CN115277427B - Method and equipment for registering proxy of containerized deployment - Google Patents

Method and equipment for registering proxy of containerized deployment Download PDF

Info

Publication number
CN115277427B
CN115277427B CN202210530813.6A CN202210530813A CN115277427B CN 115277427 B CN115277427 B CN 115277427B CN 202210530813 A CN202210530813 A CN 202210530813A CN 115277427 B CN115277427 B CN 115277427B
Authority
CN
China
Prior art keywords
proxy
registration
agent
information
current
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202210530813.6A
Other languages
Chinese (zh)
Other versions
CN115277427A (en
Inventor
梁俊明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Suninfo Technology Co ltd
Original Assignee
Shanghai Suninfo Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Suninfo Technology Co ltd filed Critical Shanghai Suninfo Technology Co ltd
Priority to CN202210530813.6A priority Critical patent/CN115277427B/en
Publication of CN115277427A publication Critical patent/CN115277427A/en
Application granted granted Critical
Publication of CN115277427B publication Critical patent/CN115277427B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0893Assignment of logical groups to network elements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0803Configuration setting
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0803Configuration setting
    • H04L41/0813Configuration setting characterised by the conditions triggering a change of settings

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The application aims to provide a method and equipment for registering a proxy of containerized deployment, which are used for transmitting a request of registration information of a current proxy to a data center by running a proxy program after a target machine is started; the data center judges the request based on the agent registration strategy read from the database, and updates the agent information according to the judging result; and the data center carries out registration of the current agent based on the updated agent information and feeds back the agent registration result to the current agent of the target machine. Therefore, the equipment hardware identification information of the agent can be updated in real time, and the problem of zombie agent in agent containerization deployment can be effectively solved.

Description

Method and equipment for registering proxy of containerized deployment
Technical Field
The present application relates to the field of computers, and in particular, to a method and apparatus for proxy registration for containerized deployment.
Background
With the development of computer network technology, databases and their corresponding security audit technologies have also evolved. The existing database audit product deployment modes comprise a parallel mode, a serial mode and a distributed deployment. The distributed deployment mode is realized by installing agents on the monitored target machines. The current common practice is to install the agents on the target machine, register the agents on the data center of the database audit product, and then perform centralized control on the agents in the data center, wherein the differentiation of the agents by the data center is mainly based on the SSID (device hardware identification information) value of each agent.
In an actual local area network environment, the SSID values of agents installed thereon are also different due to the difference of each device. In the containerized deployment mode, the agents are installed in a container environment, after the container is created, SSID values of the agents are uniquely determined, and in the practical environment, for example, in the migration process of database audit products to the clouded and containerized deployment mode in the traditional local area network deployment mode, the SSID values are generated by using target machine hardware information, and due to frequent reconstruction of the container, the SSID values of the agents are changed, so that a large number of zombie agents in a data center are finally caused to appear.
That is, due to service requirements, the containers are often destroyed and rebuilt, so that the SSID values of agents running on the same service container are different, and finally, a large number of bot agents appear in the data center.
Disclosure of Invention
The application aims to provide a method and equipment for registering a proxy for containerized deployment, which solve the problems that the SSID value of the proxy is changed due to frequent reconstruction of a container in the prior art, and a large number of zombie proxies exist in a data center.
According to one aspect of the present application, there is provided a method of proxy registration for a containerized deployment, the method comprising:
After the target machine is started, an agent program is operated, and a request of registration information of a current agent is sent to a data center;
the data center judges the request based on the agent registration strategy read from the database, and updates the agent information according to the judging result;
and the data center carries out registration of the current agent based on the updated agent information and feeds back the agent registration result to the current agent of the target machine.
Optionally, updating the proxy information according to the determination result includes:
and the data center updates the registered proxy information according to the registration priority level in the judging result.
Optionally, updating the registered proxy information according to the registration priority level in the judgment result includes:
when the registration priority level in the judgment result is the priority of the proxy name, updating registered proxy information according to the proxy name of the current proxy;
When the registration priority level in the judgment result is the priority of the proxy IP address, updating registered proxy information according to the IP address of the current proxy;
and when the registration priority level in the judgment result is the equipment hardware identification information of the proxy, updating the registered proxy information based on the equipment hardware identification information of the current proxy.
Optionally, the method comprises:
and when the data center does not read the configured proxy registration strategy from the database, proxy registration is performed based on the equipment hardware identification information of the current proxy.
Optionally, after the target machine is started, the agent program is operated, and a request for registration information of the current agent is sent to the data center, including:
After the target machine is started, an agent program is operated, and if the current agent is registered, a request of registration information of the current agent is sent to a data center to acquire configuration;
If the current agent is not registered, the agent program calculates equipment hardware identification information according to the hardware information of the target machine and sends a request of registration information of the current agent to a data center, wherein the request carries the equipment hardware identification information.
Optionally, updating the registered agent information based on the device hardware identification information of the current agent includes:
Inquiring all agents based on the equipment hardware identification information of the current agents, judging whether the current agents are allowed to be registered or not according to the authorization information and the inquired equipment hardware identification information of all agents, if so, executing registration operation, and if not, refusing the agents to register;
If there is duplicate hardware identification information, the registered agent information is updated and registration is completed.
Optionally, after feeding back the proxy registration result to the current proxy of the target machine, the method includes:
If the proxy registration result is failure, the current proxy returns error information, and if the proxy registration result is successful, the current proxy operates a proxy program after carrying out initialization information, wherein the initialization information comprises at least any one of the following items: and setting a data packet filtering rule according to the configuration information, monitoring the data packet according to the corresponding network card opening promiscuous mode, and establishing a data channel with the data center.
According to another aspect of the present application, there is also provided an apparatus for proxy registration of a containerized deployment, the apparatus comprising:
the target machine device is used for running the agent program after the target machine is started and sending a request of registration information of the current agent to the data center;
the data center device is used for judging the request based on the proxy registration strategy read from the database and updating proxy information according to the judging result;
and the data center device is used for registering the current agent based on the updated agent information and feeding back the agent registration result to the current agent of the target machine.
According to yet another aspect of the present application, there is also provided an apparatus for proxy registration of a containerized deployment, the apparatus comprising:
one or more processors; and
A memory storing computer readable instructions that, when executed, cause the processor to perform operations of the method as described above.
According to yet another aspect of the present application there is also provided a computer readable medium having stored thereon computer readable instructions executable by a processor to implement a method as described above.
Compared with the prior art, the method and the device have the advantages that the agent program is operated after the target machine is started, and a request of registration information of the current agent is sent to the data center; the data center judges the request based on the agent registration strategy read from the database, and updates the agent information according to the judging result; and the data center carries out registration of the current agent based on the updated agent information and feeds back the agent registration result to the current agent of the target machine. Therefore, the equipment hardware identification information of the agent can be updated in real time, and the problem of zombie agent in agent containerization deployment can be effectively solved.
Drawings
Other features, objects and advantages of the present application will become more apparent upon reading of the detailed description of non-limiting embodiments, made with reference to the accompanying drawings in which:
FIG. 1 illustrates a method flow diagram for proxy registration for a containerized deployment provided in accordance with an aspect of the present application;
FIG. 2 illustrates a flow diagram of proxy registration for a database audit product containerized deployment in accordance with an embodiment of the present application;
fig. 3 illustrates a schematic structural diagram of a device for proxy registration for a containerized deployment provided by yet another aspect of the present application.
The same or similar reference numbers in the drawings refer to the same or similar parts.
Detailed Description
The application is described in further detail below with reference to the accompanying drawings.
In one exemplary configuration of the application, the terminal, the device of the service network, and the trusted party each include one or more processors (e.g., central processing units (Central Processing Unit, CPUs)), input/output interfaces, network interfaces, and memory.
The Memory may include non-volatile Memory in a computer readable medium, random access Memory (Random Access Memory, RAM) and/or non-volatile Memory, such as Read Only Memory (ROM) or flash RAM. Memory is an example of computer-readable media.
Computer readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of storage media for a computer include, but are not limited to, phase-change Memory (Phase-CHANGE RAM, PRAM), static random access Memory (Static Random Access Memory, SRAM), dynamic random access Memory (Dynamic Random Access Memory, DRAM), other types of Random Access Memory (RAM), read Only Memory (ROM), electrically erasable programmable read Only Memory (ELECTRICALLY ERASABLE PROGRAMMABLE READ-Only Memory, EEPROM), flash Memory or other Memory technology, read Only optical disk read Only Memory (Compact Disc Read-Only Memory, CD-ROM), digital versatile disk (DIGITAL VERSATILE DISK, DVD) or other optical storage, magnetic cassettes, magnetic tape disk storage or other magnetic storage devices, or any other non-transmission medium which can be used to store information which can be accessed by the computing device. Computer readable media, as defined herein, does not include non-transitory computer readable media (transmission media), such as modulated data signals and carrier waves.
FIG. 1 illustrates a method flow diagram for proxy registration for a containerized deployment, provided in accordance with an aspect of the present application, the method comprising: step S11 to step S13, wherein, step S11, the target machine operates the agent program after starting, and sends the request of the registration information of the current agent to the data center; step S12, the data center judges the request based on the agent registration strategy read from the database, and updates the agent information according to the judging result; and step S13, the data center registers the current agent based on the updated agent information and feeds back the agent registration result to the current agent of the target machine. Therefore, the equipment hardware identification information of the agent can be updated in real time, and the problem of zombie agent in agent containerization deployment can be effectively solved.
Aiming at the database audit product in the virtualized and containerized deployment environment, the embodiment of the application provides a proxy registration mechanism suitable for a containerized deployment mode.
Specifically, in step S11, the target machine starts and then runs the agent program, and sends a request for registration information of the current agent to the data center; the target machine is a container to be deployed, the agent is registered on the target machine, the reconstruction, deployment and the like of the target machine are realized through the agent, after the target machine is started, the agent program starts to run, the agent communicates with the data center, and therefore a request of registration information of the current agent is sent to the data center, and the request is used for completing registration of the current agent.
Specifically, in step S12, the data center determines the request based on the proxy registration policy read from the database, and updates the proxy information according to the determination result; after receiving the registration request of the current agent, the data center judges whether registration can be allowed or not, reads the configured agent registration policy from the database when judging, loads the agent registration policy, and processes the registration request of the agent according to the agent registration policy, so that the traditional local area network deployment environment can be smoothly migrated to the containerized deployment environment, and stable upgrading is realized.
Specifically, in step S13, the data center performs registration of the current agent based on the updated agent information, and feeds back the agent registration result to the current agent of the target machine. Here, after the judgment processing is performed according to the proxy registration policy, proxy information including registered proxy names, states, device hardware identification information, and the like is specifically updated according to the result of the judgment. After updating, the proxy information of the current proxy which applies for registration is updated to the existing proxy information, so that whether the current proxy is allowed to register is judged according to the updated proxy information, for example, the registration information of the current proxy in the proxy information is available, the request is not registered any more, and the data center feeds back the registration result to the current proxy of the target machine, so that the proxy registration request is completed.
In an embodiment of the present application, in step S12, the data center updates the registered agent information according to the registration priority level in the determination result. Here, the proxy registration policy includes a set registration priority level, and when determining, it is determined which registration priority level to update proxy information according to, and update registered proxy information according to the registration priority level.
Specifically, when the registration priority level in the judgment result is the priority of the proxy name, updating registered proxy information according to the proxy name of the current proxy; when the registration priority level in the judgment result is the priority of the proxy IP address, updating registered proxy information according to the IP address of the current proxy; and when the registration priority level in the judgment result is the equipment hardware identification information of the proxy, updating the registered proxy information based on the equipment hardware identification information of the current proxy. Here, the proxy registration policy may include 3 options: proxy name priority, proxy IP address priority, device hardware identification information (SSID value) priority of the proxy. If the proxy name is prior, updating the registered proxy according to the name of the current proxy, specifically checking the proxy with the same name in the registered proxy, updating the record of the proxy with the same name if the proxy with the same name already exists, and adding a record if the proxy with the same name does not exist; if the proxy IP address is prior, updating the registered proxy according to the IP address of the current proxy, specifically checking the proxy with the same IP in the registered proxy, updating the record of the proxy with the same IP if the proxy is already present, and adding a record if the proxy is not present; if the proxy SSID value is preferential, the registered proxy information is updated according to the proxy SSID value, specifically, the proxy looking up the same SSID in the registered proxy, the record of the same SSID proxy is updated if the proxy already exists, and a record is newly added if the proxy does not exist.
In one embodiment of the application, the method comprises the following steps: and when the data center does not read the configured proxy registration strategy from the database, proxy registration is performed based on the equipment hardware identification information of the current proxy. After loading the proxy registration policy, if no record matched with the proxy registration policy is found in the registered proxy, the data center registers according to the new proxy, and the registration is performed preferentially according to the SSID value of the current proxy; when the proxy registration strategy is not configured, proxy registration is still carried out according to the strategy with the prior SSID value of the current proxy; and finally, returning the registered result to the proxy. So that it can be compatible with previous products.
In one embodiment of the present application, in step S11, after the target machine is started, an agent program is run, and if the current agent is registered, a request for registration information of the current agent is sent to the data center to obtain configuration; if the current agent is not registered, the agent program calculates equipment hardware identification information according to the hardware information of the target machine and sends a request of registration information of the current agent to a data center, wherein the request carries the equipment hardware identification information. After the target machine is started, the agent program starts to run, and if the agent is registered, the agent directly acquires configuration from the data center and communicates with the data center; if the proxy is not registered, the proxy program calculates the SSID value according to the hardware information of the target machine, and sends a proxy registration request to the configured data center, wherein the request carries the calculated SSID value. Wherein the configuration obtained from the data center includes: the local network ports start a monitoring mode, monitor IP, protocol, ports and the like, the hardware information of the target machine comprises CPU, a main board, network card information and the like, and SSID values convert the hardware information of the target machine through a hash function, such as ID values of the CPU, a main board serial number and a network card MAC address, so that a fixed-length character string is obtained.
In an embodiment of the application, inquiring all agents based on the equipment hardware identification information of the current agent, judging whether the current agent is allowed to be registered according to the authorization information and the inquired equipment hardware identification information of all agents, if so, executing registration operation, and if not, refusing the agent registration; if there is duplicate hardware identification information, the registered agent information is updated and registration is completed. After receiving the registration request of the agents, the data center inquires all the agents according to the SSID value, decides whether to allow the current agents to register according to the authorization information and the SSID value, if so, executes the registration operation, if so, updates the agent information and completes the registration, and if not, refuses the agent registration; and finally, the data center returns the registration result to the proxy. The authorization information comprises the number of databases which the data center allows to monitor and the number of agents which the data center allows to register; such as a data center, allows for monitoring 10 databases and registering 5 agents.
In some embodiments of the present application, after feeding back the proxy registration result to the current proxy of the target machine, if the proxy registration result is failure, the current proxy returns error information, and if successful, the current proxy performs initialization information and then runs a proxy program, where the initialization information includes at least any one of the following: and setting a data packet filtering rule according to the configuration information, monitoring the data packet according to the corresponding network card opening promiscuous mode, and establishing a data channel with the data center. Here, after receiving the registration result, the agent returns error information if the registration request fails; if the registration request is successful, initializing information, running an agent program after initialization and carrying out information communication with a data center; the initialization includes setting data packet filtering rules according to configuration information, monitoring corresponding to a network card opening promiscuous mode, establishing a data channel by a data center, and the like.
In an embodiment of the present application, when the deployment environment is a containerized environment, if the container is already created, the container starts up and then performs proxy registration, if the service requirement container is rebuilt and the new container and the old container are changed to change the virtual hardware information, so that the SSID information of the proxy is changed, the data center will register as a new proxy, so that the previous proxy becomes a zombie proxy; the proxy registration can be realized through the flow shown in fig. 2, the data center acquires the proxy registration policy from the database every time the data center receives the registration request of the proxy, and updates the registered proxy information according to the corresponding priority after the data center loads the proxy registration policy, thereby performing proxy registration according to the updated proxy information, and feeding back the registration result to the proxy. After the agent registration strategy is added, a user can modify the agent registration mechanism in real time only by modifying the strategy priority in the database, smoothly migrate from the traditional local area network deployment environment to the containerized deployment environment, be compatible with the prior product design, have small modification, facilitate deployment in implementation project implementation and realize stable upgrading.
Furthermore, embodiments of the present application provide a computer readable medium having stored thereon computer readable instructions executable by a processor to implement a method of proxy registration for a containerized deployment as described above.
Corresponding to the above-described method, the present application further provides a terminal, which includes modules or units capable of performing the steps of the method described in fig. 1 or fig. 2 or the respective embodiments, where the modules or units may be implemented by hardware, software or a combination of hardware and software, and the present application is not limited thereto. For example, in one embodiment of the present application, there is also provided an apparatus for proxy registration for a containerized deployment, the apparatus including:
one or more processors; and
A memory storing computer readable instructions that, when executed, cause the processor to perform operations of the method as described above.
For example, computer-readable instructions, when executed, cause the one or more processors to:
After the target machine is started, an agent program is operated, and a request of registration information of a current agent is sent to a data center;
the data center judges the request based on the agent registration strategy read from the database, and updates the agent information according to the judging result;
and the data center carries out registration of the current agent based on the updated agent information and feeds back the agent registration result to the current agent of the target machine.
Fig. 3 shows a schematic structural diagram of a device for proxy registration of a containerized deployment according to still another aspect of the present application, where the device includes: the target device 11 and the data center device 12, wherein the target device 11 is used for running an agent program after the target device is started, and sending a request of registration information of a current agent to the data center; the data center device 12 is used for judging the request based on the proxy registration strategy read from the database, and updating proxy information according to the judging result; the data center device 12 is configured to perform registration of the current agent based on the updated agent information, and feed back the agent registration result to the current agent of the target machine.
It should be noted that, the content executed by the target device 11 is the same as or corresponding to the content in the above step S11, and the content executed by the data center device 12 is the same as or corresponding to the content in the above steps S12 and S13, respectively, which are not described herein for brevity.
It will be apparent to those skilled in the art that various modifications and variations can be made to the present application without departing from the spirit or scope of the application. Thus, it is intended that the present application also include such modifications and alterations insofar as they come within the scope of the appended claims or the equivalents thereof.
It should be noted that the present application may be implemented in software and/or a combination of software and hardware, e.g., using Application Specific Integrated Circuits (ASIC), a general purpose computer or any other similar hardware device. In one embodiment, the software program of the present application may be executed by a processor to perform the steps or functions described above. Likewise, the software programs of the present application (including associated data structures) may be stored on a computer readable recording medium, such as RAM memory, magnetic or optical drive or diskette and the like. In addition, some steps or functions of the present application may be implemented in hardware, for example, as circuitry that cooperates with the processor to perform various steps or functions.
Furthermore, portions of the present application may be implemented as a computer program product, such as computer program instructions, which when executed by a computer, may invoke or provide methods and/or techniques in accordance with the present application by way of operation of the computer. Program instructions for invoking the inventive methods may be stored in fixed or removable recording media and/or transmitted via a data stream in a broadcast or other signal bearing medium and/or stored within a working memory of a computer device operating according to the program instructions. An embodiment according to the application comprises an apparatus comprising a memory for storing computer program instructions and a processor for executing the program instructions, wherein the computer program instructions, when executed by the processor, trigger the apparatus to operate a method and/or a solution according to the embodiments of the application as described above.
It will be evident to those skilled in the art that the application is not limited to the details of the foregoing illustrative embodiments, and that the present application may be embodied in other specific forms without departing from the spirit or essential characteristics thereof. The present embodiments are, therefore, to be considered in all respects as illustrative and not restrictive, the scope of the application being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein. Any reference sign in a claim should not be construed as limiting the claim concerned. Furthermore, it is evident that the word "comprising" does not exclude other elements or steps, and that the singular does not exclude a plurality. A plurality of units or means recited in the apparatus claims can also be implemented by means of one unit or means in software or hardware. The terms first, second, etc. are used to denote a name, but not any particular order.

Claims (8)

1. A method of proxy registration for a containerized deployment, the method comprising:
After the target machine is started, an agent program is operated, and a request of registration information of a current agent is sent to a data center;
The data center judges the request based on the proxy registration strategy read from the database, and updates registered proxy information according to the registration priority level in the judgment result;
the data center carries out registration of the current agent based on the updated agent information and feeds back the agent registration result to the current agent of the target machine;
wherein updating the registered proxy information according to the registration priority level in the judgment result comprises:
when the registration priority level in the judgment result is the priority of the proxy name, updating registered proxy information according to the proxy name of the current proxy;
When the registration priority level in the judgment result is the priority of the proxy IP address, updating registered proxy information according to the IP address of the current proxy;
and when the registration priority level in the judgment result is the equipment hardware identification information of the proxy, updating the registered proxy information based on the equipment hardware identification information of the current proxy.
2. The method according to claim 1, characterized in that the method comprises:
and when the data center does not read the configured proxy registration strategy from the database, proxy registration is performed based on the equipment hardware identification information of the current proxy.
3. The method of claim 1, wherein the target machine, after being started, runs the agent program, and wherein sending the request for registration information of the current agent to the data center comprises:
After the target machine is started, an agent program is operated, and if the current agent is registered, a request of registration information of the current agent is sent to a data center to acquire configuration;
If the current agent is not registered, the agent program calculates equipment hardware identification information according to the hardware information of the target machine and sends a request of registration information of the current agent to a data center, wherein the request carries the equipment hardware identification information.
4. The method of claim 1, wherein updating registered agent information based on device hardware identification information of a current agent comprises:
Inquiring all agents based on the equipment hardware identification information of the current agents, judging whether the current agents are allowed to be registered or not according to the authorization information and the inquired equipment hardware identification information of all agents, if so, executing registration operation, and if not, refusing the agents to register;
If there is duplicate hardware identification information, the registered agent information is updated and registration is completed.
5. The method of claim 1, wherein feeding back the proxy registration result to the current proxy of the target machine comprises:
If the proxy registration result is failure, the current proxy returns error information, and if the proxy registration result is successful, the current proxy operates a proxy program after carrying out initialization information, wherein the initialization information comprises at least any one of the following items: and setting a data packet filtering rule according to the configuration information, monitoring the data packet according to the corresponding network card opening promiscuous mode, and establishing a data channel with the data center.
6. An apparatus for proxy registration for containerized deployments, the apparatus comprising:
the target machine device is used for running the agent program after the target machine is started and sending a request of registration information of the current agent to the data center;
the data center device is used for judging the request based on the proxy registration strategy read from the database and updating registered proxy information according to the registration priority level in the judging result;
The data center device is used for registering the current agent based on the updated agent information and feeding back the agent registration result to the current agent of the target machine;
wherein the data center device is used for:
when the registration priority level in the judgment result is the priority of the proxy name, updating registered proxy information according to the proxy name of the current proxy;
When the registration priority level in the judgment result is the priority of the proxy IP address, updating registered proxy information according to the IP address of the current proxy;
and when the registration priority level in the judgment result is the equipment hardware identification information of the proxy, updating the registered proxy information based on the equipment hardware identification information of the current proxy.
7. An apparatus for proxy registration for containerized deployments, the apparatus comprising:
one or more processors; and
A memory storing computer readable instructions that, when executed, cause the processor to perform the operations of the method of any one of claims 1 to 5.
8. A computer readable medium having stored thereon computer readable instructions executable by a processor to implement the method of any of claims 1 to 5.
CN202210530813.6A 2022-05-16 2022-05-16 Method and equipment for registering proxy of containerized deployment Active CN115277427B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210530813.6A CN115277427B (en) 2022-05-16 2022-05-16 Method and equipment for registering proxy of containerized deployment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210530813.6A CN115277427B (en) 2022-05-16 2022-05-16 Method and equipment for registering proxy of containerized deployment

Publications (2)

Publication Number Publication Date
CN115277427A CN115277427A (en) 2022-11-01
CN115277427B true CN115277427B (en) 2024-04-26

Family

ID=83760365

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210530813.6A Active CN115277427B (en) 2022-05-16 2022-05-16 Method and equipment for registering proxy of containerized deployment

Country Status (1)

Country Link
CN (1) CN115277427B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP3376378A1 (en) * 2017-03-17 2018-09-19 Huawei Technologies Co., Ltd. Container license management method, and apparatus
CN109992354A (en) * 2019-04-09 2019-07-09 腾讯科技(深圳)有限公司 Container-treatment, device, principal server, system and storage medium
CN111309366A (en) * 2020-02-19 2020-06-19 北京字节跳动网络技术有限公司 Method, device, medium and electronic equipment for managing registration core
CN113975794A (en) * 2021-10-26 2022-01-28 网易(杭州)网络有限公司 Processing method and device for acquiring device information in cloud game and storage medium

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP3376378A1 (en) * 2017-03-17 2018-09-19 Huawei Technologies Co., Ltd. Container license management method, and apparatus
CN109992354A (en) * 2019-04-09 2019-07-09 腾讯科技(深圳)有限公司 Container-treatment, device, principal server, system and storage medium
CN111309366A (en) * 2020-02-19 2020-06-19 北京字节跳动网络技术有限公司 Method, device, medium and electronic equipment for managing registration core
CN113975794A (en) * 2021-10-26 2022-01-28 网易(杭州)网络有限公司 Processing method and device for acquiring device information in cloud game and storage medium

Also Published As

Publication number Publication date
CN115277427A (en) 2022-11-01

Similar Documents

Publication Publication Date Title
CN106797405B (en) Distributed load balancing system, health check method and service node
CN105373396B (en) Update of plug-in loading method and device in plug-platform
CN106301829B (en) A kind of method and apparatus of network service dilatation
US8949297B2 (en) Content switch management
CN107819802A (en) A kind of mirror image acquisition methods, node device and server in node cluster
WO2016029821A1 (en) Method and device for creating virtual network instance
CN107967140B (en) Software modification initiating method, metadata publishing method and device
US20090199175A1 (en) Dynamic Allocation of Virtual Application Server
CN114205342B (en) Service debugging routing method, electronic equipment and medium
CN109714239B (en) Management message issuing method, VNFM (virtual network management frequency) equipment and server
CN109104368B (en) Connection request method, device, server and computer readable storage medium
CN106462457A (en) Virtualized application cluster
CN111010342B (en) Distributed load balancing implementation method and device
CN112882792B (en) Information loading method, computer device and storage medium
US20170223115A1 (en) Shared resource management
CN112667601B (en) Block chain identification management method, terminal equipment and computer readable storage medium
CN113127023B (en) Service upgrading method, device and system
US20230021723A1 (en) Automated migration of monolithic applications to container platforms
CN115277427B (en) Method and equipment for registering proxy of containerized deployment
CN116225617A (en) Management migration method and device for container instance, electronic equipment and storage medium
US20220006817A1 (en) Information Verification Method, Apparatus, And Device
US20210382706A1 (en) Automated configuration of attestation nodes using a software depot
CN114390108A (en) Method and system for processing user service request
CN113691389A (en) Configuration method of load balancer, server and storage medium
CN117453257B (en) Upgrading method based on hierarchical management, terminal equipment and readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant