CN115695431A - Method and device for scheduling server, storage medium and electronic equipment - Google Patents

Method and device for scheduling server, storage medium and electronic equipment Download PDF

Info

Publication number
CN115695431A
CN115695431A CN202211358017.5A CN202211358017A CN115695431A CN 115695431 A CN115695431 A CN 115695431A CN 202211358017 A CN202211358017 A CN 202211358017A CN 115695431 A CN115695431 A CN 115695431A
Authority
CN
China
Prior art keywords
server
user
request
mapping table
target server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211358017.5A
Other languages
Chinese (zh)
Inventor
田志涛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Topsec Technology Co Ltd
Beijing Topsec Network Security Technology Co Ltd
Beijing Topsec Software Co Ltd
Original Assignee
Beijing Topsec Technology Co Ltd
Beijing Topsec Network Security Technology Co Ltd
Beijing Topsec Software Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Topsec Technology Co Ltd, Beijing Topsec Network Security Technology Co Ltd, Beijing Topsec Software Co Ltd filed Critical Beijing Topsec Technology Co Ltd
Priority to CN202211358017.5A priority Critical patent/CN115695431A/en
Publication of CN115695431A publication Critical patent/CN115695431A/en
Pending legal-status Critical Current

Links

Images

Abstract

Some embodiments of the present application provide a method, an apparatus, a storage medium, and an electronic device for scheduling a server, where the method includes: receiving a request sent by a client, wherein the request carries user authentication information; judging whether a user mapping table corresponding to the user authentication information exists or not to obtain a judgment result, wherein the user mapping table stores the matching relation between the user authentication information and an authentication server; and dispatching the request to a target server according to the judgment result. Some embodiments of the present application may implement scheduling of a request through a user mapping table, which is simple and efficient.

Description

Method and device for scheduling server, storage medium and electronic equipment
Technical Field
The present application relates to the field of load balancing technologies, and in particular, to a method and an apparatus for scheduling a server, a storage medium, and an electronic device.
Background
With the continuous increase of the traffic of the core part of the network, the access amount and the data traffic are rapidly increased, and a single server device is difficult to meet the actual requirement, so that a plurality of servers are used for providing services at present to solve the problem of service increase.
Currently, when a client accesses a server, the server needs to perform synchronous authentication on user information of the client. In the prior art, in order to improve the authentication efficiency of user information, all the servers in a service cluster store user information of all access users, and when a server provides service for a service of a client, if the server fails, the service can be directly dispatched to other servers without identity authentication. However, each server needs to dynamically store all user information, so that CPU resources of the server are occupied, normal service performance of the server is affected, and service processing efficiency of the server is reduced.
Therefore, how to provide a technical solution of an efficient method for scheduling servers becomes a technical problem which needs to be solved urgently.
Disclosure of Invention
Some embodiments of the present application aim to provide a method, an apparatus, a storage medium, and an electronic device for scheduling a server, which can implement scheduling a request to a target server that passes authentication in a manner of a user mapping table in a load balancing scenario, without affecting normal service performance and service processing efficiency of each server in a server cluster, and have high practicability.
In a first aspect, some embodiments of the present application provide a method for scheduling a server, including: receiving a request sent by a client, wherein the request carries user authentication information; judging whether a user mapping table corresponding to the user authentication information exists or not to obtain a judgment result, wherein the user mapping table stores the matching relation between the user authentication information and an authentication server; and dispatching the request to a target server according to the judgment result.
According to some embodiments of the application, whether the user mapping table corresponding to the user authentication information exists is judged, the request can be dispatched to the corresponding target server based on the judgment result, the request is dispatched to the target server passing the identity authentication in a user mapping table mode under a load balancing scene, normal service performance and service processing efficiency of each server in the server cluster cannot be influenced, and the practicability is high.
In some embodiments, the determining whether a user mapping table corresponding to the user authentication information exists to obtain a determination result includes: when the user mapping table does not exist, the judgment result is that the user mapping table does not exist; the dispatching the request to a target server according to the judgment result comprises: and selecting the target server serving the request by using a load algorithm.
Some embodiments of the present application may ensure that normal services are provided for a request by allocating a corresponding target server for the request in the absence of a user mapping table.
In some embodiments, before said dispatching said request to a target server, said method further comprises: and creating the user mapping table and the user information table corresponding to the user authentication information and the target server, wherein the target server is the authentication server.
Some embodiments of the application can store the user authentication information of the client by creating the user mapping table and the user information table, do not need to perform identity authentication again on the client when the server is subsequently redistributed, and have high efficiency.
In some embodiments, the determining whether a user mapping table corresponding to the user authentication information exists to obtain a determination result includes: when the user mapping table is confirmed to exist, the judgment result is the existence; the scheduling the request to a target server according to the determination result includes: detecting the authentication server in the user mapping table to obtain a detection result; and determining the target server according to the detection result, and dispatching the request to the target server.
Some embodiments of the present application may detect the authentication server and determine the target server by using the user mapping table, so as to effectively ensure the service performance of the server and avoid invalid work.
In some embodiments, the detecting the target server in the user mapping table to obtain a detection result includes: confirming that the operation parameters of the authentication server are normal, and judging that the detection result is normal; the determining the target server according to the detection result includes: and taking the authentication server as the target server.
Some embodiments of the application may schedule the request to the target server by using the authentication server that operates normally as the target server, so as to promote normal service for the request and ensure normal processing of the service.
In some embodiments, the detecting the target server in the user mapping table to obtain a detection result includes: confirming that the operation parameters of the authentication server are abnormal, wherein the detection result is a fault; the determining the target server according to the detection result includes: searching a user information table corresponding to the user authentication information; transmitting the user information table to any server except the authentication server; receiving a request for successful authentication of the user information table sent by any server; and taking any server as the target server.
Some embodiments of the application can actively send the authentication of the user information table to any server when the authentication server fails, serve the request as a target server after the authentication is passed, do not need any server to perform identity authentication again on the client, have high efficiency, and can normally provide service for the request.
In some embodiments, before said scheduling said request to said target server, said method further comprises: updating the user mapping table based on the any server.
Some embodiments of the present application may implement synchronization of user authentication information by updating the user mapping table.
In a second aspect, some embodiments of the present application provide an apparatus for scheduling a server, including: the system comprises a receiving module, a sending module and a receiving module, wherein the receiving module is used for receiving a request sent by a client, and the request carries user authentication information; the judging module is used for judging whether a user mapping table corresponding to the user authentication information exists or not to obtain a judging result, wherein the user mapping table stores the matching relation between the user authentication information and an authentication server; and the scheduling module is used for scheduling the request to a target server according to the judgment result.
In a third aspect, some embodiments of the present application provide a computer-readable storage medium on which a computer program is stored, which when executed by a processor, may implement the method according to any of the embodiments of the first aspect.
In a fourth aspect, some embodiments of the present application provide an electronic device comprising a memory, a processor, and a computer program stored on the memory and executable on the processor, wherein the processor, when executing the program, may implement the method according to any of the embodiments of the first aspect.
In a fifth aspect, some embodiments of the present application provide a computer program product comprising a computer program, wherein the computer program, when executed by a processor, is adapted to implement the method according to any of the embodiments of the first aspect.
Drawings
In order to more clearly illustrate the technical solutions of some embodiments of the present application, the drawings that are required to be used in some embodiments of the present application will be briefly described below, it should be understood that the following drawings only illustrate some embodiments of the present application and therefore should not be considered as limiting the scope, and that for those skilled in the art, other related drawings may also be obtained on the basis of these drawings without inventive effort.
Fig. 1 is a system diagram of a dispatch server provided in some embodiments of the present application;
FIG. 2 is a flowchart of a method of scheduling servers according to some embodiments of the present application;
fig. 3 is a second flowchart of a method for scheduling servers according to some embodiments of the present application;
FIG. 4 is a block diagram of an apparatus for a dispatch server provided in some embodiments of the present application;
fig. 5 is a schematic diagram of an electronic device according to some embodiments of the present application.
Detailed Description
The technical solutions in some embodiments of the present application will be described below with reference to the accompanying drawings in some embodiments of the present application.
It should be noted that: like reference numbers and letters refer to like items in the following figures, and thus, once an item is defined in one figure, it need not be further defined and explained in subsequent figures. Meanwhile, in the description of the present application, the terms "first", "second", and the like are used only for distinguishing the description, and are not construed as indicating or implying relative importance.
In the related art, as the traffic volume of the core portion of the network is continuously increased, the access volume and the data traffic volume are rapidly increased, and the requirements of the processing capacity, the computing intensity and the stability of the application service of the server are also continuously increased. Since a single server device is difficult to meet the demand, it is considered that a plurality of servers are employed to provide services using the idea of load balancing to solve the problem. At present, server load balancing mainly utilizes a server cluster technology to map addresses of a plurality of servers into an external logic server. Although the same service can be provided among a plurality of servers, a single client service only needs to be dispatched to a certain real server when being accessed. And user information authentication and synchronization is required between the client and the server before scheduling. User authentication information on each server may not be synchronized among the servers, if a certain real server fails under the server load scene, the service can be seamlessly switched to other real servers, and the user does not need to re-authenticate, which becomes an optimization problem of server load. In the prior art, the following method is mainly adopted to realize the synchronization of the user authentication information: each server has user information of all users, and when any server fails during service processing, the service can be dispatched to other servers without user information authentication. However, the server needs to dynamically store all user authentication information, and occupies a relatively large memory; when the data between the servers are synchronized, the resources of the server CPU are occupied, which is not beneficial to the scheduling processing of normal services.
In view of this, some embodiments of the present application provide a method for scheduling a server, which may implement scheduling a request of a client to a target server by determining whether a user mapping table corresponding to user authentication information exists in a scenario of server load balancing. According to some embodiments of the application, when the server is allocated to the request of the client, the request of the client can be seamlessly switched to other servers, and meanwhile, the user does not need to re-authenticate, the higher memory of the authentication server is not occupied, and further the efficiency of processing the service by the server is not influenced by scheduling the server.
As shown in fig. 1, some embodiments of the present application provide a system for updating user information, the system for updating user information comprising: a client 100, a proxy server 200, and a first server 300 and a second server 400. Wherein the client 100 may send a request to the proxy server 200. The proxy server 200 may store at least one user information table and user authentication information (one user authentication information corresponds to one user information table), and there is one user mapping table between each user authentication information and a server providing a service for the user authentication information.
For example, as one example, the proxy server 200 stores a user mapping table of the client 100. The user authentication information of the client 100 in the user mapping table matches the first server 300. After receiving the request from the client 100, the proxy server 200 finds that the authentication server is the first server 300, and then detects the state of the first server 300. If the first server 300 fails, the proxy server 200 searches for a complete user information table according to the user authentication information, and sends the user information table to the second server 400. The second server 400 feeds back the result of successful authentication to the proxy server 200 after successfully authenticating the user information table. The proxy server 200 replaces the first server 300 in the user mapping table with the second server 400 (in this case, the second server 400 is the target server), so that the request scheduling and the updating of the user mapping table can be realized. While the second server 400 does not need to separately re-authenticate the user of the client 100. The request of the authenticated user of the client 100 can be switched to the normal second server 400 without awareness through the user mapping table stored on the proxy server 200.
In some embodiments of the present application, if the proxy server 200 does not have a user mapping table corresponding to the user authentication information, the proxy server 200 may create a corresponding user mapping table after allocating an authentication server (at this time, the authentication server is a target server) serving a user through a load algorithm. It should be noted that, the communication between the proxy server 200 and two servers in fig. 1 is only an example, in practical applications, the proxy server 200 may communicate with a server cluster, and the number of servers in the server cluster may be set according to practical situations, which is not specifically limited herein.
Additionally, it is understood that proxy server 200 may also be referred to as an HTTP proxy server. The program is deployed at the front end of the server (i.e., the first server 300 and the second server 400) that needs load balancing as an extension software of the HTTP proxy server, and it is ensured that the server configurations are the same, and the proxy server 200 can start the server load balancing and user authentication information synchronization functions.
The following describes an implementation process of the method for scheduling a server, performed by the proxy server 200, according to some embodiments of the present application, with reference to fig. 2.
Referring to fig. 2, fig. 2 is a flowchart of a method for scheduling a server according to some embodiments of the present application, where the method for scheduling a server includes: s210, receiving a request sent by a client, wherein the request carries user authentication information. S220, judging whether a user mapping table corresponding to the user authentication information exists or not to obtain a judgment result, wherein the user mapping table stores the matching relation between the user authentication information and an authentication server. And S230, dispatching the request to a target server according to the judgment result.
For example, in some embodiments of the present application, the client 100 may send request traffic (i.e., requests) to the proxy server 200. After the proxy server 200 is hit by the requested traffic, it may determine whether the user mapping table is stored therein according to the user authentication information carried in the requested traffic, and obtain a determination result. And dispatching the request traffic to the corresponding target server according to the judgment result.
The above process is exemplarily set forth below.
In some embodiments of the present application, S220 may include: and if the user mapping table does not exist, determining that the user mapping table does not exist. S230 may include: and selecting the target server serving the request by using a load algorithm.
For example, in some embodiments of the present application, when the client 100 first sends a request to the proxy server 200, the proxy server 200 does not have a corresponding user mapping table stored therein. At this time, a load balancing algorithm may be adopted to allocate a target server providing a service for the request traffic of the client 100. It should be noted that, if the request traffic does not carry the user authentication information, the request traffic may be directly distributed to the target server by using a load balancing algorithm, and the service is ended after the completion.
In some embodiments of the present application, S230 may include: and creating the user mapping table and the user information table corresponding to the user authentication information and the target server, wherein the target server is the authentication server.
For example, in some embodiments of the present application, when the request traffic carries the user request information, after the proxy server 200 allocates the target server to the client 100, the request traffic may be cached first. Then, a user mapping table corresponding to the user authentication information of the client 100 is created, and the matching relationship between the user authentication information and the target server is stored in the user mapping table, so as to provide services for the client 100 subsequently. And simultaneously stores the user information table. The user information table contains complete information of the user, such as a user name and a password, and authentication data (e.g., a cookie, a session, etc.) responded by the server, and is used for subsequent information synchronization. The user mapping table is a session cache table maintained by the user's profile information and the target server of the schedule, i.e., the session (i.e., the request).
In some embodiments of the present application, S220 may include: and when the user mapping table is confirmed to exist, the judgment result is the existence. S230 may include: detecting the authentication server in the user mapping table to obtain a detection result; and determining the target server according to the detection result, and dispatching the request to the target server.
For example, in some embodiments of the present application, when the proxy server 200 has the user mapping table, the health detection configured in the proxy server 200 is used to perform health detection on the authentication server in the user mapping table (e.g., detect whether the configuration of the authentication server is normal, whether the operating parameters are normal, whether the operating state is normal, etc.), determine whether the authentication server is normal or failed, and further determine the target server.
In some embodiments of the present application, S230 may include: confirming that the operation parameters of the authentication server are normal, and judging that the detection result is normal; taking the authentication server as the target server.
For example, in some embodiments of the present application, after the proxy server 200 determines that the operation parameters of the authentication server are normal, the request may be dispatched to the authentication server according to the mapping relationship in the user mapping table (in this case, the authentication server is the target server), so that the authentication server provides a corresponding service for the request.
In some embodiments of the present application, S230 may include: confirming that the operation parameters of the authentication server are abnormal, wherein the detection result is a fault; searching a user information table corresponding to the user authentication information; transmitting the user information table to any server except the authentication server; receiving a request for successful authentication of the user information table sent by any server; and taking any server as the target server.
For example, in some embodiments of the present application, after the proxy server 200 detects that the authentication server fails, the proxy server 200 may find the user information table based on the user authentication information, then send the user information table to any server in other servers in the load balancing scenario, and if any server returns a result of successful authentication, dispatch the request to any server, which may be understood that any server is the target server at this time. Since the identity authentication of any server to the client 100 by the proxy server 200 is successful, the client 100 does not need to authenticate again, and the seamless switching of the requests is realized.
It should be noted that, the user integrity information of the user relationship table (i.e., the user information table) can be found out through the user authentication information in the mapping relationship table (i.e., the user mapping table), and is used as the user authentication information synchronization stage, and when the authentication server in the mapping relationship table fails, the proxy server 200 uses the user relationship table as the basis for actively initiating the authentication request to other normal servers.
In some embodiments of the present application, S230 may include: updating the user mapping table based on the any server.
For example, in some embodiments of the present application, after determining that any server can provide normal services, the proxy server 200 may automatically update the user mapping table, that is, modify the information of the authentication server in the user mapping table to the information of any server.
The following describes a specific process of a method for scheduling a server according to some embodiments of the present application with reference to fig. 3.
Referring to fig. 3, fig. 3 is a flowchart of a method for scheduling a server according to some embodiments of the present application.
The above process is exemplarily set forth below.
S310, receiving a request sent by the client.
For example, as a specific example of the present application, the client 100 sends request traffic requesting a service to the proxy server 200.
And S320, judging whether the request carries user authentication information, if so, executing S330, and otherwise, executing S321.
For example, as a specific example of the present application, if the request traffic does not carry the user authentication information, the request traffic is processed as a normal traffic and directly distributed to the target server.
S321, selecting a target server serving the request by using a load algorithm, and executing S350.
S330, judging whether a user mapping table corresponding to the user authentication information exists, if not, executing S331, otherwise, executing S340.
And S331, selecting a target server serving the request by using a load algorithm.
For example, as a specific example of the present application, the proxy server 200 selects a target server among normal servers to service a request.
S332, a user mapping table and a user information table corresponding to the user authentication information and the target server are created.
For example, as a specific example of the present application, the proxy server 200 stores the mapping relationship between the user authentication information and the target server in a user mapping table, and stores a complete user information table corresponding to the user authentication information.
And S340, judging whether the authentication server in the user mapping table is normal, if so, executing S350, and otherwise, executing S60.
For example, as a specific example of the present application, the proxy server 200 detects the operation state of the authentication server according to self-configured health detection.
S350, dispatching the request to the target server.
S360, sending the user information table to any server in the normal servers, and receiving a request sent by any server for successful authentication of the user information table.
For example, as a specific example of the present application, the proxy server 200 finds out a complete user information table corresponding to the user authentication information, and sends the complete user information table to any one of the normal servers, so as to confirm that the authentication is successful.
S370, with any server as the target server, updates the user mapping table, and executes S350.
For example, as a specific example of the present application, the proxy server 200 takes any server as a new target server, and updates the mapping relationship between the user authentication information and the target server in the user mapping table. For example, the IP of the authentication server is modified to the IP of either server.
It can be known from some embodiments of the present application that, when the program of the proxy server 200 receives the user authentication information carried in the request of the client 100, the user authentication information is recorded, and the user authentication information and the scheduled authentication server are used to generate a mapping relationship table. When detecting that a certain authentication server with mapping relation breaks down, the program actively sends an authentication request to another normal server by using a user information table corresponding to the user authentication information of the authentication server with the fault in the mapping relation table, so that the authenticated user can be switched to the normal server without perception, and the request can be quickly scheduled, and the efficiency is high.
Referring to fig. 4, fig. 4 is a block diagram illustrating an apparatus of a dispatch server according to some embodiments of the present application. It should be understood that the apparatus of the dispatch server corresponds to the above method embodiments, and can perform the steps related to the above method embodiments, and the specific functions of the apparatus of the dispatch server can be referred to the above description, and the detailed description is appropriately omitted here to avoid repetition.
The apparatus of the scheduling server of fig. 4 includes at least one software functional module that can be stored in a memory in the form of software or firmware or solidified in the apparatus of the scheduling server, the apparatus of the scheduling server including: a receiving module 410, configured to receive a request sent by a client, where the request carries user authentication information; a determining module 420, configured to determine whether a user mapping table corresponding to the user authentication information exists, so as to obtain a determination result, where a matching relationship between the user authentication information and an authentication server is stored in the user mapping table; and a scheduling module 430, configured to schedule the request to a target server according to the determination result.
In some embodiments of the present application, the determining module 420 is configured to determine that the user mapping table does not exist if the user mapping table does not exist; a scheduling module 430, configured to select the target server serving the request by using a load algorithm.
In some embodiments of the present application, the scheduling module 430 is configured to create the user mapping table and the user information table corresponding to the user authentication information and the target server, where the target server is the authentication server.
In some embodiments of the present application, the determining module 420 is configured to determine that the user mapping table exists if the user mapping table exists; and a scheduling module 430, configured to determine the target server according to the detection result, and schedule the request to the target server.
In some embodiments of the present application, the scheduling module 430 is configured to determine that the operation parameter of the authentication server is normal, and then the detection result is normal; and taking the authentication server as the target server.
In some embodiments of the present application, the scheduling module 430 is configured to determine that the authentication server operating parameter is abnormal, and the detection result is a failure; searching a user information table corresponding to the user authentication information; transmitting the user information table to any server except the authentication server; receiving a request for successful authentication of the user information table sent by any server; and taking any server as the target server.
In some embodiments of the present application, the scheduling module 430 is configured to update the user mapping table based on the any server.
Some embodiments of the present application further provide a computer-readable storage medium, on which a computer program is stored, which when executed by a processor can implement the operations of the method corresponding to any of the above-mentioned methods provided by the above-mentioned embodiments.
Some embodiments of the present application further provide a computer program product, which includes a computer program, wherein the computer program, when executed by a processor, can implement the operations of the method corresponding to any of the above-mentioned methods provided by the above-mentioned embodiments.
As shown in fig. 5, some embodiments of the present application provide an electronic device 500, the electronic device 500 comprising: a memory 510, a processor 520, and a computer program stored on the memory 510 and executable on the processor 520, wherein the method of any of the embodiments described above can be implemented when the processor 520 reads the program from the memory 510 via the bus 530 and executes the program.
Processor 520 may process digital signals and may include various computing structures. Such as a complex instruction set computer architecture, a structurally reduced instruction set computer architecture, or an architecture that implements a combination of instruction sets. In some examples, processor 520 may be a microprocessor.
Memory 510 may be used to store instructions that are executed by processor 520 or data related to the execution of the instructions. The instructions and/or data may include code for performing some or all of the functions of one or more of the modules described in embodiments of the application. The processor 520 of the disclosed embodiments may be used to execute instructions in the memory 510 to implement the methods illustrated above. Memory 510 includes dynamic random access memory, static random access memory, flash memory, optical memory, or other memory known to those skilled in the art.
The above description is only an example of the present application and is not intended to limit the scope of the present application, and various modifications and changes may be made by those skilled in the art. Any modification, equivalent replacement, improvement and the like made within the spirit and principle of the present application shall be included in the protection scope of the present application. It should be noted that: like reference numbers and letters refer to like items in the following figures, and thus, once an item is defined in one figure, it need not be further defined and explained in subsequent figures.
The above description is only for the specific embodiments of the present application, but the scope of the present application is not limited thereto, and any person skilled in the art can easily conceive of the changes or substitutions within the technical scope of the present application, and shall be covered by the scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.
It is noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising a … …" does not exclude the presence of another identical element in a process, method, article, or apparatus that comprises the element.

Claims (10)

1. A method for scheduling servers, comprising:
receiving a request sent by a client, wherein the request carries user authentication information;
judging whether a user mapping table corresponding to the user authentication information exists or not to obtain a judgment result, wherein the user mapping table stores the matching relation between the user authentication information and an authentication server;
and dispatching the request to a target server according to the judgment result.
2. The method of claim 1, wherein the determining whether a user mapping table corresponding to the user authentication information exists, resulting in a determination result, comprises:
if the user mapping table does not exist, the judgment result is that the user mapping table does not exist;
the scheduling the request to a target server according to the determination result includes:
and selecting the target server serving the request by using a load algorithm.
3. The method of claim 1 or 2, wherein prior to said dispatching said request to a target server, the method further comprises:
and creating the user mapping table and the user information table corresponding to the user authentication information and the target server, wherein the target server is the authentication server.
4. The method of claim 1, wherein the determining whether a user mapping table corresponding to the user authentication information exists, resulting in a determination result, comprises:
when the user mapping table is confirmed to exist, the judgment result is existence;
the scheduling the request to a target server according to the determination result includes:
detecting the authentication server in the user mapping table to obtain a detection result;
and determining the target server according to the detection result, and dispatching the request to the target server.
5. The method as claimed in claim 4, wherein said detecting said target server in said user mapping table to obtain a detection result comprises:
confirming that the operation parameters of the authentication server are normal, and judging that the detection result is normal;
the determining the target server according to the detection result includes:
taking the authentication server as the target server.
6. The method as claimed in claim 4 or 5, wherein said detecting the target server in the user mapping table to obtain a detection result comprises:
confirming that the operation parameters of the authentication server are abnormal, wherein the detection result is a fault;
the determining the target server according to the detection result includes:
searching a user information table corresponding to the user authentication information;
transmitting the user information table to any server except the authentication server;
receiving a request for successful authentication of the user information table sent by any server;
and taking any server as the target server.
7. The method of claim 6, wherein prior to said dispatching said request to said target server, said method further comprises:
updating the user mapping table based on the any server.
8. An apparatus for scheduling servers, comprising:
the system comprises a receiving module, a sending module and a receiving module, wherein the receiving module is used for receiving a request sent by a client, and the request carries user authentication information;
the judging module is used for judging whether a user mapping table corresponding to the user authentication information exists or not to obtain a judging result, wherein the user mapping table stores the matching relation between the user authentication information and an authentication server;
and the scheduling module is used for scheduling the request to a target server according to the judgment result.
9. A computer-readable storage medium, having stored thereon a computer program, wherein the computer program, when executed by a processor, performs the method of any of claims 1-7.
10. An electronic device comprising a memory, a processor, and a computer program stored on the memory and running on the processor, wherein the computer program, when executed by the processor, performs the method of any one of claims 1-7.
CN202211358017.5A 2022-11-01 2022-11-01 Method and device for scheduling server, storage medium and electronic equipment Pending CN115695431A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211358017.5A CN115695431A (en) 2022-11-01 2022-11-01 Method and device for scheduling server, storage medium and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211358017.5A CN115695431A (en) 2022-11-01 2022-11-01 Method and device for scheduling server, storage medium and electronic equipment

Publications (1)

Publication Number Publication Date
CN115695431A true CN115695431A (en) 2023-02-03

Family

ID=85047711

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211358017.5A Pending CN115695431A (en) 2022-11-01 2022-11-01 Method and device for scheduling server, storage medium and electronic equipment

Country Status (1)

Country Link
CN (1) CN115695431A (en)

Similar Documents

Publication Publication Date Title
CN111615066B (en) Distributed micro-service registration and calling method based on broadcast
CN112153160A (en) Access request processing method and device and electronic equipment
CN104980478A (en) Cache sharing method, devices and system in content delivery network
CN110336848B (en) Scheduling method, scheduling system and scheduling equipment for access request
US10567492B1 (en) Methods for load balancing in a federated identity environment and devices thereof
CN106991008B (en) Resource lock management method, related equipment and system
CN111352716B (en) Task request method, device and system based on big data and storage medium
CN113452808A (en) Domain name resolution method, device, equipment and storage medium
CN110971702A (en) Service calling method and device, computer equipment and storage medium
CN113361913A (en) Communication service arranging method, device, computer equipment and storage medium
KR101920630B1 (en) System and method for assigining server to terminal and efficiently delivering messages to the terminal
US20150156259A1 (en) Load balancing apparatus, information processing system, method and medium
CN106973106B (en) Method, device and system for acquiring session information
EP3341853B1 (en) Message processing node and database in a message processing system and methods of operating the same
CN113596105B (en) Content acquisition method, edge node and computer readable storage medium
CN115695431A (en) Method and device for scheduling server, storage medium and electronic equipment
CN114124797B (en) Server routing method and device, electronic equipment and storage medium
CN112799849B (en) Data processing method, device, equipment and storage medium
CN111104376B (en) Resource file query method and device
CN112583572B (en) Block chain network, service processing method, device and equipment
CN113746894A (en) Method and device for realizing load balancing based on HDFS RBF routing layer
CN113746909A (en) Network connection method, device, electronic equipment and computer readable storage medium
CN107317880B (en) Method and device for realizing load balance
CN111416852A (en) Method for session synchronization among multiple load balancers and load balancer
CN111125580A (en) Network resource acquisition method and device, electronic equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination