with embodiments described in this disclosure.
Software and computer programs (which may also be referred to as programs, software applications, components, or code) include machine instructions for a programmable processor, and may be implemented in a high-level procedural, object-oriented, functional, logical, or assembly or machine language. The term "computer-readable medium" refers to any computer program product, apparatus or device, such as magnetic disks, optical disks, solid state storage devices, memories, and Programmable Logic Devices (PLDs), used to provide machine instructions or data to a programmable data processor, including a computer-readable medium that receives machine instructions as a computer-readable signal.
By way of example, computer-readable media can comprise Dynamic Random Access Memory (DRAM), Random Access Memory (RAM), Read Only Memory (ROM), electrically erasable read only memory (EEPROM), compact disk read only memory (CD-ROM) or other optical disk storage, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to carry or store desired computer-readable program code in the form of instructions or data structures and which can be accessed by a general-purpose or special-purpose computer or a general-purpose or special-purpose processor. Disk or disc, as used herein, includes Compact Disc (CD), laser disc, optical disc, Digital Versatile Disc (DVD), floppy disk and blu-ray disc where disks usually reproduce data magnetically, while discs reproduce data optically with lasers. Combinations of the above are also included within the scope of computer-readable media.
The subject matter of the present disclosure is provided as examples of apparatus, systems, methods, and programs for performing the features described in the present disclosure. However, other features or variations are contemplated in addition to the features described above. It is contemplated that the implementation of the components and functions of the present disclosure may be accomplished with any emerging technology that may replace the technology of any of the implementations described above.
Additionally, the above description provides examples, and does not limit the scope, applicability, or configuration set forth in the claims. Changes may be made in the function and arrangement of elements discussed without departing from the spirit and scope of the disclosure. Various embodiments may omit, substitute, or add various procedures or components as appropriate. For example, features described with respect to certain embodiments may be combined in other embodiments.
Similarly, while operations are depicted in the drawings in a particular order, this should not be understood as requiring that such operations be performed in the particular order shown or in sequential order, or that all illustrated operations be performed, to achieve desirable results. In some cases, multitasking and parallel processing may be advantageous.
Claims (9)
1. A container mirror image layer downloading interception method comprises the following steps:
when the orchestration management system enables the container and the container image needs to be downloaded from the public network,
a host-level interceptor intercepts a container mirror layer downloading request;
judging whether the chainID of the mirror layer exists or not through a cache table on the host-level interceptor;
if the cache table on the host level interceptor is judged to have the mirror image layer chainID, the mirror image layer is reused without downloading;
if the mirror layer chainID does not exist in the cache table on the host level interceptor, the method comprises the following steps:
judging whether a mirror layer chainID exists or not through a cache table on a cluster-level interceptor;
if the cache table on the cluster level interceptor is judged to have the mirror image layer chainID, the mirror image layer is not downloaded from the public network, but the downloading request of the mirror image layer is guided to the host machine address in the cluster for storing the mirror image layer;
and if the cache table on the cluster level interceptor does not have the mirror image layer chainID, downloading the mirror image layer from the public network.
2. The method of claim 1, further comprising the steps of:
after downloading the container image layer from the public network, the chainID, diffid, cacheID and parentID of the image layer are recorded in the host-level interceptor.
3. The method of claim 1, further comprising the steps of:
the host-level interceptors update the cache information to the cluster-level interceptors and attach host addresses.
4. The method of claim 3, wherein,
the host-level interceptors update the cache information to the cluster-level interceptors at intervals.
5. The method of claim 1, further comprising the steps of:
caching the information of the mirror image layer downloaded from the host by the host-level interceptor, wherein the information of the mirror image layer downloaded from the host comprises chainID, diffid, cacheID and parentID of the mirror image layer; and
the cluster-level interceptor caches the image layer information downloaded in the cluster, wherein the image layer information downloaded in the cluster comprises the chainID and the host address of the image layer.
6. The method of claim 1, wherein,
if the chainID of the mirror image layer exists in the cache table on the host level interceptor, finding the position of the mirror image layer in the memory through the cacheID in the cache table on the host level interceptor, and adding the information of the mirror image layer in the cache into rootfs of the container.
7. The method of claim 1, wherein,
and if the cache table on the cluster level interceptor has the chainID of the mirror image layer, directing the downloading request to the host address of the mirror image layer, and pulling the mirror image layer from other hosts in the cluster to the local.
8. A container mirror layer download interception apparatus, comprising:
a memory having instructions stored thereon; and
a processor configured to execute instructions stored on the memory to perform the method of any of claims 1 to 7.
9. A computer-readable storage medium comprising computer-executable instructions that, when executed by one or more processors, cause the one or more processors to perform the method of any one of claims 1-7.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111271511.3A CN114006753A (en) | 2021-10-29 | 2021-10-29 | Container mirror image layer downloading interception method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111271511.3A CN114006753A (en) | 2021-10-29 | 2021-10-29 | Container mirror image layer downloading interception method and device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN114006753A true CN114006753A (en) | 2022-02-01 |
Family
ID=79925528
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202111271511.3A Withdrawn CN114006753A (en) | 2021-10-29 | 2021-10-29 | Container mirror image layer downloading interception method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114006753A (en) |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109800056A (en) * | 2019-01-16 | 2019-05-24 | 杭州趣链科技有限公司 | A kind of block chain dispositions method based on container |
CN111190547A (en) * | 2019-12-30 | 2020-05-22 | 中国电子科技集团公司信息科学研究院 | Distributed container mirror image storage and distribution system and method |
CN111443992A (en) * | 2020-03-31 | 2020-07-24 | 高新兴科技集团股份有限公司 | Docker mirror image difference derivation method, computer storage medium and electronic device |
CN112817606A (en) * | 2019-11-15 | 2021-05-18 | 中国电信股份有限公司 | Deployment system and deployment method for container mirror image |
US20210271499A1 (en) * | 2020-02-27 | 2021-09-02 | EMC IP Holding Company LLC | Container cloning and branching |
CN113434249A (en) * | 2021-06-18 | 2021-09-24 | 杭州趣链科技有限公司 | Mirror image synchronization method and device, docker host and storage medium |
-
2021
- 2021-10-29 CN CN202111271511.3A patent/CN114006753A/en not_active Withdrawn
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109800056A (en) * | 2019-01-16 | 2019-05-24 | 杭州趣链科技有限公司 | A kind of block chain dispositions method based on container |
CN112817606A (en) * | 2019-11-15 | 2021-05-18 | 中国电信股份有限公司 | Deployment system and deployment method for container mirror image |
CN111190547A (en) * | 2019-12-30 | 2020-05-22 | 中国电子科技集团公司信息科学研究院 | Distributed container mirror image storage and distribution system and method |
US20210271499A1 (en) * | 2020-02-27 | 2021-09-02 | EMC IP Holding Company LLC | Container cloning and branching |
CN111443992A (en) * | 2020-03-31 | 2020-07-24 | 高新兴科技集团股份有限公司 | Docker mirror image difference derivation method, computer storage medium and electronic device |
CN113434249A (en) * | 2021-06-18 | 2021-09-24 | 杭州趣链科技有限公司 | Mirror image synchronization method and device, docker host and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10521242B2 (en) | Application containers with updatable application programming interface layers | |
US20200057660A1 (en) | Method and system for rendering user interfaces | |
US9158699B2 (en) | Memory management techniques | |
US9448977B2 (en) | Website blueprint generation and display algorithms to reduce perceived web-page loading time | |
US10515056B2 (en) | API for resource discovery and utilization | |
US9798555B2 (en) | Application implementation method and apparatus | |
US20140215025A1 (en) | Mobile device application streaming | |
US9733927B2 (en) | Detection of software or hardware incompatibilities in software packages | |
CN114500549A (en) | Method, apparatus, and medium to deploy k8s hosting cluster for users in public cloud | |
CN112650521A (en) | Software development kit SDK (software development kit) hot repair method and device and electronic equipment | |
US10839037B2 (en) | Connected application experience | |
CN114006753A (en) | Container mirror image layer downloading interception method and device | |
CN116628773A (en) | Data processing method, device, electronic equipment and storage medium | |
CN116467270A (en) | Data management system, data updating method and device | |
US8997044B2 (en) | Overriding system attributes and function returns in a software subsystem | |
CN118120212A (en) | File deduplication method, device and equipment | |
CN114090127A (en) | Electronic device, loading method and medium of configuration file of electronic device | |
CN114637969A (en) | Target object authentication method and device | |
KR102700120B1 (en) | Memory efficient software patching for updating applications on computing devices | |
CN113985961A (en) | Clock synchronization device, method, electronic device, and storage medium | |
US10776261B2 (en) | Storage apparatus managing system and storage apparatus managing method for increasing data reading speed | |
US20150373114A1 (en) | Storage abstraction layer and a system and a method thereof | |
US10599617B2 (en) | Methods and apparatus to modify a binary file for scalable dependency loading on distributed computing systems | |
CN110728516A (en) | Method, device and equipment for updating wind control model | |
US20230342215A1 (en) | Method to optimize storage partition rediscovery |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WW01 | Invention patent application withdrawn after publication |
Application publication date: 20220201 |
|
WW01 | Invention patent application withdrawn after publication |