CN113886015A - Application message issuing method based on k8s - Google Patents

Application message issuing method based on k8s Download PDF

Info

Publication number
CN113886015A
CN113886015A CN202111157530.3A CN202111157530A CN113886015A CN 113886015 A CN113886015 A CN 113886015A CN 202111157530 A CN202111157530 A CN 202111157530A CN 113886015 A CN113886015 A CN 113886015A
Authority
CN
China
Prior art keywords
configuration
group
application
configmap
operator
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111157530.3A
Other languages
Chinese (zh)
Inventor
滕硕
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xinhua Zhiyun Technology Co ltd
Original Assignee
Xinhua Zhiyun Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xinhua Zhiyun Technology Co ltd filed Critical Xinhua Zhiyun Technology Co ltd
Priority to CN202111157530.3A priority Critical patent/CN113886015A/en
Publication of CN113886015A publication Critical patent/CN113886015A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • G06F9/45533Hypervisors; Virtual machine monitors
    • G06F9/45558Hypervisor-specific management and integration aspects
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/50Allocation of resources, e.g. of the central processing unit [CPU]
    • G06F9/5061Partitioning or combining of resources
    • G06F9/5077Logical partitioning of resources; Management or configuration of virtualized resources
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • G06F9/45533Hypervisors; Virtual machine monitors
    • G06F9/45558Hypervisor-specific management and integration aspects
    • G06F2009/45587Isolation or security of virtual machine instances
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • G06F9/45533Hypervisors; Virtual machine monitors
    • G06F9/45558Hypervisor-specific management and integration aspects
    • G06F2009/45595Network integration; Enabling network access in virtual machine instances

Abstract

The invention discloses an application message issuing method based on k8s, which comprises the following steps: creating a service application and a configMap configuration file with the same name as the service application, grouping the service application and the configMap configuration file, acquiring a first service parameter transmitted by a console or the service application, and authenticating according to the first service parameter; if the authentication is passed, calling an API (application programming interface) to monitor whether the group configuration operator is changed, and if so, modifying the configMap configuration file; updating the modified configMap configuration file to a directory specified by the container; the service application monitors whether the configMap configuration file is updated or not, if so, the message is consumed, and the method has the advantages of increasing the safety of data use, controlling the configuration information of other service applications in the group and the authentication of the authority, reducing the dependence on middleware through the configuration information, enabling the deployment to be lighter, and supporting various languages to read the configuration information.

Description

Application message issuing method based on k8s
Technical Field
The invention belongs to the technical field of message publishing, and particularly relates to an application message publishing method based on k8 s.
Background
kubernets, k8s for short, is an important tool for arranging containers of Google open sources, at present, more and more business applications realize micro-service, and are almost deployed in containers, and the current technical scheme has the following defects:
first, the purpose of microservices is to minimize the coupling of services, but therefore, the cost of data information sharing and message publish/subscribe becomes higher and higher among services, and it is worth considering how to reduce the dependency among applications and the cross-language support.
Second, in the prior art, data is shared by using a configMap, multiple service applications are mounted on the same configMap, for example, a service application a and a service application B are mounted on the same configMap, some sensitive information needs to be written into the configMap of the service application a, and since a service application C is also mounted on the same configMap, the service application C acquires the sensitive information of the service application a, so that the risk of using data is high.
Disclosure of Invention
The present invention is directed to a version upgrade method and a computer readable storage medium, so as to solve the technical problem of the prior art that data is not safe enough to use.
In order to achieve the technical purpose, the technical scheme adopted by the invention is as follows:
an application message publishing method based on k8s, characterized by comprising the following steps:
creating a business application and a configMap configuration file with the same name as the business application, and grouping the business application and the configMap configuration file, wherein each group is provided with a group configuration operator;
acquiring a first service parameter transmitted by a console or the service application, and authenticating according to the first service parameter;
if the authentication is passed, calling an API (application programming interface) to monitor whether a group configuration operator is changed, and if so, modifying the configMap configuration file;
updating the modified configMap configuration file to a directory specified by a container;
and the service application monitors whether the configMap configuration file is updated or not, and if so, the message is consumed.
Preferably, the business application and the configMap configuration file are grouped, and each group is provided with a group configuration operator, which specifically includes the following steps:
the several configMap configuration files with the same business application name as the several business applications are in the same group;
each group is provided with a group configuration operator.
Preferably, the first service parameter includes a group configuration name, first application information, and a first configuration key value pair.
Preferably, the method for obtaining the first service parameter transmitted by the console or the service application and authenticating according to the first service parameter includes the following steps:
acquiring a second service parameter from a database, wherein the second service parameter comprises second application information and a second configuration key value pair;
judging whether the first application information and the second application information are the same;
if the first configuration key value pair and the second configuration key value pair are the same, continuously judging whether the first configuration key value pair and the second configuration key value pair belong to the same group;
if the group belongs to the same group, the authentication is passed.
Preferably, the method further comprises the steps of:
if the authentication is passed, judging whether a group configuration operator of the group in which the first service parameter is positioned exists;
and if the group configuration operator does not exist, establishing the group configuration operator of the group in which the first service parameter is located, and if the group configuration operator exists, calling the API interface to monitor whether the group configuration operator changes.
Preferably, the method further comprises the steps of:
judging whether a configMap configuration file corresponding to each service application in a group of the group configuration operator exists or not;
and if the configuration file does not exist, creating a configMap configuration file which is the same as the business application name.
Preferably, the method for monitoring whether the group configuration operator changes by calling the API interface, and if so, modifying the configMap configuration file, specifically includes the following steps:
the group configuration operator comprises a configuration list comprising configuration information of a configMap configuration file;
judging whether the configuration information of the configMap configuration file in the group to which the group configuration operator belongs changes;
and if the change occurs, modifying the configuration information of the configMap configuration file.
Preferably, the determining whether the configuration information of the configMap configuration file in the group to which the group configuration operator belongs changes includes the following steps:
the configuration information comprises a configuration name and a configuration value, whether the configuration name is the same as the first service parameter or not is judged, and if not, the configuration name is modified;
and judging whether the configuration value is the same as the first service parameter, and if not, modifying the configuration value.
Preferably, the system further comprises a group configuration controller, wherein the group configuration controller acquires a first service parameter transmitted by the console or the service application, and the group configuration controller performs authentication according to the first service parameter.
A computer-readable storage medium having stored thereon computer instructions which, when executed by a processor, implement the steps of the method described above.
The invention has the following beneficial effects:
1. the invention groups the service application and the configMap configuration file by creating the service application and the configMap configuration file with the same name as the service application, each group is provided with a group configuration operator, and different service applications are only mounted on the configMap configuration file with the same name as the service application, so that the data are invisible in different service applications, and only the service application and the configMap configuration file of a specified group are modified when the data need to be modified, thereby increasing the safety of data use.
2. The method comprises the steps of obtaining a first service parameter transmitted by a console or a service application, authenticating according to the first service parameter, calling an API (application programming interface) to monitor whether a group configuration operator changes if the authentication is passed, modifying a configMap configuration file if the group configuration operator changes, and judging whether a user has the authority to modify the service application and the configMap configuration file through the authentication, so that the data use safety is further improved, and meanwhile, the service application can control the configuration information of other service applications in a group and the authority authentication.
3. The group configuration operator comprises a configuration list, the configuration list comprises configuration information of a configMap configuration file, dependence on middleware is reduced through the configuration information, deployment is lighter, and meanwhile, reading of the configuration information in various languages is supported.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present invention, the drawings needed to be used in the embodiments or the prior art descriptions will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without inventive exercise.
FIG. 1 is a flow diagram of a method of application message publishing;
fig. 2 is a schematic workflow diagram of a group configuration operator and a group configuration controller.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, but not all, embodiments of the present invention. The components of embodiments of the present invention generally described and illustrated in the figures herein may be arranged and designed in a wide variety of different configurations.
Thus, the following detailed description of the embodiments of the present invention, presented in the figures, is not intended to limit the scope of the invention, as claimed, but is merely representative of selected embodiments of the invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Example 1:
as shown in fig. 1, the embodiment includes an application message publishing method based on k8s, which is characterized by including the following steps:
creating a business application and a configMap configuration file with the same name as the business application, and grouping the business application and the configMap configuration file, wherein each group is provided with a group configuration operator;
acquiring a first service parameter transmitted by a console or a service application, and authenticating according to the first service parameter; if the authentication is passed, calling an API (application programming interface) to monitor whether the group configuration operator is changed, and if so, modifying the configMap configuration file;
updating the modified configMap configuration file to a directory specified by the container; and the service application monitors whether the configMap configuration file is updated or not, and if so, the message is consumed.
Grouping the service application and the configMap configuration file, wherein each group is provided with a group configuration operator, and the method specifically comprises the following steps: the configMap configuration files of the plurality of service applications with the same name as the plurality of service applications are in the same group; each group is provided with a group configuration operator.
The first service parameter includes a group configuration name, first application information, and a first configuration key value pair. Specifically, the first application information includes a first application name and a first application owner, and the first configuration key value pair includes a first configuration name and a first configuration value.
The system also comprises a group configuration controller, wherein the group configuration controller acquires a first service parameter transmitted by the console or the service application, and authenticates according to the first service parameter.
The method comprises the following steps of obtaining a first service parameter transmitted by a console or a service application, and authenticating according to the first service parameter: acquiring a second service parameter from the database, wherein the second service parameter comprises second application information and a second configuration key value pair;
judging whether the first application information and the second application information are the same, if so, continuously judging whether the first configuration key value pair and the second configuration key value pair belong to the same group; if the group belongs to the same group, the authentication is passed.
Specifically, the console or the service application invokes a group configuration controller, hereinafter referred to as GCM controller, according to the first service parameter. The GCM controller obtains a first service parameter transmitted by a console or a service application, wherein the first service parameter comprises a group configuration name, a first application owner, a first configuration name and a first configuration value.
And the GCM controller acquires a second service parameter from the database, wherein the second service parameter comprises second application information and a second configuration key value pair, the second application information comprises a second application name and a second application owner, and the second configuration key value pair comprises a second configuration name and a second configuration value.
Judging whether the first application name is the same as the second application name or not, if not, indicating that the authentication is not passed and the message can not be issued; if the first application name and the second application name are the same, the first application name and the second application name belong to the same group, whether the first application owner and the second application owner are the same or not is judged, if the first application owner and the second application owner are not the same, the authentication is failed, and the message can not be issued; if the first configuration key value pair and the second configuration key value pair belong to the same group, judging whether the first configuration key value pair and the second configuration key value pair belong to the same group, and if the first configuration key value pair and the second configuration key value pair do not belong to the same group, indicating that the authentication is not passed and the message can not be issued; if the first configuration key value pair and the second configuration key value pair belong to the same group, the authentication is passed, specifically, if the first configuration name and the second configuration name belong to the same group, and the first configuration value and the second configuration value also belong to the same group, the authentication is passed.
As shown in fig. 2, further comprising the steps of: if the authentication is passed, judging whether a group configuration operator of the group in which the first service parameter is positioned exists; and if the group configuration operator does not exist, establishing the group configuration operator of the group in which the first service parameter is located, and if the group configuration operator exists, calling an API (application programming interface) to monitor whether the group configuration operator changes.
Specifically, the group configuration operator, hereinafter referred to as a CRD operator, determines whether the CRD operator of the group exists according to the group configuration name in the first service parameter, if not, creates the CRD operator of the group where the first service parameter exists, and if so, calls the API interface to monitor whether the CRD operator changes.
Further comprising the steps of: judging whether a configMap configuration file corresponding to each service application in a group of the group configuration operator exists or not; and if not, creating a configMap configuration file with the same name as the business application.
Specifically, the CRD operator includes an application name list, and determines whether a configMap configuration file corresponding to each service application in the application name list exists; and if not, creating a configMap configuration file with the same name as the business application.
Calling an API (application programming interface) to monitor whether a group configuration operator changes, and if so, modifying a configMap configuration file, specifically comprising the following steps: the group configuration operator comprises a configuration list comprising configuration information of the configMap configuration file; judging whether the configuration information of the configMap configuration file in the group to which the group configuration operator belongs changes; and if the change occurs, modifying the configuration information of the configMap configuration file.
Judging whether the configuration information of the configMap configuration file in the group to which the configuration operator belongs changes or not, specifically comprising the following steps: the configuration information comprises a configuration name and a configuration value, whether the configuration name is the same as the first service parameter or not is judged, and if not, the configuration name is modified; and judging whether the configuration value is the same as the first service parameter, and if not, modifying the configuration value.
Specifically, the CRD operator includes a configuration list, the configuration list includes configuration information of a configMap configuration file, the configuration information includes a third configuration name and a third configuration value, and determines whether the first configuration name and the third configuration name are the same, if not, modifies the third configuration name according to the first configuration name, determines whether the first configuration value and the third configuration value are the same, and if not, modifies the third configuration value according to the first configuration value.
Specifically, the GCM controller is called through the software development kit, the GCM controller modifies the third configuration name according to the first configuration name, and the GCM controller modifies the third configuration value according to the first configuration value. And meanwhile, updating the second configuration name in the database according to the third configuration name, and updating the second configuration value according to the third configuration value.
Specifically, calling an API (application programming interface) interface to monitor whether the configuration information of the configMap configuration file is updated, if so, updating the modified configMap configuration file to a directory specified by a container by the API interface, wherein the service application comprises a software development kit, the software development kit is referred to as SDK for short, monitoring whether the configuration information of the configMap configuration file is updated through the SDK, and if so, consuming messages, thereby realizing the release of messages between applications.
Example 2:
a computer readable storage medium having stored thereon computer instructions which, when executed by a processor, implement the steps of the method of embodiment 1.
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, apparatus, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present invention has been described with reference to flowchart illustrations and/or block diagrams of methods, terminal devices (systems), and computer program products according to the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing terminal to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing terminal, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing terminal to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing terminal to cause a series of operational steps to be performed on the computer or other programmable terminal to produce a computer implemented process such that the instructions which execute on the computer or other programmable terminal provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
It should be noted that:
reference in the specification to "one embodiment" or "an embodiment" means that a particular feature, structure, or characteristic described in connection with the embodiment is included in at least one embodiment of the invention. Thus, the appearances of the phrase "one embodiment" or "an embodiment" in various places throughout this specification are not necessarily all referring to the same embodiment.
While preferred embodiments of the present invention have been described, additional variations and modifications in those embodiments may occur to those skilled in the art once they learn of the basic inventive concepts. Therefore, it is intended that the appended claims be interpreted as including preferred embodiments and all such alterations and modifications as fall within the scope of the invention.
In addition, it should be noted that the specific embodiments described in the present specification may differ in the shape of the components, the names of the components, and the like. All equivalent or simple changes of the structure, the characteristics and the principle of the invention which are described in the patent conception of the invention are included in the protection scope of the patent of the invention. Various modifications, additions and substitutions for the specific embodiments described may be made by those skilled in the art without departing from the scope of the invention as defined in the accompanying claims.

Claims (10)

1. An application message publishing method based on k8s, characterized by comprising the following steps:
creating a business application and a configMap configuration file with the same name as the business application, and grouping the business application and the configMap configuration file, wherein each group is provided with a group configuration operator;
acquiring a first service parameter transmitted by a console or the service application, and authenticating according to the first service parameter;
if the authentication is passed, calling an API (application programming interface) to monitor whether a group configuration operator is changed, and if so, modifying the configMap configuration file;
updating the modified configMap configuration file to a directory specified by a container;
and the service application monitors whether the configMap configuration file is updated or not, and if so, the message is consumed.
2. The method for issuing application messages based on k8s, according to claim 1, wherein the business applications and the configMap configuration files are grouped, each group is provided with a group configuration operator, and specifically includes the following steps:
the several configMap configuration files with the same business application name as the several business applications are in the same group;
each group is provided with a group configuration operator.
3. The k8 s-based application message distribution method according to claim 1, wherein the first service parameter includes a group configuration name, first application information and a first configuration key value pair.
4. The method as claimed in claim 3, wherein the method for issuing the application message based on k8s, obtains a first service parameter transmitted by the console or the service application, and performs authentication according to the first service parameter, specifically comprising the following steps:
acquiring a second service parameter from a database, wherein the second service parameter comprises second application information and a second configuration key value pair;
judging whether the first application information and the second application information are the same;
if the first configuration key value pair and the second configuration key value pair are the same, continuously judging whether the first configuration key value pair and the second configuration key value pair belong to the same group;
if the group belongs to the same group, the authentication is passed.
5. The method for issuing the application message based on k8s as claimed in claim 1, further comprising the steps of:
if the authentication is passed, judging whether a group configuration operator of the group in which the first service parameter is positioned exists;
and if the group configuration operator does not exist, establishing the group configuration operator of the group in which the first service parameter is located, and if the group configuration operator exists, calling the API interface to monitor whether the group configuration operator changes.
6. The method for issuing the application message based on k8s as claimed in claim 1, further comprising the steps of:
judging whether a configMap configuration file corresponding to each service application in a group of the group configuration operator exists or not;
and if the configuration file does not exist, creating a configMap configuration file which is the same as the business application name.
7. The method for issuing the application message based on k8s as claimed in claim 1, wherein the API interface is called to monitor whether a group configuration operator changes, and if so, the configMap configuration file is modified, specifically including the following steps:
the group configuration operator comprises a configuration list comprising configuration information of a configMap configuration file;
judging whether the configuration information of the configMap configuration file in the group to which the group configuration operator belongs changes;
and if the change occurs, modifying the configuration information of the configMap configuration file.
8. The method for issuing the application message based on k8s as claimed in claim 7, wherein the step of determining whether the configuration information of the configMap configuration file in the group to which the group configuration operator belongs changes includes the following steps:
the configuration information comprises a configuration name and a configuration value, whether the configuration name is the same as the first service parameter or not is judged, and if not, the configuration name is modified;
and judging whether the configuration value is the same as the first service parameter, and if not, modifying the configuration value.
9. The method as claimed in claim 1, further comprising a group configuration controller, wherein the group configuration controller obtains the first service parameter delivered by the console or the service application, and the group configuration controller performs authentication according to the first service parameter.
10. A computer readable storage medium having stored thereon computer instructions which, when executed by a processor, carry out the steps of the k8 s-based application message distribution method according to any one of claims 1 to 9.
CN202111157530.3A 2021-09-29 2021-09-29 Application message issuing method based on k8s Pending CN113886015A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111157530.3A CN113886015A (en) 2021-09-29 2021-09-29 Application message issuing method based on k8s

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111157530.3A CN113886015A (en) 2021-09-29 2021-09-29 Application message issuing method based on k8s

Publications (1)

Publication Number Publication Date
CN113886015A true CN113886015A (en) 2022-01-04

Family

ID=79004668

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111157530.3A Pending CN113886015A (en) 2021-09-29 2021-09-29 Application message issuing method based on k8s

Country Status (1)

Country Link
CN (1) CN113886015A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114547661A (en) * 2022-03-21 2022-05-27 京东科技信息技术有限公司 Encryption and decryption method, device, equipment and storage medium for application configuration data
CN117251173A (en) * 2023-11-15 2023-12-19 深圳万物安全科技有限公司 Method for configuring micro-service items, device and medium for configuring micro-service items

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114547661A (en) * 2022-03-21 2022-05-27 京东科技信息技术有限公司 Encryption and decryption method, device, equipment and storage medium for application configuration data
CN117251173A (en) * 2023-11-15 2023-12-19 深圳万物安全科技有限公司 Method for configuring micro-service items, device and medium for configuring micro-service items
CN117251173B (en) * 2023-11-15 2024-03-08 深圳万物安全科技有限公司 Micro-service item configuration method, micro-service item configuration device and medium

Similar Documents

Publication Publication Date Title
CN107896162B (en) Deployment method and device of monitoring system, computer equipment and storage medium
CN106657314B (en) Cross-data center data synchronization system and method
CN113886015A (en) Application message issuing method based on k8s
CN104866391B (en) A kind of end message backup method and device based on increment information system
CN108255708B (en) Method, device, storage medium and equipment for accessing production file in test environment
CN108021400B (en) Data processing method and device, computer storage medium and equipment
CN110245031B (en) AI service opening middle platform and method
CN111026723B (en) Big data cluster management control method and device, computer equipment and storage medium
CN113626286A (en) Multi-cluster instance processing method and device, electronic equipment and storage medium
CN111858007A (en) Task scheduling method and device based on message middleware
CN112288423A (en) Aggregation payment method and system of distributed framework
CN110889132A (en) Distributed application permission verification method and device
CN108564345B (en) Insurance platform data processing method, electronic device and computer readable storage medium
CN111897623A (en) Cluster management method, device, equipment and storage medium
CN106708842B (en) Method for loading data by application system, database and application system
CN111737353A (en) Metadata synchronization method and device
CN108664343B (en) State calling method and device for micro-service
CN111291053B (en) Workflow data processing method and device and workflow data processing platform
CN113010238A (en) Permission determination method, device and system for micro application call interface
CN103197950B (en) Plug-in virtual machine implementation method
CN112882765A (en) Digital twin model scheduling method and device
CN109067911B (en) Message sending implementation method based on multi-cloud platform sending conditions
CN109040491A (en) On-hook behavior processing method, device, computer equipment and storage medium
CN109857374A (en) The development approach and device of mobile application
CN114625410A (en) Request message processing method, device and equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination