CN114258020B - Proprietary cloud deployment method, platform and electronic equipment - Google Patents

Proprietary cloud deployment method, platform and electronic equipment Download PDF

Info

Publication number
CN114258020B
CN114258020B CN202011020700.9A CN202011020700A CN114258020B CN 114258020 B CN114258020 B CN 114258020B CN 202011020700 A CN202011020700 A CN 202011020700A CN 114258020 B CN114258020 B CN 114258020B
Authority
CN
China
Prior art keywords
information
resource
proprietary cloud
creating
service version
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202011020700.9A
Other languages
Chinese (zh)
Other versions
CN114258020A (en
Inventor
江力
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Mobile Communications Group Co Ltd
China Mobile IoT Co Ltd
Original Assignee
China Mobile Communications Group Co Ltd
China Mobile IoT Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Mobile Communications Group Co Ltd, China Mobile IoT Co Ltd filed Critical China Mobile Communications Group Co Ltd
Priority to CN202011020700.9A priority Critical patent/CN114258020B/en
Publication of CN114258020A publication Critical patent/CN114258020A/en
Application granted granted Critical
Publication of CN114258020B publication Critical patent/CN114258020B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • GPHYSICS
    • G16INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
    • G16YINFORMATION AND COMMUNICATION TECHNOLOGY SPECIALLY ADAPTED FOR THE INTERNET OF THINGS [IoT]
    • G16Y10/00Economic sectors
    • G16Y10/75Information technology; Communication
    • GPHYSICS
    • G16INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
    • G16YINFORMATION AND COMMUNICATION TECHNOLOGY SPECIALLY ADAPTED FOR THE INTERNET OF THINGS [IoT]
    • G16Y40/00IoT characterised by the purpose of the information processing
    • G16Y40/50Safety; Security of things, users, data or systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W24/00Supervisory, monitoring or testing arrangements
    • H04W24/02Arrangements for optimising operational condition
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/24Accounting or billing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/02Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
    • H04W84/04Large scale networks; Deep hierarchical networks
    • H04W84/08Trunked mobile radio systems

Abstract

The application provides a proprietary cloud deployment method, a platform and electronic equipment, and relates to the technical field of cloud computing, wherein the method comprises the following steps: acquiring user order information, wherein the user order information comprises slicing network information and service version information; creating a slicing network corresponding to the slicing network information, and generating a slicing network identifier corresponding to the slicing network; and creating a proprietary cloud resource corresponding to the service version information, wherein an authentication identifier of the proprietary cloud resource is the slicing network identifier. The application can improve the security of data transmission and storage of the internet of things platform.

Description

Proprietary cloud deployment method, platform and electronic equipment
Technical Field
The present application relates to the field of cloud computing technologies, and in particular, to a proprietary cloud deployment method, a platform, and an electronic device.
Background
The internet of things refers to that various information sensing devices such as radio frequency identification, a global positioning system and an infrared sensor are utilized to connect objects with the internet according to a certain protocol, so that data exchange and communication between objects are realized. The enterprise carries out data transmission and storage through the internet of things and mainly stores data on an open internet of things platform through a public network channel, the data are transmitted and stored in the mode, the enterprise does not need to build the internet of things platform, a purchase, installation, operation or operation server or other equipment is not needed, and the risks of data leakage and data loss possibly exist in data transmission and storage. Therefore, the data transmission and storage of the current internet of things platform have higher security risks.
Disclosure of Invention
The embodiment of the application provides a proprietary cloud deployment method, a proprietary cloud deployment platform and electronic equipment, and aims to solve the problem that high security risks exist in data transmission and storage of an Internet of things platform.
In a first aspect, an embodiment of the present application provides a proprietary cloud deployment method, including:
acquiring user order information, wherein the user order information comprises slicing network information and service version information;
creating a slicing network corresponding to the slicing network information, and generating a slicing network identifier corresponding to the slicing network;
and creating a proprietary cloud resource corresponding to the service version information, wherein an authentication identifier of the proprietary cloud resource is the slicing network identifier.
In a second aspect, an embodiment of the present application provides a proprietary cloud deployment platform, including:
the acquisition module is used for acquiring user order information, wherein the user order information comprises slicing network information and service version information;
the first creating module is used for creating a slicing network corresponding to the slicing network information and generating a slicing network identifier corresponding to the slicing network;
and the second creating module is used for creating the proprietary cloud resources corresponding to the service version information, and the authentication identification of the proprietary cloud resources is the slicing network identification.
In a third aspect, an embodiment of the present application provides an electronic device, including: the system comprises a memory, a processor and a program or an instruction stored in the memory and capable of running on the processor, wherein the program or the instruction realizes the steps in the proprietary cloud deployment method provided by the embodiment of the application when being executed by the processor.
In a fourth aspect, an embodiment of the present application provides a readable storage medium, where a program or an instruction is stored on the readable storage medium, where the program or the instruction, when executed by a processor, implement the steps of the proprietary cloud deployment provided by the embodiment of the present application.
In the embodiment of the application, user order information is acquired, wherein the user order information comprises slicing network information and service version information; creating a slicing network corresponding to the slicing network information, and generating a slicing network identifier corresponding to the slicing network; and creating a proprietary cloud resource corresponding to the service version information, wherein an authentication identifier of the proprietary cloud resource is the slicing network identifier. According to the method, the slicing network is created to separate a plurality of virtual end-to-end networks, and the slicing network identification is generated to serve as an authentication identification of cloud resources to access the proprietary virtual cloud resources, so that logical isolation of data transmission and storage can be realized, and the security of data transmission and storage of the Internet of things platform is improved.
Drawings
Fig. 1 is a flowchart of a proprietary cloud deployment method provided in an embodiment of the present application;
fig. 2 is a schematic architecture diagram of a proprietary cloud deployment platform according to an embodiment of the present application;
fig. 3 is one of schematic structural diagrams of a proprietary cloud deployment platform according to an embodiment of the present application;
FIG. 4 is a second schematic structural diagram of a proprietary cloud deployment platform according to an embodiment of the present application;
FIG. 5 is a third schematic structural diagram of a proprietary cloud deployment platform according to an embodiment of the present application;
fig. 6 is a schematic structural diagram of an electronic device according to an embodiment of the present application.
Detailed Description
The following description of the embodiments of the present application will be made clearly and fully with reference to the accompanying drawings, in which it is evident that the embodiments described are some, but not all embodiments of the application. All other embodiments, which can be made by those skilled in the art based on the embodiments of the application without making any inventive effort, are intended to be within the scope of the application.
The terms first, second and the like in the description and in the claims, are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used may be interchanged where appropriate, such that embodiments of the application may be practiced otherwise than as specifically illustrated and described herein, and that the "first" and "second" distinguishing between objects generally being of the same type, and not necessarily limited to the number of objects, such as the first object may be one or more.
Referring to fig. 1, fig. 1 is a flowchart of a proprietary cloud deployment method provided by an embodiment of the present application, as shown in fig. 1, including the following steps:
step 101, obtaining user order information, wherein the user order information comprises slicing network information and service version information.
The proprietary cloud deployment method can be applied to a proprietary cloud deployment platform. The slicing network information is slicing network requirement information in the operator network package corresponding to the product package selected by the user, and a network creation interface can be called to create the slicing network according to the slicing network requirement information. The operator network package information corresponding to the product package selected by the user may further include service version information, and when the user selects the product package, the corresponding service version information is selected. In general, the service version information may include container resource information, project information, and application information corresponding to the user order.
In addition, in general, in the event that a user submits a product package and pays successfully, the proprietary cloud deployment platform may obtain relevant information for the user's order.
Step 102, creating a slicing network corresponding to the slicing network information, and generating a slicing network identifier corresponding to the slicing network.
The slice network adopts an on-demand networking mode, so that operators can separate a plurality of virtual end-to-end networks on a unified infrastructure, and meanwhile, each slice network can realize logic isolation in terms of equipment, an access network transmission network and a core network so as to adapt to various types of applications to meet different requirements of clients, and therefore, when errors or faults occur in one slice network, other slice networks are not affected. In a slice network, the method can be divided into a wireless network sub-slice, a bearing network sub-slice and a core network sub-slice. In addition, the slice network may also be combined with 5G communication techniques to create a 5G slice network. The 5G communication technology has the characteristics of large bandwidth, wide connection and low delay, and a 5G slice network created by combining the 5G communication technology and the network slice technology can be used for facing multiple connection and diversified scenes, is more flexible to deploy and can be used for classified management; the resources such as radio, bearer, core network and the like of the 5G slice network can be isolated from other slice networks, the slice networks are independent and unaffected, and under the same type of slice network sub-network, the resources can be divided again to form a sub-network with a lower layer. Therefore, the 5G slice network can be customized according to the requirements of different enterprises in different industries, and can adapt to the network connection characteristics of the requirements in different fields, thereby promoting the capacity promotion and transformation of each industry.
In addition, the slice network identifier may be an authentication identifier of a private cloud resource corresponding to the slice network creation, and the slice network identifier may be used as an identification code to confirm the user identity, so as to ensure the uniqueness of network access.
And step 103, creating a proprietary cloud resource corresponding to the service version information, wherein an authentication identifier of the proprietary cloud resource is the slicing network identifier.
The slice network identifiers can be used as identification codes of the slice network, and the special cloud resources are accessed according to the identification codes.
In the embodiment of the application, user order information is acquired, wherein the user order information comprises slicing network information and service version information; creating a slicing network corresponding to the slicing network information, and generating a slicing network identifier corresponding to the slicing network; and creating a proprietary cloud resource corresponding to the service version information, wherein an authentication identifier of the proprietary cloud resource is the slicing network identifier. According to the method, the slicing network is created to separate a plurality of virtual end-to-end networks, and the slicing network identification is generated to serve as an authentication identification of cloud resources to access the proprietary virtual cloud resources, so that logical isolation of data transmission and storage can be realized, and the security of data transmission and storage of the Internet of things platform is improved.
As an optional implementation manner, the creating a proprietary cloud resource corresponding to the service version information includes:
creating a container resource corresponding to the service version information, wherein the container resource is a storage resource of the proprietary cloud;
and in the case that the container resource is successfully created, creating the item and the application corresponding to the service version information.
Wherein the container can effectively partition resources managed by a single operating system into isolated groups to better balance conflicting resource usage requirements among the isolated groups. And uniformly dividing and packaging the computing resources of the system to obtain a plurality of resource units, wherein the resource units are the container resources. For example: CPU (central processing unit ) computing resources may be allocated to multiple containers, each container quota may not be uniform, and when CPU computing resources are allocated to two containers, and the two container quota is 50% CPU, both containers have container resources of 50% CPU size.
In addition, the service version information corresponding to the different user orders may include container resource information, project information, and application information corresponding to the user orders. In general, a user selects different product packages to generate different user orders, and container resources created according to service version information of the different user orders are different.
Therefore, different user orders can be generated according to different proprietary cloud product packages paid by users, and under the condition that the container resources are successfully created, the items and the applications corresponding to the user order service version information can be created. A proprietary cloud product package may contain multiple items and multiple applications, and in general, different proprietary cloud product packages correspond to different items and applications. For example, the proprietary cloud product packages may be divided into a standard version, a professional version and a main housing version, each of which has different prices and different functions, and service items provided by each of the proprietary cloud product packages may be different, and applications corresponding to each of the items may be different.
In this embodiment, the created container resources may be divided into relatively independent resource groups, which may balance conflicting resource usage requirements.
Optionally, the acquiring the user order information includes:
displaying at least one package information, wherein each package information in the at least one package information comprises a network slice instance and a cloud resource instance corresponding to each package information;
receiving an operation of selecting target package information among the at least one package information;
generating user order information based on the target package information;
and acquiring the generated user order information.
The network slice example is a temporary logic network, spans multiple technical domains, and may include resources corresponding to virtual network elements (terminals, access networks, backhaul networks, core networks, service networks) and network management systems. The cloud resource instance is a virtual computing environment, is an independent computing unit virtualized in the cloud resource, and can comprise a CPU, a memory, an operating system, a bandwidth, a disk and other basic computing components. In general, the proprietary cloud deployment platform may display relevant information of at least one product package for a user to select, and the relevant product package may include a corresponding network slice instance and cloud resource instance.
The user can select a target package according to the displayed at least one package information; the proprietary cloud deployment platform receives operation information of a target package selected by a user and identifies the target package selected by the user; the proprietary cloud deployment platform generates a corresponding user order based on the package selected by the user; in the case where the user submits an order and pays the order, the proprietary cloud deployment platform may display the user order as paid and obtain user order information.
In the embodiment, the order information of the user is acquired after the user pays the order, so that the situation that the user only submits the order to create the container resource without paying is avoided, and the waste of creating the container resource can be reduced.
Optionally, in the case of a successful creation result of the container resource, creating an item and an application corresponding to the service version information includes:
under the condition that the container resource is successfully created, cluster information corresponding to the service version information is added to a virtual machine template;
creating a virtual machine corresponding to the added virtual machine template;
starting the virtual machine to enable the virtual machine to execute a cluster deployment script to perform cluster deployment;
and creating items and applications corresponding to the service version information based on the deployed clusters.
The cluster information is mobile communication system information for group scheduling command communication, and the service version information corresponding to the user order can comprise the cluster information. Cluster deployment script refers to a cluster deployment executable written in accordance with a format using a particular descriptive language. When executing a cluster deployment script, a computer typically performs a series of operations that may involve other applications such as word processing, spreadsheets, and data management programs.
In addition, the virtual machine template is a master copy of the virtual machine, has standard software installation and configuration, and can provide optimal performance in the virtual environment. Virtual machines refer to complete hardware system functions simulated by software and run in a complete computer system in a completely isolated environment, and work that can be done in a physical computer is typically done in a virtual machine. When creating a virtual machine in a computer, a part of hard disk and memory capacity of the physical machine are required to be used as the hard disk and memory capacity of the virtual machine. In general, the workload of repeatedly installing a system can be reduced by creating a virtual machine using a virtual machine template. For example, one virtual machine may be created according to the needs of an actual scene, and one or more virtual machines may be needed after a period of time, and if one virtual machine is installed every time one virtual machine is needed, repeated system installation work may be generated, so that a virtual machine template may be used to create the needed virtual machine, and the workload of creating the virtual machine is reduced.
In this embodiment, the virtual machine template is used to create the virtual machine, so that the workload of creating the virtual machine can be reduced.
Optionally, after creating the proprietary cloud resource corresponding to the service version information, the method further includes:
acquiring state information of the proprietary cloud resources according to a preset time interval;
and when the state information of the proprietary cloud resource meets the preset alarm triggering condition, alarming.
The state information of the proprietary cloud resource is obtained according to a preset time interval, the preset time is determined according to the requirement of an actual application scene, and the method is not limited. The state information of the proprietary cloud resource may include parameters of CPU usage, memory usage, disk reading and disk writing. The proprietary cloud deployment platform can set a threshold value for the monitoring index by setting an alarm rule, and when the state information exceeds the threshold value, an alarm is triggered.
In the embodiment, the state information of the proprietary cloud resources is acquired according to the preset time, so that the health check can be performed on the proprietary cloud resources of the user and the safety of the data is improved.
In one embodiment, according to an actual service scenario, the above-mentioned proprietary cloud deployment method may be applied to a proprietary cloud deployment platform, where the platform may include an operation management system, a slice operation management platform, an IaaS (Infrastructure as a Service ) resource deployment system, a platform deployment system, and an operation and maintenance monitoring system; the operation management system can acquire the order information of the user; the slice operation management platform can create a slice network corresponding to the slice network information and generate a slice network identifier corresponding to the slice network; the IaaS resource deployment system platform deployment system IaaS resource deployment system can create container resources corresponding to the service version information; the platform deployment system can create items and applications corresponding to the service version information under the condition that the container resource is successfully created; the operation and maintenance monitoring system can carry out alarming when the state information of the proprietary cloud resource meets the preset alarming triggering condition.
Referring to fig. 2, fig. 2 is a schematic architecture diagram of a proprietary cloud deployment platform according to an embodiment of the present application, where, as shown in fig. 2, the proprietary cloud deployment platform may include: the system comprises an operation management system, a slice operation management platform, an IaaS resource deployment system, a platform deployment system and an operation and maintenance monitoring system, wherein:
in the operation management system, a user can select a product package according to the need, the user submits the selected product package and then generates a user order, and when the user finishes the payment of the selected product package, the operation management system can transfer the related information of the product package selected by the user to the platform deployment system through an API (Application Programming Interface, application program interface) callback; the operation management system can monitor the IaaS resources according to the package list of the product packages selected by the user under the condition that the platform deployment system completes application deployment. In addition, the operation management system comprises a background and a front end, the background of the operation management system can put on shelf related product packages, and the product packages comprise network slice examples and cloud resource examples. The front end of the operation management system can display at least one product package information, and a user selects a target package and generates a user order; and the front end of the operation management system can display the state that the user order is paid after the user order is successfully paid, and meanwhile, the operation management system transmits the network package information of the user order to the platform deployment system. Under the condition that the platform deployment system completes the application deployment task, the front end of the operation management system can check the purchased package list and detailed information of packages, and can monitor the IaaS resource use condition corresponding to the user order. IaaS refers to providing IT infrastructure as a service to the outside through a network, in which service model a user does not construct a data center by himself, but can use infrastructure services including servers, storages, networks, etc. by means of renting. IaaS may deliver computing resources in the form of virtualized operating systems, workload management software, hardware, networking, and storage services, and IaaS may also provide computing power and storage services on demand. Therefore, the IaaS resource is taken as an infrastructure service resource provided externally, and the user can rent the IaaS resource according to actual requirements.
The platform deployment system can call a network interface of the slicing operation management platform according to the network package information of the user order, and transmit the user order information to the slicing operation management platform.
In the slicing operation management platform, a slicing network corresponding to slicing network information of a user order can be created, an identification code of the slicing network is generated, and under the condition that the slicing network is successfully created, the slicing operation management platform transmits the identification code of the slicing network to the automatic deployment system of the internet of things platform, and a result of the successful creation of the slicing network can be fed back to the platform deployment system. The identification code of the slicing network, also called as the identification code of the slicing network parameter identification, is the authentication identification of the proprietary cloud resource, and the user identity can be confirmed according to the identification code.
Under the condition that the platform deployment system receives the product package information transmitted by the operation management system and the slice network information transmitted by the slice operation management system, the platform automatic deployment system can call the IaaS layer API interface, and the received service version information and the slice network identification code received from the slice operation management platform are transmitted to the IaaS resource deployment system.
In the IaaS resource deployment system, corresponding cloud resources can be registered according to user order information, environment initialization is performed, virtual machine resources of users are created in an internet of things cloud resource pool, k8s (Kubernetes, container automation operation and maintenance platform) clusters are started, public network IP (Internet Protocol Address ) is bound, a cluster monitoring interface is externally provided, and under the condition that the steps are completed, the IaaS resource deployment system can feed back a successful container resource deployment result to the platform deployment system. k8s clusters run various container-based applications by utilizing aggregate resources of computing, storage, and network resources. The public network IP is a wide area network IP, and refers to an unreserved address on the internet connected by a public network. The cluster monitoring interface is a cluster health monitoring interface, can monitor whether the cluster state is normal or not, and can give an alarm once abnormal state information is received. Thus, the IaaS resource deployment system may be configured to create a container resource corresponding to the service version information of the user order information, and in case the container resource creation is successful, transfer container resource deployment completion information to the platform deployment system. Meanwhile, the platform deployment system can give the identification code of the related slicing network parameter identifier to the IaaS resource deployment system as an authentication identifier, so that the uniqueness of a network channel of the IaaS resource used by a user is ensured.
The platform deployment system can receive a feedback result of successful resource deployment of the IaaS resource deployment system container, and starts deployment application.
In the platform deployment system, the platform deployment system can create a corresponding project according to service version information of a user order and perform resource configuration, then the platform deployment system can add cluster information corresponding to the service version information to a virtual machine template, and create a virtual machine corresponding to the virtual machine template through the virtual machine template and start the virtual machine so that the virtual machine can execute a cluster deployment script to perform cluster deployment. Under the condition that the cluster deployment is completed, the platform deployment system creates an application corresponding to the service version information in the cluster, and configures related resources, environment variables, ports and data volumes of the container. The related resources of the container can also be called as a network package of the container, and can comprise information such as IP address, network related parameters and the like of the container; environmental variables refer to parameters of the container operating environment, such as storage parameters; the port is the access port of the user; a data volume is a special directory that can be used by one or more containers. The platform deployment system may also perform advanced configuration of health checks and horizontal shrink upon completion of container configuration. In addition, the Platform deployment system can select an OneNET Platform deployment system, namely a Platform-as-a-Service (Platform-as-Service) Internet of things open Platform.
Under the condition that the platform deployment system completes application deployment, the platform deployment system can transmit feedback results of the completed application deployment to the operation and maintenance monitoring system and the operation and management system. Under the condition that the operation management system receives a feedback result of the completion of the application deployment of the platform deployment system, the purchased product package list and the detailed information of the product package can be checked at the front end of the operation management system, and the IaaS resource use condition corresponding to the user order can be monitored; when receiving the feedback result of application deployment, the operation and maintenance monitoring system can monitor the virtual machine resources.
In the operation and maintenance monitoring system, the operation and maintenance monitoring system can realize a cluster information overview function, an application management function and a monitoring alarm function. The cluster information overview may learn health status information of the cluster, e.g., an overview page into the cluster, may view the status of the application, the status of the components, and the resource monitoring list. In general, the resource monitoring list may provide a CPU monitoring chart and a memory monitoring chart, and the application state is a state diagram that may display state information of a currently running deployment, container group and copy set, and the green icon represents a normal state and the yellow icon represents an abnormal state. The monitoring and alarming function means that the operation and maintenance monitoring system obtains the state information of the proprietary cloud resource according to a preset time interval, and can carry out alarming when the state information of the proprietary cloud resource meets a preset alarming triggering condition. Therefore, the operation and maintenance monitoring system is mainly used for monitoring the virtual machine resources of all users of the proprietary cloud deployment platform.
In addition, the user can log in the special cloud deployment platform to order network slicing, and the unregistered user logs in the special cloud deployment platform after needing to be registered.
Referring to fig. 3, fig. 3 is a schematic structural diagram of a proprietary cloud deployment platform according to an embodiment of the present application, and as shown in fig. 3, a proprietary cloud deployment platform 300 includes:
the acquiring module 301 is configured to acquire user order information, where the user order information includes slicing network information and service version information.
The first creating module 302 is configured to create a slice network corresponding to the slice network information, and generate a slice network identifier corresponding to the slice network.
And the second creating module 303 is configured to create a proprietary cloud resource corresponding to the service version information, where an authentication identifier of the proprietary cloud resource is the slicing network identifier.
Optionally, as shown in fig. 4, the second creating module 303 includes:
a first creating unit 3031, configured to create a container resource corresponding to the service version information, where the container resource is a storage resource of the proprietary cloud;
a second creating unit 3032, configured to create an item and an application corresponding to the service version information if the container resource is successfully created.
Optionally, the acquiring module 301 is configured to:
displaying at least one package information, wherein each package information in the at least one package information comprises a network slice instance and a cloud resource instance corresponding to each package information;
receiving an operation of selecting target package information among the at least one package information;
generating user order information based on the target package information;
and acquiring the generated user order information.
Optionally, the second creating unit 3032 is specifically configured to:
under the condition that the container resource is successfully created, cluster information corresponding to the service version information is added to a virtual machine template;
creating a virtual machine corresponding to the added virtual machine template;
starting the virtual machine to enable the virtual machine to execute a cluster deployment script to perform cluster deployment;
and creating items and applications corresponding to the service version information based on the deployed clusters.
Optionally, as shown in fig. 5, the proprietary cloud deployment platform 300 further includes:
a second obtaining module 304, configured to obtain state information of the proprietary cloud resource according to a preset time interval;
and the alarm module 305 is used for automatically triggering a user to notify when the state information of the proprietary cloud resource meets the preset alarm triggering condition after the creation of the item and the application corresponding to the service version information is completed.
The proprietary cloud deployment platform provided by the embodiment of the present application can implement each process in the method embodiment of fig. 1, and in order to avoid repetition, a description thereof will not be repeated here.
Referring to fig. 6, fig. 6 is a block diagram of an electronic device according to an embodiment of the present application, as shown in fig. 6, the electronic device includes: memory 601, processor 602, and a program or instruction stored on the memory 601 and executable on the processor 602, which when executed by the processor 602, implements steps in the proprietary cloud deployment method.
The embodiment of the application also provides a readable storage medium, wherein a program or an instruction is stored on the readable storage medium, and when the program or the instruction is executed by a processor, each process of the embodiment of the proprietary cloud deployment method is realized, the same technical effect can be achieved, and the repetition is avoided, so that the description is omitted.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element. Furthermore, it should be noted that the scope of the methods and apparatus in the embodiments of the present application is not limited to performing the functions in the order shown or discussed, but may also include performing the functions in a substantially simultaneous manner or in an opposite order depending on the functions involved, e.g., the described methods may be performed in an order different from that described, and various steps may be added, omitted, or combined. Additionally, features described with reference to certain examples may be combined in other examples.
From the above description of the embodiments, it will be clear to those skilled in the art that the example method may be implemented by means of software plus a necessary general purpose hardware platform, but of course also by means of hardware, although in many cases the former is a preferred embodiment. Based on such understanding, the technical solution of the present application may be embodied essentially or in a part contributing to the prior art in the form of a software product stored in a storage medium (e.g. ROM/RAM, magnetic disk, optical disk) comprising instructions for causing a terminal (which may be a mobile phone, a computer, a server, an air conditioner, or a network device, etc.) to perform the method according to the embodiments of the present application.
The embodiments of the present application have been described above with reference to the accompanying drawings, but the present application is not limited to the specific embodiments described, which are only illustrative and not restrictive, and many forms can be made by those having ordinary skill in the art without departing from the spirit of the present application and the scope of the claims, which are also within the scope of the present application.

Claims (7)

1. A proprietary cloud deployment method, comprising:
acquiring user order information, wherein the user order information comprises slicing network information and service version information;
creating a slicing network corresponding to the slicing network information, and generating a slicing network identifier corresponding to the slicing network;
establishing a proprietary cloud resource corresponding to the service version information, wherein an authentication identifier of the proprietary cloud resource is the slicing network identifier;
the creating the proprietary cloud resource corresponding to the service version information includes:
creating a container resource corresponding to the service version information, wherein the container resource is a storage resource of the proprietary cloud;
under the condition that the container resource is successfully created, creating items and applications corresponding to the service version information;
wherein, when the container resource is successfully created, creating the item and the application corresponding to the service version information includes:
under the condition that the container resource is successfully created, cluster information corresponding to the service version information is added to a virtual machine template;
creating a virtual machine corresponding to the added virtual machine template;
starting the virtual machine to enable the virtual machine to execute a cluster deployment script to perform cluster deployment;
and creating items and applications corresponding to the service version information based on the deployed clusters.
2. The proprietary cloud deployment method of claim 1, wherein the obtaining user order information comprises:
displaying at least one package information, wherein each package information in the at least one package information comprises a network slice instance and a cloud resource instance corresponding to each package information;
receiving an operation of selecting target package information among the at least one package information;
generating user order information based on the target package information;
and acquiring the generated user order information.
3. The proprietary cloud deployment method of claim 1, wherein after the creation of the proprietary cloud resource corresponding to the service version information, the method further comprises:
acquiring state information of the proprietary cloud resources according to a preset time interval;
and when the state information of the proprietary cloud resource meets the preset alarm triggering condition, alarming.
4. A proprietary cloud deployment platform, comprising:
the acquisition module is used for acquiring user order information, wherein the user order information comprises slicing network information and service version information;
the first creating module is used for creating a slicing network corresponding to the slicing network information and generating a slicing network identifier corresponding to the slicing network;
the second creating module is used for creating a proprietary cloud resource corresponding to the service version information, and the authentication identifier of the proprietary cloud resource is the slicing network identifier;
wherein the second creation module includes:
a first creating unit, configured to create a container resource corresponding to the service version information, where the container resource is a storage resource of the proprietary cloud;
a second creation unit configured to create an item and an application corresponding to the service version information in case that the creation of the container resource is successful;
the second creation unit is specifically configured to:
under the condition that the container resource is successfully created, cluster information corresponding to the service version information is added to a virtual machine template;
creating a virtual machine corresponding to the added virtual machine template;
starting the virtual machine to enable the virtual machine to execute a cluster deployment script to perform cluster deployment;
and creating items and applications corresponding to the service version information based on the deployed clusters.
5. The proprietary cloud deployment platform of claim 4, wherein the acquisition module is to:
displaying at least one package information, wherein each package information in the at least one package information comprises a network slice instance and a cloud resource instance corresponding to each package information;
receiving an operation of selecting target package information among the at least one package information;
generating user order information based on the target package information;
and acquiring the generated user order information.
6. The proprietary cloud deployment platform of claim 4, further comprising:
the second acquisition module is used for acquiring the state information of the proprietary cloud resources according to a preset time interval;
and the alarm module is used for automatically triggering a user to inform when the state information of the proprietary cloud resource meets the preset alarm triggering condition after the project corresponding to the service version information and the application are established.
7. An electronic device, comprising: a memory, a processor and a program or instructions stored on the memory and executable on the processor, which when executed by the processor, implement the steps in the proprietary cloud deployment method of any one of claims 1 to 3.
CN202011020700.9A 2020-09-25 2020-09-25 Proprietary cloud deployment method, platform and electronic equipment Active CN114258020B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011020700.9A CN114258020B (en) 2020-09-25 2020-09-25 Proprietary cloud deployment method, platform and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011020700.9A CN114258020B (en) 2020-09-25 2020-09-25 Proprietary cloud deployment method, platform and electronic equipment

Publications (2)

Publication Number Publication Date
CN114258020A CN114258020A (en) 2022-03-29
CN114258020B true CN114258020B (en) 2023-12-12

Family

ID=80789083

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011020700.9A Active CN114258020B (en) 2020-09-25 2020-09-25 Proprietary cloud deployment method, platform and electronic equipment

Country Status (1)

Country Link
CN (1) CN114258020B (en)

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2012178055A1 (en) * 2011-06-23 2012-12-27 Interdigital Patent Holdings, Inc. Mobile network virtualization
CN108833197A (en) * 2018-04-10 2018-11-16 中国科学院信息工程研究所 A kind of active probe method based on cloud and test platform
CN108933686A (en) * 2017-05-25 2018-12-04 中兴通讯股份有限公司 A kind of network dicing method, computer equipment and storage medium
CN109547227A (en) * 2017-08-04 2019-03-29 中国电信股份有限公司 Network is sliced generation method and network slice systems
CN110324164A (en) * 2018-03-29 2019-10-11 华为技术有限公司 A kind of dispositions method and device of network slice
CN110347477A (en) * 2019-07-02 2019-10-18 北京邮电大学 Service adaptation dispositions method and device under a kind of cloud environment
CN110476402A (en) * 2017-05-22 2019-11-19 华为技术有限公司 The method, apparatus and communication system of network slice creation
CN110535679A (en) * 2019-07-09 2019-12-03 中移(杭州)信息技术有限公司 Management method, framework, network slice sales platform and the management system of slice
CN110621045A (en) * 2018-06-20 2019-12-27 华为技术有限公司 Method for service routing of Internet of things
CN111159859A (en) * 2019-12-16 2020-05-15 万般上品(常州)物联网***有限公司 Deployment method and system of cloud container cluster

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9621435B2 (en) * 2012-09-07 2017-04-11 Oracle International Corporation Declarative and extensible model for provisioning of cloud based services

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2012178055A1 (en) * 2011-06-23 2012-12-27 Interdigital Patent Holdings, Inc. Mobile network virtualization
CN110476402A (en) * 2017-05-22 2019-11-19 华为技术有限公司 The method, apparatus and communication system of network slice creation
CN108933686A (en) * 2017-05-25 2018-12-04 中兴通讯股份有限公司 A kind of network dicing method, computer equipment and storage medium
CN109547227A (en) * 2017-08-04 2019-03-29 中国电信股份有限公司 Network is sliced generation method and network slice systems
CN110324164A (en) * 2018-03-29 2019-10-11 华为技术有限公司 A kind of dispositions method and device of network slice
CN108833197A (en) * 2018-04-10 2018-11-16 中国科学院信息工程研究所 A kind of active probe method based on cloud and test platform
CN110621045A (en) * 2018-06-20 2019-12-27 华为技术有限公司 Method for service routing of Internet of things
CN110347477A (en) * 2019-07-02 2019-10-18 北京邮电大学 Service adaptation dispositions method and device under a kind of cloud environment
CN110535679A (en) * 2019-07-09 2019-12-03 中移(杭州)信息技术有限公司 Management method, framework, network slice sales platform and the management system of slice
CN111159859A (en) * 2019-12-16 2020-05-15 万般上品(常州)物联网***有限公司 Deployment method and system of cloud container cluster

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
5G网络切片解决方案和关键技术;方琰崴;陈亚权;李立平;周俊超;;邮电设计技术(第03期);全文 *
Huawei.S5A-170126 "pCR TR 28.801 Add use case and requirements for management support of network slice with proprietary 3rd party or operator provided functions".3GPP tsg_sa\WG5_TM.2017,(第TSGS5_111_Bis期),全文. *

Also Published As

Publication number Publication date
CN114258020A (en) 2022-03-29

Similar Documents

Publication Publication Date Title
CN110535831B (en) Kubernetes and network domain-based cluster security management method and device and storage medium
CN110752947B (en) K8s cluster deployment method and device, and deployment platform
CN107431651B (en) Life cycle management method and equipment for network service
US20170331862A1 (en) Method for accessing cloud service and access device
EP2989543B1 (en) Method and device for updating client
EP3057281B1 (en) M2m application remote registration method, device, system and storage medium
EP3244569A1 (en) Asset information management method and device
CN111880902A (en) Pod creation method, device, equipment and readable storage medium
CN110704167A (en) Method, device, equipment and storage medium for creating virtual machine
CN107111510B (en) Method and device for operating VNF packet
CN109120444B (en) Cloud resource management method, processor and storage medium
CN111708550A (en) Application deployment method and device, computer equipment and storage medium
CN103716400A (en) Method and system for achieving mobile working based on virtual machine
CN109286617B (en) Data processing method and related equipment
CN113312168A (en) Page access method and electronic equipment
CN108540408B (en) Openstack-based distributed virtual switch management method and system
CN112202879B (en) Middleware management method and device, electronic equipment and storage medium
CN114258020B (en) Proprietary cloud deployment method, platform and electronic equipment
CN114389868B (en) Cloud resource allocation method, system, device and storage medium
CN113904871B (en) Access method of network slice, PCF entity, terminal and communication system
CN115658221A (en) State detection method, service virtual machine, equipment and medium
CN110768811A (en) Method, device and system for updating YANG model file library
CN111294221B (en) Network isolation configuration method and device based on haproxy
CN114760199B (en) SDN-based network configuration information issuing method, system and storage medium
CN112217852A (en) Platform-as-a-service system and method based on workflow engine

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant