CN115567455A - Access flow switching method and device, computer equipment and storage medium - Google Patents

Access flow switching method and device, computer equipment and storage medium Download PDF

Info

Publication number
CN115567455A
CN115567455A CN202211163402.4A CN202211163402A CN115567455A CN 115567455 A CN115567455 A CN 115567455A CN 202211163402 A CN202211163402 A CN 202211163402A CN 115567455 A CN115567455 A CN 115567455A
Authority
CN
China
Prior art keywords
service system
traffic
data
test result
access
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202211163402.4A
Other languages
Chinese (zh)
Other versions
CN115567455B (en
Inventor
齐天亮
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ping An Technology Shenzhen Co Ltd
Original Assignee
Ping An Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ping An Technology Shenzhen Co Ltd filed Critical Ping An Technology Shenzhen Co Ltd
Priority to CN202211163402.4A priority Critical patent/CN115567455B/en
Publication of CN115567455A publication Critical patent/CN115567455A/en
Application granted granted Critical
Publication of CN115567455B publication Critical patent/CN115567455B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic control in data switching networks
    • H04L47/10Flow control; Congestion control
    • H04L47/24Traffic characterised by specific attributes, e.g. priority or QoS
    • H04L47/2416Real-time traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/50Testing arrangements

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The application discloses an access flow switching method and device, computer equipment and a storage medium, and belongs to the technical field of rack operation and maintenance. According to the method, access flow is distributed to a first service system and a second service system according to a first flow distribution strategy, a simulation test request is generated according to incoming parameters of a test program, the simulation test request is respectively sent to the first service system and the second service system, a first test result and a second test result are obtained in a preset time period, the first test result and the second test result are compared, data needing error reporting are determined, the data quantity of the error reporting data and a preset error reporting threshold value are compared, if the data quantity of the error reporting data is larger than the error reporting threshold value, a second flow distribution strategy is obtained, and the access flow is redistributed according to the second flow distribution strategy. In addition, the application also relates to a block chain technology, and the traffic flow distribution strategy can be stored in the block chain. According to the method and the device, the access flow can be automatically switched according to the simulation test result.

Description

Access flow switching method and device, computer equipment and storage medium
Technical Field
The application belongs to the technical field of rack operation and maintenance, and particularly relates to an access flow switching method and device, computer equipment and a storage medium.
Background
The traffic switching is a common function implementation in a conventional project, is an indispensable capability for project migration or new and old system switching, and is used for traffic migration of a large-scale system architecture when a large-scale financial enterprise and an internet enterprise deploy a new system architecture.
After the traditional system flow is migrated, the target service call is reported in error or a large number of requests are overtime after the flow switch is switched, at the moment, the flow switch can be only closed, and for the requests of subsequent calls, a new server is not called continuously, and an old system is called. At present, a plurality of technologies for performing traffic switching are available, for example, modulo is performed according to different dimensions, and traffic switching is performed according to a random number calculation percentage, so that the purpose of traffic switching is achieved. However, such a scheme has a drawback that the flow ratio can only be adjusted manually or the flow switch can only be turned off, the accuracy of data cannot be verified, if wrong data is generated, the data can only be modified by manual data change to realize flow switching, the manual participation is too strong, manpower resources are excessively consumed, the switching flexibility is not high, and the switching process is influenced by artificial subjective awareness.
Disclosure of Invention
An embodiment of the application aims to provide an access traffic switching method, an access traffic switching device, a computer device and a storage medium, so as to solve the technical problems that an existing traffic switching scheme is modified through manual data change to achieve traffic switching, manual participation is too strong, manpower resources are excessively consumed, switching flexibility is not high, and the switching process is influenced by artificial subjective consciousness.
In order to solve the foregoing technical problem, an embodiment of the present application provides an access traffic switching method, which adopts the following technical solutions:
an access traffic switching method, comprising:
receiving an access flow switching instruction, acquiring a first flow distribution strategy, and distributing access flow to a first service system and a second service system according to the first flow distribution strategy;
acquiring incoming parameters of a test program, and generating a simulation test request according to the incoming parameters of the test program;
acquiring test data, and respectively initiating simulation test requests to a first service system and a second service system;
acquiring a simulation test result output by a first service system within a preset time period to obtain a first test result, and acquiring a simulation test result output by a second service system to obtain a second test result;
comparing the first test result with the second test result, determining data needing error reporting, and counting data volume of the error reporting data;
and comparing the data volume of the error reporting data with a preset error reporting threshold, if the data volume of the error reporting data is larger than the error reporting threshold, acquiring a second traffic diversion strategy, and redistributing the access traffic according to the second traffic diversion strategy.
Further, receiving an access traffic switching instruction, obtaining a first traffic offloading policy, and allocating access traffic to a first service system and a second service system according to the first traffic offloading policy, specifically including:
receiving an access flow switching instruction, and acquiring an interface serial number of an API (application program interface) corresponding to access flow switching;
carrying out Hash operation on the interface serial number to obtain a Hash operation result;
performing modular operation on the hash operation result to obtain a modular operation result;
and generating a first traffic distribution strategy according to the modular operation result, and distributing the access traffic to the first service system and the second service system according to the first traffic distribution strategy.
Further, a first traffic offload policy is generated according to the modulo operation result, and the access traffic is allocated to the first service system and the second service system according to the first traffic offload policy, which specifically includes:
analyzing the first flow distribution strategy, and acquiring distribution information corresponding to the first flow distribution strategy to obtain first distribution information;
adjusting configuration information of the API interface according to the first shunt information to obtain a first API interface;
and distributing the access flow to the first service system and the second service system through the first API interface.
Further, performing a modular operation on the hash operation result to obtain a modular operation result, which specifically includes:
acquiring an initial weight of a first service system to obtain a first initial weight, and acquiring an initial weight of a second service system to obtain a second initial weight;
calculating an initial weight sum based on the first initial weight and the second initial weight;
and performing modular operation on the hash operation result according to the initial weight sum to obtain a modular operation result.
Further, performing a modulo operation on the hash operation result based on the following formula:
M=Hasd(TransSeriaNo)%(P 0 -1)
wherein M is the result of modular operation, transSeriaNo is the interface flow number corresponding to the access flow switching API, hasd (TransSeriaNo) is the result of hash operation of the interface flow number, and P is the result of hash operation of the interface flow number 0 Is the initial weight sum.
Further, in a preset time period, obtaining a simulation test result output by the first service system to obtain the first test result, and obtaining a simulation test result output by the second service system to obtain the second test result, the method further includes:
synchronizing the first test result and the second test result into a preset redis cache;
and storing the first test result and the second test result in a preset database.
Further, comparing the data size of the error-reporting data with a preset error-reporting threshold, if the data size of the error-reporting data is greater than the error-reporting threshold, acquiring a second traffic diversion policy, and redistributing the access traffic according to the second traffic diversion policy, which specifically includes:
comparing the data volume of the error reporting data with a preset error reporting threshold value;
if the data volume of the error-reporting data is larger than the error-reporting threshold value, acquiring a second traffic diversion strategy;
analyzing the second flow distribution strategy, and acquiring distribution information corresponding to the second flow distribution strategy to obtain second distribution information;
adjusting the configuration information of the API interface according to the second shunt information to obtain a second API interface;
the access traffic is redistributed through the second API interface.
In order to solve the foregoing technical problem, an embodiment of the present application further provides an access traffic switching apparatus, which adopts the following technical solutions:
an access traffic switching apparatus comprising:
the initial flow distribution module is used for receiving the access flow switching instruction, acquiring a first flow distribution strategy and distributing the access flow to a first service system and a second service system according to the first flow distribution strategy;
the request generation module is used for acquiring the incoming parameters of the test program and generating a simulation test request according to the incoming parameters of the test program;
the request initiating module is used for acquiring test data and respectively initiating simulation test requests to the first service system and the second service system;
the simulation test module is used for acquiring a simulation test result output by the first service system within a preset time period to obtain a first test result and acquiring a simulation test result output by the second service system to obtain a second test result;
the result comparison module is used for comparing the first test result with the second test result, determining data needing error reporting and counting the data volume of the error reporting data;
and the flow switching module is used for comparing the data volume of the error-reported data with a preset error-reported threshold value, acquiring a second flow distribution strategy if the data volume of the error-reported data is larger than the error-reported threshold value, and redistributing the access flow according to the second flow distribution strategy.
In order to solve the above technical problem, an embodiment of the present application further provides a computer device, which adopts the following technical solutions:
a computer device comprising a memory having computer readable instructions stored therein and a processor that when executed implements the steps of the access traffic switching method as in any one of the above.
In order to solve the above technical problem, an embodiment of the present application further provides a computer-readable storage medium, which adopts the following technical solutions:
a computer readable storage medium having computer readable instructions stored thereon which, when executed by a processor, implement the steps of the access traffic switching method as claimed in any one of the preceding claims.
Compared with the prior art, the embodiment of the application mainly has the following beneficial effects:
the application discloses an access flow switching method and device, computer equipment and a storage medium, and belongs to the technical field of rack operation and maintenance. According to the method, access flow is distributed to a first service system and a second service system according to a first flow distribution strategy, a simulation test request is generated according to incoming parameters of a test program, the simulation test request is respectively sent to the first service system and the second service system, a first test result and a second test result are obtained in a preset time period, the first test result and the second test result are compared, data needing error reporting are determined, the data quantity of the error reporting data and a preset error reporting threshold value are compared, if the data quantity of the error reporting data is larger than the error reporting threshold value, a second flow distribution strategy is obtained, and the access flow is redistributed according to the second flow distribution strategy. The method and the device have the advantages that after the access flow is distributed to the first service system and the second service system, the simulation test request is initiated, the simulation test result output by the first service system and the simulation test result output by the second service system are obtained in the preset time period, the simulation test results of the first service system and the simulation test result output by the second service system are compared, data needing error reporting are searched, and finally whether flow distribution strategy adjustment needs to be carried out or not is determined according to the data volume of the error reporting data and the preset error reporting threshold value.
Drawings
In order to more clearly illustrate the solution of the present application, the drawings used in the description of the embodiments of the present application will be briefly described below, and it is obvious that the drawings in the description below are some embodiments of the present application, and that other drawings may be obtained by those skilled in the art without inventive effort.
FIG. 1 illustrates an exemplary system architecture diagram to which the present application may be applied;
FIG. 2 illustrates a flow diagram of one embodiment of an access traffic switching method according to the present application;
FIG. 3 shows a schematic block diagram of an embodiment of an access traffic switching apparatus according to the application;
FIG. 4 shows a schematic block diagram of one embodiment of a computer device according to the present application.
Detailed Description
Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this application belongs; the terminology used in the description of the application herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the application; the terms "including" and "having," and any variations thereof in the description and claims of this application and the description of the figures above, are intended to cover non-exclusive inclusions. The terms "first," "second," and the like in the description and claims of this application or in the above-described drawings are used for distinguishing between different objects and not for describing a particular order.
Reference herein to "an embodiment" means that a particular feature, structure, or characteristic described in connection with the embodiment can be included in at least one embodiment of the application. The appearances of the phrase in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments. It is explicitly and implicitly understood by one skilled in the art that the embodiments described herein may be combined with other embodiments.
In order to make the technical solutions better understood by those skilled in the art, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the accompanying drawings.
As shown in fig. 1, the system architecture 100 may include terminal devices 101, 102, 103, a network 104, and a server 105. The network 104 serves as a medium for providing communication links between the terminal devices 101, 102, 103 and the server 105. Network 104 may include various connection types, such as wired, wireless communication links, or fiber optic cables, among others.
The user may use the terminal devices 101, 102, 103 to interact with the server 105 via the network 104 to receive or send messages or the like. The terminal devices 101, 102, 103 may have various communication client applications installed thereon, such as a web browser application, a shopping application, a search application, an instant messaging tool, a mailbox client, social platform software, and the like.
The terminal devices 101, 102, 103 may be various electronic devices having a display screen and supporting web browsing, including but not limited to smart phones, tablet computers, e-book readers, MP3 players (Moving picture experts Group Audio Layer III, mpeg compression standard Audio Layer 3), MP4 players (Moving picture experts Group Audio Layer IV, mpeg compression standard Audio Layer 4), laptop portable computers, desktop computers, and the like.
The server 105 may be a server that provides various services, for example, a background server that provides support for pages displayed on the terminal devices 101, 102, and 103, and may be an independent server, or a cloud server that provides basic cloud computing services such as a cloud service, a cloud database, cloud computing, a cloud function, cloud storage, a web service, cloud communication, a middleware service, a domain name service, a security service, a Content Delivery Network (CDN), and a big data and artificial intelligence platform.
It should be noted that the access traffic switching method provided in the embodiment of the present application is generally executed by a server, and accordingly, the access traffic switching apparatus is generally disposed in the server.
It should be understood that the number of terminal devices, networks, and servers in fig. 1 is merely illustrative. There may be any number of terminal devices, networks, and servers, as desired for implementation.
With continuing reference to fig. 2, a flow diagram of one embodiment of an access traffic switching method in accordance with the present application is shown. The embodiment of the application can acquire and process related data based on an artificial intelligence technology. Among them, artificial Intelligence (AI) is a theory, method, technique and application system that simulates, extends and expands human Intelligence using a digital computer or a machine controlled by a digital computer, senses the environment, acquires knowledge and uses the knowledge to obtain the best result.
The artificial intelligence infrastructure generally includes technologies such as sensors, dedicated artificial intelligence chips, cloud computing, distributed storage, big data processing technologies, operation/interaction systems, mechatronics, and the like. The artificial intelligence software technology mainly comprises a computer vision technology, a robot technology, a biological recognition technology, a voice processing technology, a natural language processing technology, machine learning/deep learning and the like. The access flow switching method comprises the following steps:
s201, receiving an access flow switching instruction, acquiring a first flow distribution strategy, and distributing access flow to a first service system and a second service system according to the first flow distribution strategy.
In some service scenes with high concurrency, such as an insurance service scene, when access traffic of a core system is migrated, the system needs to ensure high stability, at present, a new system needs to manually observe execution conditions in the operation process, manually adjust traffic through the execution conditions, modify the traffic through manual data change to realize traffic switching, the manual participation is too strong, human resources are excessively consumed, the switching flexibility is not high, and the switching process is influenced by artificial subjective awareness. The method and the device have the advantages that after the access flow is distributed to the first service system and the second service system, the simulation test request is initiated, the simulation test result output by the first service system and the simulation test result output by the second service system are obtained in the preset time period, the simulation test results of the first service system and the simulation test result output by the second service system are compared, data needing error reporting are searched, and finally whether flow distribution strategy adjustment needs to be carried out or not is determined according to the data volume of the error reporting data and the preset error reporting threshold value.
In a specific embodiment of the present application, the server receives the access traffic switching instruction, obtains the first traffic offload policy, and allocates the access traffic to the first service system and the second service system according to the first traffic offload policy. The first traffic diversion strategy can be obtained by performing Hash modulo calculation on an interface traffic number of an API (application program interface) corresponding to access traffic switching, the server obtains a Hash modulo result corresponding to the interface traffic number of the API after calculating, obtains the traffic diversion strategy corresponding to the Hash modulo result, namely the first traffic diversion strategy, analyzes the first traffic diversion strategy to obtain first diversion information, adjusts configuration information of the API according to the first diversion information to obtain the first API, and distributes the access traffic to the first service system and the second service system through the first API. It should be noted that the first business system may be an old system that is already capable of providing services, and the second business system may be a new system that is newly deployed.
In this embodiment, the electronic device (for example, the server shown in fig. 1) on which the access traffic switching method operates may receive the access traffic switching instruction through a wired connection manner or a wireless connection manner. It is noted that the wireless connection means may include, but is not limited to, a 3G/4G connection, a WiFi connection, a bluetooth connection, a WiMAX connection, a Zigbee connection, a UWB (ultra wideband) connection, and other wireless connection means now known or developed in the future.
Further, receiving an access traffic switching instruction, obtaining a first traffic offloading policy, and allocating access traffic to a first service system and a second service system according to the first traffic offloading policy, specifically including:
receiving an access flow switching instruction, and acquiring an interface serial number of an API (application program interface) corresponding to access flow switching;
carrying out Hash operation on the interface serial number to obtain a Hash operation result;
performing modular operation on the hash operation result to obtain a modular operation result;
and generating a first traffic distribution strategy according to the modulus operation result, and distributing the access traffic to the first service system and the second service system according to the first traffic distribution strategy.
Where hash is also referred to as "hash," it is a mathematical computer program that receives any set of input information of arbitrary length, and transforms it by a hashing algorithm into a fixed-length output form of a data fingerprint, such as a combination of letters and numbers, the output being a "hash value. In general, a hash algorithm is understood to be a message digest algorithm that compresses a message or data down to a small size and has a fixed format. Because the one-way operation of the encryption algorithm has certain irreversibility, the hash algorithm becomes a constituent part of the encryption algorithm, but the complete encryption mechanism cannot only depend on the hash algorithm. Currently common Hash algorithms include the international Mesh Digest (MD) series and the Secure Hash Algorithm (SHA) series, as well as the domestic SM3 Algorithm. The SHA 256 is one of SHA series algorithms, a set of hash algorithms designed by the United states Security administration and issued by the institute of national standards and technology, and the digest length is 256bits, so the SHA 256 and the SHA 256 are also one of the safest methods for protecting digital information.
Specifically, the server receives an access flow switching instruction, obtains an interface serial number of an API interface corresponding to access flow switching, performs hash operation on the interface serial number to obtain a hash operation result, performs modulo operation on the hash operation result to obtain a modulo operation result, generates a first flow splitting policy according to the modulo operation result, and distributes access flow to the first service system and the second service system according to the first flow splitting policy.
Further, a first traffic offload policy is generated according to the modulo operation result, and the access traffic is allocated to the first service system and the second service system according to the first traffic offload policy, which specifically includes:
analyzing the first flow distribution strategy, and acquiring distribution information corresponding to the first flow distribution strategy to obtain first distribution information;
adjusting configuration information of the API interface according to the first shunt information to obtain a first API interface;
and distributing the access flow to the first service system and the second service system through the first API interface.
The shunting strategy exists in a String format in the server, while a String format file cannot be directly called by a core system PTS (partial transmit time), the shunting strategy file existing in the String format needs to be recompiled through lua, the shunting strategy file in the String format is converted into a Table form, then the Table form is loaded into the PTS through the lua for storage, and the PTS can directly call the shunting strategy for controlling the user flow of the server.
Specifically, after generating the first shunt policy, the server uploads the first shunt policy to the lua for storage, completes format conversion of the first shunt policy in the lua to form an lua script, then loads the first shunt policy in the form of the lua script into the PTS, loads the first shunt policy in the form of the lua script, obtains shunt information corresponding to the first shunt policy, adjusts configuration information of the API interface according to the shunt information corresponding to the first shunt policy to obtain the first API interface, and allocates access traffic to the first service system and the second service system through the first API interface.
Further, performing a modular operation on the hash operation result to obtain a modular operation result, which specifically includes:
acquiring an initial weight of a first service system to obtain a first initial weight, and acquiring an initial weight of a second service system to obtain a second initial weight;
calculating an initial weight sum based on the first initial weight and the second initial weight;
and performing modular operation on the hash operation result according to the initial weight sum to obtain a modular operation result.
Further, performing a modulo operation on the hash operation result based on the following formula:
M=Hasd(TransSeriaNo)%(P 0 -1)
wherein M is the modulo operation result, transSeriaNo is the interface flow number corresponding to the access flow switching API, hasd (TransSeriaNo) is the Hash operation result of the interface flow number, and P is the hash operation result of the interface flow number 0 Is the initial weight sum.
Specifically, the server generates a first traffic splitting policy according to a modulo operation result, and allocates access traffic to the first service system and the second service system through the first traffic splitting policy, where the modulo operation result is a value range M, and determines the traffic splitting policy according to the modulo operation value range M, for example, there are 4 traffic splitting policies [ a, B, C, D ] in a traffic splitting policy set, where each traffic splitting policy corresponds to one value range, and if the value range corresponding to the traffic splitting policy a is [0,1], the server determines the corresponding traffic splitting policy according to the modulo operation value range M to obtain the first traffic splitting policy, and if the modulo operation value range M is [0.5,0.8], the traffic splitting policy a is determined as the first traffic splitting policy.
In the above embodiment, the application performs the hash modulo operation on the interface serial number of the API interface, and automatically generates the shunting strategy according to the operation, thereby improving the flexibility of flow allocation, degrading the risk of access flow switching, and improving the user experience.
S202, acquiring the incoming parameters of the test program, and generating a simulation test request according to the incoming parameters of the test program.
Specifically, after the server distributes the access flow to the first service system and the second service system according to the first flow distribution strategy, a preset test program is started, incoming parameters of the test program are obtained, a simulation test request is generated according to the incoming parameters of the test program, and a simulation test is initiated through the simulation test request.
S203, acquiring the test data, and respectively initiating a simulation test request to the first service system and the second service system.
Specifically, the server obtains test data, respectively introduces the test data into the first service system and the second service system, and then respectively initiates a simulation test request to the first service system and the second service system to complete a simulation test and obtain a simulation test result.
S204, in a preset time period, acquiring a simulation test result output by the first service system to obtain a first test result, and acquiring a simulation test result output by the second service system to obtain a second test result.
Specifically, after the simulation test request is initiated, the server starts a timer by default to obtain a simulation test result output by the first service system and obtain a first test result within a preset time period, and obtain a simulation test result output by the second service system and obtain a second test result.
Further, in a preset time period, obtaining a simulation test result output by the first service system to obtain the first test result, and obtaining a simulation test result output by the second service system to obtain the second test result, the method further includes:
synchronizing the first test result and the second test result into a preset redis cache;
and storing the first test result and the second test result in a preset database.
Specifically, in a preset time period, a simulation test result output by a first service system is obtained, a first test result is obtained, a simulation test result output by a second service system is obtained, after a second test result is obtained, the server synchronizes the first test result and the second test result to a preset redis cache, and stores the first test result and the second test result in a preset database.
In the above embodiment, the test result may be stored in a preset database or a data table, or may be stored in a redis cache of the server. The advantages of storing in the database or the data table are that the data can be stored persistently, the restarting data of the server cannot be lost, and the advantages of storing in the redis cache are that the data can be read quickly, but the restarting or abnormal data of the cache server can be lost. In the specific embodiment of the application, the optimal scheme is that both are used, the data are preferentially stored in the redis cache, and the data in the redis cache are persisted to a database or a data table in an asynchronous processing mode.
S205, comparing the first test result with the second test result, determining data needing error reporting, and counting data volume of the error reporting data.
Specifically, the server obtains a first test result and a second test result from a redis cache or a database or a data table, compares the first test result with the second test result one by one, determines data which cannot be corresponding to the first test result as data which needs error reporting, and counts data volume of the error reporting data. It should be noted that, in a specific embodiment of the present application, the first service system may be an old system, and the second service system may be a new system, generally speaking, the old system is a system that has undergone a function test, and can normally provide a service, a test result corresponding to the old system may be regarded as a standard result, and by comparing the first test result and the second test result, it is determined whether there is data that needs to be error-reported in a second test result corresponding to the second service system (i.e., the new system).
And S206, comparing the data volume of the error-reported data with a preset error-reported threshold, if the data volume of the error-reported data is larger than the error-reported threshold, acquiring a second traffic diversion strategy, and redistributing the access traffic according to the second traffic diversion strategy.
Specifically, the server compares the data volume of the error-reporting data with a preset error-reporting threshold, and if the data volume of the error-reporting data is greater than the error-reporting threshold, obtains a second traffic offload policy, and reallocates the access traffic according to the second traffic offload policy. And the second traffic diversion strategy is a traffic all transfer strategy, and the access traffic is all distributed to the first service system under the second traffic diversion strategy so as to update the second service system.
It should be noted that, when the data size of the error reporting data is judged to be larger than the error reporting threshold value, the access flow all flows into the old system, the old system is called circularly for processing aiming at the recorded error reporting data, whether the processing result is the same as the error reporting data of the new system is called or not is compared, if the processing result is the same as the error reporting data of the new system, the error reporting data is deleted, and if the error reporting data is not generated by the old system, the error reporting data is reserved and used for bug modified data analysis.
It should be additionally noted that if no error-reporting data is generated, the test result data of the new system and the old system are called before data persistence, and API comparison is performed to ensure 100% accuracy of the data, data persistence is performed after the test result data comparison is passed, the total number of successful flows is recorded by using a counter after the data persistence is successful, and if 100% calling is successful in unit time, a redis flow control value is set, and the flow of the new system is automatically increased.
Further, comparing the data size of the error-reporting data with a preset error-reporting threshold, if the data size of the error-reporting data is greater than the error-reporting threshold, acquiring a second traffic diversion policy, and redistributing the access traffic according to the second traffic diversion policy, which specifically includes:
comparing the data volume of the error reporting data with a preset error reporting threshold value;
if the data volume of the error-reporting data is larger than the error-reporting threshold value, acquiring a second traffic diversion strategy;
analyzing the second flow distribution strategy, and acquiring distribution information corresponding to the second flow distribution strategy to obtain second distribution information;
adjusting the configuration information of the API interface according to the second shunt information to obtain a second API interface;
the access traffic is redistributed through the second API interface.
Specifically, the server compares the data volume of the error-reported data with a preset error-reported threshold, if the data volume of the error-reported data is greater than the error-reported threshold, obtains a second traffic offloading policy, analyzes the second traffic offloading policy, obtains offloading information corresponding to the second traffic offloading policy, obtains second offloading information, adjusts configuration information of the API interface according to the second offloading information, obtains a second API interface, and redistributes the access traffic through the second API interface.
In the above embodiment, the application discloses an access traffic switching method, and belongs to the technical field of rack operation and maintenance. According to the method, access flow is distributed to a first service system and a second service system according to a first flow distribution strategy, a simulation test request is generated according to incoming parameters of a test program, the simulation test request is respectively sent to the first service system and the second service system, a first test result and a second test result are obtained in a preset time period, the first test result and the second test result are compared, data needing error reporting are determined, the data quantity of the error reporting data and a preset error reporting threshold value are compared, if the data quantity of the error reporting data is larger than the error reporting threshold value, a second flow distribution strategy is obtained, and the access flow is redistributed according to the second flow distribution strategy. The method and the device have the advantages that after the access flow is distributed to the first service system and the second service system, the simulation test request is initiated, the simulation test result output by the first service system and the simulation test result output by the second service system are obtained in the preset time period, the simulation test results of the first service system and the simulation test result output by the second service system are compared, data needing error reporting are searched, and finally whether flow distribution strategy adjustment needs to be carried out or not is determined according to the data volume of the error reporting data and the preset error reporting threshold value.
It is emphasized that, in order to further ensure the privacy and security of the traffic offload policy, the traffic offload policy may also be stored in a node of a block chain.
The block chain referred by the application is a novel application mode of computer technologies such as distributed data storage, point-to-point transmission, a consensus mechanism, an encryption algorithm and the like. A block chain (Blockchain), which is essentially a decentralized database, is a series of data blocks associated by using a cryptographic method, and each data block contains information of a batch of network transactions, so as to verify the validity (anti-counterfeiting) of the information and generate a next block. The blockchain may include a blockchain underlying platform, a platform product service layer, an application service layer, and the like.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by hardware associated with computer readable instructions, which can be stored in a computer readable storage medium, and when executed, can include processes of the embodiments of the methods described above. The storage medium may be a non-volatile storage medium such as a magnetic disk, an optical disk, a Read-Only Memory (ROM), or a Random Access Memory (RAM).
It should be understood that, although the steps in the flowcharts of the figures are shown in order as indicated by the arrows, the steps are not necessarily performed in order as indicated by the arrows. The steps are not performed in the exact order shown and may be performed in other orders unless otherwise indicated herein. Moreover, at least a portion of the steps in the flow chart of the figure may include multiple sub-steps or multiple stages, which are not necessarily performed at the same time, but may be performed at different times, which are not necessarily performed in sequence, but may be performed alternately or alternately with other steps or at least a portion of the sub-steps or stages of other steps.
With further reference to fig. 3, as an implementation of the method shown in fig. 2, the present application provides an embodiment of an access traffic switching apparatus, where the embodiment of the apparatus corresponds to the embodiment of the method shown in fig. 2, and the apparatus may be specifically applied to various electronic devices.
As shown in fig. 3, the access traffic switching apparatus 300 according to this embodiment includes:
the initial offloading module 301 is configured to receive an access traffic switching instruction, obtain a first traffic offloading policy, and allocate access traffic to a first service system and a second service system according to the first traffic offloading policy;
a request generating module 302, configured to obtain incoming parameters of a test program, and generate a simulation test request according to the incoming parameters of the test program;
a request initiating module 303, configured to obtain test data and initiate a simulation test request to the first service system and the second service system respectively;
the simulation test module 304 is configured to obtain a simulation test result output by the first service system to obtain a first test result, and obtain a simulation test result output by the second service system to obtain a second test result within a preset time period;
a result comparing module 305, configured to compare the first test result with the second test result, determine data that needs to be error reported, and count data amount of the error reported data;
the traffic switching module 306 is configured to compare the data size of the error-reporting data with a preset error-reporting threshold, and if the data size of the error-reporting data is greater than the error-reporting threshold, obtain a second traffic diversion policy, and redistribute the access traffic according to the second traffic diversion policy.
Further, the initial shunting module 301 specifically includes:
the flow number acquisition unit is used for receiving the access flow switching instruction and acquiring an interface flow number of an AP I interface corresponding to the access flow switching;
the hash operation unit is used for carrying out hash operation on the interface serial number to obtain a hash operation result;
the modular operation unit is used for carrying out modular operation on the Hash operation result to obtain a modular operation result;
and the initial shunting unit is used for generating a first traffic shunting strategy according to the modulus operation result and distributing the access traffic to the first service system and the second service system according to the first traffic shunting strategy.
Further, the initial shunting unit specifically includes:
the flow distribution strategy analysis subunit is used for analyzing the first flow distribution strategy, acquiring flow distribution information corresponding to the first flow distribution strategy, and acquiring the first flow distribution information;
the interface configuration adjusting subunit is used for adjusting the configuration information of the API interface according to the first shunt information to obtain a first API interface;
and the initial shunting subunit is used for distributing the access flow to the first service system and the second service system through the first API interface.
Further, the modulo operation unit specifically includes:
the initial weight acquiring subunit is used for acquiring the initial weight of the first service system to obtain a first initial weight, and acquiring the initial weight of the second service system to obtain a second initial weight;
an initial weight sum subunit for calculating an initial weight sum based on the first initial weight and the second initial weight;
and the modulus operation subunit is used for performing modulus operation on the hash operation result according to the initial weight sum to obtain a modulus operation result.
Further, performing a modulo operation on the hash operation result based on the following formula:
M=Hasd(TransSeriaNo)%(P 0 -1)
wherein M is the modulo operation result, transSeriaNo is the interface flow number corresponding to the access flow switching API, hasd (TransSeriaNo) is the Hash operation result of the interface flow number, and P is the hash operation result of the interface flow number 0 Is the initial weight sum.
Further, the access traffic switching apparatus 300 further includes:
the first storage module is used for synchronizing the first test result and the second test result to a preset redis cache;
and the second storage module is used for storing the first test result and the second test result into a preset database.
Further, the traffic switching module 306 specifically includes:
the error reporting data comparison unit is used for comparing the data volume of the error reporting data with a preset error reporting threshold value;
the distribution strategy acquisition unit is used for acquiring a second flow distribution strategy when the data volume of the error reporting data is larger than the error reporting threshold value;
the flow distribution strategy analysis unit is used for analyzing the second flow distribution strategy, acquiring flow distribution information corresponding to the second flow distribution strategy and acquiring second flow distribution information;
the interface configuration adjusting unit is used for adjusting the configuration information of the API interface according to the second shunt information to obtain a second API interface;
and the flow switching unit is used for redistributing the access flow through the second API interface.
In the above embodiment, the application discloses an access flow switching device, and belongs to the technical field of rack operation and maintenance. According to the method, access flow is distributed to a first service system and a second service system according to a first flow distribution strategy, a simulation test request is generated according to incoming parameters of a test program, the simulation test request is respectively sent to the first service system and the second service system, a first test result and a second test result are obtained in a preset time period, the first test result and the second test result are compared, data needing error reporting are determined, the data quantity of the error reporting data and a preset error reporting threshold value are compared, if the data quantity of the error reporting data is larger than the error reporting threshold value, a second flow distribution strategy is obtained, and the access flow is redistributed according to the second flow distribution strategy. The method and the device have the advantages that after the access flow is distributed to the first service system and the second service system, the simulation test request is initiated, the simulation test result output by the first service system and the simulation test result output by the second service system are obtained in the preset time period, the simulation test results of the first service system and the simulation test result output by the second service system are compared, data needing error reporting are searched, and finally whether flow distribution strategy adjustment needs to be carried out or not is determined according to the data volume of the error reporting data and the preset error reporting threshold value.
In order to solve the technical problem, the embodiment of the application further provides computer equipment. Referring to fig. 4 in particular, fig. 4 is a block diagram of a basic structure of a computer device according to the embodiment.
The computer device 4 comprises a memory 41, a processor 42, and a network interface 43, which are communicatively connected to each other via a system bus. It is noted that only computer device 4 having components 41-43 is shown, but it is understood that not all of the shown components are required to be implemented, and that more or fewer components may be implemented instead. As will be understood by those skilled in the art, the computer device is a device capable of automatically performing numerical calculation and/or information processing according to a preset or stored instruction, and the hardware includes, but is not limited to, a microprocessor, an Application Specific Integrated Circuit (ASIC), a Programmable Gate Array (FPGA), a Digital Signal Processor (DSP), an embedded device, and the like.
The computer device can be a desktop computer, a notebook, a palm computer, a cloud server and other computing devices. The computer equipment can carry out man-machine interaction with a user in a keyboard mode, a mouse mode, a remote controller mode, a touch panel mode or a voice control equipment mode.
The memory 41 includes at least one type of readable storage medium including a flash memory, a hard disk, a multimedia card, a card type memory (e.g., SD or DX memory, etc.), a Random Access Memory (RAM), a Static Random Access Memory (SRAM), a Read Only Memory (ROM), an Electrically Erasable Programmable Read Only Memory (EEPROM), a Programmable Read Only Memory (PROM), a magnetic memory, a magnetic disk, an optical disk, etc. In some embodiments, the memory 41 may be an internal storage unit of the computer device 4, such as a hard disk or a memory of the computer device 4. In other embodiments, the memory 41 may also be an external storage device of the computer device 4, such as a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), and the like, provided on the computer device 4. Of course, the memory 41 may also include both internal and external storage devices of the computer device 4. In this embodiment, the memory 41 is generally used for storing an operating system installed in the computer device 4 and various types of application software, such as computer readable instructions for accessing a traffic switching method. Further, the memory 41 may also be used to temporarily store various types of data that have been output or are to be output.
The processor 42 may be a Central Processing Unit (CPU), controller, microcontroller, microprocessor, or other data Processing chip in some embodiments. The processor 42 is typically used to control the overall operation of the computer device 4. In this embodiment, the processor 42 is configured to execute computer readable instructions stored in the memory 41 or process data, for example, execute computer readable instructions of the access traffic switching method.
The network interface 43 may comprise a wireless network interface or a wired network interface, and the network interface 43 is generally used for establishing communication connection between the computer device 4 and other electronic devices.
In this embodiment, the application discloses a computer device, belongs to frame fortune dimension technical field. According to the method, access flow is distributed to a first service system and a second service system according to a first flow distribution strategy, a simulation test request is generated according to incoming parameters of a test program, the simulation test request is respectively sent to the first service system and the second service system, a first test result and a second test result are obtained in a preset time period, the first test result and the second test result are compared, data needing error reporting are determined, the data quantity of the error reporting data and a preset error reporting threshold value are compared, if the data quantity of the error reporting data is larger than the error reporting threshold value, a second flow distribution strategy is obtained, and the access flow is redistributed according to the second flow distribution strategy. The method and the device have the advantages that after the access flow is distributed to the first service system and the second service system, the simulation test request is initiated, the simulation test result output by the first service system and the simulation test result output by the second service system are obtained in the preset time period, the simulation test results of the first service system and the simulation test result output by the second service system are compared, data needing error reporting are searched, and finally whether flow distribution strategy adjustment needs to be carried out or not is determined according to the data volume of the error reporting data and the preset error reporting threshold value.
The present application further provides another embodiment, which is to provide a computer-readable storage medium, wherein the computer-readable storage medium stores computer-readable instructions, which can be executed by at least one processor, so as to cause the at least one processor to execute the steps of the access traffic switching method as described above.
In this embodiment, the application discloses a storage medium, and belongs to the technical field of rack operation and maintenance. According to the method, access flow is distributed to a first service system and a second service system according to a first flow distribution strategy, a simulation test request is generated according to incoming parameters of a test program, the simulation test request is respectively sent to the first service system and the second service system, a first test result and a second test result are obtained in a preset time period, the first test result and the second test result are compared, data needing error reporting are determined, the data quantity of the error reporting data and a preset error reporting threshold value are compared, if the data quantity of the error reporting data is larger than the error reporting threshold value, a second flow distribution strategy is obtained, and the access flow is redistributed according to the second flow distribution strategy. The method and the device have the advantages that after the access flow is distributed to the first service system and the second service system, the simulation test request is initiated, the simulation test result output by the first service system and the simulation test result output by the second service system are obtained in the preset time period, the simulation test results of the first service system and the simulation test result output by the second service system are compared, data needing error reporting are searched, and finally whether flow distribution strategy adjustment needs to be carried out or not is determined according to the data volume of the error reporting data and the preset error reporting threshold value.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solutions of the present application may be embodied in the form of a software product, which is stored in a storage medium (such as ROM/RAM, magnetic disk, optical disk) and includes instructions for enabling a terminal device (such as a mobile phone, a computer, a server, an air conditioner, or a network device) to execute the method according to the embodiments of the present application.
The application is operational with numerous general purpose or special purpose computing system environments or configurations. For example: personal computers, server computers, hand-held or portable devices, tablet-type devices, multiprocessor systems, microprocessor-based systems, set top boxes, programmable consumer electronics, network PCs, minicomputers, mainframe computers, distributed computing environments that include any of the above systems or devices, and the like. The application may be described in the general context of computer-executable instructions, such as program modules, being executed by a computer. Generally, program modules include routines, programs, objects, components, data structures, etc. that perform particular tasks or implement particular abstract data types. The application may also be practiced in distributed computing environments where tasks are performed by remote processing devices that are linked through a communications network. In a distributed computing environment, program modules may be located in both local and remote computer storage media including memory storage devices.
It should be understood that the above-described embodiments are merely exemplary of some, and not all, embodiments of the present application, and that the drawings illustrate preferred embodiments of the present application without limiting the scope of the claims appended hereto. This application is capable of embodiments in many different forms and is provided for the purpose of enabling a thorough understanding of the disclosure of the application. Although the present application has been described in detail with reference to the foregoing embodiments, it will be apparent to one skilled in the art that the present application may be practiced without modification or with equivalents of some of the features described in the foregoing embodiments. All equivalent structures made by using the contents of the specification and the drawings of the present application are directly or indirectly applied to other related technical fields, and all the equivalent structures are within the protection scope of the present application.

Claims (10)

1. An access traffic switching method, comprising:
receiving an access flow switching instruction, acquiring a first flow distribution strategy, and distributing access flow to a first service system and a second service system according to the first flow distribution strategy;
acquiring incoming parameters of a test program, and generating a simulation test request according to the incoming parameters of the test program;
acquiring test data, and respectively initiating the simulation test request to the first service system and the second service system;
acquiring a simulation test result output by the first service system within a preset time period to obtain a first test result, and acquiring a simulation test result output by the second service system to obtain a second test result;
comparing the first test result with the second test result, determining data needing error reporting, and counting the data volume of the error reporting data;
and comparing the data volume of the error reporting data with a preset error reporting threshold value, if the data volume of the error reporting data is greater than the error reporting threshold value, acquiring a second traffic diversion strategy, and redistributing the access traffic according to the second traffic diversion strategy.
2. The method for switching access traffic according to claim 1, wherein the receiving an access traffic switching instruction, obtaining a first traffic offload policy, and allocating access traffic to a first service system and a second service system according to the first traffic offload policy specifically includes:
receiving the access flow switching instruction, and acquiring an interface serial number of an API (application program interface) corresponding to access flow switching;
carrying out Hash operation on the interface serial number to obtain a Hash operation result;
performing modular operation on the hash operation result to obtain a modular operation result;
and generating the first traffic distribution strategy according to the modular operation result, and distributing the access traffic to a first service system and a second service system according to the first traffic distribution strategy.
3. The method for switching access traffic according to claim 2, wherein the generating the first traffic offload policy according to the result of the modulo operation, and allocating the access traffic to the first service system and the second service system according to the first traffic offload policy specifically includes:
analyzing the first traffic distribution strategy, and acquiring distribution information corresponding to the first traffic distribution strategy to obtain first distribution information;
adjusting the configuration information of the API interface according to the first shunt information to obtain a first API interface;
and distributing the access flow to the first service system and the second service system through the first API interface.
4. The access traffic switching method according to claim 2, wherein the performing a modulo operation on the hash operation result to obtain a modulo operation result specifically includes:
acquiring an initial weight of the first service system to obtain a first initial weight, and acquiring an initial weight of the second service system to obtain a second initial weight;
calculating an initial weight sum based on the first initial weight and the second initial weight;
and performing modular operation on the hash operation result according to the initial weight sum to obtain a modular operation result.
5. The access traffic switching method according to claim 4, wherein the hash operation result is modulo-operated based on the following formula:
M=Hasd(TransSeriaNo)%(P 0 -1)
in the formula, the modulo operation result is an interface flow number corresponding to the access flow switching API, and the hash operation result of the interface flow number is the initial weight sum.
6. The access traffic switching method according to any one of claims 1 to 5, wherein, within a preset time period, obtaining the simulation test result output by the first service system to obtain a first test result, and obtaining the simulation test result output by the second service system to obtain a second test result, further comprising:
synchronizing the first test result and the second test result into a preset redis cache;
and storing the first test result and the second test result in a preset database.
7. The method for switching access traffic according to claim 6, wherein the comparing the data size of the error-reporting data with a preset error-reporting threshold, if the data size of the error-reporting data is greater than the error-reporting threshold, obtaining a second traffic offload policy, and reallocating the access traffic according to the second traffic offload policy specifically includes:
comparing the data volume of the error reporting data with a preset error reporting threshold value;
if the data volume of the error reporting data is larger than the error reporting threshold value, acquiring a second traffic diversion strategy;
analyzing the second traffic distribution strategy, and acquiring distribution information corresponding to the second traffic distribution strategy to obtain second distribution information;
adjusting the configuration information of the API interface according to the second shunt information to obtain a second API interface;
redistributing the access traffic through the second API interface.
8. An access traffic switching apparatus, comprising:
the initial flow distribution module is used for receiving an access flow switching instruction, acquiring a first flow distribution strategy and distributing access flow to a first service system and a second service system according to the first flow distribution strategy;
the request generation module is used for acquiring the incoming parameters of the test program and generating a simulation test request according to the incoming parameters of the test program;
a request initiating module, configured to obtain test data and initiate the simulation test request to the first service system and the second service system respectively;
the simulation test module is used for acquiring a simulation test result output by the first service system within a preset time period to obtain a first test result and acquiring a simulation test result output by the second service system to obtain a second test result;
the result comparison module is used for comparing the first test result with the second test result, determining data needing error reporting and counting the data volume of the error reporting data;
and the flow switching module is used for comparing the data volume of the error reporting data with a preset error reporting threshold value, acquiring a second flow distribution strategy if the data volume of the error reporting data is greater than the error reporting threshold value, and redistributing the access flow according to the second flow distribution strategy.
9. A computer device comprising a memory having computer readable instructions stored therein and a processor that when executed performs the steps of the access traffic switching method of any of claims 1 to 7.
10. A computer-readable storage medium having computer-readable instructions stored thereon which, when executed by a processor, implement the steps of the access traffic switching method of any of claims 1 to 7.
CN202211163402.4A 2022-09-23 2022-09-23 Access flow switching method and device, computer equipment and storage medium Active CN115567455B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211163402.4A CN115567455B (en) 2022-09-23 2022-09-23 Access flow switching method and device, computer equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211163402.4A CN115567455B (en) 2022-09-23 2022-09-23 Access flow switching method and device, computer equipment and storage medium

Publications (2)

Publication Number Publication Date
CN115567455A true CN115567455A (en) 2023-01-03
CN115567455B CN115567455B (en) 2024-05-07

Family

ID=84740939

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211163402.4A Active CN115567455B (en) 2022-09-23 2022-09-23 Access flow switching method and device, computer equipment and storage medium

Country Status (1)

Country Link
CN (1) CN115567455B (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109600384A (en) * 2018-12-28 2019-04-09 江苏满运软件科技有限公司 Flow switching method, system, equipment and storage medium in RPC interface upgrade
CN110769034A (en) * 2019-09-20 2020-02-07 中国平安人寿保险股份有限公司 Recommendation system strategy iteration method and device, storage medium and server
CN111475399A (en) * 2020-03-11 2020-07-31 平安科技(深圳)有限公司 Virtual test method and device
CN111880831A (en) * 2020-07-27 2020-11-03 平安国际智慧城市科技股份有限公司 Method and device for synchronously updating server, computer equipment and storage medium
WO2022095518A1 (en) * 2020-11-06 2022-05-12 深圳壹账通智能科技有限公司 Automatic interface test method and apparatus, and computer device and storage medium
CN115021831A (en) * 2022-06-22 2022-09-06 北京有竹居网络技术有限公司 Weak network testing method, device, system, equipment and storage medium

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109600384A (en) * 2018-12-28 2019-04-09 江苏满运软件科技有限公司 Flow switching method, system, equipment and storage medium in RPC interface upgrade
CN110769034A (en) * 2019-09-20 2020-02-07 中国平安人寿保险股份有限公司 Recommendation system strategy iteration method and device, storage medium and server
CN111475399A (en) * 2020-03-11 2020-07-31 平安科技(深圳)有限公司 Virtual test method and device
CN111880831A (en) * 2020-07-27 2020-11-03 平安国际智慧城市科技股份有限公司 Method and device for synchronously updating server, computer equipment and storage medium
WO2022095518A1 (en) * 2020-11-06 2022-05-12 深圳壹账通智能科技有限公司 Automatic interface test method and apparatus, and computer device and storage medium
CN115021831A (en) * 2022-06-22 2022-09-06 北京有竹居网络技术有限公司 Weak network testing method, device, system, equipment and storage medium

Also Published As

Publication number Publication date
CN115567455B (en) 2024-05-07

Similar Documents

Publication Publication Date Title
CN105205174A (en) File processing method and device for distributed system
CN115277566B (en) Load balancing method and device for data access, computer equipment and medium
CN112468409A (en) Access control method, device, computer equipment and storage medium
CN112199442A (en) Distributed batch file downloading method and device, computer equipment and storage medium
CN113918356B (en) Method and device for quickly synchronizing data based on CUDA (compute unified device architecture), computer equipment and storage medium
CN111680477A (en) Method and device for exporting spreadsheet file, computer equipment and storage medium
CN110620681A (en) Network connection timeout time setting method, device, equipment and medium
CN112416934A (en) hive table incremental data synchronization method and device, computer equipment and storage medium
CN113254445A (en) Real-time data storage method and device, computer equipment and storage medium
CN112631884A (en) Pressure measurement method and device based on data synchronization, computer equipment and storage medium
CN115567594A (en) Microservice request processing method, microservice request processing device, computer equipment and storage medium
CN113254106B (en) Task execution method and device based on Flink, computer equipment and storage medium
CN113626438B (en) Data table management method, device, computer equipment and storage medium
CN114490089A (en) Cloud computing resource automatic adjusting method and device, computer equipment and storage medium
CN116069493A (en) Data processing method, device, equipment and readable storage medium
CN114070847B (en) Method, device, equipment and storage medium for limiting current of server
CN112256760A (en) Data prediction method and device, computer equipment and storage medium
CN107657155B (en) Method and device for authenticating user operation authority
CN107045452B (en) Virtual machine scheduling method and device
CN116886626A (en) Service data flow limiting method and device, computer equipment and storage medium
US20230063599A1 (en) Edge computing network, data transmission method and apparatus, device and storage medium
CN115567455A (en) Access flow switching method and device, computer equipment and storage medium
CN115203672A (en) Information access control method and device, computer equipment and medium
CN114995914A (en) Picture data processing method and device, computer equipment and storage medium
CN115576837A (en) Batch number making method and device, computer equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant