CN115118595A - Hybrid cloud deployment method and device, electronic equipment and storage medium - Google Patents

Hybrid cloud deployment method and device, electronic equipment and storage medium Download PDF

Info

Publication number
CN115118595A
CN115118595A CN202210750691.1A CN202210750691A CN115118595A CN 115118595 A CN115118595 A CN 115118595A CN 202210750691 A CN202210750691 A CN 202210750691A CN 115118595 A CN115118595 A CN 115118595A
Authority
CN
China
Prior art keywords
cloud
application environment
area
service
deployment
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202210750691.1A
Other languages
Chinese (zh)
Other versions
CN115118595B (en
Inventor
张广智
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ping An Bank Co Ltd
Original Assignee
Ping An Bank Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ping An Bank Co Ltd filed Critical Ping An Bank Co Ltd
Priority to CN202210750691.1A priority Critical patent/CN115118595B/en
Publication of CN115118595A publication Critical patent/CN115118595A/en
Application granted granted Critical
Publication of CN115118595B publication Critical patent/CN115118595B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0803Configuration setting
    • H04L41/0823Configuration setting characterised by the purposes of a change of settings, e.g. optimising configuration for enhancing reliability
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/02Standardisation; Integration
    • H04L41/0246Exchanging or transporting network management information using the Internet; Embedding network management web servers in network elements; Web-services-based protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]

Abstract

The embodiment of the application provides a hybrid cloud deployment method, a hybrid cloud deployment device, electronic equipment and a storage medium, wherein the method comprises the following steps: communicating the cloud area with a local machine room; configuring the application environment of the cloud area according to the application environment of the local machine room to obtain the cloud area after the application environment is configured; issuing service in the cloud area configured by the application environment; and authenticating the cloud region after the service is issued, and finishing deployment. By implementing the embodiment of the application, data can be uploaded and stored, and upper-layer services and applications can be deployed to the cloud end, so that hybrid cloud deployment is realized.

Description

Hybrid cloud deployment method and device, electronic equipment and storage medium
Technical Field
The application relates to the technical field of cloud deployment, in particular to a hybrid cloud deployment method and device, electronic equipment and a computer-readable storage medium.
Background
With the development of technology, more and more industries choose to deploy services in the cloud, such as the financial industry, and due to the large amount of data, services, applications, and the like, the services need to be deployed in the cloud to improve security and to be released quickly.
The hybrid cloud integrates public cloud and private cloud, and is a main mode and development direction of cloud computing in recent years. Enterprises are mainly oriented to enterprise users, and for safety, the enterprises prefer to store data in private clouds, but also desire to obtain computing resources of public clouds.
However, in the existing hybrid cloud deployment technology, a scheme provided by a cloud manufacturer is more biased to a bottom-layer application, such as a solution related to storage, a network, a server, and the like, and a complete solution cannot be provided on the basis of a hybrid cloud for a complex deployment that needs to deploy services, applications, and the like or deploy and release data, services, applications, and the like, and the hybrid cloud deployment aims to deploy an upper-layer service application to a cloud. The prior art cannot realize the method.
Disclosure of Invention
An object of the embodiments of the present application is to provide a hybrid cloud deployment method, an apparatus, an electronic device, and a computer-readable storage medium, which can not only upload and store data, but also deploy upper-layer services and applications to a cloud end, thereby implementing hybrid cloud deployment.
In a first aspect, an embodiment of the present application provides a hybrid cloud deployment method, where the method includes:
communicating the cloud area with a local machine room;
configuring the application environment of the cloud area according to the application environment of the local machine room to obtain the cloud area after the application environment is configured;
issuing service in the cloud area configured by the application environment;
and authenticating the cloud region after the service is issued, and finishing deployment.
In the implementation process, the application environment of the cloud area is configured according to the application environment of the local machine room, and the service is issued in the cloud area after the application environment is configured, so that the efficiency of cloud issuing and deployment can be improved without errors when the service is operated in the cloud area, the data uploading is not limited, and the hybrid cloud deployment can be realized.
Further, the step of configuring the application environment of the cloud area according to the application environment of the local machine room to obtain the cloud area after the application environment is configured includes:
acquiring application environment parameters of the local machine room;
and configuring an application environment which is the same as the application environment of the local machine room in the cloud area according to the application environment parameters to obtain the cloud area after the application environment is configured.
In the implementation process, the same application environment is configured for the cloud area according to the application environment parameters, so that errors in the configuration process can be reduced, the configuration efficiency is improved, and the application environment of the cloud area can be effectively carried with service and application.
Further, the step of issuing the service in the cloud area after the application environment is configured includes:
communicating a network channel between the cloud area configured by the application environment and the local machine room;
establishing service in a public area of a cloud area configured by the application environment;
and issuing the service of the public area to a sub-area of the cloud area configured by the application environment through an agent mechanism.
In the implementation process, the service is established in the public area of the cloud area and is issued in the cloud sub-area, so that the resource sharing of the cloud area can be ensured, and the service issuing efficiency of the cloud area is improved.
Further, the step of authenticating the cloud area after the service is issued to complete deployment includes:
adding a first security gateway in a cloud area after service is released;
adding a second security gateway in the local machine room;
and authenticating the cloud end region after service issuing through the first security gateway and the second security gateway to complete deployment.
In the implementation process, the first security gateway and the second security gateway are respectively added to the cloud region and the local machine room after the service is released, interaction between the cloud region and the local machine room can be achieved, the cloud region after the service is released is authenticated, and stability and safety of the cloud region after the service is released are guaranteed.
In a second aspect, an embodiment of the present application further provides a hybrid cloud deployment apparatus, where the apparatus includes:
the communication module is used for communicating the cloud area with the local machine room;
the configuration module is used for configuring the application environment of the cloud area according to the application environment of the local machine room to obtain the cloud area after the application environment is configured;
the issuing module is used for issuing service in the cloud area configured by the application environment;
and the authentication module is used for authenticating the cloud region after the service is issued to complete deployment.
In the implementation process, the application environment of the cloud area is configured according to the application environment of the local machine room, and the service is issued in the cloud area after the application environment is configured, so that the efficiency of cloud issuing and deployment can be improved without errors when the service is operated in the cloud area, the data uploading is not limited, and the hybrid cloud deployment can be realized.
Further, the configuration module is further configured to:
acquiring application environment parameters of the local machine room;
and configuring an application environment which is the same as the application environment of the local machine room in the cloud area according to the application environment parameters to obtain the cloud area after the application environment is configured.
In the implementation process, the same application environment is configured for the cloud area according to the application environment parameters, so that errors in the configuration process can be reduced, the configuration efficiency is improved, and the application environment of the cloud area can be effectively carried with service and application.
Further, the publishing module is further configured to:
communicating a network channel between the cloud area configured by the application environment and the local machine room;
establishing service in a public area of a cloud area configured by the application environment;
and issuing the service of the public area to a sub-area of the cloud area configured by the application environment through an agent mechanism.
In the implementation process, the service is established in the public area of the cloud area and is issued in the cloud sub-area, so that the resource sharing of the cloud area can be ensured, and the service issuing efficiency of the cloud area is improved.
Further, the authentication module is further configured to:
adding a first security gateway in a cloud area after service release;
adding a second security gateway in the local machine room;
and authenticating the cloud end region after the service is issued through the first security gateway and the second security gateway to finish deployment.
In the implementation process, the first security gateway and the second security gateway are respectively added to the cloud region and the local machine room after the service is released, interaction between the cloud region and the local machine room can be achieved, the cloud region after the service is released is authenticated, and stability and safety of the cloud region after the service is released are guaranteed.
In a third aspect, an embodiment of the present application provides an electronic device, including: memory, a processor and a computer program stored in the memory and executable on the processor, the processor implementing the steps of the method according to any of the first aspect when executing the computer program.
In a fourth aspect, an embodiment of the present application provides a computer-readable storage medium having instructions stored thereon, which, when executed on a computer, cause the computer to perform the method according to any one of the first aspect.
In a fifth aspect, embodiments of the present application provide a computer program product, which when run on a computer, causes the computer to perform the method according to any one of the first aspect.
Additional features and advantages of the disclosure will be set forth in the description which follows, or in part may be learned by the practice of the above-described techniques of the disclosure, or may be learned by practice of the disclosure.
The present invention can be implemented in accordance with the content of the specification, and the following detailed description of the preferred embodiments of the present application is made with reference to the accompanying drawings.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings that are required to be used in the embodiments of the present application will be briefly described below, it should be understood that the following drawings only illustrate some embodiments of the present application and therefore should not be considered as limiting the scope, and that those skilled in the art can also obtain other related drawings based on the drawings without inventive efforts.
Fig. 1 is a schematic flowchart of a hybrid cloud deployment method provided in an embodiment of the present application;
fig. 2 is a schematic structural composition diagram of a hybrid cloud deployment apparatus provided in an embodiment of the present application;
fig. 3 is a schematic structural component diagram of an electronic device according to an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be described below with reference to the drawings in the embodiments of the present application.
It should be noted that: like reference numbers and letters refer to like items in the following figures, and thus, once an item is defined in one figure, it need not be further defined and explained in subsequent figures. Meanwhile, in the description of the present application, the terms "first", "second", and the like are used only for distinguishing the description, and are not to be construed as indicating or implying relative importance.
The following detailed description of embodiments of the present application will be described in conjunction with the accompanying drawings and examples. The following examples are intended to illustrate the present application but are not intended to limit the scope of the present application.
Example one
Fig. 1 is a schematic flowchart of a hybrid cloud deployment method provided in an embodiment of the present application, and as shown in fig. 1, the method includes:
s1, communicating the cloud area with a local machine room;
s2, configuring the application environment of the cloud area according to the application environment of the local machine room to obtain the cloud area after the application environment is configured;
s3, issuing service in the cloud area after the application environment is configured;
and S4, authenticating the cloud area after the service is issued, and finishing deployment.
In the implementation process, the application environment of the cloud area is configured according to the application environment of the local machine room, and the service is issued in the cloud area after the application environment is configured, so that the efficiency of cloud issuing and deployment can be improved without errors when the service is operated in the cloud area, the data uploading is not limited, and the hybrid cloud deployment can be realized.
The hybrid cloud integrates public cloud and private cloud, and is a main mode and development direction of cloud computing in recent years. Enterprises are mainly oriented to enterprise users, and for safety, the enterprises prefer to store data in private clouds, but also desire to obtain computing resources of public clouds.
The hybrid Cloud is a tunnel or VPN service provided by a Private Cloud (VPC) network, and establishes a set of secure and efficient network connections. Web applications are deployed in the VPC, with additional privacy protection and security achieved through a distributed firewall. The user may create firewall rules. The method comprises the steps that a webpage application responds to requests of a HyperText Transfer Protocol (HTTP) or a HyperText Transfer Protocol over Secure Socket Layer (HTTPS) and the like, and meanwhile, the access to the Internet is denied, so that the security protection of a website is consolidated, interconnection and intercommunication of services deployed on a public cloud and applied to a self-owned data center is realized, and a mixed cloud framework is constructed.
For information control, scalability, burst requirements, and failover requirements. Mixing and matching private and public clouds provides a great help.
Illustratively, some cloud computing models such as private cloud, public cloud, and hybrid cloud may be established. Many enterprises have adapted these models in different, more complex directions, as defined by the national institute of standards and technology. Recently, the development plans for cloud computing are beginning to expand around the entire architectural support aspect, around hybrid clouds, or to mix, match various cloud computing patterns.
A private cloud is a concept defined for the infrastructure network (classical network) of a public cloud. A Private Cloud (VPC) is a logic isolation network space customized on a public Cloud, is a network space that can be customized, is similar to a traditional network in which a data center operates, and is hosted in the VPC is a server resource on the Private Cloud, such as a Cloud host, load balancing, a Cloud database, and the like. Network segment division, Internet Protocol (IP) addresses and routing strategies among networks can be customized, and multi-layer security protection is realized through security groups, Access Control Lists (ACLs) and the like. Meanwhile, the VPC and the data center can be communicated through the VPN or a private line, and the hybrid cloud is deployed flexibly.
The VPC is mainly a function of a network layer, and aims to construct an isolated virtual network environment capable of managing configuration and strategy on a cloud platform, so that the safety of resources in an AWS (business process management development platform, which is business process management basic platform software easy to deploy and use) environment is further improved.
Alternatively, it is possible to manage its own subnet structure, IP address range and allocation manner, routing policy of the network, etc. in the VPC environment. If the resources in the VPC are mastered and isolated, the VPC is equivalent to having a private cloud computing environment.
There are numerous advantages to using private clouds, such as flexible deployment: the user-defined network division, routing rule and configuration implementation are immediately effective; safety isolation: a 100% logically isolated network space; rich access: supporting public network VPN access and private line access; and (3) access control: the network control of the port is accurate, and the safety requirements of financial government enterprises are met.
A network with strict security access control is constructed through the VPC network, and meanwhile, the security isolation of core data and effective access from public network access are considered. The user can deploy a core server or a database system for processing core data and services in a subnet which cannot be accessed by the public network, and deploy a webpage server for accessing the public network in another subnet environment, and set the subnet to be connected with the public network. In the VPC network, a user can realize access control on core data and a service server through access control among subnets, and the access requirement of a public network is met while the core data is ensured to be safe and controllable.
The embodiment of the application provides a hybrid cloud deployment scheme for financial industry, which is characterized in that a production environment common to banks is communicated with users or branches in a hybrid cloud mode, so that data and resources of the banks can be shared with the users or branches in need, the hybrid cloud is suitable for service with high requirements on safety isolation, multi-layer web application hosting, elastic deployment and other use scenes, and strong supervision and data safety requirements of the financial industry are met.
Further, S2 includes:
acquiring application environment parameters of a local machine room;
and according to the application environment parameters, configuring the application environment which is the same as the application environment of the local machine room in the cloud area, and obtaining the cloud area after the application environment is configured.
In the implementation process, the same application environment is configured for the cloud area according to the application environment parameters, so that errors in the configuration process can be reduced, the configuration efficiency is improved, and the application environment of the cloud area can be effectively carried with services and applications.
The application environment parameters include: computing resource parameters such as Central Processing Unit (CPU), average load; storage resource parameters such as memory, disk; network resources, e.g., number of connections, etc.
In the embodiment of the application, a hybrid cloud deployment method is provided, and resources, data, applications, services and the like of a local machine room can be deployed to a cloud area, wherein the cloud area comprises a public cloud and a private cloud.
The VPC and other related cloud services are used for integrating the own data center of the enterprise with the cloud environment of the enterprise to form a mixed cloud architecture.
Further, S3 includes:
communicating a network channel between a cloud end area configured by the application environment and a local machine room;
establishing service in a public area of a cloud area after the application environment is configured;
and issuing the service of the public area to a sub-area of the cloud area configured by the application environment through an agent mechanism.
In the implementation process, the service is established in the public area of the cloud area and is issued in the cloud sub-area, so that the resource sharing of the cloud area can be ensured, and the service issuing efficiency of the cloud area is improved.
And in a public area of the cloud area, all users on the public cloud share a public network resource pool, and the users are not logically isolated. The intranet IPs of the users are uniformly distributed by the system, and the same intranet IP cannot be distributed to different users.
Further, S4 includes:
adding a first security gateway in a cloud area after service release;
adding a second security gateway in the local machine room;
and authenticating the cloud region after the service is issued through the first security gateway and the second security gateway to complete deployment.
In the implementation process, the first security gateway and the second security gateway are respectively added to the cloud area and the local machine room after the service is released, interaction between the cloud area and the local machine room can be achieved, the cloud area after the service is released is authenticated, and stability and safety of the cloud area after the service is released are guaranteed.
Existing security controls, such as authentication, authorization, and authentication management, need to work together in both public and private clouds. The security protocols are integrated, control is copied and security data synchronization is kept in a hybrid cloud, or identity authentication management services are used, and a single service is provided to run in the cloud. Sufficient time is allocated during the planning and time phases to solve these complex integration problems.
In this application embodiment, through getting through high in the clouds region and computer lab through the special line, get through machine purchase and standard dress delivery flow for high in the clouds purchase can be according to inside standard dress purchase of bank, machine standard dress and delivery. The cloud service method has the advantages that the basic environment is guaranteed to be the same, the cloud difficulty of the application is reduced, the issuing service agent is established in the public area of the cloud area by means of a communicated network channel, the application issuing to each area of the cloud is achieved through the agent, the first security gateway and the second security gateway are added in the cloud area and the local machine room respectively, the authentication mechanism called by the two parties is achieved, the application system is deployed to the cloud, and the application system can visit with the local machine room.
According to the embodiment of the application, the cloud mechanism in application is combed from the perspective of a business system and a business architect, and the financial industry can be helped to rapidly realize mixed cloud deployment.
Example two
In order to perform the method corresponding to the above embodiment to achieve the corresponding functions and technical effects, the following provides a hybrid cloud deployment apparatus, as shown in fig. 2, including:
the communication module 1 is used for communicating the cloud area with a local machine room;
the configuration module 2 is used for configuring the application environment of the cloud area according to the application environment of the local machine room to obtain the cloud area after the application environment is configured;
the issuing module 3 is used for issuing service in the cloud area configured by the application environment;
and the authentication module 4 is used for authenticating the cloud region after the service is issued to complete deployment.
In the implementation process, the application environment of the cloud area is configured according to the application environment of the local machine room, and the service is issued in the cloud area after the application environment is configured, so that the efficiency of cloud issuing and deployment can be improved without errors when the service is operated in the cloud area, the data uploading is not limited, and the hybrid cloud deployment can be realized.
Further, the configuration module 2 is further configured to:
acquiring application environment parameters of a local machine room;
and according to the application environment parameters, configuring the application environment which is the same as the application environment of the local machine room in the cloud area, and obtaining the cloud area after the application environment is configured.
In the implementation process, the same application environment is configured for the cloud area according to the application environment parameters, so that errors in the configuration process can be reduced, the configuration efficiency is improved, and the application environment of the cloud area can be effectively carried with services and applications.
Further, the publishing module 3 is further configured to:
communicating a network channel between the cloud area and the local machine room after the application environment configuration;
establishing service in a public area of a cloud area after the application environment is configured;
and issuing the service of the public area to a sub-area of the cloud area configured by the application environment through an agent mechanism.
In the implementation process, the service is established in the public area of the cloud area and is issued in the cloud sub-area, so that the resource sharing of the cloud area can be ensured, and the service issuing efficiency of the cloud area is improved.
Further, the authentication module 4 is further configured to:
adding a first security gateway in a cloud area after service release;
adding a second security gateway in the local machine room;
and authenticating the cloud region after the service is issued through the first security gateway and the second security gateway to complete deployment.
In the implementation process, the first security gateway and the second security gateway are respectively added to the cloud area and the local machine room after the service is released, interaction between the cloud area and the local machine room can be achieved, the cloud area after the service is released is authenticated, and stability and safety of the cloud area after the service is released are guaranteed.
The hybrid cloud deployment apparatus may implement the method of the first embodiment. The alternatives in the first embodiment are also applicable to the present embodiment, and are not described in detail here.
The rest of the embodiments of the present application may refer to the contents of the first embodiment, and in this embodiment, details are not repeated.
EXAMPLE III
An embodiment of the present application provides an electronic device, which includes a memory and a processor, where the memory is used to store a computer program, and the processor runs the computer program to enable the electronic device to execute the hybrid cloud deployment method according to the first embodiment.
Alternatively, the electronic device may be a server.
Referring to fig. 3, fig. 3 is a schematic structural composition diagram of an electronic device according to an embodiment of the present disclosure. The electronic device may include a processor 31, a communication interface 32, a memory 33, and at least one communication bus 34. Wherein the communication bus 34 is used for realizing direct connection communication of these components. The communication interface 32 of the device in the embodiment of the present application is used for performing signaling or data communication with other node devices. The processor 31 may be an integrated circuit chip having signal processing capabilities.
The Processor 31 may be a general-purpose Processor, including a Central Processing Unit (CPU), a Network Processor (NP), and the like; but may also be a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), an off-the-shelf programmable gate array (FPGA) or other programmable logic device, discrete gate or transistor logic, discrete hardware components. The various methods, steps, and logic blocks disclosed in the embodiments of the present application may be implemented or performed. A general purpose processor may be a microprocessor or the processor 31 may be any conventional processor or the like.
The Memory 33 may be, but is not limited to, a Random Access Memory (RAM), a Read Only Memory (ROM), a Programmable Read-Only Memory (PROM), an Erasable Read-Only Memory (EPROM), an electrically Erasable Read-Only Memory (EEPROM), and the like. The memory 33 has stored therein computer readable instructions which, when executed by said processor 31, the device is able to carry out the various steps involved in the method embodiment of fig. 1 described above.
Optionally, the electronic device may further include a memory controller, an input output unit. The memory 33, the memory controller, the processor 31, the peripheral interface, and the input/output unit are electrically connected to each other directly or indirectly to realize data transmission or interaction. For example, these components may be electrically connected to each other via one or more communication buses 34. The processor 31 is adapted to execute executable modules stored in the memory 33, such as software functional modules or computer programs comprised by the device.
The input and output unit is used for providing a task for a user to create and start an optional time period or preset execution time for the task creation so as to realize the interaction between the user and the server. The input/output unit may be, but is not limited to, a mouse, a keyboard, and the like.
It will be appreciated that the configuration shown in fig. 3 is merely illustrative and that the electronic device may include more or fewer components than shown in fig. 3 or have a different configuration than shown in fig. 3. The components shown in fig. 3 may be implemented in hardware, software, or a combination thereof.
In addition, an embodiment of the present application further provides a computer-readable storage medium, which stores a computer program, and when the computer program is executed by a processor, the hybrid cloud deployment method of the first embodiment is implemented.
Embodiments of the present application further provide a computer program product, which when running on a computer, causes the computer to execute the method described in the method embodiments.
In the embodiments provided in the present application, it should be understood that the disclosed apparatus and method can be implemented in other ways. The apparatus embodiments described above are merely illustrative, and for example, the flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of apparatus, methods and computer program products according to various embodiments of the present application. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s).
It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based devices that perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
In addition, functional modules in the embodiments of the present application may be integrated together to form an independent part, or each module may exist separately, or two or more modules may be integrated to form an independent part.
The functions, if implemented in the form of software functional modules and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present application or portions thereof that substantially contribute to the prior art may be embodied in the form of a software product stored in a storage medium and including instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present application. And the aforementioned storage medium includes: various media capable of storing program codes, such as a U disk, a removable hard disk, a ROM, a RAM, a magnetic disk, or an optical disk.
The above description is only an example of the present application and is not intended to limit the scope of the present application, and various modifications and changes may be made by those skilled in the art. Any modification, equivalent replacement, improvement and the like made within the spirit and principle of the present application shall be included in the protection scope of the present application.
It should be noted that: like reference numbers and letters refer to like items in the following figures, and thus, once an item is defined in one figure, it need not be further defined and explained in subsequent figures.
The above description is only for the specific embodiments of the present application, but the scope of the present application is not limited thereto, and any person skilled in the art can easily think of the changes or substitutions within the technical scope of the present application, and shall be covered by the scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.
It is noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.

Claims (10)

1. A hybrid cloud deployment method, the method comprising:
communicating the cloud area with a local machine room;
configuring the application environment of the cloud area according to the application environment of the local machine room to obtain the cloud area after the application environment is configured;
issuing service in the cloud area configured by the application environment;
and authenticating the cloud region after the service is issued, and finishing deployment.
2. The hybrid cloud deployment method of claim 1, wherein the step of configuring the application environment of the cloud area according to the application environment of the local machine room to obtain the cloud area after the application environment is configured includes:
acquiring application environment parameters of the local computer room;
and configuring an application environment which is the same as the application environment of the local machine room in the cloud area according to the application environment parameters to obtain the cloud area after the application environment is configured.
3. The hybrid cloud deployment method of claim 1, wherein the step of publishing services in the cloud area after the application environment is configured comprises:
communicating a network channel between the cloud area configured by the application environment and the local machine room;
establishing service in a public area of a cloud area configured by the application environment;
and issuing the service of the public area to a sub-area of the cloud area configured by the application environment through an agent mechanism.
4. The hybrid cloud deployment method of claim 1, wherein the step of authenticating the cloud area after the service is released to complete deployment comprises:
adding a first security gateway in a cloud area after service is released;
adding a second security gateway to the local computer room;
and authenticating the cloud end region after the service is issued through the first security gateway and the second security gateway to finish deployment.
5. A hybrid cloud deployment apparatus, the apparatus comprising:
the communication module is used for communicating the cloud area with the local machine room;
the configuration module is used for configuring the application environment of the cloud area according to the application environment of the local machine room to obtain the cloud area after the application environment is configured;
the issuing module is used for issuing service in the cloud area configured by the application environment;
and the authentication module is used for authenticating the cloud region after the service is issued to complete deployment.
6. The hybrid cloud deployment device of claim 5, wherein the configuration module is further configured to:
acquiring application environment parameters of the local machine room;
and configuring an application environment which is the same as the application environment of the local machine room in the cloud area according to the application environment parameters to obtain the cloud area after the application environment is configured.
7. The hybrid cloud deployment device of claim 5, wherein the publishing module is further configured to:
communicating a network channel between the cloud area configured by the application environment and the local machine room;
establishing service in a public area of a cloud area configured by the application environment;
and issuing the service of the public area to a sub-area of the cloud area configured by the application environment through an agent mechanism.
8. The hybrid cloud deployment device of claim 5, wherein the authentication module is further configured to:
adding a first security gateway in a cloud area after service is released;
adding a second security gateway in the local machine room;
and authenticating the cloud end region after service issuing through the first security gateway and the second security gateway to complete deployment.
9. An electronic device comprising a memory for storing a computer program and a processor that executes the computer program to cause the electronic device to perform the hybrid cloud deployment method of any of claims 1-4.
10. A computer-readable storage medium, characterized in that it stores a computer program which, when executed by a processor, implements the hybrid cloud deployment method of any one of claims 1 to 4.
CN202210750691.1A 2022-06-28 2022-06-28 Hybrid cloud deployment method and device, electronic equipment and storage medium Active CN115118595B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210750691.1A CN115118595B (en) 2022-06-28 2022-06-28 Hybrid cloud deployment method and device, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210750691.1A CN115118595B (en) 2022-06-28 2022-06-28 Hybrid cloud deployment method and device, electronic equipment and storage medium

Publications (2)

Publication Number Publication Date
CN115118595A true CN115118595A (en) 2022-09-27
CN115118595B CN115118595B (en) 2024-03-19

Family

ID=83330474

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210750691.1A Active CN115118595B (en) 2022-06-28 2022-06-28 Hybrid cloud deployment method and device, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN115118595B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116016158A (en) * 2022-12-02 2023-04-25 广州市玄武无线科技股份有限公司 Hybrid cloud aPaaS platform deployment method, device, equipment and computer storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130036213A1 (en) * 2011-08-02 2013-02-07 Masum Hasan Virtual private clouds
CN107124304A (en) * 2017-04-19 2017-09-01 千寻位置网络有限公司 Resources configuration management method and system, cloud terminal based on cloud resource
CN114070734A (en) * 2021-11-15 2022-02-18 厦门市易联众易惠科技有限公司 Cloud platform adaptation framework, method, equipment and storage medium
CN114500120A (en) * 2022-04-15 2022-05-13 阿里巴巴(中国)有限公司 Public cloud expansion method, device, system and storage medium

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130036213A1 (en) * 2011-08-02 2013-02-07 Masum Hasan Virtual private clouds
CN107124304A (en) * 2017-04-19 2017-09-01 千寻位置网络有限公司 Resources configuration management method and system, cloud terminal based on cloud resource
CN114070734A (en) * 2021-11-15 2022-02-18 厦门市易联众易惠科技有限公司 Cloud platform adaptation framework, method, equipment and storage medium
CN114500120A (en) * 2022-04-15 2022-05-13 阿里巴巴(中国)有限公司 Public cloud expansion method, device, system and storage medium

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116016158A (en) * 2022-12-02 2023-04-25 广州市玄武无线科技股份有限公司 Hybrid cloud aPaaS platform deployment method, device, equipment and computer storage medium
CN116016158B (en) * 2022-12-02 2023-09-26 广州市玄武无线科技股份有限公司 Hybrid cloud aPaaS platform deployment method, device, equipment and computer storage medium

Also Published As

Publication number Publication date
CN115118595B (en) 2024-03-19

Similar Documents

Publication Publication Date Title
US11175964B2 (en) Partner enablement services for managed service automation
US8843998B2 (en) Apparatus, systems and methods for secure and selective access to services in hybrid public-private infrastructures
CN106411857B (en) A kind of private clound GIS service access control method based on virtual isolation mech isolation test
US9294443B2 (en) Secure integration of hybrid clouds with enterprise networks
US9787659B2 (en) Techniques for secure access management in virtual environments
RU2595517C2 (en) Objects of virtual network interface
WO2018095416A1 (en) Information processing method, device and system
US8893258B2 (en) System and method for identity based authentication in a distributed virtual switch network environment
JP6355656B2 (en) Support method and system of multi-tenant function for corporate social business computing.
CN111030912B (en) Method for intercommunication between virtual private cloud VPCs
US20150067809A1 (en) User identity authentication and single sign on for multitenant environment
US20180062908A1 (en) Allocation of virtual interfaces to containers
US11012495B1 (en) Remote service credentials for establishing remote sessions with managed devices
CN109445912A (en) A kind of configuration method of virtual machine, configuration system and SDN controller
CN108462752B (en) Method and system for accessing shared network, VPC management equipment and readable storage medium
WO2017124965A1 (en) Network access method for multiple operating system terminal and multiple operating system terminal
WO2019059979A1 (en) Geographic location based computing asset provisioning in distributed computing systems
US11153304B2 (en) Universal group support for authentication systems
CN115118595B (en) Hybrid cloud deployment method and device, electronic equipment and storage medium
WO2022066414A1 (en) Compositional reasoning techniques for role reachability analyses in identity systems
CN104539684B (en) A kind of user's machine resources extracting integral method and system
US20120254441A1 (en) Automatic generation of reusable network configuration objects
US20140337531A1 (en) Method and apparatus to remotely control information technology infrastructure
US20150143458A1 (en) Techniques for identity and policy based routing
US20220413885A1 (en) Virtual Machine Provisioning and Directory Service Management

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant