CN113391878A - Remote access method, device, system and storage medium - Google Patents

Remote access method, device, system and storage medium Download PDF

Info

Publication number
CN113391878A
CN113391878A CN202110578186.9A CN202110578186A CN113391878A CN 113391878 A CN113391878 A CN 113391878A CN 202110578186 A CN202110578186 A CN 202110578186A CN 113391878 A CN113391878 A CN 113391878A
Authority
CN
China
Prior art keywords
task
client
container
deployment server
key parameters
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110578186.9A
Other languages
Chinese (zh)
Inventor
王胜男
郑溢淳
江达秀
吴立
陈斐洋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhejiang Dahua Technology Co Ltd
Original Assignee
Zhejiang Dahua Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhejiang Dahua Technology Co Ltd filed Critical Zhejiang Dahua Technology Co Ltd
Priority to CN202110578186.9A priority Critical patent/CN113391878A/en
Publication of CN113391878A publication Critical patent/CN113391878A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • G06F9/45533Hypervisors; Virtual machine monitors
    • G06F9/45558Hypervisor-specific management and integration aspects
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • G06F9/45533Hypervisors; Virtual machine monitors
    • G06F9/45558Hypervisor-specific management and integration aspects
    • G06F2009/45562Creating, deleting, cloning virtual machine instances
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • G06F9/45533Hypervisors; Virtual machine monitors
    • G06F9/45558Hypervisor-specific management and integration aspects
    • G06F2009/45595Network integration; Enabling network access in virtual machine instances

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Debugging And Monitoring (AREA)

Abstract

The application relates to a remote access method, a device, a system and a storage medium, wherein when a task submitted by a client is received, a task container is created for the task on a task deployment server, when a request of the client for the task container is received, key parameters of the task container are obtained from the task deployment server, the obtained key parameters of the task container are returned to the client, and after the key parameters of the task container are returned to the client, the client is triggered to carry out remote communication with the task container according to the key parameters, so that a user can carry out debugging and operation and maintenance management on a training task deployed at the server through the client, and further the working efficiency of the user is improved.

Description

Remote access method, device, system and storage medium
Technical Field
The present application relates to the field of telecommunications, and in particular, to a remote access method, apparatus, system, and storage medium.
Background
At present, due to the characteristics of lightweight, portability and schedulability of a container, the container is widely applied to the technologies of artificial intelligence, distributed service, algorithm training platform construction and the like. When the task training is performed based on the container, the client often only supports operations such as submission, parameter setting, result checking and the like of the training task, but does not support operation and maintenance inspection and program debugging according to the configuration information of the server and the task running information of the container, so that the working efficiency of the user in performing the task training is reduced.
Aiming at the problem that in the related art, a user cannot debug and operate and maintain a training task deployed in a task container at a client, so that the working efficiency of the user is low, an effective solution is not provided at present.
Disclosure of Invention
The embodiment provides a remote access method, a remote access device, a remote access system and a storage medium, so as to solve the problem that in the related art, a user cannot debug and operate and maintain a training task deployed in a task container at a client, so that the working efficiency of the user is low.
In a first aspect, a remote access method is provided in this embodiment, including the steps of:
when a task submitted by a client is received, a task container is established for the task on a task deployment server;
when a request of the client for the task container is received, acquiring key parameters of the task container from the task deployment server, and returning the acquired key parameters of the task container to the client;
and after the key parameters of the task container are returned to the client, triggering the client to enable the client to communicate with the task container according to the key parameters.
In some embodiments, the creating, on the task deployment server, a task container for the task when receiving the task submitted by the client includes:
and when receiving the task submitted by the client, creating a task container for the task on the task deployment server according to the basic mirror image.
In some of these embodiments, the method further comprises the steps of:
and adding an execution script for the task container in the basic mirror image of the task deployment server, and configuring the authority for the execution script to enable the task container to be executed according to the configured authority.
In some embodiments, the method includes that the request is an http request including a task identifier, and when receiving a request for the task container from the client, the method acquires key parameters of the task container from the task deployment server and returns the acquired key parameters of the task container to the client, including:
acquiring the task identifier from the http request, and inquiring server information of the task deployment server from a database according to the task identifier;
establishing connection with a corresponding task deployment server according to the server information;
and acquiring the key parameters of the task container from the corresponding task deployment server.
In some embodiments, the key parameters include a task deployment server address, a communication port, and a task container identifier, and when a request for the task container from the client is received, the method obtains the key parameters of the task container from the task deployment server and returns the obtained key parameters of the task container to the client, including the following steps:
returning the key parameters to the client in an encrypted manner.
In some embodiments, after triggering the client to communicate with the task container according to the key parameter, the method further comprises the following steps:
and creating an instruction control container and designating a monitoring port on the task deployment server, and realizing communication between the task container and the client according to the instruction control container and the monitoring port.
In a second aspect, there is provided in this embodiment a remote access apparatus, comprising: the device comprises a creating module, an obtaining module and a communication module, wherein:
the creating module is used for creating a task container for the task on the task deployment server when receiving the task submitted by the client;
the acquiring module is used for acquiring the key parameters of the task container from the task deployment server when receiving a request of the client for the task container, and returning the acquired key parameters of the task container to the client;
and the communication module is used for triggering the client after returning the key parameters of the task container to the client, so that the client communicates with the task container according to the key parameters.
In a third aspect, in this embodiment, there is provided a remote access method, including the steps of:
a client sends a request aiming at a task container to a service deployment server, wherein the task container is a container which is deployed for a task submitted by the client on the task deployment server in advance;
the service deployment server receives the request, inquires the information of the task deployment server from a database according to the request, acquires the key parameters of the task container from the corresponding task deployment server, takes the key parameters as the response of the request and returns the response to the client;
and after receiving the key parameters, the client automatically communicates with the task container according to the key parameters.
In a fourth aspect, there is provided in this embodiment a remote access system, comprising: the system comprises a client, a service deployment server and a task deployment server; wherein the client communicates with the service deployment server and the task deployment server over a network;
the client is used for submitting a training task to the service deployment server and acquiring key parameters of a task container of the training task from the service deployment server;
the task deployment server is used for operating the task container;
the service deployment server is configured to perform the remote access method according to the first aspect.
In a fifth aspect, in the present embodiment, there is provided a storage medium having stored thereon a computer program which, when executed by a processor, implements the remote access method of the first aspect described above.
According to the remote access method, the device, the system and the storage medium, when a task submitted by a client is received, a task container is created for the task on the task deployment server, when a request of the client for the task container is received, key parameters of the task container are obtained from the task deployment server, the obtained key parameters of the task container are returned to the client, and after the key parameters of the task container are returned to the client, the client is triggered to carry out remote communication with the task container according to the key parameters, so that a user can carry out debugging and operation and maintenance management on a training task deployed at the server through the client, and further work efficiency of the user is improved.
The details of one or more embodiments of the application are set forth in the accompanying drawings and the description below to provide a more thorough understanding of the application.
Drawings
The accompanying drawings, which are included to provide a further understanding of the application and are incorporated in and constitute a part of this application, illustrate embodiment(s) of the application and together with the description serve to explain the application and not to limit the application. In the drawings:
fig. 1 is an application scenario diagram of a remote access method according to an embodiment of the present application;
FIG. 2 is a flow chart of a remote access method of an embodiment of the present application;
FIG. 3 is a schematic structural diagram of a remote access device according to an embodiment of the present application;
FIG. 4 is a flow chart of a remote access method of an embodiment of the present application;
fig. 5 is a schematic structural diagram of a remote access system according to an embodiment of the present application.
Detailed Description
For a clearer understanding of the objects, aspects and advantages of the present application, reference is made to the following description and accompanying drawings.
Unless defined otherwise, technical or scientific terms used herein shall have the same general meaning as commonly understood by one of ordinary skill in the art to which this application belongs. The use of the terms "a" and "an" and "the" and similar referents in the context of this application do not denote a limitation of quantity, either in the singular or the plural. The terms "comprises," "comprising," "has," "having," and any variations thereof, as referred to in this application, are intended to cover non-exclusive inclusions; for example, a process, method, and system, article, or apparatus that comprises a list of steps or modules (elements) is not limited to the listed steps or modules, but may include other steps or modules (elements) not listed or inherent to such process, method, article, or apparatus. Reference throughout this application to "connected," "coupled," and the like is not limited to physical or mechanical connections, but may include electrical connections, whether direct or indirect. Reference to "a plurality" in this application means two or more. "and/or" describes an association relationship of associated objects, meaning that three relationships may exist, for example, "A and/or B" may mean: a exists alone, A and B exist simultaneously, and B exists alone. In general, the character "/" indicates a relationship in which the objects associated before and after are an "or". The terms "first," "second," "third," and the like in this application are used for distinguishing between similar items and not necessarily for describing a particular sequential or chronological order.
Fig. 1 is a diagram illustrating an application scenario of the remote access method in one embodiment. As shown in fig. 1, the service deployment server 101, the task deployment server 102, and the client 103 may all communicate with each other via a network. When the service deployment server 101 receives a task submitted by the client 103, a task container is created for the task on the task deployment server 102. When the service deployment server 101 receives an access request of the client 103 for the task container, key parameters of the task container are acquired from the task deployment server 102, and the acquired key parameters of the task container are returned to the client 103. After the client 103 receives the key parameter, it automatically communicates with the task container on the task deployment server 102 according to the key parameter. The service deployment server 101 and the task deployment server 102 may be implemented by independent servers or a server cluster composed of a plurality of servers, and the client 103 may be any computer client.
A remote access method is provided in this embodiment, and fig. 2 is a flowchart of the remote access method of this embodiment, as shown in fig. 2, the flowchart includes the following steps:
step S210, when receiving the task submitted by the client, creating a task container for the task on the task deployment server.
Specifically, the container-based task platform is built and can be composed of a server and a client, wherein the server comprises a service deployment server and a task deployment server. And a remote client, a service deployment server and a task deployment server are used for communicating in a three-way mode. The remote client is used for interacting with a user, and the interaction specifically comprises debugging parameters of a model in a task, monitoring the execution state of the task and managing the result of the task. The service deployment server schedules and deploys tasks submitted by users via the clients, and queries the clients for information of task containers corresponding to the tasks. The task deployment server is internally provided with a basic mirror image, and specifically can be a basic mirror image based on the safeshell. Based on the base image, task containers can be created and ended accordingly as tasks are submitted and ended.
Further, the task container is a container instance created based on the base image on the task deployment server. The base image may specifically be a base image based on the Docker containerization technique. The task submitted by the client specifically can be an algorithm training task based on machine learning. In addition, the task container can run the training task and also comprises a training model corresponding to the training task, training parameters and environment on which the training model depends. And deploying the machine-learned training tasks in the container, so that the user can debug and execute the training tasks through remote communication with the container. Therefore, a task container is created for the task, the algorithm training platform is built in a containerization deployment mode, the characteristics of light weight and agility of the container can be utilized, the resource utilization rate and the calculation efficiency of the algorithm training platform are improved, and the training task is convenient to manage.
Additionally, to enable secure access to the task container by the user, role-based security constraints may also be imposed on the task container. The constraint of the role safety can be the configuration of operation authority and resource authority containing various roles, and when different roles access the task container, the operation and the accessed resources which can be performed by the roles are different, so that the safety of the task container access performed by a user is improved, and the stability of algorithm training is further improved. Specifically, the constraint based on role security can be implemented by newly adding a secure shell script in the base image and configuring the secure shell script.
Further, after the task deployment server completes creation of the task container, the related information of the task container and the related information of the task deployment server may be stored in the database in association with the task. And subsequently, according to the relevant information of the task, inquiring a corresponding task deployment server and a corresponding task container. Specifically, the related information of the task container may be an identifier of the task container, for example, an ID (identity document) code of the task container, the related information of the task deployment server may be an ip (internet protoco) address and a communication port of the task deployment server, and the related information of the training task may be an identifier of the training task, for example, an ID of the training task. The relevant information of the task deployment server and the task container can be used as key parameters for the user to perform remote communication with the corresponding task container through the remote client in the subsequent process.
Step S220, when receiving a request of the client for the task container, obtaining the key parameter of the task container from the task deployment server, and returning the obtained key parameter of the task container to the client.
When a user needs to view or manage a submitted task, a request to access a task container may be initiated by the client. Specifically, an http request may be initiated from the client to the service deployment server to trigger the service deployment server to perform information query of the task container. After receiving the http request, the service deployment server acquires relevant information of the task deployment server to which the task container belongs from the database, so as to establish connection with the corresponding task deployment server, and acquire key parameters of the task container thereon, wherein the key parameters are relevant information of the task container and the task deployment server, and specifically can be a server IP, a task container ID and a communication port. When the key parameters of the task container are obtained, the service deployment server and the task deployment server can communicate in an SSH (secure Shell) connection mode, network vulnerabilities can be made up by using the SSH connection mode, transmission data are encrypted, and the safety of server-side communication is improved.
Specifically, the user initiates an http request containing a task ID request parameter to the service deployment server via the client. The service deployment server analyzes the http request, acquires information of the task deployment server from a corresponding database in which information of the task deployment server is stored according to the association relationship between the task and the task deployment server according to the task ID obtained after analysis, establishes SSH connection with the corresponding task deployment server according to the information of the task deployment server, inquires key information of a corresponding task container in the task deployment server, and finally returns the key information to the client as a response of the http request, thereby providing connection data for the user to perform subsequent remote communication with the task container.
In the step, after the service deployment server receives the request for the task container sent by the client, the key parameters of the task container are returned to the client, so that the user information of the client does not need to be managed in a database, and the information of all the clients and the container group does not need to be monitored to realize communication, thereby reducing the occupation of storage resources. In addition, the SSH-based secure access can improve the processing transmission rate of data and support the encryption of the transmitted data, thereby improving the security of remote communication.
And step S230, after the key parameters of the task container are returned to the client, triggering the client, and enabling the client to communicate with the task container according to the key parameters.
And after the client receives the service deployment server response request and the returned key parameters of the task container, configuring the connection parameters to realize the communication with the corresponding task deployment server. The communication between the client and the task deployment server can be websocket connection parameters. It should be noted that the communication between the client and the task deployment server is remote communication performed automatically according to the key parameter, and the triggering manner of the communication is that the service deployment server returns the key parameter to the client. The automatic remote communication mode can avoid the leakage of key parameters, thereby improving the safety of information.
Additionally, the communication between the client and the task deployment server is bidirectional equal communication, the websocket connection is established, and the websocket mirror image is configured to control the client to access the task container in a secure mode and execute operations according to the IP of the task deployment server, the ID of the task container and the communication port. Moreover, a container for realizing the websocket communication configuration can be operated in the task deployment server, the container is a container, and under the condition that a node of the task deployment server where the task container is located contains the operating container, the client and the task container can perform remote communication based on the websocket, so that a user can debug, operate and maintain the task through the client.
The client-side does not need to jump to an external link according to the remote communication mode of the key parameters and the task container, the cross-domain problem is avoided, and the task container is deployed on the task deployment server. Each task deployment server can realize remote communication with the client only by mapping one communication port, and performs message forwarding, so that the method is suitable for application scenarios with fast update iteration and high requirements on safety.
In the above steps S210 to S230, when receiving the task submitted by the client, creating a task container for the task on the task deployment server, when receiving a request for the task container from the client, obtaining the key parameter of the task container from the task deployment server, returning the obtained key parameter of the task container to the client, and after returning the key parameter of the task container to the client, triggering the client to enable the client to perform remote communication with the task container according to the key parameter, so that the user can perform debugging, operation and maintenance management on the training task deployed at the server through the client, thereby improving the work efficiency of the user.
Further, based on the step S210, when receiving the task submitted by the client, creating a task container for the task on the task deployment server, including the following steps:
and step S211, when receiving the task submitted by the client, creating a task container for the task on the task deployment server according to the basic mirror image.
Based on the above steps, the remote access method further comprises the following steps:
step S212, adding an execution script for the task container in the basic mirror image of the task deployment server, and configuring the authority for the execution script, so that the task container is executed according to the configured authority.
The execution script can be a secure shell script executable by a docker exec instruction. And by configuring the permission in the configuration file of the secure shell script, the task container created based on the basic mirror image and the client can be safely accessed based on the configured permission. For example, the configuration file is configured with an operation right and a resource right from three different roles, namely, a default role, a user group role and a user role, where the operation right may specifically be an executable instruction right, and the resource right may specifically be a right of an accessible path in the task deployment server. The distributed authorities of different roles are different, and when a user carries out remote communication with the task container through the client, the task container can carry out corresponding authority restriction according to role information of the user carrying out communication at the moment. And for example, when the user does not belong to the user and the user group configured in the configuration file of the secure shell script, the default role authority is used for remote communication. Therefore, the task container and the client-side can safely communicate based on the user role.
Additionally, in an embodiment, the requesting is an http request including a task identifier, and based on the step S220, when receiving a request for a task container from a client, obtaining key parameters of the task container from a task deployment server, and returning the obtained key parameters of the task container to the client includes the following steps:
and step S221, acquiring the task identifier from the http request, and inquiring the server information of the task deployment server from the database according to the task identifier.
In particular, the task identification may be a unique code, such as an ID code, for the task. By using the task ID as a request parameter and transmitting the request to the service deployment server via the http, the service deployment server can confirm the server information of the corresponding task deployment server according to the task ID. Thereby locating the client in the deployment server relative to the task. Specifically, after receiving the http request, the service deployment server may parse the http request to obtain the task ID.
Step S222, according to the server information, connection is established with the corresponding task deployment server.
The server information may specifically be an IP address and a communication port of a task deployment server corresponding to the task, and after obtaining the server information of the task deployment server, the service deployment server may establish an SSH connection with the corresponding task deployment server, so as to obtain the key parameter of the task container in the task deployment server through the SSH connection. By establishing SSH connections, vulnerabilities in the network can be remedied, the transmitted data can also be encrypted, and DNS spoofing and IP spoofing can be prevented. In addition, the transmitted data can be compressed, so that the transmission speed is improved.
Step S223, obtaining key parameters of the task container from the corresponding task deployment server.
In the above steps S221 to S223, the server information of the task deployment server is queried from the database by using the task identifier in the http request, and a connection is established with the task deployment server according to the information, so as to obtain the key parameter of the task container, and the SSH secure connection is established with the task deployment server through the service deployment server, so as to obtain the key parameter required by the client, thereby improving the security of the data of the server.
Specifically, in an embodiment, based on the step S220, the key parameters include a task deployment server address, a communication port, and a task container identifier, and when a request of the client for the task container is received, the key parameters of the task container are obtained from the task deployment server, and the obtained key parameters of the task container are returned to the client, including the following steps:
step S224, the key parameter is returned to the client in an encrypted manner.
When the service deployment server returns the key parameters to the client, the key parameters are encrypted, so that information leakage can be avoided, and the information security is improved. Additionally, when the service deployment server communicates with the task deployment server, data transmission can also be performed in an encrypted manner.
Additionally, in an embodiment, after triggering the client to communicate with the task container according to the key parameter, the remote access method further includes the following steps:
step S240, an instruction control container and a designated monitoring port are created on the task deployment server, and the communication between the task container and the client is realized according to the instruction control container and the monitoring port.
The instruction control container is used for receiving a control instruction executed by a user at a client for the task, and may specifically be a console container in the task deployment server. Through the console container and the monitoring port, communication between the task container and the client can be achieved, and a user can debug and monitor operation and maintenance of the task through the client, so that the use experience of the user is improved.
In the above steps S210 to S240, when receiving the task submitted by the client, creating a task container for the task on the task deployment server according to the basic image, adding an execution script for the task container in the basic image, performing permission configuration on the execution script, and executing the task container according to the configured permission, so as to realize the secure access between the task container and the client based on the user role, obtaining the task identifier in the http request, querying the server information of the task deployment server in the database according to the task identifier, and establishing a connection with the corresponding task deployment server according to the server information, so as to obtain the key parameter of the task container, thereby improving the security and the speed of data transmission, returning the key parameter to the client by an encryption manner, thereby improving the security of the communication between the server and the client, and the user information does not need to be stored in a database and monitored at regular time, so that the occupation of storage resources is reduced, the stability of the task training platform is improved, the client can safely access the server based on the user role, the user can debug, operate and maintain the training task deployed on the server through the client, and the working efficiency of the user is improved.
In this embodiment, a remote access apparatus is further provided, and the apparatus is used to implement the foregoing embodiments and preferred embodiments, and the description already made is omitted. The terms "module," "unit," "subunit," and the like as used below may implement a combination of software and/or hardware for a predetermined function. Although the means described in the embodiments below are preferably implemented in software, an implementation in hardware, or a combination of software and hardware is also possible and contemplated.
Fig. 3 is a schematic structural diagram of a remote access device 30 in an implementation of the present application, and as shown in fig. 3, the remote access device 30 includes: a creation module 32, an acquisition module 34, and a communication module 36, wherein:
a creating module 32, configured to create a task container for the task on the task deployment server when receiving the task submitted by the client;
the acquiring module 34 is configured to, when receiving a request for the task container from the client, acquire a key parameter of the task container from the task deployment server, and return the acquired key parameter of the task container to the client;
and the communication module 36 is configured to trigger the client after returning the key parameters of the task container to the client, so that the client communicates with the task container according to the key parameters.
The remote access device 30 creates a task container for the task on the task deployment server when receiving the task submitted by the client, acquires the key parameter of the task container from the task deployment server when receiving the request of the client for the task container, returns the acquired key parameter of the task container to the client, and triggers the client after returning the key parameter of the task container to the client, so that the client can perform remote communication with the task container according to the key parameter, and thus, a user can perform debugging and operation and maintenance management on the training task deployed at the server through the client, and further, the working efficiency of the user is improved.
In one embodiment, the creation module 32 is further configured to create a task container for the task according to the base image on the task deployment server upon receiving the task submitted by the client.
In one embodiment, the remote access device 30 further includes a permission configuration module, and the permission configuration module is configured to add an execution script to the task container in the basic image of the task deployment server, and perform permission configuration for the execution script, so that the task container is executed according to the configured permission.
In one embodiment, the obtaining module 34 is further configured to obtain the task identifier from the http request, query the database for server information of the task deployment server according to the task identifier, establish a connection with the corresponding task deployment server according to the server information, and obtain the key parameter of the task container from the corresponding task deployment server.
In one embodiment, the obtaining module 34 is further configured to return the key parameter to the client in an encrypted manner.
In one embodiment, the remote access device 30 further includes a running configuration module, and the running configuration module is configured to create an instruction control container and specify a listening port on the task deployment server, and control the container and the listening port according to the instruction, so as to implement communication between the task container and the client.
The above modules may be functional modules or program modules, and may be implemented by software or hardware. For a module implemented by hardware, the modules may be located in the same processor; or the modules can be respectively positioned in different processors in any combination.
Fig. 4 is a flowchart of another remote access method according to the embodiment, and as shown in fig. 4, the flowchart includes the following steps:
step S410, a client sends a request aiming at a task container to a service deployment server, wherein the task container is a container which is deployed for a task submitted by the client on the task deployment server in advance;
step S420, the service deployment server receives the request, inquires the information of the task deployment server from the database according to the request, acquires the key parameters of the task container from the corresponding task deployment server, and returns the key parameters to the client as the response of the request;
and step S430, after receiving the key parameters, the client automatically communicates with the task container according to the key parameters.
Through the steps, when a task submitted by a client is received, a task container is established for the task on the task deployment server, when a request of the client for the task container is received, key parameters of the task container are obtained from the task deployment server, the obtained key parameters of the task container are returned to the client, and the client is triggered after the key parameters of the task container are returned to the client, so that the client communicates with the task container according to the key parameters, the remote access of a user to the task container is realized, database storage and timing monitoring of user information are not needed, the occupation of storage resources is reduced, the stability of a task training platform is improved, and the working efficiency of the user is improved.
As shown in fig. 5, an embodiment of the present application further provides a remote access system 50, including: a client 52, a service deployment server 54, and a task deployment server 56; wherein, the client 52 communicates with the service deployment server 54 and the task deployment server 56 through a network;
the client 52 is configured to submit a training task to the service deployment server 54, and obtain key parameters of a task container of the training task from the service deployment server 54;
the task deployment server 56 is used to run task containers;
the service deployment server 54 is used to perform the remote access method in the above-described embodiment.
The remote access system 50 creates a task container for the task on the task deployment server when receiving the task submitted by the client, acquires the key parameter of the task container from the task deployment server when receiving the request of the client for the task container, returns the acquired key parameter of the task container to the client, and triggers the client after returning the key parameter of the task container to the client, so that the client can perform remote communication with the task container according to the key parameter, and thus, a user can perform debugging and operation and maintenance management on the training task deployed at the server through the client, and further, the working efficiency of the user is improved.
In one embodiment, a computer-readable storage medium is provided, having a computer program stored thereon, which when executed by a processor, performs the steps of:
when a task submitted by a client is received, a task container is established for the task on a task deployment server;
when a request of a client for a task container is received, acquiring key parameters of the task container from a task deployment server, and returning the acquired key parameters of the task container to the client;
and after the key parameters of the task container are returned to the client, triggering the client to enable the client to communicate with the task container according to the key parameters.
In one embodiment, the processor, when executing the computer program, further performs the steps of:
and when receiving the tasks submitted by the client, creating task containers for the tasks according to the basic images on the task deployment server.
In one embodiment, the processor, when executing the computer program, further performs the steps of:
and adding an execution script for the task container in the basic mirror image of the task deployment server, and configuring the authority for the execution script to enable the task container to be executed according to the configured authority.
In one embodiment, the processor, when executing the computer program, further performs the steps of:
acquiring a task identifier from the http request, and inquiring server information of a task deployment server from a database according to the task identifier;
establishing connection with a corresponding task deployment server according to the server information;
and acquiring key parameters of the task container from the corresponding task deployment server.
In one embodiment, the processor, when executing the computer program, further performs the steps of:
the key parameters are returned to the client in an encrypted manner.
In one embodiment, the processor, when executing the computer program, further performs the steps of:
and establishing an instruction control container and designating a monitoring port on the task deployment server, and realizing communication between the task container and the client according to the instruction control container and the monitoring port.
According to the storage medium, when a task submitted by a client is received, a task container is established for the task on a task deployment server, when a request of the client for the task container is received, key parameters of the task container are obtained from the task deployment server, the obtained key parameters of the task container are returned to the client, and after the key parameters of the task container are returned to the client, the client is triggered to carry out remote communication with the task container according to the key parameters, so that a user can carry out debugging and operation and maintenance management on a training task deployed at the server through the client, and further the working efficiency of the user is improved.
It should be understood that the specific embodiments described herein are merely illustrative of this application and are not intended to be limiting. All other embodiments, which can be derived by a person skilled in the art from the examples provided herein without any inventive step, shall fall within the scope of protection of the present application.
It is obvious that the drawings are only examples or embodiments of the present application, and it is obvious to those skilled in the art that the present application can be applied to other similar cases according to the drawings without creative efforts. Moreover, it should be appreciated that in the development of any such actual implementation, as in any engineering or design project, numerous implementation-specific decisions must be made to achieve the developers' specific goals, such as compliance with system-related and business-related constraints, which may vary from one implementation to another.
The term "embodiment" is used herein to mean that a particular feature, structure, or characteristic described in connection with the embodiment can be included in at least one embodiment of the present application. The appearances of such phrases in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments. It is to be expressly or implicitly understood by one of ordinary skill in the art that the embodiments described in this application may be combined with other embodiments without conflict.
The above-mentioned embodiments only express several embodiments of the present application, and the description thereof is more specific and detailed, but not construed as limiting the scope of the patent protection. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the concept of the present application, which falls within the scope of protection of the present application. Therefore, the protection scope of the present application shall be subject to the appended claims.

Claims (10)

1. A remote access method, comprising the steps of:
when a task submitted by a client is received, a task container is established for the task on a task deployment server;
when a request of the client for the task container is received, acquiring key parameters of the task container from the task deployment server, and returning the acquired key parameters of the task container to the client;
and after the key parameters of the task container are returned to the client, triggering the client to enable the client to communicate with the task container according to the key parameters.
2. The method of claim 1, wherein upon receiving a task submitted by a client, creating a task container for the task on a task deployment server, comprises:
and when receiving the task submitted by the client, creating a task container for the task on the task deployment server according to the basic mirror image.
3. The method of claim 2, further comprising:
and adding an execution script for the task container in the basic mirror image of the task deployment server, and configuring the authority for the execution script to enable the task container to be executed according to the configured authority.
4. The method according to claim 1, wherein the request is an http request including a task identifier, and when receiving a request for the task container from the client, the method obtains key parameters of the task container from the task deployment server and returns the obtained key parameters of the task container to the client, and includes the following steps:
acquiring the task identifier from the http request, and inquiring server information of the task deployment server from a database according to the task identifier;
establishing connection with a corresponding task deployment server according to the server information;
and acquiring the key parameters of the task container from the corresponding task deployment server.
5. The method according to claim 1, wherein the key parameters include a task deployment server address, a communication port, and a task container identifier, and the obtaining the key parameters of the task container from the task deployment server and returning the obtained key parameters of the task container to the client upon receiving the request of the client for the task container comprises:
returning the key parameters to the client in an encrypted manner.
6. The method according to any one of claims 1 to 5, wherein after triggering the client to communicate with the task container according to the key parameter, the method further comprises:
and creating an instruction control container and designating a monitoring port on the task deployment server, and realizing communication between the task container and the client according to the instruction control container and the monitoring port.
7. A remote access device, comprising: the device comprises a creating module, an obtaining module and a communication module, wherein:
the creating module is used for creating a task container for the task on the task deployment server when receiving the task submitted by the client;
the acquiring module is used for acquiring the key parameters of the task container from the task deployment server when receiving a request of the client for the task container, and returning the acquired key parameters of the task container to the client;
and the communication module is used for triggering the client after returning the key parameters of the task container to the client, so that the client communicates with the task container according to the key parameters.
8. A remote access method, comprising the steps of:
a client sends a request aiming at a task container to a service deployment server, wherein the task container is a container which is deployed for a task submitted by the client on the task deployment server in advance;
the service deployment server receives the request, inquires the information of the task deployment server from a database according to the request, acquires the key parameters of the task container from the corresponding task deployment server, takes the key parameters as the response of the request and returns the response to the client;
and after receiving the key parameters, the client automatically communicates with the task container according to the key parameters.
9. A remote access system, comprising: the system comprises a client, a service deployment server and a task deployment server; wherein the client communicates with the service deployment server and the task deployment server over a network;
the client is used for submitting a training task to the service deployment server and acquiring key parameters of a task container of the training task from the service deployment server;
the task deployment server is used for operating the task container;
the service deployment server is configured to perform the remote access method of any of claims 1 to 6.
10. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the steps of the remote access method according to any one of claims 1 to 6.
CN202110578186.9A 2021-05-26 2021-05-26 Remote access method, device, system and storage medium Pending CN113391878A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110578186.9A CN113391878A (en) 2021-05-26 2021-05-26 Remote access method, device, system and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110578186.9A CN113391878A (en) 2021-05-26 2021-05-26 Remote access method, device, system and storage medium

Publications (1)

Publication Number Publication Date
CN113391878A true CN113391878A (en) 2021-09-14

Family

ID=77619219

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110578186.9A Pending CN113391878A (en) 2021-05-26 2021-05-26 Remote access method, device, system and storage medium

Country Status (1)

Country Link
CN (1) CN113391878A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114465766A (en) * 2021-12-27 2022-05-10 天翼云科技有限公司 SSH-based remote access method and device, electronic equipment and storage medium
CN114745418A (en) * 2022-04-14 2022-07-12 北京字节跳动网络技术有限公司 Task access method, device, equipment and storage medium

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114465766A (en) * 2021-12-27 2022-05-10 天翼云科技有限公司 SSH-based remote access method and device, electronic equipment and storage medium
CN114465766B (en) * 2021-12-27 2023-08-04 天翼云科技有限公司 SSH-based remote access method and device, electronic equipment and storage medium
CN114745418A (en) * 2022-04-14 2022-07-12 北京字节跳动网络技术有限公司 Task access method, device, equipment and storage medium

Similar Documents

Publication Publication Date Title
CN112799789B (en) Node cluster management method, device, equipment and storage medium
CN109104467B (en) Development environment construction method and device, platform system and storage medium
US10719369B1 (en) Network interfaces for containers running on a virtual machine instance in a distributed computing environment
CN111431740B (en) Data transmission method, device, equipment and computer readable storage medium
KR102191347B1 (en) Security configuration of cloud computing nodes
US9256353B2 (en) Providing application and device management using entitlements
US8713177B2 (en) Remote management of networked systems using secure modular platform
CN112214330A (en) Method and device for deploying master nodes in cluster and computer-readable storage medium
CN111858054B (en) Resource scheduling system and method based on edge computing in heterogeneous environment
CN111212116A (en) High-performance computing cluster creating method and system based on container cloud
KR20110040934A (en) Intelligent mobile device management client
CN113391878A (en) Remote access method, device, system and storage medium
CN111506367B (en) Multi-cluster type artificial intelligence online service method and system
CN111708550A (en) Application deployment method and device, computer equipment and storage medium
CN111352716B (en) Task request method, device and system based on big data and storage medium
CN113448601B (en) Software package installation method, device, equipment and system based on content distribution network
US20240118935A1 (en) Pod deployment method and apparatus
CN116805946A (en) Message request processing method and device, electronic equipment and storage medium
CN112424749A (en) On-demand code execution with limited memory footprint
KR102623631B1 (en) Method for automatically configuring virtualized network function, and network function virtualization management and orchestration for the same
CN112130864A (en) Deployment method and deployment device of private cloud platform service software
CN111176782B (en) Online experiment method and device
CN116954810A (en) Method, system, storage medium and program product for creating container application instance
US6757747B1 (en) Proxy object for managing an application instance on a dataless client machine
CN114090242A (en) Model training method, device, equipment, storage medium and program product

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination