CN110278133B - Checking method, device, computing equipment and medium executed by server - Google Patents

Checking method, device, computing equipment and medium executed by server Download PDF

Info

Publication number
CN110278133B
CN110278133B CN201910706869.0A CN201910706869A CN110278133B CN 110278133 B CN110278133 B CN 110278133B CN 201910706869 A CN201910706869 A CN 201910706869A CN 110278133 B CN110278133 B CN 110278133B
Authority
CN
China
Prior art keywords
service
service groups
groups
calling
server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910706869.0A
Other languages
Chinese (zh)
Other versions
CN110278133A (en
Inventor
孙彦杰
王凯
朱道彬
张洋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Industrial and Commercial Bank of China Ltd ICBC
Original Assignee
Industrial and Commercial Bank of China Ltd ICBC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Industrial and Commercial Bank of China Ltd ICBC filed Critical Industrial and Commercial Bank of China Ltd ICBC
Priority to CN201910706869.0A priority Critical patent/CN110278133B/en
Publication of CN110278133A publication Critical patent/CN110278133A/en
Application granted granted Critical
Publication of CN110278133B publication Critical patent/CN110278133B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/50Network service management, e.g. ensuring proper service fulfilment according to agreements
    • H04L41/5003Managing SLA; Interaction between SLA and QoS
    • H04L41/5009Determining service level performance parameters or violations of service level contracts, e.g. violations of agreed response time or mean time between failures [MTBF]
    • H04L41/5012Determining service level performance parameters or violations of service level contracts, e.g. violations of agreed response time or mean time between failures [MTBF] determining service availability, e.g. which services are available at a certain point in time
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/08Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
    • H04L43/0805Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters by checking availability
    • H04L43/0817Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters by checking availability by checking functioning
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Environmental & Geological Engineering (AREA)
  • Hardware Redundancy (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The present disclosure provides an inspection method performed by a server, including: sending a calling request to a calling server, wherein the calling request comprises the identifiers of a plurality of service groups, so that the calling server forwards the calling request to the plurality of service groups based on the identifiers of the plurality of service groups, receiving feedback information, the feedback information being information generated by the plurality of service groups based on the calling request, the feedback information being used for representing whether the service functions of the plurality of service groups are normal or not, and determining whether the service functions of the plurality of service groups are normal or not based on the feedback information. The present disclosure also provides an inspection apparatus, a computing device, and a medium.

Description

Checking method, device, computing equipment and medium executed by server
Technical Field
The present disclosure relates to the field of computer technologies, and in particular, to an inspection method performed by a server, an inspection apparatus, a computing device, and a computer-readable medium.
Background
With the rapid development of computer technology, various servers or server clusters provide services required in various production environments. In particular, in a distributed architecture, different services may be provided by multiple service groups. Wherein each service group may for example consist of a plurality of servers or server clusters. In order to ensure that the service group can provide the service normally, health check needs to be performed on the service group, so as to ensure availability of the service group.
In implementing the disclosed concept, the inventors found that there are at least the following problems in the related art: in the related art, when performing health check, a machine is generally used as a check object instead of a service group, and since the health condition of the service group cannot be checked in time, the fault cannot be handled in time when the service group fails, and thus the service group cannot be guaranteed to provide services normally.
Disclosure of Invention
One aspect of the present disclosure provides an inspection method performed by a server, including: sending a call request to a call server, wherein the call request comprises identifiers of a plurality of service groups, so that the call server forwards the call request to the service groups based on the identifiers of the service groups, and receiving feedback information, wherein the feedback information is information generated by the service groups based on the call request, and is used for representing whether the service functions of the service groups are normal or not, and determining whether the service functions of the service groups are normal or not based on the feedback information.
Optionally, the invoking service party includes an external invoking service party and an internal invoking service party, and the plurality of service groups include a first service group and a second service group; the calling service side forwards the calling request to the service groups based on the identifications of the service groups, and the method comprises the following steps: and sending the calling request to the first service group by the external calling service party, sending the calling request to the internal calling service party by the first service group, and sending the calling request to the second service group by the internal calling service party.
Optionally, the determining whether the service functions of the plurality of service groups are normal based on the feedback information includes: and determining whether the resources required by the second service group to realize the service function are available or not based on the feedback information, and determining whether the service function of the second service group is normal or not based on whether the resources are available or not.
Optionally, the service functions of the plurality of service groups belong to functions of a specific application. The method further comprises the following steps: in response to determining that the service of the plurality of service groups is not functioning properly, determining at least one target service group of the plurality of service groups that is not functioning properly, determining a risk level for the particular application based on the at least one target service group.
Optionally, each of the plurality of service groups includes a checking mechanism, and the service group with a normal service function in the plurality of service groups generates the feedback information based on the identifier of the service group and the call request through the checking mechanism.
Optionally, the plurality of service groups include service groups of a plurality of areas, and a service group of each of the plurality of areas includes a plurality of the first service groups and a plurality of the second service groups. The sending, by the first service group, the invocation request to the internal invocation service, including: sending the invocation request to the internal invocation service by any one of the plurality of the first service groups. The sending, by the internal invocation service, the invocation request to the second service group, including: sending, by the internal invocation service, the invocation request to each of a plurality of the second service groups.
Optionally, the resource includes at least one of a database and a data transmission protocol.
Another aspect of the present disclosure provides an inspection apparatus including: the device comprises a first sending module, a receiving module and a first determining module. The sending module sends a calling request to a calling server, wherein the calling request comprises identifiers of a plurality of service groups, so that the calling server forwards the calling request to the plurality of service groups based on the identifiers of the plurality of service groups. And the receiving module is used for receiving feedback information, wherein the feedback information is information generated by the service groups based on the calling request, and the feedback information is used for representing whether the service functions of the service groups are normal or not. A determining module that determines whether service functions of the plurality of service groups are normal based on the feedback information.
Optionally, the invoking service party includes an external invoking service party and an internal invoking service party, and the plurality of service groups include a first service group and a second service group. The calling server forwards the calling request to the plurality of service groups based on the identifications of the plurality of service groups, and the forwarding is performed by a second sending module, a third sending module and a fourth sending module. The second sending module is used for supporting an external calling service party to send the calling request to the first service group, the third sending module is used for supporting the first service group to send the calling request to the internal calling service party, and the fourth sending module is used for supporting an internal calling service party to send the calling request to the second service group.
Optionally, the determining whether the service functions of the plurality of service groups are normal based on the feedback information includes: and determining whether the resources required by the second service group to realize the service function are available or not based on the feedback information, and determining whether the service function of the second service group is normal or not based on whether the resources are available or not.
Optionally, the service functions of the plurality of service groups belong to functions of a specific application. The device further comprises: a second determination module and a third determination module. Wherein the second determining module determines at least one target service group of the plurality of service groups whose service function is abnormal in response to determining that the service function of the plurality of service groups is abnormal, and the third determining module determines the risk level of the specific application based on the at least one target service group.
Optionally, each of the plurality of service groups includes a checking mechanism, and the service group with a normal service function in the plurality of service groups generates the feedback information based on the identifier of the service group and the call request through the checking mechanism.
Optionally, the plurality of service groups include service groups of a plurality of areas, and a service group of each of the plurality of areas includes a plurality of the first service groups and a plurality of the second service groups. The sending, by the first service group, the invocation request to the internal invocation service, including: sending the invocation request to the internal invocation service by any one of the plurality of the first service groups. The sending, by the internal invocation service, the invocation request to the second service group, including: sending, by the internal invocation service, the invocation request to each of a plurality of the second service groups.
Optionally, the resource includes at least one of a database and a data transmission protocol.
Another aspect of the present disclosure provides a computing device comprising: one or more processors; memory for storing one or more programs, wherein the one or more programs, when executed by the one or more processors, cause the one or more processors to implement the method as described above.
Another aspect of the disclosure provides a non-transitory readable storage medium storing computer-executable instructions for implementing the method as described above when executed.
Another aspect of the disclosure provides a computer program comprising computer executable instructions for implementing the method as described above when executed.
Drawings
For a more complete understanding of the present disclosure and the advantages thereof, reference is now made to the following descriptions taken in conjunction with the accompanying drawings, in which:
fig. 1 schematically shows a system architecture of an inspection method and an inspection apparatus according to an embodiment of the present disclosure;
fig. 2 schematically shows a schematic diagram of an inspection method performed by a server according to an embodiment of the present disclosure;
FIG. 3 schematically shows a flow chart of an inspection method performed by a server according to an embodiment of the present disclosure;
FIG. 4 schematically illustrates a flow diagram for forwarding a call request according to an embodiment of the disclosure;
FIG. 5 schematically shows a flow chart of an inspection method performed by a server according to another embodiment of the present disclosure;
FIG. 6 schematically shows a block diagram of an inspection apparatus according to an embodiment of the present disclosure;
fig. 7 schematically shows a block diagram of a call request forwarding apparatus according to an embodiment of the present disclosure;
FIG. 8 schematically shows a block diagram of an inspection apparatus according to another embodiment of the present disclosure; and
FIG. 9 schematically illustrates a block diagram of a computer system for implementing an inspection in accordance with an embodiment of the disclosure.
Detailed Description
Hereinafter, embodiments of the present disclosure will be described with reference to the accompanying drawings. It should be understood that the description is illustrative only and is not intended to limit the scope of the present disclosure. In the following detailed description, for purposes of explanation, numerous specific details are set forth in order to provide a thorough understanding of the embodiments of the disclosure. It may be evident, however, that one or more embodiments may be practiced without these specific details. Moreover, in the following description, descriptions of well-known structures and techniques are omitted so as to not unnecessarily obscure the concepts of the present disclosure.
The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the disclosure. The terms "comprises," "comprising," and the like, as used herein, specify the presence of stated features, steps, operations, and/or components, but do not preclude the presence or addition of one or more other features, steps, operations, or components.
All terms (including technical and scientific terms) used herein have the same meaning as commonly understood by one of ordinary skill in the art unless otherwise defined. It is noted that the terms used herein should be interpreted as having a meaning that is consistent with the context of this specification and should not be interpreted in an idealized or overly formal sense.
Where a convention analogous to "at least one of A, B and C, etc." is used, in general such a construction is intended in the sense one having skill in the art would understand the convention (e.g., "a system having at least one of A, B and C" would include but not be limited to systems that have a alone, B alone, C alone, a and B together, a and C together, B and C together, and/or A, B, C together, etc.). Where a convention analogous to "A, B or at least one of C, etc." is used, in general such a construction is intended in the sense one having skill in the art would understand the convention (e.g., "a system having at least one of A, B or C" would include but not be limited to systems that have a alone, B alone, C alone, a and B together, a and C together, B and C together, and/or A, B, C together, etc.).
Some block diagrams and/or flow diagrams are shown in the figures. It will be understood that some blocks of the block diagrams and/or flowchart illustrations, or combinations thereof, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, or other programmable control apparatus to produce a machine, such that the instructions, which execute via the processor, create means for implementing the functions/acts specified in the block diagrams and/or flowchart block or blocks.
Accordingly, the techniques of this disclosure may be implemented in hardware and/or software (including firmware, microcode, etc.). In addition, the techniques of this disclosure may take the form of a computer program product on a computer-readable medium having instructions stored thereon for use by or in connection with an instruction execution system. In the context of this disclosure, a computer-readable medium may be any medium that can contain, store, communicate, propagate, or transport the instructions. For example, the computer readable medium can include, but is not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, device, or propagation medium. Specific examples of the computer readable medium include: magnetic storage devices, such as magnetic tape or Hard Disk Drives (HDDs); optical storage devices, such as compact disks (CD-ROMs); a memory, such as a Random Access Memory (RAM) or a flash memory; and/or wired/wireless communication links.
An embodiment of the present disclosure provides an inspection method performed by a server, including: sending a calling request to a calling server, wherein the calling request comprises the identifiers of a plurality of service groups, so that the calling server forwards the calling request to the plurality of service groups based on the identifiers of the plurality of service groups, receiving feedback information, the feedback information being information generated by the plurality of service groups based on the calling request, the feedback information being used for representing whether the service functions of the plurality of service groups are normal or not, and determining whether the service functions of the plurality of service groups are normal or not based on the feedback information.
Fig. 1 schematically shows a system architecture of an inspection method and an inspection apparatus according to an embodiment of the present disclosure. It should be noted that fig. 1 is only an example of a system architecture to which the embodiments of the present disclosure may be applied to help those skilled in the art understand the technical content of the present disclosure, and does not mean that the embodiments of the present disclosure may not be applied to other devices, systems, environments or scenarios.
As shown in fig. 1, the system architecture 100 according to this embodiment may include terminal devices 101, 102, 103, a network 104 and a server 105. The network 104 serves as a medium for providing communication links between the terminal devices 101, 102, 103 and the server 105. Network 104 may include various connection types, such as wired, wireless communication links, or fiber optic cables, to name a few.
The user may use the terminal devices 101, 102, 103 to interact with the server 105 via the network 104 to receive or send messages or the like. The terminal devices 101, 102, 103 may have installed thereon various communication client applications, such as shopping-like applications, web browser applications, search-like applications, instant messaging tools, mailbox clients, social platform software, etc. (by way of example only).
The terminal devices 101, 102, 103 may be various electronic devices having a display screen and supporting web browsing, including but not limited to smart phones, tablet computers, laptop portable computers, desktop computers, and the like.
The server 105 may be a server providing various services, such as a background management server (for example only) providing support for websites browsed by users using the terminal devices 101, 102, 103. The background management server may analyze and perform other processing on the received data such as the user request, and feed back a processing result (e.g., a webpage, information, or data obtained or generated according to the user request) to the terminal device.
It should be noted that the checking method provided by the embodiment of the present disclosure may be generally executed by the server 105. Accordingly, the inspection apparatus provided by the embodiment of the present disclosure may be generally disposed in the server 105. The checking method provided by the embodiments of the present disclosure may also be performed by a server or a server cluster different from the server 105 and capable of communicating with the terminal devices 101, 102, 103 and/or the server 105. Accordingly, the checking apparatus provided by the embodiment of the present disclosure may also be disposed in a server or a server cluster different from the server 105 and capable of communicating with the terminal devices 101, 102, 103 and/or the server 105.
For example, the call request and the feedback information of the embodiment of the present disclosure may be stored in the terminal devices 101, 102, and 103, and the call request and the feedback information are transmitted to the server 105 through the terminal devices 101, 102, and 103, and the server 105 may determine whether the service functions of the plurality of service groups are normal based on the feedback information. In addition, the call request and the feedback information may also be received by the server 105 and directly stored in the server 105, and the server 105 determines whether the service functions of the plurality of service groups are normal based on the feedback information directly.
It should be understood that the number of terminal devices, networks, and servers in fig. 1 is merely illustrative. There may be any number of terminal devices, networks, and servers, as desired for implementation.
An inspection method according to an exemplary embodiment of the present disclosure is described below with reference to fig. 2 to 5 in conjunction with the system architecture of fig. 1. It should be noted that the above-described system architecture is shown merely for the purpose of facilitating understanding of the spirit and principles of the present disclosure, and embodiments of the present disclosure are not limited in any way in this respect. Rather, embodiments of the present disclosure may be applied to any scenario where applicable.
Fig. 2 schematically shows a schematic diagram of an inspection method performed by a server according to an embodiment of the present disclosure.
As shown in fig. 2, the service groups in the distributed architecture are examined by the server 210 as individual devices. The service group includes, for example, a plurality of service groups, such as a plurality of main service groups and a plurality of standby service groups. Each main service group may correspond to one standby service group. For example, as shown in fig. 2, the plurality of main service groups include 1a to 16a, and the plurality of standby service groups include 1b to 16 b.
According to the embodiment of the present disclosure, each service group may be composed of a plurality of servers or a server cluster, for example, for providing a certain service function. The server 210 serves as a health check device for checking the health of a plurality of server groups. The server 210 can be used, for example, to execute the checking method shown in fig. 3.
Fig. 3 schematically shows a flow chart of an inspection method performed by a server according to an embodiment of the present disclosure.
The checking method performed by the server 210 according to the embodiment of the present disclosure is described below with reference to fig. 2 and 3. Wherein the method may include operations S310 to S330.
In operation S310, a call request is sent to the calling server, the call request including identifications of a plurality of service groups, so that the calling server forwards the call request to the plurality of service groups based on the identifications of the plurality of service groups.
According to the embodiment of the disclosure, the distributed architecture comprises a calling service party. When the server 210 needs to check the health condition of the service group, the server 210 may send a call request to a calling server in the distributed architecture, and the calling server may forward the call request from the server 210 to the service group. The specific flow of forwarding the invocation request by the service invoker is described in fig. 4.
According to an embodiment of the present disclosure, when server 210 performs a health check, it is typically necessary to traverse all service groups. The invocation request sent by the server 210 includes, for example, an identifier of a service group.
For example, when the server 210 checks the health of the master service group, the server 210 may invoke the service group 1a and the service group 5a, the service group 2a and the service group 6a, the service group 3a and the service group 7a, … … to traverse all the master service groups. Specifically, when the server 210 needs to check the health of the service group 1a and the service group 5a, the server 210 calls the request to include the identities of the service group 1a and the service group 5a, for example. When the calling service receives the call request, the call request may be forwarded to service group 1a and service group 5a based on the identifier in the call request.
Similarly, when the server 210 checks the health of the standby service group, the server 210 may invoke the service group 1b and the service group 5b, the service group 2b and the service group 6b, the service group 3b and the service group 7b, … … to traverse all the standby service groups. Specifically, when the server 210 needs to check the health of the service group 1b and the service group 5b, the server 210 calls the request to include the identities of the service group 1b and the service group 5 b. When the calling service receives the call request, the call request may be forwarded to service group 1b and service group 5b based on the identifier in the call request.
In operation S320, feedback information is received, where the feedback information is information generated by the plurality of service groups based on the invocation request, and the feedback information is used to characterize whether the service functions of the plurality of service groups are normal.
According to the embodiment of the disclosure, after the calling service party forwards the calling request to the service group, the service group can check whether the service of the service group is normal or not based on the calling request, and generate the feedback information.
Specifically, for example, each of the plurality of service groups includes a checking mechanism, and a service group with a normal service function in the plurality of service groups generates the feedback information based on the identification of the service group and the call request through the checking mechanism. For example, after the calling service party forwards the call request to the service group 1a and the service group 5a, the service group 1a and the service group 5a respectively check whether the service function provided by the service group 1a and the service group 5a are normal through respective checking mechanisms, if so, normal information is added to the call request to generate feedback information, and if not, any information may not be added to the call request, and at this time, the call request may be used as the feedback information.
In operation S330, it is determined whether service functions of the plurality of service groups are normal based on the feedback information.
According to the embodiment of the present disclosure, for example, after the service group 1a and the service group 5a perform health check on the service functions provided by themselves, the generated feedback information may be fed back to the server 210 by invoking the service party, so that the server 210 can determine whether the service functions of the service group 1a and the service group 5a are normal based on the feedback information.
Fig. 4 schematically shows a flow chart for forwarding a call request according to an embodiment of the disclosure.
As shown in fig. 2 and 4, the invoking service includes, for example, an external invoking service 220 and an internal invoking service 230, and the plurality of service groups includes, for example, a first service group and a second service group. For example, the first service group may include main service groups 1a to 4a and corresponding standby service groups 1b to 4b, and the second service group may include main service groups 5a to 8a and corresponding standby service groups 5b to 8 b.
The method for forwarding the invocation request to the multiple service groups by the invocation service side based on the identifications of the multiple service groups includes operations S410 to S430, for example.
In operation S410, a call request is sent to a first service group by an external call service.
For example, when the server 210 sends a call request to a service group in the distributed architecture, for example, the call request includes the identifications of the service group 1a and the service group 5 a. The external calling service party 220 receives the call request and forwards the call request to the service group 1a in the first service group according to the identifier, and the service group 1a can check whether the service function is normal by using its own checking mechanism based on the call request. The external calling service 220 includes, for example, an ats (apache Traffic server) service.
In operation S420, a call request is sent from the first service group to the internal call service. For example, after the service group 1a receives the call request, the call request may be sent to the internal call Server 230, where the internal call Server 230 includes, for example, an ACS (Auto-Configuration Server) service.
In operation S430, a call request is sent by the internal call service to the second service group.
According to the implementation of the present disclosure, after the internal calling server 230 receives the calling request from the first service group, the internal calling server 230 may forward the calling request to the service group 5a in the second service group according to the identifier, and the service group 5a may check whether the service function is normal based on the calling request by using its own checking mechanism.
According to an embodiment of the present disclosure, the operation S330 includes, for example: and determining whether the resources required by the second service group to realize the service function are available or not based on the feedback information, and determining whether the service function of the second service group is normal or not based on whether the resources are available or not. Wherein the resource comprises at least one of a database and a data transfer protocol.
According to the embodiment of the disclosure, the health condition of the service group can be determined by confirming whether the resource on which the service group realizes the service function is available. For example, the health of the second service group may be determined based on the availability of database resources and data transfer protocols on which the second service group implements the service function. Database resources may include, for example, db (database), Redis, Hbase, etc., and data Transfer protocols include, for example, ftp (file Transfer protocol), etc.
Similarly, the health of the first service group may also be checked based on the availability of database resources and data transfer protocols on which the first service group implements the service function.
As shown in fig. 2, the plurality of service groups include, for example, a plurality of regional service groups, and each regional service group in the plurality of regional service groups includes a plurality of first service groups and a plurality of second service groups. For example, the plurality of zones includes a first zone 240 and a second zone 250, the first zone 240 and the second zone 250 being located in different geographic locations, for example, the first zone 240 is located in zone a and the second zone 250 is located in zone B.
The first area 240 includes, for example, a first service group and a second service group, where the first service group may include, for example, main service groups 1a to 4a and corresponding standby service groups 1b to 4b, and the second service group may include, for example, main service groups 5a to 8a and corresponding standby service groups 5b to 8 b.
Similarly, the second area 250 may also include a first service group and a second service group, where the first service group may include, for example, the main service groups 9a to 12a and the corresponding standby service groups 9b to 12b, and the second service group may include, for example, the main service groups 13a to 16a and the corresponding standby service groups 13b to 16 b.
According to the embodiment of the present disclosure, the operation S420 includes, for example, sending, by any one of the plurality of first service groups, a call request to the internal call service.
According to the embodiment of the present disclosure, the operation S430 includes, for example, sending, by the internal invocation service, an invocation request to each of the plurality of second service groups.
According to the embodiment of the disclosure, in order to check the health condition of the cross-regional service call, the health condition of the cross-regional service call needs to be traversed in the checking process.
For example, when server 210 checks the health of the master service group, server 210 may invoke service group 1a and service group 5a, service group 1a and service group 13a, service group 2a and service group 6a, service group 2a and service groups 14a, … …, service group 9a and service group 5a, service group 9a and service group 13a, service group 10a and service group 6a, service group 10a and service groups 14a, … ….
Similarly, when the server 210 checks the health of the service group, the server 210 may invoke the service group 1b and the service group 5b, the service group 1b and the service group 13b, the service group 2b and the service group 6b, the service group 2b and the service groups 14b, … …, the service group 9b and the service group 5b, the service group 9b and the service group 13b, the service group 10b and the service group 6a, the service group 10b and the service groups 14b, … ….
Fig. 5 schematically shows a flow chart of an inspection method performed by a server according to another embodiment of the present disclosure.
As shown in fig. 5, the method includes operations S310 to S330 and operations S510 to S520. S310 to S330 are the same as or similar to the operations described above with reference to fig. 3, and are not described again here.
According to an embodiment of the present disclosure, service functions of a plurality of service groups are, for example, functions belonging to a specific application. For example, the service functions provided by the main service groups 1a to 16a and the standby service groups 1b to 16b shown in fig. 2 belong to application-specific functions.
In operation S510, in response to determining that the service functions of the plurality of service groups are abnormal, at least one target service group of the plurality of service groups whose service functions are abnormal is determined.
According to the embodiment of the disclosure, after the server 210 receives the feedback information, the server 210 may determine, based on the feedback information, a target service group with abnormal service functions in the main service groups 1a to 16a and the standby service groups 1b to 16 b.
In operation S520, a risk level of a specific application is determined based on at least one target service group.
For example, if the number of target service groups is small, the risk level of a specific application may be determined to be low risk, i.e. only the target service group is determined to be an abnormal service group. If the target service group is a plurality of service groups in the first service group or a plurality of service groups in the second service group, the risk level of the specific application can be determined as the medium risk, that is, the level where the first service group or the second service group is located is determined as the abnormal level. The risk level of the particular application may be determined to be high risk if the target service group comprises a large number of service groups of the first service group and the second service group.
Fig. 6 schematically shows a block diagram of an inspection apparatus according to an embodiment of the present disclosure.
As shown in fig. 6, the checking apparatus 600 includes a first transmitting module 610, a receiving module 620, and a first determining module 630.
The first sending module 610 may be configured to send a call request to a calling server, where the call request includes identifications of a plurality of service groups, so that the calling server forwards the call request to the plurality of service groups based on the identifications of the plurality of service groups. According to the embodiment of the present disclosure, the first sending module 610 may, for example, perform operation S310 described above with reference to fig. 3, which is not described herein again.
The receiving module 620 may be configured to receive feedback information, where the feedback information is information generated by the plurality of service groups based on the invocation request, and the feedback information is used to characterize whether the service functions of the plurality of service groups are normal. According to the embodiment of the present disclosure, the receiving module 620 may perform, for example, the operation S320 described above with reference to fig. 3, which is not described herein again.
The first determination module 630 may be configured to determine whether service functions of the plurality of service groups are normal based on the feedback information. According to the embodiment of the present disclosure, the first determining module 630 may, for example, perform operation S330 described above with reference to fig. 3, which is not described herein again.
According to the embodiment of the present disclosure, determining whether the service functions of the plurality of service groups are normal based on the feedback information includes: and determining whether the resources required by the second service group to realize the service function are available based on the feedback information, and determining whether the service function of the second service group is normal based on whether the resources are available.
According to an embodiment of the present disclosure, the resource includes at least one of a database and a data transfer protocol.
According to the embodiment of the disclosure, each service group in the plurality of service groups comprises a checking mechanism, and the service group with normal service function in the plurality of service groups generates feedback information based on the identification and the call request of the service group through the checking mechanism.
Fig. 7 schematically shows a block diagram of a call request forwarding apparatus according to an embodiment of the present disclosure.
According to the embodiment of the disclosure, the calling service party comprises an external calling service party and an internal calling service party, and the plurality of service groups comprise a first service group and a second service group. The forwarding of the invocation request by the invocation service to the plurality of service groups based on the identification of the plurality of service groups may be performed by invocation request forwarding apparatus 700.
As shown in fig. 7, the call request forwarding apparatus 700 includes a second sending module 710, a third sending module 720, and a fourth sending module 730.
The second sending module 710 may be configured to support the external invoking service sending the invocation request to the first service group. According to the embodiment of the present disclosure, the second sending module 710 may, for example, perform operation S410 described above with reference to fig. 4, which is not described herein again.
The third sending module 720 may be configured to support the first service group sending the call request to the internal call service. According to the embodiment of the present disclosure, the third sending module 720 may, for example, perform operation S420 described above with reference to fig. 4, which is not described herein again.
The fourth sending module 730 may be configured to support the internal call service sending the call request to the second service group. According to the embodiment of the present disclosure, the fourth sending module 730 may, for example, perform the operation S430 described above with reference to fig. 4, which is not described herein again.
According to the embodiment of the present disclosure, the plurality of service groups include a plurality of regional service groups, and each of the plurality of regional service groups includes a plurality of first service groups and a plurality of second service groups. Sending a call request to an internal calling server by a first service group, comprising: an invocation request is sent by any one of the first plurality of service groups to the internal invocation service. Sending, by the internal invocation service, an invocation request to the second service group, including: the internal invocation service sends an invocation request to each of the plurality of second service groups.
Fig. 8 schematically shows a block diagram of an inspection apparatus according to another embodiment of the present disclosure.
As shown in fig. 8, the checking apparatus 800 includes a first transmitting module 610, a receiving module 620, a first determining module 630, a second determining module 810, and a third determining module 820. The first sending module 610, the receiving module 620, and the first determining module 630 are the same as or similar to the modules in fig. 6, and are not repeated herein.
According to the embodiment of the present disclosure, the service functions of the plurality of service groups belong to functions of a specific application.
The second determination module 810 may be configured to determine at least one target service group of the plurality of service groups whose service function is abnormal in response to determining that the service function of the plurality of service groups is abnormal. According to an embodiment of the present disclosure, the second determining module 810 may perform, for example, operation S510 described above with reference to fig. 5, which is not described herein again.
The third determination module 820 may be used to determine a risk level for a particular application based on at least one target service group. According to an embodiment of the present disclosure, the third determining module 820 may perform, for example, operation S520 described above with reference to fig. 5, which is not described herein again.
Any number of modules, sub-modules, units, sub-units, or at least part of the functionality of any number thereof according to embodiments of the present disclosure may be implemented in one module. Any one or more of the modules, sub-modules, units, and sub-units according to the embodiments of the present disclosure may be implemented by being split into a plurality of modules. Any one or more of the modules, sub-modules, units, sub-units according to embodiments of the present disclosure may be implemented at least in part as a hardware circuit, such as a Field Programmable Gate Array (FPGA), a Programmable Logic Array (PLA), a system on a chip, a system on a substrate, a system on a package, an Application Specific Integrated Circuit (ASIC), or may be implemented in any other reasonable manner of hardware or firmware by integrating or packaging a circuit, or in any one of or a suitable combination of software, hardware, and firmware implementations. Alternatively, one or more of the modules, sub-modules, units, sub-units according to embodiments of the disclosure may be at least partially implemented as a computer program module, which when executed may perform the corresponding functions.
For example, any plurality of the first transmitting module 610, the receiving module 620, the first determining module 630, the second transmitting module 710, the third transmitting module 720, the fourth transmitting module 730, the second determining module 810, and the third determining module 820 may be combined into one module to be implemented, or any one of them may be split into a plurality of modules. Alternatively, at least part of the functionality of one or more of these modules may be combined with at least part of the functionality of the other modules and implemented in one module. According to an embodiment of the present disclosure, at least one of the first sending module 610, the receiving module 620, the first determining module 630, the second sending module 710, the third sending module 720, the fourth sending module 730, the second determining module 810, and the third determining module 820 may be implemented at least in part as a hardware circuit, such as a Field Programmable Gate Array (FPGA), a Programmable Logic Array (PLA), a system on a chip, a system on a substrate, a system on a package, an Application Specific Integrated Circuit (ASIC), or any other reasonable manner of integrating or packaging a circuit, or as any one of three implementations of software, hardware, and firmware, or as a suitable combination of any of them. Alternatively, at least one of the first transmitting module 610, the receiving module 620, the first determining module 630, the second transmitting module 710, the third transmitting module 720, the fourth transmitting module 730, the second determining module 810 and the third determining module 820 may be at least partially implemented as a computer program module which, when executed, may perform a corresponding function.
FIG. 9 schematically illustrates a block diagram of a computer system for implementing an inspection in accordance with an embodiment of the disclosure. The computer system illustrated in FIG. 9 is only one example and should not impose any limitations on the scope of use or functionality of embodiments of the disclosure.
As shown in fig. 9, computer system 900 includes a processor 901, a computer-readable storage medium 902. The system 900 may perform a method according to an embodiment of the disclosure.
In particular, processor 901 may comprise, for example, a general purpose microprocessor, an instruction set processor and/or related chip set and/or a special purpose microprocessor (e.g., an Application Specific Integrated Circuit (ASIC)), or the like. The processor 901 may also include on-board memory for caching purposes. The processor 901 may be a single processing unit or a plurality of processing units for performing the different actions of the method flows according to embodiments of the present disclosure.
Computer-readable storage medium 902 may be, for example, any medium that can contain, store, communicate, propagate, or transport the instructions. For example, a readable storage medium may include, but is not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, device, or propagation medium. Specific examples of the readable storage medium include: magnetic storage devices, such as magnetic tape or Hard Disk Drives (HDDs); optical storage devices, such as compact disks (CD-ROMs); a memory, such as a Random Access Memory (RAM) or a flash memory; and/or wired/wireless communication links.
The computer-readable storage medium 902 may comprise a computer program 903, which computer program 903 may comprise code/computer-executable instructions that, when executed by a processor 901, cause the processor 901 to perform a method according to an embodiment of the disclosure or any variant thereof.
The computer program 903 may be configured with computer program code, for example, comprising computer program modules. For example, in an example embodiment, code in computer program 903 may include one or more program modules, including for example 903A, 903B, … …. It should be noted that the division and number of the modules are not fixed, and those skilled in the art may use suitable program modules or program module combinations according to actual situations, so that the processor 901 may execute the method according to the embodiment of the present disclosure or any variation thereof when the program modules are executed by the processor 901.
According to an embodiment of the present disclosure, at least one of the first transmitting module 610, the receiving module 620, the first determining module 630, the second transmitting module 710, the third transmitting module 720, the fourth transmitting module 730, the second determining module 810, and the third determining module 820 may be implemented as a computer program module described with reference to fig. 9, which, when executed by the processor 901, may implement the corresponding operations described above.
The present disclosure also provides a computer-readable medium, which may be embodied in the apparatus/device/system described in the above embodiments; or may exist separately and not be assembled into the device/apparatus/system. The computer readable medium carries one or more programs which, when executed, implement the method.
According to embodiments of the present disclosure, a computer readable medium may be a computer readable signal medium or a computer readable storage medium or any combination of the two. A computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples of the computer readable storage medium may include, but are not limited to: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the present disclosure, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. In contrast, in the present disclosure, a computer-readable signal medium may include a propagated data signal with computer-readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to: wireless, wired, optical fiber cable, radio frequency signals, etc., or any suitable combination of the foregoing.
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present disclosure. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams or flowchart illustration, and combinations of blocks in the block diagrams or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
Those skilled in the art will appreciate that various combinations and/or combinations of features recited in the various embodiments and/or claims of the present disclosure can be made, even if such combinations or combinations are not expressly recited in the present disclosure. In particular, various combinations and/or combinations of the features recited in the various embodiments and/or claims of the present disclosure may be made without departing from the spirit or teaching of the present disclosure. All such combinations and/or associations are within the scope of the present disclosure.
While the disclosure has been shown and described with reference to certain exemplary embodiments thereof, it will be understood by those skilled in the art that various changes in form and details may be made therein without departing from the spirit and scope of the disclosure as defined by the appended claims and their equivalents. Accordingly, the scope of the present disclosure should not be limited to the above-described embodiments, but should be defined not only by the appended claims, but also by equivalents thereof.

Claims (8)

1. An inspection method performed by a server, comprising:
sending a call request to a calling server, wherein the call request comprises the identifications of a plurality of service groups, so that the calling server forwards the call request to the plurality of service groups based on the identifications of the plurality of service groups;
receiving feedback information, wherein the feedback information is information generated by the service groups based on the calling request, and the feedback information is used for representing whether the service functions of the service groups are normal or not; and
determining whether service functions of the plurality of service groups are normal based on the feedback information,
wherein the plurality of service groups include service groups of a plurality of areas, and the service group of each area of the service groups of the plurality of areas includes a plurality of first service groups and a plurality of second service groups; the calling service party comprises an external calling service party and an internal calling service party;
the external calling service is configured to send the calling request to the plurality of first service groups;
any one of the plurality of first service groups is configured to send the invocation request to the internal invocation service;
the internal invocation server is configured to send the invocation request to each of the plurality of second service groups.
2. The method of claim 1, wherein the determining whether service functionality of the plurality of service groups is normal based on the feedback information comprises:
determining whether resources required by the second service group to implement the service function are available based on the feedback information; and
determining whether service functionality of the second service group is normal based on whether the resource is available.
3. The method of claim 1, wherein the service functions of the plurality of service groups belong to application-specific functions; the method further comprises the following steps:
in response to determining that the service functions of the plurality of service groups are abnormal, determining at least one target service group of the plurality of service groups whose service functions are abnormal; and
determining a risk level for the particular application based on the at least one target service group.
4. The method of claim 1, wherein each of the plurality of service groups comprises a checking mechanism by which service groups of the plurality of service groups that are functioning properly generate the feedback information based on an identity of the service group and the invocation request.
5. The method of claim 2, wherein the resource comprises at least one of a database and a data transfer protocol.
6. An inspection apparatus comprising:
the first sending module is used for sending a calling request to a calling server, wherein the calling request comprises the identifications of a plurality of service groups, so that the calling server forwards the calling request to the plurality of service groups based on the identifications of the plurality of service groups;
the receiving module is used for receiving feedback information, wherein the feedback information is information generated by the service groups based on the calling request, and the feedback information is used for representing whether the service functions of the service groups are normal or not; and
a first determination module that determines whether service functions of the plurality of service groups are normal based on the feedback information,
wherein the plurality of service groups include service groups of a plurality of areas, and the service group of each area of the service groups of the plurality of areas includes a plurality of first service groups and a plurality of second service groups; the calling service party comprises an external calling service party and an internal calling service party;
the external calling service is configured to send the calling request to the plurality of first service groups;
any one of the plurality of first service groups is configured to send the invocation request to the internal invocation service;
the internal invocation server is configured to send the invocation request to each of the plurality of second service groups.
7. A computing device, comprising:
one or more processors;
a memory for storing one or more programs,
wherein the one or more programs, when executed by the one or more processors, cause the one or more processors to implement the method of any of claims 1-5.
8. A computer-readable storage medium storing computer-executable instructions for implementing the method of any one of claims 1 to 5 when executed by a processor.
CN201910706869.0A 2019-07-31 2019-07-31 Checking method, device, computing equipment and medium executed by server Active CN110278133B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910706869.0A CN110278133B (en) 2019-07-31 2019-07-31 Checking method, device, computing equipment and medium executed by server

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910706869.0A CN110278133B (en) 2019-07-31 2019-07-31 Checking method, device, computing equipment and medium executed by server

Publications (2)

Publication Number Publication Date
CN110278133A CN110278133A (en) 2019-09-24
CN110278133B true CN110278133B (en) 2021-08-13

Family

ID=67965662

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910706869.0A Active CN110278133B (en) 2019-07-31 2019-07-31 Checking method, device, computing equipment and medium executed by server

Country Status (1)

Country Link
CN (1) CN110278133B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111858260A (en) * 2020-07-31 2020-10-30 中国工商银行股份有限公司 Information display method, device, equipment and medium

Citations (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101873237A (en) * 2010-06-13 2010-10-27 用友软件股份有限公司 Method and system for dynamically maintaining member servers in cluster
CN102394807A (en) * 2011-08-23 2012-03-28 北京京北方信息技术有限公司 System and method for decentralized scheduling of autonomous flow engine load balancing clusters
CN104023012A (en) * 2014-05-30 2014-09-03 北京金山网络科技有限公司 Method, device and system for scheduling service in cluster
CN105812488A (en) * 2016-05-06 2016-07-27 深圳前海大数点科技有限公司 Cloud computing distributed service cluster system and method of using the system
CN106230985A (en) * 2016-09-21 2016-12-14 广东工业大学 A kind of based on the big data processing method of Internet of Things, system and service processing end
CN106790723A (en) * 2017-03-23 2017-05-31 泰康保险集团股份有限公司 The monitoring method of application service, load-balancing device and monitoring device
CN106936896A (en) * 2017-02-20 2017-07-07 北京数字联盟网络科技有限公司 The data transferring method and device of Kafka clusters
CN107341045A (en) * 2017-07-13 2017-11-10 郑州云海信息技术有限公司 A kind of scheduling virtual machine management method and scheduler
WO2017200752A1 (en) * 2016-05-20 2017-11-23 Shoretel, Inc. Hybrid cloud deployment for hybrid unified communications
CN107391335A (en) * 2016-03-31 2017-11-24 阿里巴巴集团控股有限公司 A kind of method and apparatus for checking cluster health status
CN107453888A (en) * 2016-05-31 2017-12-08 深圳市深信服电子科技有限公司 The management method and device of the cluster virtual machine of high availability
CN107769943A (en) * 2016-08-17 2018-03-06 阿里巴巴集团控股有限公司 A kind of method and apparatus of active and standby cluster switching
CN108762917A (en) * 2018-05-04 2018-11-06 平安科技(深圳)有限公司 Access request processing method, device, system, computer equipment and storage medium
CN109067828A (en) * 2018-06-22 2018-12-21 杭州才云科技有限公司 Based on the more cluster construction methods of Kubernetes and OpenStack container cloud platform, medium, equipment
CN109861878A (en) * 2019-01-17 2019-06-07 平安科技(深圳)有限公司 The monitoring method and relevant device of the topic data of kafka cluster

Family Cites Families (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9319282B2 (en) * 2005-02-28 2016-04-19 Microsoft Technology Licensing, Llc Discovering and monitoring server clusters
US8340795B2 (en) * 2007-03-26 2012-12-25 Google Inc. Small removable audio player that attaches to a host media player
CN101741619B (en) * 2009-12-24 2012-05-23 中国人民解放军信息工程大学 Self-curing J2EE application server for intrusion tolerance and self-curing method thereof
CN103916378B (en) * 2012-12-28 2017-02-15 中国电信股份有限公司 System and method for automatically deploying application system in cloud resource pool
US10320813B1 (en) * 2015-04-30 2019-06-11 Amazon Technologies, Inc. Threat detection and mitigation in a virtualized computing environment
CN106899504B (en) * 2015-12-18 2020-06-30 北京京东尚科信息技术有限公司 Cross-cluster service routing method and device
CN107124431B (en) * 2017-06-22 2020-03-06 浙江数链科技有限公司 Authentication method, device, computer readable storage medium and authentication system
CN108306921A (en) * 2017-08-04 2018-07-20 深圳壹账通智能科技有限公司 Call external service method and application server
CN107479990B (en) * 2017-08-11 2020-12-18 恒丰银行股份有限公司 Distributed software service system
CN108134706B (en) * 2018-01-02 2020-08-18 中国工商银行股份有限公司 Block chain multi-activity high-availability system, computer equipment and method

Patent Citations (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101873237A (en) * 2010-06-13 2010-10-27 用友软件股份有限公司 Method and system for dynamically maintaining member servers in cluster
CN102394807A (en) * 2011-08-23 2012-03-28 北京京北方信息技术有限公司 System and method for decentralized scheduling of autonomous flow engine load balancing clusters
CN104023012A (en) * 2014-05-30 2014-09-03 北京金山网络科技有限公司 Method, device and system for scheduling service in cluster
CN107391335A (en) * 2016-03-31 2017-11-24 阿里巴巴集团控股有限公司 A kind of method and apparatus for checking cluster health status
CN105812488A (en) * 2016-05-06 2016-07-27 深圳前海大数点科技有限公司 Cloud computing distributed service cluster system and method of using the system
WO2017200752A1 (en) * 2016-05-20 2017-11-23 Shoretel, Inc. Hybrid cloud deployment for hybrid unified communications
CN107453888A (en) * 2016-05-31 2017-12-08 深圳市深信服电子科技有限公司 The management method and device of the cluster virtual machine of high availability
CN107769943A (en) * 2016-08-17 2018-03-06 阿里巴巴集团控股有限公司 A kind of method and apparatus of active and standby cluster switching
CN106230985A (en) * 2016-09-21 2016-12-14 广东工业大学 A kind of based on the big data processing method of Internet of Things, system and service processing end
CN106936896A (en) * 2017-02-20 2017-07-07 北京数字联盟网络科技有限公司 The data transferring method and device of Kafka clusters
CN106790723A (en) * 2017-03-23 2017-05-31 泰康保险集团股份有限公司 The monitoring method of application service, load-balancing device and monitoring device
CN107341045A (en) * 2017-07-13 2017-11-10 郑州云海信息技术有限公司 A kind of scheduling virtual machine management method and scheduler
CN108762917A (en) * 2018-05-04 2018-11-06 平安科技(深圳)有限公司 Access request processing method, device, system, computer equipment and storage medium
CN109067828A (en) * 2018-06-22 2018-12-21 杭州才云科技有限公司 Based on the more cluster construction methods of Kubernetes and OpenStack container cloud platform, medium, equipment
CN109861878A (en) * 2019-01-17 2019-06-07 平安科技(深圳)有限公司 The monitoring method and relevant device of the topic data of kafka cluster

Also Published As

Publication number Publication date
CN110278133A (en) 2019-09-24

Similar Documents

Publication Publication Date Title
CN110311983B (en) Service request processing method, device and system, electronic equipment and storage medium
US20170163479A1 (en) Method, Device and System of Renewing Terminal Configuration In a Memcached System
US9753786B2 (en) Client server communication system
US9929930B2 (en) Reducing an amount of captured network traffic data to analyze
CN111556153B (en) Information processing method, apparatus, device and medium executed by first server
CN111177112A (en) Database blocking method and device based on operation and maintenance management system and electronic equipment
CN111683139B (en) Method and device for balancing load
CN110874227A (en) Shunting method and system for realizing gray scale release of API gateway and electronic equipment
CN108900562B (en) Login state sharing method and device, electronic equipment and medium
US20180248940A1 (en) Distributed data management
CN113721893A (en) Micro-service bus design method and device
CN110278133B (en) Checking method, device, computing equipment and medium executed by server
CN110324384B (en) Data pushing method and device
CN111866211B (en) Network access method, device, terminal and medium applied to terminal
CN112015383A (en) Login method and device
CN110519109B (en) Method, device, computing equipment and medium for detecting node association
CN112748962A (en) Application loading method and device, electronic equipment and computer readable medium
US20230254146A1 (en) Cybersecurity guard for core network elements
US11381665B2 (en) Tracking client sessions in publish and subscribe systems using a shared repository
CN111818179A (en) User request processing method and device, computing equipment and medium
US11595471B1 (en) Method and system for electing a master in a cloud based distributed system using a serverless framework
US20220329529A1 (en) 5g filters for virtual network functions
CN113014650B (en) Processing method and device for data request, computing equipment and medium
CN112257039B (en) Identity attribute adding method and device and electronic equipment
US10389830B2 (en) Device delegation of push notification distribution

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant