CN114666410A - Resource calling method and device, electronic equipment and storage medium - Google Patents

Resource calling method and device, electronic equipment and storage medium Download PDF

Info

Publication number
CN114666410A
CN114666410A CN202210134700.4A CN202210134700A CN114666410A CN 114666410 A CN114666410 A CN 114666410A CN 202210134700 A CN202210134700 A CN 202210134700A CN 114666410 A CN114666410 A CN 114666410A
Authority
CN
China
Prior art keywords
resource
occupation
user
strategy
locked
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210134700.4A
Other languages
Chinese (zh)
Inventor
林永辉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Aijieyun Technology Co ltd
Original Assignee
Shenzhen Aijieyun Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Aijieyun Technology Co ltd filed Critical Shenzhen Aijieyun Technology Co ltd
Priority to CN202210134700.4A priority Critical patent/CN114666410A/en
Publication of CN114666410A publication Critical patent/CN114666410A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The application relates to the technical field of internet communication, and discloses a resource calling method, a resource calling device, electronic equipment and a storage medium, wherein the method comprises the following steps: receiving a resource calling request initiated by a user, wherein the resource calling request carries a user identifier and a service identifier; detecting whether a locking resource available for a resource calling request exists in an edge node responding to the resource calling request according to a pre-deployed resource pre-occupation strategy, a user identifier and a service identifier; the resource pre-occupation strategy comprises a locked resource and a user set and/or a service set which can call the locked resource; under the condition that available locking resources exist, preferentially calling the available locking resources to serve the user; in the event that there is no locked resource available, the non-locked resource is invoked to service the user. Partial resources in the edge nodes are locked by deploying a resource pre-occupation strategy, so that the resources prepared for the specified users are prevented from being occupied by other users, and the accuracy and the reasonability of resource allocation are improved.

Description

Resource calling method and device, electronic equipment and storage medium
Technical Field
The embodiment of the application relates to the technical field of internet communication, in particular to a resource calling method, a resource calling device, electronic equipment and a storage medium.
Background
With the continuous development of communication technology and internet, cloud computing and edge computing are gradually becoming mainstream computing methods in order to better meet the use requirements of users. In the scenario of edge computing, the resources of the edge node are generally tense, such as resources of a CPU, a GPU, a memory, a shared storage, a local hard disk, and the like. Under the condition that multiple users share resources, in order to ensure that a new service is online, resources are often planned for the new service to be online in advance, but after the resources planned for the new service are online, the resources planned for the new service may be occupied by services of other clients within a time difference before the new service is online, so that online planning of the new service is blocked, and user experience is affected.
In order to solve the problem, a currently commonly adopted scheme is to create a virtual machine, a container, and the like in advance for a new service, and occupy planned resources, such as resources of a CPU, a GPU, a memory, a shared storage, a local hard disk, and the like on an edge node in advance for the new service through the created virtual machine, the created container, and the like. And then, when the new service is on line, releasing the resources planned for the new service by destroying the virtual machine or the container created in advance, and then creating the related resources for the new service to use.
However, the above-mentioned solution has poor operability, and in the process of resource release adjustment, the planned resources for the new service still have the possibility of being preempted by other services, the effect of resource allocation is poor, and the new service still has a certain failure rate on-line.
Disclosure of Invention
The embodiment of the application mainly aims to provide a resource calling method, a resource calling device, electronic equipment and a storage medium, and aims to avoid that resources prepared for a specified user are occupied by other users, improve the rationality of resource allocation and avoid resource conflicts among users.
In order to achieve the above object, an embodiment of the present application provides a resource calling method, including: receiving a resource calling request initiated by a user, wherein the resource calling request carries a user identifier and a service identifier; detecting whether a locking resource available for the resource calling request exists in an edge node responding to the resource calling request or not according to a pre-deployed resource pre-occupation strategy, the user identifier and the service identifier; the resource pre-occupation strategy comprises a locked resource and a user set and/or a service set which can call the locked resource; in the case that the available locking resources exist, preferentially calling the available locking resources to serve the user; in the absence of the available locked resource, invoking a non-locked resource to service the user.
In order to achieve the above object, an embodiment of the present application further provides a resource invoking device, including: the system comprises a receiving module, a sending module and a receiving module, wherein the receiving module is used for receiving a resource calling request initiated by a user, and the resource calling request carries a user identifier and a service identifier; the detection module is used for detecting whether the locking resource available for the resource calling request exists in the edge node responding to the resource calling request according to a pre-deployed resource pre-occupation strategy, the user identifier and the service identifier; the resource pre-occupation strategy comprises a locked resource and a user set and/or a service set which can call the locked resource; the scheduling module is used for preferentially calling the available locking resources to serve the user under the condition that the available locking resources exist; in the absence of the available locked resource, invoking a non-locked resource to service the user.
In order to achieve the above object, an embodiment of the present application further provides an electronic device, where the electronic device includes: at least one processor; and a memory communicatively coupled to the at least one processor; wherein the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the resource invocation method as described above.
To achieve the above object, an embodiment of the present application further provides a computer-readable storage medium, which stores a computer program, and when the computer program is executed by a processor, the computer program implements the resource calling method as described above.
According to the resource calling method provided by the embodiment of the application, after a resource calling request initiated by a user is received, according to a pre-deployed resource pre-occupation strategy and a user identifier and a service identifier contained in the resource calling request, whether available locking resources of the resource calling request exist in an edge node responding to the resource calling request or not is judged, and the available locking resources are preferentially called to serve the user under the condition that the available locking resources of the resource calling request exist in the edge node; and under the condition that no locked resource available for the resource calling request exists in the edge node, calling the non-locked resource to serve the user. Locking part of appointed resources in the edge nodes by a pre-deployed resource pre-occupation strategy, verifying whether available locked resources exist or not when a resource calling request of a user is received, and preferentially calling the locked resources to serve the user when the available locked resources exist so that resources prepared for the appointed user are accurately called; when available locking resources do not exist, non-locking resources are called to serve the users, resources prepared for the specified users are prevented from being occupied by other users, resource conflict among the users is avoided as much as possible, and accuracy and reasonability of resource allocation are improved.
Drawings
One or more embodiments are illustrated by the corresponding figures in the drawings, which are not meant to be limiting.
FIG. 1 is a flow chart of a resource invocation method in an embodiment of the present application;
fig. 2 is a schematic diagram of a resource pre-occupation policy verification process in the embodiment of the present application;
FIG. 3 is a schematic structural diagram of a resource calling device in another embodiment of the present application;
fig. 4 is a schematic structural diagram of an electronic device in another embodiment of the present application.
Detailed Description
As known from the background art, the current resource allocation scheme has poor operability, and in the process of resource release adjustment, the planned resources for the new service still have the possibility of being preempted by other services, the resource allocation effect is poor, and the new service still has a certain failure rate when being online. Therefore, how to accurately and efficiently realize resource allocation and avoid resource misoccupation and resource conflict among users is a technical problem which needs to be solved urgently.
In order to solve the foregoing problem, some embodiments of the present application provide a resource invoking method, including: receiving a resource calling request initiated by a user, wherein the resource calling request carries a user identifier and a service identifier; detecting whether a locking resource available for a resource calling request exists in an edge node responding to the resource calling request according to a pre-deployed resource pre-occupation strategy, a user identifier and a service identifier; the resource pre-occupation strategy comprises a locked resource and a user set and/or a service set which can call the locked resource; under the condition that available locking resources exist, preferentially calling the available locking resources to serve the user; in the event that there is no locked resource available, the non-locked resource is invoked to service the user.
To make the objects, technical solutions and advantages of the embodiments of the present application clearer, the embodiments of the present application will be described in detail below with reference to the accompanying drawings. However, it will be appreciated by those of ordinary skill in the art that in the examples of the present application, numerous technical details are set forth in order to provide a better understanding of the present application. However, the technical solution claimed in the present application can be implemented without these technical details and various changes and modifications based on the following embodiments. The following embodiments are divided for convenience of description, and should not constitute any limitation to the specific implementation manner of the present application, and the embodiments may be mutually incorporated and referred to without contradiction.
The following description will specifically describe implementation details of the resource invoking method described in the present application with reference to specific embodiments, and the following description is only provided for facilitating understanding of the implementation details and is not necessary for implementing the present solution.
A first aspect of the embodiments of the present application provides a resource invoking method, a flow of the resource invoking method refers to fig. 1, in some embodiments, the resource invoking method is applied to a resource scheduling system or a server, such as a computer, that deploys the resource scheduling system, which is described in this embodiment by taking application to the resource scheduling system as an example, the resource invoking includes the following steps:
step 101, receiving a resource calling request initiated by a user, wherein the resource calling request carries a user identifier and a service identifier.
In particular, the resource scheduling system may include a plurality of modules, such as a web product interface module, a scheduling module, and a resource management module. The network product interface module is used for interacting with a user and an administrator, so that the user can complete the creation of a resource calling request, and the administrator can complete the creation of a resource pre-occupation strategy, the priority setting of the user resource calling request and the like. The scheduling module is mainly used for storing the deployed resource pre-occupation strategy and performing resource allocation for the received resource calling request according to the deployed resource pre-occupation strategy. The resource management module is mainly used for detecting and collecting resources such as calculation, storage, networks and the like on each edge node, and creating a resource set responding to a resource calling request according to an instruction of the scheduling module.
And after the resource scheduling system is established and put into use, displaying a self-service operation interface for resource calling to a user through a graphic management interface of the network product interface module. For example, computing, storage, and network resources that need to be called when completing creation of resources such as virtual machines, containers, and the like, such as memory, disks, Central Processing Units (CPUs), distributed storage, local disks, graphics processors, and networks, are exposed to a user. And then prompting a user to select the type of the resource to be called and the quantity of each type of resource in an autonomous operation interface, finishing the assembly of a resource calling request in a network product interface module according to the user identification of the user and the input service identification, transmitting the resource calling request to a scheduling module, and receiving the resource calling request which is initiated by the user and carries the user identification and the service identification by the scheduling module.
102, detecting whether a locked resource available for a resource calling request exists in an edge node responding to the resource calling request according to a pre-deployed resource pre-occupation strategy, a user identifier and a service identifier; if the available locking resource of the resource calling request exists, entering step 103; if there is no locked resource available for the resource invocation request, step 104 is entered.
Specifically, after receiving a resource calling request of a user, a scheduling module of the resource scheduling system determines an edge node responding to the resource calling request, where the edge node determination may be directly set by an administrator or selected by the scheduling module according to a preset policy and a user identifier. For example, the preset policy for selecting the edge node may be to select an appropriate edge node according to a load balancing policy, or to select an edge node closer to the user according to a proximity principle, or to deploy an edge node with a resource pre-occupation policy related to the user, or the like. And then detecting whether a valid resource pre-occupation strategy exists in the edge node aiming at the resource calling request according to the user identification and the service identification in the resource calling request and a pre-deployed resource pre-occupation strategy, and further detecting whether a locked resource available for the resource calling request exists in the edge node, wherein the resource pre-occupation strategy comprises the locked resource and a user set and/or a service set which can call the locked resource. If detecting that there is a locked resource available for the resource calling request, then entering step 103, and preferentially calling the available locked resource to serve the user; if no locked resource available for the resource invocation request is detected, step 104 is entered, and only the non-locked resource is invoked to serve the user. Whether the resource calling request has the invokable locked resource is detected, so that the locked resource prepared for the appointed user is prevented from being allocated to the non-appointed user for use, and resource conflict among the users is avoided.
In one example, the method for detecting whether there is a locked resource available for a resource invocation request in an edge node responding to the resource invocation request according to a plurality of pre-deployed resource pre-occupation policies, a user identifier and a service identifier includes: detecting whether a target resource pre-occupation strategy meeting preset conditions exists in pre-deployed resource pre-occupation strategies; the preset conditions comprise that a user set comprises a user identifier and/or a service set comprises a service identifier; under the condition that the target resource pre-occupation strategy is detected to exist, the resource locked by the target resource pre-occupation strategy is used as a locking resource available for the resource calling request; and under the condition that the target resource pre-occupation strategy does not exist, judging that the resource calling request does not have available locking resources.
Specifically, when detecting whether a locked resource available for a resource calling request exists in an edge node, a scheduling module analyzes a plurality of pre-deployed resource pre-occupation strategies according to a user identifier and a service identifier carried by the resource calling request, and detects whether a user identifier carried by the resource calling request exists in the pre-deployed resource pre-occupation strategies and/or whether a target resource pre-occupation strategy exists in the service set and includes the service identifier carried by the resource calling request.
And under the condition that a target resource pre-occupation strategy meeting preset conditions exists in the resource pre-occupation strategies deployed on the edge nodes, analyzing the target resource pre-occupation strategy to acquire the appointed resources locked in advance by the target resource pre-occupation strategy. The acquired specified resource is used as a locked resource available for the resource calling request, and the process proceeds to step 103: and preferentially calling the available locking resources to serve the user.
When it is detected that the resource pre-occupation policy deployed on the edge node does not have a target resource pre-occupation policy satisfying a preset condition, the scheduling module directly determines that the resource calling request does not have an available locked resource in the edge node, and proceeds to step 104: and calling the non-locked resource to serve the user. And taking the resource locked by the target resource pre-occupation strategy meeting the preset condition as a locking resource available for the resource calling request, and avoiding distributing the resource locked for a specific user to a user without calling authority.
It should be noted that, when determining the target resource pre-occupation policy, only the resource pre-occupation policy in which the user set includes the user identifier and the service set includes the service identifier may be used as the target resource pre-occupation policy, or the resource pre-occupation policies in which the user set includes the user identifier and the service set includes the service identifier may be used together as the target resource pre-occupation policy, and a specific determination manner may be determined according to actual needs, which is not limited in this embodiment.
It should be noted that the resource pre-occupation policy generally may include three parts, a locked edge node resource, for example, a plurality of core CPUs, a memory with a specified size, a disk space with a specified size, a plurality of graphics processors, and the like in the edge node; a set of users that can invoke a locked resource; a set of services for a locked resource may be invoked. In addition, other information related to resource locking, such as locking time, may also be set according to actual needs in the resource pre-occupation policy, and the specific configuration of the resource pre-occupation policy is not limited in this embodiment.
In another example, each resource pre-occupation policy is provided with a priority interval; in the pre-deployed resource pre-occupation strategies, detecting whether a target resource pre-occupation strategy meeting a preset condition exists or not comprises the following steps: taking all resource pre-occupation strategies meeting preset conditions as alternative resource pre-occupation strategies; acquiring the service priority of the resource calling request; and according to the service priority, determining a target resource pre-occupation strategy in the alternative resource pre-occupation strategies, wherein the priority interval of the target resource pre-occupation strategy comprises the service priority.
Specifically, the resource pre-occupation policy may further include a priority interval, and when a resource invocation request is composed by a network product interface module of the resource scheduling system according to a resource selected by a user and input information, a service priority of the resource invocation request is determined according to an administrator instruction or information input by the user, and the determined service priority is also assembled in the resource invocation request and sent to the scheduling module. When detecting whether a target resource pre-occupation strategy meeting preset conditions exists in pre-deployed resource pre-occupation strategies, a scheduling module firstly performs primary screening on the resource pre-occupation strategies deployed on edge nodes according to the preset conditions, and generates an alternative resource pre-occupation strategy set by taking all resource pre-occupation strategies meeting the preset conditions as alternative resource pre-occupation strategies. Then, each alternative resource pre-occupation strategy in the alternative resource pre-occupation strategy set is analyzed to obtain a priority interval contained in each alternative resource pre-occupation strategy, and the resource calling request is analyzed to obtain the service priority of the resource calling request. And then detecting whether the priority interval of each alternative resource pre-occupation strategy contains the service priority of the resource calling request, and taking the alternative resource pre-occupation strategy containing the service priority of the resource calling request in the priority interval as a target resource pre-occupation strategy. If the service priority of the resource calling request is not contained in the priority interval of the alternative resource pre-occupation strategy, judging that the target resource pre-occupation strategy does not exist, and judging that the resource calling request does not have available locking resources in the current edge node. And further screening a target resource pre-occupation strategy from the alternative resource pre-occupation strategies according to the service priority, so that a resource creation request with a low service priority is prevented from occupying a specific resource which can be used by a resource creation request with a high service priority.
It should be noted that the priority interval may be a natural number, such as 1-10, and the smaller the number is, the higher the priority is, the service priority is also expressed by using the natural number; the priority interval may also be an ordered set of letters, e.g., a-G, with the higher the priority the earlier the letter position, and the service priority represented by the letter. Here, the example is only for convenience of understanding, and in practical application, the representation manner of the priority interval and the service priority may be set according to needs, which is not limited in this embodiment.
In another example, the resource scheduling system is further configured to obtain each resource pre-occupation policy to be deployed, and verify each resource pre-occupation policy to be deployed; and deploying the successfully verified resource pre-occupation strategy to the target edge node, and setting a plurality of resources in the target edge node as locked resources according to the locked resources contained in the resource pre-occupation strategy.
Specifically, the resource scheduling system displays a resource pre-occupation policy setting interface to an administrator through a network product interface module, generates a resource pre-occupation policy to be deployed according to an instruction input by the administrator, transmits the resource pre-occupation policy to be deployed to the scheduling module, and requests the scheduling module to store and deploy the resource pre-occupation policy to be deployed. And after the scheduling module acquires the resource pre-occupation strategy to be deployed, carrying out validity check on each item of information in the resource pre-occupation strategy, and judging that the resource pre-occupation strategy to be deployed is successfully checked under the condition that each item of information is legal. And then selecting a deployed target edge node for the successfully verified resource pre-occupation strategy according to an administrator instruction or a preset selection rule, deploying the successfully verified resource pre-occupation strategy to the target edge node, locking a plurality of resources in the target edge node according to the locked resources contained in the deployed resource pre-occupation strategy, for example, if the locked resources contained in the deployed resource pre-occupation strategy are 5 graphics processors and 3G local disk space, selecting 5 graphics processors and 3G local disk space from the idle resources of the target edge node, and locking the selected resources. It is to be noted that, in the embodiment of the present application, a manner of locking a resource based on a resource preemption policy is a logical locking, for example, a state of the resource is set to distinguish a locked resource from an unlocked resource, or a resource preemption policy corresponding to the locked resource is set by adding an identifier. Compared with the pre-occupation mode in the prior art, the mode based on the logic locking has the advantages of simple and quick operation and no influence on the resource. And checking the acquired resource pre-occupation strategy, and locking the resources in the edge nodes according to the successfully checked resource pre-occupation strategy, so that the reduction of the resource utilization rate caused by the wrong locking of the resources according to the illegal strategy is avoided.
Further, the target edge node is determined according to the obtained administrator instruction, a preset load balancing strategy or a nearby principle. Specifically, when the target edge node to be deployed is selected for the resource pre-occupation policy to be deployed that is verified successfully, the instruction input by the administrator may be analyzed, and the edge node included in the input instruction is used as the target edge node. Or according to a preset load balancing strategy and the current resource occupation condition of each edge node, selecting an edge node with lower resource occupation from the administered edge nodes as a target edge node. Or according to the principle of proximity, according to the distance between each edge node and each user contained in the resource pre-occupation strategy user set, the edge node closest to the sum of the distances of each user is taken as the target edge node. And the determination mode of the target edge node is selected according to actual needs, so that the accuracy is ensured, and the practicability is improved. In practical application, the method for determining the target edge node may be selected according to specific needs, which is not limited in this embodiment.
In another example, verifying each resource pre-occupation policy to be deployed includes: performing a check of any one or any combination of: whether the occupiable resources of the target edge node can meet the resource occupation requirement of the resource pre-occupation strategy, whether each user contained in the user set in the resource pre-occupation strategy is legal or not, and whether the priority interval in the resource pre-occupation strategy is legal or not. Specifically, when the scheduling module of the resource scheduling system verifies each resource pre-occupation strategy to be deployed, whether the information in the resource pre-occupation strategies is legal or not can be verified from different angles, so that the problem that the resource utilization rate is reduced due to the fact that the resource pre-occupation strategies with illegal parameters are deployed to lock the resources is avoided.
For example, the scheduling module performs resource pre-occupation policy verification on the resource pre-occupation policy to be deployed according to the detection flow shown in fig. 2:
under the condition that the resource pre-occupation strategy comprises a user set and the user set is a non-empty set, the user set in the resource pre-occupation strategy is analyzed firstly, whether each user contained in the user set is legal or not is detected, if all users are legal, the priority interval is subjected to legal detection, if illegal users exist, for example, users which cannot acquire the registration information, the resource pre-occupation strategy is judged to be illegal, and the check is failed.
When the priority interval is legally detected, analyzing a priority setting mode in a resource pre-occupation strategy, detecting whether the setting of the priority interval is legal, and entering the verification whether the resource occupation requirement can be met or not under the condition that the setting of the priority interval is legal; and under the condition that the priority interval is set illegally, judging that the resource pre-occupation strategy is illegal and the verification fails. For example, if the preset priority interval is represented by a natural number, whether the priority interval set in the resource pre-occupation policy is represented by the natural number is detected, and if the priority interval is represented by a letter, it is determined that the priority interval is set illegally and the verification fails; if the priority interval is represented by a natural number, judging that the priority setting is legal, and checking whether the resource occupation requirement can be met.
And when the resource occupation requirement can be checked to be met, acquiring the free resource inventory of the target edge node, and detecting whether the free resource inventory of the target edge node can meet the resource occupation requirement of the resource pre-occupation strategy. Under the condition that the free resource inventory can meet the resource occupation requirement of the resource pre-occupation strategy, judging that the resource pre-occupation strategy is successfully verified, and deploying the resource pre-occupation strategy to a target edge node; and under the condition that the free resource inventory cannot meet the resource occupation requirement of the resource pre-occupation strategy, judging that the verification of the resource pre-occupation strategy fails. For example, if the resources to be locked included in the resource pre-occupation policy are 50 megabits of data transmission bandwidth and 2 gigabytes of local disk space, the idle data transmission bandwidth in the target edge node is 65 megabits, and the idle local disk space is 5 gigabytes, it is determined that the idle resource inventory of the target edge node can meet the resource occupation requirement of the resource pre-occupation policy.
It should be noted that the specific check and the check sequence performed on the resource pre-occupation policy may be adjusted according to actual needs, the above example is only for facilitating understanding, and the present embodiment does not limit the specifically adopted check and check sequence.
In another example, each resource pre-occupation policy is provided with a policy effective time to identify an effective period of the resource pre-occupation policy, and verifying each resource pre-occupation policy to be deployed includes: and checking whether the effective time of the strategy in the resource pre-occupation strategy is legal or not. Specifically, when the scheduling module verifies the resource pre-occupation policy, it is further required to detect whether the policy effective time included in the resource pre-occupation policy is legal, for example, the current time is a, and if the starting time B of the policy effective time is before the current time a, it is determined that the policy effective time of the resource pre-occupation policy is illegal; and if the starting time B of the policy effective time is behind the current time A, judging that the policy effective time of the resource pre-occupation policy is legal. By setting the policy effective time in the pre-occupation policy and verifying whether the policy effective time is legal or not before deployment, the influence of the policy with the illegal policy effective time on the ongoing resource calling is avoided, and the stability of the resource calling is ensured.
Further, after deploying the resource pre-occupation policy successfully verified to the target edge node, the method further includes: acquiring the deployment time of a resource pre-occupation strategy; and deleting the resource pre-occupation strategy and releasing the locking of the locked resources contained in the resource pre-occupation strategy after the deployment time exceeds the strategy effective time. Specifically, in order to avoid the reduction of the resource utilization rate caused by the overlong resource locking time and the service processing of other users, the resource pre-occupation policy is managed according to the policy effective time of the preset resource pre-occupation policy. After the successfully verified resource pre-occupation strategy is deployed to the target edge node, the deployed time of the resource pre-occupation strategy is counted to obtain the deployed time of the resource pre-occupation strategy, and then whether the deployed time exceeds the preset strategy effective time is detected. Under the condition that the deployment time does not exceed the policy effective time, judging that the resource pre-occupation policy is still in an effective state; and under the condition that the deployment time exceeds the policy effective time, judging that the resource pre-occupation policy is invalid, deleting the resource pre-occupation policy deployed on the target edge node and the storage record of the resource pre-occupation policy in the scheduling module, and releasing the locking state of the resource locked on the target edge node according to the resource pre-occupation policy. By deleting the resource pre-occupation strategy and releasing the locking of the locked resource after the deployment time of the resource pre-occupation strategy reaches the set strategy effective time, the reduction of the resource utilization rate caused by overlong resource locking time is avoided.
It should be noted that the policy effective time may be determined according to the performance of the resource scheduling system or the number of services that the edge node needs to process, and the specific determination and setting manner of the policy effective time is not limited in this embodiment.
And 103, preferentially calling the available locking resources to serve the user under the condition that the available locking resources exist.
Specifically, after the resource scheduling system completes the detection of whether the locking resource available for the resource invocation request exists on the edge node responding to the resource invocation request, the resource scheduling system takes the set of the available locking resource and the non-locked idle resource as the standby resource set of the resource invocation request under the condition that the locking resource available for the resource invocation request exists on the edge node. And then whether the standby resource set can meet the requirement of the resource calling request is detected, under the condition that the standby resource set can meet the requirement of the resource calling request, the locked resource in the standby resource set is preferentially called to serve the user, and when the locked resource is not enough to meet the requirement of the resource calling request, the non-locked resource in the standby resource set is called to serve the user, so that the user can complete the creation of resources such as a virtual machine or a container according to the allocated resources. And under the condition that the standby resource set cannot meet the requirement of the resource calling request, directly feeding back the resource calling failure. And when the resources are called to serve the user, updating the resource occupation state of the edge node in real time through the resource management module, and identifying the called resources as a non-idle state.
And 104, calling the non-locked resource to serve the user under the condition that the available locked resource does not exist.
Specifically, after the resource scheduling system completes detection of whether a locked resource available for a resource calling request exists on an edge node responding to the resource calling request, under the condition that the locked resource available for the resource calling request does not exist on the edge node, the resource scheduling system directly takes an unlocked idle resource on the edge node as a standby resource set, then detects whether the standby resource set can meet the requirement of the resource calling request, and under the condition that the standby resource set can meet the requirement of the resource calling request, the resource scheduling system calls the unlocked resource in the standby resource set to serve a user, so that the user can complete the creation of resources such as a virtual machine or a container according to the allocated resource. And under the condition that the standby resource set cannot meet the requirement of the resource calling request, directly feeding back the resource calling failure. And when the resources are called to serve the user, updating the resource occupation state of the edge node in real time through the resource management module, and identifying the called resources as a non-idle state.
In addition, it should be understood that the above steps of the various methods are divided for clarity, and the implementation may be combined into one step or split into some steps, and the steps are divided into multiple steps, so long as the same logical relationship is included in the protection scope of the present patent; it is within the scope of the patent to add insignificant modifications to the algorithms or processes or to introduce insignificant design changes to the core design without changing the algorithms or processes.
Another aspect of the embodiments of the present application also relates to a resource invoking device, with reference to fig. 3, including:
the receiving module 301 is configured to receive a resource invocation request initiated by a user, where the resource invocation request carries a user identifier and a service identifier.
A detection module 302, configured to detect whether a locked resource available to a resource invocation request exists in an edge node responding to the resource invocation request according to a pre-deployed resource pre-occupation policy, a user identifier, and a service identifier; the resource pre-occupation strategy comprises locked resources and a user set and/or a service set which can call the locked resources.
The scheduling module 303 is configured to preferentially invoke an available locked resource to serve a user in the presence of the available locked resource; in the event that there is no locked resource available, the non-locked resource is invoked to service the user.
It should be understood that the present embodiment is an apparatus embodiment corresponding to the method embodiment, and the present embodiment can be implemented in cooperation with the method embodiment. The related technical details mentioned in the method embodiment are still valid in this embodiment, and are not described herein again in order to reduce repetition. Accordingly, the related art details mentioned in the present embodiment can also be applied in the method embodiment.
It should be noted that, all the modules involved in this embodiment are logic modules, and in practical application, one logic unit may be one physical unit, may also be a part of one physical unit, and may also be implemented by a combination of multiple physical units. In addition, in order to highlight the innovative part of the present invention, a unit which is not so closely related to solve the technical problem proposed by the present invention is not introduced in the present embodiment, but this does not indicate that there is no other unit in the present embodiment.
Another aspect of the embodiments of the present application further provides an electronic device, with reference to fig. 4, including: comprises at least one processor 401; and a memory 402 communicatively coupled to the at least one processor 401; the memory 402 stores instructions executable by the at least one processor 401, and the instructions are executed by the at least one processor 401 to enable the at least one processor 401 to execute the resource calling method described in any of the above method embodiments.
Where the memory 402 and the processor 401 are coupled by a bus, which may include any number of interconnected buses and bridges that couple one or more of the various circuits of the processor 401 and the memory 402 together. The bus may also connect various other circuits such as peripherals, voltage regulators, power management circuits, and the like, which are well known in the art, and therefore, will not be described any further herein. A bus interface provides an interface between the bus and the transceiver. The transceiver may be one element or a plurality of elements, such as a plurality of receivers and transmitters, providing a means for communicating with various other apparatus over a transmission medium. The data processed by the processor 401 may be transmitted over a wireless medium via an antenna, which may receive the data and transmit the data to the processor 401.
The processor 401 is responsible for managing the bus and general processing and may provide various functions including timing, peripheral interfaces, voltage regulation, power management, and other control functions. And memory 402 may be used to store data used by processor 401 in performing operations.
Another aspect of the embodiments of the present application also provides a computer-readable storage medium storing a computer program. The computer program realizes the above-described method embodiments when executed by a processor.
That is, as can be understood by those skilled in the art, all or part of the steps in the method for implementing the embodiments described above may be implemented by a program instructing related hardware, where the program is stored in a storage medium and includes several instructions to enable a device (which may be a single chip, a chip, or the like) or a processor (processor) to execute all or part of the steps of the method described in the embodiments of the present application. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk, and various media capable of storing program codes.
It will be understood by those of ordinary skill in the art that the foregoing embodiments are specific examples for carrying out the present application, and that various changes in form and details may be made therein without departing from the spirit and scope of the present application in practice.

Claims (11)

1. A method for resource invocation, comprising:
receiving a resource calling request initiated by a user, wherein the resource calling request carries a user identifier and a service identifier;
detecting whether a locking resource available for the resource calling request exists in an edge node responding to the resource calling request or not according to a pre-deployed resource pre-occupation strategy, the user identifier and the service identifier; the resource pre-occupation strategy comprises a locked resource and a user set and/or a service set which can call the locked resource;
in the case that the available locking resources exist, preferentially calling the available locking resources to serve the user;
in the absence of the available locked resource, invoking a non-locked resource to service the user.
2. The method according to claim 1, wherein the pre-deployed resource pre-occupation policy includes a plurality of pre-deployed resource pre-occupation policies, and the detecting whether there is a locked resource available for the resource invocation request in the edge node responding to the resource invocation request according to the pre-deployed resource pre-occupation policy, the user id, and the service id includes:
detecting whether a target resource pre-occupation strategy meeting preset conditions exists in the pre-deployed resource pre-occupation strategies; the preset condition includes that the user set includes the user identifier, and/or the service set includes the service identifier;
under the condition that the target resource pre-occupation strategy is detected to exist, taking the resource locked by the target resource pre-occupation strategy as a locking resource available for the resource calling request;
and under the condition that the target resource pre-occupation strategy is detected to be absent, judging that the available locking resource does not exist in the resource calling request.
3. The method according to claim 2, wherein each of the resource pre-occupation policies has a priority interval; the detecting whether a target resource pre-occupation strategy meeting a preset condition exists in the pre-deployed resource pre-occupation strategies comprises:
taking all resource pre-occupation strategies meeting the preset conditions as alternative resource pre-occupation strategies;
acquiring the service priority of the resource calling request;
and according to the service priority, determining the target resource pre-occupation strategy in the alternative resource pre-occupation strategies, wherein the priority interval of the target resource pre-occupation strategy comprises the service priority.
4. The resource calling method of claim 1, further comprising:
acquiring each resource pre-occupation strategy to be deployed, and verifying each resource pre-occupation strategy to be deployed;
and deploying the successfully verified resource pre-occupation strategy to a target edge node, and setting a plurality of resources in the target edge node as locked resources according to the locked resources contained in the resource pre-occupation strategy.
5. The resource calling method according to claim 4, wherein the verifying each of the resource pre-occupation policies to be deployed comprises: performing a check of any one or any combination of:
whether the occupiable resources of the target edge node can meet the resource occupation requirement of the resource pre-occupation strategy, whether each user contained in the user set in the resource pre-occupation strategy is legal, and whether the priority interval in the resource pre-occupation strategy is legal.
6. The resource calling method according to claim 4, wherein the target edge node is determined according to the obtained administrator instruction, a preset load balancing policy or a proximity principle.
7. The method according to any one of claims 4 to 6, wherein each of the resource pre-occupation policies is provided with a policy validation time, and the verifying each of the resource pre-occupation policies to be deployed includes: and checking whether the effective time of the strategy in the resource pre-occupation strategy is legal or not.
8. The method according to claim 7, further comprising, after the deploying the verified resource pre-occupation policy to the target edge node:
acquiring the deployment time of the resource pre-occupation strategy;
and deleting the resource pre-occupation strategy and releasing the locking of the locked resources contained in the resource pre-occupation strategy after the deployment time exceeds the strategy effective time.
9. A resource invocation apparatus, comprising:
the system comprises a receiving module, a sending module and a receiving module, wherein the receiving module is used for receiving a resource calling request initiated by a user, and the resource calling request carries a user identifier and a service identifier;
the detection module is used for detecting whether the locking resource available for the resource calling request exists in the edge node responding to the resource calling request according to a pre-deployed resource pre-occupation strategy, the user identifier and the service identifier; the resource pre-occupation strategy comprises a locked resource and a user set and/or a service set which can call the locked resource;
the scheduling module is used for preferentially calling the available locking resources to serve the user under the condition that the available locking resources exist; in the absence of the available locked resource, invoking a non-locked resource to service the user.
10. An electronic device, comprising:
at least one processor; and the number of the first and second groups,
a memory communicatively coupled to the at least one processor; wherein the content of the first and second substances,
the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the resource invocation method of any of claims 1-8.
11. A computer-readable storage medium storing a computer program, wherein the computer program, when executed by a processor, implements the resource invocation method of any of claims 1-8.
CN202210134700.4A 2022-02-14 2022-02-14 Resource calling method and device, electronic equipment and storage medium Pending CN114666410A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210134700.4A CN114666410A (en) 2022-02-14 2022-02-14 Resource calling method and device, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210134700.4A CN114666410A (en) 2022-02-14 2022-02-14 Resource calling method and device, electronic equipment and storage medium

Publications (1)

Publication Number Publication Date
CN114666410A true CN114666410A (en) 2022-06-24

Family

ID=82026792

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210134700.4A Pending CN114666410A (en) 2022-02-14 2022-02-14 Resource calling method and device, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN114666410A (en)

Citations (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1047226A2 (en) * 1999-03-03 2000-10-25 Hitachi, Ltd. Communication quality assurance type network system
CN1510935A (en) * 2002-12-21 2004-07-07 华为技术有限公司 Method for resource planning method in communication system
KR20050066632A (en) * 2003-12-26 2005-06-30 한국전자통신연구원 System and method for resource allocation of mobile communication network
CN1716873A (en) * 2004-06-28 2006-01-04 华为技术有限公司 Method and system for managing intelligent external equipment in intelligent network
CN1867175A (en) * 2005-11-25 2006-11-22 华为技术有限公司 Wireless resource distributing process and apparatus
CN102917413A (en) * 2011-08-02 2013-02-06 中兴通讯股份有限公司 Resource reservation method and device in relocation process
CN103096391A (en) * 2011-11-02 2013-05-08 华为终端有限公司 Resource optimization method and device under multiple public data network (PDN) connections
CN104079503A (en) * 2013-03-27 2014-10-01 华为技术有限公司 Method and device of distributing resources
CN104219768A (en) * 2014-08-29 2014-12-17 大唐移动通信设备有限公司 Differentiated user service management method and device
CN107786455A (en) * 2016-08-24 2018-03-09 中兴通讯股份有限公司 Resource adjusting method, apparatus and system
CN108243501A (en) * 2016-12-27 2018-07-03 维沃移动通信有限公司 A kind of dispatching method of transfer resource, the network equipment and terminal device
CN111176852A (en) * 2020-01-15 2020-05-19 上海依图网络科技有限公司 Resource allocation method, device, chip and computer readable storage medium
CN111866789A (en) * 2019-04-24 2020-10-30 华为技术有限公司 Communication method, device and equipment
CN112084021A (en) * 2020-08-14 2020-12-15 刘俊锋 Interface configuration method, device and equipment of education system and readable storage medium
CN113360284A (en) * 2021-06-04 2021-09-07 深圳前海微众银行股份有限公司 Resource management method, device and equipment

Patent Citations (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1047226A2 (en) * 1999-03-03 2000-10-25 Hitachi, Ltd. Communication quality assurance type network system
CN1510935A (en) * 2002-12-21 2004-07-07 华为技术有限公司 Method for resource planning method in communication system
KR20050066632A (en) * 2003-12-26 2005-06-30 한국전자통신연구원 System and method for resource allocation of mobile communication network
CN1716873A (en) * 2004-06-28 2006-01-04 华为技术有限公司 Method and system for managing intelligent external equipment in intelligent network
CN1867175A (en) * 2005-11-25 2006-11-22 华为技术有限公司 Wireless resource distributing process and apparatus
CN102917413A (en) * 2011-08-02 2013-02-06 中兴通讯股份有限公司 Resource reservation method and device in relocation process
CN103096391A (en) * 2011-11-02 2013-05-08 华为终端有限公司 Resource optimization method and device under multiple public data network (PDN) connections
CN104079503A (en) * 2013-03-27 2014-10-01 华为技术有限公司 Method and device of distributing resources
CN104219768A (en) * 2014-08-29 2014-12-17 大唐移动通信设备有限公司 Differentiated user service management method and device
CN107786455A (en) * 2016-08-24 2018-03-09 中兴通讯股份有限公司 Resource adjusting method, apparatus and system
CN108243501A (en) * 2016-12-27 2018-07-03 维沃移动通信有限公司 A kind of dispatching method of transfer resource, the network equipment and terminal device
CN111866789A (en) * 2019-04-24 2020-10-30 华为技术有限公司 Communication method, device and equipment
CN111176852A (en) * 2020-01-15 2020-05-19 上海依图网络科技有限公司 Resource allocation method, device, chip and computer readable storage medium
CN112084021A (en) * 2020-08-14 2020-12-15 刘俊锋 Interface configuration method, device and equipment of education system and readable storage medium
CN113360284A (en) * 2021-06-04 2021-09-07 深圳前海微众银行股份有限公司 Resource management method, device and equipment

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
鞠照明;王玲芳;刘磊;: "互动电视边缘资源管理系统的设计与实现", 计算机工程, no. 17, 5 September 2012 (2012-09-05), pages 3 *

Similar Documents

Publication Publication Date Title
CN113169952B (en) Container cloud management system based on block chain technology
US20210004258A1 (en) Method and Apparatus for Creating Virtual Machine
US10523529B2 (en) Method and apparatus for deploying network service
EP3313023B1 (en) Life cycle management method and apparatus
CN109067877B (en) Control method for cloud computing platform deployment, server and storage medium
CN110289999B (en) Data processing method, system and device
KR20190020073A (en) Acceleration resource processing method and apparatus, and network function virtualization system
CN104168333A (en) Working method of PROXZONE service platform
US20120239810A1 (en) System, method and computer program product for clustered computer environment partition resolution
US9264339B2 (en) Hosted network management
US20230261950A1 (en) Method of container cluster management and system thereof
US20210203714A1 (en) System and method for identifying capabilities and limitations of an orchestration based application integration
CN108304251B (en) Thread synchronization method and server
US20030217152A1 (en) Resource sharing with database synchronization
WO2021234464A2 (en) Systems and methods for device detection and registration
CN114979286A (en) Access control method, device and equipment for container service and computer storage medium
CN109213567B (en) Method and equipment for managing VNF instantiation
CN111885031A (en) Fine-grained access control method and system based on session process
EP4177742A1 (en) Multitenancy management method and apparatus
CN111935195B (en) Distributed system management method, device, storage medium and distributed management system
US20200233722A1 (en) Method for auditing a virtualised resource deployed in a cloud computing network
CN112631766B (en) Dynamic adjustment method and device for project environment resources
CN112181599A (en) Model training method, device and storage medium
CN114666410A (en) Resource calling method and device, electronic equipment and storage medium
US20200327002A1 (en) Methods, devices and computer program products for managing software function

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination