CN113839832A - Time sequence database cluster network detection method, device, medium and electronic equipment - Google Patents

Time sequence database cluster network detection method, device, medium and electronic equipment Download PDF

Info

Publication number
CN113839832A
CN113839832A CN202111080862.6A CN202111080862A CN113839832A CN 113839832 A CN113839832 A CN 113839832A CN 202111080862 A CN202111080862 A CN 202111080862A CN 113839832 A CN113839832 A CN 113839832A
Authority
CN
China
Prior art keywords
node
connection request
identification information
white list
address
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111080862.6A
Other languages
Chinese (zh)
Inventor
杨冠飞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Kingsoft Cloud Network Technology Co Ltd
Original Assignee
Beijing Kingsoft Cloud Network Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Kingsoft Cloud Network Technology Co Ltd filed Critical Beijing Kingsoft Cloud Network Technology Co Ltd
Priority to CN202111080862.6A priority Critical patent/CN113839832A/en
Publication of CN113839832A publication Critical patent/CN113839832A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/08Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
    • H04L43/0805Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters by checking availability
    • H04L43/0817Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters by checking availability by checking functioning
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/50Testing arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/14Session management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/14Session management
    • H04L67/141Setup of application sessions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/14Session management
    • H04L67/146Markers for unambiguous identification of a particular session, e.g. session cookie or URL-encoding

Abstract

The disclosure relates to a method, a device, a storage medium and an electronic device for detecting a time sequence database cluster network, wherein the method comprises the following steps: acquiring a connection request, wherein the connection request carries identification information; judging whether the number of the currently established connections is greater than or equal to a preset threshold value; if the number of the currently established connections is larger than or equal to a preset threshold value, judging whether the identification information is in a preset white list or not, wherein the white list comprises the identification information of the detection node; and if the identification information is in a preset white list, responding to the connection request to establish connection. The method and the device can avoid potential system hidden dangers caused by network detection failure due to the fact that the target node is fully connected by other users and the detection node is not connected with the target node, thereby reducing cluster system hidden dangers and improving the reliability of the time sequence database cluster.

Description

Time sequence database cluster network detection method, device, medium and electronic equipment
Technical Field
The disclosed embodiments relate to the field of computer technologies, and in particular, to a timing database cluster network probing method, a timing database cluster network probing apparatus, and a computer-readable storage medium and an electronic device for implementing the timing database cluster network probing method.
Background
A Time Series Database (Time Series Database) is used to store a Series of data based on Time Series change, i.e., Time serialization, whereas a conventional Database is mostly used to store current values of data. At present, a time sequence database generally stores and manages data in a time sequence database cluster mode, for example, an infiluxdb cluster can be widely applied to the fields of the internet of things, the internet and the like, and real-time monitoring, real-time prediction and alarm of devices and business services of the internet of things are realized.
In order to improve the data reliability of a time sequence database cluster, an implementation scheme is proposed in the related art, in which a probe request is sent to a data node in the cluster by a probe node configured in the cluster, a response message returned by the data node in response to the probe request is received, the state of the data node is determined based on the response message, for example, if the data node is in a failure state, the data written into the cluster is cached first, and when the data node is recovered to be normal, the data is read from the cache and written into the data node.
However, currently, each data node is usually limited by the maximum connection number, and when the number of connections established by the data node reaches the maximum connection number, if the data node is to be detected by the detection node, the data node is occupied by normal user connections, and a response to a new connection request is rejected, so that the data node is not connected and the detection fails, which may bring certain system hidden troubles to the reliable and stable operation of a cluster system, and deteriorate the data reliability of a time-series database cluster.
Disclosure of Invention
In order to solve the technical problem or at least partially solve the technical problem, embodiments of the present disclosure provide a timing database cluster network probing method, a timing database cluster network probing apparatus, and a computer-readable storage medium and an electronic device implementing the timing database cluster network probing method.
In a first aspect, an embodiment of the present disclosure provides a method for detecting a time series database cluster network, where the method is applied to a target node in the cluster, and the method includes:
acquiring a connection request, wherein the connection request carries identification information;
judging whether the number of the currently established connections is greater than or equal to a preset threshold value;
if the number of the currently established connections is larger than or equal to a preset threshold value, judging whether the identification information is in a preset white list or not, wherein the white list comprises the identification information of the detection node;
and if the identification information is in a preset white list, responding to the connection request to establish connection.
Optionally, in some embodiments of the present disclosure, the identification information is an IP address of a node that sends the connection request, and the identification information of the probe node is an IP address of the probe node;
the judging whether the identification information is in a preset white list comprises the following steps:
judging whether the IP address of the node sending the connection request is the same as the IP address of the detection node;
if yes, the IP address of the node sending the connection request is in the white list;
if not, the IP address of the node sending the connection request is not in the white list.
Optionally, in some embodiments of the present disclosure, the method further includes:
and if the number of the currently established connections is less than a preset threshold value, directly responding to the connection request to establish the connections.
Optionally, in some embodiments of the present disclosure, after establishing a connection directly in response to the connection request, the method further includes:
judging whether the identification information is in the white list or not;
if so, keeping the number of the connections unchanged;
and if not, updating the number of the connections.
Optionally, in some embodiments of the present disclosure, the method further includes:
and if the identification information is not in a preset white list, rejecting the connection request.
Optionally, in some embodiments of the present disclosure, the target node mounts a cloud disk, and the method further includes:
copying the data in the target node to the cloud disk;
and when the target node fails, copying the data in the cloud disk to the new node after replacing the target node with the new node.
In a second aspect, an embodiment of the present disclosure provides a timing database cluster network probe apparatus, including:
the system comprises an acquisition module, a processing module and a processing module, wherein the acquisition module is used for acquiring a connection request, and the connection request carries identification information;
the first judgment module is used for judging whether the number of the currently established connections is greater than or equal to a preset threshold value;
a second judgment module, configured to judge whether the identification information is in a preset white list if the first judgment module determines that the number of currently established connections is greater than or equal to a preset threshold, where the white list includes identification information of a detection node;
and the connection establishing module is used for responding to the connection request to establish connection if the second judging module determines that the identification information is in a preset white list.
Optionally, in some embodiments of the present disclosure, the identification information is an IP address of a node that sends the connection request, and the identification information of the probe node is an IP address of the probe node. The second judgment module is specifically configured to: judging whether the IP address of the node sending the connection request is the same as the IP address of the detection node; if yes, the IP address of the node sending the connection request is in the white list; if not, the IP address of the node sending the connection request is not in the white list.
In a third aspect, the disclosed embodiments provide a computer-readable storage medium, on which a computer program is stored, where the computer program, when executed by a processor, implements the steps of the temporal database cluster network probing method according to any of the embodiments described above.
In a fourth aspect, an embodiment of the present disclosure provides an electronic device, including:
a processor; and
a memory for storing a computer program;
wherein the processor is configured to perform the steps of the sequential database cluster network probing method of any of the above embodiments via execution of the computer program.
Compared with the prior art, the technical scheme provided by the embodiment of the disclosure has the following advantages:
the method, the device, the medium and the electronic equipment for detecting the time sequence database cluster network provided by the embodiment of the disclosure acquire a connection request, wherein the connection request carries identification information; judging whether the number of the currently established connections is greater than or equal to a preset threshold value; if the number of the currently established connections is larger than or equal to a preset threshold value, judging whether the identification information is in a preset white list or not, wherein the white list comprises the identification information of the detection node; and if the identification information is in a preset white list, responding to the connection request to establish connection. In this way, according to the scheme of this embodiment, when the number of connections currently established by the target node exceeds the maximum connection limit number, if it is determined that the received connection request is from the probe node and not from other nodes, the connection between the probe node and the target node is still established in response to the connection request from the probe node, so that it is avoided that the target node is fully occupied by other user connections, which causes potential system hidden dangers caused by network probe failure due to the probe node not being connected to the target node, thereby reducing cluster system hidden dangers and improving data reliability of the time sequence database cluster.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the present disclosure and together with the description, serve to explain the principles of the disclosure.
In order to more clearly illustrate the embodiments or technical solutions in the prior art of the present disclosure, the drawings used in the description of the embodiments or prior art will be briefly described below, and it is obvious for those skilled in the art that other drawings can be obtained according to the drawings without inventive exercise.
FIG. 1 is a flow chart of a method for temporal database cluster network probing according to an embodiment of the present disclosure;
FIG. 2 is a flow chart of a method for network probing of a temporal database cluster according to another embodiment of the present disclosure;
FIG. 3 is a schematic diagram of a timing database cluster architecture in an example embodiment of the present disclosure;
FIG. 4 is a schematic diagram of a temporal database cluster network probing apparatus according to an embodiment of the disclosure;
fig. 5 is a schematic diagram of an electronic device implementing a method for network probing of a temporal database cluster according to an embodiment of the disclosure.
Detailed Description
In order that the above objects, features and advantages of the present disclosure may be more clearly understood, aspects of the present disclosure will be further described below. It should be noted that the embodiments and features of the embodiments of the present disclosure may be combined with each other without conflict.
In the following description, numerous specific details are set forth in order to provide a thorough understanding of the present disclosure, but the present disclosure may be practiced in other ways than those described herein; it is to be understood that the embodiments disclosed in the specification are only a few embodiments of the present disclosure, and not all embodiments.
It is to be understood that, hereinafter, "at least one" means one or more, "a plurality" means two or more. "and/or" is used to describe the association relationship of the associated objects, meaning that there may be three relationships, for example, "a and/or B" may mean: only A, only B and both A and B are present, wherein A and B may be singular or plural. The character "/" generally indicates that the former and latter associated objects are in an "or" relationship. "at least one of the following" or similar expressions refer to any combination of these items, including any combination of single item(s) or plural items. For example, at least one (one) of a, b, or c, may represent: a, b, c, "a and b", "a and c", "b and c", or "a and b and c", wherein a, b, c may be single or plural.
Fig. 1 is a flowchart of a method for detecting a network of a temporal database cluster, where the method for detecting a target node in the cluster may specifically include the following steps:
step S101: and acquiring a connection request, wherein the connection request carries identification information.
Illustratively, the target node may obtain the connection request received by itself. The target node may be a metadata node (meta-node) or a data node (data-node) in the time-series database cluster, which is not limited in this embodiment. There may be multiple target nodes in the cluster, for example, the cluster shown in fig. 3 includes a target node a, a target node B, and a target node C, which are all data nodes, for example, and this is only an example. Each target node may establish a connection with other target nodes for communication.
The identification information may be identification information of the data node or the probe node sending the connection request, and the identification information may include, but is not limited to, a unique ID, an IP address, and the like.
Specifically, for example, the number X of connections established by the target node a at the current time is determined in real time or at regular time, which indicates that there are X remaining nodes that establish connections with the target node a.
Step S102: and judging whether the number of the currently established connections is greater than or equal to a preset threshold value.
Illustratively, each target node has a maximum connection number limit, and therefore, a preset threshold value X can be set for the target nodemaxI.e. the maximum number of connections of the target node. The preset threshold value XmaxCan be set according to specific needs, and is not limited in this regard.
When receiving the connection request, the target node may trigger to determine whether the number X of its currently established connections is greater than or equal to a preset threshold Xmax
Step S103: and if the number of the currently established connections is larger than or equal to a preset threshold value, judging whether the identification information is in a preset white list, wherein the white list comprises the identification information of the detection node.
