CN112764885A - Object access method, device, electronic equipment, storage medium and program product - Google Patents

Object access method, device, electronic equipment, storage medium and program product Download PDF

Info

Publication number
CN112764885A
CN112764885A CN202110121905.4A CN202110121905A CN112764885A CN 112764885 A CN112764885 A CN 112764885A CN 202110121905 A CN202110121905 A CN 202110121905A CN 112764885 A CN112764885 A CN 112764885A
Authority
CN
China
Prior art keywords
terminal
port
container
configuration file
service object
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110121905.4A
Other languages
Chinese (zh)
Inventor
黄学森
王黎
杨兴武
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Dajia Internet Information Technology Co Ltd
Original Assignee
Beijing Dajia Internet Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Dajia Internet Information Technology Co Ltd filed Critical Beijing Dajia Internet Information Technology Co Ltd
Priority to CN202110121905.4A priority Critical patent/CN112764885A/en
Publication of CN112764885A publication Critical patent/CN112764885A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • G06F9/45533Hypervisors; Virtual machine monitors
    • G06F9/45558Hypervisor-specific management and integration aspects
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • G06F9/45533Hypervisors; Virtual machine monitors
    • G06F9/45558Hypervisor-specific management and integration aspects
    • G06F2009/4557Distribution of virtual machine instances; Migration and load balancing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • G06F9/45533Hypervisors; Virtual machine monitors
    • G06F9/45558Hypervisor-specific management and integration aspects
    • G06F2009/45579I/O management, e.g. providing access to device drivers or storage
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • G06F9/45533Hypervisors; Virtual machine monitors
    • G06F9/45558Hypervisor-specific management and integration aspects
    • G06F2009/45595Network integration; Enabling network access in virtual machine instances

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Small-Scale Networks (AREA)

Abstract

The disclosure relates to a service object access method and device, wherein the method comprises the following steps: detecting an event that a container set is scheduled to a first terminal, wherein the container set is packaged with a service object and is configured with a container port corresponding to the service object; setting a terminal port corresponding to the container port, and generating a corresponding relation between the container port and the terminal port; receiving an access request sent by a second terminal, and analyzing the access request to obtain a terminal port; and acquiring a container port corresponding to the terminal port and returning to the second terminal. The method and the device for controlling the access of the service object in the container set avoid the problem that the second terminal cannot normally access the service object due to the fact that the container set enters a waiting state which cannot be dispatched to the first terminal available for the specific port because other resources which can guarantee the normal operation of the container set are not available on the first terminal available for the terminal port. The terminal ports corresponding to the container ports occupy the port resources of the first terminal, but do not occupy the port resources of the cluster, so that the occupation amount of the port resources of the cluster is reduced.

Description

Object access method, device, electronic equipment, storage medium and program product
Technical Field
The present disclosure relates to the field of computer technologies, and in particular, to a method and an apparatus for accessing a service object, an electronic device, a computer-readable storage medium, and a computer program product.
Background
Currently, cloud platform construction is mainly divided into two main technical routes, namely a container technology based on a Docker (an open source application container engine) and a virtualization technology based on a virtual machine. Most of container cloud platforms built based on the container technology of Docker are deployed in the form of a Kubernetes (K8 s for short, an open-source container orchestration engine) cluster.
Pod is the smallest/simplest basic unit of kubernets cluster creation or deployment, with one Pod representing one process running on a kubernets cluster. Generally, the network environment where the Pod within the kubernets cluster is located is not the same network environment where the terminal outside the kubernets cluster is located, and therefore, how to access the service object on the Pod within the kubernets cluster from the terminal outside the kubernets cluster at high speed with low delay becomes a problem to be considered.
In the related art, it is necessary to specify that a specific port within a kubernets cluster corresponds to a container port of a service object. Terminals outside the Kubernetes cluster can access the service object through the terminal where the Pod is located and a specific port.
However, the specific port occupies port resources in the Kubernetes cluster, and the port resources in the Kubernetes cluster are reduced as the number of terminals and the number of service objects in the Kubernetes cluster increase, so that all available ports in the Kubernetes cluster need to be recorded, and the specific port is specified from the available ports. When port resources within a kubernets cluster are scarce, it may not be possible to specify a specific port for a service object, resulting in a problem that a terminal outside the kubernets cluster cannot access the service object within the kubernets cluster.
Disclosure of Invention
The present disclosure provides a method and an apparatus for accessing a service object, and an electronic device, a computer-readable storage medium, and a computer program product, to at least solve a problem that a terminal outside a kubernets cluster cannot access a service object inside the kubernets cluster due to a failure to specify a specific port easily due to insufficient port resources inside the kubernets cluster in the related art. The technical scheme of the disclosure is as follows:
according to a first aspect of the embodiments of the present disclosure, there is provided a method for accessing a service object, which is applied to a first terminal in a cluster, the method including: detecting an event that a container set is scheduled on the first terminal, wherein the container set encapsulates a service object and is configured with a container port corresponding to the service object; locally setting a terminal port corresponding to the container port at the first terminal, and generating a corresponding relation between the container port and the terminal port; receiving an access request sent by a second terminal outside the cluster, and analyzing the access request to obtain the terminal port; and acquiring the container port corresponding to the terminal port according to the corresponding relation, and returning the container port to the second terminal.
Optionally, before the first terminal locally sets a terminal port corresponding to the container port, the method includes: judging whether a configuration file of the service object exists on the container set; and when the configuration file exists in the container set, executing the operation of locally setting a terminal port corresponding to the container port at the first terminal.
Optionally, the configuration file includes a terminal port creation identifier; before the first terminal locally sets a terminal port corresponding to the container port, the method further includes: when the configuration file exists in the container set, judging whether the terminal port creating identification is in an effective state; and when the terminal port creation identifier is in an effective state, executing the operation of locally setting the terminal port corresponding to the container port at the first terminal.
Optionally, after the first terminal locally sets a terminal port corresponding to the container port, the method further includes: and storing the terminal port, the container port and the terminal identifier of the first terminal in the configuration file.
Optionally, before the detecting an event that the set of containers is scheduled on the first terminal, the method comprises: detecting an event that the set of containers is destroyed from the first terminal; before the first terminal locally sets a terminal port corresponding to the container port, the method further includes: judging whether the terminal port creation identification is in an effective state or not, and judging whether a terminal port, a container port and a terminal identification are stored in the configuration file or not; and when the terminal port creation identifier is in an effective state and the terminal port, the container port and the terminal identifier are not stored in the configuration file, executing the operation of locally setting the terminal port corresponding to the container port at the first terminal.
Optionally, the method further comprises: when the terminal port creation identifier is in an effective state and the configuration file stores a terminal port, a container port and a terminal identifier, judging whether the terminal identifier stored in the configuration file is the same as the terminal identifier of the first terminal or not; when the terminal identification stored in the configuration file is the same as the terminal identification of the first terminal, taking the terminal port stored in the configuration file as the terminal port corresponding to the container port; and when the terminal identifier stored in the configuration file is different from the terminal identifier of the first terminal, deleting the terminal port, the container port and the terminal identifier stored in the configuration file.
Optionally, after the analyzing the access request to obtain the terminal port, the method further includes: judging whether the terminal port obtained by analysis is the same as the set terminal port; and when the analyzed terminal port is the same as the set terminal port, executing the operation of obtaining the container port corresponding to the terminal port according to the corresponding relation and returning the container port to the second terminal.
According to a second aspect of the embodiments of the present disclosure, there is provided an apparatus for accessing a service object, which is applied to a first terminal in a cluster, the apparatus including: a detecting unit configured to perform detecting an event that a container set is scheduled on the first terminal, the container set encapsulating a service object and the container set being configured with a container port corresponding to the service object; a setting unit configured to perform setting of a terminal port corresponding to the container port locally at the first terminal, and generate a correspondence between the container port and the terminal port; the analysis unit is configured to execute receiving of an access request sent by a second terminal outside the cluster, and analyze the access request to obtain the terminal port; and the return unit is configured to execute the acquisition of the container port corresponding to the terminal port according to the corresponding relation and return the container port to the second terminal.
Optionally, the apparatus further comprises: a judging unit configured to execute judging whether a configuration file of the service object exists on the container set before the setting unit sets the terminal port corresponding to the container port locally on the first terminal; the setting unit is configured to perform local setting of a terminal port corresponding to the container port at the first terminal when the configuration file exists in the container set.
Optionally, the configuration file includes a terminal port creation identifier; the determining unit is further configured to determine whether the terminal port creation identifier is in a valid state when the configuration file exists in the container set before the setting unit sets the terminal port corresponding to the container port locally at the first terminal; the setting unit is configured to perform local setting of a terminal port corresponding to the container port at the first terminal when the terminal port creation flag is in a valid state.
Optionally, the apparatus further comprises: a storage unit configured to perform, after the setting unit sets the terminal port corresponding to the container port locally at the first terminal, storing the terminal port, the container port, and the terminal identifier of the first terminal in the configuration file.
Optionally, the detecting unit is further configured to perform detecting an event that the set of containers is destroyed from the first terminal before detecting an event that the set of containers is scheduled onto the first terminal; the judging unit is further configured to judge whether the terminal port creation identifier is in a valid state before the setting unit sets the terminal port corresponding to the container port locally at the first terminal, and judge whether the configuration file stores the terminal port, the container port and the terminal identifier; the setting unit is configured to perform local setting of a terminal port corresponding to the container port at the first terminal when the terminal port creation identifier is in an active state and no terminal port, container port and terminal identifier are stored in the configuration file.
Optionally, the determining unit is further configured to determine whether the terminal identifier stored in the configuration file is the same as the terminal identifier of the first terminal when the terminal port creation identifier is in an active state and the configuration file stores the terminal port, the container port, and the terminal identifier; the setting unit is further configured to execute, when the terminal identifier stored in the configuration file is the same as the terminal identifier of the first terminal, taking the terminal port stored in the configuration file as the terminal port corresponding to the container port; the device further comprises: and the deleting unit is configured to delete the terminal port, the container port and the terminal identifier stored in the configuration file when the terminal identifier stored in the configuration file is different from the terminal identifier of the first terminal.
Optionally, the determining unit is further configured to determine whether the analyzed terminal port is the same as the set terminal port after the analyzing unit analyzes the access request to obtain the terminal port; and the returning unit is configured to execute, when the analyzed terminal port is the same as the set terminal port, acquiring the container port corresponding to the terminal port according to the corresponding relationship, and returning the container port to the second terminal.
According to a third aspect of the embodiments of the present disclosure, there is provided an electronic apparatus including: a processor; a memory for storing the processor-executable instructions; wherein the processor is configured to execute the instructions to implement the method of accessing a service object as described in the first aspect.
According to a fourth aspect of embodiments of the present disclosure, there is provided a computer-readable storage medium, wherein instructions, when executed by a processor of an electronic device, enable the electronic device to perform the method for accessing a service object according to the first aspect.
According to a fifth aspect of embodiments of the present disclosure, there is provided a computer program product comprising a computer program which, when executed by a processor, implements the method of accessing a service object as described in the first aspect above.
The technical scheme provided by the embodiment of the disclosure at least brings the following beneficial effects:
in the access scheme of the service object provided by the embodiment of the disclosure, on a first terminal in a cluster, if an event that a container set is scheduled to the first terminal is detected, a terminal port corresponding to a container port of the service object is locally set at the first terminal, and a corresponding relationship between the container port and the terminal port is generated, wherein the container set encapsulates the service object, and the container set is configured with the container port corresponding to the service object. And then, receiving an access request sent by a second terminal outside the cluster, analyzing the access request to obtain a terminal port, acquiring a container port corresponding to the terminal port according to the corresponding relation, and returning the container port corresponding to the terminal port to the second terminal so that the second terminal can access the service object. The embodiment of the disclosure sets the operation of setting the corresponding terminal port for the container port, and places the operation after the container set is scheduled to the first terminal, so that compared with the case where the corresponding terminal port is set for the container port first and then the container set is scheduled to the first terminal, the problem that the second terminal cannot normally access the service object due to the fact that the container set enters the waiting state of the first terminal which cannot be scheduled to the specific port due to the fact that no other resource which can ensure the normal operation of the container set exists on the first terminal which is available to the terminal port (i.e. the specific port) is avoided. In addition, the terminal port corresponding to the container port occupies the port resource of the first terminal, but does not occupy the port resource of the cluster, so that the occupied amount of the port resource of the cluster is reduced.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the disclosure.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the present disclosure and, together with the description, serve to explain the principles of the disclosure and are not to be construed as limiting the disclosure.
FIG. 1 is a flow chart illustrating a method of accessing a service object in accordance with an exemplary embodiment.
Fig. 2 is a schematic diagram illustrating a scenario in which a second terminal outside the kubernets cluster accesses a service object within the kubernets cluster according to an example embodiment.
FIG. 3 is a block diagram illustrating an access device for a service object in accordance with an exemplary embodiment.
FIG. 4 is a block diagram illustrating a service object accessing electronic device, according to an example embodiment.
FIG. 5 is a block diagram illustrating an electronic device for accessing a service object in accordance with an exemplary embodiment.
Detailed Description
In order to make the technical solutions of the present disclosure better understood by those of ordinary skill in the art, the technical solutions in the embodiments of the present disclosure will be clearly and completely described below with reference to the accompanying drawings.
It should be noted that the terms "first," "second," and the like in the description and claims of the present disclosure and in the above-described drawings are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used is interchangeable under appropriate circumstances such that the embodiments of the disclosure described herein are capable of operation in sequences other than those illustrated or otherwise described herein. The implementations described in the exemplary embodiments below are not intended to represent all implementations consistent with the present disclosure. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the present disclosure, as detailed in the appended claims.
Fig. 1 is a flowchart illustrating an access method for a service object according to an exemplary embodiment, where as shown in fig. 1, the access method for the service object may be applied to a first terminal in a cluster, and the cluster may be a container cloud cluster. The access method of the service object may include the following steps.
In step S11, an event is detected in which the set of containers is scheduled on the first terminal.
In an embodiment of the present disclosure, the first terminal may be any terminal within the cluster, and the set of containers may represent Pod in the kubernets cluster. The container set may be packaged with a service object, and the container set may further be configured with a container port corresponding to the service object, where the container port may be understood as a port resource occupied by the service object in the container set, that is, the container port occupies the port resource of the container set. Typically, the container port occupied by a service object in a container set is also unique. The service objects may be set by the user according to the actual situation, and each type of service object may have its own characteristics. On each first terminal within the cluster, it may be detected whether there is a set of containers scheduled on the current first terminal. When an event that the container set is scheduled to the current first terminal is detected, performing step S12; when an event that the set of containers is scheduled on the current first terminal is not detected, no additional action may be taken.
In step S12, a terminal port corresponding to the container port is set locally at the first terminal, and a correspondence relationship between the container port and the terminal port is generated.
In the embodiment of the present disclosure, a corresponding terminal port is set for a container port of a service object, where the terminal port may represent a local port of a first terminal, and occupies a port resource of the first terminal, but does not occupy a port resource of a Kubernetes cluster. Further, it is also possible to generate a correspondence between container ports and terminal ports, for example, a correspondence between container port r01 and terminal port z01 is generated by providing container port r01 with corresponding terminal port z 01.
In step S13, an access request sent by a second terminal outside the cluster is received, and the access request is analyzed to obtain a terminal port.
In the embodiment of the present disclosure, the second terminal outside the cluster may send an access request to the first terminal according to the network address of the first terminal, and the access request may carry the terminal access port. After the first terminal obtains the terminal access port from the access request by parsing, determining whether the terminal access port is the same as the terminal port set for the container port, and if the terminal access port is the same as the terminal port, performing step S14; and if the terminal access port is different from the terminal port, no additional operation is performed, or prompt information of terminal access port error is returned to the second terminal.
In step S14, the container port corresponding to the terminal port is obtained according to the correspondence relationship, and the container port is returned to the second terminal.
In the embodiment of the present disclosure, the container port corresponding to the terminal port may be searched according to the correspondence between the container port and the terminal port, and the searched container port is returned to the second terminal. After the container port is returned to the second terminal, the second terminal can access the corresponding service object through the container port of the container set, so that the function that the second terminal outside the cluster accesses the service object in the cluster is realized.
In the access scheme of the service object provided by the embodiment of the disclosure, on a first terminal in a cluster, if an event that a container set is scheduled to the first terminal is detected, a terminal port corresponding to a container port of the service object is locally set at the first terminal, and a corresponding relationship between the container port and the terminal port is generated, wherein the container set encapsulates the service object, and the container set is configured with the container port corresponding to the service object. And then, receiving an access request sent by a second terminal outside the cluster, analyzing the access request to obtain a terminal port, acquiring a container port corresponding to the terminal port according to the corresponding relation, and returning the container port corresponding to the terminal port to the second terminal so that the second terminal can access the service object. The embodiment of the disclosure sets the operation of setting the corresponding terminal port for the container port, and places the operation after the container set is scheduled to the first terminal, so that compared with the case where the corresponding terminal port is set for the container port first and then the container set is scheduled to the first terminal, the problem that the second terminal cannot normally access the service object due to the fact that the container set enters the waiting state of the first terminal which cannot be scheduled to the specific port due to the fact that no other resource which can ensure the normal operation of the container set exists on the first terminal which is available to the terminal port (i.e. the specific port) is avoided. In addition, the terminal port corresponding to the container port occupies the port resource of the first terminal, but does not occupy the port resource of the cluster, so that the occupied amount of the port resource of the cluster is reduced.
In an exemplary embodiment of the present disclosure, before a terminal port corresponding to a container port is set locally by a first terminal, it is determined whether a configuration file of a service object exists on a container set, and when the configuration file exists in the container set, an operation of setting the terminal port corresponding to the container port locally at the first terminal is performed; when the configuration file does not exist in the container set, an operation of locally setting a terminal port corresponding to the container port at the first terminal may not be performed. The configuration file can be written by a user according to configuration file templates corresponding to different service objects. The configuration file may contain a plurality of fields or identifiers, each field or identifier having a respective role in the configuration file, for example, a terminal port creation identifier, a write-back comment field, and the like, where the state of the terminal port creation identifier may indicate whether a corresponding terminal port is set for the container port, and the content of the field in the write-back comment field may be used to store the set terminal port, and the like. The embodiment of the disclosure can write a corresponding configuration file for the service object, on one hand, the configuration file can be used for indicating whether a corresponding terminal port is set for a container port of the service object, and on the other hand, the configuration file can be used for storing the set terminal port. After the container set is dispatched to the first terminal and before the corresponding terminal port is set for the container port of the service object, whether the container set has the service object configuration file or not can be judged, further judgment operation is added for setting the terminal port, the safety of the operation for setting the terminal port is further improved, the corresponding terminal port is prevented from being set for the container port of any service object, and the port resource of the first terminal is saved.
In an exemplary embodiment of the present disclosure, before a terminal port corresponding to a container port is set locally by a first terminal, it is determined whether a configuration file of a service object exists on a container set, when the configuration file exists in the container set, it may be further determined whether a terminal port creation flag is in an active state, and when the terminal port creation flag is in the active state, an operation of setting the terminal port corresponding to the container port locally at the first terminal is performed; when the terminal port creation flag is in an invalid state, an operation of locally setting a terminal port corresponding to the container port at the first terminal may not be performed. In practical applications, the valid state may be represented by "true" and the invalid state may be represented by "false". The embodiment of the disclosure can determine whether to set a corresponding terminal port for the container port according to the states (including an effective state and an invalid state) of the terminal port creation identifier in the configuration file, that is, it is necessary to determine whether the configuration file exists in the container set, and also determine whether the terminal port creation identifier in the configuration file is in an effective state, two steps of determination operations are added for setting the terminal port, so that the security of the operation of setting the terminal port is further improved, the setting of the corresponding terminal port for the container port of any service object is avoided, and the port resource of the first terminal is saved.
In an exemplary embodiment of the present disclosure, after the first terminal locally sets the terminal port corresponding to the container port, the terminal port, the container port, and the terminal identifier of the first terminal may be stored to the configuration file. In practical application, the terminal port, the container port and the terminal identifier may be stored in a write-back comment field of the configuration file, and there is a correspondence relationship among the terminal port, the container port and the terminal identifier. The embodiment of the disclosure writes the terminal port, the container port, and the terminal identifier back to the configuration file of the container set after setting the corresponding terminal port for the container port, and aims to directly use the terminal port corresponding to the container port of the service object in the container set, which is stored in the configuration file, as the terminal port corresponding to the container port of the service object in the container set when the container set is rescheduled to the same first terminal, thereby avoiding the repeated operation of setting the corresponding terminal port for the container port of the service object in the container set when the container set is rescheduled to the same first terminal, and improving the efficiency of setting the corresponding terminal port for the container port.
In an exemplary embodiment of the present disclosure, before detecting an event that a container set is scheduled on a first terminal, if detecting an event that the container set is destroyed from the first terminal, before a terminal port corresponding to a container port is locally set by the first terminal, it may be determined whether a terminal port creation identifier in a configuration file is in a valid state, and it may be determined whether the terminal port, the container port, and a terminal identifier are stored in the configuration file. When the terminal port creation identifier is in an effective state and the terminal port, the container port and the terminal identifier are not stored in the configuration file, executing the operation of locally setting the terminal port corresponding to the container port at the first terminal; when the terminal port creation flag is in an invalid state, or the terminal port, the container port, and the terminal flag are already stored in the configuration file, the operation of locally setting the terminal port corresponding to the container port in the first terminal may not be performed.
And if the terminal port creation identifier is in an effective state and the terminal port, the container port and the terminal identifier are stored in the configuration file, judging whether the terminal identifier stored in the configuration file is the same as the terminal identifier of the first terminal. When the terminal identification stored in the configuration file is the same as the terminal identification of the first terminal, taking the terminal port stored in the configuration file as the terminal port corresponding to the container port; and when the terminal identifier stored in the configuration file is different from the terminal identifier of the first terminal, deleting the terminal port, the container port and the terminal identifier stored in the configuration file.
It should be noted that the container set destroyed from the first terminal and the container set scheduled to the first terminal may be the same container set. Due to the influence of resource limitation, scheduling policy, first terminal offline or application upgrade, the kubernets cluster may reschedule the container set that has been deployed on the first terminal after it is destroyed. The rescheduled set of containers may be scheduled to the original first terminal or may be scheduled to a different first terminal. Thus, the write-back annotation fields that have been added to the container set are not immediately deleted upon detection of the event that the container set is destroyed.
In practical application, when determining whether the configuration file stores the terminal port, the container port, and the terminal identifier, it may be determined whether the write-back comment field of the configuration file stores the terminal port, the container port, and the terminal identifier. For example, an event is detected in which container set pod01 is destroyed on first terminal A, after which an event is detected in which container set pod01 is scheduled on first terminal A. Before setting a corresponding terminal port for the container port r01 of the service object f01 in the container set pod01, determining whether the terminal port creation identifier in the configuration file c01 of the container set pod01 is in a valid state, and determining whether the terminal port, the container port and the terminal identifier are stored in the configuration file c 01. When the terminal port creation flag in the configuration file c01 is in a valid state and no terminal port, container port and terminal flag are stored in the configuration file c01, the corresponding terminal port is set for the container port r 01. When the terminal port creation identifier in the configuration file c01 is in a valid state and the terminal port, the container port and the terminal identifier are stored in the configuration file c01, it is determined whether the terminal identifier stored in the configuration file c01 is the terminal identifier of the first terminal a, and if the terminal identifier stored in the configuration file c01 is the terminal identifier of the first terminal a, the terminal port stored in the configuration file c01 is taken as the terminal port of the container port r 01. It is emphasized that the terminal port, container port and terminal identification stored in the configuration file c01 have a correspondence. Furthermore, the container port stored in the configuration file c01 also needs to be the same as the container port r01 in order to be able to use the terminal port stored in the configuration file c01 as the terminal port of the container port r 01.
The embodiment of the disclosure describes that after a certain container set is destroyed on a first terminal, and the container set is dispatched to the first terminal, whether a terminal port creation identifier in a configuration file is in an effective state or not can be judged, whether a terminal port, a container port and a terminal identifier are stored in the configuration file or not can be judged, when the terminal port creation identifier is in the effective state and the terminal port, the container port and the terminal identifier are not stored in the configuration file, a corresponding terminal port is set for the container port, judgment operation is added for setting the terminal port, and the safety of operation for setting the terminal port is further improved. When the terminal port creation identifier is in an effective state and the terminal port, the container port and the terminal identifier are stored in the configuration file, whether the terminal port, the container port and the terminal identifier stored in the configuration file are the terminal ports set for the container port of the service object after being scheduled on the first terminal before the container set is judged, if the terminal port stored in the configuration file is the terminal port set for the container port of the service object after being scheduled on the first terminal before the container set, the stored terminal port is directly utilized without setting the corresponding terminal port for the container port again, so that the operation steps of setting the corresponding terminal port for the container port are reduced, and the efficiency of setting the corresponding terminal port for the container port is improved.
In an exemplary embodiment of the present disclosure, after the access request is analyzed to obtain the terminal port, it may be determined whether the terminal port obtained through the analysis, that is, the terminal port carried in the access request is the same as the terminal port set for the container port, and if the terminal port obtained through the analysis is the same as the terminal port set for the container port, it indicates that the second terminal outside the cluster determines the terminal port of the service object to be accessed on the first terminal, and then the container port is returned to the second terminal. The second terminal may access the service object from the container set according to the container port. In the embodiment of the present disclosure, after receiving an access request sent by a second terminal outside a cluster, a first terminal needs to analyze the access request, so as to obtain a terminal port carried in the access request through analysis, and further, determine whether a port identical to the terminal port carried in the access request is set for a container port of a service object, and if the port identical to the terminal port carried in the access request is set, return the container port corresponding to the set terminal port to the second terminal, so that the second terminal can access the service object from a container set scheduled to the first terminal through the container port. The first terminal in the embodiment of the present disclosure analyzes and judges the access request sent by the second terminal, so as to determine whether the second terminal can access the service object. According to the embodiment of the disclosure, the first terminal determines whether the second terminal can access the service object, but not the cluster determines whether the second terminal can access the service object, so that the data processing amount and the operation pressure of the cluster are reduced.
In an exemplary embodiment of the present disclosure, the access method of the service object may be applied to a first terminal in a cluster, and specifically may be applied to a Container Network Interface (CNI) plug-in of the first terminal in the cluster. The CNI plug-in is a form of interface supported by the kubernets cluster for formulating the cluster network. It is understood that the executing body of the access method of the service object, that is, the first terminal in the cluster, may execute the above steps according to the CNI plug-in.
Based on the above-mentioned related description about the service object access method embodiment, a scheme for accessing a service object within a kubernets cluster from a second terminal outside the kubernets cluster is described below. As shown in fig. 2, the scheme for accessing a service object within a kubernets cluster from a second terminal outside the kubernets cluster may include a kubernets system, a plurality of first terminals (e.g., VM1, VM2, and VM3), and a second terminal outside the kubernets cluster. Wherein, each first terminal may contain a CNI plug-in. In this scenario of accessing a service object within a kubernets cluster from a second terminal outside the kubernets cluster, a user may first write a configuration file for the service object, for example:
Figure BDA0002922448010000101
wherein, the "enable-new-service" represents the Creation-indication (Creation-indication) of the terminal port, and the "true" represents the valid state of the Creation-indication of the terminal port.
After the user has written the configuration file, the scheduler of the kubernet system will create a service object and encapsulate the service object in pod1, scheduling pod1 onto the first available terminal (e.g., VM 1). When the CNI plug-in on the first end VM1 detects that a new pod1 was successfully dispatched to the first end VM1, the CNI plug-in will check whether the Creation-notification in the configuration file is in a valid state. If Creation-indication is in the invalid state, no additional operations are performed. If Creation-indication is in valid state, the CNI plug-in creates a corresponding terminal port (host-port:30001) for the container port (container port:443) carried in the configuration file. The CNI plug-in then writes the end port, container port, and host name of first end VM1 into the write-back comment field (WriteBack-Annotation) of the configuration file, e.g., "new-service- { { hostname } } { { container-port:443, host-port:30001} … }".
To this end, the second terminal may generate an access request according to the IP of the first terminal VM1 or the host name and the terminal port, send the access request to the first terminal VM1, the first terminal VM1 parses the access request, and determines whether the terminal port in the access request is host-port:30001, if the terminal port in the access request is host-port:30001, the first terminal VM1 returns a container port (container port:443) to the second terminal, and the second terminal may access the service object from the pod1 according to the container port (container port:443), thereby implementing access to the service object in the kubernets cluster from the second terminal outside the kubernets cluster.
The embodiment of the disclosure not only places the operation of setting the corresponding terminal port for the container port in the container set after the container set is scheduled to the first terminal, but also completes the operation of setting the corresponding terminal port for the container port by the first terminal. Because the terminal port only occupies the port resource of the first terminal where the container set is located, the waste of the port resource in the whole cluster range is avoided, the utilization rate of the port resource in the Kubernets cluster range is improved, and the port resource is no longer a bottleneck point for limiting the increase of the Kubernets cluster scale.
In addition, the terminal port only corresponds to the container port of the container set of the current first terminal, and in the embodiment of the disclosure, the second terminal outside the Kubernetes cluster directly accesses the first terminal IP and the terminal port where the container set is located, that is, the service object in the container set can be accessed, and no intermediate layer retransmits the request traffic, thereby greatly reducing the access delay.
FIG. 3 is a block diagram illustrating an access device for a service object in accordance with an exemplary embodiment. The access means of the service object may be applied to the first terminal of the cluster, and may specifically include the following units.
A detecting unit 31 configured to perform detecting an event that a container set is scheduled on the first terminal, the container set encapsulating a service object and the container set being configured with a container port corresponding to the service object;
a setting unit 32 configured to perform setting of a terminal port corresponding to the container port locally at the first terminal, and generate a correspondence between the container port and the terminal port;
the analyzing unit 33 is configured to execute receiving an access request sent by a second terminal outside the cluster, and analyze the access request to obtain the terminal port;
a returning unit 34 configured to execute acquiring the container port corresponding to the terminal port according to the correspondence relationship, and return the container port to the second terminal.
In an exemplary embodiment of the present disclosure, the apparatus further includes:
a determining unit configured to perform determining whether a configuration file of the service object exists on the container set before the setting unit 32 sets a terminal port corresponding to the container port locally on the first terminal;
the setting unit 32 is configured to perform, when the configuration file exists in the container set, setting a terminal port corresponding to the container port locally at the first terminal.
In an exemplary embodiment of the present disclosure, the configuration file contains a terminal port creation identifier;
the determining unit is further configured to determine whether the terminal port creation identifier is in a valid state when the configuration file exists in the container set before the setting unit 32 sets the terminal port corresponding to the container port locally in the first terminal;
the setting unit 32 is configured to perform local setting of a terminal port corresponding to the container port at the first terminal when the terminal port creation flag is in a valid state.
In an exemplary embodiment of the present disclosure, the apparatus further includes: a storage unit configured to perform, after the setting unit 32 sets the terminal port corresponding to the container port locally at the first terminal, storing the terminal port, the container port, and the terminal identifier of the first terminal in the configuration file.
In an exemplary embodiment of the present disclosure, the detecting unit 31 is further configured to perform detecting an event that the set of containers is destroyed from the first terminal before detecting an event that the set of containers is scheduled onto the first terminal;
the determining unit is further configured to determine whether the terminal port creation identifier is in a valid state before the setting unit 32 sets the terminal port corresponding to the container port locally in the first terminal, and determine whether the terminal port, the container port, and the terminal identifier are stored in the configuration file;
the setting unit 32 is configured to perform, when the terminal port creation identifier is in a valid state and no terminal port, container port, and terminal identifier are stored in the configuration file, locally setting a terminal port corresponding to the container port at the first terminal.
In an exemplary embodiment of the disclosure, the determining unit is further configured to perform, when the terminal port creation identifier is in a valid state and a terminal port, a container port, and a terminal identifier are stored in the configuration file, determining whether the terminal identifier stored in the configuration file is the same as the terminal identifier of the first terminal;
the setting unit 32 is further configured to perform, when the terminal identifier stored in the configuration file is the same as the terminal identifier of the first terminal, taking the terminal port stored in the configuration file as the terminal port corresponding to the container port;
the device further comprises: and the deleting unit is configured to delete the terminal port, the container port and the terminal identifier stored in the configuration file when the terminal identifier stored in the configuration file is different from the terminal identifier of the first terminal.
In an exemplary embodiment of the disclosure, the determining unit is further configured to perform, after the parsing unit 33 parses the access request to obtain the terminal port, determining whether the parsed terminal port is the same as the set terminal port;
the returning unit 34 is configured to execute, when the analyzed terminal port is the same as the set terminal port, acquiring the container port corresponding to the terminal port according to the correspondence, and returning the container port to the second terminal.
With regard to the apparatus in the above-described embodiment, the specific manner in which each unit performs the operation has been described in detail in the embodiment related to the method, and will not be described in detail here.
FIG. 4 is a block diagram illustrating a service object accessing electronic device, according to an example embodiment. For example, the electronic device 400 may be a mobile phone, a computer, a digital broadcast terminal, a messaging device, a game console, a tablet device, a medical device, an exercise device, a personal digital assistant, and the like.
Referring to fig. 4, electronic device 400 may include one or more of the following components: a processing component 402, a memory 404, a power component 406, a multimedia component 408, an audio component 410, an interface for input/output (I/O) 412, a sensor component 414, and a communication component 416.
The processing component 402 generally controls overall operation of the electronic device 400, such as operations associated with display, telephone calls, data communications, camera operations, and recording operations. The processing component 402 may include one or more processors 420 to execute instructions to perform all or a portion of the steps of the service object access method described above. Further, the processing component 402 can include one or more modules that facilitate interaction between the processing component 402 and other components. For example, the processing component 402 can include a multimedia module to facilitate interaction between the multimedia component 408 and the processing component 402.
The memory 404 is configured to store various types of data to support operations at the electronic device 400. Examples of such data include instructions for any application or method operating on the electronic device 400, contact data, phonebook data, messages, images, videos, and so forth. The memory 404 may be implemented by any type or combination of volatile or non-volatile memory devices such as Static Random Access Memory (SRAM), electrically erasable programmable read-only memory (EEPROM), erasable programmable read-only memory (EPROM), programmable read-only memory (PROM), read-only memory (ROM), magnetic memory, flash memory, magnetic or optical disks.
The power supply component 406 provides power to the various components of the electronic device 400. Power components 406 may include a power management system, one or more power supplies, and other components associated with generating, managing, and distributing power for electronic device 400.
The multimedia component 408 comprises a screen providing an output interface between the electronic device 400 and a user. In some embodiments, the screen may include a Liquid Crystal Display (LCD) and a Touch Panel (TP). If the screen includes a touch panel, the screen may be implemented as a touch screen to receive an input signal from a user. The touch panel includes one or more touch sensors to sense touch, slide, and gestures on the touch panel. The touch sensor may not only sense the boundary of a touch or slide action, but also detect the duration and pressure associated with the touch or slide operation. In some embodiments, the multimedia component 408 includes a front facing camera and/or a rear facing camera. The front camera and/or the rear camera may receive external multimedia data when the electronic device 400 is in an operating mode, such as a shooting mode or a video mode. Each front camera and rear camera may be a fixed optical lens system or have a focal length and optical zoom capability.
The audio component 410 is configured to output and/or input audio signals. For example, the audio component 410 includes a Microphone (MIC) configured to receive external audio signals when the electronic device 400 is in an operational mode, such as a call mode, a recording mode, and a voice recognition mode. The received audio signals may further be stored in the memory 404 or transmitted via the communication component 416. In some embodiments, audio component 410 also includes a speaker for outputting audio signals.
The I/O interface 412 provides an interface between the processing component 402 and peripheral interface modules, which may be keyboards, click wheels, buttons, etc. These buttons may include, but are not limited to: a home button, a volume button, a start button, and a lock button.
The sensor component 414 includes one or more sensors for providing various aspects of status assessment for the electronic device 400. For example, the sensor assembly 414 may detect an open/closed state of the electronic device 400, the relative positioning of components, such as a display and keypad of the electronic device 400, the sensor assembly 414 may also detect a change in the position of the electronic device 400 or a component of the electronic device 400, the presence or absence of user contact with the electronic device 400, orientation or acceleration/deceleration of the electronic device 400, and a change in the temperature of the electronic device 400. The sensor assembly 414 may include a proximity sensor configured to detect the presence of a nearby object without any physical contact. The sensor assembly 414 may also include a light sensor, such as a CMOS or CCD image sensor, for use in imaging applications. In some embodiments, the sensor assembly 414 may also include an acceleration sensor, a gyroscope sensor, a magnetic sensor, a pressure sensor, or a temperature sensor.
The communication component 416 is configured to facilitate wired or wireless communication between the electronic device 400 and other devices. The electronic device 400 may access a wireless network based on a communication standard, such as WiFi, a carrier network (such as 2G, 3G, 4G, or 5G), or a combination thereof. In an exemplary embodiment, the communication component 416 receives broadcast signals or broadcast related information from an external broadcast management system via a broadcast channel. In an exemplary embodiment, the communication component 416 further includes a Near Field Communication (NFC) module to facilitate short-range communications. For example, the NFC module may be implemented based on Radio Frequency Identification (RFID) technology, infrared data association (IrDA) technology, Ultra Wideband (UWB) technology, Bluetooth (BT) technology, and other technologies.
In an exemplary embodiment, the electronic device 400 may be implemented by one or more Application Specific Integrated Circuits (ASICs), Digital Signal Processors (DSPs), Digital Signal Processing Devices (DSPDs), Programmable Logic Devices (PLDs), Field Programmable Gate Arrays (FPGAs), controllers, micro-controllers, microprocessors or other electronic components for performing the above-described access method of the service object.
In an exemplary embodiment, a computer-readable storage medium comprising instructions, such as the memory 404 comprising instructions, executable by the processor 420 of the electronic device 400 to perform the method of accessing a service object described above is also provided. Alternatively, the computer readable storage medium may be a ROM, a Random Access Memory (RAM), a CD-ROM, a magnetic tape, a floppy disk, an optical data storage device, and the like.
In an exemplary embodiment, a computer program product is also provided, which comprises a computer program executable by the processor 420 of the electronic device 400 to perform the above-mentioned method of accessing a service object. Alternatively, the computer program may be stored in a computer readable storage medium of the electronic device 400, which may be a non-transitory computer readable storage medium, for example, ROM, Random Access Memory (RAM), CD-ROM, magnetic tape, floppy disk, optical data storage device, and the like.
FIG. 5 is a block diagram illustrating an electronic device for accessing a service object in accordance with an exemplary embodiment. For example, the electronic device 500 may be provided as a server. Referring to fig. 5, electronic device 500 includes a processing component 522 that further includes one or more processors and memory resources, represented by memory 532, for storing instructions, such as applications, that are executable by processing component 522. The application programs stored in memory 532 may include one or more modules that each correspond to a set of instructions. Further, the processing component 522 is configured to execute instructions to perform the access method of the service object described above.
The electronic device 500 may also include a power component 526 configured to perform power management of the electronic device 500, a wired or wireless network interface 550 configured to connect the electronic device 500 to a network, and an input/output (I/O) interface 558. The electronic device 500 may operate based on an operating system stored in memory 532, such as Windows Server, Mac OS XTM, UnixTM, LinuxTM, FreeBSDTM, or the like.
Other embodiments of the disclosure will be apparent to those skilled in the art from consideration of the specification and practice of the disclosure disclosed herein. This application is intended to cover any variations, uses, or adaptations of the disclosure following, in general, the principles of the disclosure and including such departures from the present disclosure as come within known or customary practice within the art to which the disclosure pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the disclosure being indicated by the following claims.
It will be understood that the present disclosure is not limited to the precise arrangements described above and shown in the drawings and that various modifications and changes may be made without departing from the scope thereof. The scope of the present disclosure is limited only by the appended claims.

Claims (10)

1. A method for accessing a service object, the method being applied to a first terminal in a cluster, the method comprising:
detecting an event that a container set is scheduled on the first terminal, wherein the container set encapsulates a service object and is configured with a container port corresponding to the service object;
locally setting a terminal port corresponding to the container port at the first terminal, and generating a corresponding relation between the container port and the terminal port;
receiving an access request sent by a second terminal outside the cluster, and analyzing the access request to obtain the terminal port;
and acquiring the container port corresponding to the terminal port according to the corresponding relation, and returning the container port to the second terminal.
2. The method of claim 1, wherein prior to the first terminal locally setting a terminal port corresponding to the container port, the method comprises:
judging whether a configuration file of the service object exists on the container set;
and when the configuration file exists in the container set, executing the operation of locally setting a terminal port corresponding to the container port at the first terminal.
3. The method of claim 2, wherein the configuration file contains an end port creation identifier;
before the first terminal locally sets a terminal port corresponding to the container port, the method further includes:
when the configuration file exists in the container set, judging whether the terminal port creating identification is in an effective state;
and when the terminal port creation identifier is in an effective state, executing the operation of locally setting the terminal port corresponding to the container port at the first terminal.
4. The method of claim 3, wherein after the first terminal locally sets a terminal port corresponding to the container port, the method further comprises:
and storing the terminal port, the container port and the terminal identifier of the first terminal in the configuration file.
5. The method according to claim 4, wherein prior to detecting an event that the set of containers is scheduled onto the first terminal, the method comprises:
detecting an event that the set of containers is destroyed from the first terminal;
before the first terminal locally sets a terminal port corresponding to the container port, the method further includes:
judging whether the terminal port creation identification is in an effective state or not, and judging whether a terminal port, a container port and a terminal identification are stored in the configuration file or not;
and when the terminal port creation identifier is in an effective state and the terminal port, the container port and the terminal identifier are not stored in the configuration file, executing the operation of locally setting the terminal port corresponding to the container port at the first terminal.
6. The method of claim 5, further comprising:
when the terminal port creation identifier is in an effective state and the configuration file stores a terminal port, a container port and a terminal identifier, judging whether the terminal identifier stored in the configuration file is the same as the terminal identifier of the first terminal or not;
when the terminal identification stored in the configuration file is the same as the terminal identification of the first terminal, taking the terminal port stored in the configuration file as the terminal port corresponding to the container port;
and when the terminal identifier stored in the configuration file is different from the terminal identifier of the first terminal, deleting the terminal port, the container port and the terminal identifier stored in the configuration file.
7. An apparatus for accessing a service object, the apparatus being applied to a first terminal in a cluster, the apparatus comprising:
a detecting unit configured to perform detecting an event that a container set is scheduled on the first terminal, the container set encapsulating a service object and the container set being configured with a container port corresponding to the service object;
a setting unit configured to perform setting of a terminal port corresponding to the container port locally at the first terminal, and generate a correspondence between the container port and the terminal port;
the analysis unit is configured to execute receiving of an access request sent by a second terminal outside the cluster, and analyze the access request to obtain the terminal port;
and the return unit is configured to execute the acquisition of the container port corresponding to the terminal port according to the corresponding relation and return the container port to the second terminal.
8. An electronic device, comprising:
a processor;
a memory for storing the processor-executable instructions;
wherein the processor is configured to execute the instructions to implement the access method for the service object of any of claims 1 to 6.
9. A computer-readable storage medium, wherein instructions in the computer-readable storage medium, when executed by a processor of an electronic device, enable the electronic device to perform the method of accessing a service object of any of claims 1 to 6.
10. A computer program product comprising a computer program, characterized in that the computer program, when being executed by a processor, implements the method of access of a service object according to any of claims 1 to 6.
CN202110121905.4A 2021-01-28 2021-01-28 Object access method, device, electronic equipment, storage medium and program product Pending CN112764885A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110121905.4A CN112764885A (en) 2021-01-28 2021-01-28 Object access method, device, electronic equipment, storage medium and program product

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110121905.4A CN112764885A (en) 2021-01-28 2021-01-28 Object access method, device, electronic equipment, storage medium and program product

Publications (1)

Publication Number Publication Date
CN112764885A true CN112764885A (en) 2021-05-07

Family

ID=75706551

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110121905.4A Pending CN112764885A (en) 2021-01-28 2021-01-28 Object access method, device, electronic equipment, storage medium and program product

Country Status (1)

Country Link
CN (1) CN112764885A (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170142203A1 (en) * 2015-11-17 2017-05-18 Le Holdings (Beijing) Co., Ltd. Method for host scheduling for container deployment, electronic device and non-transitory computer-readable storage medium
CN107105061A (en) * 2017-05-31 2017-08-29 北京中电普华信息技术有限公司 A kind of service registry method and device
CN108737584A (en) * 2017-04-19 2018-11-02 中国移动通信集团山西有限公司 The access method of container service, the analytic method of network address, device and system
CN111726399A (en) * 2020-06-08 2020-09-29 中国工商银行股份有限公司 Docker container secure access method and device
CN111966442A (en) * 2019-05-20 2020-11-20 北京白山耘科技有限公司 Method, apparatus, medium, and device for container port management

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170142203A1 (en) * 2015-11-17 2017-05-18 Le Holdings (Beijing) Co., Ltd. Method for host scheduling for container deployment, electronic device and non-transitory computer-readable storage medium
CN108737584A (en) * 2017-04-19 2018-11-02 中国移动通信集团山西有限公司 The access method of container service, the analytic method of network address, device and system
CN107105061A (en) * 2017-05-31 2017-08-29 北京中电普华信息技术有限公司 A kind of service registry method and device
CN111966442A (en) * 2019-05-20 2020-11-20 北京白山耘科技有限公司 Method, apparatus, medium, and device for container port management
CN111726399A (en) * 2020-06-08 2020-09-29 中国工商银行股份有限公司 Docker container secure access method and device

Similar Documents

Publication Publication Date Title
CN107370772B (en) account login method and device and computer readable storage medium
US20150333971A1 (en) Method and device for managing processes of application program
CN107862514B (en) Bus card management method, device and system and storage medium
CN108600529B (en) Information interaction method and device and computer readable storage medium
CN110928543A (en) Page processing method and device and storage medium
EP4345669A1 (en) User privacy protection method and apparatus
CN112256563A (en) Android application stability testing method and device, electronic equipment and storage medium
CN112764885A (en) Object access method, device, electronic equipment, storage medium and program product
CN111274590B (en) Request processing method and device, electronic equipment and storage medium
CN114430410A (en) System access method, device and equipment based on virtual domain name
CN114428737A (en) Communication method, device, equipment and storage medium based on micro service system
CN112035246A (en) Method, device and system for acquiring virtual resources, electronic equipment and storage medium
CN113778687A (en) Memory allocation information processing method and device, electronic equipment and storage medium
CN107391128B (en) Method and device for monitoring virtual file object model vdom
CN112732734A (en) Information processing method and device
CN112631695A (en) Data verification method and device, electronic equipment and storage medium
CN113467854A (en) Application program starting method and device, electronic equipment and storage medium
CN112102009A (en) Advertisement display method, device, equipment and storage medium
CN112083981A (en) Method and device for creating page view component
CN110837817A (en) Target object identification method, device, equipment and storage medium
CN114531493B (en) Request processing method and device, electronic equipment and storage medium
CN112306566A (en) Data processing method and device
US9703662B2 (en) Method for controlling plug-in by a router and the router thereof
CN112506628B (en) Agent program management method, device, computer equipment and storage medium
CN112363917B (en) Application program debugging exception processing method and device, electronic equipment and medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination