CN115113982B - A security resource pool security service matching method, device and storage medium - Google Patents
A security resource pool security service matching method, device and storage medium Download PDFInfo
- Publication number
- CN115113982B CN115113982B CN202210824160.2A CN202210824160A CN115113982B CN 115113982 B CN115113982 B CN 115113982B CN 202210824160 A CN202210824160 A CN 202210824160A CN 115113982 B CN115113982 B CN 115113982B
- Authority
- CN
- China
- Prior art keywords
- real
- container
- time
- ratio value
- value
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 29
- 230000015654 memory Effects 0.000 claims description 84
- 238000010606 normalization Methods 0.000 claims description 24
- 238000004364 calculation method Methods 0.000 claims description 12
- 238000004590 computer program Methods 0.000 claims description 12
- 230000007334 memory performance Effects 0.000 claims 2
- 230000008859 change Effects 0.000 abstract description 6
- 238000012163 sequencing technique Methods 0.000 abstract description 3
- 238000010586 diagram Methods 0.000 description 6
- 230000006870 function Effects 0.000 description 5
- 238000007726 management method Methods 0.000 description 5
- 238000005516 engineering process Methods 0.000 description 4
- 238000012550 audit Methods 0.000 description 2
- 241000700605 Viruses Species 0.000 description 1
- 238000010276 construction Methods 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000002265 prevention Effects 0.000 description 1
- 230000008569 process Effects 0.000 description 1
- 238000004659 sterilization and disinfection Methods 0.000 description 1
- 239000000126 substance Substances 0.000 description 1
- 238000012795 verification Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/455—Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
- G06F9/45533—Hypervisors; Virtual machine monitors
- G06F9/45558—Hypervisor-specific management and integration aspects
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/46—Multiprogramming arrangements
- G06F9/50—Allocation of resources, e.g. of the central processing unit [CPU]
- G06F9/5005—Allocation of resources, e.g. of the central processing unit [CPU] to service a request
- G06F9/5027—Allocation of resources, e.g. of the central processing unit [CPU] to service a request the resource being a machine, e.g. CPUs, Servers, Terminals
- G06F9/505—Allocation of resources, e.g. of the central processing unit [CPU] to service a request the resource being a machine, e.g. CPUs, Servers, Terminals considering the load
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/46—Multiprogramming arrangements
- G06F9/50—Allocation of resources, e.g. of the central processing unit [CPU]
- G06F9/5061—Partitioning or combining of resources
- G06F9/5077—Logical partitioning of resources; Management or configuration of virtualized resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/455—Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
- G06F9/45533—Hypervisors; Virtual machine monitors
- G06F9/45558—Hypervisor-specific management and integration aspects
- G06F2009/45587—Isolation or security of virtual machine instances
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2209/00—Indexing scheme relating to G06F9/00
- G06F2209/50—Indexing scheme relating to G06F9/50
- G06F2209/5011—Pool
Landscapes
- Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Debugging And Monitoring (AREA)
Abstract
The invention provides a secure resource pool secure service matching method, a secure resource pool secure service matching device and a storage medium, wherein the secure resource pool secure service matching method comprises the following steps: periodically counting real-time performance indexes of each container corresponding to the target security module in the security resource pool; obtaining a real-time capability value of each container according to the real-time performance index of each container; acquiring a target security service requirement of a target platform aiming at the target security module, and sequencing each container according to the real-time capability value according to the target security service requirement; and selecting the container with the largest real-time capability value from the sequenced containers to provide the target security service for the target platform. The method, the device and the storage medium can solve the problem that the existing matching scheme is poor in matching because the existing matching scheme is a scheme for polling all container resources generally and the conditions of high resource change speed and great difference of different requirements on consumption of safety resources in a cloud environment are not considered.
Description
Technical Field
The present invention relates to the field of network technologies, and in particular, to a method, an apparatus, and a storage medium for secure service matching in a secure resource pool.
Background
The traditional security means are not suitable for boundary protection of cloud environment, so that the virtualization technology is adopted to run the security product capability in the pooled virtual environment, but because the cloud environment changes frequently, how to ensure that the most suitable security resource is accessed when new security service requirements exist becomes a difficult point.
The existing matching scheme is usually a scheme for polling all container resources to ensure that the access quantity of all security resources is approximately the same, however, the scheme does not consider the situations that the resource change speed is high and the consumption of security resources by different requirements is quite different in cloud environment, the accessed security resources are easily destroyed and do not occupy the security resources, or the consumption of security resources by certain requirements is far greater than that of other requirements, so that the situation that the actual load of the security resources is quite changed, and the matching is poor is caused.
Disclosure of Invention
The technical problem to be solved by the invention is to provide a method, a device and a storage medium for matching security services of a security resource pool, aiming at the defects of the prior art, so as to at least solve the problem of poor matching caused by the fact that the conventional matching scheme is a scheme for polling all container resources generally, and the conditions of high resource change speed and great consumption difference of different requirements on the security resources under the cloud environment are not considered.
In a first aspect, the present invention provides a method for matching security services of a security resource pool, the method comprising:
periodically counting real-time performance indexes of each container corresponding to the target security module in the security resource pool;
obtaining a real-time capability value of each container according to the real-time performance index of each container;
acquiring a target security service requirement of a target platform aiming at the target security module, and sequencing each container according to the real-time capability value according to the target security service requirement;
And selecting the container with the largest real-time capability value from the sequenced containers to provide the target security service for the target platform.
Further, the real-time performance index includes: the method specifically comprises the steps of obtaining a real-time capacity value of each container according to the real-time performance index of each container, wherein the real-time capacity value comprises the following steps of:
calculating to obtain CPU proportion values, bandwidth proportion values and memory proportion values of all containers according to the CPU real-time index, the bandwidth real-time index and the memory real-time index of each container;
Respectively carrying out normalization processing on the CPU proportion value, the bandwidth proportion value and the memory proportion value;
calculating the load score of each container according to the CPU proportion value, the bandwidth proportion value and the memory proportion value after normalization processing;
Obtaining a residual load score list of each container under the target security module according to the load scores;
and calculating the real-time capability value of each container according to the residual load score of each container in the residual load score list.
Further, the calculating according to the CPU real-time index, the bandwidth real-time index and the memory real-time index of each container obtains the CPU proportion value, the bandwidth proportion value and the memory proportion value of all containers specifically includes:
Dividing the sum of CPU maximum performance indexes of all containers corresponding to the target security module by the sum of CPU real-time indexes of all containers corresponding to the target security module to obtain CPU proportion values of all containers;
dividing the sum of bandwidth maximum performance indexes of all containers corresponding to the target security module by the sum of bandwidth real-time indexes of all containers corresponding to the target security module to obtain bandwidth proportion values of all containers;
dividing the sum of the maximum performance indexes of the memories of all the containers corresponding to the target security module by the sum of the real-time indexes of the memories of all the containers corresponding to the target security module to obtain the memory proportion value of all the containers.
Further, the normalizing process is performed on the CPU ratio value, the bandwidth ratio value, and the memory ratio value, and specifically includes:
Dividing the CPU proportion value by the sum of all proportion values to obtain a normalized CPU proportion value;
Dividing the bandwidth proportion value by the sum of all proportion values to obtain a normalized bandwidth proportion value;
dividing the memory proportion value by the sum of all the proportion values to obtain a normalized memory proportion value.
Further, the calculating the load score of each container according to the CPU proportion value, the bandwidth proportion value and the memory proportion value after normalization processing specifically includes:
Calculating the load score for each container according to the following formula:
Sx=WC*XC+WB*XB+WM*XM
Wherein S x represents the load score of the xth container, W C represents the CPU ratio value after normalization, W B represents the bandwidth ratio value after normalization, W M represents the memory ratio value after normalization, X C represents the average CPU load of the xth container, X B represents the average bandwidth load of the xth container, and X M represents the average memory load of the xth container, wherein the value of W C、WB、WM ranges from 0% to 100%.
Further, the obtaining the residual load score list of each container under the target security module according to the load score specifically includes:
Subtracting the load score of each container from 1 to obtain a residual load score of each container;
And constructing the residual load score list according to the residual load score of each container.
Further, the calculating the real-time capability value of each container according to the residual load score of each container in the residual load score list specifically includes:
The real-time capability value for each container is calculated according to the following formula:
Where R (S x) represents the real-time capability value of the xth container, S x represents the load score of the xth container, 1-S x represent the residual load score of the xth container, Representing the sum of the remaining load scores for all containers.
In a second aspect, the present invention provides a security service matching apparatus for a security resource pool, including:
the index statistics module is used for periodically counting the real-time performance index of each container corresponding to the target security module in the security resource pool;
the capacity value acquisition module is connected with the index statistics module and is used for acquiring the real-time capacity value of each container according to the real-time performance index of each container;
the capacity value ordering module is connected with the capacity value obtaining module and is used for obtaining target safety service requirements of a target platform aiming at the target safety module, and ordering each container according to the real-time capacity values according to the target safety service requirements;
And the security service matching module is connected with the capability value ordering module and is used for selecting the container with the largest real-time capability value from the ordered containers to provide the target security service for the target platform.
In a third aspect, the present invention provides a secure resource pool secure service matching apparatus, comprising a memory and a processor, the memory storing a computer program, the processor being arranged to run the computer program to implement the secure resource pool secure service matching method of the first aspect.
In a fourth aspect, the present invention provides a computer readable storage medium, on which a computer program is stored, the computer program implementing the secure resource pool secure service matching method according to the first aspect, when executed by a processor.
According to the security resource pool security service matching method, the security resource pool security service matching device and the storage medium, provided by the invention, under the conditions that the resource change speed is high and the consumption difference of different requirements on security resources is very large in a cloud environment, firstly, the real-time performance index of each container corresponding to a target security module in the security resource pool is counted periodically, then the real-time capacity value of each container is obtained according to the real-time performance index of each container, when the target security service requirement of a target platform for the target security module is obtained, each container is ordered according to the real-time capacity value according to the target security service requirement, and the container with the largest real-time capacity value is selected from the ordered containers to provide the target security service for the target platform.
Drawings
FIG. 1 is a flow chart of a secure resource pool secure service matching method according to embodiment 1 of the present invention;
Fig. 2 is a schematic structural diagram of a secure resource pool secure service matching apparatus according to embodiment 2 of the present invention;
fig. 3 is a schematic structural diagram of a secure resource pool security service matching device according to embodiment 3 of the present invention.
Detailed Description
In order to make the technical scheme of the present invention better understood by those skilled in the art, the following detailed description of the embodiments of the present invention will be given with reference to the accompanying drawings.
It is to be understood that the specific embodiments and figures described herein are merely illustrative of the invention, and are not limiting of the invention.
It is to be understood that the various embodiments of the invention and the features of the embodiments may be combined with each other without conflict.
It is to be understood that only the portions relevant to the present invention are shown in the drawings for convenience of description, and the portions irrelevant to the present invention are not shown in the drawings.
It should be understood that each unit and module in the embodiments of the present invention may correspond to only one physical structure, may be formed by a plurality of physical structures, or may be integrated into one physical structure.
It will be appreciated that, without conflict, the functions and steps noted in the flowcharts and block diagrams of the present invention may occur out of the order noted in the figures.
It is to be understood that the flowcharts and block diagrams of the present invention illustrate the architecture, functionality, and operation of possible implementations of systems, apparatuses, devices, methods according to various embodiments of the present invention. Where each block in the flowchart or block diagrams may represent a unit, module, segment, code, or the like, which comprises executable instructions for implementing the specified functions. Moreover, each block or combination of blocks in the block diagrams and flowchart illustrations can be implemented by hardware-based systems that perform the specified functions, or by combinations of hardware and computer instructions.
It should be understood that the units and modules related in the embodiments of the present invention may be implemented by software, or may be implemented by hardware, for example, the units and modules may be located in a processor.
Example 1:
the embodiment provides a secure resource pool secure service matching method, as shown in fig. 1, which includes:
step S101: and periodically counting real-time performance indexes of each container corresponding to the target security module in the security resource pool.
In this embodiment, the secure resource pool is a resource set for providing a secure service in the cloud computing platform, in which secure resources are provided externally in a service form, and the functions of the original physical security device are implemented by using a container. A security module refers to a collection of containers that provide the same security function. Each security module corresponds to a security capability including, for example, firewall, virus detection, intrusion prevention, SSL/ipsec vpn, database audit, WEB protection, log audit, host disinfection, bastion host, baseline verification, etc. The target security module may be any one of all security modules in the secure resource pool.
Specifically, the management system may count the real-time performance indexes of all the containers in the secure resource pool according to a fixed period, and classify the containers according to the provided security capability, and may also count the real-time performance indexes of each container corresponding to a certain security module in the secure resource pool according to a fixed period, where the performance indexes are used to characterize the performance of the container providing the corresponding security capability, where the real-time performance indexes may include: CPU real-time index, bandwidth real-time index and memory real-time index.
Step S102: and obtaining the real-time capability value of each container according to the real-time performance index of each container.
Optionally, the obtaining the real-time capability value of each container according to the real-time performance index of each container specifically includes:
calculating to obtain CPU proportion values, bandwidth proportion values and memory proportion values of all containers according to the CPU real-time index, the bandwidth real-time index and the memory real-time index of each container;
Respectively carrying out normalization processing on the CPU proportion value, the bandwidth proportion value and the memory proportion value;
calculating the load score of each container according to the CPU proportion value, the bandwidth proportion value and the memory proportion value after normalization processing;
Obtaining a residual load score list of each container under the target security module according to the load scores;
and calculating the real-time capability value of each container according to the residual load score of each container in the residual load score list.
In this embodiment, since different performance indexes have different influences on the service performance, different proportions are set for three real-time performance indexes to calculate the load scores of different security modules. The higher the utilization of a certain performance is, the more scarce the resource is, so the average utilization of all three performances of all containers of the whole security module is calculated as the proportion value of the three performance indexes.
The calculating according to the CPU real-time index, the bandwidth real-time index and the memory real-time index of each container to obtain the CPU proportion value, the bandwidth proportion value and the memory proportion value of all containers specifically includes:
Dividing the sum of CPU maximum performance indexes of all containers corresponding to the target security module by the sum of CPU real-time indexes of all containers corresponding to the target security module to obtain CPU proportion values of all containers;
dividing the sum of bandwidth maximum performance indexes of all containers corresponding to the target security module by the sum of bandwidth real-time indexes of all containers corresponding to the target security module to obtain bandwidth proportion values of all containers;
dividing the sum of the maximum performance indexes of the memories of all the containers corresponding to the target security module by the sum of the real-time indexes of the memories of all the containers corresponding to the target security module to obtain the memory proportion value of all the containers.
In this embodiment, taking a CPU as an example, the calculation formula of the CPU proportion values of all containers of the target security module is as follows:
where w C denotes a ratio value of the CPU, Representing the sum of the CPU maximum performance metrics for all containers of the target security module,And the sum of CPU real-time indexes of all containers of the target security module is represented, n is the total number of all containers of the target security module, and the maximum performance index refers to the maximum supportable performance index of the corresponding container.
Optionally, the normalizing the CPU ratio value, the bandwidth ratio value, and the memory ratio value respectively specifically includes:
Dividing the CPU proportion value by the sum of all proportion values to obtain a normalized CPU proportion value;
Dividing the bandwidth proportion value by the sum of all proportion values to obtain a normalized bandwidth proportion value;
dividing the memory proportion value by the sum of all the proportion values to obtain a normalized memory proportion value.
In this embodiment, the sum of all the ratio values is the sum of the ratio value of the CPU, the ratio value of the bandwidth and the ratio value of the memory, and taking the CPU as an example, the formula for normalizing the ratio value of the CPU is as follows:
Where W C represents the CPU ratio after normalization, W C represents the ratio of the CPU, W B represents the ratio of the bandwidth, and W M represents the ratio of the memory.
Optionally, the calculating the load score of each container according to the CPU proportion value, the bandwidth proportion value and the memory proportion value after normalization processing specifically includes:
Calculating the load score for each container according to the following formula:
Sx=WC*XC+WB*XB+WM*XM
Wherein S x represents the load score of the xth container, W C represents the CPU ratio value after normalization, W B represents the bandwidth ratio value after normalization, W M represents the memory ratio value after normalization, X C represents the average CPU load of the xth container, X B represents the average bandwidth load of the xth container, and X M represents the average memory load of the xth container, wherein the value of W C、WB、WM ranges from 0% to 100%.
In this embodiment, after the normalized ratio value is obtained, the management system sequentially calculates the load scores of all the containers under the target security module, where the value range of x is 1 to n, and n is the total number of all the containers of the target security module.
Optionally, the obtaining the remaining load score list of each container under the target security module according to the load score specifically includes:
Subtracting the load score of each container from 1 to obtain a residual load score of each container;
And constructing the residual load score list according to the residual load score of each container.
In this embodiment, assuming that the target security module is the 1 st security module in the secure resource pool, and the number of containers is n, the constructed remaining load score list is as follows:
In the formula, Indicating the load score of the 1 st container under the 1 st security module,Indicating the remaining load score for the 1 st container under the 1 st security module.
Optionally, the calculating the real-time capability value of each container according to the residual load score of each container in the residual load score list specifically includes:
The real-time capability value for each container is calculated according to the following formula:
Where R (S x) represents the real-time capability value of the xth container, S x represents the load score of the xth container, 1-S x represent the residual load score of the xth container, Representing the sum of the remaining load scores for all containers.
In this embodiment, the real-time capability value of each container is calculated according to the remaining load score of each container, and taking the target security module as the 1 st security module in the security resource pool as an example, the real-time capability value of the 1 st container in the 1 st security module is:
Wherein, Representing the sum of the remaining load scores of all containers of security module 1,Indicating the remaining load score for the 1 st container in the 1 st security module.
Step S103: acquiring a target security service requirement of a target platform aiming at the target security module, and sequencing each container according to the real-time capability value according to the target security service requirement;
Step S104: and selecting the container with the largest real-time capability value from the sequenced containers to provide the target security service for the target platform.
In this embodiment, when the target platform needs to use a certain security capability of the security resource pool, a container corresponding to the security capability is applied to the management system to provide security service for the target platform. Specifically, when the target platform needs to use the security capability corresponding to the target security module in the security resource pool, a target security service requirement is sent to the management system, and the management system sorts all containers under the target security module according to the requirement and ranks all containers according to the real-time capability value.
According to the secure resource pool secure service matching method provided by the embodiment of the invention, in consideration of the situations that the resource change speed is high and the consumption difference of different requirements on secure resources is large in a cloud environment, firstly, the real-time performance index of each container corresponding to a target secure module in the secure resource pool is counted periodically, then the real-time capability value of each container is obtained according to the real-time performance index of each container, when the target secure service requirement of a target platform for the target secure module is obtained, each container is ordered according to the real-time capability value according to the target secure service requirement, and the container with the largest real-time capability value is selected from the ordered containers to provide the target secure service for the target platform.
Example 2:
As shown in fig. 2, the present embodiment provides a secure resource pool secure service matching apparatus, configured to execute the secure resource pool secure service matching method, including:
The index statistics module 11 is used for periodically counting the real-time performance index of each container corresponding to the target security module in the security resource pool;
The capacity value obtaining module 12 is connected with the index statistics module 11, and is used for obtaining the real-time capacity value of each container according to the real-time performance index of each container;
The capability value ordering module 13 is connected with the capability value obtaining module 12, and is used for obtaining a target security service requirement of a target platform aiming at the target security module, and ordering each container according to the real-time capability value according to the target security service requirement;
and the security service matching module 14 is connected with the capability value sorting module 13 and is used for selecting the container with the largest real-time capability value from the sorted containers to provide the target security service for the target platform.
Optionally, the real-time performance index includes: CPU real-time index, bandwidth real-time index and memory real-time index, the capability value obtaining module 12 specifically includes:
The ratio value obtaining unit is used for calculating the CPU ratio value, the bandwidth ratio value and the memory ratio value of all the containers according to the CPU real-time index, the bandwidth real-time index and the memory real-time index of each container;
The normalization processing unit is used for respectively carrying out normalization processing on the CPU proportion value, the bandwidth proportion value and the memory proportion value;
The load scoring unit is used for calculating the load score of each container according to the CPU proportion value, the bandwidth proportion value and the memory proportion value after normalization processing;
The score list unit is used for obtaining a residual load score list of each container under the target security module according to the load score;
And the capacity value calculating unit is used for calculating the real-time capacity value of each container according to the residual load score of each container in the residual load score list.
Optionally, the ratio value obtaining unit specifically includes:
The first calculation unit is used for dividing the sum of the CPU maximum performance indexes of all containers corresponding to the target security module by the sum of the CPU real-time indexes of all containers corresponding to the target security module to obtain the CPU proportion value of all containers;
The second calculation unit is used for dividing the sum of the bandwidth maximum performance indexes of all the containers corresponding to the target security module by the sum of the bandwidth real-time indexes of all the containers corresponding to the target security module to obtain bandwidth proportion values of all the containers;
and the third calculation unit is used for dividing the sum of the maximum performance indexes of the memories of all the containers corresponding to the target security module by the sum of the real-time indexes of the memories of all the containers corresponding to the target security module to obtain the memory proportion value of all the containers.
Optionally, the normalization processing unit specifically includes:
A fourth calculation unit, configured to divide the CPU proportion value by a sum of all the proportion values to obtain a normalized CPU proportion value;
A fifth calculation unit, configured to divide the bandwidth proportion value by a sum of all the proportion values to obtain a bandwidth proportion value after normalization processing;
And a sixth calculation unit, configured to divide the memory proportion value by the sum of all the proportion values to obtain a normalized memory proportion value.
Optionally, the load scoring unit is specifically configured to calculate the load score of each container according to the following formula:
Sx=WC*XC+WB*XB+WM*XM
Wherein S x represents the load score of the xth container, W C represents the CPU ratio value after normalization, W B represents the bandwidth ratio value after normalization, W M represents the memory ratio value after normalization, X C represents the average CPU load of the xth container, X B represents the average bandwidth load of the xth container, and X M represents the average memory load of the xth container, wherein the value of W C、WB、WM ranges from 0% to 100%.
Optionally, the score list unit specifically includes:
A seventh calculation unit, configured to subtract the load score of each container from 1 to obtain a remaining load score of each container;
And the construction unit is used for constructing the residual load score list according to the residual load score of each container.
Optionally, the capability value calculating unit is specifically configured to calculate the real-time capability value of each container according to the following formula:
Where R (S x) represents the real-time capability value of the xth container, S x represents the load score of the xth container, 1-S x represent the residual load score of the xth container, Representing the sum of the remaining load scores for all containers.
Example 3:
referring to fig. 3, the present embodiment provides a secure resource pool secure service matching apparatus, comprising a memory 21 and a processor 22, the memory 21 storing a computer program, the processor 22 being arranged to run the computer program to perform the secure resource pool secure service matching method of embodiment 1.
The memory 21 is connected to the processor 22, the memory 21 may be a flash memory, a read-only memory, or other memories, and the processor 22 may be a central processing unit or a single chip microcomputer.
Example 4:
The present embodiment provides a computer-readable storage medium having stored thereon a computer program which, when executed by a processor, implements the secure resource pool secure service matching method in embodiment 1 described above.
Computer-readable storage media include volatile or nonvolatile, removable or non-removable media implemented in any method or technology for storage of information such as computer-readable instructions, data structures, computer program modules or other data. Computer-readable storage media includes, but is not limited to, RAM (Random Access Memory ), ROM (Read-Only Memory), EEPROM (ELECTRICALLY ERASABLE PROGRAMMABLE READ ONLY MEMORY, charged erasable programmable Read-Only Memory), flash Memory or other Memory technology, CD-ROM (Compact Disc Read-Only Memory), digital Versatile Disks (DVD) or other optical disk storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to store the desired information and which can be accessed by a computer.
In the secure resource pool secure service matching apparatus and the storage medium provided in embodiments 2 to 4, considering the situations that the resource change speed is fast and the consumption of secure resources by different demands is very different in the cloud environment, firstly, the real-time performance index of each container corresponding to the target secure module in the secure resource pool is periodically counted, then the real-time performance index of each container is obtained according to the real-time performance index of each container, when the target secure service demand of the target platform for the target secure module is obtained, each container is ordered according to the real-time performance value according to the target secure service demand, and the container with the largest real-time performance value is selected from the ordered containers to provide the target secure service for the target platform.
It is to be understood that the above embodiments are merely illustrative of the application of the principles of the present invention, but not in limitation thereof. Various modifications and improvements may be made by those skilled in the art without departing from the spirit and substance of the invention, and are also considered to be within the scope of the invention.
Claims (8)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210824160.2A CN115113982B (en) | 2022-07-14 | 2022-07-14 | A security resource pool security service matching method, device and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210824160.2A CN115113982B (en) | 2022-07-14 | 2022-07-14 | A security resource pool security service matching method, device and storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN115113982A CN115113982A (en) | 2022-09-27 |
CN115113982B true CN115113982B (en) | 2024-11-22 |
Family
ID=83332643
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202210824160.2A Active CN115113982B (en) | 2022-07-14 | 2022-07-14 | A security resource pool security service matching method, device and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN115113982B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN116016213B (en) * | 2022-12-27 | 2024-11-15 | 绿盟科技集团股份有限公司 | Traffic arrangement method, device, system and equipment based on network target range |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109408230A (en) * | 2018-10-10 | 2019-03-01 | 中国科学院计算技术研究所 | Docker container dispositions method and system based on energy optimization |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114064226A (en) * | 2020-08-06 | 2022-02-18 | 中兴通讯股份有限公司 | Resource coordination method and device for container cluster and storage medium |
CN112559130B (en) * | 2020-12-16 | 2024-01-19 | 恒生电子股份有限公司 | Container distribution method, device, electronic equipment and storage medium |
CN114675937A (en) * | 2022-04-01 | 2022-06-28 | 北京广通优云科技股份有限公司 | Container resource expansion and contraction method based on real-time use condition of container application |
-
2022
- 2022-07-14 CN CN202210824160.2A patent/CN115113982B/en active Active
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109408230A (en) * | 2018-10-10 | 2019-03-01 | 中国科学院计算技术研究所 | Docker container dispositions method and system based on energy optimization |
Also Published As
Publication number | Publication date |
---|---|
CN115113982A (en) | 2022-09-27 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2022095351A1 (en) | Target area division method and apparatus, and electronic device and storage medium | |
CN111507470B (en) | A method and device for identifying abnormal accounts | |
CN112669138B (en) | Data processing method and related equipment | |
CN110764898B (en) | Task allocation method and device, readable storage medium and terminal equipment | |
CN109450956B (en) | Network security assessment method, system, medium and computer system | |
CN111582678B (en) | Event stream distribution method, event stream distribution device and electronic equipment | |
CN110610431A (en) | Intelligent claim settlement method and intelligent claim settlement system based on big data | |
CN111464583A (en) | Computing resource allocation method, device, server and storage medium | |
WO2016206557A1 (en) | Risk identification method and apparatus | |
CN110188990B (en) | Resource request and fund request splitting method, device and equipment | |
WO2019119635A1 (en) | Seed user development method, electronic device and computer-readable storage medium | |
CN113537806A (en) | Abnormal user identification method and device, electronic equipment and readable storage medium | |
CN115113982B (en) | A security resource pool security service matching method, device and storage medium | |
CN117785456A (en) | Resource scheduling method, device, storage medium and equipment | |
CN112631731A (en) | Data query method and device, electronic equipment and storage medium | |
CN115033456A (en) | Method and device for monitoring performance of front end of intranet, computer equipment and storage medium | |
CN112241820A (en) | Risk identification method and device for key nodes in fund flow and computing equipment | |
CN113269179B (en) | Data processing method, device, equipment and storage medium | |
CN113723522A (en) | Abnormal user identification method and device, electronic equipment and storage medium | |
CN112819305A (en) | Service index analysis method, device, equipment and storage medium | |
CN112949697A (en) | Method and device for confirming pipeline abnormity and computer readable storage medium | |
CN110991241A (en) | Abnormality recognition method, apparatus, and computer-readable medium | |
CN117708461A (en) | User release content processing method, device, computing equipment and storage medium | |
CN114862108B (en) | Site selection processing method and system for self-service equipment | |
CN110569475A (en) | Evaluation method, device, equipment and storage medium for netizen influence |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |