CN110932988A - Flow control method and device, electronic equipment and readable storage medium - Google Patents

Flow control method and device, electronic equipment and readable storage medium Download PDF

Info

Publication number
CN110932988A
CN110932988A CN201911050512.8A CN201911050512A CN110932988A CN 110932988 A CN110932988 A CN 110932988A CN 201911050512 A CN201911050512 A CN 201911050512A CN 110932988 A CN110932988 A CN 110932988A
Authority
CN
China
Prior art keywords
current
access request
preset
access
current limiting
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201911050512.8A
Other languages
Chinese (zh)
Inventor
尚尔乐
王隆帅
李伟柯
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Sankuai Online Technology Co Ltd
Original Assignee
Beijing Sankuai Online Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Sankuai Online Technology Co Ltd filed Critical Beijing Sankuai Online Technology Co Ltd
Priority to CN201911050512.8A priority Critical patent/CN110932988A/en
Publication of CN110932988A publication Critical patent/CN110932988A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic control in data switching networks
    • H04L47/10Flow control; Congestion control
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/60Scheduling or organising the servicing of application requests, e.g. requests for application data transmissions using the analysis and optimisation of the required network resources
    • H04L67/63Routing a service request depending on the request content or context

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer And Data Communications (AREA)

Abstract

The embodiment of the disclosure provides a flow control method, a flow control device, an electronic device and a readable storage medium, wherein the method comprises the following steps: detecting whether the current access request meets a first current limiting condition or not according to a hypertext transfer protocol (HTTP) state code returned by an access interface corresponding to the current access request, and if the current access request meets the first current limiting condition, triggering a first current limiting operation on the current access request; if the current access request does not meet the first current limiting condition, detecting whether the current access request meets a second current limiting condition or not according to the accumulated access times corresponding to the current access request and the corresponding relation between the preset access times and the preset punishment time, and if the current access request meets the second current limiting condition, triggering a second current limiting operation on the current access request. The embodiment of the disclosure can improve the access efficiency of the client while relieving the traffic pressure of the server.

Description

Flow control method and device, electronic equipment and readable storage medium
Technical Field
Embodiments of the present disclosure relate to the field of network technologies, and in particular, to a flow control method and apparatus, an electronic device, and a readable storage medium.
Background
With the rapid development of internet technology, more and more users use the internet to perform information inquiry, online shopping, and the like. When the number of users of the client is large, a large traffic pressure is applied to the server.
At present, a certain flow control rule is usually configured in a server to perform flow control so as to reduce the flow pressure of the server. For example, a threshold may be set at the server, and when the traffic exceeds the threshold, the server sends an error code to the client, and the client stops sending network requests to the server for a while after receiving the error code.
However, the flow control rule needs to be configured in nginnx (reverse proxy server), and although nginnx may block client requests from being sent to the server, the traffic pressure will be shifted to nginnx, which may cause the nginnx to be down.
Disclosure of Invention
Embodiments of the present disclosure provide a flow control method and apparatus, an electronic device, and a readable storage medium, so as to provide a more reasonable flow limiting scheme, and improve access efficiency of a client while reducing traffic pressure of a server.
According to a first aspect of embodiments of the present disclosure, there is provided a flow control method, the method including:
detecting whether the current access request meets a first current limiting condition or not according to a hypertext transfer protocol (HTTP) status code returned by an access interface corresponding to the current access request, and if the current access request meets the first current limiting condition, triggering a first current limiting operation on the current access request;
if the current access request does not meet the first current limiting condition, detecting whether the current access request meets a second current limiting condition or not according to the cumulative access times corresponding to the current access request and the corresponding relation between the preset access times and the preset punishment time, and if the current access request meets the second current limiting condition, triggering a second current limiting operation on the current access request.
According to a second aspect of embodiments of the present disclosure, there is provided a flow control device, the device comprising:
the first current limiting module is used for detecting whether the current access request meets a first current limiting condition or not according to a hypertext transfer protocol (HTTP) status code returned by an access interface corresponding to the current access request, and triggering a first current limiting operation on the current access request if the current access request meets the first current limiting condition;
and the second current limiting module is used for detecting whether the current access request meets a second current limiting condition according to the cumulative access times corresponding to the current access request and the corresponding relation between the preset access times and the preset punishment time if the current access request does not meet the first current limiting condition, and triggering a second current limiting operation on the current access request if the current access request meets the second current limiting condition.
According to a third aspect of embodiments of the present disclosure, there is provided an electronic apparatus including:
a processor, a memory and a computer program stored on the memory and executable on the processor, wherein the processor implements the aforementioned flow control method when executing the program.
According to a fourth aspect of embodiments of the present disclosure, there is provided a readable storage medium, wherein instructions, when executed by a processor of an electronic device, enable the electronic device to perform the aforementioned flow control method.
The embodiment of the disclosure provides a flow control method, a flow control device, an electronic device and a readable storage medium, wherein the method comprises the following steps: detecting whether the current access request meets a first current limiting condition or not according to a hypertext transfer protocol (HTTP) status code returned by an access interface corresponding to the current access request, and if the current access request meets the first current limiting condition, triggering a first current limiting operation on the current access request; if the current access request does not meet the first current limiting condition, detecting whether the current access request meets a second current limiting condition or not according to the cumulative access times corresponding to the current access request and the corresponding relation between the preset access times and the preset punishment time, and if the current access request meets the second current limiting condition, triggering a second current limiting operation on the current access request.
By the method, the access request can be limited according to specific conditions at the access interface of the client, so that the excess access request is prevented from reaching the server side while the flow control rule is not configured on the reverse proxy server, and a scheme for flow limiting control is optimized. In addition, the current limitation is carried out by monitoring the access interface of the client, so that the complex access to the housekeeping of the client is avoided, and the monitoring can also be carried out on network requests which are not triggered by a user interface, such as polling the latest network configuration, acquiring the strategy of an experimental group, responding to the automatically triggered interface request by the interface, and the like.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present disclosure, the drawings needed to be used in the description of the embodiments of the present disclosure will be briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present disclosure, and it is obvious for those skilled in the art that other drawings can be obtained according to the drawings without inventive exercise.
FIG. 1 illustrates a flow chart of steps of a flow control method in one embodiment of the present disclosure;
FIG. 2 illustrates a block diagram of a flow control device in one embodiment of the present disclosure;
fig. 3 shows a block diagram of an electronic device provided by an embodiment of the present disclosure.
Detailed Description
Technical solutions in the embodiments of the present disclosure will be clearly and completely described below with reference to the drawings in the embodiments of the present disclosure, and it is apparent that the described embodiments are some, but not all, of the embodiments of the present disclosure. All other embodiments, which can be obtained by a person skilled in the art without making creative efforts based on the embodiments of the present disclosure, belong to the protection scope of the embodiments of the present disclosure.
Example one
Referring to fig. 1, a flow chart of steps of a flow control method in one embodiment of the present disclosure is shown, including:
step 101, detecting whether the current access request meets a first current limiting condition according to a hypertext transfer protocol (HTTP) status code returned by an access interface corresponding to the current access request, and if the current access request meets the first current limiting condition, triggering a first current limiting operation on the current access request;
step 102, if the current access request does not satisfy the first current limiting condition, detecting whether the current access request satisfies a second current limiting condition according to the cumulative access times corresponding to the current access request and the corresponding relationship between the preset access times and the preset punishment time, and if the current access request satisfies the second current limiting condition, triggering a second current limiting operation on the current access request.
The flow control method of the embodiment of the present disclosure may be applied to a client, where the client specifically includes but is not limited to: smart phones, tablet computers, electronic book readers, MP3 (Moving Picture Experts Group Audio Layer III) players, MP4 (Moving Picture Experts Group Audio Layer IV) players, laptop portable computers, car-mounted computers, desktop computers, set-top boxes, smart televisions, wearable devices, and the like.
The embodiment of the disclosure installs an interceptor capable of executing the flow control method at a network request outlet of each client, and is used for monitoring all access requests sent by the clients.
It should be noted that the access request described in this disclosure may be any access request initiated to the server through the client, such as a connection request, a data acquisition request, a retrieval request, and the like, where the access request is initiated through a corresponding access interface, and the same access request corresponds to the same access interface, and in practical applications, the same access request of different clients also corresponds to the same access interface, for example, 10 users all initiate an access request for obtaining a topic popularity ranking list to the server through respective clients, and since the 10 users initiate the same access request through the clients, the 10 access requests correspond to the same access interface. In the present disclosure, an access interface may be understood as a service logic processing flow, that is, a processing method for an access request is processed in the same service processing logic for the same access request, and therefore, the access interfaces are also the same.
In an optional embodiment of the present disclosure, before the step of detecting whether the current access request meets the second current limiting condition according to the cumulative access times corresponding to the current access request and a corresponding relationship between preset access times and preset penalty time, the method further includes:
and acquiring a preset current limiting number sequence of an access interface corresponding to the current access request, wherein the preset current limiting number sequence comprises a corresponding relation between preset access times and preset punishment time.
In the embodiment of the disclosure, when a current access request is initiated through a client, a corresponding access interface may be determined according to the access request, and then a corresponding preset current limiting number sequence is determined according to the access interface, where the preset current limiting number sequence corresponds to the access interface, and the same preset current limiting number sequence corresponding to the same access interface is obtained by the client initiating the same access request. Optionally, an interface service may be provided in the server through the network parameter configuration system horns, where preset current limiting number sequences corresponding to each interface are configured, and the client may obtain corresponding preset current limiting number sequences from the horns through an access interface corresponding to the access request.
In the embodiment of the present disclosure, the preset current-limiting number column includes a corresponding relationship between a preset access number and a preset penalty time, where the preset access number may be a number of times that the client initiates a current access request, and the penalty time may be a time for limiting a flow, so as to reduce a pressure of the server and ensure a processing efficiency of the server.
In practical applications, the length of the preset current-limiting number sequence is not limited, and may be up to 2147483647, optionally, the number of bits of the preset current-limiting number sequence satisfies the int type, int is a data type and is an identifier for defining an integer type variable in a programming language, for example, the preset current-limiting number sequence may be a ═ 0,0,0,0,0,1,1,1, 2,2,2,2,3,3,3,3, 3,4,4,4,4 … …]Where the preset number of accesses may be represented by a number of digits of a value, where the value represents a preset penalty time, alternatively, the preset current limit number sequence may represent a penalty time by a number that increases exponentially, e.g., a ═ 0,0,0,0,0,1,1,1, 2,2,2,2,4,4,4,4,8,8,8,8,16,16,16,16 … …]In 2 ofnAnd the penalty degree can be greatly increased along with the accumulation of the access times, so that abnormal flow can be better avoided.
In the embodiment of the disclosure, after an access request is initiated, it may be determined whether the current access request meets a first current limiting condition, where the first current limiting condition may be that the server determines that the server cannot currently provide a service, at this time, the server may be in a stage that the server cannot receive and process the access request, such as being overloaded, restarted, or down, and the client may obtain a state of the current server by using a HTTP status code returned by the server, for example, the server returns the HTTP status code 418, at this time, the server may be determined to be in a state that the server cannot process the current access request according to the HTTP status code, and a first current limiting operation may be performed on the access request of the client, that is, the sending of the access request of the client is intercepted according to the state of the server, and the server waits for.
When the current access request is judged not to meet the first current limiting condition, whether the current access request meets a second current limiting condition or not can be judged according to the accumulated access times and the preset current limiting number series corresponding to the current access request, if yes, a second current limiting operation is carried out on the current access request, namely, the access request of the client side is intercepted according to the accumulated access times corresponding to the access request, optionally, when the second current limiting operation is carried out, the client side network layer can simulate to return an HTTP status code, such as the HTTP status code 418, and the HTTP status code is used as User Interface (UI) abnormal display to prompt a User that a relevant problem occurs.
In the embodiment of the present disclosure, the first current limiting operation is determined by the state of the server, and may be considered as passively triggered current limiting, the second current limiting operation is determined by the cumulative access times corresponding to the current access request, and the cumulative access times may be obtained by monitoring the initiation condition of the access request of the access interface, and may therefore be considered as actively triggered current limiting.
Optionally, the embodiment of the present disclosure may select whether to perform current limiting of the access request, where when the flow rate is large, the current limiting may be performed to avoid overload of the server, and when the flow rate is small, the current limiting may not be performed to reduce the operating pressure of the client, where information on whether current limiting of the access request is enabled may be configured in horns, and when current limiting of the access request is enabled, the current access request may be subjected to the above-described determining and current limiting operations.
In addition, in order to improve the efficiency of determining the current limiting operation, in the disclosure, the first current limiting condition, namely the passive triggering current limiting condition, is judged according to the feedback of the server, and the second current limiting condition, namely the active triggering current limiting condition, is judged only when the first current limiting condition is not met.
Therefore, the method and the device can take two aspects of the response result (HTTP status code) of the server and the current access request quantity of the client as the basis for judging whether to carry out current limitation. By means of judgment of the server side, the situation that whether the server side is overloaded or not can not be judged due to the fact that only single-point data of the client side is judged can be avoided, and information islands can be avoided. By the judgment of the client, all the access requests sent by the client can be monitored, for example, the access requests which are not triggered by a User Interface (UI) can be monitored, and further, omission can be avoided.
In an optional embodiment of the present disclosure, the step of detecting whether the current access request meets a second current limiting condition according to an accumulated access frequency corresponding to the current access request and a corresponding relationship between a preset access frequency and a preset penalty time includes:
step S11, according to the accumulated access times corresponding to the current access request, inquiring the corresponding relation between the preset access times and the preset punishment time in the preset current limiting number series to obtain the punishment time corresponding to the current access request;
step S12, if the punishment time corresponding to the current access request is greater than 0 and the time interval between the current access request and the last access request is within the punishment time, determining that the current access request meets a second current limiting condition;
the step of triggering a second current limiting operation on the current access request comprises:
and step S13, prohibiting the access request of the client to the access interface within the penalty time.
In the embodiment of the disclosure, the preset current-limiting number array includes a corresponding relationship between preset access times and preset penalty time, and the penalty time corresponding to the current access request can be obtained by querying the corresponding relationship between the preset access times and the preset penalty time in the preset current-limiting number array. Specifically, the cumulative access frequency corresponding to the current access request may be matched with the preset access frequency in the preset current-limiting number sequence, it is determined that the preset penalty time corresponding to the matched preset access frequency is the penalty time corresponding to the current access request, it may be determined whether the current access request meets the second current-limiting condition according to the penalty time, and if the cumulative access frequency corresponding to the current access request is 10, it may be determined that the penalty time corresponding to the current access request is 2 seconds according to a value 2 of a 10 th digit of [0,0,0, 1,1,1,1,2,2,2, 3,3,3,3,4,4,4 … … ].
In the embodiment of the disclosure, after the penalty time corresponding to the current access request is determined, if the penalty time corresponding to the current access request is greater than 0 and the time interval between the current access request and the last access request is within the penalty time, the current access request is considered to meet a second current limiting condition, and a second current limiting operation is triggered. Wherein the second current limiting operation may be to prohibit initiating a corresponding access request for the access interface within the penalty time. If it is determined that the penalty time corresponding to the current access request is 2 seconds, because 2 seconds are greater than 0, the current access request meets the second current limiting condition, at this time, the current access request may be intercepted, and the access request of the client to the access interface may be prohibited within two seconds.
In an optional embodiment of the present disclosure, before the step of obtaining the preset current-limiting number sequence of the access interface corresponding to the current access request, the method further includes:
step S21, receiving a current access request corresponding to the access interface by the client;
step S22, calculating the accumulated access times corresponding to the current access request;
step S23, if the time interval between the current access request and the last access request is greater than or equal to a preset interval, executing a reduction operation on the accumulated access times corresponding to the current access request;
and step S24, if the time interval between the current access request and the last access request is smaller than the preset interval, performing an increasing operation on the accumulated access times corresponding to the current access request.
In the disclosed embodiment, the accumulated access times corresponding to the current access request may be accumulated through the time interval between access requests, optionally, the preset current limit number sequence a is [0,0,0,0,0,1,1,1, 2,2,2,2], as known from the preset current limit number sequence a, a [0] to a [4] are all 0, so that the penalty time for the first 5 access requests is 0 second, no waiting is needed, a [5] to a [8] are all 1, so that the penalty time for the 6 th to 9 th access requests is 1 second, a [9] to a [12] are all 2, so that the penalty time for the 10 th to 13 th requests is 2 seconds, a variable is used to record the position pos where the current request is located in the preset current limit number sequence, when the time interval between the current access request and the last access request is greater than or equal to the preset interval, the position pos is decremented by 1, and when the time interval between the current access request and the last access request is smaller than the preset interval, adding 1 to the pos number. Alternatively, the preset interval may be 2 seconds, 3 seconds, 4 seconds, etc., taking the preset interval as 2 seconds as an example. If the current access request is the 10 th request, that is, the cumulative access times corresponding to the current access request is 10 times, in the column a, a [0] represents the 1 st time, and the corresponding position of the current access request in the limited number a is: pos is 9, and since a [9] is 2, the penalty time for the current access request should be 2 seconds. If the time interval between the current access request and the last access request is 2 seconds, a reduction operation may be performed on the accumulated access times corresponding to the current access request, for example, a reduction 1 operation is performed, then the position pos-1 of the current access request is 8, and since a [8] is 1, the penalty time of the current access request may be updated to 1 second. For another example, if the time interval between the current access request and the last access request is 18 seconds, the position pos-18/2 of the current access request is 0, and since a [0] is 0, the penalty time of the current access request may be updated to 0 second, while the cumulative access number corresponding to the current access request is reduced to 0. If the time interval between the current access request and the last access request is 1 second, since 1 second is less than the preset interval 2 seconds corresponding to the current access request, an increasing operation may be performed on the accumulated access times corresponding to the current access request, for example, an increasing 1 operation is performed, and pos +1 of the current access request is 10, and since a [10] is 2, the penalty time corresponding to the current access request is 2 seconds.
In an optional embodiment of the present disclosure, the step of detecting whether the current access request meets a first current limiting condition according to a hypertext transfer protocol HTTP status code returned by the access interface includes:
step S31, if the HTTP status code returned by the access interface is detected to be a preset status code, determining that the current access request meets a first current limiting condition;
the step of triggering a first current limiting operation on the current access request comprises:
and step S32, prohibiting the access request of the client to the access interface within a preset time period.
In the embodiment of the present disclosure, when the HTTP status code received by the access interface and returned by the server is the preset status code, it is determined that the server may be in the states of overload, restart, downtime, and the like at this time, and cannot perform access request processing, where the preset status code may be a 4 × status code, which indicates that a client is in error, and the request includes a syntax error or cannot complete the request, and if 403, the server understands the request of the client, but rejects to execute the request; 413, the entity requested by the client is too large, the server cannot process the request, and the request is rejected; 418, the server is in the process of restarting, etc., or may be a 5-x status code, which indicates that the server is in an internal error and cannot perform request processing, such as 500, and the server is in an internal error and cannot complete the request; when it is confirmed that the received status code indicates that the current server cannot process the access request of the client, it is determined that the current access request satisfies the first throttling condition 503.
In the embodiment of the present disclosure, after it is confirmed that an access request satisfies a first current limiting condition, a first current limiting operation may be performed on the current access request, where optionally, the access request of the client to the access interface may be prohibited within a preset time period, that is, the current access request may be prohibited from being sent through a corresponding access interface, and the same access request may be prohibited from being sent through the corresponding access interface within the following preset time period, where the preset time period may be determined according to a state of the server, and if the server is currently in a downtime state, a 5-minute time is required for restarting, therefore, the preset time period may be set to 5 minutes, the access request is prohibited from being sent through the corresponding access interface within 5 minutes according to the first current limiting operation, after the server is restarted successfully, the first current limiting operation is canceled, and impact on the server caused by invalid access is alleviated, and further, the access efficiency of the client can be improved.
Optionally, the restart time of the server may be an average restart time of all servers obtained by statistical data, or an average restart time of the server exceeding a preset proportion (e.g., 80%), or the server may attach a time required for restarting the server to the returned HTTP status code, so as to flexibly adjust a preset time period in the first current limiting operation, and avoid that the waiting time is too long, the efficiency is reduced, or the waiting time is too short, and the server is not restarted completely.
In an optional embodiment of the present disclosure, before the step of obtaining the preset current-limiting number sequence of the access interface corresponding to the current access request, the method further includes:
step S41, according to the historical access data corresponding to the access interface, counting the query rate per second corresponding to the access interface;
step S42, determining the corresponding relation between the preset access times and the preset punishment time according to the query rate per second corresponding to the access interface;
and step S43, generating a preset current limiting number sequence corresponding to the access interface according to the corresponding relation between the preset access times and the preset punishment time.
In the embodiment of the disclosure, the preset current-limiting number sequence corresponding to each access interface is obtained according to the request rule of each access interface, the historical access data corresponding to each access interface is obtained, then the query rate per second in the historical access data is counted, after the request in the current time period, namely the query rate per second, exceeds the limit, the access request interval is gradually increased to serve as the punishment time, for malicious frequent access requests, the punishment time can be gradually increased to a large extent, the punishment strength is increased, the historical accumulated access times in the historical access data serve as the preset access times, and the preset precedent number sequence corresponding to the access interface is generated corresponding to the preset punishment time.
Specifically, when a preset current-limiting sequence is generated, the embodiment of the present disclosure first determines a preset access frequency with a penalty time of 0, that is, determines how many cumulative access frequencies corresponding to a current access interface are reached, and starts to perform a second current-limiting operation. Optionally, the corresponding relationship between the preset access times and the preset penalty time may be determined according to the query rate per second. For example, when the query rate per second is less than 60, if the access request for accessing the interface in 1 minute has no obvious rule, the number with the penalty time of 0 may be equal to the value corresponding to the query rate per second, and if the query rate per second is 20, the penalty time of cumulative access times 1 to 20 is 0, so that the normal access request condition in one minute is not affected, the condition of exceeding the limit occasionally occurs, and only a slight penalty with the penalty time of 1 second is hit, and a large effect is not caused.
In an optional embodiment of the present disclosure, after the step of generating the preset current limiting sequence corresponding to the access interface, the method further includes:
step S51, determining the access request distribution characteristics of the access interface according to the query rate per second corresponding to the access interface;
and step S52, adjusting the preset access times with the preset punishment time of 0 in the preset current limiting series of the access interface according to the access request distribution characteristics.
In the embodiment of the present disclosure, the access request distribution characteristics of the access interface may be determined according to the query rate per second, for example, when the variance between the query rate per second in one minute and the actual query quantity per second in one minute is small, the distribution characteristics may be considered to be more uniform, and when the variance between the query rate per second in one minute and the actual query quantity per second in one minute is large, the distribution characteristics may be considered to be more concentrated. Optionally, the preset access times with the preset penalty time of 0 in the preset current limiting sequence of the access interface may be adjusted according to the access request distribution characteristics. For example, if the distribution characteristics are uniform, the number of 0 s can be properly reduced, and at this time, the normal time interval is enough to preset the current-limiting sequence to return to the original point, so that continuous accumulation is avoided; if the distribution characteristics are concentrated, the number of 0 can be properly increased to avoid concentrated explosion of access requests, which causes rapid increase of the accumulated access times in a short time and causes accidental injury.
In addition, if the query rate per second is greater than 60, most of the access interfaces may be abnormal, and at this time, the program logic may be checked first to avoid redundancy, and if the program logic is normal, the number of 0 s may be increased appropriately to be equal to the query rate per second.
In the embodiment of the present disclosure, the current limiting data may be checked at each access interface through point burying and monitoring, if the frequency of triggering the second current limiting operation reaches the preset frequency and affects normal circulation of the service data, a serious accidental injury may occur, but the efficiency of processing the access request by the server is affected, at this time, the number of 0 may be appropriately increased to relax the penalty, if frequently triggering the second current limiting operation does not affect normal circulation of the service data, the frequency of triggering the second current limiting operation may be considered to be normal, optionally, the penalty is too loose, the penalty is too short, so that the second current limiting operation is frequently triggered, at this time, the penalty time may be appropriately increased, and thus the penalty is increased.
In an optional embodiment of the disclosure, before the step of detecting whether the current access request satisfies the first current limiting condition, the method further includes:
and detecting whether the time interval between the current access request and the last access request is within a preset time period of a first current limit, and if so, triggering a first current limit operation on the current access request.
In the embodiment of the disclosure, before confirming whether the current access request meets the first current limiting condition or the second current limiting condition, whether the current access request is within a preset time period of the first current limiting may be confirmed, or whether the current access request is within the penalty time of the second current limit, optionally, a first current limit operation may be triggered at the access request, or when the access request triggers the second current limiting operation, recording the triggering time of the access request, when the client initiates the request again through the access interface, detecting the time interval between the initiation time of the current access request and the initiation time of the last access request, when the time interval is less than the preset time period of the first current limiting operation or less than the penalty time of the second current limiting operation, it may be considered that the current access request is within the preset time period of the first current limiting operation, or within a penalty time of the second current limiting operation, thereby triggering the first current limiting operation or the second current limiting operation for the current access request.
In summary, according to the method provided by the present disclosure, the access request can be limited at the access interface of the client according to specific conditions, so that the flow control rule is not configured on the reverse proxy server, the excessive access request is prevented from reaching the server, and a scheme for controlling the current limitation is optimized. Meanwhile, the current is limited by monitoring the access interface of the client, so that the complex access to the housekeeping of the client is avoided, and the network requests which are not triggered by the user interface, such as polling the latest network configuration, acquiring the strategy of an experimental group, responding to the automatically triggered interface requests according to the interface, and the like, can be monitored.
Example two
Referring to fig. 2, there is shown a block diagram of a flow control device 200 in one embodiment of the present disclosure, the device being applied to a client, and specifically comprising:
a first current limiting module 201, configured to detect whether the current access request meets a first current limiting condition according to a hypertext transfer protocol HTTP status code returned by an access interface corresponding to the current access request, and if the current access request meets the first current limiting condition, trigger a first current limiting operation on the current access request;
a second current limiting module 202, configured to detect whether the current access request meets a second current limiting condition according to an accumulated access frequency corresponding to the current access request and a corresponding relationship between a preset access frequency and a preset penalty time if the current access request does not meet the first current limiting condition, and trigger a second current limiting operation on the current access request if the current access request meets the second current limiting condition.
Optionally, the apparatus further comprises:
and the acquisition module is used for acquiring a preset current limiting number sequence of the access interface corresponding to the current access request, wherein the preset current limiting number sequence comprises a corresponding relation between preset access times and preset punishment time.
Optionally, the second current limiting module 202 includes:
a punishment time obtaining sub-module, configured to query, according to the cumulative access times corresponding to the current access request, a correspondence between preset access times in the preset current-limiting number sequence and preset punishment time, so as to obtain punishment time corresponding to the current access request;
the second current limiting condition judgment submodule is used for determining that the current access request meets a second current limiting condition if the punishment time corresponding to the current access request is greater than 0 and the time interval between the current access request and the last access request is within the punishment time;
and the second current limiting submodule is used for forbidding the client to access the access request of the access interface within the punishment time.
Optionally, the apparatus further comprises:
the receiving module is used for receiving a current access request corresponding to the access interface by the client;
the accumulation module is used for calculating the accumulated access times corresponding to the current access request;
the accumulation module is further configured to perform a reduction operation on the accumulated access times corresponding to the current access request if the time interval between the current access request and the last access request is greater than or equal to a preset interval;
and the accumulation module is further configured to perform an increase operation on the accumulated access times corresponding to the current access request if the time interval between the current access request and the last access request is smaller than the preset interval.
Optionally, the first current limiting module 201 includes:
the first current limiting condition judgment submodule is used for determining that the current access request meets a first current limiting condition if the HTTP status code returned by the access interface is detected to be a preset status code;
and the first current limiting submodule is used for forbidding the client to access the access request of the access interface within a preset time period.
Optionally, the apparatus further comprises:
the statistical module is used for counting the query rate per second corresponding to the access interface according to the historical access data corresponding to the access interface;
the corresponding module is used for determining the corresponding relation between the preset access times and the preset punishment time according to the query rate per second corresponding to the access interface;
and the preset current-limiting number sequence generating module is used for generating a preset current-limiting number sequence corresponding to the access interface according to the corresponding relation between the preset access times and the preset punishment time.
Optionally, the apparatus further comprises:
the characteristic determining module is used for determining the access request distribution characteristics of the access interface according to the query rate per second corresponding to the access interface;
and the parameter adjusting module is used for adjusting the preset access times with the preset punishment time of 0 in the preset current limiting series of the access interface according to the access request distribution characteristics.
Optionally, the apparatus further comprises:
and the first current limiting triggering module is used for detecting whether the time interval between the current access request and the last access request is within a preset time period of first current limiting, and if so, triggering first current limiting operation on the current access request.
In summary, embodiments of the present disclosure provide a flow control device, the device including: the first current limiting module is used for detecting whether the current access request meets a first current limiting condition or not according to a hypertext transfer protocol (HTTP) status code returned by an access interface corresponding to the current access request, and triggering a first current limiting operation on the current access request if the current access request meets the first current limiting condition; and the second current limiting module is used for detecting whether the current access request meets a second current limiting condition according to the cumulative access times corresponding to the current access request and the corresponding relation between the preset access times and the preset punishment time if the current access request does not meet the first current limiting condition, and triggering a second current limiting operation on the current access request if the current access request meets the second current limiting condition. According to the embodiment of the disclosure, the access request can be limited according to specific conditions at the access interface of the client, so that the access request is prevented from reaching the server while the flow control rule is not configured on the reverse proxy server, and a scheme of flow limiting control is optimized. In addition, the current limitation is carried out by monitoring the access interface of the client, so that the complex access to the housekeeping of the client is avoided, and the monitoring can also be carried out on network requests which are not triggered by a user interface, such as polling the latest network configuration, acquiring the strategy of an experimental group, responding to the automatically triggered interface request by the interface, and the like.
An embodiment of the present disclosure also provides an electronic device, referring to fig. 3, including: a processor 301, a memory 302 and a computer program 3021 stored on and executable on the memory, the processor implementing the flow control method of the foregoing embodiments when executing the program.
Embodiments of the present disclosure also provide a readable storage medium, and instructions in the storage medium, when executed by a processor of an electronic device, enable the electronic device to perform the flow control method of the foregoing embodiments.
For the device embodiment, since it is basically similar to the method embodiment, the description is simple, and for the relevant points, refer to the partial description of the method embodiment.
The algorithms and displays presented herein are not inherently related to any particular computer, virtual machine, or other apparatus. Various general purpose systems may also be used with the teachings herein. The required structure for constructing such a system will be apparent from the description above. In addition, embodiments of the present disclosure are not directed to any particular programming language. It is appreciated that a variety of programming languages may be used to implement the teachings of the embodiments of the present disclosure as described herein, and any descriptions of specific languages are provided above to disclose the best modes of the embodiments of the present disclosure.
In the description provided herein, numerous specific details are set forth. However, it is understood that embodiments of the present disclosure may be practiced without these specific details. In some instances, well-known methods, structures and techniques have not been shown in detail in order not to obscure an understanding of this description.
Similarly, it should be appreciated that in the foregoing description of exemplary embodiments of the disclosure, various features of the embodiments of the disclosure are sometimes grouped together in a single embodiment, figure, or description thereof for the purpose of streamlining the disclosure and aiding in the understanding of one or more of the various inventive aspects. However, the disclosed method should not be interpreted as reflecting an intention that: that is, claimed embodiments of the disclosure require more features than are expressly recited in each claim. Rather, as the following claims reflect, inventive aspects lie in less than all features of a single foregoing disclosed embodiment. Thus, the claims following the detailed description are hereby expressly incorporated into this detailed description, with each claim standing on its own as a separate embodiment of an embodiment of this disclosure.
Those skilled in the art will appreciate that the modules in the device in an embodiment may be adaptively changed and disposed in one or more devices different from the embodiment. The modules or units or components of the embodiments may be combined into one module or unit or component, and furthermore they may be divided into a plurality of sub-modules or sub-units or sub-components. All of the features disclosed in this specification (including any accompanying claims, abstract and drawings), and all of the processes or elements of any method or apparatus so disclosed, may be combined in any combination, except combinations where at least some of such features and/or processes or elements are mutually exclusive. Each feature disclosed in this specification (including any accompanying claims, abstract and drawings) may be replaced by alternative features serving the same, equivalent or similar purpose, unless expressly stated otherwise.
The various component embodiments of the disclosure may be implemented in hardware, or in software modules running on one or more processors, or in a combination thereof. It will be appreciated by those skilled in the art that a microprocessor or Digital Signal Processor (DSP) may be used in practice to implement some or all of the functions of some or all of the components in a sequencing device according to embodiments of the present disclosure. Embodiments of the present disclosure may also be implemented as an apparatus or device program for performing a portion or all of the methods described herein. Such programs implementing embodiments of the present disclosure may be stored on a computer readable medium or may be in the form of one or more signals. Such a signal may be downloaded from an internet website or provided on a carrier signal or in any other form.
It should be noted that the above-mentioned embodiments illustrate rather than limit embodiments of the disclosure, and that those skilled in the art will be able to design alternative embodiments without departing from the scope of the appended claims. In the claims, any reference signs placed between parentheses shall not be construed as limiting the claim. The word "comprising" does not exclude the presence of elements or steps not listed in a claim. The word "a" or "an" preceding an element does not exclude the presence of a plurality of such elements. Embodiments of the disclosure may be implemented by means of hardware comprising several distinct elements, and by means of a suitably programmed computer. In the unit claims enumerating several means, several of these means may be embodied by one and the same item of hardware. The usage of the words first, second and third, etcetera do not indicate any ordering. These words may be interpreted as names.
It is clear to those skilled in the art that, for convenience and brevity of description, the specific working processes of the above-described systems, apparatuses and units may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
The above description is only for the purpose of illustrating the preferred embodiments of the present disclosure and is not to be construed as limiting the embodiments of the present disclosure, and any modifications, equivalents, improvements and the like that are made within the spirit and principle of the embodiments of the present disclosure are intended to be included within the scope of the embodiments of the present disclosure.
The above description is only a specific implementation of the embodiments of the present disclosure, but the scope of the embodiments of the present disclosure is not limited thereto, and any person skilled in the art can easily conceive of changes or substitutions within the technical scope of the embodiments of the present disclosure, and all the changes or substitutions should be covered by the scope of the embodiments of the present disclosure. Therefore, the protection scope of the embodiments of the present disclosure shall be subject to the protection scope of the claims.

Claims (18)

1. A flow control method is applied to a client, and the method comprises the following steps:
detecting whether the current access request meets a first current limiting condition or not according to a hypertext transfer protocol (HTTP) status code returned by an access interface corresponding to the current access request, and if the current access request meets the first current limiting condition, triggering a first current limiting operation on the current access request;
if the current access request does not meet the first current limiting condition, detecting whether the current access request meets a second current limiting condition or not according to the cumulative access times corresponding to the current access request and the corresponding relation between the preset access times and the preset punishment time, and if the current access request meets the second current limiting condition, triggering a second current limiting operation on the current access request.
2. The method according to claim 1, wherein before the step of detecting whether the current access request satisfies the second current limiting condition according to the cumulative access times corresponding to the current access request and a corresponding relationship between a preset access time and a preset penalty time, the method further comprises:
and acquiring a preset current limiting number sequence of an access interface corresponding to the current access request, wherein the preset current limiting number sequence comprises a corresponding relation between preset access times and preset punishment time.
3. The method according to claim 2, wherein the step of detecting whether the current access request satisfies a second current limiting condition according to the cumulative access times corresponding to the current access request and a corresponding relationship between a preset access time and a preset penalty time comprises:
inquiring the corresponding relation between the preset access times and the preset punishment time in the preset current limiting number array according to the accumulated access times corresponding to the current access request to obtain the punishment time corresponding to the current access request;
if the penalty time corresponding to the current access request is greater than 0 and the time interval between the current access request and the last access request is within the penalty time, determining that the current access request meets a second current limiting condition;
the step of triggering a second current limiting operation on the current access request comprises:
and prohibiting the access request of the client to the access interface within the punishment time.
4. The method of claim 2, wherein before the step of obtaining the preset current limiting number sequence of the access interface corresponding to the current access request, the method further comprises:
receiving a current access request corresponding to the access interface by the client;
calculating the accumulated access times corresponding to the current access request;
if the time interval between the current access request and the last access request is greater than or equal to a preset interval, executing reduction operation on the accumulated access times corresponding to the current access request;
and if the time interval between the current access request and the last access request is smaller than the preset interval, executing increasing operation on the accumulated access times corresponding to the current access request.
5. The method according to claim 1, wherein the step of detecting whether the current access request satisfies a first current limiting condition according to a hypertext transfer protocol (HTTP) status code returned by the access interface comprises:
if the HTTP status code returned by the access interface is detected to be a preset status code, determining that the current access request meets a first current limiting condition;
the step of triggering a first current limiting operation on the current access request comprises:
and prohibiting the access request of the client to the access interface within a preset time period.
6. The method of claim 2, wherein before the step of obtaining the preset current limiting number sequence of the access interface corresponding to the current access request, the method further comprises:
according to the historical access data corresponding to the access interface, counting the query rate per second corresponding to the access interface;
determining the corresponding relation between the preset access times and the preset punishment time according to the query rate per second corresponding to the access interface;
and generating a preset current limiting number sequence corresponding to the access interface according to the corresponding relation between the preset access times and the preset punishment time.
7. The method of claim 6, wherein after the step of generating the preset throttling sequence corresponding to the access interface, the method further comprises:
determining the access request distribution characteristics of the access interface according to the query rate per second corresponding to the access interface;
and adjusting the preset access times with the preset punishment time of 0 in the preset current limiting sequence of the access interface according to the access request distribution characteristics.
8. The method of claim 1, wherein prior to the step of detecting whether the current access request satisfies a first throttling condition, the method further comprises:
and detecting whether the time interval between the current access request and the last access request is within a preset time period of a first current limit, and if so, triggering a first current limit operation on the current access request.
9. A flow control apparatus, applied to a client, the apparatus comprising:
the first current limiting module is used for detecting whether the current access request meets a first current limiting condition or not according to a hypertext transfer protocol (HTTP) status code returned by an access interface corresponding to the current access request, and triggering a first current limiting operation on the current access request if the current access request meets the first current limiting condition;
and the second current limiting module is used for detecting whether the current access request meets a second current limiting condition according to the cumulative access times corresponding to the current access request and the corresponding relation between the preset access times and the preset punishment time if the current access request does not meet the first current limiting condition, and triggering a second current limiting operation on the current access request if the current access request meets the second current limiting condition.
10. The apparatus of claim 9, further comprising:
and the acquisition module is used for acquiring a preset current limiting number sequence of the access interface corresponding to the current access request, wherein the preset current limiting number sequence comprises a corresponding relation between preset access times and preset punishment time.
11. The apparatus of claim 10, wherein the second current limiting module comprises:
a punishment time obtaining sub-module, configured to query, according to the cumulative access times corresponding to the current access request, a correspondence between preset access times in the preset current-limiting number sequence and preset punishment time, so as to obtain punishment time corresponding to the current access request;
the second current limiting condition judgment submodule is used for determining that the current access request meets a second current limiting condition if the punishment time corresponding to the current access request is greater than 0 and the time interval between the current access request and the last access request is within the punishment time;
and the second current limiting submodule is used for forbidding the client to access the access request of the access interface within the punishment time.
12. The apparatus of claim 10, further comprising:
the receiving module is used for receiving a current access request corresponding to the access interface by the client;
the accumulation module is used for calculating the accumulated access times corresponding to the current access request;
the accumulation module is further configured to perform a reduction operation on the accumulated access times corresponding to the current access request if the time interval between the current access request and the last access request is greater than or equal to a preset interval;
and the accumulation module is further configured to perform an increase operation on the accumulated access times corresponding to the current access request if the time interval between the current access request and the last access request is smaller than the preset interval.
13. The apparatus of claim 9, wherein the first current limiting module comprises:
the first current limiting condition judgment submodule is used for determining that the current access request meets a first current limiting condition if the HTTP status code returned by the access interface is detected to be a preset status code;
and the first current limiting submodule is used for forbidding the client to access the access request of the access interface within a preset time period.
14. The apparatus of claim 10, further comprising:
the statistical module is used for counting the query rate per second corresponding to the access interface according to the historical access data corresponding to the access interface;
the corresponding module is used for determining the corresponding relation between the preset access times and the preset punishment time according to the query rate per second corresponding to the access interface;
and the preset current-limiting number sequence generating module is used for generating a preset current-limiting number sequence corresponding to the access interface according to the corresponding relation between the preset access times and the preset punishment time.
15. The apparatus of claim 14, further comprising:
the characteristic determining module is used for determining the access request distribution characteristics of the access interface according to the query rate per second corresponding to the access interface;
and the parameter adjusting module is used for adjusting the preset access times with the preset punishment time of 0 in the preset current limiting series of the access interface according to the access request distribution characteristics.
16. The apparatus of claim 9, further comprising:
and the first current limiting triggering module is used for detecting whether the time interval between the current access request and the last access request is within a preset time period of first current limiting, and if so, triggering first current limiting operation on the current access request.
17. An electronic device, comprising:
processor, memory and computer program stored on the memory and executable on the processor, characterized in that the processor implements the flow control method according to one or more of claims 1-8 when executing the program.
18. A readable storage medium, characterized in that instructions in the storage medium, when executed by a processor of an electronic device, enable the electronic device to perform the flow control method according to one or more of method claims 1-8.
CN201911050512.8A 2019-10-31 2019-10-31 Flow control method and device, electronic equipment and readable storage medium Pending CN110932988A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911050512.8A CN110932988A (en) 2019-10-31 2019-10-31 Flow control method and device, electronic equipment and readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911050512.8A CN110932988A (en) 2019-10-31 2019-10-31 Flow control method and device, electronic equipment and readable storage medium

Publications (1)

Publication Number Publication Date
CN110932988A true CN110932988A (en) 2020-03-27

Family

ID=69849961

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911050512.8A Pending CN110932988A (en) 2019-10-31 2019-10-31 Flow control method and device, electronic equipment and readable storage medium

Country Status (1)

Country Link
CN (1) CN110932988A (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111580961A (en) * 2020-04-28 2020-08-25 北京达佳互联信息技术有限公司 Access request processing method, device, server and storage medium
CN111866101A (en) * 2020-07-08 2020-10-30 深圳市欢太科技有限公司 Access request processing method and device, storage medium and electronic equipment
CN111897659A (en) * 2020-09-29 2020-11-06 腾讯科技(深圳)有限公司 Method, system and device for controlling service processing frequency and electronic equipment
CN111935782A (en) * 2020-06-29 2020-11-13 福建天泉教育科技有限公司 Optimization method of client retry mechanism and storage medium
CN113923163A (en) * 2021-10-20 2022-01-11 广东亿迅科技有限公司 Long connection message channel based current limiting method and system
CN114615073A (en) * 2022-03-22 2022-06-10 广州方硅信息技术有限公司 Access flow control method, device, equipment and medium
CN115174479A (en) * 2022-07-19 2022-10-11 天翼云科技有限公司 Flow control method and device
CN115514650A (en) * 2022-09-21 2022-12-23 杭州网易再顾科技有限公司 Bandwidth management method, device, medium and electronic equipment in current limiting scene

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170272371A1 (en) * 2016-03-21 2017-09-21 Alibaba Group Holding Limited Flow control in connection with an access request
CN108073465A (en) * 2017-12-29 2018-05-25 中国平安人寿保险股份有限公司 Dynamic current limiting method, Nginx servers, storage medium and device
CN108400963A (en) * 2017-10-23 2018-08-14 平安科技(深圳)有限公司 Electronic device, access request control method and computer readable storage medium
CN110166486A (en) * 2019-06-14 2019-08-23 李啟锋 Website protection method, device and computer readable storage medium

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170272371A1 (en) * 2016-03-21 2017-09-21 Alibaba Group Holding Limited Flow control in connection with an access request
CN108400963A (en) * 2017-10-23 2018-08-14 平安科技(深圳)有限公司 Electronic device, access request control method and computer readable storage medium
CN108073465A (en) * 2017-12-29 2018-05-25 中国平安人寿保险股份有限公司 Dynamic current limiting method, Nginx servers, storage medium and device
CN110166486A (en) * 2019-06-14 2019-08-23 李啟锋 Website protection method, device and computer readable storage medium

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111580961A (en) * 2020-04-28 2020-08-25 北京达佳互联信息技术有限公司 Access request processing method, device, server and storage medium
CN111580961B (en) * 2020-04-28 2023-12-26 北京达佳互联信息技术有限公司 Access request processing method, device, server and storage medium
CN111935782A (en) * 2020-06-29 2020-11-13 福建天泉教育科技有限公司 Optimization method of client retry mechanism and storage medium
CN111935782B (en) * 2020-06-29 2023-08-08 福建天泉教育科技有限公司 Optimization method of client retry mechanism and storage medium
CN111866101A (en) * 2020-07-08 2020-10-30 深圳市欢太科技有限公司 Access request processing method and device, storage medium and electronic equipment
CN111866101B (en) * 2020-07-08 2023-05-26 深圳市欢太科技有限公司 Access request processing method and device, storage medium and electronic equipment
CN111897659A (en) * 2020-09-29 2020-11-06 腾讯科技(深圳)有限公司 Method, system and device for controlling service processing frequency and electronic equipment
CN113923163A (en) * 2021-10-20 2022-01-11 广东亿迅科技有限公司 Long connection message channel based current limiting method and system
CN114615073A (en) * 2022-03-22 2022-06-10 广州方硅信息技术有限公司 Access flow control method, device, equipment and medium
CN115174479A (en) * 2022-07-19 2022-10-11 天翼云科技有限公司 Flow control method and device
CN115174479B (en) * 2022-07-19 2023-10-13 天翼云科技有限公司 Flow control method and device
CN115514650A (en) * 2022-09-21 2022-12-23 杭州网易再顾科技有限公司 Bandwidth management method, device, medium and electronic equipment in current limiting scene

Similar Documents

Publication Publication Date Title
CN110932988A (en) Flow control method and device, electronic equipment and readable storage medium
US11159649B2 (en) Systems and methods of rate limiting for a representational state transfer (REST) application programming interface (API)
CN105591743B (en) Method and device for identity authentication through equipment operation characteristics of user terminal
CN110858843B (en) Service request processing method and device and computer readable storage medium
US10798017B2 (en) Method and system for reclaiming unused resources in a networked application environment
EP3991389B1 (en) File upload control for client-side applications in proxy solutions
CN110445615B (en) Network request security verification method, device, medium and electronic equipment
US9207983B2 (en) Methods for adapting application services based on current server usage and devices thereof
CN110247857B (en) Current limiting method and device
CN110209949B (en) Resource pushing method and device
US20070265976A1 (en) License distribution in a packet data network
CN112199175B (en) Task queue generating method, device and equipment
CN114244624A (en) Flow control method and device, equipment and storage medium
CN108512768B (en) Access amount control method and device
CN111291252A (en) Method and device for adjusting query rate per second, electronic equipment and storage medium
CN111190709B (en) Method and device for processing request, electronic equipment and readable storage medium
CN113360815A (en) Request retry method and device
CN110781500A (en) Data wind control system and method
CN115514665A (en) Service expansion method and device, electronic equipment and storage medium
CN112667396A (en) Access request processing method, device and system
CN110851258B (en) API calling method, API calling device, computer equipment and storage medium
CN114157482A (en) Service access control method, device, control equipment and storage medium
CN111580961A (en) Access request processing method, device, server and storage medium
CN116938595B (en) Method, system, terminal and storage medium for verifying identity security of terminal equipment
CN111193760B (en) Information sending method, device and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination