CN115543220B - Access management method and device, computer equipment and storage medium - Google Patents

Access management method and device, computer equipment and storage medium Download PDF

Info

Publication number
CN115543220B
CN115543220B CN202211508580.6A CN202211508580A CN115543220B CN 115543220 B CN115543220 B CN 115543220B CN 202211508580 A CN202211508580 A CN 202211508580A CN 115543220 B CN115543220 B CN 115543220B
Authority
CN
China
Prior art keywords
controller
request
accessing
path
reverse proxy
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202211508580.6A
Other languages
Chinese (zh)
Other versions
CN115543220A (en
Inventor
王大会
孟坤
梁裕培
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Lvsuan Technology Co ltd
Original Assignee
Guangdong Lvsuan Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Lvsuan Technology Co ltd filed Critical Guangdong Lvsuan Technology Co ltd
Priority to CN202211508580.6A priority Critical patent/CN115543220B/en
Publication of CN115543220A publication Critical patent/CN115543220A/en
Application granted granted Critical
Publication of CN115543220B publication Critical patent/CN115543220B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0602Interfaces specially adapted for storage systems specifically adapted to achieve a particular effect
    • G06F3/0604Improving or facilitating administration, e.g. storage management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0628Interfaces specially adapted for storage systems making use of a particular technique
    • G06F3/0655Vertical data movement, i.e. input-output transfer; data movement between one or more hosts and one or more storage devices
    • G06F3/0658Controller construction arrangements
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0668Interfaces specially adapted for storage systems adopting a particular infrastructure
    • G06F3/0671In-line storage system
    • G06F3/0683Plurality of storage devices
    • G06F3/0688Non-volatile semiconductor memory arrays

Abstract

The application relates to an access management method, a device, equipment and a medium for a double-control full-flash disk storage array, which comprise the following steps: receiving an access request and analyzing a request path of the access request by adopting a first reverse proxy component; if the request path comprises a path pointing to the first controller, analyzing a request for accessing the first controller from the access request by adopting a first reverse proxy component, and sending the request for accessing the first controller to a server of the first controller; and if the request path comprises a path pointing to the second controller, the first reverse proxy component is adopted to analyze the request for accessing the second controller from the access request, and the request for accessing the second controller is routed to the second reverse proxy component through the internal network port communication connection, so that the second reverse proxy component sends the request for accessing the second controller to a server side of the second controller. The method can enable any controller of the double-control JBOF to provide access information of the two controllers.

Description

Access management method and device, computer equipment and storage medium
Technical Field
The present application relates to the technical field of dual-control full-flash disk storage arrays, and in particular, to a method and an apparatus for access management of a dual-control full-flash disk storage array, a computer device, and a computer-readable storage medium.
Background
The double control JBOF (full flash disk storage array) is controlled by two controllers. As shown in FIG. 1, the two controllers of the dual-control JBOF are BMC _ A and BMC _ B, respectively. Each controller is provided with a management network port and a group of internal communication serial ports and network ports, the management network port provides web services to the outside, and a user can access and set the double-control JBOF through the management network port. The internal network port and the serial port are mainly used for information interaction, parameter configuration, fault alarm and the like among the controllers.
In the current management mode of the double-control full-flash disk storage array, any controller only provides access information in the self controller to the outside. When a user needs to access the information of the two controllers, the user needs to respectively request the web services of the two controllers. Therefore, when information access is performed on the double-control full-flash disk storage array, the operation of a user is complicated, and the external access efficiency provided by the double-control JBOF is low.
Disclosure of Invention
Therefore, it is necessary to provide an access management method and apparatus for a dual-control full-flash disk storage array, a computer device, and a computer readable storage medium for solving the above technical problems, so that any controller of the dual-control full-flash disk storage array can provide access information of two controllers for a user, thereby reducing operations of accessing information by the user and improving external access efficiency provided by the dual-control full-flash disk storage array.
A double-control full-flash disk storage array access management method is provided, the full-flash disk storage array is controlled and managed by a first controller and a second controller, the first controller and the second controller are in communication connection through an internal network port, the first controller is provided with a first reverse proxy component, the second controller is provided with a second reverse proxy component, the double-control full-flash disk storage array access management method is applied to the first controller, and the double-control full-flash disk storage array access management method comprises the following steps: receiving an access request and analyzing a request path of the access request by adopting a first reverse proxy component; if the request path comprises a path pointing to the first controller, analyzing a request for accessing the first controller from the access request by adopting a first reverse proxy component, and sending the request for accessing the first controller to a server of the first controller so that the server of the first controller responds to the request for accessing the first controller; if the request path comprises a path pointing to the second controller, the first reverse proxy component is adopted to analyze the request for accessing the second controller from the access request, and the request for accessing the second controller is routed to the second reverse proxy component through the internal network port communication connection, so that the second reverse proxy component sends the request for accessing the second controller to the server side of the second controller, and the server side of the second controller responds to the request for accessing the second controller.
In one embodiment, parsing out a request path of an access request includes: acquiring configuration information of a first reverse proxy component, wherein the configuration information comprises path information of a first controller and path information of a second controller; and resolving a request path of the access request by adopting the first reverse proxy component based on the path information of the first controller and the path information of the second controller.
In one embodiment, parsing out a request path of an access request using a first reverse proxy component and based on path information of a first controller and path information of a second controller includes: reading the path information of the first controller and the path information of the second controller by adopting a first reverse proxy component; if the access request contains the path information of the first controller, analyzing that the request path contains a path pointing to the first controller; if the access request contains the path information of the second controller, the request path containing the path pointing to the second controller is analyzed.
In one embodiment, sending a request to access a first controller to a server of the first controller includes: acquiring routing information of a server of the first controller from the configuration information of the first reverse proxy component, and identifying a server path of the first controller according to the routing information of the server of the first controller; sending a request for accessing the first controller to a server of the first controller through the first reverse proxy component according to the server path of the first controller; routing a request to access the second controller to the second reverse-proxy component over the intranet portal communication connection, comprising: and acquiring the network address information of the internal network port of the second controller from the configuration information of the first reverse proxy component, and routing a request for accessing the second controller to the second reverse proxy component according to the network address information of the internal network port of the second controller by adopting internal network port communication connection.
In one embodiment, the accessing the request includes accessing a device information obtaining request of the first controller, and the responding of the server of the first controller to the request of accessing the first controller includes: the server side of the first controller identifies a first hardware interface corresponding to the equipment information acquisition request for accessing the first controller, reads the equipment information of the corresponding equipment through the first hardware interface, and feeds the read equipment information back to the user side of the access request through the first reverse proxy component; and/or the access request comprises a device information acquisition request for accessing the second controller, and the server side of the second controller responds to the request for accessing the second controller, and the method comprises the following steps: and the server side of the second controller identifies a second hardware interface corresponding to the equipment information acquisition request for accessing the second controller, reads the equipment information of the corresponding equipment through the second hardware interface, and feeds the read equipment information back to the first reverse proxy component through the second reverse proxy component and the internal network port communication connection so as to be fed back to the user side of the access request by the first reverse proxy component.
In one embodiment, the accessing request includes a device parameter configuration request for accessing the first controller, and the server of the first controller responds to the request for accessing the first controller, including: the server side of the first controller identifies a third hardware interface corresponding to the equipment parameter configuration request for accessing the first controller, and sends the configuration parameters of the equipment parameter configuration request for accessing the first controller to corresponding equipment through the third hardware interface so that the corresponding equipment can perform configuration based on the configuration parameters; and/or the access request comprises a device parameter configuration request for accessing the second controller, and the server side of the second controller responds to the request for accessing the second controller, and the method comprises the following steps: and the server side of the second controller identifies a fourth hardware interface corresponding to the device parameter configuration request for accessing the second controller, and sends the configuration parameters of the device parameter configuration request for accessing the second controller to corresponding devices through the fourth hardware interface so as to configure the devices based on the configuration parameters.
In one embodiment, receiving an access request and parsing out a request path of the access request with a first reverse proxy component includes: receiving an access request by adopting a first reverse proxy component and returning to the web service according to the access request, wherein the front end of the web service displays access information; and receiving access information triggered by a user by adopting a first reverse proxy component, and analyzing a request path corresponding to the access information.
The utility model provides an access management device of two accuse full flash of disk storage arrays, full flash of disk storage array is controlled and is managed by first controller and second controller, and first controller passes through intranet mouth communication connection with the second controller, and first controller disposes first reverse proxy subassembly, and the second controller disposes the reverse proxy subassembly of second, and an access management device of two accuse full flash of disk storage arrays is applied to first controller, includes: the receiving module is used for receiving the access request by adopting the first reverse proxy component and analyzing a request path of the access request; the first response module is used for analyzing the request for accessing the first controller from the access request by adopting the first reverse proxy component and sending the request for accessing the first controller to the server of the first controller if the request path contains a path pointing to the first controller, so that the server of the first controller responds to the request for accessing the first controller; and the second response module is used for analyzing the request for accessing the second controller from the access request by adopting the first reverse proxy component if the request path contains a path pointing to the second controller, routing the request for accessing the second controller to the second reverse proxy component through the communication connection between the first controller and the internal network port of the second controller, so that the second reverse proxy component sends the request for accessing the second controller to the server of the second controller, and the server of the second controller responds to the request for accessing the second controller.
A computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, the processor implementing the steps of the method of any of the embodiments when executing the computer program.
A computer-readable storage medium, on which a computer program is stored which, when being executed by a processor, carries out the steps of the method of any of the above embodiments.
The double-control full-flash disk storage array is controlled and managed by a first controller and a second controller, the first controller is in communication connection with the second controller through an internal network port, the first controller is provided with a first reverse proxy component, and the second controller is provided with a second reverse proxy component. Since the first controller and the second controller are both provided with reverse proxy components, when the first controller receives the access request, the request path of the access request is resolved through the first reverse proxy component. If the access request contains a path pointing to the first controller, the first reverse proxy component is adopted to analyze the request for accessing the first controller from the access request, and the request for accessing the first controller is sent to the server side of the first controller, so that the server side of the first controller responds to the request for accessing the first controller, and the access information is fed back to the user. If the request path comprises a path pointing to the second controller, the first reverse proxy component is adopted to analyze the request for accessing the second controller from the access request, and the request for accessing the second controller is routed to the second reverse proxy component through the internal network port communication connection, so that the second reverse proxy component sends the request for accessing the second controller to a server of the second controller, and the server of the second controller responds to the request for accessing the second controller to feed back access information to the user.
Therefore, any controller of the double-control full-flash disk storage array can provide access information of the two controllers for a user, so that the operation of accessing the information by the user is reduced, and the external access efficiency provided by the double-control full-flash disk storage array is improved.
Drawings
FIG. 1 is a block diagram of a dual-controller flash disk array according to an embodiment of the present invention;
FIG. 2 is a block diagram of a dual-controller full-flash disk storage array according to an embodiment of the present application;
FIG. 3 is a block diagram of the main components within the BMC in one embodiment of the application;
FIG. 4 is a flowchart illustrating a method for managing access to a dual-control all-flash disk storage array according to an embodiment of the present application;
FIG. 5 is a flow chart illustrating the main operation of the web service of the dual-control full-flash disk storage array according to an embodiment of the present application;
FIG. 6 is a block diagram of an embodiment of an apparatus for managing access to a dual-ported flash disk storage array;
FIG. 7 is a diagram illustrating an internal structure of a computer device according to an embodiment.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the present application and are not intended to limit the present application.
The access management method for the double-control full-flash disk storage array provided by the application can be applied to the structure of the double-control full-flash disk storage array shown in fig. 2. As shown in fig. 2, the flash disk array is controlled and managed by a first controller and a second controller, the first controller is communicatively connected to the second controller through an internal network port, the first controller is configured with a first reverse proxy component, and the second controller is configured with a second reverse proxy component. The access management method of the double-control full-flash disk storage array is applied to the first controller. Specifically, the first controller receives an access request sent by a user side through a management network port of the first controller, and receives the access request and resolves a request path of the access request by adopting the first reverse proxy component. If the request path comprises a path pointing to the first controller, namely a path pointing to a local server of the first controller, the first reverse proxy component is adopted to analyze the request for accessing the first controller from the access request, and the request for accessing the first controller is sent to the server of the first controller, so that the server of the first controller responds to the request for accessing the first controller. Specifically, a request for accessing the first controller is routed to a server of the first controller through a CGI (Common Gateway Interface) script program on a local side of the first controller. If the request path comprises a path pointing to the second controller, the first reverse proxy component is adopted to analyze the request for accessing the second controller from the access request, and the request for accessing the second controller is routed to the second reverse proxy component through the internal network port communication connection, so that the second reverse proxy component sends the request for accessing the second controller to the server of the second controller, and the server of the second controller responds to the request for accessing the second controller. Specifically, the second reverse proxy component of the second controller routes the request to access the second controller to the server of the second controller through the cgi script program of the local side.
It should be noted that the first controller and the second controller are only two controllers for distinguishing the dual-control full-flash disk storage array, and the first controller and the second controller are not particularly specified. When any one of the two controllers of the double-control full-flash disk storage array is selected as a first controller, the other controller is selected as a second controller. The two controllers can both realize the access management method of the double-control full-flash disk storage array. Specifically, the first Controller and the second Controller are both BMCs (Baseboard Management controllers).
In an embodiment, the present application provides an access management method for a dual-control full-flash disk storage array, as shown in fig. 2, the full-flash disk storage array is controlled and managed by a first controller and a second controller, the first controller is communicatively connected to the second controller through an internal network port, the first controller is configured with a first reverse proxy component, and the second controller is configured with a second reverse proxy component. The first controller and the second controller are both BMCs. The main components inside the BMC are shown in FIG. 3, and the description of each component is as follows:
(1) A nginx component: is the bottom layer component of the whole web service, is responsible for the routing of the web service, and is completed by a reverse proxy;
(2) web software services: the whole web service framework contains various graphic components of web display;
(3) CGI script service: providing service for accessing hardware equipment and json format parameter reading;
(4) The web is a direct client component, providing various setting interfaces and display functions.
The access management method for the double-control full-flash disk storage array is applied to the first controller shown in fig. 2, and as shown in fig. 4, includes the following steps:
s402, receiving the access request by adopting the first reverse proxy component and analyzing a request path of the access request.
In this embodiment, the first controller is configured with a first reverse proxy component. The first reverse proxy component may be a nginx (engine x, a high performance HTTP and reverse proxy web server) server. When the first controller receives an access request sent by a user through the management network port of the first controller, the first reverse proxy component receives and processes the access request, and a request path of the first controller is analyzed from the access request. Wherein, the request path refers to a path of an object of the access request. The request path may include a path directed to the first controller and/or a path directed to the second controller. When the request path includes a path directed to the first controller, it indicates that the access request of the user includes a service requesting the first controller. When the request path includes a path directed to the second controller, it indicates that the user's access request includes a service requesting the second controller. When the request path includes both a path directed to the first controller and a path directed to the second controller, it indicates that the access request of the user includes a service requesting the first controller and a service requesting the second controller.
In an example of this embodiment, the receiving, by the first reverse proxy component, the access request and resolving a request path of the access request includes: receiving an access request by adopting a first reverse proxy component and returning to the web service according to the access request, wherein the front end of the web service displays access information; and receiving access information triggered by a user by adopting a first reverse proxy component, and analyzing a request path corresponding to the access information.
In this example, the main components inside the BMC of FIG. 3 are incorporated. The user terminal inputs the web address of the first controller and submits the access request to the nginx server of the management internet access of the first controller. And after receiving the access request, the nginx server provides the web service, and the front end of the web service displays the access information. The access information includes provided information of the first controller and provided information of the second controller. When the user triggers the selection of the provided information of the first controller and/or the provided information of the second controller, the user terminal generates an access request based on the provided information of the first controller and/or the provided information of the second controller, wherein the path directed to the first controller and the request for accessing the first controller and/or the path directed to the second controller and the request for accessing the second controller are packaged in the access request. The first reverse proxy component of the first controller is capable of parsing out the path information and request information of the access request.
S404, if the request path includes a path pointing to the first controller, parsing, by using the first reverse proxy component, the request for accessing the first controller from the access request, and sending, to the server of the first controller, the request for accessing the first controller, so that the server of the first controller responds to the request for accessing the first controller.
In this embodiment, if the parsed request path includes a path pointing to the first controller, the request path indicates that the user requests to access the information of the first controller. Further, a first reverse proxy component is employed to parse out a request to access the first controller from the access request. Specifically, the access request encapsulates a request to access the first controller and a path to the first controller. A path to the first controller means that the access request is directed to the first controller, and the request to access the first controller is a field in the access request that is explicitly directed to the first controller.
And sending a request for accessing the first controller to the server of the first controller, so that the server of the first controller responds to the request for accessing the first controller. If the request for accessing the first controller indicates that the parameter information of the flash-only disk storage array is requested, the server side of the first controller obtains the parameter information of the flash-only disk storage array, and feeds back the obtained parameter information of the flash-only disk storage array to the client side through the first reverse proxy component of the first controller.
S406, if the request path includes a path pointing to the second controller, the first reverse proxy component is adopted to parse the request for accessing the second controller from the access request, and route the request for accessing the second controller to the second reverse proxy component through the intranet interface communication connection, so that the second reverse proxy component sends the request for accessing the second controller to the server of the second controller, and the server of the second controller responds to the request for accessing the second controller.
In this embodiment, if the parsed request path includes a path pointing to the second controller, it indicates that the user requests information access of the second controller, and further, the first reverse proxy component is used to parse the request for accessing the second controller from the access request. A request to access the second controller is routed to the second reverse proxy component through the first controller and the second controlled intranet portal communication connection. Wherein the second reverse proxy component may be a nginx server. When the second reverse proxy component receives the request for accessing the second controller, the request for accessing the second controller is identified to be directed to the second controller, and the request for accessing the second controller is routed to the server of the second controller, so that the server of the second controller responds to the request for accessing the second controller.
The server of the second controller is used for responding to the request for accessing the second controller. If the request for accessing the second controller is a request for parameter information of the full-flash disk storage array, the server of the second controller obtains the parameter information of the full-flash disk storage array, and sends the obtained parameter information of the full-flash disk storage array to the first reverse proxy component through the second reverse proxy component of the second controller and the communication connection between the first controller and the internal network port of the second controller, and feeds back the obtained parameter information of the full-flash disk storage array to the user through the first reverse proxy component.
It should be noted that the request path of the access request obtained through the above parsing may include both a path pointing to the first controller and a path pointing to the second controller, or only include a path pointing to the first controller, or only include a path pointing to the second controller. If a path directed to the first controller and a path directed to the second controller are included, the processing is performed in steps S404 and S406, respectively. If only one path of the controller is included, the processing is performed in step S404 or step S406.
The main workflow in the access management method for the dual-control full-flash disk storage array is given below with reference to fig. 2 and fig. 3. The first controller is BMC _ A, and the second controller is BMC _ B. The first reverse proxy component and the second reverse proxy component are both nginx servers. The main workflow is the nginx reverse proxy workflow:
the main workflow of the web service of the double-control JBOF by adopting the nginx reverse proxy function is shown in FIG. 5. When the user browser inputs an ipv4 address 192.168.1.100 of the management internet access A, the nginx server of the BMC _ A returns the web service according to the request information, wherein the front end in the web service simultaneously requests parameters and data under the paths 192.168.1.100/web/A and 192.168.1.100/web/B service according to the display requirement. When the acquired parameter path is 192.168.1.100/web/A, the nginx server enables the mapping to point to the web service of the local BMC _ A according to the loaded configuration parameters and the analyzed request path; and when the acquired parameter path is 192.168.1.100/web/B, the nginx server routes the corresponding request to the BMC _ B according to the web/B route analyzed in the configuration parameters, and acquires the parameter information of the BMC _ B. When a user sets double-control JBOF parameters, the web front-end service submits user setting information to a back end, if the parameters of BMC-A are set, a parameter submitting path is 192.168.1.100/web/A end, and the parameters are submitted to a local CGI script service for processing after being analyzed by a nginx server of BMC-A; if the parameters of the BMC-B are set, the parameter submission path is 192.168.1.100/web/B end, and the parameters are submitted to a CGI script service processing of the BMC-B end after being analyzed by a nginx server of the BMC-A.
Similarly, when the user browser inputs the ipv4 address 192.168.1.101 of the management portal B, the nginx server of the BMC _ B returns to the user web service, and the web front-end service request obtains parameters and data under 192.168.1.101/web/a and 192.168.1.101/web/B services for display. When the acquired parameter path is 192.168.1.101/web/A, the nginx server of the BMC-B reversely proxies the route to the BMC-A according to the configuration parameter and the analyzed request path, and acquires the parameter information of the BMC-A; when the request path is 192.168.1.101/web/B, the nginx server of the BMC-B resolves to the web service of the native BMC-B; when the user sets the double-control JBOF through the BMC _ B, the web front-end service respectively submits to 192.168.1.100/web/A and 192.168.1.101/B according to the user setting information. If the BMC-A is set, the submission path is reversely routed to the BMC-A according to the configuration information of the nginx server of the BMC-B, and the BMC-A receives the configuration. If the BMC-B is set, the configuration information of the nginx server of the BMC-B is directly routed to the local end of the BMC-B, and the BMC-B receives the configuration request.
Therefore, the user can complete the management of the BMC _ A and the BMC _ B through one management network interface.
The double-control full-flash disk storage array is controlled and managed by a first controller and a second controller, the first controller is in communication connection with the second controller through an internal network port, the first controller is configured with a first reverse proxy component, and the second controller is configured with a second reverse proxy component. Since the first controller and the second controller are both provided with reverse proxy components, when the first controller receives the access request, the request path of the access request is resolved through the first reverse proxy component. If the access request comprises a path pointing to the first controller, the first reverse proxy component is adopted to analyze the request for accessing the first controller from the access request, and the request for accessing the first controller is sent to the server of the first controller, so that the server of the first controller responds to the request for accessing the first controller, and the access information is fed back to the user. If the request path comprises a path pointing to the second controller, the first reverse proxy component is adopted to analyze the request for accessing the second controller from the access request, and the request for accessing the second controller is routed to the second reverse proxy component through the internal network port communication connection, so that the second reverse proxy component sends the request for accessing the second controller to the server of the second controller, and the server of the second controller responds to the request for accessing the second controller to feed back access information to the user. Therefore, any controller of the double-control full-flash disk storage array can provide access information of the two controllers for a user, so that the operation of accessing the information by the user is reduced, and the external access efficiency provided by the double-control full-flash disk storage array is improved.
In an embodiment, the parsing a request path of an access request includes: acquiring configuration information of a first reverse proxy component, wherein the configuration information comprises path information of a first controller and path information of a second controller; and resolving a request path of the access request by adopting the first reverse proxy component based on the path information of the first controller and the path information of the second controller.
In this embodiment, in order to implement the function of setting the whole dual-control JBOF through one path of management network port, the first controller automatically starts the program of the first reverse proxy component and the nginx program when starting, and loads the relevant configuration information of the first reverse proxy component. For example, the first controller and the second controller are both baseboard management controllers, the first controller is BMC _ a, and the second controller is BMC _ B. The first reverse proxy component and the second reverse proxy component are both nginx servers.
The configuration information of the first reverse proxy component and the second reverse proxy component is as follows:
1) Nginx reverse proxy part configuration information of BMC (baseboard management controller) _ A end
location /web/A/ {
rewrite ^/web/A/(.*) /web/$1 break;
proxy_pass $scheme://$http_host;
}
location /web/B/ {
proxy_pass $scheme://199.188.70.101;
}
Figure 951290DEST_PATH_IMAGE001
location/web/A/: defining a routing address of the web/A;
Figure 806114DEST_PATH_IMAGE002
rewrite ^ web/A/(. About.)/web/$ 1 break: routing to a native web service;
Figure 8687DEST_PATH_IMAGE003
location/web/B/: defining a routing address of the web/B;
Figure 200634DEST_PATH_IMAGE004
proxy _ pass $ scheme://199.188.70.101: the reverse proxy service is routed to the controller of internal portal 199.188.70.101. The ip address is the BMC _ B internal port address as shown in FIG. 5.
2) Nginx reverse proxy part configuration information of BMC (baseboard management controller) _ B end
location /web/B/ {
rewrite ^/web/B/(.*) /web/$1 break;
proxy_pass $scheme://$http_host;
}
location /web/A/ {
proxy_pass $scheme://199.188.70.100;
}
Figure 952690DEST_PATH_IMAGE001
location/web/B/: defining a routing address of the web/B;
Figure 696524DEST_PATH_IMAGE002
rewrite ^ web/B/(. About.)/web/$ 1 break: is routed to the native web service and,
Figure 901240DEST_PATH_IMAGE003
location/web/A/: defining a routing address of the web/A;
Figure 522976DEST_PATH_IMAGE004
proxy _ pass $ scheme://199.188.70.100: the reverse proxy service is routed to internal portal 199.188.70.100, which is the internal portal address of BMC _ A as shown in FIG. 5.
The location/web/B/path information indicating BMC _ B, the location/web/a/path information indicating BMC _ a, and the first reverse proxy component may parse the request path of the access request through the path information of the first controller and the path information of the second controller in the configuration information.
In one embodiment, parsing out a request path of an access request using a first reverse proxy component and based on path information of a first controller and path information of a second controller includes: reading the path information of the first controller and the path information of the second controller by adopting a first reverse proxy component; if the access request contains the path information of the first controller, analyzing that the request path contains a path pointing to the first controller; if the access request contains the path information of the second controller, the request path is analyzed to contain a path pointing to the second controller.
In this embodiment, the request path of the access request is matched with the path information of the first controller and the path information of the second controller in the configuration information. If the request path of the access request contains the path information of the first controller, analyzing that the request path contains a path pointing to the first controller; if the request path of the access request contains the path information of the second controller, the request path containing the path pointing to the second controller is analyzed. For example, if the request path includes 192.168.1.100/web/a and 192.168.1.100/web/B, 192.168.1.100/web/a is identified as the path leading to the first controller by matching, and 192.168.1.100/web/B is identified as the path leading to the second controller by matching. Therefore, the request object of the access request can be accurately identified.
In one embodiment, sending a request to a server of a first controller to access the first controller comprises: acquiring routing information of a server of the first controller from the configuration information of the first reverse proxy component, and identifying a server path of the first controller according to the routing information of the server of the first controller; sending a request for accessing the first controller to a server of the first controller through the first reverse proxy component according to the server path of the first controller; routing a request to access the second controller to the second reverse-proxy component over the intranet portal communication connection, comprising: and acquiring the network address information of the internal network port of the second controller from the configuration information of the first reverse proxy component, and routing a request for accessing the second controller to the second reverse proxy component according to the network address information of the internal network port of the second controller by adopting internal network port communication connection.
In this embodiment, the configuration information includes routing information of the server of the first controller, such as a re write ^/web/A/(+)/web/$ 1 break in the configuration information: the routing to the local web service also comprises network address information of the internal network port of the second controller, such as proxy _ pass $ scheme://199.188.70.101: the reverse proxy service is routed to internal portal 199.188.70.101.
Thus, a request to access the first controller may be sent to a server of the first controller through the first reverse proxy component. And the request for accessing the second controller is routed to the second reverse proxy component by adopting the internal network port communication connection according to the network address information of the internal network port of the second controller. Therefore, the same management network port can be realized, and the access request is routed to the local machine or another controller.
In one embodiment, the accessing the request includes accessing a device information obtaining request of the first controller, and the responding of the request of the first controller by the server of the first controller includes: the server side of the first controller identifies a first hardware interface corresponding to the equipment information acquisition request for accessing the first controller, reads the equipment information of the corresponding equipment through the first hardware interface, and feeds the read equipment information back to the user side of the access request through the first reverse proxy component; and/or the access request comprises a device information acquisition request for accessing the second controller, and the server side of the second controller responds to the request for accessing the second controller, and the method comprises the following steps: and the server side of the second controller identifies a second hardware interface corresponding to the equipment information acquisition request for accessing the second controller, reads the equipment information of the corresponding equipment through the second hardware interface, and feeds the read equipment information back to the first reverse proxy component through the second reverse proxy component and the internal network port communication connection so as to be fed back to the user side of the access request by the first reverse proxy component.
In this embodiment, the device information acquisition request for accessing the first controller and the device information acquisition request for accessing the second controller are both used to request to acquire device information of the relevant device. The device information acquisition request for accessing the first controller and the device information acquisition request for accessing the second controller can both be realized by get requests. The get request is mainly used for acquiring equipment information of the double-control JOBF, such as equipment factory information, local ip, local time, SN (serial number), software version number, SSD (solid State disk) information, a temperature sensor, fan rotating speed data and the like.
In one embodiment, the accessing request includes a device parameter configuration request for accessing the first controller, and the server of the first controller responds to the request for accessing the first controller, including: the server side of the first controller identifies a third hardware interface corresponding to the equipment parameter configuration request for accessing the first controller, and sends the configuration parameters of the equipment parameter configuration request for accessing the first controller to corresponding equipment through the third hardware interface so that the corresponding equipment can perform configuration based on the configuration parameters; and/or the access request comprises a device parameter configuration request for accessing the second controller, and the server side of the second controller responds to the request for accessing the second controller, and the method comprises the following steps: and the server side of the second controller identifies a fourth hardware interface corresponding to the device parameter configuration request for accessing the second controller, and sends the configuration parameters of the device parameter configuration request for accessing the second controller to corresponding devices through the fourth hardware interface so as to configure the devices based on the configuration parameters.
In this embodiment, the device parameter configuration request for accessing the first controller and the device parameter configuration request for accessing the second controller are both used to request configuration of the device parameters of the relevant devices. The device parameter configuration request for accessing the first controller and the device parameter configuration request for accessing the second controller can both be realized by a post request. The post request is generally configured for user equipment parameters, such as ip address, gateway, ntp server, system time, and the like.
The device information obtaining request for accessing the first controller, the device parameter configuration request for accessing the first controller, and the device parameter configuration request for accessing the second controller are implemented by the CGI script service shown in fig. 3.
The CGI script service is mainly composed of CGI script programs, can receive json format setting information submitted by a user, and can return json format parameter information required by an access request of the user. For example, the device information acquisition request for accessing the first controller and the device information acquisition request for accessing the first controller are both used for the requested power supply information, and the CGI script program returns the power supply information in json format. The information returned by the CGI script program, that is, the device information acquisition request for accessing the first controller and the device information acquisition request for accessing the second controller, are both used to request to acquire device information of the relevant device as follows:
Figure 863959DEST_PATH_IMAGE005
equipment delivery information: the system comprises a BMC device model, a version number, an SN number, a firmware version number, factory information and the like;
Figure 44273DEST_PATH_IMAGE006
BMC network parameter information: the IP address, the gateway, the ntp server and the network mask of the controller of the double-control JBOF;
Figure 736286DEST_PATH_IMAGE007
log information: collecting system starting logs, fault alarm logs, setting logs and returning according to json format;
Figure 161713DEST_PATH_IMAGE008
power supply information: power supply input voltage, output voltage, input current, input and output power, power supply temperature; />
Figure 481836DEST_PATH_IMAGE009
Fan speed information: 4 fan speeds;
Figure 849364DEST_PATH_IMAGE010
SSD disk information: MVMe-oF Initiator connection information, SSD disk manufacturers, version numbers, SN numbers, temperatures and other data;
Figure 12361DEST_PATH_IMAGE011
port IP information: 6 traffic ports ip address, gateway, network mask, network mode (1x100g \2x50g), etc.;
Figure 959588DEST_PATH_IMAGE012
sensor data: onboard temperature sensors, chip temperature and bridge piece temperature;
Figure 25895DEST_PATH_IMAGE013
performance monitoring information: the method mainly comprises reading iops, bw and latency performance of the disk.
Therefore, according to the access management method for the double-control full-flash disk storage array, a user can read information of the two controllers and perform parameter configuration on the two controllers through the management network port of one controller in a reverse proxy mode. Any controller in the double-control JBOF can provide complete web service, and the user can realize the management of the whole double-control JBOF device through any management network port.
For the two embodiments, a specific implementation process is provided:
the user terminal inputs a web website managed by the BMC _ A, the user terminal submits an access request to a nginx server of a management gateway of the BMC _ A, the nginx server provides a web service after receiving the access request, and the web front end is used for providing a request to configure equipment parameters and request data to obtain. And if the request path of the access request points to the local machine, the access request is analyzed by the nginx server and then submitted to a web server side at the back end of the local machine. And if the request path of the access request points to another controller BMC _ B, the request path is analyzed by the nginx server and then is routed to the web server of the BMC _ B through the internal network port. The access request of the user is generally divided into two types of get and post; the get request is mainly used for acquiring device information of the double-control JOBF, namely the device information acquisition request, such as information of factory information, local ip, local time, SN (serial number), software version number, SSD (solid State disk) information, a temperature sensor, fan rotating speed data and the like of the device. The post request is generally a device parameter configuration request, such as ip address, gateway, ntp server, system time, etc. that needs to be set. And analyzing the get request and the post request by the nginx server, and finally submitting the get request and the post request to a CGI script program, wherein the CGI script program receives and processes the parameter data in the json format. If the request is a device parameter reading request, the CGI script program operates a hardware interface, the hardware interface comprises a serial port, an ic interface, a spi interface and the like, hardware information is read, for example, power supply information is read, and json format information is directly returned. If the request is the equipment parameter configuration request, the CGI script program receives the json format array submitted by the front end, operates the hardware interface which mainly comprises a serial port, an ic interface and a spi interface, and sets the parameter information to the peripheral equipment.
It should be understood that, although the steps in the flowchart are shown in order as indicated by the arrows, the steps are not necessarily performed in order as indicated by the arrows. The steps are not performed in the exact order shown and described, and may be performed in other orders, unless explicitly stated otherwise. Moreover, at least a portion of the steps in the flowchart may include multiple sub-steps or multiple stages, which are not necessarily performed at the same time, but may be performed at different times, and the order of performing the sub-steps or stages is not necessarily sequential, but may be performed alternately or alternately with other steps or at least a portion of the sub-steps or stages of other steps.
In an embodiment, the present application provides an access management apparatus for a dual-control full-flash disk storage array, where the full-flash disk storage array is controlled and managed by a first controller and a second controller, the first controller and the second controller are communicatively connected through an internal network port, the first controller is configured with a first reverse proxy component, the second controller is configured with a second reverse proxy component, and the access management apparatus for a dual-control full-flash disk storage array is applied to the first controller, as shown in fig. 6, and the access management apparatus for a dual-control full-flash disk storage array includes a receiving module 602, a first response module 604, and a second response module 606. A receiving module 602, configured to receive an access request and parse a request path of the access request by using a first reverse proxy component; a first response module 604, configured to, if the request path includes a path pointing to the first controller, parse, by using the first reverse proxy component, the request for accessing the first controller from the access request, and send, to the server of the first controller, the request for accessing the first controller, so that the server of the first controller responds to the request for accessing the first controller; a second response module 606, configured to, if the request path includes a path that points to the second controller, parse, by using the first reverse proxy component, the request for accessing the second controller from the access request, and route, through the communication connection between the first controller and the internal portal of the second controller, the request for accessing the second controller to the second reverse proxy component, so that the second reverse proxy component sends the request for accessing the second controller to the server of the second controller, and the server of the second controller responds to the request for accessing the second controller.
In one embodiment, parsing out a request path of an access request includes: acquiring configuration information of a first reverse proxy component, wherein the configuration information comprises path information of a first controller and path information of a second controller; and resolving a request path of the access request by adopting the first reverse proxy component based on the path information of the first controller and the path information of the second controller.
In one embodiment, parsing out a request path of an access request using a first reverse proxy component and based on path information of a first controller and path information of a second controller includes: reading the path information of the first controller and the path information of the second controller by adopting a first reverse proxy component; if the access request contains the path information of the first controller, analyzing that the request path contains a path pointing to the first controller; if the access request contains the path information of the second controller, the request path is analyzed to contain a path pointing to the second controller.
In one embodiment, sending a request to a server of a first controller to access the first controller comprises: acquiring routing information of a server of the first controller from the configuration information of the first reverse proxy component, and identifying a server path of the first controller according to the routing information of the server of the first controller; sending a request for accessing the first controller to a server of the first controller through the first reverse proxy component according to the server path of the first controller; routing a request to access the second controller to the second reverse-proxy component over the intranet portal communication connection, comprising: and acquiring the network address information of the internal network port of the second controller from the configuration information of the first reverse proxy component, and routing a request for accessing the second controller to the second reverse proxy component according to the network address information of the internal network port of the second controller by adopting internal network port communication connection.
In one embodiment, the accessing the request includes accessing a device information obtaining request of the first controller, and the responding of the request of the first controller by the server of the first controller includes: the server side of the first controller identifies a first hardware interface corresponding to the equipment information acquisition request for accessing the first controller, reads the equipment information of the corresponding equipment through the first hardware interface, and feeds the read equipment information back to the user side of the access request through the first reverse proxy component; and/or the access request comprises a device information acquisition request for accessing the second controller, and the server side of the second controller responds to the request for accessing the second controller, and the method comprises the following steps: and the server side of the second controller identifies a second hardware interface corresponding to the equipment information acquisition request for accessing the second controller, reads the equipment information of the corresponding equipment through the second hardware interface, and feeds the read equipment information back to the first reverse proxy component through the second reverse proxy component and the internal network port communication connection so as to be fed back to the user side of the access request by the first reverse proxy component.
In one embodiment, the accessing request includes a device parameter configuration request for accessing the first controller, and the server of the first controller responds to the request for accessing the first controller, including: the server side of the first controller identifies a third hardware interface corresponding to the equipment parameter configuration request for accessing the first controller, and sends the configuration parameters of the equipment parameter configuration request for accessing the first controller to corresponding equipment through the third hardware interface so that the corresponding equipment can perform configuration based on the configuration parameters; and/or the access request comprises a device parameter configuration request for accessing the second controller, and the server side of the second controller responds to the request for accessing the second controller, and the method comprises the following steps: and the server side of the second controller identifies a fourth hardware interface corresponding to the device parameter configuration request for accessing the second controller, and sends the configuration parameters of the device parameter configuration request for accessing the second controller to corresponding devices through the fourth hardware interface, so that the devices perform configuration based on the configuration parameters.
In one embodiment, receiving an access request and parsing out a request path for the access request with a first reverse proxy component includes: adopting a first reverse proxy component to receive the access request and return the web service according to the access request, wherein the front end of the web service displays the access information; and receiving access information triggered by a user by adopting a first reverse proxy component, and analyzing a request path corresponding to the access information.
For specific limitations of an access management apparatus for a dual-control full-flash disk storage array, refer to the above limitations on an access management method for a dual-control full-flash disk storage array, which are not described herein again. All modules in the access management device of the double-control full-flash disk storage array can be completely or partially realized by software, hardware and a combination thereof. The modules can be embedded in a hardware form or independent from a processor in the computer device, and can also be stored in a memory in the computer device in a software form, so that the processor can call and execute operations corresponding to the modules.
In one embodiment, a computer device is provided, wherein the computer device is the first controller or the second controller, and may be a BMC, and the internal structure diagram of the computer device may be as shown in fig. 7. The computer device includes a processor, a memory, and a network interface connected by a system bus. Wherein the processor of the computer device is configured to provide computing and control capabilities. The memory of the computer device comprises a nonvolatile storage medium and an internal memory. The non-volatile storage medium stores an operating system and a computer program. The internal memory provides an environment for the operation of an operating system and computer programs in the non-volatile storage medium. The network interface of the computer device includes the management network port, the serial port and the internal network port, and the data transmission of the specific network interface refers to the description of the corresponding content of the above embodiment. The computer program is executed by a processor to realize an access management method of the double-control full-flash disk storage array.
In one embodiment, a computer device is provided, comprising a memory, a processor, and a computer program stored on the memory and executable on the processor, the processor implementing the following steps when executing the computer program: receiving an access request and analyzing a request path of the access request by adopting a first reverse proxy component; if the request path comprises a path pointing to the first controller, analyzing a request for accessing the first controller from the access request by adopting a first reverse proxy component, and sending the request for accessing the first controller to a server of the first controller so that the server of the first controller responds to the request for accessing the first controller; if the request path comprises a path pointing to the second controller, the first reverse proxy component is adopted to analyze the request for accessing the second controller from the access request, and the request for accessing the second controller is routed to the second reverse proxy component through the communication connection between the first controller and the internal network port of the second controller, so that the second reverse proxy component sends the request for accessing the second controller to the server of the second controller, and the server of the second controller responds to the request for accessing the second controller.
In one embodiment, when the processor executes the computer program to implement the step of parsing out the request path of the access request, the following steps are specifically implemented: acquiring configuration information of a first reverse proxy component, wherein the configuration information comprises path information of a first controller and path information of a second controller; and resolving a request path of the access request by adopting the first reverse proxy component based on the path information of the first controller and the path information of the second controller.
In one embodiment, when the processor executes the computer program to implement the step of parsing the request path of the access request by using the first reverse proxy component and based on the path information of the first controller and the path information of the second controller, the following steps are specifically implemented: reading the path information of the first controller and the path information of the second controller by adopting a first reverse proxy component; if the access request contains the path information of the first controller, resolving the request path containing the path pointing to the first controller; if the access request contains the path information of the second controller, the request path containing the path pointing to the second controller is analyzed.
In an embodiment, when the processor executes the computer program to implement the step of sending the request for accessing the first controller to the server of the first controller, the following steps are specifically implemented: acquiring routing information of a server of the first controller from the configuration information of the first reverse proxy component, and identifying a server path of the first controller according to the routing information of the server of the first controller; sending a request for accessing the first controller to a server of the first controller through the first reverse proxy component according to the server path of the first controller; when the processor executes the computer program to implement the above-mentioned step of routing the request for accessing the second controller to the second reverse proxy component through the intranet port communication connection, the following steps are specifically implemented: and acquiring the network address information of the internal network port of the second controller from the configuration information of the first reverse proxy component, and routing a request for accessing the second controller to the second reverse proxy component according to the network address information of the internal network port of the second controller by adopting internal network port communication connection.
In an embodiment, the access request includes a device information acquisition request for accessing the first controller, and when the processor executes the computer program to implement the step of the server side of the first controller responding to the request for accessing the first controller, the following steps are specifically implemented: the server side of the first controller identifies a first hardware interface corresponding to the equipment information acquisition request for accessing the first controller, reads the equipment information of the corresponding equipment through the first hardware interface, and feeds the read equipment information back to the user side of the access request through the first reverse proxy component; and/or the access request comprises a device information acquisition request for accessing the second controller, and the processor executes the computer program to realize the following steps when the server of the second controller responds to the request for accessing the second controller: and the server side of the second controller identifies a second hardware interface corresponding to the equipment information acquisition request for accessing the second controller, reads the equipment information of the corresponding equipment through the second hardware interface, and feeds the read equipment information back to the first reverse proxy component through the second reverse proxy component and the internal network port communication connection so as to be fed back to the user side of the access request by the first reverse proxy component.
In an embodiment, the access request includes a device parameter configuration request for accessing the first controller, and when the processor executes the computer program to implement the step of the server side of the first controller responding to the request for accessing the first controller, the following steps are specifically implemented: the server side of the first controller identifies a third hardware interface corresponding to the equipment parameter configuration request for accessing the first controller, and sends the configuration parameters of the equipment parameter configuration request for accessing the first controller to corresponding equipment through the third hardware interface so that the corresponding equipment can perform configuration based on the configuration parameters; and/or the access request includes a device parameter configuration request for accessing the second controller, and the processor executes the computer program to implement the following steps when the server of the second controller responds to the request for accessing the second controller: and the server side of the second controller identifies a fourth hardware interface corresponding to the device parameter configuration request for accessing the second controller, and sends the configuration parameters of the device parameter configuration request for accessing the second controller to corresponding devices through the fourth hardware interface so as to configure the devices based on the configuration parameters.
In one embodiment, when the processor executes the computer program to implement the steps of receiving the access request by using the first reverse proxy component and parsing out the request path of the access request, the following steps are specifically implemented: receiving an access request by adopting a first reverse proxy component and returning to the web service according to the access request, wherein the front end of the web service displays access information; and receiving access information triggered by a user by adopting a first reverse proxy component, and analyzing a request path corresponding to the access information.
In one embodiment, a computer-readable storage medium is provided, having a computer program stored thereon, which when executed by a processor, performs the steps of: receiving an access request by adopting a first reverse proxy component and analyzing a request path of the access request; if the request path comprises a path pointing to the first controller, analyzing a request for accessing the first controller from the access request by adopting a first reverse proxy component, and sending the request for accessing the first controller to a server of the first controller so that the server of the first controller responds to the request for accessing the first controller; if the request path comprises a path pointing to the second controller, the first reverse proxy component is adopted to analyze the request for accessing the second controller from the access request, and the request for accessing the second controller is routed to the second reverse proxy component through the communication connection between the first controller and the internal network port of the second controller, so that the second reverse proxy component sends the request for accessing the second controller to the server of the second controller, and the server of the second controller responds to the request for accessing the second controller.
In one embodiment, when the computer program is executed by the processor to implement the step of parsing out the request path of the access request, the following steps are specifically implemented: acquiring configuration information of a first reverse proxy component, wherein the configuration information comprises path information of a first controller and path information of a second controller; and resolving a request path of the access request by adopting the first reverse proxy component based on the path information of the first controller and the path information of the second controller.
In one embodiment, when the computer program is executed by the processor to implement the step of parsing out the request path of the access request by using the first reverse proxy component and based on the path information of the first controller and the path information of the second controller, the following steps are specifically implemented: reading the path information of the first controller and the path information of the second controller by adopting a first reverse proxy component; if the access request contains the path information of the first controller, analyzing that the request path contains a path pointing to the first controller; if the access request contains the path information of the second controller, the request path containing the path pointing to the second controller is analyzed.
In one embodiment, when the computer program is executed by the processor to implement the step of sending the request for accessing the first controller to the server of the first controller, the following steps are specifically implemented: acquiring routing information of a server of the first controller from the configuration information of the first reverse proxy component, and identifying a server path of the first controller according to the routing information of the server of the first controller; sending a request for accessing the first controller to a server of the first controller through the first reverse proxy component according to the server path of the first controller; when the computer program is executed by the processor to implement the above-mentioned step of routing the request for accessing the second controller to the second reverse proxy component through the intranet port communication connection, the following steps are specifically implemented: and acquiring the network address information of the internal network port of the second controller from the configuration information of the first reverse proxy component, and routing a request for accessing the second controller to the second reverse proxy component according to the network address information of the internal network port of the second controller by adopting internal network port communication connection.
In an embodiment, the access request includes a device information acquisition request for accessing the first controller, and when the computer program is executed by the processor to implement the step of the server side of the first controller responding to the request for accessing the first controller, the following steps are specifically implemented: the server side of the first controller identifies a first hardware interface corresponding to the equipment information acquisition request for accessing the first controller, reads the equipment information of the corresponding equipment through the first hardware interface, and feeds the read equipment information back to the user side of the access request through the first reverse proxy component; and/or the access request comprises a device information acquisition request for accessing the second controller, and when the computer program is executed by the processor to realize the step that the server of the second controller responds to the request for accessing the second controller, the following steps are specifically realized: and the server side of the second controller identifies a second hardware interface corresponding to the equipment information acquisition request for accessing the second controller, reads the equipment information of the corresponding equipment through the second hardware interface, and feeds the read equipment information back to the first reverse proxy component through the second reverse proxy component and the internal network port communication connection so as to be fed back to the user side of the access request by the first reverse proxy component.
In an embodiment, the access request includes a device parameter configuration request for accessing the first controller, and the following steps are specifically implemented when the computer program is executed by the processor to implement the above-mentioned step of the server of the first controller responding to the request for accessing the first controller: the server side of the first controller identifies a third hardware interface corresponding to the equipment parameter configuration request for accessing the first controller, and sends the configuration parameters of the equipment parameter configuration request for accessing the first controller to corresponding equipment through the third hardware interface so that the corresponding equipment can perform configuration based on the configuration parameters; and/or the access request includes a device parameter configuration request for accessing the second controller, and when the computer program is executed by the processor to implement the step of the server side of the second controller responding to the request for accessing the second controller, the following steps are specifically implemented: and the server side of the second controller identifies a fourth hardware interface corresponding to the device parameter configuration request for accessing the second controller, and sends the configuration parameters of the device parameter configuration request for accessing the second controller to corresponding devices through the fourth hardware interface so as to configure the devices based on the configuration parameters.
In one embodiment, when the computer program is executed by the processor to implement the steps of receiving an access request by using the first reverse proxy component and parsing out a request path of the access request, the following steps are specifically implemented: adopting a first reverse proxy component to receive the access request and return the web service according to the access request, wherein the front end of the web service displays the access information; and receiving access information triggered by a user by adopting a first reverse proxy component, and analyzing a request path corresponding to the access information.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by hardware instructions of a computer program, which can be stored in a non-volatile computer-readable storage medium, and when executed, can include the processes of the embodiments of the methods described above. Any reference to memory, storage, database, or other medium used in the embodiments provided herein may include non-volatile and/or volatile memory, among others. Non-volatile memory can include read-only memory (ROM), programmable ROM (PROM), electrically Programmable ROM (EPROM), electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM) or external cache memory. By way of illustration and not limitation, RAM is available in a variety of forms such as Static RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), double Data Rate SDRAM (DDRSDRAM), enhanced SDRAM (ESDRAM), synchronous Link DRAM (SLDRAM), rambus (Rambus) direct RAM (RDRAM), direct memory bus dynamic RAM (DRDRAM), and memory bus dynamic RAM (RDRAM).
All possible combinations of the technical features in the above embodiments may not be described for the sake of brevity, but should be considered as being within the scope of the present disclosure as long as there is no contradiction between the combinations of the technical features.
The above-mentioned embodiments only express several embodiments of the present application, and the description thereof is more specific and detailed, but not construed as limiting the scope of the invention. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the concept of the present application, which falls within the scope of protection of the present application. Therefore, the protection scope of the present patent shall be subject to the appended claims.

Claims (10)

1. An access management method for a double-control full-flash disk storage array, wherein the full-flash disk storage array is controlled and managed by a first controller and a second controller, the first controller and the second controller are in communication connection through an internal network port, the first controller is configured with a first reverse proxy component, the second controller is configured with a second reverse proxy component, the method is applied to the first controller, and the method comprises the following steps:
receiving an access request by adopting the first reverse proxy component and analyzing a request path of the access request;
if the request path comprises a path pointing to a first controller, resolving a request for accessing the first controller from the access request by using the first reverse proxy component, and sending the request for accessing the first controller to a server of the first controller, so that the server of the first controller responds to the request for accessing the first controller;
if the request path contains a path pointing to a second controller, the first reverse proxy component is adopted to analyze a request for accessing the second controller from the access request, and the request for accessing the second controller is routed to the second reverse proxy component through the internal internet access communication connection, so that the second reverse proxy component sends the request for accessing the second controller to a server of the second controller, and the server of the second controller responds to the request for accessing the second controller.
2. The access management method according to claim 1, wherein the parsing out a request path of the access request includes:
acquiring configuration information of the first reverse proxy component, wherein the configuration information comprises path information of the first controller and path information of the second controller;
and analyzing a request path of the access request by adopting the first reverse proxy component based on the path information of the first controller and the path information of the second controller.
3. The method of claim 2, wherein parsing a request path of the access request using the first reverse proxy component and based on the path information of the first controller and the path information of the second controller comprises:
reading the path information of the first controller and the path information of the second controller by adopting the first reverse proxy component;
if the access request contains the path information of the first controller, analyzing that the request path contains a path pointing to the first controller;
and if the access request contains the path information of the second controller, analyzing that the request path contains a path pointing to the second controller.
4. The method according to claim 3, wherein said sending the request for access to the first controller to the server of the first controller comprises:
acquiring routing information of a server of the first controller from the configuration information of the first reverse proxy component, and identifying a server path of the first controller according to the routing information of the server of the first controller;
sending the request for accessing the first controller to a server of the first controller through the first reverse proxy component according to a server path of the first controller;
said routing said request to access said second controller to said second reverse-proxy component over said internal portal communication connection, comprising:
and acquiring the network address information of the internal network port of the second controller from the configuration information of the first reverse proxy component, and routing the request for accessing the second controller to the second reverse proxy component according to the network address information of the internal network port of the second controller and by adopting the internal network port communication connection.
5. The access management method according to claim 1, wherein the access request includes a device information acquisition request for accessing the first controller, and the response of the server of the first controller to the request for accessing the first controller includes: the server side of the first controller identifies a first hardware interface corresponding to the equipment information acquisition request for accessing the first controller, reads the equipment information of the corresponding equipment through the first hardware interface, and feeds the read equipment information back to the user side of the access request through the first reverse proxy component;
and/or the presence of a gas in the gas,
the accessing request includes a device information obtaining request for accessing the second controller, and the responding of the server of the second controller to the request for accessing the second controller includes: and the server side of the second controller identifies a second hardware interface corresponding to the equipment information acquisition request for accessing the second controller, reads the equipment information of the corresponding equipment through the second hardware interface, and feeds the read equipment information back to the first reverse proxy component through the second reverse proxy component and the internal network port communication connection so as to be fed back to the user side of the access request by the first reverse proxy component.
6. The access management method according to claim 1, wherein the access request includes a device parameter configuration request for accessing the first controller, and the server of the first controller responds to the request for accessing the first controller, including: the server side of the first controller identifies a third hardware interface corresponding to the device parameter configuration request for accessing the first controller, and sends the configuration parameters of the device parameter configuration request for accessing the first controller to corresponding devices through the third hardware interface, so that the corresponding devices perform configuration based on the configuration parameters;
and/or the presence of a gas in the atmosphere,
the accessing request comprises a device parameter configuration request for accessing the second controller, and the responding of the server of the second controller to the request for accessing the second controller comprises the following steps: and the server side of the second controller identifies a fourth hardware interface corresponding to the device parameter configuration request for accessing the second controller, and sends the configuration parameters of the device parameter configuration request for accessing the second controller to corresponding devices through the fourth hardware interface, so that the devices perform configuration based on the configuration parameters.
7. The method of claim 1, wherein receiving an access request with the first reverse proxy component and parsing out a request path of the access request comprises:
adopting the first reverse proxy component to receive an access request and return a web service according to the access request, wherein the front end of the web service displays access information;
and receiving access information triggered by a user by adopting the first reverse proxy component, and analyzing a request path corresponding to the access information.
8. The utility model provides an access management device of two accuse full flash disk storage arrays, its characterized in that, full flash disk storage array is controlled and is managed by first controller and second controller, first controller with the second controller passes through intranet mouth communication connection, first controller disposes first reverse agent subassembly, the second controller disposes the reverse agent subassembly of second, the device is applied to first controller, the device includes:
the receiving module is used for receiving an access request by adopting the first reverse proxy component and analyzing a request path of the access request;
a first response module, configured to, if the request path includes a path that points to a first controller, parse, by using the first reverse proxy component, a request for accessing the first controller from the access request, and send the request for accessing the first controller to a server of the first controller, so that the server of the first controller responds to the request for accessing the first controller;
a second response module, configured to, if the request path includes a path that points to a second controller, parse, by using the first reverse proxy component, a request for accessing the second controller from the access request, and route, through a communication connection between the first controller and an internal portal of the second controller, the request for accessing the second controller to the second reverse proxy component, so that the second reverse proxy component sends the request for accessing the second controller to a server of the second controller, and the server of the second controller responds to the request for accessing the second controller.
9. A computer arrangement comprising a memory, a processor and a computer program stored on the memory and executable on the processor, characterized in that the steps of the method according to any of claims 1-7 are implemented when the computer program is executed by the processor.
10. A computer-readable storage medium, on which a computer program is stored which, when being executed by a processor, carries out the steps of the method according to any one of claims 1 to 7.
CN202211508580.6A 2022-11-29 2022-11-29 Access management method and device, computer equipment and storage medium Active CN115543220B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211508580.6A CN115543220B (en) 2022-11-29 2022-11-29 Access management method and device, computer equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211508580.6A CN115543220B (en) 2022-11-29 2022-11-29 Access management method and device, computer equipment and storage medium

Publications (2)

Publication Number Publication Date
CN115543220A CN115543220A (en) 2022-12-30
CN115543220B true CN115543220B (en) 2023-03-24

Family

ID=84722438

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211508580.6A Active CN115543220B (en) 2022-11-29 2022-11-29 Access management method and device, computer equipment and storage medium

Country Status (1)

Country Link
CN (1) CN115543220B (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6757753B1 (en) * 2001-06-06 2004-06-29 Lsi Logic Corporation Uniform routing of storage access requests through redundant array controllers
CN101201723A (en) * 2006-12-14 2008-06-18 英业达股份有限公司 Virtual disc router system, virtual disc accesses system and method
CN101840309A (en) * 2009-10-28 2010-09-22 创新科存储技术有限公司 Access control method and system of double control disk array in multipath environment
CN103257908A (en) * 2013-05-24 2013-08-21 浪潮电子信息产业股份有限公司 Software and hardware cooperative multi-controller disk array designing method
CN112685670A (en) * 2020-12-31 2021-04-20 华为技术有限公司 Data scheduling method and device
CN113992748A (en) * 2021-09-18 2022-01-28 上海泛宥信息科技有限公司 Reverse proxy method, system, medium, and terminal

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9985930B2 (en) * 2016-09-14 2018-05-29 Wanpath, LLC Reverse proxy for accessing local network over the internet

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6757753B1 (en) * 2001-06-06 2004-06-29 Lsi Logic Corporation Uniform routing of storage access requests through redundant array controllers
CN101201723A (en) * 2006-12-14 2008-06-18 英业达股份有限公司 Virtual disc router system, virtual disc accesses system and method
CN101840309A (en) * 2009-10-28 2010-09-22 创新科存储技术有限公司 Access control method and system of double control disk array in multipath environment
CN103257908A (en) * 2013-05-24 2013-08-21 浪潮电子信息产业股份有限公司 Software and hardware cooperative multi-controller disk array designing method
CN112685670A (en) * 2020-12-31 2021-04-20 华为技术有限公司 Data scheduling method and device
CN113992748A (en) * 2021-09-18 2022-01-28 上海泛宥信息科技有限公司 Reverse proxy method, system, medium, and terminal

Also Published As

Publication number Publication date
CN115543220A (en) 2022-12-30

Similar Documents

Publication Publication Date Title
CN110209652B (en) Data table migration method, device, computer equipment and storage medium
US11184465B2 (en) Network communication for establishing a QUIC connection
CN110765001B (en) Modularized automatic test method and device for application system
CN110704312B (en) Method, device, computer equipment and storage medium for pressure test
CN110413512B (en) AB test method, AB test device, computer equipment and storage medium
CN111859224A (en) Server rendering method and device based on node server and computer equipment
CN111212154B (en) Service binding method, device, terminal, server and storage medium
CN109739711B (en) Interface test method, device, equipment and storage medium
CN109787974B (en) Message data stream generation method and device, computer equipment and storage medium
CN108427639B (en) Automated testing method, application server and computer readable storage medium
CN113141405A (en) Service access method, middleware system, electronic device, and storage medium
CN110750443A (en) Webpage testing method and device, computer equipment and storage medium
CN113992382B (en) Service data processing method and device, electronic equipment and storage medium
CN111431767A (en) Multi-browser resource synchronization method and device, computer equipment and storage medium
CN112671574B (en) Front-end and back-end joint debugging method and device, proxy equipment and storage medium
CN115543220B (en) Access management method and device, computer equipment and storage medium
CN116743619B (en) Network service testing method, device, equipment and storage medium
CN114915565B (en) Network debugging method and system
CN115774584A (en) Data processing method and device, electronic equipment and storage medium
CN113179317B (en) Test system and method for content rewriting device
CN115118587A (en) Method and device for creating connector
CN115599070A (en) Vehicle diagnosis method, system, computer equipment and storage medium
CN115242873A (en) PCB equipment message response method and device, computer equipment and storage medium
CN114429408A (en) Method, device, equipment and system for checking configuration file of intelligent substation
CN114185804A (en) Interface testing method and device and terminal equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant