// eip
在 cn1 region 和 cw1 region 分别有 12 个 和 9个 eip;
cn1 region 12 个
- public bastion 1个
- 3个vpc 共计 4个 nat 对应 4个
- service nlb 涉及 2个,以及备份 2个,共 4个
- testkube nlb 涉及 2个
- 空闲1个 eip
cw1 region 9 个
- service nlb 涉及 3个,以及备份 3个,共 6个
- 1个vpc 共计3个nat 对应 3个
// endpoint
cn1 region 有 33 个,其中vpc a 有16个,vpc b 有10个,vpc c 有 7个 endpoint
cw1 region 有 15 个 endpoint
// security group
cn1 region 有 29 个,其中vpc a 有17个(2个用于redis,1个用于private bastion,2个用于eks cluster,1个用于 eks node,1个用于nlb,2个用于public bastion,1个public alb,1个private alb,endpoint 1个,rds 1个,lambda 1个,default 1个,2个闲置),
vpc b 有6个 (2个用于 eks cluster,1个用于eks node,1个用于endpoint,1个用于nlb,还有1个default),
vpc c 有 6个 (2个用于 eks cluster,1个用于eks node,1个用于endpoint,1个用于nlb,还有1个default)
cw1 region 有 16个,全部属于 vpc d。
有16个(2个用于redis,2个用于eks cluster,1个用于 eks node,1个用于nlb,1个public alb,1个private alb,1个用于endpoint ,用于 rds 1个,用于 lambda 1个,default 1个,4个闲置)
// tgw 每个region 各有 1tgw,流量关系:dx-》vif-》dx gateway-》每个region 的 tgw
// service 流量关系 sdk request -> nlb ->alb -> eks
// testkube 用于执行测试 service eks 的服务
// argocd 用于执行 部署 service eks 的服务
// EC2
cn1 region 有 11 台 ec2,1台 public bastion,1台private bastion,5 台 service eks cluster,2台 testkube eks cluster,2台 argocd eks cluster
cw1 region 有5台 ec2,均属于 service eks cluster
// EBS
cn1 region 有13个 全部 in-use
cw1 region 有 5个
// snapshot 若干
// key pair 3个
// interface 122 cn1, 85 cw1
// LB cn1 6个(3个用于service(1个nlb,2个alb),1个nlb用于 testkube,1个alb用于argocd,1个闲置) cw1 有3个用于service(1个nlb,2个alb)
// targetgroup cn1 region 有14个(12个service,2个argocd), cn1 region 有9个 (全部为service)
// 22 个 s3 bucket,其中 cn1 18个,cw1 4个
// rds
1个regional cluster,2个实例,在cw1 创建 cross region replica 同样2个节点
// redis
2个 redis cluster,每个cluster 2个实例
// lambda 8个cn1, 5个 cw1
// R53 托管一个域名用于 service 和 argocd 和 testkube
// acm 1个域名证书,用于service alb cn1 和 cw1
// waf 每个 region 各1个,关联对应的service alb
// kms 中 cn1 248个 cmk,cw1 240 个 cmk
// sm 每个 region 各4个
// cloudwatch 每个region 有 对于 ec2 ,eks ,elasticache,rds, elb 等基础监控(cpu、内存、硬盘),还有扩展监控像是
在 cn1 region 和 cw1 region 分别有 12 个 和 9个 eip;
cn1 region 12 个
- public bastion 1个
- 3个vpc 共计 4个 nat 对应 4个
- service nlb 涉及 2个,以及备份 2个,共 4个
- testkube nlb 涉及 2个
- 空闲1个 eip
cw1 region 9 个
- service nlb 涉及 3个,以及备份 3个,共 6个
- 1个vpc 共计3个nat 对应 3个
// endpoint
cn1 region 有 33 个,其中vpc a 有16个,vpc b 有10个,vpc c 有 7个 endpoint
cw1 region 有 15 个 endpoint
// security group
cn1 region 有 29 个,其中vpc a 有17个(2个用于redis,1个用于private bastion,2个用于eks cluster,1个用于 eks node,1个用于nlb,2个用于public bastion,1个public alb,1个private alb,endpoint 1个,rds 1个,lambda 1个,default 1个,2个闲置),
vpc b 有6个 (2个用于 eks cluster,1个用于eks node,1个用于endpoint,1个用于nlb,还有1个default),
vpc c 有 6个 (2个用于 eks cluster,1个用于eks node,1个用于endpoint,1个用于nlb,还有1个default)
cw1 region 有 16个,全部属于 vpc d。
有16个(2个用于redis,2个用于eks cluster,1个用于 eks node,1个用于nlb,1个public alb,1个private alb,1个用于endpoint ,用于 rds 1个,用于 lambda 1个,default 1个,4个闲置)
// tgw 每个region 各有 1tgw,流量关系:dx-》vif-》dx gateway-》每个region 的 tgw
// service 流量关系 sdk request -> nlb ->alb -> eks
// testkube 用于执行测试 service eks 的服务
// argocd 用于执行 部署 service eks 的服务
// EC2
cn1 region 有 11 台 ec2,1台 public bastion,1台private bastion,5 台 service eks cluster,2台 testkube eks cluster,2台 argocd eks cluster
cw1 region 有5台 ec2,均属于 service eks cluster
// EBS
cn1 region 有13个 全部 in-use
cw1 region 有 5个
// snapshot 若干
// key pair 3个
// interface 122 cn1, 85 cw1
// LB cn1 6个(3个用于service(1个nlb,2个alb),1个nlb用于 testkube,1个alb用于argocd,1个闲置) cw1 有3个用于service(1个nlb,2个alb)
// targetgroup cn1 region 有14个(12个service,2个argocd), cn1 region 有9个 (全部为service)
// 22 个 s3 bucket,其中 cn1 18个,cw1 4个
// rds
1个regional cluster,2个实例,在cw1 创建 cross region replica 同样2个节点
// redis
2个 redis cluster,每个cluster 2个实例
// lambda 8个cn1, 5个 cw1
// R53 托管一个域名用于 service 和 argocd 和 testkube
// acm 1个域名证书,用于service alb cn1 和 cw1
// waf 每个 region 各1个,关联对应的service alb
// kms 中 cn1 248个 cmk,cw1 240 个 cmk
// sm 每个 region 各4个
// cloudwatch 每个region 有 对于 ec2 ,eks ,elasticache,rds, elb 等基础监控(cpu、内存、硬盘),还有扩展监控像是
// vpc a subnet
vpc-a 在 1a 和 1b 两个az,其中 1a 有8个subnet,
分别为
pub-1(10.120.12.0/24),
pri-1(10.120.1.0/24),
pri-2(10.120.4.0/24),
pri-3(10.120.15.0/24),
pri-4(10.120.31.0/24),
pri-5(10.120.163.0/24),
pri-6(10.120.193.0/24)。
pri-5 和 pri-6 属于 DB subnet 没有NAT,pri-5为 elastcache 使用,pri-6为rds使用;
pri-1 为 bastion 使用,pri-2 为 service eks 使用,pri-3 为 lambda 使用,private-4 为 proxy 使用,这些subnet 都有 NAT;
其中 1b 有8个subnet,
分别为
pub-1(10.120.12.0/24),
pri-1(10.120.1.0/24),
pri-2(10.120.4.0/24),
pri-3(10.120.15.0/24),
pri-4(10.120.31.0/24),
pri-5(10.120.163.0/24),
pri-6(10.120.193.0/24)。
pri-5 和 pri-6 属于 DB subnet 没有NAT,pri-5为 elastcache 使用,pri-6为rds使用;
pri-1 为 bastion 使用,pri-2 为 service eks 使用,pri-3 为 lambda 使用,private-4 为 proxy 使用,这些subnet 都有 NAT;
这个 vpc 有7张 route table,2个nat gateway 每个az 一个,每个 nat 关联除 public subnet 和 db private subnet外的所有子网;
有1个 IGW,关联public subnet,还有2个gateway类型 endpoint(s3 + ddb)关联除 public subnet 和 db private subnet外的所有子网;
关于 route table,其中 private 子网除 DB 子网外都有 0.0.0.0 和 gateway endpoint 2个 pl,与 vpc d 存在 peering 路由
flow logs 配置在s3 bucket, bucket 名称为 accountid-vpc-flow-logs,路径为 vpc name
// vpc b subnet
vpc-b 在 1a 和 1b 两个az,其中 1a 有2个subnet,
分别为
pub-1(10.200.12.0/24),
pri-1(10.200.1.0/24),
其中 pri-1 子网用于 部署 argocd 所在 eks 集群的 ec2 节点。pri-1 有 NAT, pub-1 有IGW,pri-1还有1个 s3 gateway endpoint。
其中 1b 有2个subnet,
分别为
pub-2(10.200.13.0/24),
pri-2(10.200.2.0/24),
其中 pri-3 子网用于 部署 argocd 所在 eks 集群的 ec2 节点。pri-3 有 NAT, pub-2 有IGW,pri-1还有1个 s3 gateway endpoint。
共计3张 route table ,其中 private 子网 有 0.0.0.0 和 gateway endpoint 1个 pl。
flow logs 配置在s3 bucket, bucket 名称为 accountid-vpc-flow-logs,路径为 vpc name
// vpc c subnet
vpc-c 在 1a 和 1b 两个az,其中 1a 有2个subnet,
分别为
pub-1(10.201.12.0/24),
pri-1(10.201.1.0/24),
其中 pri-1 子网用于 部署 testkube 所在 eks 集群的 ec2 节点。pri-1 有 NAT, pub-1 有IGW,pri-1还有1个 s3 gateway endpoint。
其中 1b 有2个subnet,
分别为
pub-2(10.201.13.0/24),
pri-2(10.201.2.0/24),
其中 pri-3 子网用于 部署 testkube 所在 eks 集群的 ec2 节点。pri-3 有 NAT, pub-2 有IGW,pri-1还有1个 s3 gateway endpoint。
共计3张 route table ,其中 private 子网 有 0.0.0.0 和 gateway endpoint 1个 pl。
flow logs 配置在s3 bucket, bucket 名称为 accountid-vpc-flow-logs,路径为 vpc name
// vpc d subnet 在 cw1 region
vpc-d 在 1a 和 1b 和 1c 三个az,其中 1a 有2个subnet,
分别为
pub-1(10.121.12.0/24),
pri-1(10.121.1.0/24),
pri-2(10.121.4.0/24),
pri-3(10.121.15.0/24),
pri-4(10.121.31.0/24),
pri-5(10.121.163.0/24),
pri-6(10.121.193.0/24)。
pri-5 和 pri-6 属于 DB subnet 没有NAT,pri-5为 elastcache 使用,pri-6为rds使用;
pri-1 为 bastion 使用,pri-2 为 service eks 使用,pri-3 为 lambda 使用,private-4 为 proxy 使用,这些subnet 都有 NAT;
其中 1b 有8个subnet,
分别为
pub-1(10.121.13.0/24),
pri-1(10.121.2.0/24),
pri-2(10.121.5.0/24),
pri-3(10.121.16.0/24),
pri-4(10.121.32.0/24),
pri-5(10.121.164.0/24),
pri-6(10.121.194.0/24)。
pri-5 和 pri-6 属于 DB subnet 没有NAT,pri-5为 elastcache 使用,pri-6为rds使用;
pri-1 为 bastion 使用,pri-2 为 service eks 使用,pri-3 为 lambda 使用,private-4 为 proxy 使用,这些subnet 都有 NAT;
其中 1b 有8个subnet,
分别为
pub-1(10.121.14.0/24),
pri-1(10.121.3.0/24),
pri-2(10.121.6.0/24),
pri-3(10.121.17.0/24),
pri-4(10.121.33.0/24),
pri-5(10.121.165.0/24),
pri-6(10.121.195.0/24)。
pri-5 和 pri-6 属于 DB subnet 没有NAT,pri-5为 elastcache 使用,pri-6为rds使用;
pri-1 为 bastion 使用,pri-2 为 service eks 使用,pri-3 为 lambda 使用,private-4 为 proxy 使用,这些subnet 都有 NAT;
这个 vpc 有9张 route table,2个nat gateway 每个az 一个,每个 nat 关联除 public subnet 和 db private subnet外的所有子网;
有1个 IGW,关联public subnet,还有2个gateway类型 endpoint(s3 + ddb)关联除 public subnet 和 db private subnet外的所有子网;
关于 route table,其中 private 子网除 DB 子网外都有 0.0.0.0 和 gateway endpoint 2个 pl,与 vpc a 存在 peering 路由
flow logs 配置在s3 bucket, bucket 名称为 accountid-vpc-flow-logs,路径为 vpc name
vpc-a 在 1a 和 1b 两个az,其中 1a 有8个subnet,
分别为
pub-1(10.120.12.0/24),
pri-1(10.120.1.0/24),
pri-2(10.120.4.0/24),
pri-3(10.120.15.0/24),
pri-4(10.120.31.0/24),
pri-5(10.120.163.0/24),
pri-6(10.120.193.0/24)。
pri-5 和 pri-6 属于 DB subnet 没有NAT,pri-5为 elastcache 使用,pri-6为rds使用;
pri-1 为 bastion 使用,pri-2 为 service eks 使用,pri-3 为 lambda 使用,private-4 为 proxy 使用,这些subnet 都有 NAT;
其中 1b 有8个subnet,
分别为
pub-1(10.120.12.0/24),
pri-1(10.120.1.0/24),
pri-2(10.120.4.0/24),
pri-3(10.120.15.0/24),
pri-4(10.120.31.0/24),
pri-5(10.120.163.0/24),
pri-6(10.120.193.0/24)。
pri-5 和 pri-6 属于 DB subnet 没有NAT,pri-5为 elastcache 使用,pri-6为rds使用;
pri-1 为 bastion 使用,pri-2 为 service eks 使用,pri-3 为 lambda 使用,private-4 为 proxy 使用,这些subnet 都有 NAT;
这个 vpc 有7张 route table,2个nat gateway 每个az 一个,每个 nat 关联除 public subnet 和 db private subnet外的所有子网;
有1个 IGW,关联public subnet,还有2个gateway类型 endpoint(s3 + ddb)关联除 public subnet 和 db private subnet外的所有子网;
关于 route table,其中 private 子网除 DB 子网外都有 0.0.0.0 和 gateway endpoint 2个 pl,与 vpc d 存在 peering 路由
flow logs 配置在s3 bucket, bucket 名称为 accountid-vpc-flow-logs,路径为 vpc name
// vpc b subnet
vpc-b 在 1a 和 1b 两个az,其中 1a 有2个subnet,
分别为
pub-1(10.200.12.0/24),
pri-1(10.200.1.0/24),
其中 pri-1 子网用于 部署 argocd 所在 eks 集群的 ec2 节点。pri-1 有 NAT, pub-1 有IGW,pri-1还有1个 s3 gateway endpoint。
其中 1b 有2个subnet,
分别为
pub-2(10.200.13.0/24),
pri-2(10.200.2.0/24),
其中 pri-3 子网用于 部署 argocd 所在 eks 集群的 ec2 节点。pri-3 有 NAT, pub-2 有IGW,pri-1还有1个 s3 gateway endpoint。
共计3张 route table ,其中 private 子网 有 0.0.0.0 和 gateway endpoint 1个 pl。
flow logs 配置在s3 bucket, bucket 名称为 accountid-vpc-flow-logs,路径为 vpc name
// vpc c subnet
vpc-c 在 1a 和 1b 两个az,其中 1a 有2个subnet,
分别为
pub-1(10.201.12.0/24),
pri-1(10.201.1.0/24),
其中 pri-1 子网用于 部署 testkube 所在 eks 集群的 ec2 节点。pri-1 有 NAT, pub-1 有IGW,pri-1还有1个 s3 gateway endpoint。
其中 1b 有2个subnet,
分别为
pub-2(10.201.13.0/24),
pri-2(10.201.2.0/24),
其中 pri-3 子网用于 部署 testkube 所在 eks 集群的 ec2 节点。pri-3 有 NAT, pub-2 有IGW,pri-1还有1个 s3 gateway endpoint。
共计3张 route table ,其中 private 子网 有 0.0.0.0 和 gateway endpoint 1个 pl。
flow logs 配置在s3 bucket, bucket 名称为 accountid-vpc-flow-logs,路径为 vpc name
// vpc d subnet 在 cw1 region
vpc-d 在 1a 和 1b 和 1c 三个az,其中 1a 有2个subnet,
分别为
pub-1(10.121.12.0/24),
pri-1(10.121.1.0/24),
pri-2(10.121.4.0/24),
pri-3(10.121.15.0/24),
pri-4(10.121.31.0/24),
pri-5(10.121.163.0/24),
pri-6(10.121.193.0/24)。
pri-5 和 pri-6 属于 DB subnet 没有NAT,pri-5为 elastcache 使用,pri-6为rds使用;
pri-1 为 bastion 使用,pri-2 为 service eks 使用,pri-3 为 lambda 使用,private-4 为 proxy 使用,这些subnet 都有 NAT;
其中 1b 有8个subnet,
分别为
pub-1(10.121.13.0/24),
pri-1(10.121.2.0/24),
pri-2(10.121.5.0/24),
pri-3(10.121.16.0/24),
pri-4(10.121.32.0/24),
pri-5(10.121.164.0/24),
pri-6(10.121.194.0/24)。
pri-5 和 pri-6 属于 DB subnet 没有NAT,pri-5为 elastcache 使用,pri-6为rds使用;
pri-1 为 bastion 使用,pri-2 为 service eks 使用,pri-3 为 lambda 使用,private-4 为 proxy 使用,这些subnet 都有 NAT;
其中 1b 有8个subnet,
分别为
pub-1(10.121.14.0/24),
pri-1(10.121.3.0/24),
pri-2(10.121.6.0/24),
pri-3(10.121.17.0/24),
pri-4(10.121.33.0/24),
pri-5(10.121.165.0/24),
pri-6(10.121.195.0/24)。
pri-5 和 pri-6 属于 DB subnet 没有NAT,pri-5为 elastcache 使用,pri-6为rds使用;
pri-1 为 bastion 使用,pri-2 为 service eks 使用,pri-3 为 lambda 使用,private-4 为 proxy 使用,这些subnet 都有 NAT;
这个 vpc 有9张 route table,2个nat gateway 每个az 一个,每个 nat 关联除 public subnet 和 db private subnet外的所有子网;
有1个 IGW,关联public subnet,还有2个gateway类型 endpoint(s3 + ddb)关联除 public subnet 和 db private subnet外的所有子网;
关于 route table,其中 private 子网除 DB 子网外都有 0.0.0.0 和 gateway endpoint 2个 pl,与 vpc a 存在 peering 路由
flow logs 配置在s3 bucket, bucket 名称为 accountid-vpc-flow-logs,路径为 vpc name
// 创建NAT网关(每个AZ一个)
MERGE (nat1a:NatGateway {id: 'nat-gw-1a', az: 'cn-north-1a'})
ON CREATE SET nat1a.accountId = '018778855179';
MERGE (nat1b:NatGateway {id: 'nat-gw-1b', az: 'cn-north-1b'})
ON CREATE SET nat1b.accountId = '018778855179';
// 创建IGW
MERGE (igw:InternetGateway {id: 'igw-1', name: 'VPC-A IGW'})
ON CREATE SET igw.accountId = '018778855179';
// 创建网关终端节点(S3和DDB)
MERGE (s3:GatewayEndpoint {id: 's3-endpoint', type: 'S3'})
ON CREATE SET s3.accountId = '018778855179';
MERGE (ddb:GatewayEndpoint {id: 'ddb-endpoint', type: 'DynamoDB'})
ON CREATE SET ddb.accountId = '018778855179';
// 将IGW关联到公共子网
MERGE (sub1a1)-[:HAS_ROUTE]->(igw);
MERGE (sub1b1)-[:HAS_ROUTE]->(igw);
// 将NAT网关关联到需要NAT的私有子网(排除DB子网)
MERGE (sub1a2)-[:HAS_ROUTE]->(nat1a); // Bastion (1a)
MERGE (sub1a3)-[:HAS_ROUTE]->(nat1a); // EKS (1a)
MERGE (sub1a4)-[:HAS_ROUTE]->(nat1a); // Lambda (1a)
MERGE (sub1a5)-[:HAS_ROUTE]->(nat1a); // Proxy (1a)
MERGE (sub1b2)-[:HAS_ROUTE]->(nat1b); // Bastion (1b)
MERGE (sub1b3)-[:HAS_ROUTE]->(nat1b); // EKS (1b)
MERGE (sub1b4)-[:HAS_ROUTE]->(nat1b); // Lambda (1b)
MERGE (sub1b5)-[:HAS_ROUTE]->(nat1b); // Proxy (1b)
// 将网关终端节点关联到除公共和DB子网外的私有子网
MERGE (sub1a2)-[:HAS_ROUTE]->(s3);
MERGE (sub1a3)-[:HAS_ROUTE]->(s3);
MERGE (sub1a4)-[:HAS_ROUTE]->(s3);
MERGE (sub1a5)-[:HAS_ROUTE]->(s3);
MERGE (sub1b2)-[:HAS_ROUTE]->(s3);
MERGE (sub1b3)-[:HAS_ROUTE]->(s3);
MERGE (sub1b4)-[:HAS_ROUTE]->(s3);
MERGE (sub1b5)-[:HAS_ROUTE]->(s3);
MERGE (sub1a2)-[:HAS_ROUTE]->(ddb);
MERGE (sub1a3)-[:HAS_ROUTE]->(ddb);
MERGE (sub1a4)-[:HAS_ROUTE]->(ddb);
MERGE (sub1a5)-[:HAS_ROUTE]->(ddb);
MERGE (sub1b2)-[:HAS_ROUTE]->(ddb);
MERGE (sub1b3)-[:HAS_ROUTE]->(ddb);
MERGE (sub1b4)-[:HAS_ROUTE]->(ddb);
MERGE (sub1b5)-[:HAS_ROUTE]->(ddb);
// 创建7个路由表(示例,可根据实际调整)
MERGE (rtb1:RouteTable {id: 'vpca-rtb-1', name: 'Public Route Table'})
ON CREATE SET rtb1.accountId = '018778855179';
MERGE (rtb2:RouteTable {id: 'vpca-rtb-2', name: 'Private Bastion Route Table'})
ON CREATE SET rtb2.accountId = '018778855179';
MERGE (rtb3:RouteTable {id: 'vpca-rtb-3', name: 'Private EKS Route Table'})
ON CREATE SET rtb3.accountId = '018778855179';
MERGE (rtb4:RouteTable {id: 'vpca-rtb-4', name: 'Private Lambda Route Table'})
ON CREATE SET rtb4.accountId = '018778855179';
MERGE (rtb5:RouteTable {id: 'vpca-rtb-5', name: 'Private Proxy Route Table'})
ON CREATE SET rtb5.accountId = '018778855179';
MERGE (rtb6:RouteTable {id: 'vpca-rtb-6', name: 'DB ElastiCache Route Table'})
ON CREATE SET rtb6.accountId = '018778855179';
MERGE (rtb7:RouteTable {id: 'vpca-rtb-7', name: 'DB RDS Route Table'})
ON CREATE SET rtb7.accountId = '018778855179';
// 将路由表关联到子网
MERGE (sub1a1)-[:ASSOCIATED_WITH]->(rtb1);
MERGE (sub1b1)-[:ASSOCIATED_WITH]->(rtb1);
MERGE (sub1a2)-[:ASSOCIATED_WITH]->(rtb2);
MERGE (sub1b2)-[:ASSOCIATED_WITH]->(rtb2);
MERGE (sub1a3)-[:ASSOCIATED_WITH]->(rtb3);
MERGE (sub1b3)-[:ASSOCIATED_WITH]->(rtb3);
MERGE (sub1a4)-[:ASSOCIATED_WITH]->(rtb4);
MERGE (sub1b4)-[:ASSOCIATED_WITH]->(rtb4);
MERGE (sub1a5)-[:ASSOCIATED_WITH]->(rtb5);
MERGE (sub1b5)-[:ASSOCIATED_WITH]->(rtb5);
MERGE (sub1a6)-[:ASSOCIATED_WITH]->(rtb6);
MERGE (sub1b6)-[:ASSOCIATED_WITH]->(rtb6);
MERGE (sub1a7)-[:ASSOCIATED_WITH]->(rtb7);
MERGE (sub1b7)-[:ASSOCIATED_WITH]->(rtb7);
MERGE (nat1a:NatGateway {id: 'nat-gw-1a', az: 'cn-north-1a'})
ON CREATE SET nat1a.accountId = '018778855179';
MERGE (nat1b:NatGateway {id: 'nat-gw-1b', az: 'cn-north-1b'})
ON CREATE SET nat1b.accountId = '018778855179';
// 创建IGW
MERGE (igw:InternetGateway {id: 'igw-1', name: 'VPC-A IGW'})
ON CREATE SET igw.accountId = '018778855179';
// 创建网关终端节点(S3和DDB)
MERGE (s3:GatewayEndpoint {id: 's3-endpoint', type: 'S3'})
ON CREATE SET s3.accountId = '018778855179';
MERGE (ddb:GatewayEndpoint {id: 'ddb-endpoint', type: 'DynamoDB'})
ON CREATE SET ddb.accountId = '018778855179';
// 将IGW关联到公共子网
MERGE (sub1a1)-[:HAS_ROUTE]->(igw);
MERGE (sub1b1)-[:HAS_ROUTE]->(igw);
// 将NAT网关关联到需要NAT的私有子网(排除DB子网)
MERGE (sub1a2)-[:HAS_ROUTE]->(nat1a); // Bastion (1a)
MERGE (sub1a3)-[:HAS_ROUTE]->(nat1a); // EKS (1a)
MERGE (sub1a4)-[:HAS_ROUTE]->(nat1a); // Lambda (1a)
MERGE (sub1a5)-[:HAS_ROUTE]->(nat1a); // Proxy (1a)
MERGE (sub1b2)-[:HAS_ROUTE]->(nat1b); // Bastion (1b)
MERGE (sub1b3)-[:HAS_ROUTE]->(nat1b); // EKS (1b)
MERGE (sub1b4)-[:HAS_ROUTE]->(nat1b); // Lambda (1b)
MERGE (sub1b5)-[:HAS_ROUTE]->(nat1b); // Proxy (1b)
// 将网关终端节点关联到除公共和DB子网外的私有子网
MERGE (sub1a2)-[:HAS_ROUTE]->(s3);
MERGE (sub1a3)-[:HAS_ROUTE]->(s3);
MERGE (sub1a4)-[:HAS_ROUTE]->(s3);
MERGE (sub1a5)-[:HAS_ROUTE]->(s3);
MERGE (sub1b2)-[:HAS_ROUTE]->(s3);
MERGE (sub1b3)-[:HAS_ROUTE]->(s3);
MERGE (sub1b4)-[:HAS_ROUTE]->(s3);
MERGE (sub1b5)-[:HAS_ROUTE]->(s3);
MERGE (sub1a2)-[:HAS_ROUTE]->(ddb);
MERGE (sub1a3)-[:HAS_ROUTE]->(ddb);
MERGE (sub1a4)-[:HAS_ROUTE]->(ddb);
MERGE (sub1a5)-[:HAS_ROUTE]->(ddb);
MERGE (sub1b2)-[:HAS_ROUTE]->(ddb);
MERGE (sub1b3)-[:HAS_ROUTE]->(ddb);
MERGE (sub1b4)-[:HAS_ROUTE]->(ddb);
MERGE (sub1b5)-[:HAS_ROUTE]->(ddb);
// 创建7个路由表(示例,可根据实际调整)
MERGE (rtb1:RouteTable {id: 'vpca-rtb-1', name: 'Public Route Table'})
ON CREATE SET rtb1.accountId = '018778855179';
MERGE (rtb2:RouteTable {id: 'vpca-rtb-2', name: 'Private Bastion Route Table'})
ON CREATE SET rtb2.accountId = '018778855179';
MERGE (rtb3:RouteTable {id: 'vpca-rtb-3', name: 'Private EKS Route Table'})
ON CREATE SET rtb3.accountId = '018778855179';
MERGE (rtb4:RouteTable {id: 'vpca-rtb-4', name: 'Private Lambda Route Table'})
ON CREATE SET rtb4.accountId = '018778855179';
MERGE (rtb5:RouteTable {id: 'vpca-rtb-5', name: 'Private Proxy Route Table'})
ON CREATE SET rtb5.accountId = '018778855179';
MERGE (rtb6:RouteTable {id: 'vpca-rtb-6', name: 'DB ElastiCache Route Table'})
ON CREATE SET rtb6.accountId = '018778855179';
MERGE (rtb7:RouteTable {id: 'vpca-rtb-7', name: 'DB RDS Route Table'})
ON CREATE SET rtb7.accountId = '018778855179';
// 将路由表关联到子网
MERGE (sub1a1)-[:ASSOCIATED_WITH]->(rtb1);
MERGE (sub1b1)-[:ASSOCIATED_WITH]->(rtb1);
MERGE (sub1a2)-[:ASSOCIATED_WITH]->(rtb2);
MERGE (sub1b2)-[:ASSOCIATED_WITH]->(rtb2);
MERGE (sub1a3)-[:ASSOCIATED_WITH]->(rtb3);
MERGE (sub1b3)-[:ASSOCIATED_WITH]->(rtb3);
MERGE (sub1a4)-[:ASSOCIATED_WITH]->(rtb4);
MERGE (sub1b4)-[:ASSOCIATED_WITH]->(rtb4);
MERGE (sub1a5)-[:ASSOCIATED_WITH]->(rtb5);
MERGE (sub1b5)-[:ASSOCIATED_WITH]->(rtb5);
MERGE (sub1a6)-[:ASSOCIATED_WITH]->(rtb6);
MERGE (sub1b6)-[:ASSOCIATED_WITH]->(rtb6);
MERGE (sub1a7)-[:ASSOCIATED_WITH]->(rtb7);
MERGE (sub1b7)-[:ASSOCIATED_WITH]->(rtb7);
ON CREATE SET sub1a2.accountId = '018778855179';
MERGE (sub1a3:Subnet {subnetId: 'pri-3', cidr: '10.120.4.0/24', type: 'private', purpose: 'eks', az: 'cn-north-1a'})
ON CREATE SET sub1a3.accountId = '018778855179';
MERGE (sub1a4:Subnet {subnetId: 'pri-5', cidr: '10.120.15.0/24', type: 'private', purpose: 'lambda', az: 'cn-north-1a'})
ON CREATE SET sub1a4.accountId = '018778855179';
MERGE (sub1a5:Subnet {subnetId: 'pri-7', cidr: '10.120.31.0/24', type: 'private', purpose: 'proxy', az: 'cn-north-1a'})
ON CREATE SET sub1a5.accountId = '018778855179';
MERGE (sub1a6:Subnet {subnetId: 'pri-9', cidr: '10.120.163.0/24', type: 'private', purpose: 'elastcache', az: 'cn-north-1a'})
ON CREATE SET sub1a6.accountId = '018778855179';
MERGE (sub1a7:Subnet {subnetId: 'pri-11', cidr: '10.120.193.0/24', type: 'private', purpose: 'rds', az: 'cn-north-1a'})
ON CREATE SET sub1a7.accountId = '018778855179';
// 创建子网(1b AZ)
MERGE (sub1b1:Subnet {subnetId: 'pub-2', cidr: '10.120.13.0/24', type: 'public', az: 'cn-north-1b'})
ON CREATE SET sub1b1.accountId = '018778855179';
MERGE (sub1b2:Subnet {subnetId: 'pri-2', cidr: '10.120.2.0/24', type: 'private', purpose: 'bastion', az: 'cn-north-1b'})
ON CREATE SET sub1b2.accountId = '018778855179';
MERGE (sub1b3:Subnet {subnetId: 'pri-4', cidr: '10.120.3.0/24', type: 'private', purpose: 'eks', az: 'cn-north-1b'})
ON CREATE SET sub1b3.accountId = '018778855179';
MERGE (sub1b4:Subnet {subnetId: 'pri-6', cidr: '10.120.16.0/24', type: 'private', purpose: 'lambda', az: 'cn-north-1b'})
ON CREATE SET sub1b4.accountId = '018778855179';
MERGE (sub1b5:Subnet {subnetId: 'pri-8', cidr: '10.120.32.0/24', type: 'private', purpose: 'proxy', az: 'cn-north-1b'})
ON CREATE SET sub1b5.accountId = '018778855179';
MERGE (sub1b6:Subnet {subnetId: 'pri-10', cidr: '10.120.161.0/24', type: 'private', purpose: 'elastcache', az: 'cn-north-1b'})
ON CREATE SET sub1b6.accountId = '018778855179';
MERGE (sub1b7:Subnet {subnetId: 'pri-12', cidr: '10.120.194.0/24', type: 'private', purpose: 'rds', az: 'cn-north-1b'})
ON CREATE SET sub1b7.accountId = '018778855179';
// 子网与VPC和AZ的关系
MERGE (vpcA)-[:CONTAINS]->(sub1a1);
MERGE (vpcA)-[:CONTAINS]->(sub1a2);
MERGE (vpcA)-[:CONTAINS]->(sub1a3);
MERGE (vpcA)-[:CONTAINS]->(sub1a4);
MERGE (vpcA)-[:CONTAINS]->(sub1a5);
MERGE (vpcA)-[:CONTAINS]->(sub1a6);
MERGE (vpcA)-[:CONTAINS]->(sub1a7);
MERGE (vpcA)-[:CONTAINS]->(sub1b1);
MERGE (vpcA)-[:CONTAINS]->(sub1b2);
MERGE (vpcA)-[:CONTAINS]->(sub1b3);
MERGE (vpcA)-[:CONTAINS]->(sub1b4);
MERGE (vpcA)-[:CONTAINS]->(sub1b5);
MERGE (vpcA)-[:CONTAINS]->(sub1b6);
MERGE (vpcA)-[:CONTAINS]->(sub1b7);
MERGE (az1a)-[:HAS_SUBNET]->(sub1a1);
MERGE (az1a)-[:HAS_SUBNET]->(sub1a2);
MERGE (az1a)-[:HAS_SUBNET]->(sub1a3);
MERGE (az1a)-[:HAS_SUBNET]->(sub1a4);
MERGE (az1a)-[:HAS_SUBNET]->(sub1a5);
MERGE (az1a)-[:HAS_SUBNET]->(sub1a6);
MERGE (az1a)-[:HAS_SUBNET]->(sub1a7);
MERGE (az1b)-[:HAS_SUBNET]->(sub1b1);
MERGE (az1b)-[:HAS_SUBNET]->(sub1b2);
MERGE (az1b)-[:HAS_SUBNET]->(sub1b3);
MERGE (az1b)-[:HAS_SUBNET]->(sub1b4);
MERGE (az1b)-[:HAS_SUBNET]->(sub1b5);
MERGE (az1b)-[:HAS_SUBNET]->(sub1b6);
MERGE (az1b)-[:HAS_SUBNET]->(sub1b7);
MERGE (sub1a3:Subnet {subnetId: 'pri-3', cidr: '10.120.4.0/24', type: 'private', purpose: 'eks', az: 'cn-north-1a'})
ON CREATE SET sub1a3.accountId = '018778855179';
MERGE (sub1a4:Subnet {subnetId: 'pri-5', cidr: '10.120.15.0/24', type: 'private', purpose: 'lambda', az: 'cn-north-1a'})
ON CREATE SET sub1a4.accountId = '018778855179';
MERGE (sub1a5:Subnet {subnetId: 'pri-7', cidr: '10.120.31.0/24', type: 'private', purpose: 'proxy', az: 'cn-north-1a'})
ON CREATE SET sub1a5.accountId = '018778855179';
MERGE (sub1a6:Subnet {subnetId: 'pri-9', cidr: '10.120.163.0/24', type: 'private', purpose: 'elastcache', az: 'cn-north-1a'})
ON CREATE SET sub1a6.accountId = '018778855179';
MERGE (sub1a7:Subnet {subnetId: 'pri-11', cidr: '10.120.193.0/24', type: 'private', purpose: 'rds', az: 'cn-north-1a'})
ON CREATE SET sub1a7.accountId = '018778855179';
// 创建子网(1b AZ)
MERGE (sub1b1:Subnet {subnetId: 'pub-2', cidr: '10.120.13.0/24', type: 'public', az: 'cn-north-1b'})
ON CREATE SET sub1b1.accountId = '018778855179';
MERGE (sub1b2:Subnet {subnetId: 'pri-2', cidr: '10.120.2.0/24', type: 'private', purpose: 'bastion', az: 'cn-north-1b'})
ON CREATE SET sub1b2.accountId = '018778855179';
MERGE (sub1b3:Subnet {subnetId: 'pri-4', cidr: '10.120.3.0/24', type: 'private', purpose: 'eks', az: 'cn-north-1b'})
ON CREATE SET sub1b3.accountId = '018778855179';
MERGE (sub1b4:Subnet {subnetId: 'pri-6', cidr: '10.120.16.0/24', type: 'private', purpose: 'lambda', az: 'cn-north-1b'})
ON CREATE SET sub1b4.accountId = '018778855179';
MERGE (sub1b5:Subnet {subnetId: 'pri-8', cidr: '10.120.32.0/24', type: 'private', purpose: 'proxy', az: 'cn-north-1b'})
ON CREATE SET sub1b5.accountId = '018778855179';
MERGE (sub1b6:Subnet {subnetId: 'pri-10', cidr: '10.120.161.0/24', type: 'private', purpose: 'elastcache', az: 'cn-north-1b'})
ON CREATE SET sub1b6.accountId = '018778855179';
MERGE (sub1b7:Subnet {subnetId: 'pri-12', cidr: '10.120.194.0/24', type: 'private', purpose: 'rds', az: 'cn-north-1b'})
ON CREATE SET sub1b7.accountId = '018778855179';
// 子网与VPC和AZ的关系
MERGE (vpcA)-[:CONTAINS]->(sub1a1);
MERGE (vpcA)-[:CONTAINS]->(sub1a2);
MERGE (vpcA)-[:CONTAINS]->(sub1a3);
MERGE (vpcA)-[:CONTAINS]->(sub1a4);
MERGE (vpcA)-[:CONTAINS]->(sub1a5);
MERGE (vpcA)-[:CONTAINS]->(sub1a6);
MERGE (vpcA)-[:CONTAINS]->(sub1a7);
MERGE (vpcA)-[:CONTAINS]->(sub1b1);
MERGE (vpcA)-[:CONTAINS]->(sub1b2);
MERGE (vpcA)-[:CONTAINS]->(sub1b3);
MERGE (vpcA)-[:CONTAINS]->(sub1b4);
MERGE (vpcA)-[:CONTAINS]->(sub1b5);
MERGE (vpcA)-[:CONTAINS]->(sub1b6);
MERGE (vpcA)-[:CONTAINS]->(sub1b7);
MERGE (az1a)-[:HAS_SUBNET]->(sub1a1);
MERGE (az1a)-[:HAS_SUBNET]->(sub1a2);
MERGE (az1a)-[:HAS_SUBNET]->(sub1a3);
MERGE (az1a)-[:HAS_SUBNET]->(sub1a4);
MERGE (az1a)-[:HAS_SUBNET]->(sub1a5);
MERGE (az1a)-[:HAS_SUBNET]->(sub1a6);
MERGE (az1a)-[:HAS_SUBNET]->(sub1a7);
MERGE (az1b)-[:HAS_SUBNET]->(sub1b1);
MERGE (az1b)-[:HAS_SUBNET]->(sub1b2);
MERGE (az1b)-[:HAS_SUBNET]->(sub1b3);
MERGE (az1b)-[:HAS_SUBNET]->(sub1b4);
MERGE (az1b)-[:HAS_SUBNET]->(sub1b5);
MERGE (az1b)-[:HAS_SUBNET]->(sub1b6);
MERGE (az1b)-[:HAS_SUBNET]->(sub1b7);
// Accounts
MERGE (accDev:AwsAccount {accountId: '018777506747'})
ON CREATE SET accDev.name = 'dev';
MERGE (accQa:AwsAccount {accountId: '018778761706'})
ON CREATE SET accQa.name = 'qa';
MERGE (accPrd:AwsAccount {accountId: '018778855179'})
ON CREATE SET accPrd.name = 'prd';
// Regions
MERGE (cn1:AwsRegion {name: 'cn-north-1'});
MERGE (cw1:AwsRegion {name: 'cn-northwest-1'});
// Region to Account relationships
MERGE (cn1)-[:IN_ACCOUNT]->(accDev); // cn-north-1 in dev account
MERGE (cw1)-[:IN_ACCOUNT]->(accDev); // cn-northwest-1 in dev account
MERGE (cn1)-[:IN_ACCOUNT]->(accQa); // cn-north-1 in qa account
MERGE (cw1)-[:IN_ACCOUNT]->(accQa); // cn-northwest-1 in qa account
MERGE (cn1)-[:IN_ACCOUNT]->(accPrd); // cn-north-1 in prd account
MERGE (cw1)-[:IN_ACCOUNT]->(accPrd); // cn-northwest-1 in prd account
// VPCs in Beijing (cn-north-1)
MERGE (vpcA:Vpc {vpcId: 'vpc-a', name: 'vpc-a', cidr: '10.120.0.0/16'})
ON CREATE SET vpcA.accountId = '018777506747';
MERGE (vpcA)-[:IN_REGION]->(cn1);
MERGE (vpcB:Vpc {vpcId: 'vpc-b', name: 'vpc-b', cidr: '10.200.0.0/16'})
ON CREATE SET vpcB.accountId = '018777506747';
MERGE (vpcB)-[:IN_REGION]->(cn1);
MERGE (vpcC:Vpc {vpcId: 'vpc-c', name: 'vpc-c', cidr: '10.201.0.0/16'})
ON CREATE SET vpcC.accountId = '018777506747';
MERGE (vpcC)-[:IN_REGION]->(cn1);
// VPC in Ningxia (cn-northwest-1)
MERGE (vpcD:Vpc {vpcId: 'vpc-d', name: 'vpc-d', cidr: '10.121.0.0/16'})
ON CREATE SET vpcD.accountId = '018777506747';
MERGE (vpcC)-[:IN_REGION]->(cw1);
// VPCs in Beijing (cn-north-1)
MERGE (vpcA:Vpc {vpcId: 'vpc-a', name: 'vpc-a', cidr: '10.120.0.0/16'})
ON CREATE SET vpcA.accountId = '018778761706';
MERGE (vpcA)-[:IN_REGION]->(cn1);
MERGE (vpcB:Vpc {vpcId: 'vpc-b', name: 'vpc-b', cidr: '10.200.0.0/16'})
ON CREATE SET vpcB.accountId = '018778761706';
MERGE (vpcB)-[:IN_REGION]->(cn1);
MERGE (vpcC:Vpc {vpcId: 'vpc-c', name: 'vpc-c', cidr: '10.201.0.0/16'})
ON CREATE SET vpcC.accountId = '018778761706';
MERGE (vpcC)-[:IN_REGION]->(cn1);
// VPC in Ningxia (cn-northwest-1)
MERGE (vpcD:Vpc {vpcId: 'vpc-d', name: 'vpc-d', cidr: '10.121.0.0/16'})
ON CREATE SET vpcD.accountId = '018778761706';
MERGE (vpcC)-[:IN_REGION]->(cw1);
// VPCs in Beijing (cn-north-1)
MERGE (vpcA:Vpc {vpcId: 'vpc-a', name: 'vpc-a', cidr: '10.120.0.0/16'})
ON CREATE SET vpcA.accountId = '018778855179';
MERGE (vpcA)-[:IN_REGION]->(cn1);
MERGE (vpcB:Vpc {vpcId: 'vpc-b', name: 'vpc-b', cidr: '10.200.0.0/16'})
ON CREATE SET vpcB.accountId = '018778855179';
MERGE (vpcB)-[:IN_REGION]->(cn1);
MERGE (vpcC:Vpc {vpcId: 'vpc-c', name: 'vpc-c', cidr: '10.201.0.0/16'})
ON CREATE SET vpcC.accountId = '018778855179';
MERGE (vpcC)-[:IN_REGION]->(cn1);
// VPC in Ningxia (cn-northwest-1)
MERGE (vpcD:Vpc {vpcId: 'vpc-d', name: 'vpc-d', cidr: '10.121.0.0/16'})
ON CREATE SET vpcD.accountId = '018778855179';
MERGE (vpcC)-[:IN_REGION]->(cw1);
// 创建AZ节点
MERGE (az1a:Az {name: 'cn-north-1a'});
MERGE (az1b:Az {name: 'cn-north-1b'});
MERGE (az2a:Az {name: 'cn-northwest-1a'});
MERGE (az2b:Az {name: 'cn-northwest-1b'});
MERGE (az2c:Az {name: 'cn-northwest-1c'});
// 创建AZ到VPC-A的关系
MERGE (vpcA)-[:HAS_AZ]->(az1a);
MERGE (vpcA)-[:HAS_AZ]->(az1b);
// 创建AZ到VPC-B的关系
MERGE (vpcB)-[:HAS_AZ]->(az1a);
MERGE (vpcB)-[:HAS_AZ]->(az1b);
// 创建AZ到VPC-C的关系
MERGE (vpcC)-[:HAS_AZ]->(az1a);
MERGE (vpcC)-[:HAS_AZ]->(az1b);
// 创建AZ到VPC-D的关系
MERGE (vpcD)-[:HAS_AZ]->(az2a);
MERGE (vpcD)-[:HAS_AZ]->(az2b);
MERGE (vpcD)-[:HAS_AZ]->(az2c);
// 创建子网(1a AZ)
MERGE (sub1a1:Subnet {subnetId: 'pub-1', cidr: '10.120.12.0/24', type: 'public', az: 'cn-north-1a'})
ON CREATE SET sub1a1.accountId = '018778855179';
MERGE (sub1a2:Subnet {subnetId: 'pri-1', cidr: '10.120.1.0/24', type: 'private', purpose: 'bastion', az: 'cn-north-1a'})
MERGE (accDev:AwsAccount {accountId: '018777506747'})
ON CREATE SET accDev.name = 'dev';
MERGE (accQa:AwsAccount {accountId: '018778761706'})
ON CREATE SET accQa.name = 'qa';
MERGE (accPrd:AwsAccount {accountId: '018778855179'})
ON CREATE SET accPrd.name = 'prd';
// Regions
MERGE (cn1:AwsRegion {name: 'cn-north-1'});
MERGE (cw1:AwsRegion {name: 'cn-northwest-1'});
// Region to Account relationships
MERGE (cn1)-[:IN_ACCOUNT]->(accDev); // cn-north-1 in dev account
MERGE (cw1)-[:IN_ACCOUNT]->(accDev); // cn-northwest-1 in dev account
MERGE (cn1)-[:IN_ACCOUNT]->(accQa); // cn-north-1 in qa account
MERGE (cw1)-[:IN_ACCOUNT]->(accQa); // cn-northwest-1 in qa account
MERGE (cn1)-[:IN_ACCOUNT]->(accPrd); // cn-north-1 in prd account
MERGE (cw1)-[:IN_ACCOUNT]->(accPrd); // cn-northwest-1 in prd account
// VPCs in Beijing (cn-north-1)
MERGE (vpcA:Vpc {vpcId: 'vpc-a', name: 'vpc-a', cidr: '10.120.0.0/16'})
ON CREATE SET vpcA.accountId = '018777506747';
MERGE (vpcA)-[:IN_REGION]->(cn1);
MERGE (vpcB:Vpc {vpcId: 'vpc-b', name: 'vpc-b', cidr: '10.200.0.0/16'})
ON CREATE SET vpcB.accountId = '018777506747';
MERGE (vpcB)-[:IN_REGION]->(cn1);
MERGE (vpcC:Vpc {vpcId: 'vpc-c', name: 'vpc-c', cidr: '10.201.0.0/16'})
ON CREATE SET vpcC.accountId = '018777506747';
MERGE (vpcC)-[:IN_REGION]->(cn1);
// VPC in Ningxia (cn-northwest-1)
MERGE (vpcD:Vpc {vpcId: 'vpc-d', name: 'vpc-d', cidr: '10.121.0.0/16'})
ON CREATE SET vpcD.accountId = '018777506747';
MERGE (vpcC)-[:IN_REGION]->(cw1);
// VPCs in Beijing (cn-north-1)
MERGE (vpcA:Vpc {vpcId: 'vpc-a', name: 'vpc-a', cidr: '10.120.0.0/16'})
ON CREATE SET vpcA.accountId = '018778761706';
MERGE (vpcA)-[:IN_REGION]->(cn1);
MERGE (vpcB:Vpc {vpcId: 'vpc-b', name: 'vpc-b', cidr: '10.200.0.0/16'})
ON CREATE SET vpcB.accountId = '018778761706';
MERGE (vpcB)-[:IN_REGION]->(cn1);
MERGE (vpcC:Vpc {vpcId: 'vpc-c', name: 'vpc-c', cidr: '10.201.0.0/16'})
ON CREATE SET vpcC.accountId = '018778761706';
MERGE (vpcC)-[:IN_REGION]->(cn1);
// VPC in Ningxia (cn-northwest-1)
MERGE (vpcD:Vpc {vpcId: 'vpc-d', name: 'vpc-d', cidr: '10.121.0.0/16'})
ON CREATE SET vpcD.accountId = '018778761706';
MERGE (vpcC)-[:IN_REGION]->(cw1);
// VPCs in Beijing (cn-north-1)
MERGE (vpcA:Vpc {vpcId: 'vpc-a', name: 'vpc-a', cidr: '10.120.0.0/16'})
ON CREATE SET vpcA.accountId = '018778855179';
MERGE (vpcA)-[:IN_REGION]->(cn1);
MERGE (vpcB:Vpc {vpcId: 'vpc-b', name: 'vpc-b', cidr: '10.200.0.0/16'})
ON CREATE SET vpcB.accountId = '018778855179';
MERGE (vpcB)-[:IN_REGION]->(cn1);
MERGE (vpcC:Vpc {vpcId: 'vpc-c', name: 'vpc-c', cidr: '10.201.0.0/16'})
ON CREATE SET vpcC.accountId = '018778855179';
MERGE (vpcC)-[:IN_REGION]->(cn1);
// VPC in Ningxia (cn-northwest-1)
MERGE (vpcD:Vpc {vpcId: 'vpc-d', name: 'vpc-d', cidr: '10.121.0.0/16'})
ON CREATE SET vpcD.accountId = '018778855179';
MERGE (vpcC)-[:IN_REGION]->(cw1);
// 创建AZ节点
MERGE (az1a:Az {name: 'cn-north-1a'});
MERGE (az1b:Az {name: 'cn-north-1b'});
MERGE (az2a:Az {name: 'cn-northwest-1a'});
MERGE (az2b:Az {name: 'cn-northwest-1b'});
MERGE (az2c:Az {name: 'cn-northwest-1c'});
// 创建AZ到VPC-A的关系
MERGE (vpcA)-[:HAS_AZ]->(az1a);
MERGE (vpcA)-[:HAS_AZ]->(az1b);
// 创建AZ到VPC-B的关系
MERGE (vpcB)-[:HAS_AZ]->(az1a);
MERGE (vpcB)-[:HAS_AZ]->(az1b);
// 创建AZ到VPC-C的关系
MERGE (vpcC)-[:HAS_AZ]->(az1a);
MERGE (vpcC)-[:HAS_AZ]->(az1b);
// 创建AZ到VPC-D的关系
MERGE (vpcD)-[:HAS_AZ]->(az2a);
MERGE (vpcD)-[:HAS_AZ]->(az2b);
MERGE (vpcD)-[:HAS_AZ]->(az2c);
// 创建子网(1a AZ)
MERGE (sub1a1:Subnet {subnetId: 'pub-1', cidr: '10.120.12.0/24', type: 'public', az: 'cn-north-1a'})
ON CREATE SET sub1a1.accountId = '018778855179';
MERGE (sub1a2:Subnet {subnetId: 'pri-1', cidr: '10.120.1.0/24', type: 'private', purpose: 'bastion', az: 'cn-north-1a'})
# 2025W33 AI大模型领域精选热点 🔥
---
## 1. Google
> 全能战士:生成视频的模型 veo3,生成图像的 imagen 4,生成音乐的 lyria,用来生成语音的 chirp,还有 gemini 系列模型以及开源的gemma系列。感觉是不是可以替代好莱坞了?
+ 发布 Gemma-3-270M 一个多模态模型,能接受文本和图片输入,并且输出文本。输入图片会标准化为 896 x 896 分辨率。这种大小的模型通常可以放在移动端设备运行。Gemma 3 270M 与 Qwen3 0.6B 架构对比,需要注意的是 Gemma3-270M 只有4个注意力头,Qwen3-0.6B 有16个。通常注意力头多泛化能力会强,相应的复杂任务能力、长距离依赖关系处理也会更好。当然计算成本也高。
模型地址:huggingface.co/google/gemma-3-270m
+ 正式发布上线 Imagen 4 模型,其在文字渲染方面,精准度再创新高,媲美专业排版。美中不足不支持中文!aistudio 可体验。
+ 据报道,在Google和IBM推动下,接近实用的量子计算离实用越来越近了
+ 谷歌开发者大会2025 在上海举行,主题全部与ai相关。带来的除去模型、IDE等更新外,还有需要有趣的demo()
## 2. Meta
Meta推出 DINOv3,DINOv3 是采用自监督学习(SSL)训练的先进计算机视觉模型,能够生成强大且高分辨率的图像特征。相比上一版本,Meta 将无监督训练扩展到 **70 亿参数**的模型和 17 亿张图像数据集。
目前模型、代码以及技术报告均已经开源:
模型地址:huggingface.co/collections/facebook/dinov3-68924841bd6b561778e31009
Repo地址:github.com/facebookresearch/dinov3
技术报告:ai.meta.com/research/publications/dinov3
## 3. 阿里
1. Wan2.2-I2V-Flash 正式上线!图生视频可以更“轻快”,相比Wan2.1,Wan2.2-I2V-Flash推理速度提升12倍,创作效率跃升。阿里的开源 AI 视频模型 Wan 2.2 火出圈了,尤其是在某些灰产领域。
2. 阿里首个多模态 Agent「WebWatcher」开源发布,看图识别、读文理解、跨网页追踪。论文:arxiv.org/abs/2508.05748,repo 地址:github.com/Alibaba-NLP/WebAgent
3. 桌面端移动端的 Qwen Chat 已上线,支持 MCP,有兴趣可以体验 qwen.ai/download
## 4. 腾讯开源世界模型和框架
+ 一个交互式视频生成的基础框架 Yan,是目前分辨率最高的1080p 60帧,比 Google 的 Genie 3 (720p 24帧) 还要高。它包括三个核心模块:Yan-Sim、Yan-Gen 和 Yan-Edit。
+ Yan-Sim 可以对交互式视频环境进行高质量模拟;
+ Yan-Gen 以文本和图像为提示,生成具有很强泛化性的交互式视频;
+ Yan-Edit 支持多粒度、实时编辑交互式视频内容,通过基于文本的交互实现多粒度的视频内容编辑,涵盖结构编辑(例如,添加可交互对象)和风格编辑(例如,更改对象的颜色和纹理)。
地址:greatx3.github.io/Yan
+ Hunyuan-GameCraft 开源,一种用于游戏环境中高动态交互式视频生成的新颖框架(照片生成游戏),在大模型生成的“游戏视频”里面进行自由机位移动!该模型在包含 100 多款 AAA 游戏的 **100 多万**个游戏记录的大规模数据集上进行训练,确保广泛的覆盖范围和多样性,然后在经过仔细注释的合成数据集上进行微调,以提高精度和控制力。 精心策划的游戏场景数据显著提高了视觉保真度、真实感和动作可控性。 大量实验表明,Hunyuan-GameCraft 的性能明显优于现有模型,提高了交互式游戏视频生成的真实感和可玩性。
地址:hunyuan-gamecraft.github.io
## 5. 其他动态
1. OpenAI 发布一些的教程,包括提示词指南,新的参数和工具,如何使用 GPT-5 写前端,使用他们的新提示词优化器。感兴趣可以看看:cookbook.openai.com
2. Anthropic 宣布 Claude-Sonnet-4 支持一百万上下文了!(价格能降一降就更好了)
3. 昆仑万维(Skywork)发布并开源世界模型 Matrix-Game 2.0模型,可以看作是谷歌Genie 3的开源版,该模型能够以 25 FPS 的超快速度跨不同场景生成高质量的分钟级视频。
4. 又一个开源世界模型 Matrix-Game 2.0,模型只有 1.8B, 然后能生成25帧的游戏场景,实时的通过WASD按键来玩这个AI脑补出来的游戏。并且能生成1分钟左右(分辨率较低)。模型地址:huggingface.co/Skywork/Matrix-Game-2.0
5. 微软提出一种AI专用的标记语言 POML:提示词编排标记语言(感觉像是换皮的xml)。旨在为大型语言模型(LLMs)的高级提示工程带来结构化、可维护性和多功能性。它目标是解决提示开发中的常见挑战,如缺乏结构、复杂的数据集成、格式敏感性和工具不足。Repo地址:github.com/microsoft/poml
6. 智谱开源视觉语言大模型GLM-4.5V(模型参数106B总参数,12B激活),图像识别能力非常强,可以直接做灰产了。能够通过截屏、录屏等方式获取PC屏幕上的视觉信息。
模型地址:huggingface.co/zai-org/GLM-4.5V
论文地址: huggingface.co/papers/2507.01006
Repo地址: github.com/zai-org/GLM-V/
7. 2025世界人形机器人运动会贡献多个机器人名场面。地址:whrgoc.com/news
## Github Repos Recommend
1. SQLBot:基于大模型与 RAG 技术的智能问数系统,助力企业轻松实现高质量 text2sql 转换。
Repo 地址:github.com/dataease/SQLBot
2. vLLM-CLI 非官方项目,支持交互式配置菜单系统(无需记忆参数)、自动检测和配置多块 GPU、保存最后的工作配置以便快速重用、实时监控 GPU 使用情况和服务器日志、内置常见场景的配置文件或自定义您的配置文件。
Repo地址:github.com/Chen-zexi/vllm-cli
3. ZipVoice 在cpu就能运行的语音克隆模型
一个基于 Flow Matching 架构的 ZipVoice 零样本单说话人语音合成模型。ZipVoice 解决了现有零样本语音合成模型的参数量大、合成速度慢的痛点,在轻量化建模和推理加速上取得了重要突破,可能是行业内首个可以在 CPU 上实时运行的零样本语音合成模型。
Repo地址:github.com/k2-fsa/ZipVoice
4. Baichuan-M2-32B:基于 Qwen2.5-32B 基座医疗开源模型
- **全球最强医疗开源模型**:在 HealthBench 评测集上超越所有开源模型及众多前沿闭源模型,是最接近 GPT-5 医疗能力的开源大模型
- **医生思维对齐**:基于真实病例数据和患者模拟器训练,具备临床诊断思维和鲁棒的医患交互能力
- **高效部署与推理**:支持 4bit 量化在 RTX4090 单卡部署,MTP 版本单用户场景下 token 吞吐提升 58.5%
深度融合真实病例训练与动态评分机制
Repo 地址:github.com/baichuan-inc/Baichuan-M2-32B
5. Claude Code Unified Agents 集成了 54 个生产级子 agent,覆盖开发、基础设施、质量保证、AI/ML、业务流程、创意设计和专用领域,打造智能多 agent 协作生态。这是一套面向未来的多 agent开发框架。
Repo地址:github.com/stretchcloud/claude-code-unified-agents
---
## 1. Google
> 全能战士:生成视频的模型 veo3,生成图像的 imagen 4,生成音乐的 lyria,用来生成语音的 chirp,还有 gemini 系列模型以及开源的gemma系列。感觉是不是可以替代好莱坞了?
+ 发布 Gemma-3-270M 一个多模态模型,能接受文本和图片输入,并且输出文本。输入图片会标准化为 896 x 896 分辨率。这种大小的模型通常可以放在移动端设备运行。Gemma 3 270M 与 Qwen3 0.6B 架构对比,需要注意的是 Gemma3-270M 只有4个注意力头,Qwen3-0.6B 有16个。通常注意力头多泛化能力会强,相应的复杂任务能力、长距离依赖关系处理也会更好。当然计算成本也高。
模型地址:huggingface.co/google/gemma-3-270m
+ 正式发布上线 Imagen 4 模型,其在文字渲染方面,精准度再创新高,媲美专业排版。美中不足不支持中文!aistudio 可体验。
+ 据报道,在Google和IBM推动下,接近实用的量子计算离实用越来越近了
+ 谷歌开发者大会2025 在上海举行,主题全部与ai相关。带来的除去模型、IDE等更新外,还有需要有趣的demo()
## 2. Meta
Meta推出 DINOv3,DINOv3 是采用自监督学习(SSL)训练的先进计算机视觉模型,能够生成强大且高分辨率的图像特征。相比上一版本,Meta 将无监督训练扩展到 **70 亿参数**的模型和 17 亿张图像数据集。
目前模型、代码以及技术报告均已经开源:
模型地址:huggingface.co/collections/facebook/dinov3-68924841bd6b561778e31009
Repo地址:github.com/facebookresearch/dinov3
技术报告:ai.meta.com/research/publications/dinov3
## 3. 阿里
1. Wan2.2-I2V-Flash 正式上线!图生视频可以更“轻快”,相比Wan2.1,Wan2.2-I2V-Flash推理速度提升12倍,创作效率跃升。阿里的开源 AI 视频模型 Wan 2.2 火出圈了,尤其是在某些灰产领域。
2. 阿里首个多模态 Agent「WebWatcher」开源发布,看图识别、读文理解、跨网页追踪。论文:arxiv.org/abs/2508.05748,repo 地址:github.com/Alibaba-NLP/WebAgent
3. 桌面端移动端的 Qwen Chat 已上线,支持 MCP,有兴趣可以体验 qwen.ai/download
## 4. 腾讯开源世界模型和框架
+ 一个交互式视频生成的基础框架 Yan,是目前分辨率最高的1080p 60帧,比 Google 的 Genie 3 (720p 24帧) 还要高。它包括三个核心模块:Yan-Sim、Yan-Gen 和 Yan-Edit。
+ Yan-Sim 可以对交互式视频环境进行高质量模拟;
+ Yan-Gen 以文本和图像为提示,生成具有很强泛化性的交互式视频;
+ Yan-Edit 支持多粒度、实时编辑交互式视频内容,通过基于文本的交互实现多粒度的视频内容编辑,涵盖结构编辑(例如,添加可交互对象)和风格编辑(例如,更改对象的颜色和纹理)。
地址:greatx3.github.io/Yan
+ Hunyuan-GameCraft 开源,一种用于游戏环境中高动态交互式视频生成的新颖框架(照片生成游戏),在大模型生成的“游戏视频”里面进行自由机位移动!该模型在包含 100 多款 AAA 游戏的 **100 多万**个游戏记录的大规模数据集上进行训练,确保广泛的覆盖范围和多样性,然后在经过仔细注释的合成数据集上进行微调,以提高精度和控制力。 精心策划的游戏场景数据显著提高了视觉保真度、真实感和动作可控性。 大量实验表明,Hunyuan-GameCraft 的性能明显优于现有模型,提高了交互式游戏视频生成的真实感和可玩性。
地址:hunyuan-gamecraft.github.io
## 5. 其他动态
1. OpenAI 发布一些的教程,包括提示词指南,新的参数和工具,如何使用 GPT-5 写前端,使用他们的新提示词优化器。感兴趣可以看看:cookbook.openai.com
2. Anthropic 宣布 Claude-Sonnet-4 支持一百万上下文了!(价格能降一降就更好了)
3. 昆仑万维(Skywork)发布并开源世界模型 Matrix-Game 2.0模型,可以看作是谷歌Genie 3的开源版,该模型能够以 25 FPS 的超快速度跨不同场景生成高质量的分钟级视频。
4. 又一个开源世界模型 Matrix-Game 2.0,模型只有 1.8B, 然后能生成25帧的游戏场景,实时的通过WASD按键来玩这个AI脑补出来的游戏。并且能生成1分钟左右(分辨率较低)。模型地址:huggingface.co/Skywork/Matrix-Game-2.0
5. 微软提出一种AI专用的标记语言 POML:提示词编排标记语言(感觉像是换皮的xml)。旨在为大型语言模型(LLMs)的高级提示工程带来结构化、可维护性和多功能性。它目标是解决提示开发中的常见挑战,如缺乏结构、复杂的数据集成、格式敏感性和工具不足。Repo地址:github.com/microsoft/poml
6. 智谱开源视觉语言大模型GLM-4.5V(模型参数106B总参数,12B激活),图像识别能力非常强,可以直接做灰产了。能够通过截屏、录屏等方式获取PC屏幕上的视觉信息。
模型地址:huggingface.co/zai-org/GLM-4.5V
论文地址: huggingface.co/papers/2507.01006
Repo地址: github.com/zai-org/GLM-V/
7. 2025世界人形机器人运动会贡献多个机器人名场面。地址:whrgoc.com/news
## Github Repos Recommend
1. SQLBot:基于大模型与 RAG 技术的智能问数系统,助力企业轻松实现高质量 text2sql 转换。
Repo 地址:github.com/dataease/SQLBot
2. vLLM-CLI 非官方项目,支持交互式配置菜单系统(无需记忆参数)、自动检测和配置多块 GPU、保存最后的工作配置以便快速重用、实时监控 GPU 使用情况和服务器日志、内置常见场景的配置文件或自定义您的配置文件。
Repo地址:github.com/Chen-zexi/vllm-cli
3. ZipVoice 在cpu就能运行的语音克隆模型
一个基于 Flow Matching 架构的 ZipVoice 零样本单说话人语音合成模型。ZipVoice 解决了现有零样本语音合成模型的参数量大、合成速度慢的痛点,在轻量化建模和推理加速上取得了重要突破,可能是行业内首个可以在 CPU 上实时运行的零样本语音合成模型。
Repo地址:github.com/k2-fsa/ZipVoice
4. Baichuan-M2-32B:基于 Qwen2.5-32B 基座医疗开源模型
- **全球最强医疗开源模型**:在 HealthBench 评测集上超越所有开源模型及众多前沿闭源模型,是最接近 GPT-5 医疗能力的开源大模型
- **医生思维对齐**:基于真实病例数据和患者模拟器训练,具备临床诊断思维和鲁棒的医患交互能力
- **高效部署与推理**:支持 4bit 量化在 RTX4090 单卡部署,MTP 版本单用户场景下 token 吞吐提升 58.5%
深度融合真实病例训练与动态评分机制
Repo 地址:github.com/baichuan-inc/Baichuan-M2-32B
5. Claude Code Unified Agents 集成了 54 个生产级子 agent,覆盖开发、基础设施、质量保证、AI/ML、业务流程、创意设计和专用领域,打造智能多 agent 协作生态。这是一套面向未来的多 agent开发框架。
Repo地址:github.com/stretchcloud/claude-code-unified-agents
# 2025W32 AI大模型领域精选热点 🔥
---
## 1. OpenAI GPT5 终于发布
> 训练时长2年半的GPT5 怎么样呢?评价两极分化,负面占比多,发布会图片莫不是模型训练使用了某国统计局数据???
+ GPT5 发布即回滚,山姆奥特曼被舆情干趴,现在又在组织力量让o3、4.5、4.1回归。
+ GPT5 亮点1:实时路由系统”(Real-time Router)动态判断问题复杂度,自动切换快速响应模式或深度思考模式(例如用户输入“think hard about this”可触发深度推理)。该设计消除了用户手动切换模型的负担,实现无缝体验(真的嘛???)。
+ GPT5 亮点2:减少幻觉:更诚实,降低迎合性回答。编程与专业能力:复杂代码库处理、网站/游戏生成能力增强。
+ OpenAI 发布两个开放权重模型! gpt-oss-120b 激活参数量 5.1B,甚至能在单张 Nvidia 显卡(H100 80G)上运行。gpt-oss-20b 激活参数量 3.6B,甚至可在拥有16GB内存的普通笔记本电脑上运行(已测试速度相当慢)。两个都是 MoE 架构的推理模型,原生 MXFP4。
## 2. Anthropic 发布 Claude Opus 4.1
> 代码能力遥遥领先 Claude Opus 4.1 > Gemini-2.5-Pro > GPT-5-Thinking
+ 在代理任务、真实世界编码和推理方面的升级,尤其是在多文件代码重构方面的性能提升显著。
## 3. Google
> 敏捷又强大,轻松干掉一堆startup
+ Gemini 上线 StoryBook,体验地址 https://gemini.google/overview/storybook/
+ 只要上传一段文字或者提示词或者文档,就可以生成一本图文并茂的故事书,效果相当相当的好!
+ 一个 Agent,大概有 20 多个 Tools,能自主的调用工具收集上下文完成任务。
+ Google 发布迄今为止最先进的世界模拟器(世界模型)Genie 3 能从文字或图片即时生成可玩的 3D 互动世界
+ 能生成用户和 AI Agent 实时交互的 3D 环境,可以用于教育、娱乐等场景,感觉还可以和具身智能结合,帮助机器人理解现实物理世界。
+ 3D 互动世界具备高保真视觉效果、20-24 帧每秒的流畅画面、即时提示交互、世界记忆等多项强大功能。
+ Google 推出 web guide,AI给总结不直接出内容,而是给个概览 (AI整合好的最相关的几个网页链接)。或许是最强的矛和最强的盾,终归有一方要妥协。Google的AI搜索革命道路曲折呀(本已是搜索推荐的No1),AI 搜索竭泽而渔导致源站获取不到流量,从共生变成竞争,再继续进一步或许Google 再也爬不到信息了。
## 4. Ali Qwen
+ 开源 Qwen3 4B 模型:Qwen3-4B-Instruct-2507 和 Qwen3-4B-Thinking-2507,新版本提升了思考能力,并且增加了思考长度,上下文支持 256K!
模型地址:huggingface.co/Qwen/Qwen3-4B-Instruct-2507 和 huggingface.co/Qwen/Qwen3-4B-Thinking-2507
+ 开源 Owen-image 模型:20B 参数,主打图片生成和编辑,尤其擅长处理复杂的文字内容。中文、英文、中英文混排,甚至大段中文手写体都能处理,布局合理。能做各种风格的图片,比如写实、二次元、水墨、极简、海报、PPT等,还能通过自然语言指令调整细节,比如改字体、改姿势、加物体、换风格等。编辑图片的时候,它能保留原有的细节和氛围,做出来的效果也很自然,没有违和感。
模型地址: huggingface.co/Qwen/Qwen-Image
Github:github.com/QwenLM/Qwen-Image
社区体验地址:modelscope.cn/aigc/imageGeneration
+ Qwen Code 提供每天两千次的免费请求
## 5. 其他动态
1. 面壁开源 MiniCPM-V-4 模型,一个图/视频推理模型,模型总参数量4.1B,本地设备可以运行。
模型地址:huggingface.co/openbmb/MiniCPM-V-4
2. ElevenLabs 推出音乐生成模型,支持包括英语、西班牙语、德语、日语在内的多种语言。可完全控制音乐的流派、风格和结构,能够编辑单个片段或整首歌曲的声音和歌词。但是最期待的功能,是能够指定演唱者的音色,用同一个音色生成不同的歌曲。
体验地址:elevenlabs.io/music
3. Chatterbox:Resemble AI 首个生产级开源MIT协议的TTS模型,0.5B参数,训练于50万小时高质量语音数据
体验地址:resemble-ai.github.io/chatterbox_demopage
Repo 地址:github.com/stlohrey/chatterbox-finetuning
4. Kitten TTS:一款 23.8MB 的开源文本转语音模型,仅有 1500 万参数,可CPU运行
Repo 地址:github.com/KittenML/KittenTTS
模型地址:huggingface.co/KittenML/kitten-tts-nano-0.1
5. 谷歌DeepMind科学家Kevin Murphy最新论文《Reinforcement Learning: An Overview》,全面系统梳理强化学习理论与实践。
论文地址: arxiv.org/abs/2412.05265
6. OPPO 开发了一个叫 “Efficient Agents” 的新 agents 框架,与开源代理框架 OWL 相比,“Efficient Agents” 能保留 96.7% 的性能,但运营成本从 0.398 美元降到了 0.228 美元。
论文地址:arxiv.org/abs/2508.02694
Repo 地址:github.com/OPPO-PersonalAI/OAgents
7. 马斯克扬言要开源 Grok-2(这性能开源了也没人用呀)。
8. Tesla Dojo团队解散,后续车机显卡应该只用nvidia了。
9. 传言马斯克正在挑选 Meta 公司的所有顶尖研究人才(小扎:刚挖来的就被惦记了)。
10. 2025北京亦庄举办的世界机器人大会 8月8日开幕。
## Github Repos Recommend
1. gpt-5-coding-examples
Repo 推荐对 AI 编程有兴趣的看看,包含大量的 GPT-5 编程示例,包括原始提示词、生成结果,结果展示。
Repo 地址:github.com/openai/gpt-5-coding-examples
Demo 地址:gpt-examples.com/
2. OpenBB
用于量化交易或金融分析,将所有主流金融数据源整合到一个开源平台中,通过统一的 API 接口,让获取股票、期权、外汇、宏观经济等各类金融数据,还提供了可视化界面和 AI Agent 功能。
Repo 地址:github.com/OpenBB-finance/OpenBB
3. Sparc3D: Sparse Representation and Construction for High-Resolution 3D Shapes Modeling《Sparc3D:高分辨率3D形状建模的稀疏表示与构建方法》,Sparc3D 通过稀疏可变形 Marching Cubes(Sparcubes)和稀疏卷积 VAE(Sparconv-VAE)相结合,首创可微、高保真、轻量的统一式高分辨率3D生成框架,解决了传统 VAE 表示效率低与重建损失大的痛点。
Blog 地址:lizhihao6.github.io/Sparc3D/
---
## 1. OpenAI GPT5 终于发布
> 训练时长2年半的GPT5 怎么样呢?评价两极分化,负面占比多,发布会图片莫不是模型训练使用了某国统计局数据???
+ GPT5 发布即回滚,山姆奥特曼被舆情干趴,现在又在组织力量让o3、4.5、4.1回归。
+ GPT5 亮点1:实时路由系统”(Real-time Router)动态判断问题复杂度,自动切换快速响应模式或深度思考模式(例如用户输入“think hard about this”可触发深度推理)。该设计消除了用户手动切换模型的负担,实现无缝体验(真的嘛???)。
+ GPT5 亮点2:减少幻觉:更诚实,降低迎合性回答。编程与专业能力:复杂代码库处理、网站/游戏生成能力增强。
+ OpenAI 发布两个开放权重模型! gpt-oss-120b 激活参数量 5.1B,甚至能在单张 Nvidia 显卡(H100 80G)上运行。gpt-oss-20b 激活参数量 3.6B,甚至可在拥有16GB内存的普通笔记本电脑上运行(已测试速度相当慢)。两个都是 MoE 架构的推理模型,原生 MXFP4。
## 2. Anthropic 发布 Claude Opus 4.1
> 代码能力遥遥领先 Claude Opus 4.1 > Gemini-2.5-Pro > GPT-5-Thinking
+ 在代理任务、真实世界编码和推理方面的升级,尤其是在多文件代码重构方面的性能提升显著。
## 3. Google
> 敏捷又强大,轻松干掉一堆startup
+ Gemini 上线 StoryBook,体验地址 https://gemini.google/overview/storybook/
+ 只要上传一段文字或者提示词或者文档,就可以生成一本图文并茂的故事书,效果相当相当的好!
+ 一个 Agent,大概有 20 多个 Tools,能自主的调用工具收集上下文完成任务。
+ Google 发布迄今为止最先进的世界模拟器(世界模型)Genie 3 能从文字或图片即时生成可玩的 3D 互动世界
+ 能生成用户和 AI Agent 实时交互的 3D 环境,可以用于教育、娱乐等场景,感觉还可以和具身智能结合,帮助机器人理解现实物理世界。
+ 3D 互动世界具备高保真视觉效果、20-24 帧每秒的流畅画面、即时提示交互、世界记忆等多项强大功能。
+ Google 推出 web guide,AI给总结不直接出内容,而是给个概览 (AI整合好的最相关的几个网页链接)。或许是最强的矛和最强的盾,终归有一方要妥协。Google的AI搜索革命道路曲折呀(本已是搜索推荐的No1),AI 搜索竭泽而渔导致源站获取不到流量,从共生变成竞争,再继续进一步或许Google 再也爬不到信息了。
## 4. Ali Qwen
+ 开源 Qwen3 4B 模型:Qwen3-4B-Instruct-2507 和 Qwen3-4B-Thinking-2507,新版本提升了思考能力,并且增加了思考长度,上下文支持 256K!
模型地址:huggingface.co/Qwen/Qwen3-4B-Instruct-2507 和 huggingface.co/Qwen/Qwen3-4B-Thinking-2507
+ 开源 Owen-image 模型:20B 参数,主打图片生成和编辑,尤其擅长处理复杂的文字内容。中文、英文、中英文混排,甚至大段中文手写体都能处理,布局合理。能做各种风格的图片,比如写实、二次元、水墨、极简、海报、PPT等,还能通过自然语言指令调整细节,比如改字体、改姿势、加物体、换风格等。编辑图片的时候,它能保留原有的细节和氛围,做出来的效果也很自然,没有违和感。
模型地址: huggingface.co/Qwen/Qwen-Image
Github:github.com/QwenLM/Qwen-Image
社区体验地址:modelscope.cn/aigc/imageGeneration
+ Qwen Code 提供每天两千次的免费请求
## 5. 其他动态
1. 面壁开源 MiniCPM-V-4 模型,一个图/视频推理模型,模型总参数量4.1B,本地设备可以运行。
模型地址:huggingface.co/openbmb/MiniCPM-V-4
2. ElevenLabs 推出音乐生成模型,支持包括英语、西班牙语、德语、日语在内的多种语言。可完全控制音乐的流派、风格和结构,能够编辑单个片段或整首歌曲的声音和歌词。但是最期待的功能,是能够指定演唱者的音色,用同一个音色生成不同的歌曲。
体验地址:elevenlabs.io/music
3. Chatterbox:Resemble AI 首个生产级开源MIT协议的TTS模型,0.5B参数,训练于50万小时高质量语音数据
体验地址:resemble-ai.github.io/chatterbox_demopage
Repo 地址:github.com/stlohrey/chatterbox-finetuning
4. Kitten TTS:一款 23.8MB 的开源文本转语音模型,仅有 1500 万参数,可CPU运行
Repo 地址:github.com/KittenML/KittenTTS
模型地址:huggingface.co/KittenML/kitten-tts-nano-0.1
5. 谷歌DeepMind科学家Kevin Murphy最新论文《Reinforcement Learning: An Overview》,全面系统梳理强化学习理论与实践。
论文地址: arxiv.org/abs/2412.05265
6. OPPO 开发了一个叫 “Efficient Agents” 的新 agents 框架,与开源代理框架 OWL 相比,“Efficient Agents” 能保留 96.7% 的性能,但运营成本从 0.398 美元降到了 0.228 美元。
论文地址:arxiv.org/abs/2508.02694
Repo 地址:github.com/OPPO-PersonalAI/OAgents
7. 马斯克扬言要开源 Grok-2(这性能开源了也没人用呀)。
8. Tesla Dojo团队解散,后续车机显卡应该只用nvidia了。
9. 传言马斯克正在挑选 Meta 公司的所有顶尖研究人才(小扎:刚挖来的就被惦记了)。
10. 2025北京亦庄举办的世界机器人大会 8月8日开幕。
## Github Repos Recommend
1. gpt-5-coding-examples
Repo 推荐对 AI 编程有兴趣的看看,包含大量的 GPT-5 编程示例,包括原始提示词、生成结果,结果展示。
Repo 地址:github.com/openai/gpt-5-coding-examples
Demo 地址:gpt-examples.com/
2. OpenBB
用于量化交易或金融分析,将所有主流金融数据源整合到一个开源平台中,通过统一的 API 接口,让获取股票、期权、外汇、宏观经济等各类金融数据,还提供了可视化界面和 AI Agent 功能。
Repo 地址:github.com/OpenBB-finance/OpenBB
3. Sparc3D: Sparse Representation and Construction for High-Resolution 3D Shapes Modeling《Sparc3D:高分辨率3D形状建模的稀疏表示与构建方法》,Sparc3D 通过稀疏可变形 Marching Cubes(Sparcubes)和稀疏卷积 VAE(Sparconv-VAE)相结合,首创可微、高保真、轻量的统一式高分辨率3D生成框架,解决了传统 VAE 表示效率低与重建损失大的痛点。
Blog 地址:lizhihao6.github.io/Sparc3D/
_web)-[:HAS_RULE]->(rule2),
(rule2)-[:APPLIES_TO_SG]->(sg_web);
MATCH (sg_web:SecurityGroup {id: "sg-web12345"}), (rule3:SecurityRule {id: "rule-web-all-out"})
CREATE (sg_web)-[:HAS_RULE]->(rule3),
(rule3)-[:APPLIES_TO_SG]->(sg_web);
MATCH (sg_app:SecurityGroup {id: "sg-app67890"}), (rule4:SecurityRule {id: "rule-app-from-web"})
CREATE (sg_app)-[:HAS_RULE]->(rule4),
(rule4)-[:APPLIES_TO_SG]->(sg_app);
MATCH (sg_db:SecurityGroup {id: "sg-db11111"}), (rule5:SecurityRule {id: "rule-db-from-app"})
CREATE (sg_db)-[:HAS_RULE]->(rule5),
(rule5)-[:APPLIES_TO_SG]->(sg_db);
// Security Group间的引用关系
MATCH (rule4:SecurityRule {id: "rule-app-from-web"}), (sg_web:SecurityGroup {id: "sg-web12345"})
CREATE (rule4)-[:REFERENCES_SG]->(sg_web);
MATCH (rule5:SecurityRule {id: "rule-db-from-app"}), (sg_app:SecurityGroup {id: "sg-app67890"})
CREATE (rule5)-[:REFERENCES_SG]->(sg_app);
// VPC Endpoints关系
MATCH (endpoint_s3:VPCEndpoint {id: "vpce-s3-12345"}), (vpc1:VPC {id: "vpc-12345678"})
CREATE (endpoint_s3)-[:BELONGS_TO_VPC]->(vpc1),
(vpc1)-[:CONTAINS_VPC_ENDPOINT]->(endpoint_s3);
MATCH (endpoint_ec2:VPCEndpoint {id: "vpce-ec2-67890"}), (vpc1:VPC {id: "vpc-12345678"})
CREATE (endpoint_ec2)-[:BELONGS_TO_VPC]->(vpc1),
(vpc1)-[:CONTAINS_VPC_ENDPOINT]->(endpoint_ec2);
MATCH (endpoint_ec2:VPCEndpoint {id: "vpce-ec2-67890"}), (subnet2:Subnet {id: "subnet-def67890"})
CREATE (endpoint_ec2)-[:DEPLOYED_IN_SUBNET]->(subnet2),
(subnet2)-[:HOSTS_VPC_ENDPOINT]->(endpoint_ec2);
// 更新Route Table中NAT Gateway路由
MATCH (rt_private:RouteTable {id: "rtb-private-456"})
SET rt_private.routes = [
{
destination: "10.0.0.0/16",
target: "local",
status: "active"
},
{
destination: "0.0.0.0/0",
target: "nat-12345abc",
status: "active"
}
];
// ==========================================
// 10. VPC Flow Logs与S3关联关系预留
// ==========================================
// 注意:这里预留了与S3资源的关联关系,当S3建模完成后建立
// (vpc1)-[:LOGS_TO_S3]->(s3_bucket)
// ==========================================
// 11. 网络资源验证查询示例
// ==========================================
// 查询完整的网络安全架构
// MATCH (vpc:VPC {id: "vpc-12345678"})-[:CONTAINS_SECURITY_GROUP]->(sg:SecurityGroup)-[:HAS_RULE]->(rule:SecurityRule)
// RETURN vpc.name as vpc, sg.name as security_group,
// collect({direction: rule.direction, protocol: rule.protocol, port: rule.port_range, source: rule.source}) as rules;
// 查询NAT Gateway的完整配置
// MATCH (nat:NatGateway {id: "nat-12345abc"})
// OPTIONAL MATCH (nat)-[:USES_EIP]->(eip:EIP)
// OPTIONAL MATCH (nat)-[:USES_NETWORK_INTERFACE]->(eni:NetworkInterface)
// OPTIONAL MATCH (nat)-[:DEPLOYED_IN_SUBNET]->(subnet:Subnet)
// RETURN nat.name as nat_gateway, eip.address as public_ip, eni.private_ip as private_ip, subnet.name as subnet;
// 查询Security Group间的依赖关系
// MATCH (sg1:SecurityGroup)-[:HAS_RULE]->(rule:SecurityRule)-[:REFERENCES_SG]->(sg2:SecurityGroup)
// RETURN sg1.name as source_sg, rule.description as rule_desc, sg2.name as referenced_sg;
// 查询VPC的所有网络流量出口
// MATCH (vpc:VPC {id: "vpc-12345678"})
// OPTIONAL MATCH (vpc)-[:ATTACHED_IGW]->(igw:InternetGateway)
// OPTIONAL MATCH (vpc)-[:CONTAINS_NAT_GATEWAY]->(nat:NatGateway)
// OPTIONAL MATCH (vpc)-[:CONTAINS_VPC_ENDPOINT]->(endpoint:VPCEndpoint)
// RETURN vpc.name as vpc_name,
// collect(DISTINCT igw.name) as internet_gateways,
// collect(DISTINCT nat.name) as nat_gateways,
// collect(DISTINCT endpoint.name) as vpc_endpoints;
(rule2)-[:APPLIES_TO_SG]->(sg_web);
MATCH (sg_web:SecurityGroup {id: "sg-web12345"}), (rule3:SecurityRule {id: "rule-web-all-out"})
CREATE (sg_web)-[:HAS_RULE]->(rule3),
(rule3)-[:APPLIES_TO_SG]->(sg_web);
MATCH (sg_app:SecurityGroup {id: "sg-app67890"}), (rule4:SecurityRule {id: "rule-app-from-web"})
CREATE (sg_app)-[:HAS_RULE]->(rule4),
(rule4)-[:APPLIES_TO_SG]->(sg_app);
MATCH (sg_db:SecurityGroup {id: "sg-db11111"}), (rule5:SecurityRule {id: "rule-db-from-app"})
CREATE (sg_db)-[:HAS_RULE]->(rule5),
(rule5)-[:APPLIES_TO_SG]->(sg_db);
// Security Group间的引用关系
MATCH (rule4:SecurityRule {id: "rule-app-from-web"}), (sg_web:SecurityGroup {id: "sg-web12345"})
CREATE (rule4)-[:REFERENCES_SG]->(sg_web);
MATCH (rule5:SecurityRule {id: "rule-db-from-app"}), (sg_app:SecurityGroup {id: "sg-app67890"})
CREATE (rule5)-[:REFERENCES_SG]->(sg_app);
// VPC Endpoints关系
MATCH (endpoint_s3:VPCEndpoint {id: "vpce-s3-12345"}), (vpc1:VPC {id: "vpc-12345678"})
CREATE (endpoint_s3)-[:BELONGS_TO_VPC]->(vpc1),
(vpc1)-[:CONTAINS_VPC_ENDPOINT]->(endpoint_s3);
MATCH (endpoint_ec2:VPCEndpoint {id: "vpce-ec2-67890"}), (vpc1:VPC {id: "vpc-12345678"})
CREATE (endpoint_ec2)-[:BELONGS_TO_VPC]->(vpc1),
(vpc1)-[:CONTAINS_VPC_ENDPOINT]->(endpoint_ec2);
MATCH (endpoint_ec2:VPCEndpoint {id: "vpce-ec2-67890"}), (subnet2:Subnet {id: "subnet-def67890"})
CREATE (endpoint_ec2)-[:DEPLOYED_IN_SUBNET]->(subnet2),
(subnet2)-[:HOSTS_VPC_ENDPOINT]->(endpoint_ec2);
// 更新Route Table中NAT Gateway路由
MATCH (rt_private:RouteTable {id: "rtb-private-456"})
SET rt_private.routes = [
{
destination: "10.0.0.0/16",
target: "local",
status: "active"
},
{
destination: "0.0.0.0/0",
target: "nat-12345abc",
status: "active"
}
];
// ==========================================
// 10. VPC Flow Logs与S3关联关系预留
// ==========================================
// 注意:这里预留了与S3资源的关联关系,当S3建模完成后建立
// (vpc1)-[:LOGS_TO_S3]->(s3_bucket)
// ==========================================
// 11. 网络资源验证查询示例
// ==========================================
// 查询完整的网络安全架构
// MATCH (vpc:VPC {id: "vpc-12345678"})-[:CONTAINS_SECURITY_GROUP]->(sg:SecurityGroup)-[:HAS_RULE]->(rule:SecurityRule)
// RETURN vpc.name as vpc, sg.name as security_group,
// collect({direction: rule.direction, protocol: rule.protocol, port: rule.port_range, source: rule.source}) as rules;
// 查询NAT Gateway的完整配置
// MATCH (nat:NatGateway {id: "nat-12345abc"})
// OPTIONAL MATCH (nat)-[:USES_EIP]->(eip:EIP)
// OPTIONAL MATCH (nat)-[:USES_NETWORK_INTERFACE]->(eni:NetworkInterface)
// OPTIONAL MATCH (nat)-[:DEPLOYED_IN_SUBNET]->(subnet:Subnet)
// RETURN nat.name as nat_gateway, eip.address as public_ip, eni.private_ip as private_ip, subnet.name as subnet;
// 查询Security Group间的依赖关系
// MATCH (sg1:SecurityGroup)-[:HAS_RULE]->(rule:SecurityRule)-[:REFERENCES_SG]->(sg2:SecurityGroup)
// RETURN sg1.name as source_sg, rule.description as rule_desc, sg2.name as referenced_sg;
// 查询VPC的所有网络流量出口
// MATCH (vpc:VPC {id: "vpc-12345678"})
// OPTIONAL MATCH (vpc)-[:ATTACHED_IGW]->(igw:InternetGateway)
// OPTIONAL MATCH (vpc)-[:CONTAINS_NAT_GATEWAY]->(nat:NatGateway)
// OPTIONAL MATCH (vpc)-[:CONTAINS_VPC_ENDPOINT]->(endpoint:VPCEndpoint)
// RETURN vpc.name as vpc_name,
// collect(DISTINCT igw.name) as internet_gateways,
// collect(DISTINCT nat.name) as nat_gateways,
// collect(DISTINCT endpoint.name) as vpc_endpoints;
"App port from web tier",
rule_action: "allow",
status: "active",
created_at: datetime(),
updated_at: datetime()
});
// Database Security Group Rules
CREATE (rule5:SecurityRule {
id: "rule-db-from-app",
direction: "inbound",
protocol: "tcp",
port_range: "3306",
source_type: "security_group",
source: "sg-app67890",
description: "MySQL from app tier",
rule_action: "allow",
status: "active",
created_at: datetime(),
updated_at: datetime()
});
// 8.6 VPC Endpoints 建模
CREATE (endpoint_s3:VPCEndpoint {
id: "vpce-s3-12345",
name: "s3-gateway-endpoint",
associations_vpc: "vpc-12345678",
associations_subnet: null, // Gateway endpoint不关联subnet
type: "Gateway",
service: "com.amazonaws.cn-north-1.s3",
route_table_ids: ["rtb-private-456"],
tag: {
service_type: "storage",
environment: "production"
},
status: "available",
created_at: datetime(),
updated_at: datetime()
});
CREATE (endpoint_ec2:VPCEndpoint {
id: "vpce-ec2-67890",
name: "ec2-interface-endpoint",
associations_vpc: "vpc-12345678",
associations_subnet: ["subnet-def67890"], // Interface endpoint关联subnet
type: "Interface",
service: "com.amazonaws.cn-north-1.ec2",
network_interface_ids: ["eni-endpoint-123"],
security_group_ids: ["sg-endpoint-456"],
tag: {
service_type: "compute",
environment: "production"
},
status: "available",
created_at: datetime(),
updated_at: datetime()
});
// ==========================================
// 9. 建立高级网络组件关系
// ==========================================
// EIP与多资源的多态关联(使用泛型关系)
MATCH (eip1:EIP {allocation_id: "eipalloc-12345abc"}), (nat1:NatGateway {id: "nat-12345abc"})
CREATE (eip1)-[:ASSOCIATED_WITH {resource_type: "nat_gateway"}]->(nat1),
(nat1)-[:USES_EIP]->(eip1);
MATCH (eip1:EIP {allocation_id: "eipalloc-12345abc"}), (eni1:NetworkInterface {id: "eni-12345abc"})
CREATE (eip1)-[:ATTACHED_TO_ENI]->(eni1),
(eni1)-[:HAS_EIP]->(eip1);
// 预留EC2与EIP关联(EC2建模完成后)
// MATCH (eip2:EIP {allocation_id: "eipalloc-67890xyz"}), (ec2:EC2Instance {id: "i-1234567890abcdef0"})
// CREATE (eip2)-[:ASSOCIATED_WITH {resource_type: "ec2_instance"}]->(ec2);
// NAT Gateway关系
MATCH (nat1:NatGateway {id: "nat-12345abc"}), (vpc1:VPC {id: "vpc-12345678"})
CREATE (nat1)-[:BELONGS_TO_VPC]->(vpc1),
(vpc1)-[:CONTAINS_NAT_GATEWAY]->(nat1);
MATCH (nat1:NatGateway {id: "nat-12345abc"}), (subnet1:Subnet {id: "subnet-abc12345"})
CREATE (nat1)-[:DEPLOYED_IN_SUBNET]->(subnet1),
(subnet1)-[:HOSTS_NAT_GATEWAY]->(nat1);
MATCH (nat1:NatGateway {id: "nat-12345abc"}), (eni1:NetworkInterface {id: "eni-12345abc"})
CREATE (nat1)-[:USES_NETWORK_INTERFACE]->(eni1),
(eni1)-[:ATTACHED_TO_NAT_GATEWAY]->(nat1);
// Network Interface关系
MATCH (eni1:NetworkInterface {id: "eni-12345abc"}), (subnet1:Subnet {id: "subnet-abc12345"})
CREATE (eni1)-[:DEPLOYED_IN_SUBNET]->(subnet1),
(subnet1)-[:HOSTS_NETWORK_INTERFACE]->(eni1);
MATCH (eni2:NetworkInterface {id: "eni-67890def"}), (subnet1:Subnet {id: "subnet-abc12345"})
CREATE (eni2)-[:DEPLOYED_IN_SUBNET]->(subnet1),
(subnet1)-[:HOSTS_NETWORK_INTERFACE]->(eni2);
// Security Group关系
MATCH (sg_web:SecurityGroup {id: "sg-web12345"}), (vpc1:VPC {id: "vpc-12345678"})
CREATE (sg_web)-[:BELONGS_TO_VPC]->(vpc1),
(vpc1)-[:CONTAINS_SECURITY_GROUP]->(sg_web);
MATCH (sg_app:SecurityGroup {id: "sg-app67890"}), (vpc1:VPC {id: "vpc-12345678"})
CREATE (sg_app)-[:BELONGS_TO_VPC]->(vpc1),
(vpc1)-[:CONTAINS_SECURITY_GROUP]->(sg_app);
MATCH (sg_db:SecurityGroup {id: "sg-db11111"}), (vpc1:VPC {id: "vpc-12345678"})
CREATE (sg_db)-[:BELONGS_TO_VPC]->(vpc1),
(vpc1)-[:CONTAINS_SECURITY_GROUP]->(sg_db);
// Security Group Rules关系
MATCH (sg_web:SecurityGroup {id: "sg-web12345"}), (rule1:SecurityRule {id: "rule-web-http-in"})
CREATE (sg_web)-[:HAS_RULE]->(rule1),
(rule1)-[:APPLIES_TO_SG]->(sg_web);
MATCH (sg_web:SecurityGroup {id: "sg-web12345"}), (rule2:SecurityRule {id: "rule-web-https-in"})
CREATE (sg
rule_action: "allow",
status: "active",
created_at: datetime(),
updated_at: datetime()
});
// Database Security Group Rules
CREATE (rule5:SecurityRule {
id: "rule-db-from-app",
direction: "inbound",
protocol: "tcp",
port_range: "3306",
source_type: "security_group",
source: "sg-app67890",
description: "MySQL from app tier",
rule_action: "allow",
status: "active",
created_at: datetime(),
updated_at: datetime()
});
// 8.6 VPC Endpoints 建模
CREATE (endpoint_s3:VPCEndpoint {
id: "vpce-s3-12345",
name: "s3-gateway-endpoint",
associations_vpc: "vpc-12345678",
associations_subnet: null, // Gateway endpoint不关联subnet
type: "Gateway",
service: "com.amazonaws.cn-north-1.s3",
route_table_ids: ["rtb-private-456"],
tag: {
service_type: "storage",
environment: "production"
},
status: "available",
created_at: datetime(),
updated_at: datetime()
});
CREATE (endpoint_ec2:VPCEndpoint {
id: "vpce-ec2-67890",
name: "ec2-interface-endpoint",
associations_vpc: "vpc-12345678",
associations_subnet: ["subnet-def67890"], // Interface endpoint关联subnet
type: "Interface",
service: "com.amazonaws.cn-north-1.ec2",
network_interface_ids: ["eni-endpoint-123"],
security_group_ids: ["sg-endpoint-456"],
tag: {
service_type: "compute",
environment: "production"
},
status: "available",
created_at: datetime(),
updated_at: datetime()
});
// ==========================================
// 9. 建立高级网络组件关系
// ==========================================
// EIP与多资源的多态关联(使用泛型关系)
MATCH (eip1:EIP {allocation_id: "eipalloc-12345abc"}), (nat1:NatGateway {id: "nat-12345abc"})
CREATE (eip1)-[:ASSOCIATED_WITH {resource_type: "nat_gateway"}]->(nat1),
(nat1)-[:USES_EIP]->(eip1);
MATCH (eip1:EIP {allocation_id: "eipalloc-12345abc"}), (eni1:NetworkInterface {id: "eni-12345abc"})
CREATE (eip1)-[:ATTACHED_TO_ENI]->(eni1),
(eni1)-[:HAS_EIP]->(eip1);
// 预留EC2与EIP关联(EC2建模完成后)
// MATCH (eip2:EIP {allocation_id: "eipalloc-67890xyz"}), (ec2:EC2Instance {id: "i-1234567890abcdef0"})
// CREATE (eip2)-[:ASSOCIATED_WITH {resource_type: "ec2_instance"}]->(ec2);
// NAT Gateway关系
MATCH (nat1:NatGateway {id: "nat-12345abc"}), (vpc1:VPC {id: "vpc-12345678"})
CREATE (nat1)-[:BELONGS_TO_VPC]->(vpc1),
(vpc1)-[:CONTAINS_NAT_GATEWAY]->(nat1);
MATCH (nat1:NatGateway {id: "nat-12345abc"}), (subnet1:Subnet {id: "subnet-abc12345"})
CREATE (nat1)-[:DEPLOYED_IN_SUBNET]->(subnet1),
(subnet1)-[:HOSTS_NAT_GATEWAY]->(nat1);
MATCH (nat1:NatGateway {id: "nat-12345abc"}), (eni1:NetworkInterface {id: "eni-12345abc"})
CREATE (nat1)-[:USES_NETWORK_INTERFACE]->(eni1),
(eni1)-[:ATTACHED_TO_NAT_GATEWAY]->(nat1);
// Network Interface关系
MATCH (eni1:NetworkInterface {id: "eni-12345abc"}), (subnet1:Subnet {id: "subnet-abc12345"})
CREATE (eni1)-[:DEPLOYED_IN_SUBNET]->(subnet1),
(subnet1)-[:HOSTS_NETWORK_INTERFACE]->(eni1);
MATCH (eni2:NetworkInterface {id: "eni-67890def"}), (subnet1:Subnet {id: "subnet-abc12345"})
CREATE (eni2)-[:DEPLOYED_IN_SUBNET]->(subnet1),
(subnet1)-[:HOSTS_NETWORK_INTERFACE]->(eni2);
// Security Group关系
MATCH (sg_web:SecurityGroup {id: "sg-web12345"}), (vpc1:VPC {id: "vpc-12345678"})
CREATE (sg_web)-[:BELONGS_TO_VPC]->(vpc1),
(vpc1)-[:CONTAINS_SECURITY_GROUP]->(sg_web);
MATCH (sg_app:SecurityGroup {id: "sg-app67890"}), (vpc1:VPC {id: "vpc-12345678"})
CREATE (sg_app)-[:BELONGS_TO_VPC]->(vpc1),
(vpc1)-[:CONTAINS_SECURITY_GROUP]->(sg_app);
MATCH (sg_db:SecurityGroup {id: "sg-db11111"}), (vpc1:VPC {id: "vpc-12345678"})
CREATE (sg_db)-[:BELONGS_TO_VPC]->(vpc1),
(vpc1)-[:CONTAINS_SECURITY_GROUP]->(sg_db);
// Security Group Rules关系
MATCH (sg_web:SecurityGroup {id: "sg-web12345"}), (rule1:SecurityRule {id: "rule-web-http-in"})
CREATE (sg_web)-[:HAS_RULE]->(rule1),
(rule1)-[:APPLIES_TO_SG]->(sg_web);
MATCH (sg_web:SecurityGroup {id: "sg-web12345"}), (rule2:SecurityRule {id: "rule-web-https-in"})
CREATE (sg
.2 Network Interface (ENI) 建模
CREATE (eni1:NetworkInterface {
id: "eni-12345abc",
name: "nat-gateway-eni-1a",
type: "nat_gateway",
private_ip: "10.0.1.100",
private_dns: "ip-10-0-1-100.ec2.internal",
subnet_id: "subnet-abc12345",
vpc_id: "vpc-12345678",
az: "cn-north-1a",
security_groups: ["sg-nat12345"],
source_dest_check: false,
tag: {
attached_resource: "nat-gateway",
environment: "production"
},
status: "in-use",
created_at: datetime(),
updated_at: datetime()
});
CREATE (eni2:NetworkInterface {
id: "eni-67890def",
name: "web-server-eni",
type: "instance",
private_ip: "10.0.1.50",
private_dns: "ip-10-0-1-50.ec2.internal",
subnet_id: "subnet-abc12345",
vpc_id: "vpc-12345678",
az: "cn-north-1a",
security_groups: ["sg-web12345"],
source_dest_check: true,
tag: {
attached_resource: "ec2_instance",
environment: "production"
},
status: "in-use",
created_at: datetime(),
updated_at: datetime()
});
// 8.3 NAT Gateway 建模
CREATE (nat1:NatGateway {
id: "nat-12345abc",
name: "production-nat-1a",
arn: "arn:aws:ec2:cn-north-1:123456789012:natgateway/nat-12345abc",
public_ip: "54.123.45.67",
private_ip: "10.0.1.100",
associated_vpc: "vpc-12345678",
associated_subnet: "subnet-abc12345",
network_interface_id: "eni-12345abc",
eip_allocation_id: "eipalloc-12345abc",
tag: {
environment: "production",
purpose: "private_subnet_internet_access",
tier: "networking"
},
status: "available",
created_at: datetime(),
updated_at: datetime()
});
// 8.4 Security Group 建模
CREATE (sg_web:SecurityGroup {
id: "sg-web12345",
name: "production-web-sg",
description: "Security group for web servers",
associated_vpc_id: "vpc-12345678",
tag: {
environment: "production",
tier: "web",
application: "frontend"
},
status: "active",
created_at: datetime(),
updated_at: datetime()
});
CREATE (sg_app:SecurityGroup {
id: "sg-app67890",
name: "production-app-sg",
description: "Security group for application servers",
associated_vpc_id: "vpc-12345678",
tag: {
environment: "production",
tier: "application",
application: "backend"
},
status: "active",
created_at: datetime(),
updated_at: datetime()
});
CREATE (sg_db:SecurityGroup {
id: "sg-db11111",
name: "production-db-sg",
description: "Security group for database servers",
associated_vpc_id: "vpc-12345678",
tag: {
environment: "production",
tier: "database",
application: "mysql"
},
status: "active",
created_at: datetime(),
updated_at: datetime()
});
// 8.5 Security Rules 建模(独立节点)
// Web Security Group Rules
CREATE (rule1:SecurityRule {
id: "rule-web-http-in",
direction: "inbound",
protocol: "tcp",
port_range: "80",
source_type: "cidr",
source: "0.0.0.0/0",
description: "HTTP from anywhere",
rule_action: "allow",
status: "active",
created_at: datetime(),
updated_at: datetime()
});
CREATE (rule2:SecurityRule {
id: "rule-web-https-in",
direction: "inbound",
protocol: "tcp",
port_range: "443",
source_type: "cidr",
source: "0.0.0.0/0",
description: "HTTPS from anywhere",
rule_action: "allow",
status: "active",
created_at: datetime(),
updated_at: datetime()
});
CREATE (rule3:SecurityRule {
id: "rule-web-all-out",
direction: "outbound",
protocol: "all",
port_range: "all",
source_type: "cidr",
source: "0.0.0.0/0",
description: "All outbound traffic",
rule_action: "allow",
status: "active",
created_at: datetime(),
updated_at: datetime()
});
// App Security Group Rules
CREATE (rule4:SecurityRule {
id: "rule-app-from-web",
direction: "inbound",
protocol: "tcp",
port_range: "8080",
source_type: "security_group",
source: "sg-web12345",
description:
CREATE (eni1:NetworkInterface {
id: "eni-12345abc",
name: "nat-gateway-eni-1a",
type: "nat_gateway",
private_ip: "10.0.1.100",
private_dns: "ip-10-0-1-100.ec2.internal",
subnet_id: "subnet-abc12345",
vpc_id: "vpc-12345678",
az: "cn-north-1a",
security_groups: ["sg-nat12345"],
source_dest_check: false,
tag: {
attached_resource: "nat-gateway",
environment: "production"
},
status: "in-use",
created_at: datetime(),
updated_at: datetime()
});
CREATE (eni2:NetworkInterface {
id: "eni-67890def",
name: "web-server-eni",
type: "instance",
private_ip: "10.0.1.50",
private_dns: "ip-10-0-1-50.ec2.internal",
subnet_id: "subnet-abc12345",
vpc_id: "vpc-12345678",
az: "cn-north-1a",
security_groups: ["sg-web12345"],
source_dest_check: true,
tag: {
attached_resource: "ec2_instance",
environment: "production"
},
status: "in-use",
created_at: datetime(),
updated_at: datetime()
});
// 8.3 NAT Gateway 建模
CREATE (nat1:NatGateway {
id: "nat-12345abc",
name: "production-nat-1a",
arn: "arn:aws:ec2:cn-north-1:123456789012:natgateway/nat-12345abc",
public_ip: "54.123.45.67",
private_ip: "10.0.1.100",
associated_vpc: "vpc-12345678",
associated_subnet: "subnet-abc12345",
network_interface_id: "eni-12345abc",
eip_allocation_id: "eipalloc-12345abc",
tag: {
environment: "production",
purpose: "private_subnet_internet_access",
tier: "networking"
},
status: "available",
created_at: datetime(),
updated_at: datetime()
});
// 8.4 Security Group 建模
CREATE (sg_web:SecurityGroup {
id: "sg-web12345",
name: "production-web-sg",
description: "Security group for web servers",
associated_vpc_id: "vpc-12345678",
tag: {
environment: "production",
tier: "web",
application: "frontend"
},
status: "active",
created_at: datetime(),
updated_at: datetime()
});
CREATE (sg_app:SecurityGroup {
id: "sg-app67890",
name: "production-app-sg",
description: "Security group for application servers",
associated_vpc_id: "vpc-12345678",
tag: {
environment: "production",
tier: "application",
application: "backend"
},
status: "active",
created_at: datetime(),
updated_at: datetime()
});
CREATE (sg_db:SecurityGroup {
id: "sg-db11111",
name: "production-db-sg",
description: "Security group for database servers",
associated_vpc_id: "vpc-12345678",
tag: {
environment: "production",
tier: "database",
application: "mysql"
},
status: "active",
created_at: datetime(),
updated_at: datetime()
});
// 8.5 Security Rules 建模(独立节点)
// Web Security Group Rules
CREATE (rule1:SecurityRule {
id: "rule-web-http-in",
direction: "inbound",
protocol: "tcp",
port_range: "80",
source_type: "cidr",
source: "0.0.0.0/0",
description: "HTTP from anywhere",
rule_action: "allow",
status: "active",
created_at: datetime(),
updated_at: datetime()
});
CREATE (rule2:SecurityRule {
id: "rule-web-https-in",
direction: "inbound",
protocol: "tcp",
port_range: "443",
source_type: "cidr",
source: "0.0.0.0/0",
description: "HTTPS from anywhere",
rule_action: "allow",
status: "active",
created_at: datetime(),
updated_at: datetime()
});
CREATE (rule3:SecurityRule {
id: "rule-web-all-out",
direction: "outbound",
protocol: "all",
port_range: "all",
source_type: "cidr",
source: "0.0.0.0/0",
description: "All outbound traffic",
rule_action: "allow",
status: "active",
created_at: datetime(),
updated_at: datetime()
});
// App Security Group Rules
CREATE (rule4:SecurityRule {
id: "rule-app-from-web",
direction: "inbound",
protocol: "tcp",
port_range: "8080",
source_type: "security_group",
source: "sg-web12345",
description:
cidr: "10.0.1.0/24",
az: "cn-north-1a",
arn: "arn:aws:ec2:cn-north-1:123456789012:subnet/subnet-abc12345",
type: "public",
available_ipv4_addresses: 248,
auto_assign_public_ip: true,
map_public_ip_on_launch: true,
associated_acl: "acl-default-123",
associated_route_table: "rtb-public-123",
subnet_flow_logs: {
enabled: true,
log_destination: "s3://subnet-flow-logs-bucket"
},
tag: {
tier: "web",
environment: "production",
subnet_type: "public"
},
status: "active",
created_at: datetime(),
updated_at: datetime()
});
CREATE (subnet2:Subnet {
id: "subnet-def67890",
name: "production-app-subnet-1a",
cidr: "10.0.2.0/24",
az: "cn-north-1a",
arn: "arn:aws:ec2:cn-north-1:123456789012:subnet/subnet-def67890",
type: "private",
available_ipv4_addresses: 245,
auto_assign_public_ip: false,
map_public_ip_on_launch: false,
associated_acl: "acl-private-456",
associated_route_table: "rtb-private-456",
subnet_flow_logs: {
enabled: true,
log_destination: "s3://subnet-flow-logs-bucket"
},
tag: {
tier: "application",
environment: "production",
subnet_type: "private"
},
status: "active",
created_at: datetime(),
updated_at: datetime()
});
CREATE (subnet3:Subnet {
id: "subnet-ghi13579",
name: "production-db-subnet-1a",
cidr: "10.0.3.0/24",
az: "cn-north-1a",
arn: "arn:aws:ec2:cn-north-1:123456789012:subnet/subnet-ghi13579",
type: "private",
available_ipv4_addresses: 250,
auto_assign_public_ip: false,
map_public_ip_on_launch: false,
associated_acl: "acl-database-789",
associated_route_table: "rtb-database-789",
subnet_flow_logs: {
enabled: false,
log_destination: null
},
tag: {
tier: "database",
environment: "production",
subnet_type: "private",
encryption: "required"
},
status: "active",
created_at: datetime(),
updated_at: datetime()
});
// 6.3 Internet Gateway 建模
CREATE (igw1:InternetGateway {
id: "igw-12345abc",
name: "production-main-igw",
associations_vpc: "vpc-12345678",
tag: {
environment: "production",
purpose: "main-internet-gateway"
},
status: "active",
created_at: datetime(),
updated_at: datetime()
});
// 6.4 Route Table 建模
CREATE (rt_public:RouteTable {
id: "rtb-public-123",
name: "production-public-rt",
associations_subnets: ["subnet-abc12345"],
associations_vpc: "vpc-12345678",
routes: [
{
destination: "10.0.0.0/16",
target: "local",
status: "active"
},
{
destination: "0.0.0.0/0",
target: "igw-12345abc",
status: "active"
}
],
tag: {
type: "public",
environment: "production"
},
status: "active",
created_at: datetime(),
updated_at: datetime()
});
CREATE (rt_private:RouteTable {
id: "rtb-private-456",
name: "production-private-rt",
associations_subnets: ["subnet-def67890"],
associations_vpc: "vpc-12345678",
routes: [
{
destination: "10.0.0.0/16",
target: "local",
status: "active"
},
{
destination: "0.0.0.0/0",
target: "nat-gateway-123",
status: "active"
}
],
tag: {
type: "private",
environment: "production"
},
status: "active",
created_at: datetime(),
updated_at: datetime()
});
// ==========================================
// 7. 建立网络资源关系(包含双向关系)
// ==========================================
// Account <-> VPC 关系
MATCH (acc:Account {id: "123456789012"}), (vpc1:VPC {id: "vpc-12345678"})
CREATE (acc)-[:CONTAINS_VPC]->(vpc1),
(vpc1)-[:BELONGS_TO_ACCOUNT]->(acc);
MATCH (acc:Account {id: "123456789012"}), (vpc2:VPC {id: "vpc-87654321"})
CREATE (acc)-[:CONTAINS_VPC]->(vpc2),
(vpc2)-[:BELONGS_TO_ACCOUNT]->(acc);
//
az: "cn-north-1a",
arn: "arn:aws:ec2:cn-north-1:123456789012:subnet/subnet-abc12345",
type: "public",
available_ipv4_addresses: 248,
auto_assign_public_ip: true,
map_public_ip_on_launch: true,
associated_acl: "acl-default-123",
associated_route_table: "rtb-public-123",
subnet_flow_logs: {
enabled: true,
log_destination: "s3://subnet-flow-logs-bucket"
},
tag: {
tier: "web",
environment: "production",
subnet_type: "public"
},
status: "active",
created_at: datetime(),
updated_at: datetime()
});
CREATE (subnet2:Subnet {
id: "subnet-def67890",
name: "production-app-subnet-1a",
cidr: "10.0.2.0/24",
az: "cn-north-1a",
arn: "arn:aws:ec2:cn-north-1:123456789012:subnet/subnet-def67890",
type: "private",
available_ipv4_addresses: 245,
auto_assign_public_ip: false,
map_public_ip_on_launch: false,
associated_acl: "acl-private-456",
associated_route_table: "rtb-private-456",
subnet_flow_logs: {
enabled: true,
log_destination: "s3://subnet-flow-logs-bucket"
},
tag: {
tier: "application",
environment: "production",
subnet_type: "private"
},
status: "active",
created_at: datetime(),
updated_at: datetime()
});
CREATE (subnet3:Subnet {
id: "subnet-ghi13579",
name: "production-db-subnet-1a",
cidr: "10.0.3.0/24",
az: "cn-north-1a",
arn: "arn:aws:ec2:cn-north-1:123456789012:subnet/subnet-ghi13579",
type: "private",
available_ipv4_addresses: 250,
auto_assign_public_ip: false,
map_public_ip_on_launch: false,
associated_acl: "acl-database-789",
associated_route_table: "rtb-database-789",
subnet_flow_logs: {
enabled: false,
log_destination: null
},
tag: {
tier: "database",
environment: "production",
subnet_type: "private",
encryption: "required"
},
status: "active",
created_at: datetime(),
updated_at: datetime()
});
// 6.3 Internet Gateway 建模
CREATE (igw1:InternetGateway {
id: "igw-12345abc",
name: "production-main-igw",
associations_vpc: "vpc-12345678",
tag: {
environment: "production",
purpose: "main-internet-gateway"
},
status: "active",
created_at: datetime(),
updated_at: datetime()
});
// 6.4 Route Table 建模
CREATE (rt_public:RouteTable {
id: "rtb-public-123",
name: "production-public-rt",
associations_subnets: ["subnet-abc12345"],
associations_vpc: "vpc-12345678",
routes: [
{
destination: "10.0.0.0/16",
target: "local",
status: "active"
},
{
destination: "0.0.0.0/0",
target: "igw-12345abc",
status: "active"
}
],
tag: {
type: "public",
environment: "production"
},
status: "active",
created_at: datetime(),
updated_at: datetime()
});
CREATE (rt_private:RouteTable {
id: "rtb-private-456",
name: "production-private-rt",
associations_subnets: ["subnet-def67890"],
associations_vpc: "vpc-12345678",
routes: [
{
destination: "10.0.0.0/16",
target: "local",
status: "active"
},
{
destination: "0.0.0.0/0",
target: "nat-gateway-123",
status: "active"
}
],
tag: {
type: "private",
environment: "production"
},
status: "active",
created_at: datetime(),
updated_at: datetime()
});
// ==========================================
// 7. 建立网络资源关系(包含双向关系)
// ==========================================
// Account <-> VPC 关系
MATCH (acc:Account {id: "123456789012"}), (vpc1:VPC {id: "vpc-12345678"})
CREATE (acc)-[:CONTAINS_VPC]->(vpc1),
(vpc1)-[:BELONGS_TO_ACCOUNT]->(acc);
MATCH (acc:Account {id: "123456789012"}), (vpc2:VPC {id: "vpc-87654321"})
CREATE (acc)-[:CONTAINS_VPC]->(vpc2),
(vpc2)-[:BELONGS_TO_ACCOUNT]->(acc);
//
-DC-Beta",
power_redundancy: "N+1"
},
status: "active",
created_at: datetime(),
updated_at: datetime()
});
CREATE (az3:AZ {
id: "cn-north-1d",
name: "Beijing Zone D",
tag: {
physical_location: "Beijing-DC-Delta",
power_redundancy: "2N"
},
status: "active",
created_at: datetime(),
updated_at: datetime()
});
// Ningxia AZs
CREATE (az4:AZ {
id: "cn-northwest-1a",
name: "Ningxia Zone A",
tag: {
physical_location: "Ningxia-DC-Alpha",
power_redundancy: "N+1"
},
status: "active",
created_at: datetime(),
updated_at: datetime()
});
CREATE (az5:AZ {
id: "cn-northwest-1b",
name: "Ningxia Zone B",
tag: {
physical_location: "Ningxia-DC-Beta",
power_redundancy: "N+1"
},
status: "active",
created_at: datetime(),
updated_at: datetime()
});
CREATE (az6:AZ {
id: "cn-northwest-1c",
name: "Ningxia Zone C",
tag: {
physical_location: "Ningxia-DC-Gamma",
power_redundancy: "2N"
},
status: "active",
created_at: datetime(),
updated_at: datetime()
});
// ==========================================
// 5. 建立基础层次关系
// ==========================================
// Account -> Region 关系
MATCH (acc:Account {id: "123456789012"}), (r1:Region {id: "cn-north-1"})
CREATE (acc)-[:CONTAINS_REGION]->(r1);
MATCH (acc:Account {id: "123456789012"}), (r2:Region {id: "cn-northwest-1"})
CREATE (acc)-[:CONTAINS_REGION]->(r2);
// Region -> AZ 关系
MATCH (r1:Region {id: "cn-north-1"}), (az1:AZ {id: "cn-north-1a"})
CREATE (r1)-[:CONTAINS_AZ]->(az1);
MATCH (r1:Region {id: "cn-north-1"}), (az2:AZ {id: "cn-north-1b"})
CREATE (r1)-[:CONTAINS_AZ]->(az2);
MATCH (r1:Region {id: "cn-north-1"}), (az3:AZ {id: "cn-north-1d"})
CREATE (r1)-[:CONTAINS_AZ]->(az3);
MATCH (r2:Region {id: "cn-northwest-1"}), (az4:AZ {id: "cn-northwest-1a"})
CREATE (r2)-[:CONTAINS_AZ]->(az4);
MATCH (r2:Region {id: "cn-northwest-1"}), (az5:AZ {id: "cn-northwest-1b"})
CREATE (r2)-[:CONTAINS_AZ]->(az5);
MATCH (r2:Region {id: "cn-northwest-1"}), (az6:AZ {id: "cn-northwest-1c"})
CREATE (r2)-[:CONTAINS_AZ]->(az6);
// ==========================================
// 6. 网络资源建模 - VPC & Subnet
// ==========================================
// 创建VPC相关约束
CREATE CONSTRAINT vpc_id IF NOT EXISTS FOR (v:VPC) REQUIRE v.id IS UNIQUE;
CREATE CONSTRAINT subnet_id IF NOT EXISTS FOR (s:Subnet) REQUIRE s.id IS UNIQUE;
CREATE CONSTRAINT route_table_id IF NOT EXISTS FOR (rt:RouteTable) REQUIRE rt.id IS UNIQUE;
CREATE CONSTRAINT igw_id IF NOT EXISTS FOR (igw:InternetGateway) REQUIRE igw.id IS UNIQUE;
// 6.1 VPC 资源建模
CREATE (vpc1:VPC {
id: "vpc-12345678",
name: "production-main-vpc",
cidr: "10.0.0.0/16",
vpc_flow_logs: {
enabled: true,
log_destination_type: "s3",
log_destination: "s3://vpc-flow-logs-prod-bucket",
log_format: "${srcaddr} ${dstaddr} ${srcport} ${dstport} ${protocol} ${packets} ${bytes} ${start} ${end} ${action}",
log_status: "ACTIVE",
delivery_status: "SUCCESS"
},
dns_hostnames: true,
dns_resolution: true,
tag: {
environment: "production",
project: "core-platform",
team: "platform-engineering",
backup: "daily"
},
status: "active",
created_at: datetime(),
updated_at: datetime()
});
CREATE (vpc2:VPC {
id: "vpc-87654321",
name: "staging-vpc",
cidr: "10.1.0.0/16",
vpc_flow_logs: {
enabled: false,
log_destination_type: null,
log_destination: null,
log_format: null,
log_status: "INACTIVE",
delivery_status: null
},
dns_hostnames: true,
dns_resolution: true,
tag: {
environment: "staging",
project: "core-platform",
team: "platform-engineering",
backup: "none"
},
status: "active",
created_at: datetime(),
updated_at: datetime()
});
// 6.2 Subnet 资源建模
// Production VPC Subnets
CREATE (subnet1:Subnet {
id: "subnet-abc12345",
name: "production-web-subnet-1a",
power_redundancy: "N+1"
},
status: "active",
created_at: datetime(),
updated_at: datetime()
});
CREATE (az3:AZ {
id: "cn-north-1d",
name: "Beijing Zone D",
tag: {
physical_location: "Beijing-DC-Delta",
power_redundancy: "2N"
},
status: "active",
created_at: datetime(),
updated_at: datetime()
});
// Ningxia AZs
CREATE (az4:AZ {
id: "cn-northwest-1a",
name: "Ningxia Zone A",
tag: {
physical_location: "Ningxia-DC-Alpha",
power_redundancy: "N+1"
},
status: "active",
created_at: datetime(),
updated_at: datetime()
});
CREATE (az5:AZ {
id: "cn-northwest-1b",
name: "Ningxia Zone B",
tag: {
physical_location: "Ningxia-DC-Beta",
power_redundancy: "N+1"
},
status: "active",
created_at: datetime(),
updated_at: datetime()
});
CREATE (az6:AZ {
id: "cn-northwest-1c",
name: "Ningxia Zone C",
tag: {
physical_location: "Ningxia-DC-Gamma",
power_redundancy: "2N"
},
status: "active",
created_at: datetime(),
updated_at: datetime()
});
// ==========================================
// 5. 建立基础层次关系
// ==========================================
// Account -> Region 关系
MATCH (acc:Account {id: "123456789012"}), (r1:Region {id: "cn-north-1"})
CREATE (acc)-[:CONTAINS_REGION]->(r1);
MATCH (acc:Account {id: "123456789012"}), (r2:Region {id: "cn-northwest-1"})
CREATE (acc)-[:CONTAINS_REGION]->(r2);
// Region -> AZ 关系
MATCH (r1:Region {id: "cn-north-1"}), (az1:AZ {id: "cn-north-1a"})
CREATE (r1)-[:CONTAINS_AZ]->(az1);
MATCH (r1:Region {id: "cn-north-1"}), (az2:AZ {id: "cn-north-1b"})
CREATE (r1)-[:CONTAINS_AZ]->(az2);
MATCH (r1:Region {id: "cn-north-1"}), (az3:AZ {id: "cn-north-1d"})
CREATE (r1)-[:CONTAINS_AZ]->(az3);
MATCH (r2:Region {id: "cn-northwest-1"}), (az4:AZ {id: "cn-northwest-1a"})
CREATE (r2)-[:CONTAINS_AZ]->(az4);
MATCH (r2:Region {id: "cn-northwest-1"}), (az5:AZ {id: "cn-northwest-1b"})
CREATE (r2)-[:CONTAINS_AZ]->(az5);
MATCH (r2:Region {id: "cn-northwest-1"}), (az6:AZ {id: "cn-northwest-1c"})
CREATE (r2)-[:CONTAINS_AZ]->(az6);
// ==========================================
// 6. 网络资源建模 - VPC & Subnet
// ==========================================
// 创建VPC相关约束
CREATE CONSTRAINT vpc_id IF NOT EXISTS FOR (v:VPC) REQUIRE v.id IS UNIQUE;
CREATE CONSTRAINT subnet_id IF NOT EXISTS FOR (s:Subnet) REQUIRE s.id IS UNIQUE;
CREATE CONSTRAINT route_table_id IF NOT EXISTS FOR (rt:RouteTable) REQUIRE rt.id IS UNIQUE;
CREATE CONSTRAINT igw_id IF NOT EXISTS FOR (igw:InternetGateway) REQUIRE igw.id IS UNIQUE;
// 6.1 VPC 资源建模
CREATE (vpc1:VPC {
id: "vpc-12345678",
name: "production-main-vpc",
cidr: "10.0.0.0/16",
vpc_flow_logs: {
enabled: true,
log_destination_type: "s3",
log_destination: "s3://vpc-flow-logs-prod-bucket",
log_format: "${srcaddr} ${dstaddr} ${srcport} ${dstport} ${protocol} ${packets} ${bytes} ${start} ${end} ${action}",
log_status: "ACTIVE",
delivery_status: "SUCCESS"
},
dns_hostnames: true,
dns_resolution: true,
tag: {
environment: "production",
project: "core-platform",
team: "platform-engineering",
backup: "daily"
},
status: "active",
created_at: datetime(),
updated_at: datetime()
});
CREATE (vpc2:VPC {
id: "vpc-87654321",
name: "staging-vpc",
cidr: "10.1.0.0/16",
vpc_flow_logs: {
enabled: false,
log_destination_type: null,
log_destination: null,
log_format: null,
log_status: "INACTIVE",
delivery_status: null
},
dns_hostnames: true,
dns_resolution: true,
tag: {
environment: "staging",
project: "core-platform",
team: "platform-engineering",
backup: "none"
},
status: "active",
created_at: datetime(),
updated_at: datetime()
});
// 6.2 Subnet 资源建模
// Production VPC Subnets
CREATE (subnet1:Subnet {
id: "subnet-abc12345",
name: "production-web-subnet-1a",
// ==========================================
// 云资源可视化地图系统 - Neo4j 图数据库建模
// 第一阶段:核心基础资源建模
// ==========================================
// 1. 创建唯一性约束
CREATE CONSTRAINT account_id IF NOT EXISTS FOR (a:Account) REQUIRE a.id IS UNIQUE;
CREATE CONSTRAINT region_id IF NOT EXISTS FOR (r:Region) REQUIRE r.id IS UNIQUE;
CREATE CONSTRAINT az_id IF NOT EXISTS FOR (az:AZ) REQUIRE az.id IS UNIQUE;
CREATE CONSTRAINT cost_id IF NOT EXISTS FOR (c:Cost) REQUIRE c.id IS UNIQUE;
// ==========================================
// 1. Account(账号)资源建模 - 完善版
// ==========================================
CREATE (acc:Account {
id: "123456789012",
name: "production-account",
projects: ["bdp", "dkms", "dqa", "dir", "analytics", "security"],
organization: "TechCorp-Platform-Engineering",
env: "prod",
owner: "[email protected]",
status: "active",
tag: {
cost_center: "engineering",
department: "platform",
business_unit: "core_services",
compliance: "pci_dss"
},
created_at: datetime(),
updated_at: datetime()
});
// ==========================================
// 2. Cost(成本)节点建模 - 支持成本云图
// ==========================================
// 2.1 月度总成本节点
CREATE (cost_monthly:Cost {
id: "cost-123456789012-2024-03",
resource_id: "123456789012",
resource_type: "Account",
cost_type: "monthly_total",
amount: 25680.50,
currency: "USD",
period: "2024-03",
breakdown: {
compute: 12500.20,
storage: 3200.15,
network: 1800.30,
database: 4500.80,
lambda: 680.25,
other: 2999.80
},
tag: {
forecast: "high_confidence",
variance: "+15%"
},
status: "finalized",
created_at: datetime(),
updated_at: datetime()
});
// 2.2 日度成本节点(用于趋势分析)
CREATE (cost_daily:Cost {
id: "cost-123456789012-2024-03-15",
resource_id: "123456789012",
resource_type: "Account",
cost_type: "daily",
amount: 856.20,
currency: "USD",
period: "2024-03-15",
breakdown: {
compute: 420.50,
storage: 105.80,
network: 58.90,
database: 150.20,
lambda: 22.60,
other: 98.20
},
tag: {
anomaly: "normal",
trend: "increasing"
},
status: "estimated",
created_at: datetime(),
updated_at: datetime()
});
// Account与Cost的关系
MATCH (acc:Account {id: "123456789012"}), (c1:Cost {id: "cost-123456789012-2024-03"})
CREATE (acc)-[:HAS_COST]->(c1);
MATCH (acc:Account {id: "123456789012"}), (c2:Cost {id: "cost-123456789012-2024-03-15"})
CREATE (acc)-[:HAS_COST]->(c2);
// ==========================================
// 3. Region(区域)资源建模 - 增强版
// ==========================================
CREATE (region1:Region {
id: "cn-north-1",
name: "Beijing",
availability_sla: 99.99,
operational_metrics: {
avg_response_time: 45.2,
incident_count_monthly: 2,
maintenance_window: "Sunday 02:00-04:00 UTC+8"
},
tag: {
country: "China",
provider: "AWS",
tier: "production"
},
status: "active",
created_at: datetime(),
updated_at: datetime()
});
CREATE (region2:Region {
id: "cn-northwest-1",
name: "Ningxia",
availability_sla: 99.95,
operational_metrics: {
avg_response_time: 52.8,
incident_count_monthly: 1,
maintenance_window: "Sunday 03:00-05:00 UTC+8"
},
tag: {
country: "China",
provider: "AWS",
tier: "disaster_recovery"
},
status: "active",
created_at: datetime(),
updated_at: datetime()
});
// ==========================================
// 4. AZ(可用区)资源建模
// ==========================================
CREATE (az1:AZ {
id: "cn-north-1a",
name: "Beijing Zone A",
tag: {
physical_location: "Beijing-DC-Alpha",
power_redundancy: "N+1"
},
status: "active",
created_at: datetime(),
updated_at: datetime()
});
CREATE (az2:AZ {
id: "cn-north-1b",
name: "Beijing Zone B",
tag: {
physical_location: "Beijing-DC-Beta",
// 云资源可视化地图系统 - Neo4j 图数据库建模
// 第一阶段:核心基础资源建模
// ==========================================
// 1. 创建唯一性约束
CREATE CONSTRAINT account_id IF NOT EXISTS FOR (a:Account) REQUIRE a.id IS UNIQUE;
CREATE CONSTRAINT region_id IF NOT EXISTS FOR (r:Region) REQUIRE r.id IS UNIQUE;
CREATE CONSTRAINT az_id IF NOT EXISTS FOR (az:AZ) REQUIRE az.id IS UNIQUE;
CREATE CONSTRAINT cost_id IF NOT EXISTS FOR (c:Cost) REQUIRE c.id IS UNIQUE;
// ==========================================
// 1. Account(账号)资源建模 - 完善版
// ==========================================
CREATE (acc:Account {
id: "123456789012",
name: "production-account",
projects: ["bdp", "dkms", "dqa", "dir", "analytics", "security"],
organization: "TechCorp-Platform-Engineering",
env: "prod",
owner: "[email protected]",
status: "active",
tag: {
cost_center: "engineering",
department: "platform",
business_unit: "core_services",
compliance: "pci_dss"
},
created_at: datetime(),
updated_at: datetime()
});
// ==========================================
// 2. Cost(成本)节点建模 - 支持成本云图
// ==========================================
// 2.1 月度总成本节点
CREATE (cost_monthly:Cost {
id: "cost-123456789012-2024-03",
resource_id: "123456789012",
resource_type: "Account",
cost_type: "monthly_total",
amount: 25680.50,
currency: "USD",
period: "2024-03",
breakdown: {
compute: 12500.20,
storage: 3200.15,
network: 1800.30,
database: 4500.80,
lambda: 680.25,
other: 2999.80
},
tag: {
forecast: "high_confidence",
variance: "+15%"
},
status: "finalized",
created_at: datetime(),
updated_at: datetime()
});
// 2.2 日度成本节点(用于趋势分析)
CREATE (cost_daily:Cost {
id: "cost-123456789012-2024-03-15",
resource_id: "123456789012",
resource_type: "Account",
cost_type: "daily",
amount: 856.20,
currency: "USD",
period: "2024-03-15",
breakdown: {
compute: 420.50,
storage: 105.80,
network: 58.90,
database: 150.20,
lambda: 22.60,
other: 98.20
},
tag: {
anomaly: "normal",
trend: "increasing"
},
status: "estimated",
created_at: datetime(),
updated_at: datetime()
});
// Account与Cost的关系
MATCH (acc:Account {id: "123456789012"}), (c1:Cost {id: "cost-123456789012-2024-03"})
CREATE (acc)-[:HAS_COST]->(c1);
MATCH (acc:Account {id: "123456789012"}), (c2:Cost {id: "cost-123456789012-2024-03-15"})
CREATE (acc)-[:HAS_COST]->(c2);
// ==========================================
// 3. Region(区域)资源建模 - 增强版
// ==========================================
CREATE (region1:Region {
id: "cn-north-1",
name: "Beijing",
availability_sla: 99.99,
operational_metrics: {
avg_response_time: 45.2,
incident_count_monthly: 2,
maintenance_window: "Sunday 02:00-04:00 UTC+8"
},
tag: {
country: "China",
provider: "AWS",
tier: "production"
},
status: "active",
created_at: datetime(),
updated_at: datetime()
});
CREATE (region2:Region {
id: "cn-northwest-1",
name: "Ningxia",
availability_sla: 99.95,
operational_metrics: {
avg_response_time: 52.8,
incident_count_monthly: 1,
maintenance_window: "Sunday 03:00-05:00 UTC+8"
},
tag: {
country: "China",
provider: "AWS",
tier: "disaster_recovery"
},
status: "active",
created_at: datetime(),
updated_at: datetime()
});
// ==========================================
// 4. AZ(可用区)资源建模
// ==========================================
CREATE (az1:AZ {
id: "cn-north-1a",
name: "Beijing Zone A",
tag: {
physical_location: "Beijing-DC-Alpha",
power_redundancy: "N+1"
},
status: "active",
created_at: datetime(),
updated_at: datetime()
});
CREATE (az2:AZ {
id: "cn-north-1b",
name: "Beijing Zone B",
tag: {
physical_location: "Beijing-DC-Beta",
Claude Code Remote 可以远程发送命令给Claude Code,随时随地让AI 干活。
1. 任务完成时多渠道通知(桌面弹窗+声音+邮件+飞书)
2. 直接在手机上回复消息,Claude收到命令之后继续干活
3. 支持多轮对话,让 Claude 持续工作
Repo地址:github.com/JessyTsui/Claude-Code-Remote
4. 谷歌开源 LangExtract 从非结构化信息中提取结构化信息的 Python 库,使用 LLMs 从非结构化文本文档中提取结构化信息。
Repo地址:github.com/google/langextract
1. 任务完成时多渠道通知(桌面弹窗+声音+邮件+飞书)
2. 直接在手机上回复消息,Claude收到命令之后继续干活
3. 支持多轮对话,让 Claude 持续工作
Repo地址:github.com/JessyTsui/Claude-Code-Remote
4. 谷歌开源 LangExtract 从非结构化信息中提取结构化信息的 Python 库,使用 LLMs 从非结构化文本文档中提取结构化信息。
Repo地址:github.com/google/langextract
# 2025W31 AI大模型领域精选热点 🔥
---
## 1. Google
+ NotebookLM 的**视频摘要**功能上线,支持把笔记导出视频了!目前 NotebookLM 的 Studio 栏支持四种输出:音频、视频、思维导图、报告。地址:notebooklm.google.com
+ Google 正式向 Gemini APP Ultra 用户和部分数学家及学者推出了 **Gemini Deep Think**,能够帮助数学家证明猜想。本质上是一种并行推理方法。模型能够仔细推演复杂问题,最终产出更具创造性和深度的答案。尤其在算法设计和代码开发领域,Deep Think 能够综合考量问题的不同解法和复杂度,提升编码的效率和质量。据官方测试,Deep Think 在多项难度极高的基准测试中表现优异,尤其在代码生成和跨学科知识推理方面已经达到行业领先水平。详细介绍:blog.google/products/gemini/gemini-2-5-deep-think
+ 谷歌给 Android Studio 增加了免费的 Agent 模式!开发者可以直接跟 Agent 对话开发安卓应用。支持快速选中直接修改 UI 代码,支持自定义规则。地址:android-developers.googleblog.com/2025/07/android-studio-narwhal-feature-drop-stable-agent-mode.html
+ 谷歌搜索 AI Mode 更新,基本功能与 Gemini 功能(支持上传图片和 PDF/ Canvas 能力/视频跟 AI 实时对话)拉齐,目前只有美国和印度可以用
+ Google 新论文介绍了一种新的 Deep Researcher 思路:TTD-DR框架。人类在写作复杂主题时,通常会先制定计划,然后起草报告,并在多次修订中完善内容。这一过程与扩散模型的采样过程相似,即从噪声草稿开始,逐步去噪生成高质量输出。论文地址:arxiv.org/pdf/2507.16075
## 2. Ali 一系列模型更新
+ Qwen3-30B-A3B-2507 的推理版本,本地部署友好。 模型地址:huggingface.co/Qwen/Qwen3-30B-A3B-Thinking-2507
+ Qwen3-30B-A3B-Instruct-2507的非推理版本,本地部署友好。 模型地址:huggingface.co/Qwen/Qwen3-30B-A3B-Instruct-2507
+ Qwen3-Coder-Flash 发布,模型名称为 Qwen3-Coder-30B-A3B-Instruct。注意这也是个非思考模型。原生 256K 上下文(使用 YaRN 可以扩展高达 1M 个 token)。模型地址:huggingface.co/Qwen/Qwen3-Coder-30B-A3B-Instruct
+ 业界首个使用MoE架构的视频生成基础模型,文生视频Wan2.2-T2V-A14B、图生视频Wan2.2-I2V-A14B、统一视频生成Wan2.2-TI2V-5B。
## 3. OpenAI
+ OAI开源模型疑似漏,代号为 yofo gpt-oss 20b 和 120b,此外 openrouter 上还出现 horzon-beta 模型, 同样是256K上下文。120B 模型是 MoE 架构,激活参数大概是 5B,128 专家每次激活 4 个专家。原生只有 4K 上下文,通过 YaRN 扩展到 128K。
+ OpenAI 推出了学习模式(Study Mode)会引导用户一步步解决问题,而不仅仅是直接给出答案。感觉不是一个新模型或者agent,可能是用提示词引导的模式。
+ Sam Altman 预告本月新模型、新产品、新功能 即将发布。
## 4. 智谱发布了 GLM-4.5!
> 突出一个性价比,推出每月50块万亿token包月套餐。性能感觉稍逊于kimi 2
新模型包括 GLM-4.5-355B-A32B 和 **GLM-4.5-Air-106B-A12B**,都是**混合推理模型**,可以开关思切换考或者非思考模式。从跑分上来看,最亮眼的是仅用了大概 DeepSeek-R1 一半左右的参数量达到了一个与DeepSeek-R1 不相上下的水平。
模型地址:huggingface.co/zai-org/GLM-4.5
技术报告地址:z.ai/blog/glm-4.5
## 5. 其他动态
1. 中科院发布了首个科学基础大模型 S1-Base 磐石科学基础大模型
目前模型有 S1-Base-8B,S1-Base-32B,S1-Base-671B,其中 S1-Base-8B 和 S1-Base-32B 分别基于 Qwen3-8B 和 Qwen3-32B 训练得到,S1-Base-671B 基于 DeepSeek-R1-671B 训练得到,均支持 32k 上下文。
模型地址:huggingface.co/ScienceOne-AI/S1-Base-671B
2. 字节跳动发布文本 Diffusion 模型,Seed Diffusion Preview!
文本Diffusion 模型则是跟图像Diffusion 模型类似,是一个去噪过程,整段话随机出现文本最后组成所有输出。Diffusion 文本模型的优点是巨快,字节这个有 每秒 2146 个 token 的速度。目前除了eed Diffusion Preview以外,还有最知名的 Mercury Coder 和 Google 的 Gemini Diffusion.
发布blog: seed.bytedance.com/en/seed_diffusion
在线体验地址:studio.seed.ai/exp/seed_diffusion/
3. 中间思考模型 Dhanishtha,这个模型会想一会,然后输出一会,再想一会,再输出一会。支持工具调用。
模型地址:huggingface.co/HelpingAI/Dhanishtha-2.0-preview-0825
4. FLUX 又发新模型!FLUX.1-Krea-dev 是一个文生图模型,特点是照片级真实感。FLUX 与 Krea 联合开发。
模型地址:huggingface.co/black-forest-labs/FLUX.1-Krea-dev
5. Kimi 上架模型型号 kimi-k2-turbo-preview,猜测是 kimi-k2-0711-preview 的不同部署版本。响应速度从 10 token/s 提升到 40 token/s 。
6. ACL最佳论文 《原生稀疏注意力:硬件对齐和原生可训练的稀疏注意力》(Native Sparse Attention: Hardware-Aligned and Natively Trainable Sparse Attention) ACL 2025 超过一半的论文作者都是华人。论文地址:arxiv.org/abs/2502.11089
7. 用强化学习推动图谱检索生成《Graph-R1: Towards Agentic GraphRAG Framework via End-to-end Reinforcement Learning》,Graph-RAG(图谱增强RAG)用实体-关系图表示知识,提升了信息组织与推理能力。 论文地址:arxiv.org/abs/2507.21892
8. alphaXiv 推出专为科研打造的全新社交平台,内建类似Discord的即时聊天功能,集社区发现、论文讨论与学术交流于一体,助力研究者高效协作。热门communities:Healthcare AI community/AI Security/AI4Science,探索更多 alphaxiv.org/communities
9. 微软研究院公布可能被AI取代的职业: fortune.com/2025/07/31/microsoft-research-generative-ai-occupational-impact-jobs-most-and-least-likely-to-impact-teaching-office-jobs-college-gen-z-grads/
10. Anthropic最新研究Persona vector人格向量,Anthropic 宣布禁止 OpenAI 访问 Claude(是因为OpenAI要发新模型了嘛?)。
11. Manus 超级大更新,发布 Wide Research 功能,支持上百agent独立运行。目前已向 Pro 用户开放,未来将逐步向 Plus 和 Basic 用户开放。
## Github Repos Recommend
1. 开源的知识库 maestro 本地运行 Deep Research !!!
知识库可以导入文档,执行 RAG,最大的亮点是它内置的 Agent 可以执行 Deep Research 这种任务,并且会给出 Research 的推理过程。支持 OpenAI 风格的 API,搜索使用 SearXNG,并且有 cli 工具支持批量导入和导出。
Repo地址:github.com/murtaza-nasir/maestro
2. 提示词优化器,助力于编写高质量提示词 Prompt Optimizer,支持多种使用方式。
Repo地址:github.com/linshenkx/prompt-optimizer
3.
---
## 1. Google
+ NotebookLM 的**视频摘要**功能上线,支持把笔记导出视频了!目前 NotebookLM 的 Studio 栏支持四种输出:音频、视频、思维导图、报告。地址:notebooklm.google.com
+ Google 正式向 Gemini APP Ultra 用户和部分数学家及学者推出了 **Gemini Deep Think**,能够帮助数学家证明猜想。本质上是一种并行推理方法。模型能够仔细推演复杂问题,最终产出更具创造性和深度的答案。尤其在算法设计和代码开发领域,Deep Think 能够综合考量问题的不同解法和复杂度,提升编码的效率和质量。据官方测试,Deep Think 在多项难度极高的基准测试中表现优异,尤其在代码生成和跨学科知识推理方面已经达到行业领先水平。详细介绍:blog.google/products/gemini/gemini-2-5-deep-think
+ 谷歌给 Android Studio 增加了免费的 Agent 模式!开发者可以直接跟 Agent 对话开发安卓应用。支持快速选中直接修改 UI 代码,支持自定义规则。地址:android-developers.googleblog.com/2025/07/android-studio-narwhal-feature-drop-stable-agent-mode.html
+ 谷歌搜索 AI Mode 更新,基本功能与 Gemini 功能(支持上传图片和 PDF/ Canvas 能力/视频跟 AI 实时对话)拉齐,目前只有美国和印度可以用
+ Google 新论文介绍了一种新的 Deep Researcher 思路:TTD-DR框架。人类在写作复杂主题时,通常会先制定计划,然后起草报告,并在多次修订中完善内容。这一过程与扩散模型的采样过程相似,即从噪声草稿开始,逐步去噪生成高质量输出。论文地址:arxiv.org/pdf/2507.16075
## 2. Ali 一系列模型更新
+ Qwen3-30B-A3B-2507 的推理版本,本地部署友好。 模型地址:huggingface.co/Qwen/Qwen3-30B-A3B-Thinking-2507
+ Qwen3-30B-A3B-Instruct-2507的非推理版本,本地部署友好。 模型地址:huggingface.co/Qwen/Qwen3-30B-A3B-Instruct-2507
+ Qwen3-Coder-Flash 发布,模型名称为 Qwen3-Coder-30B-A3B-Instruct。注意这也是个非思考模型。原生 256K 上下文(使用 YaRN 可以扩展高达 1M 个 token)。模型地址:huggingface.co/Qwen/Qwen3-Coder-30B-A3B-Instruct
+ 业界首个使用MoE架构的视频生成基础模型,文生视频Wan2.2-T2V-A14B、图生视频Wan2.2-I2V-A14B、统一视频生成Wan2.2-TI2V-5B。
## 3. OpenAI
+ OAI开源模型疑似漏,代号为 yofo gpt-oss 20b 和 120b,此外 openrouter 上还出现 horzon-beta 模型, 同样是256K上下文。120B 模型是 MoE 架构,激活参数大概是 5B,128 专家每次激活 4 个专家。原生只有 4K 上下文,通过 YaRN 扩展到 128K。
+ OpenAI 推出了学习模式(Study Mode)会引导用户一步步解决问题,而不仅仅是直接给出答案。感觉不是一个新模型或者agent,可能是用提示词引导的模式。
+ Sam Altman 预告本月新模型、新产品、新功能 即将发布。
## 4. 智谱发布了 GLM-4.5!
> 突出一个性价比,推出每月50块万亿token包月套餐。性能感觉稍逊于kimi 2
新模型包括 GLM-4.5-355B-A32B 和 **GLM-4.5-Air-106B-A12B**,都是**混合推理模型**,可以开关思切换考或者非思考模式。从跑分上来看,最亮眼的是仅用了大概 DeepSeek-R1 一半左右的参数量达到了一个与DeepSeek-R1 不相上下的水平。
模型地址:huggingface.co/zai-org/GLM-4.5
技术报告地址:z.ai/blog/glm-4.5
## 5. 其他动态
1. 中科院发布了首个科学基础大模型 S1-Base 磐石科学基础大模型
目前模型有 S1-Base-8B,S1-Base-32B,S1-Base-671B,其中 S1-Base-8B 和 S1-Base-32B 分别基于 Qwen3-8B 和 Qwen3-32B 训练得到,S1-Base-671B 基于 DeepSeek-R1-671B 训练得到,均支持 32k 上下文。
模型地址:huggingface.co/ScienceOne-AI/S1-Base-671B
2. 字节跳动发布文本 Diffusion 模型,Seed Diffusion Preview!
文本Diffusion 模型则是跟图像Diffusion 模型类似,是一个去噪过程,整段话随机出现文本最后组成所有输出。Diffusion 文本模型的优点是巨快,字节这个有 每秒 2146 个 token 的速度。目前除了eed Diffusion Preview以外,还有最知名的 Mercury Coder 和 Google 的 Gemini Diffusion.
发布blog: seed.bytedance.com/en/seed_diffusion
在线体验地址:studio.seed.ai/exp/seed_diffusion/
3. 中间思考模型 Dhanishtha,这个模型会想一会,然后输出一会,再想一会,再输出一会。支持工具调用。
模型地址:huggingface.co/HelpingAI/Dhanishtha-2.0-preview-0825
4. FLUX 又发新模型!FLUX.1-Krea-dev 是一个文生图模型,特点是照片级真实感。FLUX 与 Krea 联合开发。
模型地址:huggingface.co/black-forest-labs/FLUX.1-Krea-dev
5. Kimi 上架模型型号 kimi-k2-turbo-preview,猜测是 kimi-k2-0711-preview 的不同部署版本。响应速度从 10 token/s 提升到 40 token/s 。
6. ACL最佳论文 《原生稀疏注意力:硬件对齐和原生可训练的稀疏注意力》(Native Sparse Attention: Hardware-Aligned and Natively Trainable Sparse Attention) ACL 2025 超过一半的论文作者都是华人。论文地址:arxiv.org/abs/2502.11089
7. 用强化学习推动图谱检索生成《Graph-R1: Towards Agentic GraphRAG Framework via End-to-end Reinforcement Learning》,Graph-RAG(图谱增强RAG)用实体-关系图表示知识,提升了信息组织与推理能力。 论文地址:arxiv.org/abs/2507.21892
8. alphaXiv 推出专为科研打造的全新社交平台,内建类似Discord的即时聊天功能,集社区发现、论文讨论与学术交流于一体,助力研究者高效协作。热门communities:Healthcare AI community/AI Security/AI4Science,探索更多 alphaxiv.org/communities
9. 微软研究院公布可能被AI取代的职业: fortune.com/2025/07/31/microsoft-research-generative-ai-occupational-impact-jobs-most-and-least-likely-to-impact-teaching-office-jobs-college-gen-z-grads/
10. Anthropic最新研究Persona vector人格向量,Anthropic 宣布禁止 OpenAI 访问 Claude(是因为OpenAI要发新模型了嘛?)。
11. Manus 超级大更新,发布 Wide Research 功能,支持上百agent独立运行。目前已向 Pro 用户开放,未来将逐步向 Plus 和 Basic 用户开放。
## Github Repos Recommend
1. 开源的知识库 maestro 本地运行 Deep Research !!!
知识库可以导入文档,执行 RAG,最大的亮点是它内置的 Agent 可以执行 Deep Research 这种任务,并且会给出 Research 的推理过程。支持 OpenAI 风格的 API,搜索使用 SearXNG,并且有 cli 工具支持批量导入和导出。
Repo地址:github.com/murtaza-nasir/maestro
2. 提示词优化器,助力于编写高质量提示词 Prompt Optimizer,支持多种使用方式。
Repo地址:github.com/linshenkx/prompt-optimizer
3.