Illustratively, the white list includes identification information of the probe node, which may be a designated node configured in the cluster. For example in the probe sectionThe detection component can be configured on the point, the detection component sends a connection request such as a ping request to the target node A in real time or at regular time, and the target node A receives the connection request and judges that the number X of the currently established connections is more than or equal to XmaxAnd then, acquiring identification information carried by the connection request, and judging that the identification information is the same as the identification information of the detection node in the white list, namely judging that the identification information is in the white list, namely that the connection request is a detection request such as a network detection request sent to a target node A by the detection node.
Step S104: and if the identification information is in a preset white list, responding to the connection request to establish connection.
Specifically, when it is determined that the identification information is in the white list, the target node a directly responds to the connection request to establish the connection between the probe node and the target node a, so that the target node a returns a response message to the probe node, and further determines the state of the target node a.
According to the time sequence database cluster network detection method, when the number of the currently established connections of the target node exceeds the maximum connection limit number configured by the target node, if the received connection request is judged to be from the detection node but not from other nodes, the connection between the detection node and the target node can still be established in response to the connection request from the detection node, so that the target node can be prevented from being fully occupied by the connection of other users, the target node is not connected with the target node, network detection failure is caused, potential system hidden dangers are caused, the cluster system hidden dangers are reduced, and the data reliability of the time sequence database cluster is improved.
Optionally, in some embodiments of the present disclosure, the identification information is an IP address of a node that sends the connection request, and the identification information of the probe node is an IP address of the probe node. Correspondingly, the step S103 of determining whether the identification information is in a preset white list may specifically include the following steps: judging whether the IP address of the node sending the connection request is the same as the IP address of the detection node; if yes, the IP address of the node sending the connection request is in the white list; if not, the IP address of the node sending the connection request is not in the white list.
Specifically, when the IP address carried by the connection request is the same as the IP address of the probe node in the white list, it is determined that the IP address carried by the connection request is in the white list, that is, the connection request is sent to the target node a by the probe node. When the IP address carried by the connection request is different from the IP address of the detection node in the white list, the IP address carried by the connection request is judged not to be in the white list, namely the connection request is sent to the target node A by other target nodes.
In the embodiment, whether the connection request is sent by the detection node can be simply, conveniently and cheaply determined through the IP address, if so, the target node A directly responds to the connection request to establish the connection between the detection node and the target node A, so that the situation that the target node A is fully connected by other users, the detection node is not connected with the target node, network detection failure causes potential system hidden dangers, the cluster system hidden dangers are reduced, and the data reliability of the time sequence database cluster is improved.
Optionally, in some embodiments of the present disclosure, as shown in fig. 2, when it is determined in step S102 that the number of currently established connections is smaller than the preset threshold, the method may further include the following steps:
step S201: and directly responding to the connection request to establish connection.
Specifically, as an example, the target node a is judging that the number X of currently established connections is less than XmaxIn other words, at this time, the maximum connection number is not reached, the target node a directly responds to the connection request to establish the connection between the target node a and the node sending the connection request, and the node sending the connection request may be, for example, any one of the target node B, the target node C, and the probe node.
Optionally, in some embodiments of the present disclosure, after the step of directly responding to the connection request to establish a connection in step S201, with reference to fig. 2, the method may further include the following steps:
step S202: and judging whether the identification information is in the white list.
Specifically, the specific implementation of step S202 may refer to the description content related to determining whether the identification information is in the preset white list in step S103, and is not described herein again.
Step S203: if so, keeping the number of the connections unchanged.
Specifically, as an example, it is determined that the identification information is in the white list, that is, the connection request is sent by the probe node, and the number X of currently established connections of the target node a remains unchanged, that is, the connection request sent by the probe node does not participate in updating the number X of connections.
Step S204: and if not, updating the number of the connections.
Specifically, as an example, it is determined that the identification information is not in the white list, that is, the connection request is sent by another target node, and at this time, the number X of the connections is updated, that is, X is added by one to obtain updated X' ═ X + 1. After step S204, go to step S101 to obtain a new connection request, where the number of currently established connections, i.e., the updated number of connections, is X', and then execute steps S102 to S104.
In the above-mentioned solution in this embodiment, the number X of connection requests sent by the probe node to the target node is counted when the connection request does not participate in the update of the connection number, that is, the connection request sent by the probe node is not limited by the maximum value of the connection number of the target node, as long as the connection request from the probe node is received, the target node will respond to the connection request to establish the connection between the target node and the probe node, and when the number of connections established by the target node exceeds the maximum connection limit number configured by the target node, if it is determined that the received connection request is from the probe node and not from another node, the connection between the probe node and the target node will still be established in response to the connection request from the probe node, so that it is possible to avoid that the target node is fully connected by another user, and the probe node is not connected to the target node, so that the network probing failure causes potential system hazards, therefore, the hidden danger of the cluster system is reduced, and the data reliability of the time sequence database cluster is improved. Meanwhile, the connection requests sent by the detection nodes do not participate in updating the number X of the connections established by the target nodes, so that the connection of other users is not occupied, and the operation stability and reliability of the time sequence database cluster are improved.
Optionally, in some embodiments of the present disclosure, after step S103, the method may further include the following steps: and if the identification information is not in the white list, rejecting the connection request.
Specifically, when the identification information carried by the connection request, such as the IP address, is different from the identification information of the probe node in the white list, such as the IP address, it is determined that the identification information is not in the white list, that is, the connection request is sent to the target node a by another target node B or a target node C, but not sent by the probe node, and at this time, since the total number of connections established by the target node a has reached the maximum connection number limit, the response of the connection request is rejected. Therefore, the upper limit of the number of the connections which can be borne by the target node can be avoided being exceeded, and the operation stability and reliability of the time sequence database cluster are improved.
Optionally, in some embodiments of the present disclosure, the target node may mount a cloud disk, and as shown in fig. 3, the target node a, the target node B, and the target node C may each mount a cloud disk.
Correspondingly, on the basis of the above embodiments, the method may further include the following steps:
step 1): and copying the data in the target node to the cloud disk.
Step 2): and when the target node fails, copying the data in the cloud disk to the new node after replacing the target node with the new node.
For example, the target node may copy the data stored by the target node to the corresponding cloud disk in real time or periodically to implement data backup. For example, the target node a, the target node B, and the target node C mount cloud disks, and copy data stored by the target node a, the target node B, and the target node C to their respective corresponding cloud disks.
When a target node, such as a target node B, fails and cannot be recovered, the failed target node B may be replaced with a new node B '(not shown), and then data in the cloud disk corresponding to the failed target node B is copied to the new node B'. Therefore, the data reliability of the time sequence database cluster can be improved, and the normal operation of the time sequence database cluster can be conveniently and quickly recovered.
It should be noted that although the various steps of the methods of the present disclosure are depicted in the drawings in a particular order, this does not require or imply that these steps must be performed in this particular order, or that all of the depicted steps must be performed, to achieve desirable results. Additionally or alternatively, certain steps may be omitted, multiple steps combined into one step execution, and/or one step broken down into multiple step executions, etc. Additionally, it will also be readily appreciated that the steps may be performed synchronously or asynchronously, e.g., among multiple modules/processes/threads.
In a second aspect, an embodiment of the present disclosure provides a timing database cluster network detecting apparatus, which may include an obtaining module 401, a first determining module 402, a second determining module 403, and a connection establishing module 404, as shown in fig. 4:
the obtaining module 401 is configured to obtain a connection request, where the connection request carries identification information.
The first determining module 402 is configured to determine whether the number of currently established connections is greater than or equal to a preset threshold.
The second determining module 403 is configured to determine whether the identifier information is in a preset white list if the first determining module 402 determines that the number of currently established connections is greater than or equal to a preset threshold, where the white list includes identifier information of the detection node.
The connection establishing module 404 is configured to respond to the connection request to establish a connection if the second determining module 403 determines that the identification information is in a preset white list.
The time sequence database cluster network detection device of the embodiment can still respond to the connection request from the detection node to establish the connection between the detection node and the target node if judging and determining that the received connection request is from the detection node but not from other nodes when the number of the currently established connections of the target node exceeds the self-configured maximum connection limit number, so that the target node can be prevented from being fully occupied by the connection of other users, the detection node is not connected with the target node, the network detection failure causes potential system hidden dangers, the cluster system hidden dangers are reduced, and the reliability of the time sequence database cluster is improved.
Optionally, in some embodiments of the present disclosure, the identification information is an IP address of a node that sends the connection request, and the identification information of the probe node is an IP address of the probe node. The second determining module 403 is specifically configured to: judging whether the IP address of the node sending the connection request is the same as the IP address of the detection node; if yes, the IP address of the node sending the connection request is in the white list; if not, the IP address of the node sending the connection request is not in the white list.
Optionally, in some embodiments of the present disclosure, the connection establishing module 404 is further configured to: if the second determining module 403 determines that the number of currently established connections is smaller than a preset threshold, it directly responds to the connection request to establish a connection.
Optionally, in some embodiments of the present disclosure, the apparatus further includes a quantity updating module, configured to determine whether the identification information is in the white list after the connection establishing module 404 directly responds to the connection request to establish a connection. If so, keeping the number of the connections unchanged, and if not, updating the number of the connections.
Optionally, in some embodiments of the present disclosure, the apparatus may further include a rejection response module, configured to reject the connection request if the identification information is not in a preset white list.
Optionally, in some embodiments of the present disclosure, the target node may mount a cloud disk, and the apparatus may further include a data copy recovery module, configured to copy data in the target node to the cloud disk; and when the target node fails, copying the data in the cloud disk to the new node after replacing the target node with the new node.
The specific manner in which the above-mentioned embodiments of the apparatus, and the corresponding technical effects brought about by the operations performed by the respective modules, have been described in detail in the embodiments related to the method, and will not be described in detail herein.
It should be noted that although in the above detailed description several modules or units of the device for action execution are mentioned, such a division is not mandatory. Indeed, the features and functionality of two or more modules or units described above may be embodied in one module or unit, according to embodiments of the present disclosure. Conversely, the features and functions of one module or unit described above may be further divided into embodiments by a plurality of modules or units. The components shown as modules or units may or may not be physical units, i.e. may be located in one place or may also be distributed over a plurality of network units. Some or all of the modules can be selected according to actual needs to achieve the purpose of the wood-disclosed scheme. One of ordinary skill in the art can understand and implement it without inventive effort.
The disclosed embodiments also provide a computer-readable storage medium, on which a computer program is stored, where the computer program, when executed by a processor, implements the steps of the temporal database cluster network probing method according to any of the above embodiments.
By way of example, and not limitation, such readable storage media can be an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination thereof. More specific examples (a non-exhaustive list) of the readable storage medium include: an electrical connection having one or more wires, a portable disk, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
The computer readable storage medium may include a propagated data signal with readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A readable storage medium may also be any readable medium that is not a readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code embodied on a readable storage medium may be transmitted using any appropriate medium, including but not limited to wireless, wireline, optical fiber cable, RF, etc., or any suitable combination of the foregoing.
An embodiment of the present disclosure also provides an electronic device, including a processor and a memory for storing a computer program. Wherein the processor is configured to perform the steps of the temporal database cluster network probing method in any of the above embodiments via execution of the computer program.
An electronic device 600 according to this embodiment of the invention is described below with reference to fig. 5. The electronic device 600 shown in fig. 5 is only an example and should not bring any limitation to the functions and the scope of use of the embodiments of the present invention.
As shown in fig. 5, the electronic device 600 is embodied in the form of a general purpose computing device. The components of the electronic device 600 may include, but are not limited to: at least one processing unit 610, at least one storage unit 620, a bus 630 that connects the various system components (including the storage unit 620 and the processing unit 610), a display unit 640, and the like.
Wherein the storage unit stores program code executable by the processing unit 610 to cause the processing unit 610 to perform steps according to various exemplary embodiments of the present invention described in the section of the timing database cluster network probing method mentioned above in this specification. For example, the processing unit 610 may perform the steps of the temporal database cluster network probing method as shown in fig. 1.
The storage unit 620 may include readable media in the form of volatile memory units, such as a random access memory unit (RAM)6201 and/or a cache memory unit 6202, and may further include a read-only memory unit (ROM) 6203.
The memory unit 620 may also include a program/utility 6204 having a set (at least one) of program modules 6205, such program modules 6205 including, but not limited to: an operating system, one or more application programs, other program modules, and program data, each of which, or some combination thereof, may comprise an implementation of a network environment.
Bus 630 may be one or more of several types of bus structures, including a memory unit bus or memory unit controller, a peripheral bus, an accelerated graphics port, a processing unit, or a local bus using any of a variety of bus architectures.
The electronic device 600 may also communicate with one or more external devices 700 (e.g., keyboard, pointing device, bluetooth device, etc.), with one or more devices that enable a user to interact with the electronic device 600, and/or with any devices (e.g., router, modem, etc.) that enable the electronic device 600 to communicate with one or more other computing devices. Such communication may occur via an input/output (I/O) interface 650. Also, the electronic device 600 may communicate with one or more networks (e.g., a Local Area Network (LAN), a Wide Area Network (WAN), and/or a public network such as the Internet) via the network adapter 660. The network adapter 660 may communicate with other modules of the electronic device 600 via the bus 630. It should be appreciated that although not shown in the figures, other hardware and/or software modules may be used in conjunction with the electronic device 600, including but not limited to: microcode, device drivers, redundant processing units, external disk drive arrays, RAID systems, tape drives, and data backup storage systems, among others.
Through the above description of the embodiments, those skilled in the art will readily understand that the exemplary embodiments described herein may be implemented by software, or by software in combination with necessary hardware. Therefore, the technical solution according to the embodiments of the present disclosure may be embodied in the form of a software product, which may be stored in a non-volatile storage medium (which may be a CD-ROM, a usb disk, a removable hard disk, etc.) or on a network, and includes several instructions to enable a computing device (which may be a personal computer, a server, or a network device, etc.) to execute the above-mentioned sequential database cluster network probing method according to the embodiments of the present disclosure.
It is noted that, in this document, relational terms such as "first" and "second," and the like, may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.
The foregoing are merely exemplary embodiments of the present disclosure, which enable those skilled in the art to understand or practice the present disclosure. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the disclosure. Thus, the present disclosure is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.

Claims (10)

1. A time sequence database cluster network detection method is applied to a target node in a cluster, and comprises the following steps:
acquiring a connection request, wherein the connection request carries identification information;
judging whether the number of the currently established connections is greater than or equal to a preset threshold value;
if the number of the currently established connections is larger than or equal to a preset threshold value, judging whether the identification information is in a preset white list or not, wherein the white list comprises the identification information of the detection node;
and if the identification information is in a preset white list, responding to the connection request to establish connection.
2. The timing database cluster network probing method according to claim 1, wherein said identification information is the IP address of the node sending said connection request, and said identification information of the probing node is the IP address of said probing node;
the judging whether the identification information is in a preset white list comprises the following steps:
judging whether the IP address of the node sending the connection request is the same as the IP address of the detection node;
if yes, the IP address of the node sending the connection request is in the white list;
if not, the IP address of the node sending the connection request is not in the white list.
3. The method for temporal database cluster network probing according to claim 1, said method further comprising:
and if the number of the currently established connections is less than a preset threshold value, directly responding to the connection request to establish the connections.
4. The method of claim 3, wherein after establishing a connection in direct response to the connection request, the method further comprises:
judging whether the identification information is in the white list or not;
if so, keeping the number of the connections unchanged;
and if not, updating the number of the connections.
5. The method for network probing of a temporal database cluster according to any of claims 1 to 4, said method further comprising:
and if the identification information is not in a preset white list, rejecting the connection request.
6. The method for network probing for a temporal database cluster according to any of claims 1 to 4, wherein said target node mounts a cloud disk, said method further comprising:
copying the data in the target node to the cloud disk;
and when the target node fails, copying the data in the cloud disk to the new node after replacing the target node with the new node.
7. A temporal database cluster network probe apparatus, comprising:
the system comprises an acquisition module, a processing module and a processing module, wherein the acquisition module is used for acquiring a connection request, and the connection request carries identification information;
the first judgment module is used for judging whether the number of the currently established connections is greater than or equal to a preset threshold value;
a second judgment module, configured to judge whether the identification information is in a preset white list if the first judgment module determines that the number of currently established connections is greater than or equal to a preset threshold, where the white list includes identification information of a detection node;
and the connection establishing module is used for responding to the connection request to establish connection if the second judging module determines that the identification information is in a preset white list.
8. The timing database cluster network probe device according to claim 7, wherein the identification information is an IP address of a node sending the connection request, the identification information of the probe node is an IP address of the probe node;
the second judgment module is specifically configured to:
judging whether the IP address of the node sending the connection request is the same as the IP address of the detection node;
if yes, the IP address of the node sending the connection request is in the white list;
if not, the IP address of the node sending the connection request is not in the white list.
9. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the steps of the method for temporal database cluster network probing according to any of the claims 1 to 6.
10. An electronic device, comprising:
a processor; and
a memory for storing a computer program;
wherein the processor is configured to perform the steps of the timing database cluster network probing method of any of claims 1 to 6 via execution of the computer program.
CN202111080862.6A 2021-09-15 2021-09-15 Time sequence database cluster network detection method, device, medium and electronic equipment Pending CN113839832A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111080862.6A CN113839832A (en) 2021-09-15 2021-09-15 Time sequence database cluster network detection method, device, medium and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111080862.6A CN113839832A (en) 2021-09-15 2021-09-15 Time sequence database cluster network detection method, device, medium and electronic equipment

Publications (1)

Publication Number Publication Date
CN113839832A true CN113839832A (en) 2021-12-24

Family

ID=78959413

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111080862.6A Pending CN113839832A (en) 2021-09-15 2021-09-15 Time sequence database cluster network detection method, device, medium and electronic equipment

Country Status (1)

Country Link
CN (1) CN113839832A (en)

Similar Documents

Publication Publication Date Title
US11586673B2 (en) Data writing and reading method and apparatus, and cloud storage system
CN108696581B (en) Distributed information caching method and device, computer equipment and storage medium
US11218386B2 (en) Service ticket escalation based on interaction patterns
CN109491928A (en) Buffer control method, device, terminal and storage medium
US20200057714A1 (en) Testing data changes in production systems
US9514176B2 (en) Database update notification method
CN110633046A (en) Storage method and device of distributed system, storage equipment and storage medium
CN111382206A (en) Data storage method and device
CN114328132A (en) Method, device, equipment and medium for monitoring state of external data source
US8195876B2 (en) Adaptation of contentious storage virtualization configurations
CN110502581A (en) Distributed data base system monitoring method and device
CN113220342A (en) Centralized configuration method and device, electronic equipment and storage medium
US10936192B2 (en) System and method for event driven storage management
CN113839832A (en) Time sequence database cluster network detection method, device, medium and electronic equipment
CN115221060A (en) Case generation method, device and equipment based on associated field and storage medium
CN112395141B (en) Data page management method and device, electronic equipment and storage medium
CN112148712A (en) Data processing method, device, equipment and medium
CN113238815A (en) Interface access control method, device, equipment and storage medium
CN112433888A (en) Data processing method and device, storage medium and electronic equipment
CN114281604B (en) Data recovery method and device, electronic equipment and storage medium
US10909098B2 (en) Setting a flag to indicate that a user interface has stale data within a subject matter category
CN117176613B (en) Data acquisition method and device
CN114546705B (en) Operation response method, operation response device, electronic apparatus, and storage medium
US20230195901A1 (en) Model-based upgrade recommendations using software dependencies
US11086552B2 (en) System and method for selective backup promotion using a dynamically reserved memory register

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination