CN112565327A - Access flow forwarding method, cluster management method and related device - Google Patents

Access flow forwarding method, cluster management method and related device Download PDF

Info

Publication number
CN112565327A
CN112565327A CN201910919154.3A CN201910919154A CN112565327A CN 112565327 A CN112565327 A CN 112565327A CN 201910919154 A CN201910919154 A CN 201910919154A CN 112565327 A CN112565327 A CN 112565327A
Authority
CN
China
Prior art keywords
cluster
target
data center
group
client
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910919154.3A
Other languages
Chinese (zh)
Other versions
CN112565327B (en
Inventor
李志鹏
张波
王华夏
毛茂德
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Huya Technology Co Ltd
Original Assignee
Guangzhou Huya Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Huya Technology Co Ltd filed Critical Guangzhou Huya Technology Co Ltd
Priority to CN201910919154.3A priority Critical patent/CN112565327B/en
Publication of CN112565327A publication Critical patent/CN112565327A/en
Application granted granted Critical
Publication of CN112565327B publication Critical patent/CN112565327B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/56Provisioning of proxy services
    • H04L67/562Brokering proxy services

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The application provides an access flow forwarding method, a cluster management method and a related device, and relates to the technical field of clusters.

Description

Access flow forwarding method, cluster management method and related device
Technical Field
The present application relates to the field of cluster technologies, and in particular, to an access traffic forwarding method, a cluster management method, and a related apparatus.
Background
Clustering techniques can improve the availability of data. For example, in the deployment scheme of an ES (elastic search) cluster, a primary and a secondary cluster may be deployed in different IDCs (Internet Data centers ), respectively, where the primary ES cluster is responsible for processing Data, and the secondary ES cluster is responsible for backing up Data, and when the primary ES cluster is unavailable, access traffic may be quickly switched to the secondary ES cluster, so as to maintain the availability of a cluster system.
However, in the deployment scheme of the ES cluster, for example, when the primary ES cluster is unavailable, the user is required to manually switch the access traffic to the standby ES cluster, and the switching efficiency is low.
Disclosure of Invention
The application aims to provide an access flow forwarding method, a cluster management method and a related device, which can enable access flow to be automatically forwarded to a cluster with a normal working state.
In order to achieve the above purpose, the embodiments of the present application employ the following technical solutions:
in a first aspect, an embodiment of the present application provides an access traffic forwarding method, which is applied to a first server running a proxy service, and the method includes:
according to a target cluster identifier contained in the received access flow, obtaining a target cluster group corresponding to the target cluster identifier in cluster configuration policy information, wherein the cluster configuration policy information records a one-to-one correspondence relationship between at least one cluster identifier and at least one cluster group, and each cluster group at least comprises two clusters;
and forwarding the access flow to the cluster with the normal working state in the target cluster group according to the working state of each cluster recorded in the cluster configuration strategy information.
In a second aspect, an embodiment of the present application provides a cluster management method, which is applied to a second server running a management service, and the method includes:
receiving respective working states sent by a plurality of clusters;
and sending the working states of the clusters to a first server running the proxy service, so that the proxy service forwards the access flow to the cluster with the normal working state according to the working state of each cluster.
In a third aspect, an embodiment of the present application provides an access traffic forwarding system, including a first server running a proxy service and a second server running a management service, where the first server establishes communication with the second server;
the management service receives respective working states sent by a plurality of clusters and sends the working states of the clusters to the proxy service;
the proxy service obtains a target cluster group corresponding to a target cluster identifier in cluster configuration policy information according to the target cluster identifier contained in the received access flow, wherein the cluster configuration policy information records a one-to-one correspondence relationship between at least one cluster identifier and at least one cluster group, and each cluster group at least comprises two clusters;
and the proxy service forwards the access flow to the cluster with the normal working state in the target cluster group according to the working state of each cluster recorded in the cluster configuration strategy information.
In a fourth aspect, an embodiment of the present application provides an access traffic forwarding system, including a plurality of first servers running proxy services, a second server running a control center, and a third server running a name service, where the second server and the third server both establish communication with each proxy service;
the control center receives respective working states sent by a plurality of clusters and sends the working states of the clusters to each proxy service;
the name service receives a cluster access request sent by a client, and obtains transmission quality evaluation parameters corresponding to the client and a plurality of target data centers respectively according to data center management information, wherein the cluster access request contains a target cluster identifier, the data center management information records a one-to-one correspondence relationship between the plurality of cluster identifiers and a plurality of data center groups, the plurality of target data centers are all data centers contained in the target data center group, and the target data center group is a data center group corresponding to the target cluster identifier; each transmission quality evaluation parameter is used for representing the quality of data transmission between the client and each target data center;
the name service sends a label corresponding to a target data center with the highest transmission quality evaluation parameter to the client, so that the client sends access flow to a target proxy service corresponding to the target data center with the highest transmission quality evaluation parameter, wherein the target proxy service is one of the proxy services;
the target agent service obtains a target cluster group corresponding to a target cluster identifier in cluster configuration policy information according to the target cluster identifier contained in the received access flow, wherein the cluster configuration policy information records a one-to-one correspondence relationship between at least one cluster identifier and at least one cluster group, and each cluster group at least comprises two clusters;
and the target agent service forwards the access flow to the cluster with the normal working state in the target cluster group according to the working state of each cluster recorded in the cluster configuration strategy information.
In a fifth aspect, an embodiment of the present application provides a server, including a memory for storing one or more programs; a processor; when executed by the processor, the one or more programs implement the access traffic forwarding method or the cluster management method described above.
In a sixth aspect, an embodiment of the present application provides a computer-readable storage medium, on which a computer program is stored, where the computer program, when executed by a processor, implements the above-mentioned access traffic forwarding method or cluster management method.
According to the access flow forwarding method, the cluster management method and the related device provided by the embodiment of the application, the one-to-one corresponding relation between at least one cluster identifier and at least one cluster group is recorded by the proxy service, so that the target cluster group corresponding to the target cluster identifier is obtained according to the target cluster identifier contained in the received access flow, and the access flow is forwarded to the cluster with a normal working state in the target cluster group according to the recorded working state of each cluster.
In order to make the aforementioned objects, features and advantages of the present application more comprehensible, preferred embodiments accompanied with figures are described in detail below.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings that are required to be used in the embodiments will be briefly described below, it should be understood that the following drawings only illustrate some embodiments of the present application and therefore should not be considered as limiting the scope, and it will be apparent to those skilled in the art that other related drawings can be obtained from the drawings without inventive effort.
FIG. 1 illustrates a schematic diagram of an existing cluster deployment scenario;
FIG. 2 is a schematic diagram of a cluster deployment scenario according to an embodiment of the present application;
FIG. 3 is a schematic block diagram of a server provided in an embodiment of the present application;
fig. 4 shows a schematic flow chart of an access traffic forwarding method provided in an embodiment of the present application;
FIG. 5 shows a schematic flow diagram of the substeps of step 203 in FIG. 4;
fig. 6 shows another schematic flow chart of an access traffic forwarding method provided in an embodiment of the present application;
fig. 7 is a schematic flowchart of a cluster management method provided in an embodiment of the present application;
fig. 8 shows another schematic flowchart of a cluster management method provided in an embodiment of the present application;
fig. 9 is a schematic signaling interaction diagram of an access traffic forwarding system according to an embodiment of the present application;
FIG. 10 is a schematic diagram of another cluster deployment scenario in accordance with an embodiment of the present application;
fig. 11 shows another signaling interaction diagram of the access traffic forwarding system according to the embodiment of the present application.
In the figure: 100-a server; 101-a memory; 102-a processor; 103-communication interface.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are some embodiments of the present application, but not all embodiments. The components of the embodiments of the present application, generally described and illustrated in the figures herein, can be arranged and designed in a wide variety of different configurations.
Thus, the following detailed description of the embodiments of the present application, presented in the accompanying drawings, is not intended to limit the scope of the claimed application, but is merely representative of selected embodiments of the application. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
It should be noted that: like reference numbers and letters refer to like items in the following figures, and thus, once an item is defined in one figure, it need not be further defined and explained in subsequent figures. Meanwhile, in the description of the present application, the terms "first", "second", and the like are used only for distinguishing the description, and are not to be construed as indicating or implying relative importance.
It is noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.
Some embodiments of the present application will be described in detail below with reference to the accompanying drawings. The embodiments described below and the features of the embodiments can be combined with each other without conflict.
In the current ES cluster deployment manner, a master-slave deployment scheme across internet data centers is generally adopted, each ES cluster includes a master cluster and a slave cluster, all the master clusters can be deployed in the same internet data center, all the corresponding slave clusters are deployed in another internet data center, then the master clusters process data, and synchronize the data to the slave clusters for backup, thereby providing availability of the data.
In an application scenario such as that shown in FIG. 1, IDC-1 is deployed with a primary cluster of ES-1, ES-2, ES-3, ES-4, IDC-2 is deployed with a backup cluster of ES-1, ES-2, ES-3, ES-4; the access addresses of IDC-1 and IDC-2 are locally maintained in the client 1 and the client 2, when the client 1 wants to access the ES-1, the client 1 sends an access request to the IDC-1 according to the maintained access address of the IDC-1, and the access request carries the identifier corresponding to the ES-1, so that the access of the ES cluster is realized.
However, in the foregoing example, when the primary cluster of ES-1 becomes unavailable due to failure, the client 1 needs to manually switch the access address of the access request from IDC-1 to IDC-2, i.e., needs to manually switch the primary cluster accessing ES-1 to the backup cluster accessing ES-1, and the switching efficiency is low.
Therefore, based on the above defects, a possible implementation manner provided by the embodiment of the present application is as follows: the one-to-one corresponding relation between the at least one cluster identifier and the at least one cluster group is recorded by the proxy service, so that the target cluster group corresponding to the target cluster identifier is obtained according to the target cluster identifier contained in the received access flow, and the access flow is forwarded to the cluster in the target cluster group with a normal working state according to the recorded working state of each cluster, so that when part of the clusters are unavailable, the access flow can be automatically switched to other available clusters without manual switching of a user, and the switching efficiency is improved.
Referring to fig. 2, fig. 2 is a schematic diagram of a cluster deployment scheme in an embodiment of the present application, in the embodiment of the present application, an agent service may be deployed in an IDC, and the agent service records working states of each ES cluster (including a main cluster and a standby cluster), for example, each ES cluster reports the respective working state to a management service, and then the management service issues the working state of each ES cluster to the agent service, so that when the agent service receives access traffic of a client, the agent service can actively forward the access traffic to a cluster whose working state is normal, without manually switching by the client.
It should be noted that fig. 2 is only a schematic diagram, and each IDC is deployed with a proxy service, for example, the proxy service deployed by IDC-1 is proxy service 1, and the proxy service deployed by IDC-2 is proxy service 2; in some other possible application scenarios in the embodiment of the present application, a proxy service may also be deployed in a unified manner to execute the steps of the access traffic forwarding method provided in the embodiment of the present application; the embodiment of the application does not limit the deployment mode of the proxy service.
In addition, the proxy service can report the state information of the proxy service to the management service, such as an IP address, network quality, and the like, so that when the client sends the access traffic to the proxy service, the client can first request the IDC with the best transmission data quality from the management service, and then the client can send the access traffic to the proxy service corresponding to the IDC with the best transmission data quality, thereby improving the traffic access quality.
Referring to fig. 3, fig. 3 is a schematic block diagram of a server 100 according to an embodiment of the present disclosure. On one hand, the server 100 may be used as a first server for running a proxy service, so that the access traffic forwarding method provided in the embodiment of the present application is implemented by executing corresponding software programs and modules; on the other hand, the server 100 may also be used as a second server for running a management service, so that the cluster management method provided in the embodiment of the present application is implemented by executing corresponding software programs and modules; alternatively, the server 100 may be used as a first server for running a proxy service, a second server for running a control center, or a third server for running a name service.
The server 100 includes a memory 101, a processor 102, and a communication interface 103, wherein the memory 101, the processor 102, and the communication interface 103 are electrically connected to each other directly or indirectly to implement data transmission or interaction. For example, the components may be electrically connected to each other via one or more communication buses or signal lines.
The memory 101 may be configured to store software programs and modules, and the processor 102 executes the software programs and modules stored in the memory 101 to execute various functional applications and data processing, so as to implement the access traffic forwarding method or the cluster management method provided in the embodiment of the present application. The communication interface 103 may be used for communicating signaling or data with other node devices.
The Memory 101 may be, but is not limited to, a Random Access Memory (RAM), a Read Only Memory (ROM), a Programmable Read-Only Memory (PROM), an Erasable Read-Only Memory (EPROM), an electrically Erasable Programmable Read-Only Memory (EEPROM), and the like.
The processor 102 may be an integrated circuit chip having signal processing capabilities. The Processor 102 may be a general-purpose Processor, including a Central Processing Unit (CPU), a Network Processor (NP), and the like; but also Digital Signal Processors (DSPs), Application Specific Integrated Circuits (ASICs), Field Programmable Gate Arrays (FPGAs) or other Programmable logic devices, discrete Gate or transistor logic devices, discrete hardware components.
It will be appreciated that the configuration shown in fig. 3 is merely illustrative and that the server 100 may include more or fewer components than shown in fig. 3 or have a different configuration than shown in fig. 3. The components shown in fig. 3 may be implemented in hardware, software, or a combination thereof.
The access traffic forwarding method provided in the embodiment of the present application is exemplarily described below by taking the server 100 shown in fig. 3 as a first server for running a proxy service as an example.
Referring to fig. 4, fig. 4 shows a schematic flowchart of an access traffic forwarding method provided in the embodiment of the present application, including the following steps:
step 201, according to a target cluster identifier contained in the received access flow, obtaining a target cluster group corresponding to the target cluster identifier in the cluster configuration policy information;
step 203, according to the working state of each cluster recorded in the cluster configuration policy information, forwarding the access traffic to the cluster with the normal working state in the target cluster group.
In the embodiment of the present application, the proxy service maintains cluster configuration policy information, where a one-to-one correspondence relationship between at least one cluster identifier and at least one cluster group is recorded in the cluster configuration policy information, and each cluster group includes at least two clusters.
For example, in an application scenario as shown in fig. 2, taking the proxy service 1 deployed in IDC-1 as an example, the cluster configuration policy information recorded by the proxy service 1 may be as shown in the following table 1:
TABLE 1
Figure BDA0002217061270000081
According to the cluster configuration policy information shown in table 1, when the target cluster contained in the received access traffic is identified as HOST1, the proxy service 1 may use the cluster group ES-1 corresponding to HOST1 as the target cluster group, and the target cluster group ES-1 contains a primary cluster ES-1-M and a backup cluster ES-1-B; when the target cluster included in the received access traffic is identified as HOST2, cluster group ES-2 corresponding to HOST2 may be the target cluster group, and target cluster group ES-2 includes primary cluster ES-2-M and backup cluster ES-2-B.
In addition, the cluster configuration strategy information maintained by the proxy service also records the working state of each cluster; when the proxy service obtains the target cluster group corresponding to the target cluster identifier in step 201, the proxy service forwards the access traffic to the cluster in the target cluster group whose working state is normal, in combination with the working state of each cluster recorded in the cluster configuration policy information.
For example, in the cluster configuration policy information shown in table 1, it is assumed that the working state of the cluster ES-1-M recorded in the cluster configuration policy information is abnormal, and the working state of the cluster ES-1-B is normal; if the proxy service determines that the target cluster group is ES-1 according to the target cluster identifier contained in the received access flow as HOST1, the proxy service forwards the access flow to the cluster ES-1-B by combining the working states of the cluster ES-1-M and the cluster ES-1-B.
It should be noted that the working state of each cluster recorded in the cluster configuration policy information maintained by the proxy service may be, as shown in fig. 2, the working state of each ES cluster is collected by the management service, and then the management service sends the working state of each ES cluster to the proxy service; or each ES cluster directly sends the respective working state to the proxy service; the embodiment of the application does not limit the way in which the proxy service obtains the working state of each ES cluster.
It can be seen that, based on the above design, in the access traffic forwarding method provided in this embodiment of the present application, a one-to-one correspondence relationship between at least one cluster identifier and at least one cluster group is recorded by an agent service, so as to obtain a target cluster group corresponding to the target cluster identifier according to a target cluster identifier included in a received access traffic, and further forward the access traffic to a cluster in which a working state is normal in the target cluster group according to a recorded working state of each cluster.
It should be noted that the proxy service may record the operating status of each cluster in the cluster configuration policy information in various manners, for example, may record the operating status using relative identification information, for example, T represents normal and F represents a fault, or 1 represents normal and 0 represents a fault.
As a possible implementation manner, in the embodiment of the present application, the weight parameter may be used to represent the working state of each cluster; accordingly, referring to fig. 5, fig. 5 shows a schematic flow diagram of the sub-steps of step 203 in fig. 4, and step 203 may include the sub-steps of:
step 203-1, obtaining the weight parameters corresponding to all clusters contained in the target cluster group according to the cluster configuration strategy information;
step 203-2, the access traffic is forwarded to the target clusters in the target cluster group.
In the embodiment of the present application, as shown in table 1 above, the cluster configuration policy information records weight parameters corresponding to a plurality of clusters, where each weight parameter is used to represent a working state of a corresponding cluster; for example, 0% may be used to indicate a fault, and values greater than 0% may be used to indicate normality, such as 100%, 95%, or 5% in table 1 above.
Therefore, when the proxy service executes step 203, the weight parameters corresponding to all clusters included in the target cluster group may be obtained according to the cluster configuration policy information, so as to determine the cluster in the target cluster group whose working state is normal, and further, the cluster in the target cluster group whose working state is normal represented by the corresponding weight parameters is used as the target cluster, and the access traffic is forwarded to the target cluster.
For example, in the above example, when the target cluster identifier included in the access traffic received by the proxy service is HOST1, the proxy service obtains the corresponding target cluster group as ES-1 in the cluster configuration policy information shown in table 1, and obtains the weight parameters corresponding to each of the two clusters ES-1-M and ES-1-B included in the target cluster group ES-1 according to the cluster configuration policy information, where the weight parameters are 0% and 100%, respectively, according to the rule in the above example, 0% indicates that the operating state is a failure, 100% indicates that the operating state is normal, and the proxy service forwards the access traffic to ES-1-B; or, when the target cluster group corresponding to the target cluster identifier included in the access traffic received by the proxy service is ES-2, and the weight parameters corresponding to the two clusters ES-2-M and ES-2-B included in ES-2 are 95% and 5%, respectively, according to the rule of the above example, both clusters are in a normal working state, the proxy service may forward a part of the access traffic to the cluster ES-2-M, and forward the other part of the access traffic to the cluster ES-2-B, or forward the access traffic to one of the clusters ES-2-M and ES-2-B.
It should be noted that, in the foregoing implementation manner provided in the embodiment of the present application, the weight parameter may be used to not only characterize the working state of the corresponding cluster, but also perform load balancing on different clusters belonging to the same cluster group.
For example, the weight parameter may be divided into a first weight parameter and a second weight parameter, where the first weight parameter characterizes that the working state of the corresponding cluster is a failure, for example, 100% in the above example may be used as the first weight parameter, and 0% may be used as the second weight parameter.
In performing step 203-1, when the proxy service determines that there is a cluster with the second weight parameter in all the clusters contained in the target cluster group, the access traffic may be forwarded to the cluster with the first weight parameter.
For example, in the previous example, when the proxy service determines that ES-1 is the target cluster group and the weight parameters for ES-1-M and ES-1-B are 0% and 100%, respectively, then the access traffic is forwarded to cluster ES-1-B.
On the other hand, in an application scenario such as an ES cluster, one cluster group generally includes a main cluster and at least one standby cluster (the application scenario shown in table 1 and fig. 2 only shows one standby cluster), when the target cluster group determined by the proxy service includes the main cluster and the at least one standby cluster, in executing step 203-1, the access traffic may be respectively forwarded to the main cluster and the at least one standby cluster in proportion according to a third weight parameter and a fourth weight parameter, where the third weight parameter is greater than the fourth weight parameter, so that the standby cluster shares processing pressure of at least part of the main cluster.
For example, in the foregoing example, when the proxy service determines that ES-2 is the target cluster group and the weighting parameters corresponding to ES-2-M and ES-2-B are 95% and 5%, respectively, 95% of the access traffic may be forwarded to ES-2-M and the remaining 5% of the access traffic may be forwarded to ES-2-B, so that the standby cluster shares the processing pressure of at least part of the primary cluster.
Therefore, based on the above design, the access traffic forwarding method provided in the embodiment of the present application can be used to characterize the working state of each cluster by setting the corresponding weight parameter for each cluster, and can also distribute the access traffic to a plurality of clusters in proportion to be processed, thereby reducing the pressure of processing the access traffic by a single cluster.
It should be noted that, in the scheme of splitting the access traffic, setting the weight parameter to 95% and 5% is only an illustration, and in some other possible application scenarios in the embodiment of the present application, for example, in the application scenario shown in fig. 2, the weight parameter of each of the main cluster and the backup cluster may also be set to other values, such as 90% and 10% respectively, or 85% and 15% respectively, and the embodiment of the present application does not limit the specific value and the setting manner of the weight parameter.
In addition, fig. 2 is only an example, and a cluster group deployed in a manner of one master cluster and one standby cluster may also be deployed in other manners, such as one master cluster and multiple standby clusters, in some other possible application scenarios in the embodiment of the present application.
In addition, in the ES cluster deployment scheme shown in fig. 2, the operating status of the ES cluster is not always constant, such as the operating status of ES-2-B may change from normal to failure in the application scenario shown in table 1.
To this end, referring to fig. 6, fig. 6 shows another schematic flowchart of an access traffic forwarding method provided in an embodiment of the present application, and on the basis of fig. 5, the access traffic forwarding method further includes the following steps:
step 205, updating the weight parameters corresponding to all the clusters included in the first cluster group in the cluster configuration policy information according to the received working state of the first cluster.
In this embodiment of the present application, the proxy service uses, as the first cluster group, the cluster group to which the first cluster belongs according to the received working state of the first cluster, and then updates the weight parameters corresponding to all clusters included in the first cluster group in the cluster configuration policy information.
For example, in the example of table 1, if the proxy service receives that the working state of the cluster ES-2-B is abnormal, the proxy service updates the weight parameter corresponding to the cluster ES-2-B to 0% and updates the weight parameter of the cluster ES-2-M to 100% in the cluster group ES-2 to which the cluster ES-2-B belongs; or, if the working state of the cluster ES-1-M received by the proxy service is normal, the proxy service updates the weight parameter corresponding to the cluster ES-1-M to 95% and the weight parameter corresponding to the cluster ES-1-B to 5% in the cluster ES-1 to which the cluster ES-1-M belongs.
Therefore, based on the above design, according to the access traffic forwarding method provided in the embodiment of the present application, the respective weight parameters of all clusters in the first cluster group to which the first cluster belongs are updated according to the received working state of the first cluster, so that the proxy service can ensure that the access traffic is forwarded to the cluster with the normal working state according to the latest weight parameter of each cluster.
It should be noted that, there is no sequential execution order between step 205 and step 201 and step 203 in fig. 6, step 205 may be executed after step 203 as shown in fig. 6, or may be executed before step 201, which is not limited in this application embodiment, and the execution of step 205 may be determined according to a specific application scenario or user setting, for example, in some other possible application scenarios in this application embodiment, step 205 may also be executed together with step 201.
In addition, the foregoing implementation manner of the embodiment of the present application takes the server 100 shown in fig. 3 as a first server for running a proxy service as an example, and exemplarily illustrates the access traffic forwarding method provided in the embodiment of the present application; accordingly, taking the server 100 shown in fig. 3 as a second server for running the management service as an example, the cluster management method provided in the embodiment of the present application is exemplarily described below.
Referring to fig. 7, fig. 7 is a schematic flowchart illustrating a cluster management method according to an embodiment of the present application, including the following steps:
step 301, receiving respective working states sent by a plurality of clusters;
step 303, sending the working states of the plurality of clusters to a first server running the proxy service, so that the proxy service forwards the access traffic to the cluster with a normal working state according to the working state of each cluster.
In this embodiment of the present application, the management service may receive respective working states sent by multiple clusters in a unified manner, for example, in an application scenario as shown in fig. 2, the management service may receive respective working states sent by a master cluster and a standby cluster belonging to an ES-1 cluster group, a master cluster and a standby cluster belonging to an ES-2 cluster group, a master cluster and a standby cluster belonging to an ES-3 cluster group, and a master cluster and a standby cluster belonging to an ES-4 cluster group; then, the management service sends the received working states of the plurality of clusters to the first server running the proxy service in fig. 2, so that the proxy service forwards the access traffic to the cluster with a normal working state according to the working state of each cluster.
It should be noted that the management service may receive the respective working states sent by the plurality of clusters in a plurality of ways. For example, the cluster may be set to send a heartbeat message to the management service according to a set period, and if the management service receives the heartbeat message sent by the cluster according to the set period, the management service determines that the working state of the cluster is normal; and if the management service does not receive the heartbeat message sent by the cluster according to the set period, the management service determines that the working state of the cluster is a fault.
Of course, it may be understood that the manner in which the management service receives the respective working states sent by the multiple clusters is merely an illustration, and in some other possible application scenarios in this embodiment of the application, the manner in which the management service receives the respective working states sent by the multiple clusters may also be implemented by some other manners, such as: each ES cluster actively reports respective example health state information to a management service, and the management service judges whether a corresponding example is available according to the received respective reported example health state information of each ES cluster, so as to judge whether the corresponding ES cluster fails; or each ES cluster actively reports respective load conditions such as CPU (Central processing Unit) and memory use conditions to the management service, and the management service judges whether the corresponding ES cluster fails according to the respective load conditions of each ES cluster; the embodiment of the present application does not limit the implementation manner of receiving the respective working states sent by the plurality of clusters by the management service.
In addition, in the existing deployment scheme shown in fig. 1, for example, when a client wants to access a certain cluster directionally, an IP address of an IDC where the cluster to be accessed is located needs to be manually added to a request, and this manner of manual operation by a user often fails to consider the transmission quality between the client and the IDC when the cluster is deployed.
To this end, referring to fig. 8, fig. 8 shows another schematic flowchart of a cluster management method provided in an embodiment of the present application, and on the basis of fig. 7, the cluster management method may further include the following steps:
step 305, receiving a cluster access request sent by a client;
307, acquiring transmission quality evaluation parameters corresponding to the client and the target data centers respectively according to the data center management information;
step 309, sending the label corresponding to the target data center with the highest transmission quality evaluation parameter to the client, so that the client accesses the target data center with the highest transmission quality evaluation parameter.
In the embodiment of the present application, the management service maintains data center management information, where the data center management information records a one-to-one correspondence relationship between a plurality of cluster identifiers and a plurality of data center groups.
For example, in the application scenario shown in fig. 2, the data center management information for managing the service record may be as shown in table 2 below:
TABLE 2
Figure BDA0002217061270000151
The data center management information shown in table 2 can be explained as follows: the data center group corresponding to the cluster with the cluster identifier of HOST1 consists of a data center with the IP address of IP1 and a data center with the IP address of IP 2; the data center group corresponding to the cluster with the cluster identifier of HOST2 consists of a data center with the IP address of IP1 and a data center with the IP address of IP 2; the data center group corresponding to the cluster with the cluster identifier of HOST3 consists of a data center with the IP address of IP1 and a data center with the IP address of IP 2; the data center group corresponding to the cluster identified as HOST4 is composed of a data center with an IP address of IP1 and a data center with an IP address of IP 2.
The management service obtains a plurality of target data centers corresponding to a target cluster identifier in data center management information according to the target cluster identifier contained in a cluster access request sent by a receiving client, for example, when the target cluster identifier contained in the cluster access request of the client 1 received by the management service is HOST2, the management service may use a data center group corresponding to HOST2 as a target data center group, and use both a data center IDC-1 with an IP address of IP1 and a data center IDC-2 with an IP address of IP2 contained in the target data center group as target data centers, thereby calculating transmission quality evaluation parameters of the client 1 and the client 1, and calculating transmission quality evaluation parameters of the client 1 and the IDC-2; and each transmission quality evaluation parameter is used for representing the quality of data transmission between the client and each target data center.
Then, the management service compares the transmission quality evaluation parameters corresponding to the client and the target data centers respectively, and sends the label corresponding to the target data center with the highest transmission quality evaluation parameter to the client so that the client accesses the target data center with the highest transmission quality evaluation parameter; for example, if the management service determines that the transmission quality evaluation parameters of the client 1 and the IDC-1 are the highest, the IP address of the IDC-1 may be returned to the client 1, so that the client 1 accesses the IDC-1.
Based on the above design, the cluster management method provided in the embodiment of the present application calculates, by the management service, transmission quality evaluation parameters corresponding to the client and the multiple target data centers, so as to send the label corresponding to the target data center with the highest transmission quality evaluation parameter to the client, so that the client accesses the corresponding cluster by accessing the target data center with the highest transmission quality evaluation parameter.
It should be noted that, in some other possible implementation manners of the embodiment of the present application, the management service may also directly send the cluster access request to the target data center with the highest transmission quality evaluation parameter instead of sending the tag corresponding to the target data center with the highest transmission quality evaluation parameter to the management service, for example, in the foregoing example, the management service may directly send the cluster access request sent by the client 1 to the IDC-1 instead of sending the IP address of the IDC-1 to the client 1.
In addition, the above cluster access request may be implemented by using access traffic of the client, that is: the client sends the access flow to the management service, and the management service calculates the target data center with the highest transmission quality evaluation parameter corresponding to the client, so that the access flow is sent to the target data center with the highest transmission quality evaluation parameter corresponding to the client.
In addition, in the embodiment of the present application, the transmission quality evaluation parameter may be calculated through multiple dimensions. As a possible implementation manner, in this embodiment of the application, when step 307 is executed, the calculated physical transmission distance between the client and each target data center may be used as a transmission quality evaluation parameter corresponding to each target data center according to the data center management information.
For example, taking the client 1 in fig. 2 as an example, the management service may calculate the physical transmission distance L1 between the client 1 and IDC-1 and the physical transmission distance L2 between the client 1 and IDC-2 according to the IP address of the client 1, the IP address IP1 of IDC-1, and the IP address IP2 of IDC-2, respectively, so as to obtain the transmission quality evaluation parameter L1 corresponding to IDC-1 and the transmission quality evaluation parameter L2 corresponding to IDC-2.
Of course, it is understood that the above-mentioned using the physical transmission distance as the transmission quality evaluation parameter is only an illustration, and in some other possible implementation manners of the embodiment of the present application, some other manners may also be adopted to calculate and obtain the transmission quality evaluation parameter, such as calculating a network stability degree of each data center, or calculating a remaining network bandwidth of each data center, and the like.
In addition, an embodiment of the present application further provides an access traffic forwarding system as shown in fig. 2, which includes a first server running a proxy service and a second server running a management service, where the first server establishes communication with the second server.
The management service receives respective working states sent by the plurality of clusters and sends the working states of the plurality of clusters to the proxy service.
The proxy service obtains a target cluster group corresponding to the target cluster identifier in the cluster configuration policy information according to the target cluster identifier contained in the received access flow, wherein the cluster configuration policy information records a one-to-one correspondence relationship between at least one cluster identifier and at least one cluster group, and each cluster group at least comprises two clusters.
And forwarding the access flow to the cluster with the normal working state in the target cluster group by the proxy service according to the working state of each cluster recorded in the cluster configuration strategy information.
In order to further explain the above access traffic forwarding system provided in the embodiment of the present application, on the basis of fig. 2, please refer to fig. 9, where fig. 9 shows a signaling interaction diagram of the access traffic forwarding system provided in the embodiment of the present application, which includes the following steps:
during cluster state maintenance:
step 401, the management service receives respective working states sent by a plurality of clusters;
step 402, the management service sends the working states of the plurality of clusters to the agent service;
step 403, the agent service updates the weight parameter corresponding to each cluster in the cluster configuration policy information.
When a client requests access to a cluster:
step 404, the client sends a cluster access request to the management service;
step 405, the management service obtains transmission quality evaluation parameters corresponding to the client and a plurality of target data centers according to the data center management information;
step 406, the management service sends the label corresponding to the target data center with the highest transmission quality evaluation parameter to the client, so that the client accesses the corresponding cluster by accessing the target data center with the highest transmission quality evaluation parameter.
When a client accesses a cluster:
step 407, the client sends access traffic to the proxy service;
step 408, the proxy service obtains a target cluster group corresponding to the target cluster identifier in the cluster configuration policy information according to the target cluster identifier contained in the access flow;
step 409, the agent service forwards the access traffic to the cluster with the normal working state in the target cluster group according to the working state of each cluster recorded in the cluster configuration policy information.
For a brief description, please refer to the above description of the embodiments of the present application for a specific implementation manner and implementation scheme of the step shown in fig. 9, which is not repeated herein.
In addition, in some other possible application scenarios of the embodiment of the present application, the technical solution described in the embodiment of the present application may also be implemented in other manners, for example, please refer to fig. 10, fig. 10 shows another schematic diagram of a cluster deployment scheme of the embodiment of the present application, and in the scheme shown in fig. 10, a name service and a control center may be deployed to implement the function of managing services in fig. 2.
For example, the control center receives respective working states sent by all clusters, and the working states of all the clusters are sent to the proxy service, and the name service and the proxy service receive the IP address sent by the proxy service, receive the cluster access request sent by the client, and then send the label corresponding to the target data center with the highest transmission quality evaluation parameter to the client.
Based on the cluster deployment scheme shown in fig. 10, an embodiment of the present application further provides another access traffic forwarding system shown in fig. 10, which includes a plurality of first servers running proxy services, a second server running a control center, and a third server running a name service, where the second server and the third server both establish communication with each proxy service.
And the control center receives respective working states sent by the plurality of clusters and sends the working states of the plurality of clusters to each agent service.
The name service receives a cluster access request sent by a client, and obtains transmission quality evaluation parameters corresponding to the client and a plurality of target data centers respectively according to data center management information, wherein the cluster access request comprises a target cluster identifier, the data center management information records a one-to-one correspondence relationship between the plurality of cluster identifiers and a plurality of data center groups, the plurality of target data centers are all data centers contained in the target data center group, and the target data center group is a data center group corresponding to the target cluster identifier; each transmission quality evaluation parameter is used for representing the quality of data transmission between the client and each target data center.
The name service sends the label corresponding to the target data center with the highest transmission quality evaluation parameter to the client, so that the client sends access flow to the target proxy service corresponding to the target data center with the highest transmission quality evaluation parameter, wherein the target proxy service is one of the plurality of proxy services.
The target agent service obtains a target cluster group corresponding to the target cluster identifier in the cluster configuration policy information according to the target cluster identifier contained in the received access flow, wherein the cluster configuration policy information records a one-to-one correspondence relationship between at least one cluster identifier and at least one cluster group, and each cluster group at least comprises two clusters.
And the target agent service forwards the access flow to the cluster with the normal working state in the target cluster group according to the working state of each cluster recorded in the cluster configuration strategy information.
In order to further explain the access traffic forwarding system shown in fig. 10 provided in the embodiment of the present application, on the basis of fig. 10, please refer to fig. 11, where fig. 11 shows another signaling interaction diagram of the access traffic forwarding system provided in the embodiment of the present application, and the signaling interaction diagram includes the following steps:
during cluster state maintenance:
step 501, a control center receives respective working states sent by a plurality of clusters;
step 502, the control center sends the working states of a plurality of clusters to each agent service;
step 503, each agent service updates the weight parameter corresponding to each cluster in the cluster configuration policy information.
When a client requests access to a cluster:
step 504, the client sends a cluster access request to the name service;
step 505, the name service obtains transmission quality evaluation parameters corresponding to the client and a plurality of target data centers according to the data center management information;
in step 506, the name service sends the label corresponding to the target data center with the highest transmission quality evaluation parameter to the client, so that the client sends the access flow to the target proxy service corresponding to the target data center with the highest transmission quality evaluation parameter.
When the client sends the access traffic:
step 507, the client sends access flow to the target proxy service;
step 508, the target proxy service obtains a target cluster group corresponding to the target cluster identifier in the cluster configuration policy information according to the target cluster identifier contained in the access flow;
in step 509, the target proxy service forwards the access traffic to the cluster in the target cluster group whose operating state is normal according to the operating state of each cluster recorded in the cluster configuration policy information.
For a brief description, please refer to the above description of the embodiments of the present application for a specific implementation manner and implementation scheme of the step shown in fig. 11, which is not repeated herein.
In the embodiments provided in the present application, it should be understood that the disclosed apparatus and method may be implemented in other ways. The apparatus embodiments described above are merely illustrative and, for example, the flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of apparatus, methods and computer program products according to embodiments of the present application. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s).
It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved.
It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
In addition, the functional modules in the embodiments of the present application may be integrated together to form an independent part, or each module may exist separately, or two or more modules may be integrated to form an independent part.
The functions, if implemented in the form of software functional modules and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present application or portions thereof that substantially contribute to the prior art may be embodied in the form of a software product stored in a storage medium and including instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present application. And the aforementioned storage medium includes: u disk, removable hard disk, read only memory, random access memory, magnetic or optical disk, etc. for storing program codes.
To sum up, according to the access traffic forwarding method, the cluster management method, and the related device provided in the embodiments of the present application, on one hand, by setting the proxy service, the proxy service records a one-to-one correspondence relationship between at least one cluster identifier and at least one cluster group, so as to obtain a target cluster group corresponding to the target cluster identifier according to a target cluster identifier included in the received access traffic, and further forward the access traffic to a cluster in which a working state is normal in the target cluster group according to a recorded working state of each cluster.
In addition, the corresponding weight parameters are set for each cluster, so that the method can be used for representing the working state of each cluster, and can also distribute the access flow to a plurality of clusters in proportion to be processed, thereby reducing the pressure of processing the access flow by a single cluster.
And updating the respective weight parameters of all clusters in the first cluster group to which the first cluster belongs according to the received working state of the first cluster, so that the proxy service can ensure that the access flow is forwarded to the cluster with the normal working state according to the latest weight parameter of each cluster.
On the other hand, by setting the management service, the management service calculates the transmission quality evaluation parameters corresponding to the client and the target data centers respectively, so that the label corresponding to the target data center with the highest transmission quality evaluation parameter is sent to the client, and the client accesses the corresponding cluster by accessing the target data center with the highest transmission quality evaluation parameter.
The above description is only a preferred embodiment of the present application and is not intended to limit the present application, and various modifications and changes may be made by those skilled in the art. Any modification, equivalent replacement, improvement and the like made within the spirit and principle of the present application shall be included in the protection scope of the present application.
It will be evident to those skilled in the art that the present application is not limited to the details of the foregoing illustrative embodiments, and that the present application may be embodied in other specific forms without departing from the spirit or essential attributes thereof. The present embodiments are therefore to be considered in all respects as illustrative and not restrictive, the scope of the application being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein. Any reference sign in a claim should not be construed as limiting the claim concerned.

Claims (12)

1. An access traffic forwarding method applied to a first server running a proxy service, the method comprising:
according to a target cluster identifier contained in the received access flow, obtaining a target cluster group corresponding to the target cluster identifier in cluster configuration policy information, wherein the cluster configuration policy information records a one-to-one correspondence relationship between at least one cluster identifier and at least one cluster group, and each cluster group at least comprises two clusters;
and forwarding the access flow to the cluster with the normal working state in the target cluster group according to the working state of each cluster recorded in the cluster configuration strategy information.
2. The method according to claim 1, wherein the step of forwarding the access traffic to the cluster with a normal operating status in the target cluster group according to the operating status of each cluster recorded in the cluster configuration policy information comprises:
obtaining the weight parameters corresponding to all clusters contained in the target cluster group according to the cluster configuration strategy information; the cluster configuration strategy information records weight parameters corresponding to a plurality of clusters, and each weight parameter is used for representing the working state of the corresponding cluster;
and forwarding the access flow to a target cluster in the target cluster group, wherein the target cluster is a cluster which is characterized by corresponding weight parameters and has a normal working state.
3. The method of claim 2, wherein forwarding the access traffic to a target cluster in the target cluster group comprises:
forwarding the access traffic to the cluster having the first weight parameter when there is a cluster having the second weight parameter; the first weight parameter represents that the working state of the corresponding cluster is normal, and the second weight parameter represents that the working state of the corresponding cluster is fault.
4. The method of claim 2, wherein the target cluster group comprises a main cluster and at least one backup cluster, and when the operating states of the main cluster and the at least one backup cluster are normal, the step of forwarding the access traffic to a target cluster in the target cluster group comprises:
respectively forwarding the access flow to the main cluster and the at least one standby cluster in proportion according to a third weight parameter and a fourth weight parameter; wherein the third weight parameter is greater than the fourth weight parameter.
5. The method of claim 2, wherein the method further comprises:
updating the weight parameters corresponding to all clusters contained in the first cluster group in the cluster configuration strategy information according to the received working state of the first cluster; wherein the first cluster group is a cluster group to which the first cluster belongs.
6. A cluster management method applied to a second server running a management service, the method comprising:
receiving respective working states sent by a plurality of clusters;
and sending the working states of the clusters to a first server running the proxy service, so that the proxy service forwards the access flow to the cluster with the normal working state according to the working state of each cluster.
7. The method of claim 6, wherein the method further comprises:
receiving a cluster access request sent by a client, wherein the cluster access request contains a target cluster identifier;
acquiring transmission quality evaluation parameters corresponding to the client and a plurality of target data centers respectively according to data center management information, wherein the data center management information records a one-to-one correspondence relationship between a plurality of cluster identifiers and a plurality of data center groups, the plurality of target data centers are all data centers contained in a target data center group, and the target data center group is a data center group corresponding to the target cluster identifiers; each transmission quality evaluation parameter is used for representing the quality of data transmission between the client and each target data center;
and sending the label corresponding to the target data center with the highest transmission quality evaluation parameter to the client so that the client accesses the target data center with the highest transmission quality evaluation parameter.
8. The method according to claim 7, wherein the step of obtaining the transmission quality evaluation parameters corresponding to the client and each of the plurality of target data centers according to the data center management information comprises:
and according to the data center management information, taking the calculated physical transmission distance between the client and each target data center as a transmission quality evaluation parameter corresponding to each target data center.
9. An access traffic forwarding system comprising a first server running a proxy service and a second server running a management service, the first server establishing communication with the second server;
the management service receives respective working states sent by a plurality of clusters and sends the working states of the clusters to the proxy service;
the proxy service obtains a target cluster group corresponding to a target cluster identifier in cluster configuration policy information according to the target cluster identifier contained in the received access flow, wherein the cluster configuration policy information records a one-to-one correspondence relationship between at least one cluster identifier and at least one cluster group, and each cluster group at least comprises two clusters;
and the proxy service forwards the access flow to the cluster with the normal working state in the target cluster group according to the working state of each cluster recorded in the cluster configuration strategy information.
10. An access flow forwarding system is characterized by comprising a plurality of first servers running with proxy services, second servers running with control centers and third servers running with name services, wherein the second servers and the third servers are communicated with each proxy service;
the control center receives respective working states sent by a plurality of clusters and sends the working states of the clusters to each proxy service;
the name service receives a cluster access request sent by a client, and obtains transmission quality evaluation parameters corresponding to the client and a plurality of target data centers respectively according to data center management information, wherein the cluster access request contains a target cluster identifier, the data center management information records a one-to-one correspondence relationship between the plurality of cluster identifiers and a plurality of data center groups, the plurality of target data centers are all data centers contained in the target data center group, and the target data center group is a data center group corresponding to the target cluster identifier; each transmission quality evaluation parameter is used for representing the quality of data transmission between the client and each target data center;
the name service sends a label corresponding to a target data center with the highest transmission quality evaluation parameter to the client, so that the client sends access flow to a target proxy service corresponding to the target data center with the highest transmission quality evaluation parameter, wherein the target proxy service is one of the proxy services;
the target agent service obtains a target cluster group corresponding to a target cluster identifier in cluster configuration policy information according to the target cluster identifier contained in the received access flow, wherein the cluster configuration policy information records a one-to-one correspondence relationship between at least one cluster identifier and at least one cluster group, and each cluster group at least comprises two clusters;
and the target agent service forwards the access flow to the cluster with the normal working state in the target cluster group according to the working state of each cluster recorded in the cluster configuration strategy information.
11. A server, comprising:
a memory for storing one or more programs;
a processor;
the one or more programs, when executed by the processor, implement the method of any of claims 1-8.
12. A computer-readable storage medium, on which a computer program is stored which, when being executed by a processor, carries out the method according to any one of claims 1-8.
CN201910919154.3A 2019-09-26 2019-09-26 Access flow forwarding method, cluster management method and related device Active CN112565327B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910919154.3A CN112565327B (en) 2019-09-26 2019-09-26 Access flow forwarding method, cluster management method and related device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910919154.3A CN112565327B (en) 2019-09-26 2019-09-26 Access flow forwarding method, cluster management method and related device

Publications (2)

Publication Number Publication Date
CN112565327A true CN112565327A (en) 2021-03-26
CN112565327B CN112565327B (en) 2022-09-30

Family

ID=75030176

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910919154.3A Active CN112565327B (en) 2019-09-26 2019-09-26 Access flow forwarding method, cluster management method and related device

Country Status (1)

Country Link
CN (1) CN112565327B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113242301A (en) * 2021-05-11 2021-08-10 鸬鹚科技(深圳)有限公司 Method and device for selecting real server, computer equipment and storage medium
CN113259428A (en) * 2021-05-11 2021-08-13 鸬鹚科技(深圳)有限公司 Data access request processing method and device, computer equipment and medium
CN116233137A (en) * 2023-02-17 2023-06-06 通明智云(北京)科技有限公司 Cluster-based load sharing and backup method and device

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090245114A1 (en) * 2008-04-01 2009-10-01 Jayanth Vijayaraghavan Methods for collecting and analyzing network performance data
US20120151550A1 (en) * 2009-08-20 2012-06-14 Bin Zhang Method for switching node main-standby controllers based on content delivery network (cdn) and cdn thereof
CN104243337A (en) * 2013-06-09 2014-12-24 杭州华三通信技术有限公司 Method and device for cross-cluster load balancing
CN108011929A (en) * 2017-11-14 2018-05-08 平安科技(深圳)有限公司 Data request processing method, apparatus, computer equipment and storage medium
CN108173894A (en) * 2016-12-07 2018-06-15 阿里巴巴集团控股有限公司 The method, apparatus and server apparatus of server load balancing
CN110177007A (en) * 2019-04-16 2019-08-27 平安科技(深圳)有限公司 Realize gateway strange land method, apparatus, computer equipment and storage medium mostly living

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090245114A1 (en) * 2008-04-01 2009-10-01 Jayanth Vijayaraghavan Methods for collecting and analyzing network performance data
US20120151550A1 (en) * 2009-08-20 2012-06-14 Bin Zhang Method for switching node main-standby controllers based on content delivery network (cdn) and cdn thereof
CN104243337A (en) * 2013-06-09 2014-12-24 杭州华三通信技术有限公司 Method and device for cross-cluster load balancing
CN108173894A (en) * 2016-12-07 2018-06-15 阿里巴巴集团控股有限公司 The method, apparatus and server apparatus of server load balancing
CN108011929A (en) * 2017-11-14 2018-05-08 平安科技(深圳)有限公司 Data request processing method, apparatus, computer equipment and storage medium
CN110177007A (en) * 2019-04-16 2019-08-27 平安科技(深圳)有限公司 Realize gateway strange land method, apparatus, computer equipment and storage medium mostly living

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113242301A (en) * 2021-05-11 2021-08-10 鸬鹚科技(深圳)有限公司 Method and device for selecting real server, computer equipment and storage medium
CN113259428A (en) * 2021-05-11 2021-08-13 鸬鹚科技(深圳)有限公司 Data access request processing method and device, computer equipment and medium
CN113242301B (en) * 2021-05-11 2024-03-26 鸬鹚科技(深圳)有限公司 Method, device, computer equipment and storage medium for selecting true server
CN116233137A (en) * 2023-02-17 2023-06-06 通明智云(北京)科技有限公司 Cluster-based load sharing and backup method and device
CN116233137B (en) * 2023-02-17 2023-11-17 通明智云(北京)科技有限公司 Cluster-based load sharing and backup method and device

Also Published As

Publication number Publication date
CN112565327B (en) 2022-09-30

Similar Documents

Publication Publication Date Title
CN112565327B (en) Access flow forwarding method, cluster management method and related device
US20180270145A1 (en) Node connection method and distributed computing system
US10255148B2 (en) Primary role reporting service for resource groups
CN110365748B (en) Service data processing method and device, storage medium and electronic device
CN109344014B (en) Main/standby switching method and device and communication equipment
JP7270755B2 (en) Metadata routing in distributed systems
CN108062243B (en) Execution plan generation method, task execution method and device
CN111966289B (en) Partition optimization method and system based on Kafka cluster
CN111163173B (en) Cluster configuration method and device, server and readable storage medium
CN112953982B (en) Service processing method, service configuration method and related device
CN103581276A (en) Cluster management device and system, service client side and corresponding method
CN111176888B (en) Disaster recovery method, device and system for cloud storage
CN110730250A (en) Information processing method and device, service system and storage medium
US8977595B1 (en) Message-recovery file log locating and monitoring
CN107508700B (en) Disaster recovery method, device, equipment and storage medium
CN106790610B (en) Cloud system message distribution method, device and system
CN112631756A (en) Distributed regulation and control method and device applied to space flight measurement and control software
CN109412940B (en) Router management method and router management system
CN116112569B (en) Micro-service scheduling method and management system
CN110545197B (en) Node state monitoring method and device
CN114900449B (en) Resource information management method, system and device
CN114124797B (en) Server routing method and device, electronic equipment and storage medium
CN107493308B (en) Method and device for sending message and distributed equipment cluster system
CN112187919B (en) Storage node management method and related device
CN112055052B (en) Service detection and information distribution method, system and medium for internet of things system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant