CN114006753A - Container mirror image layer downloading interception method and device - Google Patents

Container mirror image layer downloading interception method and device Download PDF

Info

Publication number
CN114006753A
CN114006753A CN202111271511.3A CN202111271511A CN114006753A CN 114006753 A CN114006753 A CN 114006753A CN 202111271511 A CN202111271511 A CN 202111271511A CN 114006753 A CN114006753 A CN 114006753A
Authority
CN
China
Prior art keywords
image layer
mirror image
host
cluster
chainid
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN202111271511.3A
Other languages
Chinese (zh)
Inventor
张蔚茵
吴国威
何明
樊宁
沈军
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Telecom Corp Ltd
Original Assignee
China Telecom Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Telecom Corp Ltd filed Critical China Telecom Corp Ltd
Priority to CN202111271511.3A priority Critical patent/CN114006753A/en
Publication of CN114006753A publication Critical patent/CN114006753A/en
Withdrawn legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/30Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information
    • H04L63/308Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information retaining data, e.g. retaining successful, unsuccessful communication attempts, internet access, or e-mail, internet telephony, intercept related information or call content
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/06Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/104Peer-to-peer [P2P] networks
    • H04L67/1044Group management mechanisms 
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1095Replication or mirroring of data, e.g. scheduling or transport for data synchronisation between network nodes

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Technology Law (AREA)
  • Physics & Mathematics (AREA)
  • Mathematical Physics (AREA)
  • Theoretical Computer Science (AREA)
  • Stored Programmes (AREA)

Abstract

The disclosure relates to a container mirror image layer downloading interception method, which comprises the following steps: when the container is started and the container mirror image needs to be downloaded from the public network by the arranging and managing system, the host-level interceptor intercepts a container mirror image layer downloading request and judges whether the chainID of the mirror image layer exists or not through a cache table on the host-level interceptor; if the chainID of the mirror image layer exists in the cache table on the host-level interceptor, the mirror image layer is reused without downloading; if the chainID of the mirror image layer does not exist in the cache table on the host level interceptor, the method comprises the following steps: judging whether the chainID of the mirror layer exists or not through a cache table on the cluster-level interceptor; if the chainID of the mirror image layer exists in the cache table on the cluster level interceptor, directing a downloading request of the mirror image layer to a host in the cluster storing the mirror image layer; otherwise, the mirror image layer is downloaded from the public network, thereby avoiding the problem of repeatedly downloading the existing mirror image layer for many times in the existing container mirror image downloading mechanism and saving unnecessary host and cluster resource consumption.

Description

Container mirror image layer downloading interception method and device
Technical Field
The present disclosure relates to the field of security, and in particular to container technology.
Background
The container technology provides a resource isolation operating environment for the application program, has the characteristics of light weight, cross-platform performance, quick start and the like, and is an important part in a cloud native technology system. The arranging management system can carry out unified arranging management on the containers in the host computer cluster, can automatically select a host computer, download container images, start container examples and destroy container examples, and is a main tool for managing the containers in the host computer cluster at present.
When the container is started by the arrangement management system, only the container mirror image is taken as the granularity for retrieval and the mirror image layer is reused, and the retrieval is not directly taken into consideration by taking the mirror image layer as the granularity; only whether a corresponding container image exists on a host is considered, and the image resources of other hosts in the cluster are not considered. The arrangement management system has restartpolicy, which causes that when a container of a large mirror image is started, the same host machine cannot reuse a downloaded mirror image layer when downloading is attempted for many times; the problem that different host machines repeatedly download the same mirror image can cause the waste of the host machines and cluster resources and influence the availability of other cluster services.
Disclosure of Invention
The following presents a simplified summary of the disclosure in order to provide a basic understanding of some aspects of the disclosure. However, it should be understood that this summary is not an exhaustive overview of the disclosure. It is not intended to identify key or critical elements of the disclosure or to delineate the scope of the disclosure. Its sole purpose is to present some concepts of the disclosure in a simplified form as a prelude to the more detailed description that is presented later.
According to an aspect of the present disclosure, a container mirror layer download intercepting method is provided, which includes the steps of:
when the orchestration management system enables the container and the container image needs to be downloaded from the public network,
a host-level interceptor intercepts a container mirror layer downloading request;
judging whether the chainID of the mirror layer exists or not through a cache table on the host-level interceptor;
if the cache table on the host level interceptor is judged to have the mirror image layer chainID, the mirror image layer is reused without downloading;
if the mirror layer chainID does not exist in the cache table on the host level interceptor, the method comprises the following steps:
judging whether a mirror layer chainID exists or not through a cache table on a cluster-level interceptor;
if the cache table on the cluster level interceptor is judged to have the mirror image layer chainID, the mirror image layer is not downloaded from the public network, but the downloading request of the mirror image layer is guided to the host machine address in the cluster for storing the mirror image layer;
and if the cache table on the cluster level interceptor does not have the mirror image layer chainID, downloading the mirror image layer from the public network.
According to another aspect of the present disclosure, a container mirror layer download intercepting apparatus is provided, including:
a memory having instructions stored thereon; and
a processor configured to execute instructions stored on the memory to perform the above-described method.
According to yet another aspect of the present disclosure, a computer-readable storage medium is presented, comprising computer-executable instructions that, when executed by one or more processors, cause the one or more processors to perform the above-described method.
Other features of the present disclosure and advantages thereof will become apparent from the following detailed description of the preferred embodiments of the present disclosure.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments of the disclosure and together with the description, serve to explain the principles of the disclosure.
The present disclosure may be more clearly understood from the following detailed description with reference to the accompanying drawings, in which:
fig. 1 illustrates a block diagram of a container mirroring layer download intercepting system according to the present disclosure.
Fig. 2 illustrates a flow chart of a container mirror layer download interception method according to the present disclosure.
FIG. 3 illustrates an exemplary configuration of a computing device capable of implementing embodiments in accordance with the present disclosure.
Detailed Description
The following detailed description is made with reference to the accompanying drawings and is provided to assist in a comprehensive understanding of various exemplary embodiments of the disclosure. The following description includes various details to aid understanding, but these details are to be regarded as examples only and are not intended to limit the disclosure, which is defined by the appended claims and their equivalents. The words and phrases used in the following description are used only to provide a clear and consistent understanding of the disclosure. In addition, descriptions of well-known structures, functions, and configurations may be omitted for clarity and conciseness. Those of ordinary skill in the art will recognize that various changes and modifications of the examples described herein can be made without departing from the spirit and scope of the disclosure.
Fig. 1 illustrates a block diagram of a container mirroring layer download intercepting system according to the present disclosure.
As shown in fig. 1, a container mirror layer download intercept system according to the present disclosure includes a host-level interceptor and a cluster-level interceptor.
In some embodiments, multiple (e.g., three) host-level interceptors are communicatively coupled to, for example, one cluster-level interceptor.
In some embodiments, the host-level interceptors may update the cache information to the cluster-level interceptors. For example, when cache information in a host-level interceptor changes, such as when a new container image is downloaded, the host-level interceptor may update the cache information to the cluster-level interceptor. Thus, the cluster-level interceptors may receive updated caching information from the various host-level interceptors to which they are connected.
Fig. 2 illustrates a flow chart of a container mirror layer download interception method according to the present disclosure.
As shown in fig. 2, an exemplary embodiment of the present disclosure includes the following exemplary steps.
The first step is as follows: the pod needs to start the container A, and after judgment, the layer a needs to be downloaded from the public network.
The second step is that: the host level interceptor intercepts the download request of layer a.
The third step: is there a chainID for layer a determined by a cache table on the host-level interceptor? If not, turning to the fourth step; and if so, turning to the seventh step.
The fourth step: is there a chainID for layer a determined by a cache table on the cluster level interceptor? If not, turning to the fifth step; if yes, the sixth step is executed.
The fifth step: after downloading layer a from the public network and displaying "pull complete", the chainID, diffid, cacheID, parentID of layer a are recorded in the host-level interceptor.
And a sixth step: without downloading layer a, the request is directed to the host address of layer a to obtain layer a.
The seventh step: no download is required.
Eighth step: after a period of time, the host-level interceptor updates the cache information to the cluster-level interceptor and attaches the host address.
The method improves the method for intercepting the download of the docker image under the existing k8s cluster environment. In some embodiments, the present disclosure extends the image downloading component, a cluster-level interceptor and a host-level interceptor are newly added in the k8s cluster, and layer information recording and reusing at the host level and the cluster level are realized through "interception", "detection" and "caching", so as to avoid the problems of repeated downloading and wasting of host and cluster resources.
An exemplary embodiment is described in more detail below.
The first step is as follows: pod needs to activate container a, which contains layers a, b, c.
The second step is that: judging whether other local mirror images also contain layer a, if so, turning to the third step; otherwise, go to the fourth step.
The third step: the layer a is not required to be downloaded, and the locally existing layer a is reused. And turning to the first step to continue processing layers b and c.
The fourth step: judging whether the cache of the host level interceptor has the chainID of layer a, if so, turning to the fifth step; otherwise, go to the sixth step.
The fifth step: finding the position of layer a in the memory through the cacheID in the cache of the host-level interceptor, and adding the information of layer a in the cache into rootfs of the container A. And turning to the first step to continue processing layers b and c.
And a sixth step: judging whether the cache of the cluster level interceptor has the chainID of layer a, if so, turning to the seventh step; otherwise, go to the eighth step.
The seventh step: and the layer a is not required to be downloaded, the downloading request is guided to the host address of the layer a, and the layer a is pulled to the local from other hosts in the cluster. At this time, the caches of the cluster-level interceptor and the host-level interceptor are not updated. And turning to the first step to continue processing layers b and c.
Eighth step: downloading layer a from the public network, updating the cache information of the host-level interceptor after displaying "pull complete", and recording the chainID, diffid, cacheID and parentID of layer a. And turning to the first step to continue processing layers b and c.
In existing systems, when k8s is to boot a container based on a large image that does not exist locally:
a restartpolicy mechanism exists in k8s, and if the mirror image is not completely downloaded after several minutes, the pod is automatically restarted and is downloaded again;
k8s calls the image download function of docker, but docker cannot reuse the previously downloaded layers when downloading images multiple times.
The two mechanisms can cause that k8s needs to download the image from the head again, so that the cyclic downloading is easy to be involved, the host resource and the cluster network bandwidth are wasted, and the normal network access of other pod in the host and other nodes in the cluster is affected.
In some embodiments of the present disclosure, the image download component is extended in the docker image download interception method in the existing k8s environment, a cluster-level interceptor and a host-level interceptor are newly added in the k8s cluster, and layer information recording and reuse at the host level and the cluster level is realized through "interception", "detection" and "caching". When a certain pod on the host judges whether the layer needs to be downloaded, if the host level interceptor and the cache of the cluster level interceptor do not exist, the layer needs to be downloaded from the public network. This further avoids the problem of multiple repeated downloads of existing layers, consuming host and cluster resources.
In some embodiments, the host-level interceptor is responsible for caching layer information downloaded on the host, including the layer's chainID, diffid, cacheID, parentID, and the cluster-level interceptor is responsible for caching layer information downloaded within the cluster, including the layer's chainID, host address.
In some embodiments, the host-level interceptors update layer information to the cluster-level interceptors, which enriches the interceptor categories and further enhances the reuse of the layer. In some embodiments, the host-level interceptors update the cache information to the cluster-level interceptors after a period of time, such as after 48 h.
The invention according to the present disclosure includes the following aspects.
(1) A container mirror image layer downloading interception method comprises the following steps:
when the orchestration management system enables the container and the container image needs to be downloaded from the public network,
a host-level interceptor intercepts a container mirror layer downloading request;
judging whether the chainID of the mirror layer exists or not through a cache table on the host-level interceptor;
if the cache table on the host level interceptor is judged to have the mirror image layer chainID, the mirror image layer is reused without downloading;
if the mirror layer chainID does not exist in the cache table on the host level interceptor, the method comprises the following steps:
judging whether a mirror layer chainID exists or not through a cache table on a cluster-level interceptor;
if the cache table on the cluster level interceptor is judged to have the mirror image layer chainID, the mirror image layer is not downloaded from the public network, but the downloading request of the mirror image layer is guided to the host machine address in the cluster for storing the mirror image layer;
and if the cache table on the cluster level interceptor does not have the mirror image layer chainID, downloading the mirror image layer from the public network.
(2) The method according to (1), further comprising the steps of:
after downloading the container image layer from the public network, the chainID, diffid, cacheID and parentID of the image layer are recorded in the host-level interceptor.
(3) The method according to (1), further comprising the steps of:
the host-level interceptors update the cache information to the cluster-level interceptors and attach host addresses.
(4) The method according to (3), wherein,
the host-level interceptors update the cache information to the cluster-level interceptors at intervals.
(5) The method according to (1), further comprising the steps of:
caching the information of the mirror image layer downloaded from the host by the host-level interceptor, wherein the information of the mirror image layer downloaded from the host comprises chainID, diffid, cacheID and parentID of the mirror image layer; and
the cluster-level interceptor caches the image layer information downloaded in the cluster, wherein the image layer information downloaded in the cluster comprises the chainID and the host address of the image layer.
(6) The method according to (1), wherein,
if the chainID of the mirror image layer exists in the cache table on the host level interceptor, finding the position of the mirror image layer in the memory through the cacheID in the cache table on the host level interceptor, and adding the information of the mirror image layer in the cache into rootfs of the container.
(7) The method according to (1), wherein,
and if the cache table on the cluster level interceptor has the chainID of the mirror image layer, directing the downloading request to the host address of the mirror image layer, and pulling the mirror image layer from other hosts in the cluster to the local.
(8) A container mirror layer download interception apparatus, comprising:
a memory having instructions stored thereon; and
a processor configured to execute instructions stored on the memory to perform the method of any of (1) through (7).
(9) A computer-readable storage medium comprising computer-executable instructions that, when executed by one or more processors, cause the one or more processors to perform the method of any one of (1) through (7).
Fig. 3 illustrates an exemplary configuration of a computing device 300 capable of implementing embodiments in accordance with the present disclosure.
Computing device 300 is an example of a hardware device to which the above-described aspects of the disclosure can be applied. Computing device 300 may be any machine configured to perform processing and/or computing. Computing device 300 may be, but is not limited to, a workstation, a server, a desktop computer, a laptop computer, a tablet computer, a Personal Data Assistant (PDA), a smart phone, an in-vehicle computer, or a combination thereof.
As shown in fig. 3, computing device 300 may include one or more elements that may be connected to or in communication with bus 302 via one or more interfaces. Bus 302 can include, but is not limited to, an Industry Standard Architecture (ISA) bus, a Micro Channel Architecture (MCA) bus, an enhanced ISA (eisa) bus, a Video Electronics Standards Association (VESA) local bus, and a Peripheral Component Interconnect (PCI) bus, among others. Computing device 300 may include, for example, one or more processors 304, one or more input devices 306, and one or more output devices 308. The one or more processors 304 may be any kind of processor and may include, but are not limited to, one or more general purpose processors or special purpose processors (such as special purpose processing chips). The processor 304 may be configured, for example, as the method described above. Input device 306 may be any type of input device capable of inputting information to a computing device and may include, but is not limited to, a mouse, a keyboard, a touch screen, a microphone, and/or a remote control. Output device 308 may be any type of device capable of presenting information and may include, but is not limited to, a display, speakers, a video/audio output terminal, a vibrator, and/or a printer.
The computing device 300 may also include or be connected to a non-transitory storage device 314, which non-transitory storage device 314 may be any non-transitory and may implement a storage device for data storage, and may include, but is not limited to, a disk drive, an optical storage device, a solid state memory, a floppy disk, a flexible disk, a hard disk, a magnetic tape, or any other magnetic medium, a compact disk, or any other optical medium, a cache memory, and/or any other memory chip or module, and/or any other medium from which a computer may read data, instructions, and/or code. Computing device 300 may also include Random Access Memory (RAM)310 and Read Only Memory (ROM) 312. The ROM 312 may store programs, utilities or processes to be executed in a nonvolatile manner. The RAM 310 may provide volatile data storage and store instructions related to the operation of the computing device 300. Computing device 300 may also include a network/bus interface 316 coupled to a data link 318. The network/bus interface 316 may be any kind of device or system capable of enabling communication with external devices and/or networks, and may include, but is not limited to, a modem, a network card, an infrared communication device, a wireless communication device, and/or a chipset (such as bluetooth)TMDevices, 802.11 devices, WiFi devices, WiMax devices, cellular communications facilities, etc.).
The present disclosure may be implemented as any combination of apparatus, systems, integrated circuits, and computer programs on non-transitory computer readable media. One or more processors may be implemented as an Integrated Circuit (IC), an Application Specific Integrated Circuit (ASIC), or a large scale integrated circuit (LSI), a system LSI, or a super LSI, or as an ultra LSI package that performs some or all of the functions described in this disclosure.
The present disclosure includes the use of software, applications, computer programs or algorithms. Software, applications, computer programs, or algorithms may be stored on a non-transitory computer readable medium to cause a computer, such as one or more processors, to perform the steps described above and depicted in the figures. For example, one or more memories store software or algorithms in executable instructions and one or more processors may associate a set of instructions to execute the software or algorithms to provide various functionality in accordance with embodiments described in this disclosure.
Software and computer programs (which may also be referred to as programs, software applications, components, or code) include machine instructions for a programmable processor, and may be implemented in a high-level procedural, object-oriented, functional, logical, or assembly or machine language. The term "computer-readable medium" refers to any computer program product, apparatus or device, such as magnetic disks, optical disks, solid state storage devices, memories, and Programmable Logic Devices (PLDs), used to provide machine instructions or data to a programmable data processor, including a computer-readable medium that receives machine instructions as a computer-readable signal.
By way of example, computer-readable media can comprise Dynamic Random Access Memory (DRAM), Random Access Memory (RAM), Read Only Memory (ROM), electrically erasable read only memory (EEPROM), compact disk read only memory (CD-ROM) or other optical disk storage, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to carry or store desired computer-readable program code in the form of instructions or data structures and which can be accessed by a general-purpose or special-purpose computer or a general-purpose or special-purpose processor. Disk or disc, as used herein, includes Compact Disc (CD), laser disc, optical disc, Digital Versatile Disc (DVD), floppy disk and blu-ray disc where disks usually reproduce data magnetically, while discs reproduce data optically with lasers. Combinations of the above are also included within the scope of computer-readable media.
The subject matter of the present disclosure is provided as examples of apparatus, systems, methods, and programs for performing the features described in the present disclosure. However, other features or variations are contemplated in addition to the features described above. It is contemplated that the implementation of the components and functions of the present disclosure may be accomplished with any emerging technology that may replace the technology of any of the implementations described above.
Additionally, the above description provides examples, and does not limit the scope, applicability, or configuration set forth in the claims. Changes may be made in the function and arrangement of elements discussed without departing from the spirit and scope of the disclosure. Various embodiments may omit, substitute, or add various procedures or components as appropriate. For example, features described with respect to certain embodiments may be combined in other embodiments.
Similarly, while operations are depicted in the drawings in a particular order, this should not be understood as requiring that such operations be performed in the particular order shown or in sequential order, or that all illustrated operations be performed, to achieve desirable results. In some cases, multitasking and parallel processing may be advantageous.

Claims (9)

1. A container mirror image layer downloading interception method comprises the following steps:
when the orchestration management system enables the container and the container image needs to be downloaded from the public network,
a host-level interceptor intercepts a container mirror layer downloading request;
judging whether the chainID of the mirror layer exists or not through a cache table on the host-level interceptor;
if the cache table on the host level interceptor is judged to have the mirror image layer chainID, the mirror image layer is reused without downloading;
if the mirror layer chainID does not exist in the cache table on the host level interceptor, the method comprises the following steps:
judging whether a mirror layer chainID exists or not through a cache table on a cluster-level interceptor;
if the cache table on the cluster level interceptor is judged to have the mirror image layer chainID, the mirror image layer is not downloaded from the public network, but the downloading request of the mirror image layer is guided to the host machine address in the cluster for storing the mirror image layer;
and if the cache table on the cluster level interceptor does not have the mirror image layer chainID, downloading the mirror image layer from the public network.
2. The method of claim 1, further comprising the steps of:
after downloading the container image layer from the public network, the chainID, diffid, cacheID and parentID of the image layer are recorded in the host-level interceptor.
3. The method of claim 1, further comprising the steps of:
the host-level interceptors update the cache information to the cluster-level interceptors and attach host addresses.
4. The method of claim 3, wherein,
the host-level interceptors update the cache information to the cluster-level interceptors at intervals.
5. The method of claim 1, further comprising the steps of:
caching the information of the mirror image layer downloaded from the host by the host-level interceptor, wherein the information of the mirror image layer downloaded from the host comprises chainID, diffid, cacheID and parentID of the mirror image layer; and
the cluster-level interceptor caches the image layer information downloaded in the cluster, wherein the image layer information downloaded in the cluster comprises the chainID and the host address of the image layer.
6. The method of claim 1, wherein,
if the chainID of the mirror image layer exists in the cache table on the host level interceptor, finding the position of the mirror image layer in the memory through the cacheID in the cache table on the host level interceptor, and adding the information of the mirror image layer in the cache into rootfs of the container.
7. The method of claim 1, wherein,
and if the cache table on the cluster level interceptor has the chainID of the mirror image layer, directing the downloading request to the host address of the mirror image layer, and pulling the mirror image layer from other hosts in the cluster to the local.
8. A container mirror layer download interception apparatus, comprising:
a memory having instructions stored thereon; and
a processor configured to execute instructions stored on the memory to perform the method of any of claims 1 to 7.
9. A computer-readable storage medium comprising computer-executable instructions that, when executed by one or more processors, cause the one or more processors to perform the method of any one of claims 1-7.
CN202111271511.3A 2021-10-29 2021-10-29 Container mirror image layer downloading interception method and device Withdrawn CN114006753A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111271511.3A CN114006753A (en) 2021-10-29 2021-10-29 Container mirror image layer downloading interception method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111271511.3A CN114006753A (en) 2021-10-29 2021-10-29 Container mirror image layer downloading interception method and device

Publications (1)

Publication Number Publication Date
CN114006753A true CN114006753A (en) 2022-02-01

Family

ID=79925528

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111271511.3A Withdrawn CN114006753A (en) 2021-10-29 2021-10-29 Container mirror image layer downloading interception method and device

Country Status (1)

Country Link
CN (1) CN114006753A (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109800056A (en) * 2019-01-16 2019-05-24 杭州趣链科技有限公司 A kind of block chain dispositions method based on container
CN111190547A (en) * 2019-12-30 2020-05-22 中国电子科技集团公司信息科学研究院 Distributed container mirror image storage and distribution system and method
CN111443992A (en) * 2020-03-31 2020-07-24 高新兴科技集团股份有限公司 Docker mirror image difference derivation method, computer storage medium and electronic device
CN112817606A (en) * 2019-11-15 2021-05-18 中国电信股份有限公司 Deployment system and deployment method for container mirror image
US20210271499A1 (en) * 2020-02-27 2021-09-02 EMC IP Holding Company LLC Container cloning and branching
CN113434249A (en) * 2021-06-18 2021-09-24 杭州趣链科技有限公司 Mirror image synchronization method and device, docker host and storage medium

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109800056A (en) * 2019-01-16 2019-05-24 杭州趣链科技有限公司 A kind of block chain dispositions method based on container
CN112817606A (en) * 2019-11-15 2021-05-18 中国电信股份有限公司 Deployment system and deployment method for container mirror image
CN111190547A (en) * 2019-12-30 2020-05-22 中国电子科技集团公司信息科学研究院 Distributed container mirror image storage and distribution system and method
US20210271499A1 (en) * 2020-02-27 2021-09-02 EMC IP Holding Company LLC Container cloning and branching
CN111443992A (en) * 2020-03-31 2020-07-24 高新兴科技集团股份有限公司 Docker mirror image difference derivation method, computer storage medium and electronic device
CN113434249A (en) * 2021-06-18 2021-09-24 杭州趣链科技有限公司 Mirror image synchronization method and device, docker host and storage medium

Similar Documents

Publication Publication Date Title
US10521242B2 (en) Application containers with updatable application programming interface layers
US20200057660A1 (en) Method and system for rendering user interfaces
US9158699B2 (en) Memory management techniques
US9448977B2 (en) Website blueprint generation and display algorithms to reduce perceived web-page loading time
US10515056B2 (en) API for resource discovery and utilization
US9798555B2 (en) Application implementation method and apparatus
US20140215025A1 (en) Mobile device application streaming
US9733927B2 (en) Detection of software or hardware incompatibilities in software packages
CN114500549A (en) Method, apparatus, and medium to deploy k8s hosting cluster for users in public cloud
CN112650521A (en) Software development kit SDK (software development kit) hot repair method and device and electronic equipment
US10839037B2 (en) Connected application experience
CN114006753A (en) Container mirror image layer downloading interception method and device
CN116628773A (en) Data processing method, device, electronic equipment and storage medium
CN116467270A (en) Data management system, data updating method and device
US8997044B2 (en) Overriding system attributes and function returns in a software subsystem
CN118120212A (en) File deduplication method, device and equipment
CN114090127A (en) Electronic device, loading method and medium of configuration file of electronic device
CN114637969A (en) Target object authentication method and device
KR102700120B1 (en) Memory efficient software patching for updating applications on computing devices
CN113985961A (en) Clock synchronization device, method, electronic device, and storage medium
US10776261B2 (en) Storage apparatus managing system and storage apparatus managing method for increasing data reading speed
US20150373114A1 (en) Storage abstraction layer and a system and a method thereof
US10599617B2 (en) Methods and apparatus to modify a binary file for scalable dependency loading on distributed computing systems
CN110728516A (en) Method, device and equipment for updating wind control model
US20230342215A1 (en) Method to optimize storage partition rediscovery

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication

Application publication date: 20220201

WW01 Invention patent application withdrawn after publication