CN111181777B - Service degradation method, device, computer equipment and storage medium - Google Patents

Service degradation method, device, computer equipment and storage medium Download PDF

Info

Publication number
CN111181777B
CN111181777B CN201911301303.6A CN201911301303A CN111181777B CN 111181777 B CN111181777 B CN 111181777B CN 201911301303 A CN201911301303 A CN 201911301303A CN 111181777 B CN111181777 B CN 111181777B
Authority
CN
China
Prior art keywords
service
system service
specified system
calling
proxy
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201911301303.6A
Other languages
Chinese (zh)
Other versions
CN111181777A (en
Inventor
李恺
何柄融
许煜彬
王伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Qianhai Huanrong Lianyi Information Technology Service Co Ltd
Original Assignee
Shenzhen Qianhai Huanrong Lianyi Information Technology Service Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Qianhai Huanrong Lianyi Information Technology Service Co Ltd filed Critical Shenzhen Qianhai Huanrong Lianyi Information Technology Service Co Ltd
Priority to CN201911301303.6A priority Critical patent/CN111181777B/en
Publication of CN111181777A publication Critical patent/CN111181777A/en
Application granted granted Critical
Publication of CN111181777B publication Critical patent/CN111181777B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/50Network service management, e.g. ensuring proper service fulfilment according to agreements
    • H04L41/5003Managing SLA; Interaction between SLA and QoS
    • H04L41/5019Ensuring fulfilment of SLA
    • H04L41/5025Ensuring fulfilment of SLA by proactively reacting to service quality change, e.g. by reconfiguration after service quality degradation or upgrade
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/56Provisioning of proxy services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/60Scheduling or organising the servicing of application requests, e.g. requests for application data transmissions using the analysis and optimisation of the required network resources
    • H04L67/62Establishing a time schedule for servicing the requests

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Quality & Reliability (AREA)
  • Hardware Redundancy (AREA)

Abstract

The invention discloses a method and a device for service degradation, computer equipment and a storage medium. The method comprises the following steps: providing corresponding proxy service for the specified system service; when a main system service receives a request for data access, determining a specified system service corresponding to the request; calling the specified system service through a proxy service corresponding to the specified system service; judging whether the calling is successful; and if the calling is unsuccessful, calling the local service through the corresponding proxy service to perform lossy service compatible logic processing. The method can be compatible through the local service when the specified system service is abnormal and needs to be degraded due to the existence of a large amount of service requirements, thereby improving the processing efficiency and ensuring the normal operation of important services.

Description

Service degradation method, device, computer equipment and storage medium
Technical Field
The present invention relates to the field of computer technologies, and in particular, to a method and an apparatus for service degradation, a computer device, and a storage medium.
Background
At present, with the development of business, distributed microservices are gradually popularized, and in a complex distributed system structure, a plurality of dependency relationships exist in application, and when a certain dependency relationship fails, other dependency relationships can be influenced. To solve this problem, two solutions are currently provided: one is to reduce the effect of rendering a page by weakening the special effect of the page, and degrade some unimportant display service functions without directly calling an interface, but the method is only suitable for a front-end page and is not suitable for a back-end service; the other is that the called service interface is directly abandoned when abnormal or overtime happens, but the problem that the request cannot be processed due to the discarding of the relevant logic exists.
Disclosure of Invention
The embodiment of the invention provides a method, a device, computer equipment and a storage medium for service degradation, aiming at improving the processing efficiency and ensuring the normal operation of important services by carrying out compatibility through local services when the specified system service is abnormal and needs to be degraded due to a large number of service requirements.
In a first aspect, an embodiment of the present invention provides a service degradation method based on a proxy mode, which includes:
providing corresponding proxy service for the specified system service;
when a main system service receives a request for data access, determining a specified system service corresponding to the request;
calling the specified system service through a proxy service corresponding to the specified system service;
judging whether the calling is successful;
and if the calling is unsuccessful, calling the local service through the corresponding proxy service to perform lossy service compatible logic processing.
In a second aspect, an embodiment of the present invention provides a service degradation apparatus based on a proxy mode, including:
the supply unit is used for providing corresponding proxy service for the specified system service;
the system comprises a matching unit, a processing unit and a processing unit, wherein the matching unit is used for determining a specified system service corresponding to a request when the main system service receives the request of data access;
the first calling unit is used for calling the specified system service through the proxy service corresponding to the specified system service;
the judging unit is used for judging whether the calling is successful or not;
and the second calling unit is used for calling the local service through the corresponding proxy service to perform lossy service-compatible logic processing when the calling is unsuccessful.
In a third aspect, an embodiment of the present invention further provides a computer device, which includes a memory, a processor, and a computer program stored on the memory and executable on the processor, and when the processor executes the computer program, the processor implements the service degradation method based on the proxy mode according to the first aspect.
In a fourth aspect, an embodiment of the present invention further provides a computer-readable storage medium, where the computer-readable storage medium stores a computer program, and the computer program, when executed by a processor, causes the processor to execute the method for service degradation based on proxy mode according to the first aspect.
The embodiment of the invention provides a service degradation method and device based on an agent mode, computer equipment and a storage medium. The method comprises the following steps: providing corresponding proxy service for the specified system service; when a main system service receives a request for data access, determining a specified system service corresponding to the request; calling the specified system service through a proxy service corresponding to the specified system service; judging whether the calling is successful; and if the calling is unsuccessful, calling the local service through the corresponding proxy service to perform lossy service compatible logic processing. The embodiment of the invention uses the service degradation method based on the proxy mode, and when the service of the specified system is abnormal and needs to be degraded due to a large amount of service requirements, the compatibility is carried out through the local service, the processing efficiency is improved, and the normal operation of important services is ensured.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings required to be used in the description of the embodiments are briefly introduced below, and it is obvious that the drawings in the description below are some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings based on the drawings without creative efforts.
Fig. 1 is a flowchart of a service downgrading method based on a proxy mode according to an embodiment of the present invention;
fig. 2 is a block diagram illustrating a service downgrade apparatus based on a proxy mode according to an embodiment of the present invention;
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, but not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
It will be understood that the terms "comprises" and/or "comprising," when used in this specification and the appended claims, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
It is also to be understood that the terminology used in the description of the invention herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. As used in the specification of the present invention and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise.
It should be further understood that the term "and/or" as used in this specification and the appended claims refers to and includes any and all possible combinations of one or more of the associated listed items.
Referring to fig. 1, fig. 1 is a flowchart of a service downgrading method based on a proxy mode according to an embodiment of the present invention.
The specific steps may include S110 to S150:
s110: providing corresponding proxy service for the specified system service;
in one embodiment, a proxy service may be provided for a given system service, and invocation of the given system service is controlled by the proxy service. That is to say, the proxy service in this embodiment is used as an intermediary between the main system service and the specified system service, and after the proxy service is used, the proxy service is not mixed with the original service logic, so that the code is more complicated, and meanwhile, modifying the local service does not cause any influence on the original service logic and the request for data access. It should be noted that, in the embodiment of the present invention, corresponding proxy services may not be provided for all specified system services, but only for specified system services responsible for processing simple services.
S120: when a main system service receives a request for data access, determining a specified system service corresponding to the request;
in an embodiment, since all requests have the specified system service corresponding to the type of the request, when the host system service receives a request for data access, it needs to determine the specified system service corresponding to the request, that is, it needs to determine the specified system service responsible for processing the request, and then perform subsequent operations on the request.
S130: calling the specified system service through a proxy service corresponding to the specified system service;
in an embodiment, after a main system service receives a request for data access and determines a specified system service corresponding to the request, the specified system service is not directly invoked to process the request, but indirectly invoked through a proxy service corresponding to the specified system service. Specifically, after the main system service receives a request for data access and determines a specified system service corresponding to the request, the specified system service queries a corresponding proxy service, and then the specified system service is called by the proxy service.
S140: judging whether the calling is successful;
since a call may fail due to some error in the call process and then the corresponding data access request cannot be processed, it is necessary to determine whether the call is successful in order to timely cope with the call failure.
In an embodiment, the determining whether the call is successful includes:
judging whether the process of calling the specified system service is error or overtime;
and if the process of calling the specified system service is error-reported or overtime, the calling is confirmed to be unsuccessful.
In this embodiment, it is determined whether the call is successful, that is, whether an error report or timeout occurs during the process of calling the specified system service, so that the specified system service cannot be normally called. If an error report or timeout occurs in the process of calling the specified system service, the call may be determined to be unsuccessful. Whether the specific system service is called overtime or not can be judged according to the history, for example, the time spent on calling the specific system service for the last three times can be inquired, wherein the time spent is the time spent from the time when the main system service receives the request of the data access to the time when the request of the data access is processed (namely the time spent on calling the specific system service), the average value of the inquired three times of time spent is calculated, 2 times of the average value is used as overtime, the time spent on calling the specific system service for the current time is compared with the overtime, if the time spent on calling the specific system service for the current time is greater than the overtime, the condition that calling is overtime is judged, and the calling result is confirmed to be unsuccessful. In another embodiment, the time consumed by the longest call in the last five calls of the specified system service may be queried, and the time is used as the timeout time, and if the time consumed by the current call of the specified system service is greater than the timeout time, it is determined that the call is over-timed, and the result of the current call is determined as unsuccessful.
S150: and if the calling is unsuccessful, calling the local service through the corresponding proxy service to perform lossy service compatible logic processing.
Specifically, if the determination result is that the call is unsuccessful, that is, the specified system service cannot be called normally, then the local service needs to be called through the proxy service corresponding to the specified system service, and then lossy service-compatible logic processing is performed.
In this embodiment, if the specific service system is not invoked successfully, the data access request is not directly abandoned, but a certain lossy service compatibility is performed on the local service, and then the data access request is correspondingly processed on the local service. For example: the method comprises the steps that a main system service receives a data access request for inquiring an address, the main system service can call the appointed system service through an agent service corresponding to the appointed system service, when the appointed system service is called to inquire the address, if the address cannot be inquired due to abnormity of the appointed system service, a local service can be called through the agent service corresponding to the appointed system service, and the local service can analyze the tax number and then inquire the address. Since the processing of the request for data access on the local service is of lossy service compatibility, some non-critical errors may occur, for example, by resolving the tax number and then querying the address, and the address administrative division may be changed, but since this happens relatively rarely, the final result is still within the acceptable range, that is, the request for data access may allow a certain deviation of the address resolved by the local service.
Preferably, in order to improve processing efficiency, a plurality of local services may be provided for a given system service, and these local services may all perform corresponding processing on the request for the same data access, for example: three local services may be set up: the system comprises a first local service, a second local service and a third local service, wherein when a specified system service needs to call the local service to process a corresponding data access request due to an abnormal condition, the first local service is called preferentially; if the first local service fails to be invoked, the proxy service can invoke a second local service to process the corresponding data access request; if the second local service invocation fails, the proxy service may invoke a third local service to process the corresponding data access request. That is to say, the embodiment of the present invention provides a function of replacing the same designated system service with a plurality of standby services, so as to process the request for corresponding data access. Since the call may still be unsuccessful (i.e., call fails) when the local service is invoked to process the request for data access, in this embodiment, in order to reduce the occurrence of unsuccessful call, the local services may be sorted from low to high according to the number of call failures of the local services in the latest time period, for example, the sorting results sequentially are: the first local service, the second local service and the third local service are processed according to the sequence that the first local service is called first, the second local service is called if the calling fails, and the third local service is called if the calling fails. If the sequencing result in the next time period is as follows: and the second local service, the third local service and the first local service are processed according to the sequence that the second local service is called first, the third local service is called again if the calling fails, and the first local service is called again if the calling fails.
In an embodiment, the service degradation method based on the proxy mode further includes:
detecting the times of unsuccessful continuous multiple calls of a specified system service;
and if the times exceed a preset time threshold, shielding the specified system service.
Specifically, the number of times that a given system service call is unsuccessful may be counted, and if successive calls are unsuccessful, access to the given system service is masked. Specifically, the number of times that the specified system service is not successfully called continuously may be detected, and if the number of times exceeds a preset number threshold, the specified system service is directly masked. In this embodiment, a corresponding number threshold may be set for each designated system service, the number threshold may be set according to the weight of the designated system service, the weight may be manually set in advance, and in different cases, the weight of the designated system service may be set to different values.
In this embodiment, the service degradation method based on the proxy mode further includes:
and when the main system service receives the request of data access again and the specified system service corresponding to the request is the specified system service in the shielding state, directly calling the local service through the corresponding proxy service to perform lossy service compatible logic processing.
That is, if a specified system service is masked due to unsuccessful invocation multiple times, when the main system service receives a request for data access again, since the specified proxy service is in a masked state, the main system service will not invoke the specified system service, but directly invoke a local service through a corresponding proxy service to perform lossy service-compatible logic processing. Even when the access amount is increased sharply, and the request of data access cannot be processed normally due to the fact that the specified system service has problems (such as slow response time or no response), the request of data access cannot be discarded directly, and the processing efficiency can be guaranteed by calling the local service to perform lossy processing within the receiving range on the request of data access.
In this embodiment, the service degradation method based on the proxy mode further includes:
and when the times exceed a time threshold value, sending out alarm information, wherein the alarm information comprises the type of the specified system service and the shielding time.
Specifically, when the number of times exceeds the number threshold, the type of the specified system service to be masked and the current time (i.e., the masking time) for masking the specified system service are determined by sending out an alarm message. The alarm information includes the type of the specified system service and the shielding time, and preferably, the alarm information may further include a shielding duration that the specified system service needs to be shielded, where the shielding duration refers to a time period from the shielding time to the end of shielding. During this period of the masking duration, all requests for this type of data access will not be processed by the specified system service. In this embodiment, after the masking duration is reached, the masking state of the specified system service is automatically released. The masking duration may be set uniformly, or may be set according to a weight of the specified system service, a number of times that the specified system service is masked in the previous time period, and a basic masking duration, that is, a masking duration T of the specified system service is equal to a weight q × a number of times that the specified system service is masked in the previous time period, n × the basic masking duration T. For example: the basic masking duration T may be set to 2 minutes in advance, the time period may be set to 1 hour, and if the number of times that the specified system service is masked in the last time period is 1 time, the masking duration T of the specified system service is equal to the weight q × 1 × 2 of the specified system service; if the designated system service is masked 3 times in the time period, the masking duration of the designated system service is equal to the weight qx3x2 of the designated system service.
In this embodiment, the method for service degradation based on the proxy mode further includes:
and when the shielding removing instruction is received, removing the shielding state of the corresponding specified system service.
Specifically, if it is necessary to perform an operation of releasing the shielding state of a specific system service in advance when the specific system service is in the shielding state, a shielding release instruction may be sent, and when the contact shielding instruction is received, the shielding state of the corresponding specific system service may be released in advance.
In an embodiment, the alarm information of the specified system service may be sent to a main system service, and when the main system service receives a data access request corresponding to the specified system service, the main system service may determine that the specified system service is still in a shielding state according to the received alarm information, and at this time, the main system service may directly call a local service through an agent service to perform lossy service-compatible logic processing; similarly, the unmasking instruction of the specified system service may also be sent to a main system service, and the main system service may remove the masked state of the specified system service according to the received unmasking instruction.
Preferably, since the designated system service has a proxy service corresponding thereto, in order to reduce the access amount of the main system service and speed up the call efficiency, the alarm information of the designated system service may also be sent to the corresponding proxy service, when the main system service receives a request for data access corresponding to the designated system service, the designated system service corresponding to the request for data access is still determined, and when the designated system service is called by the proxy service corresponding to the designated system service, the proxy service may confirm that the designated system service is still in a shielding state according to the received alarm information, so that the proxy service does not call the designated system service at this time, but directly calls the local service by the proxy service to perform a lossy service compatible logic process. Similarly, the unmasking instruction of the specified system service may also be sent to an agent service, and the agent service may unmask the specified system service according to the received unmasking instruction.
In this embodiment, the service degradation method based on the proxy mode further includes:
automatically initiating a calling request to a specified system service in a shielding state through proxy service at intervals of preset time;
if the calling is successful, the shielding state of the corresponding specified system service is released;
if the calling is not successful, the shielding state of the corresponding designated system service is maintained.
Specifically, in order to timely query whether the specified system service in the shielding state can be called, a preset time can be set for the specified system service in the shielding state, a calling request is automatically initiated to the specified system service in the shielding state through the proxy service every other preset time, whether the calling is successful is judged, and if the calling is successful, the shielding state of the corresponding specified system service can be directly released; and if the calling is unsuccessful, continuously maintaining the shielding state of the corresponding specified system service. If the proxy service receives a processing result returned by the specified system service within the overtime, the calling is confirmed to be successful; if the proxy service does not receive the processing result returned by the specified system service within the timeout period (timeout) or the proxy service receives the error information within the timeout period (error), it confirms that the call is unsuccessful (i.e. the call is failed), and in case of unsuccessful call, in order to reduce the number of calls, the local service is not occupied additionally, and the processing efficiency is improved, the proxy service will not call the local service to perform a lossy service-compatible logic process on the data access request, and at this time, the specified system service will not return the processing result of the data access request, i.e. the call request in this embodiment is equivalent to a test request, which is to test whether the specified system service returns to normal, so as to confirm whether the specified system service can be called.
Referring to fig. 2, fig. 2 is a block diagram illustrating a service downgrading apparatus 200 based on a proxy mode according to an embodiment of the present invention;
the apparatus 200 may include:
a supply unit 201, configured to provide a corresponding proxy service for a specified system service;
a matching unit 202, configured to, when a request for data access is received by a host system service, determine a specified system service corresponding to the request;
a first calling unit 203, configured to call the specified system service through a proxy service corresponding to the specified system service;
a judging unit 204, configured to judge whether the call is successful;
and a second calling unit 205, configured to, when the calling is unsuccessful, call the local service to perform lossy service-compatible logic processing through the corresponding proxy service.
In an embodiment, the determining unit 204 includes:
the first judging unit is used for judging whether the process of calling the specified system service reports errors or overtime;
and the second judgment unit is used for confirming that the calling is unsuccessful if the process of calling the specified system service is error-reported or overtime.
In one embodiment, the service downgrading apparatus 200 based on the proxy mode further includes:
the detection unit is used for detecting the times of unsuccessful continuous multiple invocations of the specified system service;
and the third judging unit is used for shielding the specified system service if the times exceed a preset times threshold.
In one embodiment, the service downgrading apparatus 200 based on the proxy mode further includes:
and the processing unit is used for directly calling the local service through the corresponding proxy service to perform lossy service compatible logic processing when the main system service receives the request of data access again and the specified system service corresponding to the request is the specified system service in the shielding state.
In one embodiment, the service downgrading apparatus 200 based on the proxy mode further includes:
and the alarm unit is used for sending out alarm information when the times exceed a time threshold, wherein the alarm information comprises the type of the specified system service and the shielding time.
In one embodiment, the service degradation device based on the proxy mode further comprises:
and the shielding unit is used for releasing the shielding state of the corresponding specified system service when receiving the shielding releasing instruction.
In one embodiment, the service downgrading apparatus 200 based on the proxy mode further includes:
the system comprises a calling unit, a processing unit and a processing unit, wherein the calling unit is used for automatically initiating a calling request to a specified system service in a shielding state through proxy service at intervals of preset time;
the fourth judging unit is used for removing the shielding state of the corresponding specified system service if the calling is successful;
and the fifth judging unit is used for keeping the shielding state of the corresponding specified system service if the calling is unsuccessful.
Since the embodiment of the apparatus portion and the embodiment of the method portion correspond to each other, please refer to the description of the embodiment of the method portion for the embodiment of the apparatus portion, and details are not repeated here.
The present invention also provides a computer-readable storage medium having a computer program stored thereon, which, when executed, can implement the method provided by the above-described embodiments.
The invention also provides a computer device, which may include a memory, a processor and a computer program stored on the memory and executable on the processor, wherein the processor implements the method provided by the above embodiments when executing the computer program.
The embodiments are described in a progressive manner in the specification, each embodiment focuses on differences from other embodiments, and the same and similar parts among the embodiments are referred to each other. The device disclosed by the embodiment corresponds to the method disclosed by the embodiment, so that the description is simple, and the relevant points can be referred to the method part for description. It should be noted that, for those skilled in the art, without departing from the principle of the present invention, it is possible to make various improvements and modifications to the present invention, and those improvements and modifications also fall within the scope of the claims of the present invention.
It is further noted that, in the present specification, relational terms such as first and second, and the like are used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in the process, method, article, or apparatus that comprises the element.

Claims (8)

1. A service degradation method based on a proxy mode is characterized by comprising the following steps:
providing corresponding proxy service for the specified system service;
when a main system service receives a request for data access, determining a specified system service corresponding to the request;
calling the specified system service through a proxy service corresponding to the specified system service;
judging whether the calling is successful;
if the calling is unsuccessful, calling the local service through the corresponding proxy service to perform lossy service compatible logic processing;
detecting the times of unsuccessful continuous and multiple calls of a specified system service, and shielding the specified system service if the times exceed a preset time threshold; each appointed system service is provided with a corresponding frequency threshold value;
when the times exceed a time threshold value, sending alarm information outwards, wherein the alarm information comprises the type of the designated system service and the shielding time; the alarm information further includes a shielding duration that the specified system service needs to be shielded, where the shielding duration T of the specified system service is equal to the weight q of the specified system service × the number of times that the specified system service is shielded in the last time period n × the basic shielding duration T.
2. The method of claim 1, wherein the determining whether the call was successful comprises:
judging whether the process of calling the specified system service is error or overtime;
and if the process of calling the specified system service is error-reported or overtime, confirming that the calling is unsuccessful.
3. The method of claim 1, further comprising:
and when the main system service receives the request of data access again and the specified system service corresponding to the request is the specified system service in the shielding state, directly calling the local service through the corresponding proxy service to perform lossy service compatible logic processing.
4. The method of claim 1, further comprising:
and when the shielding removing instruction is received, removing the shielding state of the corresponding specified system service.
5. The method of claim 1, further comprising:
automatically initiating a calling request to a specified system service in a shielding state through proxy service at intervals of preset time;
if the calling is successful, the shielding state of the corresponding specified system service is released;
and if the calling is unsuccessful, keeping the shielding state of the corresponding specified system service.
6. A service downgrade apparatus based on a proxy mode, comprising:
the supply unit is used for providing corresponding proxy service for the specified system service;
the system comprises a matching unit, a processing unit and a processing unit, wherein the matching unit is used for determining a specified system service corresponding to a request when the main system service receives the request of data access;
the first calling unit is used for calling the specified system service through the proxy service corresponding to the specified system service;
the judging unit is used for judging whether the calling is successful or not;
the second calling unit is used for calling the local service through the corresponding proxy service to perform lossy service compatible logic processing when the calling is unsuccessful;
the detection unit is used for detecting the times of unsuccessful continuous multi-call of the specified system service;
a third judging unit, configured to mask the specified system service if the number of times exceeds a preset number threshold; each appointed system service is provided with a corresponding frequency threshold value;
the alarm unit is used for sending out alarm information when the times exceed a time threshold, wherein the alarm information comprises the type of the specified system service and the shielding time; the alarm information further includes a shielding duration that the specified system service needs to be shielded, where the shielding duration T of the specified system service is the weight q of the specified system service × the number of times that the specified system service is shielded in the previous time period n × the basic shielding duration T.
7. A computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, the processor implementing the proxy mode-based service downgrading method of any of claims 1 to 5 when executing the computer program.
8. A computer-readable storage medium, having stored thereon a computer program which, when executed by a processor, implements the proxy mode-based service downgrading method of any of claims 1 to 5.
CN201911301303.6A 2019-12-17 2019-12-17 Service degradation method, device, computer equipment and storage medium Active CN111181777B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911301303.6A CN111181777B (en) 2019-12-17 2019-12-17 Service degradation method, device, computer equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911301303.6A CN111181777B (en) 2019-12-17 2019-12-17 Service degradation method, device, computer equipment and storage medium

Publications (2)

Publication Number Publication Date
CN111181777A CN111181777A (en) 2020-05-19
CN111181777B true CN111181777B (en) 2022-09-20

Family

ID=70650261

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911301303.6A Active CN111181777B (en) 2019-12-17 2019-12-17 Service degradation method, device, computer equipment and storage medium

Country Status (1)

Country Link
CN (1) CN111181777B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112583903B (en) * 2020-11-26 2022-06-03 北京邮电大学 Service self-adaptive access method, device, electronic equipment and storage medium
CN113645152B (en) * 2021-06-29 2023-09-26 福建天泉教育科技有限公司 Service degradation method and terminal

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9667569B1 (en) * 2010-04-29 2017-05-30 Amazon Technologies, Inc. System and method for adaptive server shielding
CN110505155A (en) * 2019-08-13 2019-11-26 北京达佳互联信息技术有限公司 Request degradation processing method, device, electronic equipment and storage medium
CN110535902A (en) * 2019-07-16 2019-12-03 平安普惠企业管理有限公司 The processing method and electronic device of monitoring intelligent are realized based on micro services

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20110006175A (en) * 2009-07-13 2011-01-20 국방과학연구소 Intrusion tolerance proxy system and method based on priority
CN105656962A (en) * 2014-11-11 2016-06-08 阿里巴巴集团控股有限公司 Service calling method and device
CN106973093B (en) * 2017-03-23 2019-11-19 北京奇艺世纪科技有限公司 A kind of service switch method and device
CN109936613B (en) * 2017-12-19 2021-11-05 北京京东尚科信息技术有限公司 Disaster recovery method and device applied to server
CN108427581A (en) * 2018-02-07 2018-08-21 平安普惠企业管理有限公司 System micro services method and terminal device
CN108989413A (en) * 2018-07-06 2018-12-11 深圳市牛鼎丰科技有限公司 Abnormal traffic compensation method, device, computer equipment and storage medium
CN110399178B (en) * 2019-06-14 2022-09-27 五八有限公司 Third-party service calling method and device, electronic equipment and storage medium

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9667569B1 (en) * 2010-04-29 2017-05-30 Amazon Technologies, Inc. System and method for adaptive server shielding
CN110535902A (en) * 2019-07-16 2019-12-03 平安普惠企业管理有限公司 The processing method and electronic device of monitoring intelligent are realized based on micro services
CN110505155A (en) * 2019-08-13 2019-11-26 北京达佳互联信息技术有限公司 Request degradation processing method, device, electronic equipment and storage medium

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
Web服务工作流路由模型构造及QoS优化;胡春华等;《中南大学学报(自然科学版)》;20090826(第04期);全文 *

Also Published As

Publication number Publication date
CN111181777A (en) 2020-05-19

Similar Documents

Publication Publication Date Title
CN109947641B (en) Automatic testing method and device
CN111181777B (en) Service degradation method, device, computer equipment and storage medium
CN110034948B (en) Method and device for troubleshooting system faults
CN108833205B (en) Information processing method, information processing device, electronic equipment and storage medium
CN106572137B (en) Distributed service resource management method and device
CN111538585B (en) Js-based server process scheduling method, system and device
CN115102841A (en) Network fault recovery method, device, equipment and storage medium
CN111949421B (en) SDK calling method, device, electronic equipment and computer readable storage medium
CN112596938A (en) Abnormity monitoring method and device
CN111651350A (en) Test case processing method, device and equipment and computer readable storage medium
CN113778763B (en) Intelligent switching method and system for three-way interface service faults
CN113886122A (en) System operation exception handling method, device, equipment and storage medium
CN109672573B (en) Configuration file deployment method, configuration file determination method, server and storage medium
CN111309744A (en) Object processing method and device, electronic equipment and computer readable storage medium
CN110113187B (en) Configuration updating method and device, configuration server and configuration system
CN111857689A (en) Framework, function configuration method of framework, terminal and storage medium
CN111488236A (en) Order abnormity processing method, server, storage medium and processing device
CN115328680B (en) Auxiliary method and device for message queue consumption abnormity and electronic equipment
CN115499492A (en) Application service exception handling method, device, equipment and readable storage medium
CN110837431A (en) Service control method, service control device, computer equipment and computer-readable storage medium
CN116541312B (en) Continuous integration test method and system for automobile software
CN115460271B (en) Network control method and device based on edge calculation and storage medium
CN109542344B (en) Method and device for cleaning disk space, storage medium and terminal
CN116991710B (en) Automatic test method and system, electronic equipment and storage medium thereof
CN110311833B (en) Method and device for detecting provider service, electronic equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant