CN108306874B - Service interface access current limiting method and device - Google Patents

Service interface access current limiting method and device Download PDF

Info

Publication number
CN108306874B
CN108306874B CN201810083075.9A CN201810083075A CN108306874B CN 108306874 B CN108306874 B CN 108306874B CN 201810083075 A CN201810083075 A CN 201810083075A CN 108306874 B CN108306874 B CN 108306874B
Authority
CN
China
Prior art keywords
service interface
layer service
access
entry layer
entry
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810083075.9A
Other languages
Chinese (zh)
Other versions
CN108306874A (en
Inventor
窦方钰
韩庆东
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Koubei Shanghai Information Technology Co Ltd
Original Assignee
Koubei Shanghai Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Koubei Shanghai Information Technology Co Ltd filed Critical Koubei Shanghai Information Technology Co Ltd
Priority to CN201810083075.9A priority Critical patent/CN108306874B/en
Publication of CN108306874A publication Critical patent/CN108306874A/en
Application granted granted Critical
Publication of CN108306874B publication Critical patent/CN108306874B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic control in data switching networks
    • H04L47/10Flow control; Congestion control
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection

Abstract

The invention discloses a service interface access current limiting method and a device, wherein the method comprises the following steps: loading configuration information of an access flow limiting rule containing a non-entry layer service interface, wherein the access flow limiting rule is dynamically generated according to historical access data of at least one entry layer service interface calling the non-entry layer service interface; when receiving an access request of a non-entrance layer service interface, judging whether the access request accords with an access flow limiting rule or not according to the current access times; and if not, performing current limiting processing on the access request. The invention dynamically generates the access current-limiting rule of the non-entrance layer service interface by using the historical access data of at least one entrance layer service interface calling the non-entrance layer service interface, so that the configuration information is more fit with the actual access of the non-entrance layer service interface, the access current-limiting of the service interface is more reasonable, and the waste of occupied resources is reduced.

Description

Service interface access current limiting method and device
Technical Field
The invention relates to the field of software, in particular to a service interface access current limiting method and device.
Background
When a large amount of servers are accessed by users, in order to ensure the stability of the operation of the servers, the service interfaces of some cores need to be subjected to current limiting processing, so that the servers are prevented from being washed down by the instantly inrush access traffic. For example, when the double 11 shopping segments are available, the public praise server performs current limiting processing on the following core interfaces, such as a user login interface, the current limiting access times x 1/s, a home page access interface, the current limiting access times x 2/s, a commodity purchasing interface, the current limiting access times x 3/s and the like. Through the current limiting configuration, when the access times of the interfaces exceed the specified current limiting access times, the server can directly refuse the newly added access service so as to ensure the normal operation of the server.
Considering that the service interfaces of the ingress layer have dependency relationship with the underlying interface, the current limiting process adds the current limiting access times of the service services of a plurality of ingress layers accessing the underlying interface when limiting the current of the underlying interface, and uses the sum of the current limiting access times as the current limiting access times of the underlying interface. If the user login interface and the home page access interface both access the member information interface, in order to support the user login interface and the home page access interface, the service required to be provided by setting the member information interface at least needs to reach x1+ x 2/second, namely the current-limited access times of the member information interface are set to be x1+ x 2/second, the bearing capacity of the member information interface needs to be matched with the current-limited access times, and the resources occupied by the member information interface are set according to the current-limited access times. However, in actual access, the user login interface and the home page access interface generally do not reach respective peak access values at the same time, that is, the number of times of accesses to the member information interface by the user login interface and the home page access interface does not reach x 1/sec and x 2/sec at the same time. Thus, the current limiting setting of the member information interface causes resource waste occupied by the member information interface.
Disclosure of Invention
In view of the above, the present invention is proposed to provide a service interface access throttling method and apparatus that overcomes or at least partially solves the above mentioned problems.
According to an aspect of the present invention, there is provided a service interface access throttling method, including:
loading configuration information of an access flow limiting rule containing a non-entry layer service interface, wherein the access flow limiting rule is dynamically generated according to historical access data of at least one entry layer service interface calling the non-entry layer service interface;
when receiving an access request of a non-entrance layer service interface, judging whether the access request accords with an access flow limiting rule or not according to the current access times;
and if not, performing current limiting processing on the access request.
Optionally, the access throttling rule defines a maximum number of accesses of the non-ingress layer service interface;
the method further comprises the following steps:
counting the number of times of access in a historical time period corresponding to at least one entry layer service interface calling a non-entry layer service interface;
taking the maximum value of the accumulated sum of the historical access times of at least one entry layer service interface at the same time point of calling the non-entry layer service interface as the maximum access time of the non-entry layer service interface;
when receiving an access request of a non-entry layer service interface, judging whether the access request accords with an access flow limiting rule according to the current access times further comprises the following steps:
judging whether the current access times of the non-entrance layer service interface are less than the maximum access times of the non-entrance layer service interface, if not, the access request does not conform to the access flow limiting rule; and if so, counting the current access times of the non-entry layer service interface.
Optionally, the access throttling rule defines a maximum number of accesses of each entry layer service interface to call a non-entry layer service interface in each time period;
the method further comprises the following steps:
correspondingly calculating the access frequency ratio of each entry layer service interface calling the non-entry layer service interface in each time period according to the access frequency of the historical time period corresponding to at least one entry layer service interface calling the non-entry layer service interface;
obtaining the maximum access times of each time period for each entry layer service interface to call the non-entry layer service interface according to the product of the maximum access times of the non-entry layer service interface and the access times of each entry layer service interface calling the non-entry layer service interface in each time period;
when receiving an access request of a non-entry layer service interface, judging whether the access request accords with an access flow limiting rule according to the current access times further comprises the following steps:
acquiring an entry layer service interface for calling a non-entry layer service interface;
and judging whether the access times of the non-entry layer service interface called by the entry layer service interface is less than the maximum access times of the non-entry layer service interface called by the entry layer service interface in the current time period, if not, judging that the access request does not accord with the access current limiting rule, and if so, counting the access times of the non-entry layer service interface called by the entry layer service interface in the current time period.
Optionally, the method further comprises:
adjusting a maximum number of accesses of the non-portal layer service interface for a particular date, and/or adjusting a maximum number of accesses of a respective time period for which the non-portal layer service interface is invoked by each portal layer service interface for a particular date.
Optionally, after performing the current limiting process on the access request, the method further includes:
and setting the return value of the non-entry layer service interface to be null, and throwing out the business exception.
According to another aspect of the present invention, there is provided a service interface access throttling apparatus including:
the loading module is suitable for loading configuration information of an access flow limiting rule containing a non-entry layer service interface, wherein the access flow limiting rule is dynamically generated according to historical access data of at least one entry layer service interface calling the non-entry layer service interface;
the judging module is suitable for judging whether the access request accords with the access current limiting rule or not according to the current access times when the access request of the non-entrance layer service interface is received; and if not, performing current limiting processing on the access request.
Optionally, the access throttling rule defines a maximum number of accesses of the non-ingress layer service interface;
the device still includes:
the first statistic module is suitable for counting the corresponding historical time period access times of at least one entry layer service interface calling a non-entry layer service interface; taking the maximum value of the accumulated sum of the historical access times of at least one entry layer service interface at the same time point of calling the non-entry layer service interface as the maximum access time of the non-entry layer service interface;
the determination module is further adapted to:
judging whether the current access times of the non-entrance layer service interface are less than the maximum access times of the non-entrance layer service interface, if not, the access request does not conform to the access flow limiting rule; and if so, counting the current access times of the non-entry layer service interface.
Optionally, the access throttling rule defines a maximum number of accesses of each entry layer service interface to call a non-entry layer service interface in each time period;
the device still includes:
the second statistical module is suitable for correspondingly calculating the access frequency ratio of each entry layer service interface calling the non-entry layer service interface in each time period according to the access frequency of the historical time period corresponding to at least one entry layer service interface calling the non-entry layer service interface; obtaining the maximum access times of each time period for each entry layer service interface to call the non-entry layer service interface according to the product of the maximum access times of the non-entry layer service interface and the access times of each entry layer service interface calling the non-entry layer service interface in each time period;
the determination module is further adapted to:
acquiring an entry layer service interface for calling a non-entry layer service interface; judging whether the access times of calling the non-entrance layer service interface by the entrance layer service interface is less than the maximum access times of calling the non-entrance layer service interface by the entrance layer service interface in the current time period, if not, the access request does not conform to the access current limiting rule; and if so, counting the access times of calling the non-entry layer service interface by the entry layer service interface in the current time period.
Optionally, the apparatus further comprises:
and the adjusting module is suitable for adjusting the maximum access times of the non-portal layer service interfaces on the specific date and/or adjusting the maximum access times of the specific date in each time period for calling the non-portal layer service interfaces through each portal layer service interface.
Optionally, the apparatus further comprises:
and the exception module is suitable for setting the return value of the non-entry layer service interface to be null and throwing out the business exception.
According to still another aspect of the present invention, there is provided an electronic apparatus including: the processor, the memory and the communication interface complete mutual communication through the communication bus;
the memory is used for storing at least one executable instruction, and the executable instruction enables the processor to execute the operation corresponding to the service interface access current limiting method.
According to still another aspect of the present invention, there is provided a computer storage medium having at least one executable instruction stored therein, where the executable instruction causes a processor to perform operations corresponding to the above-mentioned service interface access throttling method.
According to the service interface access current limiting method and device provided by the invention, configuration information containing access current limiting rules of a non-entry layer service interface is loaded, wherein the access current limiting rules are dynamically generated according to historical access data of at least one entry layer service interface calling the non-entry layer service interface; when receiving an access request of a non-entrance layer service interface, judging whether the access request accords with an access flow limiting rule or not according to the current access times; and if not, performing current limiting processing on the access request. The invention dynamically generates the access current-limiting rule of the non-entrance layer service interface by using the historical access data of at least one entrance layer service interface calling the non-entrance layer service interface, so that the configuration information is more fit with the actual access of the non-entrance layer service interface, the access current-limiting of the service interface is more reasonable, and the waste of occupied resources is reduced.
The foregoing description is only an overview of the technical solutions of the present invention, and the embodiments of the present invention are described below in order to make the technical means of the present invention more clearly understood and to make the above and other objects, features, and advantages of the present invention more clearly understandable.
Drawings
Various other advantages and benefits will become apparent to those of ordinary skill in the art upon reading the following detailed description of the preferred embodiments. The drawings are only for purposes of illustrating the preferred embodiments and are not to be construed as limiting the invention. Also, like reference numerals are used to refer to like parts throughout the drawings. In the drawings:
FIG. 1 illustrates a flow diagram of a service interface access throttling method according to one embodiment of the present invention;
2 a-2 c are schematic diagrams illustrating a call relationship between an entry layer service interface and a non-entry layer service interface, and obtaining non-entry layer service interface access data according to entry layer service interface access data;
FIG. 3 illustrates a flow diagram of a service interface access throttling method according to another embodiment of the present invention;
FIG. 4 illustrates a flow diagram of a service interface access throttling method according to yet another embodiment of the present invention;
FIG. 5 illustrates a functional block diagram of a service interface access throttling arrangement according to one embodiment of the present invention;
fig. 6 shows a schematic structural diagram of an electronic device according to an embodiment of the invention.
Detailed Description
Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. While exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the disclosure to those skilled in the art.
Fig. 1 shows a flow diagram of a service interface access throttling method according to one embodiment of the invention. As shown in fig. 1, the service interface access throttling method specifically includes the following steps:
step S101, loading configuration information containing access flow limiting rules of a non-entry layer service interface.
Access to the non-portal service interface typically results from a portal layer service interface call, as shown in FIG. 2a, the portal layer service interface login interface and home interface call the interface of the non-portal layer service interface member information system. By counting the historical access data of at least one entry layer service interface, historical real-time access data of at least one entry layer service interface can be obtained. According to the historical real-time access data of at least one entry layer service interface and the calling relation between the entry layer service interface and the non-entry layer service interface, the service required to be provided by the non-entry layer service interface for supporting the entry layer service interface to access can be obtained. As shown in fig. 2b, the access data of the login interface and the access data of the home page interface are counted to obtain a corresponding access data curve. The obtained values of the access data curve of the login interface and the access data curve of the home page interface are accumulated, so that an access data curve which needs to be reached by the service provided by the member information system interface can be obtained, as shown in fig. 2 c. If the maximum access frequency of the access data of the login interface is x1 and the maximum access frequency of the access data of the home interface is x2, it can be known from the access data curve of the member information system interface shown in fig. 2c that the maximum access frequency y of the member information system interface is much smaller than the value of x1+ x 2. By calling the historical access data of at least one inlet layer service interface of the non-inlet layer service interface, the maximum access times and the like which should be provided by the non-inlet layer service interface can be dynamically obtained, namely, the access flow limiting rule can be dynamically generated according to the historical access data of at least one inlet layer service interface calling the non-inlet layer service interface. According to the current time, the access flow limiting rule of the non-inlet layer service interface can be dynamically generated according to the historical access data of at least one inlet layer service interface calling the non-inlet layer service interface in the corresponding historical period.
In order to make the access restriction rule more practical, when obtaining historical access data of at least one entry layer service interface, historical time having the same attribute relationship with the current time can be obtained. If the current weekend is the weekend, the access data of at least one entrance layer service interface on the last weekend can be obtained, and the condition that the user accesses the entrance layer service interface on the weekend is better fitted; or the current monday, access data of at least one entry level service interface of the last monday may be obtained, and the like.
The configuration information containing the access throttling rules of the non-ingress layer service interfaces may contain access throttling rules for a plurality of non-ingress layer service interfaces, and the configuration information containing the access throttling rules of the non-ingress layer service interfaces is loaded so as to perform throttling processing on access of each non-ingress layer service interface.
And step S102, when receiving the access request of the non-entrance layer service interface, judging whether the access request accords with the access flow limiting rule according to the current access times.
When receiving an access request of a non-entry layer service interface, judging according to the current access times of the non-entry layer service interface, judging whether the current access times meet an access current limiting rule, if not, executing a step S103, and if so, continuing to perform subsequent normal service processing according to the access request.
Step S103, the access request is subjected to current limiting processing.
And (4) performing current limiting processing on the access request, such as directly rejecting the access request, so that the access request does not cause pressure on a server any more, and the stability of the whole system is guaranteed.
According to the service interface access flow limiting method provided by the invention, configuration information containing access flow limiting rules of a non-entry layer service interface is loaded, wherein the access flow limiting rules are dynamically generated according to historical access data of at least one entry layer service interface calling the non-entry layer service interface; when receiving an access request of a non-entrance layer service interface, judging whether the access request accords with an access flow limiting rule or not according to the current access times; and if not, performing current limiting processing on the access request. The invention dynamically generates the access current-limiting rule of the non-entrance layer service interface by using the historical access data of at least one entrance layer service interface calling the non-entrance layer service interface, so that the configuration information is more fit with the actual access of the non-entrance layer service interface, the access current-limiting of the service interface is more reasonable, and the waste of occupied resources is reduced.
Fig. 3 shows a flow diagram of a service interface access throttling method according to another embodiment of the invention. As shown in fig. 3, the service interface access throttling method specifically includes the following steps:
step S301, counting the number of times of access in a historical time period corresponding to at least one entry layer service interface calling a non-entry layer service interface.
And counting the corresponding historical time period access times of the at least one inlet layer service interface calling the non-inlet layer service interface according to the calling relation between the non-inlet layer service interface and the at least one inlet layer service interface. Specifically, the historical time period may be a plurality of consecutive time periods in a day, and the duration of each time period may be set according to implementation, such as 5 minutes. And counting the access times of at least one entry layer service interface in the corresponding historical time period according to the continuous time period.
Step S302, the maximum value of the accumulated sum of the historical access times of at least one entry layer service interface at the same time point of calling the non-entry layer service interface is used as the maximum access time of the non-entry layer service interface.
Accumulating the access times of the corresponding historical time periods of at least one entry layer service interface calling the same non-entry layer service interface according to the same time point, for example, adding the historical access times of the login interface calling the member information system interface by 0 point 1 and the historical access times of the home page interface calling the member information system interface by 0 point 1 to obtain the access times of the member information system interface calling by 0 point 1, and sequentially calculating to obtain the access times of the member information system interfaces of a plurality of time points. The maximum value is used as the maximum access times of the non-entry layer service interface.
Alternatively, the number of accesses using only historical time periods may not be accurate enough for a particular date, such as a particular date for which the shopping server is for both 11, 12, etc., at which point the maximum number of accesses for the non-portal layer service interface for the particular date may be adjusted by pre-estimation to account for the possibility of a large number of accesses in a burst.
Step S303, loading configuration information including access throttling rules of the non-ingress layer service interface.
The access throttling rules define a maximum number of accesses for the non-ingress layer service interface. And after the server where the non-entry layer service is located is started, loading corresponding configuration information, so that the access flow limiting rule of the non-entry layer service interface is enabled to take effect, and the flow limiting processing is performed on the access of the non-entry layer service interface.
Step S304, determine whether the current access times are less than the maximum access times of the non-entry layer service interface.
The initialization current access times of the non-portal layer service interface is 0, and the initialization time can be started from 0 point of each day. When receiving the current access to the non-portal service interface, firstly judging whether the current access frequency is less than the maximum access frequency of the non-portal service interface defined in the access flow limiting rule, if the maximum access frequency of the member information system interface is 50, if the current access frequency is 30, the maximum access frequency is less, executing step S307; if the current access frequency is 50 times and is not less than the maximum access frequency, it is determined that the access request does not conform to the access throttling rule, and step S305 is executed.
In step S305, the access request is restricted.
The current access request is directly rejected so as to carry out current limiting processing on the access request and ensure the stability of the system.
Step S306, the return value of the non-entry layer service interface is set to be null, and the business exception is thrown out.
Optionally, in order to provide good user experience for the user, after the current limiting processing, the return value of the non-entry layer service interface may be set to be null, and the corresponding service exception is thrown out, so as to perform relevant processing on the service exception, such as prompting the user that the current server is busy and please endure waiting; or prompting the progress process in login and the like, so that the user cannot sense the current limiting processing of the access request, and the processing pressure of the server is relieved.
Step S307, count the current access times of the non-portal layer service interface.
When the access request of the non-entrance layer service interface accords with the access current limiting rule, namely the current access times are smaller than the maximum access times of the non-entrance layer service interface, subsequent normal business processing is carried out according to the access request, and the current access times are increased by one so as to count the current access times of the non-entrance layer service interface, thereby being convenient for judging the subsequent access request received again and whether the access request accords with the access current limiting rule.
According to the service interface access current limiting method provided by the invention, the maximum value of the accumulated sum of the historical access times of at least one inlet layer service interface at the same time point is taken as the maximum access time of the non-inlet layer service interface by counting the corresponding historical time period access times of at least one inlet layer service interface calling the non-inlet layer service interface. The access flow limiting rule mainly limits the maximum access times of the non-entrance layer service interface, and judges whether the current access times are less than the maximum access times of the non-entrance layer service interface or not so as to determine whether to carry out flow limiting processing on the access request or not. According to the invention, the access current limiting rule of the non-entry layer service interface is dynamically generated by adopting the historical access data of the entry layer service interface, so that the configuration information is more fit with the actual access of the non-entry layer service interface, the access current limiting of the service interface is more reasonable, and the waste of resources occupied by the non-entry layer service is reduced.
Fig. 4 shows a flowchart of a service interface access throttling method according to yet another embodiment of the present invention. As shown in fig. 4, the service interface access throttling method specifically includes the following steps:
step S401, counting the number of times of access in the corresponding historical time period of at least one entry layer service interface calling a non-entry layer service interface.
Step S402, taking the maximum value of the accumulated sum of the historical access times of at least one entry layer service interface at the same time point of calling the non-entry layer service interface as the maximum access time of the non-entry layer service interface.
The above steps refer to steps S301 to S302 in the embodiment of fig. 3, and are not described herein again.
Step S403, correspondingly calculating the ratio of the number of times of calling the non-entry layer service interface by each entry layer service interface in each time period according to the number of times of calling the corresponding historical time period of at least one entry layer service interface of the non-entry layer service interfaces.
Specifically, for example, in a certain historical time, in a period from 0 point 0 to 0 point 5, the login interface calls the member information system interface 4 times, the home page interface calls the member information system interface 6 times, and the ratio of the number of times of access of the login interface to call the member information system interface is calculated to be 4/(4+6) ═ 40%, and the ratio of the number of times of access of the home page interface to call the member information system interface is calculated to be 6/(4+6) ═ 60%. For example, in the actual calculation, the calculation is performed according to the call relationship between at least one entry layer service interface and a non-entry layer service interface, and the number of times that each entry layer service interface calls the non-entry layer service interface in the same time period, so as to obtain the ratio of the number of times that each entry layer service interface accesses.
Step S404, obtaining the maximum access times of each time slot for each entrance layer service interface to call the non-entrance layer service interface according to the product of the maximum access times of the non-entrance layer service interface and the access times of each entrance layer service interface calling the non-entrance layer service interface in each time slot.
The maximum access times of each time period for each entry layer service interface to call the non-entry layer service interface are equal to the maximum access times of the non-entry layer service interface and the access times of each time period for each entry layer service interface to call the non-entry layer service interface. If the maximum access times of the non-portal layer service interface is 50 times, in the period from 0 point 0 to 0 point 5, the access times of the login interface calling the membership information system interface is 40%, the access times of the home page interface calling the membership information system interface is 60%, the maximum access times of the login interface calling the membership information system interface is 50 times, 40 times, 20 times, and the maximum access times of the home page interface calling the membership information system interface is 50 times, 60 times, 30 times. The times are respectively the maximum access times of the login interface and the home page interface calling member information system interface in the time period from 0 point 0 to 0 point 5. According to the statistical data, the maximum access times of each time period for each entry layer service interface to call the non-entry layer service interface in each time period can be calculated.
Alternatively, for a particular date, such as a particular date for which the shopping server is for dual 11, dual 12, etc., the number of accesses using only the historical time period may not be accurate enough, and sometimes a new portal layer service interface, such as a dual 11 venue specific interface, may be added for the particular date. The new entrance layer service interface has no historical access data, and at the moment, the maximum access times of each time period for calling the non-entrance layer service interface through each entrance layer service interface on a specific date can be adjusted in a pre-estimation mode.
Step S405, loading configuration information including access throttling rules of the non-ingress layer service interface.
The access throttling rules define a maximum number of accesses per time period for which each ingress layer service interface calls a non-ingress layer service interface. And after the server where the non-entry layer service is located is started, loading corresponding configuration information, so that the access flow limiting rule of the non-entry layer service interface is enabled to take effect, and the flow limiting processing is performed on the access of the non-entry layer service interface.
Optionally, the access current limiting rule may also limit the maximum access times of the non-entry layer service interface, so as to facilitate current limiting processing on the non-entry layer service interface from multiple aspects, and better ensure system stability.
Step S406, an entry layer service interface for calling a non-entry layer service interface is obtained.
When an access request of a non-entry layer service interface is received, an entry layer service interface for calling the non-entry layer service interface is obtained according to the access request so as to judge the access times of the entry layer service interface.
Step S407, determine whether the current access frequency of the non-entry layer service interface is less than the maximum access frequency of the non-entry layer service interface.
The initialization current access times of the non-portal layer service interface is 0, and the initialization time can be started from 0 point of each day. When receiving the current access to the non-portal service interface, firstly judging whether the current access times to the non-portal service interface is less than the maximum access times of the non-portal service interface defined in the access flow limiting rule, if the maximum access times of the member information system interface is 50, if the current access times is 30, the maximum access times is less than, executing step S408; if the current access times is 50 times and is not less than the maximum access times, the access request is determined not to conform to the access current limiting rule, and step S409 is executed.
Step S408, determining whether the access frequency of the non-entry layer service interface called by the entry layer service interface is less than the maximum access frequency of the current time period of the non-entry layer service interface called by the entry layer service interface.
The number of times of current access of the current time period for calling the non-entry layer service interface by the entry layer service interface is 0, and the initialization time is the starting time of the current time period. After acquiring a specific portal layer service interface for calling a non-portal layer service interface, judging whether the access frequency of the portal layer service interface for calling the current time slot of the non-portal layer service interface is less than the maximum access frequency of the portal layer service interface for calling the current time slot of the non-portal layer service interface, if the login interface is from 0 point 0 to 0 point 5, calling the maximum access frequency of a member information system interface for 20 times, and if the current time is from 0 point 3, the access frequency of the login interface for calling the member information system interface is 18 times and is less than the maximum access frequency, executing step S411; if the current time is 0 point and 3 minutes, the access times of the login interface calling the member information system interface are 20 times and not less than the maximum access times, the access request is judged not to conform to the access flow limiting rule, and the step S409 is executed.
Step S409, performs a current limiting process on the access request.
Step S410, setting the return value of the non-entry layer service interface to be null, and throwing out the business exception.
The above steps refer to steps S305-S306 in the embodiment of fig. 3, and are not described herein again.
Step S411, counting the current access times of the non-entry layer service interface, and/or counting the access times of the entry layer service interface calling the non-entry layer service interface in the current time period.
When the access request of the non-entry layer service interface accords with the access current limiting rule, subsequent normal service processing is carried out according to the access request, the current access times of the non-entry layer service interface is added by one, so that the current access times of the non-entry layer service interface are counted, the subsequent re-received access request is conveniently judged, meanwhile, the access times of calling the non-entry layer service interface in the current time period by the entry layer service interface corresponding to the current access request are also added by one, and the subsequent judgment is convenient.
According to the service interface access current limiting method provided by the invention, the current access times of the non-entry layer service interface are judged whether to be less than the maximum access times of the non-entry layer service interface, and whether the access times of the entry layer service interface for calling the non-entry layer service interface is less than the maximum access times of the entry layer service interface for calling the non-entry layer service interface in the current time period, so that the current limiting processing is carried out on the non-entry layer service interface, the excessive calling of the non-entry layer service interface or the excessive access of the entry layer service interface is avoided, and the system stability is better ensured. Meanwhile, the access current limiting rule is dynamically generated according to historical access data of the service interface of the entry layer, so that the configuration information is more fit with the actual access of the service interface of the non-entry layer, the access current limiting of the service interface is more reasonable, and the waste of resources occupied by the service of the non-entry layer is reduced.
Fig. 5 shows a functional block diagram of a service interface access throttling arrangement according to one embodiment of the present invention. As shown in fig. 5, the service interface access throttling device includes the following modules:
a loading module 510 adapted to load configuration information including access throttling rules of the non-ingress layer service interface.
Access to the non-portal service interface typically results from a portal layer service interface call, as shown in FIG. 2a, the portal layer service interface login interface and home interface call the interface of the non-portal layer service interface member information system. The loading module 510 may obtain historical real-time access data of the at least one entry layer service interface by performing statistics on historical access data of the at least one entry layer service interface. The loading module 510 may obtain the service that the non-entry layer service interface supports the entry layer service interface to access according to the historical real-time access data of at least one entry layer service interface and the call relationship between the entry layer service interface and the non-entry layer service interface. As shown in fig. 2b, the loading module 510 counts the access data of the login interface and the access data of the home page interface to obtain a corresponding access data curve. The obtained values of the access data curve of the login interface and the access data curve of the home page interface are accumulated, and the loading module 510 can obtain the access data curve that the service provided by the member information system interface needs to reach, as shown in fig. 2 c. If the maximum access frequency of the access data of the login interface is x1 and the maximum access frequency of the access data of the home interface is x2, it can be known from the access data curve of the member information system interface shown in fig. 2c that the maximum access frequency y of the member information system interface is much smaller than the value of x1+ x 2. The loading module 510 may dynamically obtain, for example, the maximum access times that the non-entry layer service interface should provide, by calling the historical access data of at least one entry layer service interface of the non-entry layer service interface, that is, the access throttling rule may be dynamically generated according to the historical access data of at least one entry layer service interface calling the non-entry layer service interface. Based on the current time, the loading module 510 may dynamically generate an access throttling rule for the non-ingress layer service interface according to historical access data of at least one ingress layer service interface calling the non-ingress layer service interface for a corresponding historical period.
In order to make the access throttling rule more practical, the loading module 510 may obtain the historical time having the same attribute relationship with the current time when obtaining the historical access data of at least one entry layer service interface. If the current weekend is the weekend, the access data of at least one entrance layer service interface on the last weekend can be obtained, and the condition that the user accesses the entrance layer service interface on the weekend is better fitted; or the current monday, access data of at least one entry level service interface of the last monday may be obtained, and the like.
The configuration information including the access throttling rule of the non-ingress layer service interface may include access throttling rules for a plurality of non-ingress layer service interfaces, and the loading module 510 loads the configuration information including the access throttling rule of the non-ingress layer service interface, so as to perform throttling processing on access of each non-ingress layer service interface.
The determining module 520 is adapted to determine whether the access request conforms to the access current limiting rule according to the current access times when receiving the access request of the non-portal layer service interface; and if not, performing current limiting processing on the access request.
When receiving an access request of a non-portal layer service interface, the determining module 520 first determines according to the current access times of the non-portal layer service interface, and determines whether the current access times meet the access current limiting rule, if not, the current access request is subjected to current limiting processing, and if the current access times do not meet the access current limiting rule, the current access request is not subjected to the pressure of the access request on a server, so as to ensure the stability of the whole system. If yes, continuing to perform subsequent normal service processing according to the access request.
Optionally, the apparatus further comprises the following modules:
a first statistics module 530 adapted to count a number of accesses of a corresponding historical time period for invoking at least one entry level service interface of the non-entry level service interfaces; and taking the maximum value of the accumulated sum of the historical access times of at least one entry layer service interface at the same time point as the maximum access time of the non-entry layer service interface.
According to the calling relationship between the non-entry layer service interface and at least one entry layer service interface, the first statistical module 530 counts the number of times of access in the history time period corresponding to the at least one entry layer service interface calling the non-entry layer service interface. Specifically, the historical time period may be a plurality of consecutive time periods in a day, and the duration of each time period may be set according to implementation, such as 5 minutes. The first statistical module 530 counts the number of accesses of at least one entry level service interface in a corresponding historical time period according to the continuous time period.
The first statistics module 530 accumulates the access times of the corresponding historical time periods of at least one entry layer service interface calling the same non-entry layer service interface according to the same time point, for example, the first statistics module 530 adds the historical access times of the login interface calling the member information system interface at 0 point 1 point and the historical access times of the home page interface calling the member information system interface at 0 point 1 point to obtain the access times of the member information system interface at 0 point 1 point, and sequentially calculates, and the first statistics module 530 obtains the access times of the member information system interfaces at a plurality of time points. The first statistics module 530 takes the maximum value as the maximum number of accesses of the non-ingress layer service interface.
The access throttling rule defines a maximum access time of the non-ingress layer service interface, and the determining module 520 is further adapted to determine whether the current access time is less than the maximum access time of the non-ingress layer service interface. The initialization current access times of the non-portal layer service interface is 0, and the initialization time can be started from 0 point of each day. When receiving the current access to the non-portal service interface, the determining module 520 first determines whether the current access time is less than the maximum access time of the non-portal service interface defined in the access limiting rule, for example, the maximum access time of the member information system interface is 50 times, if the current access time is 30 times, the determining module 520 determines that the current access time is less than the maximum access time, the server may perform subsequent normal service processing according to the access request, and add one to the current access time; if the current access time is 50 times, the determining module 520 determines that the current access time is not less than the maximum access time, and then the determining module 520 determines that the access request does not conform to the access current limiting rule, and directly rejects the current access request, so as to perform current limiting processing on the access request, and ensure the stability of the system.
The second statistical module 540 is adapted to correspondingly calculate the ratio of the number of times of calling the non-entry layer service interface by each entry layer service interface in each time period according to the number of times of calling the corresponding historical time period of at least one entry layer service interface of the non-entry layer service interface; and obtaining the maximum access times of each time period for each entry layer service interface to call the non-entry layer service interface according to the product of the maximum access times of the non-entry layer service interface and the access times of each entry layer service interface called the non-entry layer service interface in each time period.
Specifically, for example, in a certain historical time, the time period from 0 point 0 to 0 point 5 is 4 times, the login interface calls the member information system interface, the home page interface calls the member information system interface 6 times, the second counting module 540 calculates that the ratio of the number of times of accessing the login interface to call the member information system interface is 4/(4+6) to 40%, and the ratio of the number of times of accessing the home page interface to call the member information system interface is 6/(4+6) to 60%. For example, in the actual calculation, the second statistical module 540 performs calculation according to the call relationship between at least one entry layer service interface and a non-entry layer service interface, and the number of times that each entry layer service interface calls the non-entry layer service interface in the same time period, so as to obtain the ratio of the number of times that each entry layer service interface accesses.
The maximum access times of each time period for each entry layer service interface to call the non-entry layer service interface are equal to the maximum access times of the non-entry layer service interface and the access times of each time period for each entry layer service interface to call the non-entry layer service interface. If the maximum access times of the non-portal layer service interface is 50 times, in the time period from 0 point 0 to 0 point 5, the access times of the login interface calling the member information system interface is 40%, the access times of the home page interface calling the member information system interface is 60%, the second counting module 540 calculates that the maximum access times of the login interface calling the member information system interface is 50 times, 40 times, 20 times, and the maximum access times of the home page interface calling the member information system interface is 50 times, 60 times, 30 times. The times are respectively the maximum access times of the login interface and the home page interface calling member information system interface in the time period from 0 point 0 to 0 point 5. The second statistical module 540 may calculate the maximum access times of each time period for each entry layer service interface to call the non-entry layer service interface in each time period according to the statistical data.
The access throttling rules define a maximum number of accesses per time period for which each ingress layer service interface calls a non-ingress layer service interface. The determining module 520 is further adapted to determine whether the number of times that the entry layer service interface calls the non-entry layer service interface is less than the maximum number of times that the entry layer service interface calls the non-entry layer service interface in the current time period. The number of times of current access of the current time period for calling the non-entry layer service interface by the entry layer service interface is 0, and the initialization time is the starting time of the current time period. After acquiring a specific portal layer service interface for calling a non-portal layer service interface, the judging module 520 firstly judges whether the number of access times of the current time period for calling the non-portal layer service interface by the portal layer service interface is less than the maximum number of access times of the current time period for calling the non-portal layer service interface by the portal layer service interface, if the login interface is in the time period from 0 point 0 to 0 point 5, the maximum number of access times for calling the member information system interface is 20, if the current time is in the time period from 0 point 3, the number of access times for calling the member information system interface by the login interface is 18, the judging module 520 judges that the number of access times is less than the maximum number of access times, performs subsequent normal business processing according to the access request, and adds one to the number of access times for calling the non-portal layer service interface by the; if the current time is 0 point 3 minutes, the access times of the login interface calling the member information system interface is 20 times, the judgment module 520 judges that the access times are not less than the maximum access times, judges that the access request does not conform to the access current limiting rule, and performs current limiting processing on the access request.
The adjusting module 550 is adapted to adjust the maximum number of accesses of the non-portal layer service interface for a specific date and/or adjust the maximum number of accesses of the non-portal layer service interface for a specific date for each time period for which the non-portal layer service interface is called through each portal layer service interface.
For a specific date, such as a specific date of the shopping server for the dual 11, the dual 12, etc., the access times using only the historical time period may not be accurate enough, and at this time, the adjusting module 550 may adjust the maximum access times of the non-portal layer service interface of the specific date by pre-estimation to cope with the possibility of a large number of access times in a burst. Further, a new portal layer service interface, such as a dual 11 meeting place specific interface, may be added for a particular date. The new portal layer service interface has no historical access data, and at this time, the adjusting module 550 may adjust the maximum number of accesses of each time period for calling the non-portal layer service interface through each portal layer service interface on a specific date in a pre-estimation manner.
And an exception module 560 adapted to set a return value of the non-entry layer service interface to null and throw a traffic exception.
In order to provide good use experience for the user, the exception module 560 may set the return value of the non-entry layer service interface to null after the current limiting process, and throw out the corresponding service exception, so as to perform the relevant process on the service exception, for example, the exception module 560 prompts the user that the current server is busy and please endure waiting; or the abnormal module 560 prompts the progress process in login and the like, so that the user does not sense the current limiting processing of the access request and the processing pressure of the server is relieved.
According to the service interface access current limiting device provided by the invention, configuration information containing access current limiting rules of a non-entry layer service interface is loaded, wherein the access current limiting rules are dynamically generated according to historical access data of at least one entry layer service interface calling the non-entry layer service interface; when receiving an access request of a non-entrance layer service interface, judging whether the access request accords with an access flow limiting rule or not according to the current access times; and if not, performing current limiting processing on the access request. The invention dynamically generates the access current-limiting rule of the non-entrance layer service interface by using the historical access data of at least one entrance layer service interface calling the non-entrance layer service interface, so that the configuration information is more fit with the actual access of the non-entrance layer service interface, the access current-limiting of the service interface is more reasonable, and the waste of occupied resources is reduced.
The present application further provides a non-volatile computer storage medium, where at least one executable instruction is stored in the computer storage medium, and the computer executable instruction may execute the service interface access throttling method in any of the above method embodiments.
Fig. 6 is a schematic structural diagram of an electronic device according to an embodiment of the present invention, and the specific embodiment of the present invention does not limit the specific implementation of the electronic device.
As shown in fig. 6, the electronic device may include: a processor (processor)602, a communication Interface 604, a memory 606, and a communication bus 608.
Wherein:
the processor 602, communication interface 604, and memory 606 communicate with one another via a communication bus 608.
A communication interface 604 for communicating with network elements of other devices, such as clients or other servers.
The processor 602 is configured to execute the program 610, and may specifically perform relevant steps in the above embodiment of the service interface access throttling method.
In particular, program 610 may include program code comprising computer operating instructions.
The processor 602 may be a central processing unit CPU or an application specific Integrated circuit asic or one or more Integrated circuits configured to implement embodiments of the present invention. The electronic device comprises one or more processors, which can be the same type of processor, such as one or more CPUs; or may be different types of processors such as one or more CPUs and one or more ASICs.
And a memory 606 for storing a program 610. Memory 606 may comprise high-speed RAM memory, and may also include non-volatile memory (non-volatile memory), such as at least one disk memory.
The program 610 may specifically be configured to cause the processor 602 to execute the service interface access throttling method in any of the method embodiments described above. For specific implementation of each step in the program 610, reference may be made to corresponding steps and corresponding descriptions in units in the foregoing service interface access throttling embodiment, which are not described herein again. It can be clearly understood by those skilled in the art that, for convenience and brevity of description, the specific working processes of the above-described devices and modules may refer to the corresponding process descriptions in the foregoing method embodiments, and are not described herein again.
The algorithms and displays presented herein are not inherently related to any particular computer, virtual machine, or other apparatus. Various general purpose systems may also be used with the teachings herein. The required structure for constructing such a system will be apparent from the description above. Moreover, the present invention is not directed to any particular programming language. It is appreciated that a variety of programming languages may be used to implement the teachings of the present invention as described herein, and any descriptions of specific languages are provided above to disclose the best mode of the invention.
In the description provided herein, numerous specific details are set forth. It is understood, however, that embodiments of the invention may be practiced without these specific details. In some instances, well-known methods, structures and techniques have not been shown in detail in order not to obscure an understanding of this description.
Similarly, it should be appreciated that in the foregoing description of exemplary embodiments of the invention, various features of the invention are sometimes grouped together in a single embodiment, figure, or description thereof for the purpose of streamlining the disclosure and aiding in the understanding of one or more of the various inventive aspects. However, the disclosed method should not be interpreted as reflecting an intention that: that the invention as claimed requires more features than are expressly recited in each claim. Rather, as the following claims reflect, inventive aspects lie in less than all features of a single foregoing disclosed embodiment. Thus, the claims following the detailed description are hereby expressly incorporated into this detailed description, with each claim standing on its own as a separate embodiment of this invention.
Those skilled in the art will appreciate that the modules in the device in an embodiment may be adaptively changed and disposed in one or more devices different from the embodiment. The modules or units or components of the embodiments may be combined into one module or unit or component, and furthermore they may be divided into a plurality of sub-modules or sub-units or sub-components. All of the features disclosed in this specification (including any accompanying claims, abstract and drawings), and all of the processes or elements of any method or apparatus so disclosed, may be combined in any combination, except combinations where at least some of such features and/or processes or elements are mutually exclusive. Each feature disclosed in this specification (including any accompanying claims, abstract and drawings) may be replaced by alternative features serving the same, equivalent or similar purpose, unless expressly stated otherwise.
Furthermore, those skilled in the art will appreciate that while some embodiments described herein include some features included in other embodiments, rather than other features, combinations of features of different embodiments are meant to be within the scope of the invention and form different embodiments. For example, in the following claims, any of the claimed embodiments may be used in any combination.
The various component embodiments of the invention may be implemented in hardware, or in software modules running on one or more processors, or in a combination thereof. It will be appreciated by those skilled in the art that a microprocessor or Digital Signal Processor (DSP) may be used in practice to implement some or all of the functions of some or all of the components in a service interface access throttling arrangement according to embodiments of the present invention. The present invention may also be embodied as apparatus or device programs (e.g., computer programs and computer program products) for performing a portion or all of the methods described herein. Such programs implementing the present invention may be stored on computer-readable media or may be in the form of one or more signals. Such a signal may be downloaded from an internet website or provided on a carrier signal or in any other form.
It should be noted that the above-mentioned embodiments illustrate rather than limit the invention, and that those skilled in the art will be able to design alternative embodiments without departing from the scope of the appended claims. In the claims, any reference signs placed between parentheses shall not be construed as limiting the claim. The word "comprising" does not exclude the presence of elements or steps not listed in a claim. The word "a" or "an" preceding an element does not exclude the presence of a plurality of such elements. The invention may be implemented by means of hardware comprising several distinct elements, and by means of a suitably programmed computer. In the unit claims enumerating several means, several of these means may be embodied by one and the same item of hardware. The usage of the words first, second and third, etcetera do not indicate any ordering. These words may be interpreted as names.

Claims (12)

1. A service interface access throttling method, comprising:
counting the number of times of access in a historical time period corresponding to at least one entry layer service interface calling a non-entry layer service interface;
taking the maximum value of the accumulated sum of the historical access times of at least one entry layer service interface at the same time point of calling a non-entry layer service interface as the maximum access time of the non-entry layer service interface;
and/or the presence of a gas in the gas,
correspondingly calculating the access frequency ratio of each entry layer service interface calling the non-entry layer service interface in each time period according to the access frequency of the historical time period corresponding to at least one entry layer service interface calling the non-entry layer service interface;
obtaining the maximum access times of each time period for each entry layer service interface to call the non-entry layer service interface according to the product of the maximum access times of the non-entry layer service interface and the access times of each entry layer service interface calling the non-entry layer service interface in each time period;
loading configuration information of an access flow limiting rule containing a non-entry layer service interface, wherein the access flow limiting rule is dynamically generated according to historical access data of at least one entry layer service interface calling the non-entry layer service interface; the access flow limiting rule defines a maximum number of accesses of the non-ingress layer service interface; or, the access flow limiting rule defines the maximum access times of each time period for each entry layer service interface to call the non-entry layer service interface;
when receiving an access request of a non-entry layer service interface, judging whether the access request accords with the access current limiting rule or not according to the current access times;
and if not, performing current limiting processing on the access request.
2. The method of claim 1, wherein when receiving an access request of a non-ingress layer service interface, determining whether the access request conforms to the access throttling rule according to a current access number further comprises:
judging whether the current access times of a non-entrance layer service interface is less than the maximum access times of the non-entrance layer service interface, if not, the access request does not conform to the access current limiting rule; and if so, counting the current access times of the non-entry layer service interface.
3. The method of claim 2, wherein when receiving an access request of a non-ingress layer service interface, determining whether the access request conforms to the access throttling rule according to a current access number further comprises:
acquiring an entry layer service interface for calling a non-entry layer service interface;
judging whether the access times of calling a non-entry layer service interface by an entry layer service interface is less than the maximum access times of calling the non-entry layer service interface by the entry layer service interface in the current time period, if not, the access request does not accord with the access current limiting rule; and if so, counting the access times of calling a non-entry layer service interface by the entry layer service interface in the current time period.
4. The method of claim 2 or 3, wherein the method further comprises:
adjusting the maximum number of accesses of the non-portal layer service interface on a specific date, and/or adjusting the maximum number of accesses of each time period for calling the non-portal layer service interface through each portal layer service interface on a specific date.
5. The method of any of claims 1-3, wherein after the throttling the access request, the method further comprises:
and setting the return value of the non-entry layer service interface to be null, and throwing out the business exception.
6. A service interface access throttling device, comprising:
the first statistic module is suitable for counting the corresponding historical time period access times of at least one entry layer service interface calling a non-entry layer service interface; taking the maximum value of the accumulated sum of the historical access times of at least one entry layer service interface at the same time point of calling a non-entry layer service interface as the maximum access time of the non-entry layer service interface;
and/or the presence of a gas in the gas,
the second statistical module is suitable for correspondingly calculating the access frequency ratio of each entry layer service interface calling the non-entry layer service interface in each time period according to the access frequency of the historical time period corresponding to at least one entry layer service interface calling the non-entry layer service interface; obtaining the maximum access times of each time period for each entry layer service interface to call the non-entry layer service interface according to the product of the maximum access times of the non-entry layer service interface and the access times of each entry layer service interface calling the non-entry layer service interface in each time period;
the device comprises a loading module, a processing module and a processing module, wherein the loading module is suitable for loading configuration information of an access flow limiting rule containing a non-entry layer service interface, and the access flow limiting rule is dynamically generated according to historical access data of at least one entry layer service interface calling the non-entry layer service interface; the access flow limiting rule defines a maximum number of accesses of the non-ingress layer service interface; or, the access flow limiting rule defines the maximum access times of each time period for each entry layer service interface to call the non-entry layer service interface;
the judging module is suitable for judging whether the access request accords with the access current limiting rule according to the current access times when receiving the access request of a non-entrance layer service interface; and if not, performing current limiting processing on the access request.
7. The apparatus of claim 6, wherein the determining module is further adapted to:
judging whether the current access times of a non-entrance layer service interface is less than the maximum access times of the non-entrance layer service interface, if not, the access request does not conform to the access current limiting rule; and if so, counting the current access times of the non-entry layer service interface.
8. The apparatus of claim 6 or 7, wherein the determining means is further adapted to:
acquiring an entry layer service interface for calling a non-entry layer service interface; judging whether the access times of calling a non-entry layer service interface by an entry layer service interface is less than the maximum access times of calling the non-entry layer service interface by the entry layer service interface in the current time period, if not, the access request does not accord with the access current limiting rule; and if so, counting the access times of calling a non-entry layer service interface by the entry layer service interface in the current time period.
9. The apparatus of claim 6, wherein the apparatus further comprises:
and the adjusting module is suitable for adjusting the maximum access times of the non-portal layer service interfaces on a specific date and/or adjusting the maximum access times of each time period for calling the non-portal layer service interfaces through each portal layer service interface on a specific date.
10. The apparatus of any of claims 6 or 7, wherein the apparatus further comprises:
and the exception module is suitable for setting the return value of the non-entry layer service interface to be null and throwing out the business exception.
11. An electronic device, comprising: the system comprises a processor, a memory, a communication interface and a communication bus, wherein the processor, the memory and the communication interface complete mutual communication through the communication bus;
the memory is used for storing at least one executable instruction, and the executable instruction causes the processor to execute the operation corresponding to the service interface access flow limiting method according to any one of claims 1-5.
12. A computer storage medium having stored therein at least one executable instruction for causing a processor to perform operations corresponding to the service interface access throttling method of any one of claims 1 to 5.
CN201810083075.9A 2018-01-29 2018-01-29 Service interface access current limiting method and device Active CN108306874B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810083075.9A CN108306874B (en) 2018-01-29 2018-01-29 Service interface access current limiting method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810083075.9A CN108306874B (en) 2018-01-29 2018-01-29 Service interface access current limiting method and device

Publications (2)

Publication Number Publication Date
CN108306874A CN108306874A (en) 2018-07-20
CN108306874B true CN108306874B (en) 2020-03-10

Family

ID=62866894

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810083075.9A Active CN108306874B (en) 2018-01-29 2018-01-29 Service interface access current limiting method and device

Country Status (1)

Country Link
CN (1) CN108306874B (en)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109218212B (en) * 2018-09-03 2022-05-13 四川虹微技术有限公司 Method for limiting flow through API gateway
CN110865895B (en) * 2019-10-25 2023-07-04 北京三快在线科技有限公司 Access flow control method, device, electronic equipment and storage medium
CN111262795B (en) * 2020-01-08 2024-02-06 京东科技控股股份有限公司 Service interface-based current limiting method and device, electronic equipment and storage medium
CN111600807A (en) * 2020-04-14 2020-08-28 网宿科技股份有限公司 Flow control method and system based on API gateway equipment
CN112612618B (en) * 2020-12-30 2022-07-19 深圳我家云网络科技有限公司 Interface current limiting method and device, computer equipment and storage medium
CN113645310A (en) * 2021-08-20 2021-11-12 北京高途云集教育科技有限公司 Data current limiting method and device, electronic equipment and readable storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8959574B2 (en) * 2012-06-21 2015-02-17 Google Technology Holdings LLC Content rights protection with arbitrary correlation of second content
CN105100070A (en) * 2015-06-29 2015-11-25 北京奇虎科技有限公司 Method and device for preventing malicious attacks to interface service
CN105897670A (en) * 2015-11-13 2016-08-24 乐视云计算有限公司 Website user login authentication method and system

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102264056B (en) * 2010-05-28 2014-03-05 华为技术有限公司 Strategy control method, system and relevant device
CN106155646B (en) * 2015-03-31 2020-01-07 阿里巴巴集团控股有限公司 Method and device for limiting external application program to call service
CN107222426B (en) * 2016-03-21 2021-07-20 阿里巴巴集团控股有限公司 Flow control method, device and system
CN107592345B (en) * 2017-08-28 2020-08-18 中国工商银行股份有限公司 Transaction current limiting device, method and transaction system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8959574B2 (en) * 2012-06-21 2015-02-17 Google Technology Holdings LLC Content rights protection with arbitrary correlation of second content
CN105100070A (en) * 2015-06-29 2015-11-25 北京奇虎科技有限公司 Method and device for preventing malicious attacks to interface service
CN105897670A (en) * 2015-11-13 2016-08-24 乐视云计算有限公司 Website user login authentication method and system

Also Published As

Publication number Publication date
CN108306874A (en) 2018-07-20

Similar Documents

Publication Publication Date Title
CN108306874B (en) Service interface access current limiting method and device
EP2335154B1 (en) Distributed data processing system
CN109451002B (en) CDN node selection method and equipment
CN107124472A (en) Load-balancing method and device, computer-readable recording medium
CN105760230A (en) Method and device for automatically adjusting operation of cloud host
CN112395075A (en) Resource processing method and device and resource scheduling system
CN111222861A (en) Method and device for recharging after arrearage and computing equipment
CN111597041B (en) Calling method and device of distributed system, terminal equipment and server
CN112596985A (en) IT asset detection method, device, equipment and medium
CN110188975B (en) Resource acquisition method and device
CN113468442A (en) Resource bit flow distribution method, computing device and computer storage medium
CN109522118B (en) Service processing method, device, server and readable storage medium
CN112188012A (en) Method and device for establishing customer service session, electronic equipment and readable storage medium
CN114245324A (en) Data flow reminding method and device, computer equipment and readable storage medium
CN111639085B (en) Data asynchronous checking method and device
CN111190728A (en) Resource adjusting method and device
CN110968409A (en) Data processing method and device
CN111352710A (en) Process management method and device, computing equipment and storage medium
CN113630332B (en) Distributed multistage dynamic current limiting method and system
CN110012053B (en) System calling method, device and equipment under SOA system architecture and SOA system architecture
CN115037693B (en) Distributed current limiting method and distributed current limiting device based on token bucket
CN116431327B (en) Task current limiting processing method and fort machine
CN111782323B (en) Bullet screen obtaining method, computing equipment and computer storage medium
CN111124657B (en) Resource management method, device, electronic equipment and storage medium
CN116954592A (en) Online customization method and device for newly added tenants, electronic equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant