CN115904361B - Data processing method, device, equipment and medium applied to micro-service - Google Patents

Data processing method, device, equipment and medium applied to micro-service Download PDF

Info

Publication number
CN115904361B
CN115904361B CN202211190071.3A CN202211190071A CN115904361B CN 115904361 B CN115904361 B CN 115904361B CN 202211190071 A CN202211190071 A CN 202211190071A CN 115904361 B CN115904361 B CN 115904361B
Authority
CN
China
Prior art keywords
target
configuration information
information
service
micro
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202211190071.3A
Other languages
Chinese (zh)
Other versions
CN115904361A (en
Inventor
薛志侯
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
CCB Finetech Co Ltd
Original Assignee
CCB Finetech Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by CCB Finetech Co Ltd filed Critical CCB Finetech Co Ltd
Priority to CN202211190071.3A priority Critical patent/CN115904361B/en
Publication of CN115904361A publication Critical patent/CN115904361A/en
Application granted granted Critical
Publication of CN115904361B publication Critical patent/CN115904361B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

The present disclosure provides a data processing method, apparatus, device, storage medium and program product applied to micro services, which can be applied to the technical fields of big data and information security. The method comprises the following steps: acquiring a target document from a first storage address, wherein the target document is used for storing encrypted target configuration information in the micro-service, and the first storage address is different from a second storage address used for storing system information of the micro-service; the target method is called to decrypt the target configuration information to obtain decrypted plaintext information, the target configuration information is encrypted through a preset encryption method, and the target method is obtained based on an expansion interface of the micro-service; and configuring the plaintext information to a target container of the micro-service, the target container being used to invoke the plaintext information in the micro-service.

Description

Data processing method, device, equipment and medium applied to micro-service
Technical Field
The present disclosure relates to the field of big data and information security technologies, and in particular, to a data processing method, apparatus, device, medium, and program product applied to a micro service.
Background
In a micro-service architecture, a configuration center is used to manage the externalized configuration information of the micro-service. The plurality of micro-services may correspond to a plurality of configuration centers. In the related art, encrypted configuration information is written in a configuration file in the micro service, and decrypted in an internal method of the micro service, so that the configuration information is effective in the micro service.
In the case of expanding a certain micro-service or connecting different configuration centers, the configuration files in the micro-service may change. In the related art, modification and reapplication of configuration information in the current micro service are realized by modifying codes of the micro service and re-packing and deploying. This results in a significant amount of time spent by the developer changing code and repackaging deployment micro-services, increasing the manual change costs. And, repeated execution of the package deployment operation by the computer may also result in waste of resources.
Disclosure of Invention
In view of the foregoing, the present disclosure provides a data processing method, apparatus, device, medium, and program product applied to a micro service.
According to a first aspect of the present disclosure, there is provided a data processing method applied to a micro service, comprising: acquiring a target document from a first storage address, wherein the target document is used for storing encrypted target configuration information in the micro-service, and the first storage address is different from a second storage address used for storing system information of the micro-service;
the target method is called to decrypt the target configuration information to obtain decrypted plaintext information, the target configuration information is encrypted through a preset encryption method, and the target method is obtained based on an expansion interface of the micro-service; and
The plaintext information is configured to a target container of the microservice, the target container being used to invoke the plaintext information in the microservice.
According to an embodiment of the present disclosure, a target method is invoked to decrypt target configuration information in a target document, and obtain decrypted plaintext information, including:
reading the target document as an input byte stream;
calling a preset loading method to store the input byte stream to an initialized document object;
acquiring target configuration information from an initialized document object; and
and decrypting the target configuration information according to a decryption method corresponding to the preset encryption method to obtain decrypted plaintext information.
According to the embodiment of the disclosure, target configuration information in a target document is stored in the form of a first key value pair, a primary key of the first key value pair is used for describing the attribute of the target configuration information, and a key value of the first key value pair is encrypted target configuration information;
obtaining target configuration information from the initialized document object comprises the following steps:
determining a target primary key corresponding to the target configuration information; and
and acquiring target configuration information corresponding to the target main key according to the corresponding relation between the target main key and the target key value.
According to an embodiment of the present disclosure, after decrypting the target configuration information in the target document by calling the target method, the method further includes:
Storing the plaintext information into a hash map object; and
packaging the hash map object into a preset class, wherein the preset class is a storage class used for storing configuration information in the micro service;
the plaintext information is stored in the form of a second key value pair, a primary key of the second key value pair is used for describing the plaintext information, the name of the primary key is determined according to the definition of the micro-service, and the key value of the second key value pair is the plaintext information.
According to an embodiment of the present disclosure, configuring plaintext information to a target container of a microservice includes:
applying the plaintext information in the packaged preset class to the micro-service, wherein the application level of the plaintext information is higher than that of other configuration information in the micro-service; and
and adding the target method to a preset address under a second storage address, configuring plaintext information to a target container of the micro-service through a service discovery mechanism, wherein the preset address is used for storing a file for realizing the extended service.
According to an embodiment of the present disclosure, adding a target method to a preset address under a second storage address, configuring plaintext information to a target container of a micro service through a service discovery mechanism, includes:
adding the fully defined class name of the target method into a target file under a preset address; and
In the case of starting the micro-service, the implementation class within the target method is loaded to the target container by reading the target file.
According to an embodiment of the present disclosure, before decrypting the target configuration information in the target document by calling the target method to obtain the decrypted plaintext information, the method further includes:
annotations to the target methods are added to the micro-service so that the execution framework of the micro-service invokes the target methods through scanning operations.
According to an embodiment of the present disclosure, the method further comprises:
under the condition that the change of the connection information of the configuration center of the micro service is detected, updating the target configuration information according to the updated connection information to obtain new configuration information;
and updating the key value of the first key value pair in the target document by using the new configuration information to obtain the updated target document.
A second aspect of the present disclosure provides a data processing apparatus applied to a micro service, comprising: the acquisition module is used for acquiring a target document from a first storage address, wherein the target document is used for storing encrypted target configuration information in the micro service, and the first storage address is different from a second storage address used for storing system information of the micro service;
the decryption module is used for calling a target method to decrypt the target configuration information to obtain decrypted plaintext information, the target configuration information is encrypted through a preset encryption method, and the target method is obtained based on an expansion interface of the micro-service; and
And the configuration module is used for configuring the plaintext information to a target container of the micro-service, and the target container is used for calling the plaintext information in the micro-service.
A third aspect of the present disclosure provides an electronic device, comprising: one or more processors; and a memory for storing one or more programs, wherein the one or more programs, when executed by the one or more processors, cause the one or more processors to perform the data processing method applied to the micro-service described above.
A fourth aspect of the present disclosure also provides a computer-readable storage medium having stored thereon executable instructions that, when executed by a processor, cause the processor to perform the above-described data processing method applied to a micro service.
A fifth aspect of the present disclosure also provides a computer program product comprising a computer program which, when executed by a processor, implements the above described data processing method applied to a micro service.
The method comprises the steps of obtaining encrypted target configuration information from a target document outside a micro service project, and decrypting the configuration information by calling a target method through an expansion interface to obtain plaintext information; finally, the decrypted configuration information is applied to the micro-service, and the calling of the configuration information in the micro-service is realized. Because the target configuration information is stored outside the micro-service, and the micro-service is decryption and encapsulation deployment based on the target method of the expansion interface, under the condition that the configuration information is changed, the configuration information is only required to be changed, the decryption and deployment of the configuration information are carried out through the target method of the expansion interface, and the development personnel are not required to modify the configuration information inside the micro-service through modifying codes, so that the effectiveness and the application of the target configuration information can be realized. Therefore, the method can be simplified, the workload of a developer is reduced, the configuration information can be validated without modifying codes or repackaging under the condition that the configuration information is changed, the configuration information changing flow is simplified, the workload of the developer is reduced, and the labor cost is reduced. Meanwhile, the method and the device do not need to carry out packing capacity expansion of the micro service for many times, and achieve the technical effects of reducing the use amount of computer resources and improving the change efficiency.
Drawings
The foregoing and other objects, features and advantages of the disclosure will be more apparent from the following description of embodiments of the disclosure with reference to the accompanying drawings, in which:
fig. 1 schematically illustrates an application scenario of a data processing method applied to a micro service according to an embodiment of the present disclosure;
FIG. 2 schematically illustrates a flow chart of a data processing method applied to a micro service according to an embodiment of the present disclosure;
FIG. 3 schematically illustrates a flow chart of a method of decrypting a target configuration information according to an embodiment of the disclosure;
FIG. 4 schematically illustrates a flow chart of a method of configuring plaintext information according to an embodiment of the present disclosure;
FIG. 5 schematically illustrates a data processing flow diagram according to a specific embodiment of the present disclosure;
FIG. 6 schematically illustrates a block diagram of a data processing apparatus applied to a micro service according to an embodiment of the present disclosure; and
fig. 7 schematically illustrates a block diagram of an electronic device adapted for application to a data processing method of a micro-service according to an embodiment of the present disclosure.
Detailed Description
Hereinafter, embodiments of the present disclosure will be described with reference to the accompanying drawings. It should be understood that the description is only exemplary and is not intended to limit the scope of the present disclosure. In the following detailed description, for purposes of explanation, numerous specific details are set forth in order to provide a thorough understanding of the embodiments of the present disclosure. It may be evident, however, that one or more embodiments may be practiced without these specific details. In addition, in the following description, descriptions of well-known structures and techniques are omitted so as not to unnecessarily obscure the concepts of the present disclosure.
The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the disclosure. The terms "comprises," "comprising," and/or the like, as used herein, specify the presence of stated features, steps, operations, and/or components, but do not preclude the presence or addition of one or more other features, steps, operations, or components.
All terms (including technical and scientific terms) used herein have the same meaning as commonly understood by one of ordinary skill in the art unless otherwise defined. It should be noted that the terms used herein should be construed to have meanings consistent with the context of the present specification and should not be construed in an idealized or overly formal manner.
Where expressions like at least one of "A, B and C, etc. are used, the expressions should generally be interpreted in accordance with the meaning as commonly understood by those skilled in the art (e.g.," a system having at least one of A, B and C "shall include, but not be limited to, a system having a alone, B alone, C alone, a and B together, a and C together, B and C together, and/or A, B, C together, etc.).
In the technical scheme of the disclosure, the related data (such as including but not limited to personal information of a user) are collected, stored, used, processed, transmitted, provided, disclosed, applied and the like, all conform to the regulations of related laws and regulations, necessary security measures are adopted, and the public welcome is not violated.
In the related art, as the number of users increases, the pressure borne by the server where the micro service is located is also heavier and heavier, which may cause the server to crash or lose data. In this case, the developer needs to split the data on the micro service, and realize the functions of the micro service by two or more servers. Or the same micro-service needs to call the data in a plurality of configuration centers to realize the function of the micro-service; changes in data storage locations within the same configuration center, etc., all of which may result in changes in configuration information in the microservice.
Since the related art writes the encrypted configuration information in the configuration file of the micro service and decrypts in the internal method of the micro service. Therefore, when configuration information in the configuration center is changed, all servers under the micro service need to be adaptively changed to apply the changed configuration information to the micro service. This results in the developer being required to perform repeated code transformation, packaging, and deployment operations; meanwhile, for the server under the micro service, the computer resource is wasted to finish the service restart. Therefore, the related art has the technical problems of high cost of changing configuration information, long changing time and low changing efficiency.
The embodiment of the disclosure provides a data processing method applied to micro services, comprising the following steps: acquiring a target document from a first storage address, wherein the target document is used for storing encrypted target configuration information in the micro-service, and the first storage address is different from a second storage address used for storing system information of the micro-service; the target method is called to decrypt the target configuration information to obtain decrypted plaintext information, the target configuration information is encrypted through a preset encryption method, and the target method is obtained based on an expansion interface of the micro-service; and configuring the plaintext information to a target container of the micro-service, the target container being used to invoke the plaintext information in the micro-service.
Fig. 1 schematically illustrates an application scenario of a data processing method applied to a micro service according to an embodiment of the present disclosure.
As shown in fig. 1, the application scenario 100 according to this embodiment may include a first server 110, a second server 120, a server cluster 130, a first terminal device 140, and a second terminal device 150
The first server 110 is used to support management information and call information functions of the configuration center, and the first storage address may be determined by the first server 110, and is independent of the second server 120 and the server cluster 130. The second server 120 is a server where the micro service before capacity expansion is not performed, and is used for supporting the micro service function before capacity expansion. The server cluster 130 is used for the expanded micro service function.
The user may interact with the second server 120 and the server cluster 130 via the network using the first terminal device 140 or the second terminal device 150, respectively, to receive or send messages.
Various communication client applications, such as shopping class applications, web browser applications, search class applications, instant messaging tools, mailbox clients, social platform software, etc. (by way of example only) may be installed on the first and second terminal devices 140, 150.
The first and second terminal devices 140, 150 may be various electronic devices having a display screen and supporting web browsing, including but not limited to smartphones, tablets, laptop and desktop computers, and the like.
Connections are made between the first server 110 and the second server 120, between the first server 110 and the server cluster 130, between the first terminal device 140 and the second server 120, and between the second terminal device 150 and the server cluster 130 via a medium providing a communication link. The media providing the communication link includes various connection types such as wired, wireless communication links, or fiber optic cables, among others.
The second server 120 and the server cluster 130 may be servers providing various services, such as providing services for various web-side applications, providing services for application software or a module in application software. The services provided may be shopping services, seconds killing services, query services, chat services, and the like.
It should be noted that, the data processing method applied to the micro service provided in the embodiments of the present disclosure may be generally performed by the second server 120 and the server cluster 130. Accordingly, the data processing apparatus applied to the micro service provided in the embodiments of the present disclosure may be generally disposed in the second server 120 and the server cluster 130.
The data processing method applied to the micro service provided by the embodiment of the present disclosure may also be performed by a server cluster different from the second server 120 and capable of communicating with the first server 110, or by a server different from the server cluster 130 and capable of communicating with the first server 110. The number of specific servers or server clusters may be determined according to the actual situation. Accordingly, the data processing apparatus applied to the micro service provided in the embodiment of the present disclosure may also be disposed in a server cluster different from the second server 120 or a server different from the server cluster 130.
The data processing method applied to the micro service according to the disclosed embodiment will be described in detail with reference to fig. 2 to 5 based on the scenario described in fig. 1.
Fig. 2 schematically illustrates a flowchart of a data processing method applied to a micro service according to an embodiment of the present disclosure.
As shown in FIG. 2, the method includes operations S210-S230.
According to embodiments of the present disclosure, a micro-service may provide support for one functional module within a certain online banking client. For example, for a second-killing activity within an online banking client, a micro-service may provide second-killing activity support for multiple users logging into the online banking client. The micro-service may also provide support for commonly used modules within an online banking client, such as a balance inquiry module.
According to embodiments of the present disclosure, a micro-service may provide functional support for web pages and mobile clients.
In operation S210, a target document for storing encrypted target configuration information in a micro service is acquired from a first storage address, which is different from a second storage address for storing system information of the micro service.
According to an embodiment of the disclosure, the second storage address is used for storing system information of the micro service, specifically, system information including core execution logic of the micro service. The first storage address is used to store encrypted configuration information in the configuration center.
The first storage address and the second storage address may be respectively set in different servers or service clusters, or may be set in the same server or service cluster. For a first storage address and a second storage address set in the same server, a plurality of folders supporting micro services may be stored under the second storage address. The medium carrying the second storage address may be a magnetic disk, the first storage address being located outside the medium carrying the second storage address. In the case where the target document needs to be acquired, the target document is called and acquired from outside the medium bearing the second storage address.
According to an embodiment of the present disclosure, the target document may be document information in a TXT format for storing encrypted target configuration information. The target document can also be a storage file in other formats such as properties or yml.
In operation S220, the target method is called to decrypt the target configuration information, so as to obtain decrypted plaintext information, the target configuration information is encrypted by a preset encryption method, and the target method is obtained based on an expansion interface of the micro-service.
According to embodiments of the present disclosure, a micro-service may invoke a target method according to an extension interface. Wherein the expansion interface is provided by the micro-service execution framework.
The target method may be program code pre-written by a developer based on the expansion interface. And loading the written program code under the condition that the target method needs to be called.
For example, micro services are developed based on a springboot framework and use the nacos as a configuration center for the micro services. The expansion interface may be an environmental post processor within the spring framework. The target method may be a postProcessEnvironment method based on an extended interface rewrite.
According to the embodiment of the disclosure, since the target configuration information is encrypted according to the preset encryption method, in the process of decrypting the target configuration information, a decryption method matched with the preset encryption method needs to be called to decrypt the target configuration information, so as to obtain plaintext information comprising specific configuration information.
According to the embodiment of the disclosure, the preset encryption method and decryption method may be a common public key and private key pair, and may also be positive sequence information and negative sequence information that are matched with each other. In addition, the preset encryption method and decryption method can also be identification information which is self-defined by a developer and matched with each other.
In operation S230, the plaintext information is configured to a target container of the micro service, which is used to invoke the plaintext information in the micro service.
According to the embodiment of the disclosure, after decrypting the target configuration information to obtain the plaintext information, the parsed plaintext information needs to be applied to the context of the micro service, so that the micro service directly invokes the plaintext information when executing the corresponding function.
Specifically, by configuring the plaintext information in the target container in the micro-service execution framework, the micro-service instantiates the plaintext information through the target container, establishes the dependency relationship between the plaintext information and other data, and realizes the corresponding micro-service function.
The method comprises the steps of obtaining encrypted target configuration information from a target document outside a micro service project, and decrypting the configuration information by calling a target method through an expansion interface to obtain plaintext information; finally, the decrypted configuration information is applied to the micro-service, and the calling of the configuration information in the micro-service is realized. Because the target configuration information is stored outside the micro-service, and the micro-service is decryption and encapsulation deployment based on the target method of the expansion interface, under the condition that the configuration information is changed, the configuration information is only required to be changed, the decryption and deployment of the configuration information are carried out through the target method of the expansion interface, and the development personnel are not required to modify the configuration information inside the micro-service through modifying codes, so that the effectiveness and the application of the target configuration information can be realized. Therefore, the method can be simplified, the workload of a developer is reduced, the configuration information can be validated without modifying codes or repackaging under the condition that the configuration information is changed, the configuration information changing flow is simplified, the workload of the developer is reduced, and the labor cost is reduced. Meanwhile, the method and the device do not need to carry out packing capacity expansion of the micro service for many times, and achieve the technical effects of reducing the use amount of computer resources and improving the change efficiency.
Fig. 3 schematically illustrates a flowchart of a method of decrypting target configuration information according to an embodiment of the disclosure.
As shown in fig. 3, the method for decrypting the target configuration information according to the embodiment includes operations S321 to S324, which may be a specific embodiment of operation S220.
In operation S321, the target document is read as an input byte stream.
According to an embodiment of the present disclosure, a target document is read as a stream of input bytes before decrypting the target configuration information. And then processing according to the read input byte stream, and extracting target configuration information.
According to the embodiment of the disclosure, the target document may be a TXT document, and the input TXT document is read as a byte stream by using a FileInputStream method and is processed as an input byte stream in the next step.
In operation S322, a preset loading method is called to store the input byte stream to the initialization document object.
According to an embodiment of the present disclosure, an initialization document object is an object that matches a target document format. For example, the target document may be named a Properties file, and the corresponding initialization document object is also a Properties object.
After reading the target document as an input byte stream, the input byte stream is stored into the initializing document object by calling a preset loading method. The preset loading method may be a basic loading method in the micro service, such as a load () method.
According to the embodiment of the present disclosure, in the process of reading the target document as the input byte stream, an initialization document object may be automatically created according to a definition format of the document object, wherein the definition format of the initialization document object may be preset.
In operation S323, target configuration information is acquired from the initialization document object.
According to an embodiment of the present disclosure, the configuration information in the target document is stored in the form of a key-value pair, and after the target document is read as an input character stream and loaded into the initializing document object, the encrypted target configuration information in the initializing document object is still in the form of a key-value pair.
According to embodiments of the present disclosure, target configuration information may be obtained from an initialization document object by invoking an acquisition method commonly used in a micro service or server. For example, still taking the springboot framework as an example, the acquisition method may be the getProperty () method.
According to the embodiment of the disclosure, the target configuration information in the target document is stored in the form of a first key value pair, a primary key of the first key value pair is used for describing the attribute of the target configuration information, and a key value of the first key value pair is encrypted target configuration information.
Specifically, the primary key name and primary key form of the first key value pair can be obtained by a developer in a self-defining manner, and the corresponding key value information is encrypted target configuration information so as to ensure the security of the target configuration information. The key-value form of the first key-value pair can be words, numbers, character strings and the like.
As another embodiment, obtaining the target configuration information from the initializing document object includes: determining a target primary key corresponding to the target configuration information; and acquiring target configuration information corresponding to the target main key according to the corresponding relation between the target main key and the target key value.
The primary key and key value of the first key-value pair are matched with each other, and the target primary key corresponding to the target configuration information can be determined from the initialized document object according to the function or feature attribute of the target configuration information. And then according to the corresponding relation between the target main key and the target key value, namely the target configuration information, can be directly obtained.
In operation S324, the target configuration information is decrypted according to a decryption method corresponding to the preset encryption method, so as to obtain decrypted plaintext information.
According to the embodiment of the disclosure, since the obtained target configuration information is encrypted by the preset encryption method, after the target configuration information is obtained, the target configuration information is decrypted by a decryption method corresponding to the preset encryption method, so as to obtain decrypted plaintext information.
The preset encryption method and the decryption method are matched with each other so as to ensure the safety of the configuration information. For example, the preset encryption method may be encryption by using MD5 identification, or may be a completely random string sequence.
According to an embodiment of the present disclosure, the preset encryption method and decryption method may be stored at a first storage address, and may also be stored at a third storage address different from the first storage address and the second storage address. Before decrypting the target configuration information, determining a corresponding decryption method according to a preset encryption method, and then calling the decryption method from the first storage address or the third storage address to decrypt the target configuration information.
The method and the device store the encrypted target configuration information in the form of the first key value pair, so that the information is replaced in a key value mode under the condition of modifying the configuration information or a decryption method, the corresponding configuration information can be ensured to be accurately and rapidly acquired, and the flexibility of data configuration can be improved.
According to an embodiment of the present disclosure, after decrypting the target configuration information in the target document by calling the target method, the method further includes: storing the plaintext information into a hash map object; and packaging the hash map object into a preset class, wherein the preset class is a storage class used for storing configuration information in the micro service.
The plaintext information is stored in the form of a second key value pair, a primary key of the second key value pair is used for describing the plaintext information, the name of the primary key is determined according to the definition of the micro-service, and the key value of the second key value pair is the plaintext information.
According to embodiments of the present disclosure, the first key-value pair may be in the same form as the second key-value pair, all conforming to the definition specification of the micro-service. For example, the primary key names are identical in form and the key values are identical in form.
According to embodiments of the present disclosure, it is necessary to initially create a hash map object, such as a Hashmap object, before storing the plaintext information in the hash map object. After initializing a new hash map object, plaintext information is stored as a key value in the hash map object. The configuration information is then encapsulated into MapPropertySource. MapPropertySource, which is a preset class, is a subclass of PropertySource class, carrying attribute sources from different places inside the springboot.
For example, taking a configuration center as an example, the primary key name may be "spring. XXX. Na cos. Config. YYY", and the key value is na cosUrl; taking the address of the nacos as the registration address as an example, the primary key may be "spring. Xxx. Nacos. Discovery. Yyy", and the key value is nacosuarl.
Fig. 4 schematically shows a flowchart of a method of configuring plaintext information according to an embodiment of the present disclosure.
As shown in fig. 4, the method for configuring plaintext information according to the embodiment includes operations S431 to S432, which may be used as an embodiment of operation S230.
In operation S431, the plaintext information in the packaged preset class is applied to the micro service, where the application level of the plaintext information is higher than the application level of other configuration information in the micro service.
According to the embodiment of the disclosure, after the decrypted plaintext information is encapsulated into the preset class, the decrypted plaintext information may be applied to the server by using a priority configuration method in the context class.
For example, the application level of plaintext information is set to the first priority, higher than the application level of other configuration information, using the getPropertySources (). AddFirst () method of configuration environment.
Still taking the Nacos as a registration address as an example, setting the application level of the decrypted plaintext information as a first priority, preventing the plaintext information from being covered by other information, and ensuring that the registration address configured in the plaintext information is preferentially acquired. In addition, in other configuration information, the registration address may be a default maximum database to ensure that in the event that the registration address fails, the microservice can still obtain the corresponding registration address.
The method and the device prevent the configuration information from being covered by other configuration information in the micro service by setting the target configuration information to be of the first priority, and ensure the availability of the target configuration information.
In operation S432, the target method is added to a preset address at the second storage address, and the plaintext information is configured to the target container of the micro service through the service discovery mechanism, where the preset address is used to store a file for implementing the extended service.
According to the embodiment of the disclosure, in the process of configuring the parsed plaintext information in the micro-service, the target method needs to be added to the preset address under the second storage address, so that the follow-up micro-service can acquire and call the target method under the preset address.
As a specific embodiment, operation S432 may be implemented by the following method. And adding the fully defined class name of the target method into a target file under a preset address, and loading the implementation class in the target method into a target container by reading the target file under the condition of starting the micro service.
For example, a META-INF file is newly built under the resources resource file, a spring. Industries file is newly built under the file, and the fully defined class name of the target method is added. With the service discovery mechanism (Service Provider Interface, SPI), the implementation class of the target method based on the extended interface rewrite is loaded to the control inversion (Inversion Of Control, IOC) container at micro-service start-up.
Fig. 5 schematically illustrates a data processing flow diagram in accordance with a specific embodiment of the present disclosure.
As shown in FIG. 5, the data processing flow 500 includes operations S501-S507.
Operation S501, acquisition. The target document in TXT format may be retrieved from the first storage address.
Operation S502, reading. After the target document is acquired, the target document is read as a stream of input bytes.
Operation S503, loading. An initialization document object may be created in advance and then the retrieved input byte stream is loaded into the initialization document object.
In operation S504, the target configuration information is acquired. The target configuration information is acquired through the primary key of the first key value pair using the getProperty () method in initializing the document object.
Operation S505, decryption. After the encrypted target configuration information is acquired, a decryption method corresponding to a preset encryption method is acquired, and the acquired decryption method is utilized to decrypt the target configuration information, so that decrypted plaintext information is obtained.
And (S506) packaging. And taking the decrypted plaintext information as a key value of the second key value pair, storing the key value into a hash map object, and then packaging the plaintext information into a preset class.
Operation S507, configuration. Setting the application level of the packaged preset class as a first priority, and realizing configuration and application of the plaintext information.
According to an embodiment of the present disclosure, before decrypting the target configuration information in the target document by calling the target method to obtain the decrypted plaintext information, the method further includes: annotations to the target methods are added to the micro-service so that the execution framework of the micro-service invokes the target methods through scanning operations.
Because the target method is obtained based on the rewriting of the expansion interface, before the target method is applied to the springboot frame, annotation @ Component needs to be added to the target method, so that the target method can be managed by the springboot. Specifically, when the springboot is started, the information in the springboot frame is scanned, and after the added annotation is scanned, the corresponding target method can be managed by the springboot frame. When the target method needs to be called, the springboot framework can directly call the target method without reporting errors.
According to an embodiment of the present disclosure, the method further comprises: and under the condition that the connection information of the configuration center of the micro service is detected to be changed, updating the target configuration information according to the updated connection information to obtain new configuration information. And updating the key value of the first key value pair in the target document by using the new configuration information to obtain the updated target document.
In the process of applying the target configuration information to the micro-service, the execution framework needs to complete loading, parsing, decrypting and configuring of the target file. When the storage address of a certain data in the configuration center is changed, the corresponding connection information of the server or the terminal equipment with the calling relation with the data in the configuration center is correspondingly changed. At this time, the original connection information is replaced with the updated connection information, and the target configuration information is updated correspondingly.
Specifically, the connection information of the configuration center may be a registration address, and after the registration address is changed, the original registration address needs to be updated by using the changed registration address. And then re-encrypting the changed original address to update the target configuration information, and finally obtaining new configuration information. Correspondingly, in the target document, updating the key value corresponding to the registration address by using the new configuration information to obtain the updated target document.
Similarly, when the registration address is not changed and the encryption method is changed, the target configuration information is updated to obtain new configuration information, and then the target document is updated by using the new configuration information.
For the updated target document, the code transformation is not needed inside the execution framework. The updated target document can still be obtained from the first storage address in the execution framework, and the target method is called to decrypt the configuration information in the updated target document to obtain decrypted plaintext information; and configuring the decrypted plaintext information to a target container of the microservice so that the target container invokes the updated plaintext information in the microservice.
Fig. 6 schematically illustrates a block diagram of a data processing apparatus applied to a micro service according to an embodiment of the present disclosure.
As shown in fig. 6, the data processing apparatus 600 for micro-service application of this embodiment includes an acquisition module 610, a decryption module 620, and a configuration module 630.
An obtaining module 610 is configured to obtain a target document from a first storage address, where the target document is used to store encrypted target configuration information in the micro service, and the first storage address is different from a second storage address used to store system information of the micro service. In an embodiment, the obtaining module 610 may be configured to perform the operation S210 described above, which is not described herein.
The decryption module 620 is configured to invoke a target method to decrypt the target configuration information to obtain decrypted plaintext information, where the target configuration information is encrypted by a preset encryption method, and the target method is obtained based on an expansion interface of the micro service. In an embodiment, the decryption module 620 may be configured to perform the operation S220 described above, which is not described herein.
The configuration module 630 is configured to configure the plaintext information to a target container of the micro service, where the target container is used to invoke the plaintext information in the micro service. In an embodiment, the configuration module 630 may be configured to perform the operation S230 described above, which is not described herein.
According to an embodiment of the present disclosure, the decryption module 620 includes a first determination unit, a second determination unit, a third determination unit, and a fourth determination unit.
The first determination unit is used for reading the target document as an input byte stream. In an embodiment, the first determining unit may be configured to perform the operation S321 described above, which is not described herein.
The second determining unit is used for calling a preset loading method to store the input byte stream to the initialized document object. In an embodiment, the second determining unit may be configured to perform the operation S322 described above, which is not described herein.
The third determining unit is used for acquiring target configuration information from the initialized document object. In an embodiment, the third determining unit may be configured to perform the operation S323 described above, which is not described herein.
The fourth determining unit is configured to decrypt the target configuration information according to a decryption method corresponding to the preset encryption method, and obtain decrypted plaintext information. In an embodiment, the fourth determining unit may be configured to perform the operation S324 described above, which is not described herein.
According to an embodiment of the present disclosure, the third determination unit includes a first determination subunit and a second determination subunit.
The first determining subunit is configured to determine a target primary key corresponding to the target configuration information.
The second determining subunit is configured to obtain, according to the correspondence between the target primary key and the target key value, target configuration information corresponding to the target primary key.
According to an embodiment of the present disclosure, the data processing apparatus 600 applied to the micro service further includes a first encapsulation module and a second encapsulation module.
The first encapsulation module is used for storing the plaintext information to the hash map object.
The second encapsulation module is used for encapsulating the hash map object into a preset class, wherein the preset class is a storage class used for storing configuration information in the micro-service; the plaintext information is stored in the form of a second key value pair, a primary key of the second key value pair is used for describing the plaintext information, the name of the primary key is determined according to the definition of the micro-service, and the key value of the second key value pair is the plaintext information.
According to an embodiment of the present disclosure, the configuration module 630 includes a first configuration unit and a second configuration unit.
The first configuration unit is used for applying the plaintext information in the packaged preset class to the micro-service, wherein the application level of the plaintext information is higher than that of other configuration information in the micro-service. In an embodiment, the first configuration unit may be used to perform the operation S431 described above, which is not described herein.
The second configuration unit is used for adding the target method to a preset address under a second storage address, and configuring the plaintext information to a target container of the micro-service through a service discovery mechanism, wherein the preset address is used for storing a file for realizing the extended service. In an embodiment, the second configuration unit may be used to perform the operation S432 described above, which is not described herein.
According to an embodiment of the present disclosure, the second configuration unit comprises a first configuration subunit and a second configuration subunit.
The first configuration subunit is used for adding the fully-defined class name of the target method into the target file under the preset address.
The second configuration subunit is configured to load the implementation class in the target method to the target container by reading the target file under the condition of starting the micro service.
According to an embodiment of the present disclosure, the data processing apparatus 600 applied to the micro service further includes an annotation module for adding an annotation to the target method in the micro service, so that an execution framework of the micro service invokes the target method through a scan operation.
According to an embodiment of the present disclosure, the data processing apparatus 600 applied to the micro service further includes a detection module and an update module.
The detection module is used for updating the target configuration information according to the updated connection information to obtain new configuration information under the condition that the connection information of the configuration center of the micro service is detected to be changed.
The updating module is used for updating the key value of the first key value pair in the target document by using the new configuration information to obtain the updated target document.
Any of the acquisition module 610, decryption module 620, and configuration module 630 may be combined in one module to be implemented, or any of the modules may be split into multiple modules, according to embodiments of the present disclosure. Alternatively, at least some of the functionality of one or more of the modules may be combined with at least some of the functionality of other modules and implemented in one module. According to embodiments of the present disclosure, at least one of the acquisition module 610, the decryption module 620, and the configuration module 630 may be implemented at least in part as hardware circuitry, such as a Field Programmable Gate Array (FPGA), a Programmable Logic Array (PLA), a system-on-chip, a system-on-substrate, a system-on-package, an Application Specific Integrated Circuit (ASIC), or in hardware or firmware, such as any other reasonable way of integrating or packaging the circuitry, or in any one of or a suitable combination of any of three implementations of software, hardware, and firmware. Alternatively, at least one of the acquisition module 610, the decryption module 620, and the configuration module 630 may be at least partially implemented as a computer program module, which when executed, may perform the corresponding functions.
Fig. 7 schematically illustrates a block diagram of an electronic device adapted for application to a data processing method of a micro-service according to an embodiment of the present disclosure.
As shown in fig. 7, an electronic device 700 according to an embodiment of the present disclosure includes a processor 701 that can perform various appropriate actions and processes according to a program stored in a Read Only Memory (ROM) 702 or a program loaded from a storage section 708 into a Random Access Memory (RAM) 703. The processor 701 may include, for example, a general purpose microprocessor (e.g., a CPU), an instruction set processor and/or an associated chipset and/or a special purpose microprocessor (e.g., an Application Specific Integrated Circuit (ASIC)), or the like. The processor 701 may also include on-board memory for caching purposes. The processor 701 may comprise a single processing unit or a plurality of processing units for performing different actions of the method flows according to embodiments of the disclosure.
In the RAM 703, various programs and data necessary for the operation of the electronic apparatus 700 are stored. The processor 701, the ROM 702, and the RAM 703 are connected to each other through a bus 704. The processor 701 performs various operations of the method flow according to the embodiments of the present disclosure by executing programs in the ROM 702 and/or the RAM 703. Note that the program may be stored in one or more memories other than the ROM 702 and the RAM 703. The processor 701 may also perform various operations of the method flow according to embodiments of the present disclosure by executing programs stored in the one or more memories.
According to an embodiment of the present disclosure, the electronic device 700 may further include an input/output (I/O) interface 705, the input/output (I/O) interface 705 also being connected to the bus 704. The electronic device 700 may also include one or more of the following components connected to the I/O interface 705: an input section 706 including a keyboard, a mouse, and the like; an output portion 707 including a Cathode Ray Tube (CRT), a Liquid Crystal Display (LCD), and the like, a speaker, and the like; a storage section 708 including a hard disk or the like; and a communication section 709 including a network interface card such as a LAN card, a modem, or the like. The communication section 709 performs communication processing via a network such as the internet. The drive 710 is also connected to the I/O interface 705 as needed. A removable medium 711 such as a magnetic disk, an optical disk, a magneto-optical disk, a semiconductor memory, or the like is mounted on the drive 710 as necessary, so that a computer program read therefrom is mounted into the storage section 708 as necessary.
The present disclosure also provides a computer-readable storage medium that may be embodied in the apparatus/device/system described in the above embodiments; or may exist alone without being assembled into the apparatus/device/system. The computer-readable storage medium carries one or more programs which, when executed, implement methods in accordance with embodiments of the present disclosure.
According to embodiments of the present disclosure, the computer-readable storage medium may be a non-volatile computer-readable storage medium, which may include, for example, but is not limited to: a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the context of this disclosure, a computer-readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. For example, according to embodiments of the present disclosure, the computer-readable storage medium may include ROM 702 and/or RAM 703 and/or one or more memories other than ROM 702 and RAM 703 described above.
Embodiments of the present disclosure also include a computer program product comprising a computer program containing program code for performing the methods shown in the flowcharts. The program code, when executed in a computer system, causes the computer system to implement the data processing method for micro-services provided by embodiments of the present disclosure.
The above-described functions defined in the system/apparatus of the embodiments of the present disclosure are performed when the computer program is executed by the processor 701. The systems, apparatus, modules, units, etc. described above may be implemented by computer program modules according to embodiments of the disclosure.
In one embodiment, the computer program may be based on a tangible storage medium such as an optical storage device, a magnetic storage device, or the like. In another embodiment, the computer program may also be transmitted, distributed over a network medium in the form of signals, downloaded and installed via the communication section 709, and/or installed from the removable medium 711. The computer program may include program code that may be transmitted using any appropriate network medium, including but not limited to: wireless, wired, etc., or any suitable combination of the foregoing.
In such an embodiment, the computer program may be downloaded and installed from a network via the communication portion 709, and/or installed from the removable medium 711. The above-described functions defined in the system of the embodiments of the present disclosure are performed when the computer program is executed by the processor 701. The systems, devices, apparatus, modules, units, etc. described above may be implemented by computer program modules according to embodiments of the disclosure.
According to embodiments of the present disclosure, program code for performing computer programs provided by embodiments of the present disclosure may be written in any combination of one or more programming languages, and in particular, such computer programs may be implemented in high-level procedural and/or object-oriented programming languages, and/or assembly/machine languages. Programming languages include, but are not limited to, such as Java, c++, python, "C" or similar programming languages. The program code may execute entirely on the user's computing device, partly on the user's device, partly on a remote computing device, or entirely on the remote computing device or server. In the case of remote computing devices, the remote computing device may be connected to the user computing device through any kind of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or may be connected to an external computing device (e.g., connected via the Internet using an Internet service provider).
The flowcharts and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present disclosure. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams or flowchart illustration, and combinations of blocks in the block diagrams or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
Those skilled in the art will appreciate that the features recited in the various embodiments of the disclosure and/or in the claims may be provided in a variety of combinations and/or combinations, even if such combinations or combinations are not explicitly recited in the disclosure. In particular, the features recited in the various embodiments of the present disclosure and/or the claims may be variously combined and/or combined without departing from the spirit and teachings of the present disclosure. All such combinations and/or combinations fall within the scope of the present disclosure.
While the foregoing is directed to embodiments of the present disclosure, other and further details of the invention may be had by the present application, it is to be understood that the foregoing description is merely exemplary of the present disclosure and that no limitations are intended to the scope of the disclosure, except insofar as modifications, equivalents, improvements or modifications may be made without departing from the spirit and principles of the present disclosure.

Claims (10)

1. A data processing method applied to a micro service, comprising:
obtaining a target document from a first storage address, wherein the target document is used for storing encrypted target configuration information in a configuration center, the first storage address is different from a second storage address used for storing system information of the micro service, the target configuration information in the target document is stored in a form of a first key value pair, a main key of the first key value pair is used for describing the attribute of the target configuration information, and the key value of the first key value pair is the encrypted target configuration information;
Decrypting the target configuration information by calling a target method to obtain decrypted plaintext information, wherein the target configuration information is encrypted by a preset encryption method, and the target method is obtained based on an expansion interface of the micro service; and
configuring the plaintext information to a target container of the microservice, wherein the target container is used for calling the plaintext information in the microservice;
in case that the registration address of the configuration center of the micro service is changed, updating the original registration address by using the changed registration address; encrypting the changed registration address again to update the target configuration information to obtain new configuration information; updating the key value of the first key value pair in the target document by using the new configuration information to obtain an updated target document;
acquiring the updated target document from a first storage address; invoking the target method to decrypt the configuration information in the updated target document to obtain decrypted plaintext information; and configuring the decrypted plaintext information to a target container of the micro service so that the target container invokes the updated plaintext information in the micro service.
2. The method of claim 1, wherein the invoking the target method decrypts the target configuration information in the target document to obtain decrypted plaintext information, comprising:
reading the target document as an input byte stream;
calling a preset loading method to store the input byte stream to an initialized document object;
acquiring target configuration information from the initialized document object; and
and decrypting the target configuration information according to a decryption method corresponding to the preset encryption method to obtain decrypted plaintext information.
3. The method of claim 2, wherein the obtaining target configuration information from the initialization document object comprises:
determining a target primary key corresponding to the target configuration information; and
and acquiring target configuration information corresponding to the target main key according to the corresponding relation between the target main key and the target key value.
4. The method of claim 1, wherein after the target configuration information in the target document is decrypted by the calling target method to obtain decrypted plaintext information, further comprising:
storing the plaintext information into a hash map object; and
Packaging the hash map object into a preset class, wherein the preset class is a storage class used for storing configuration information in the micro service;
the plaintext information is stored in the form of a second key value pair, a primary key of the second key value pair is used for describing the plaintext information, the name of the primary key is determined according to the definition of the micro-service, and the key value of the second key value pair is the plaintext information.
5. The method of claim 4, wherein said configuring the plaintext information to a target container of the microservice comprises:
applying the plaintext information in the packaged preset class to the micro-service, wherein the application level of the plaintext information is higher than that of other configuration information in the micro-service; and
and adding the target method to a preset address under the second storage address, and configuring the plaintext information to a target container of the micro service through a service discovery mechanism, wherein the preset address is used for storing a file for realizing the extended service.
6. The method of claim 5, wherein the adding the target method to a preset address under the second storage address, configuring the plaintext information to a target container of the micro-service through a service discovery mechanism, comprises:
Adding the fully defined class name of the target method into the target file under the preset address; and
and under the condition of starting the micro service, loading the implementation class in the target method to the target container by reading the target file.
7. The method of claim 1, wherein before the target method decrypts the target configuration information in the target document to obtain the decrypted plaintext information, the method further comprises:
and adding an annotation to the target method in the micro-service, so that an execution framework of the micro-service calls the target method through a scanning operation.
8. A data processing apparatus for use in a micro-service, comprising:
the system comprises an acquisition module, a configuration center and a storage module, wherein the acquisition module is used for acquiring a target document from a first storage address, the target document is used for storing encrypted target configuration information in the configuration center, the first storage address is different from a second storage address used for storing system information of the micro service, the target configuration information in the target document is stored in a first key value pair mode, a main key of the first key value pair is used for describing the attribute of the target configuration information, and the key value of the first key value pair is the encrypted target configuration information;
The decryption module is used for calling a target method to decrypt the target configuration information to obtain decrypted plaintext information, the target configuration information is encrypted through a preset encryption method, and the target method is obtained based on an expansion interface of the micro service; and
the configuration module is used for configuring the plaintext information to a target container of the micro service, wherein the target container is used for calling the plaintext information in the micro service;
in case that the registration address of the configuration center of the micro service is changed, updating the original registration address by using the changed registration address; encrypting the changed registration address again to update the target configuration information to obtain new configuration information; updating the key value of the first key value pair in the target document by using the new configuration information to obtain an updated target document;
acquiring the updated target document from a first storage address; invoking the target method to decrypt the configuration information in the updated target document to obtain decrypted plaintext information; and configuring the decrypted plaintext information to a target container of the micro service so that the target container invokes the updated plaintext information in the micro service.
9. An electronic device, comprising:
one or more processors;
storage means for storing one or more programs,
wherein the one or more programs, when executed by the one or more processors, cause the one or more processors to perform the method of any of claims 1-7.
10. A computer readable storage medium having stored thereon executable instructions which, when executed by a processor, cause the processor to perform the method according to any of claims 1-7.
CN202211190071.3A 2022-09-28 2022-09-28 Data processing method, device, equipment and medium applied to micro-service Active CN115904361B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211190071.3A CN115904361B (en) 2022-09-28 2022-09-28 Data processing method, device, equipment and medium applied to micro-service

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211190071.3A CN115904361B (en) 2022-09-28 2022-09-28 Data processing method, device, equipment and medium applied to micro-service

Publications (2)

Publication Number Publication Date
CN115904361A CN115904361A (en) 2023-04-04
CN115904361B true CN115904361B (en) 2023-09-22

Family

ID=86488709

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211190071.3A Active CN115904361B (en) 2022-09-28 2022-09-28 Data processing method, device, equipment and medium applied to micro-service

Country Status (1)

Country Link
CN (1) CN115904361B (en)

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110661662A (en) * 2019-09-26 2020-01-07 北京北信源软件股份有限公司 Lightweight microservice configuration method
CN111131308A (en) * 2019-12-31 2020-05-08 微梦创科网络科技(中国)有限公司 Calling system and method based on service
CN111200560A (en) * 2019-12-26 2020-05-26 中国平安人寿保险股份有限公司 Microservice registration method, microservice registration device, microservice registration equipment and storage medium
WO2020237797A1 (en) * 2019-05-31 2020-12-03 烽火通信科技股份有限公司 Dynamic configuration management method and system in microservice framework
WO2020257383A1 (en) * 2019-06-20 2020-12-24 Citrix Systems, Inc. Systems and method updating adc configuration with intended state using desired state api
CN112306582A (en) * 2020-12-08 2021-02-02 树根互联技术有限公司 Configuration variable encryption and decryption method and device, computer equipment and readable storage medium
CN113312037A (en) * 2021-06-15 2021-08-27 北京百度网讯科技有限公司 Data processing method, device and equipment applied to microservice and storage medium
CN114143191A (en) * 2021-11-30 2022-03-04 招商局金融科技有限公司 Distributed gateway-based micro-service arranging method and device and related equipment
CN114900448A (en) * 2022-05-30 2022-08-12 上海亿通国际股份有限公司 Micro-service gateway flow management method and device and electronic equipment

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2020237797A1 (en) * 2019-05-31 2020-12-03 烽火通信科技股份有限公司 Dynamic configuration management method and system in microservice framework
WO2020257383A1 (en) * 2019-06-20 2020-12-24 Citrix Systems, Inc. Systems and method updating adc configuration with intended state using desired state api
CN110661662A (en) * 2019-09-26 2020-01-07 北京北信源软件股份有限公司 Lightweight microservice configuration method
CN111200560A (en) * 2019-12-26 2020-05-26 中国平安人寿保险股份有限公司 Microservice registration method, microservice registration device, microservice registration equipment and storage medium
CN111131308A (en) * 2019-12-31 2020-05-08 微梦创科网络科技(中国)有限公司 Calling system and method based on service
CN112306582A (en) * 2020-12-08 2021-02-02 树根互联技术有限公司 Configuration variable encryption and decryption method and device, computer equipment and readable storage medium
CN113312037A (en) * 2021-06-15 2021-08-27 北京百度网讯科技有限公司 Data processing method, device and equipment applied to microservice and storage medium
CN114143191A (en) * 2021-11-30 2022-03-04 招商局金融科技有限公司 Distributed gateway-based micro-service arranging method and device and related equipment
CN114900448A (en) * 2022-05-30 2022-08-12 上海亿通国际股份有限公司 Micro-service gateway flow management method and device and electronic equipment

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
Towards Generating Elastic Microservices: A Declarative Specification for Consistent Elasticity Configurations;Floriment Klinaku等;《2018 44th Euromicro Conference on Software Engineering and Advanced Applications (SEAA)》;1-4 *
云平台下基于微服务架构的高并发web服务器的设计与实现;李潼;《中国优秀硕士学位论文全文数据库 信息科技辑》;I137-166 *

Also Published As

Publication number Publication date
CN115904361A (en) 2023-04-04

Similar Documents

Publication Publication Date Title
CN106295255B (en) Application program reinforcing method and device
US8812683B2 (en) Service scripting framework
US11822947B2 (en) Automated management of machine images
US12045264B2 (en) Local data classification based on a remote service interface
AU2022245632B2 (en) Run-time communications protocol parameter adjustment in containerized applications
US11531526B1 (en) Creating portable serverless applications
CN116860266A (en) Application containerized deployment method and device, electronic equipment and storage medium
US8495664B2 (en) System, method and program product for invoking a remote method
CN114816361A (en) Method, device, equipment, medium and program product for generating splicing project
US11443058B2 (en) Processing requests at a remote service to implement local data classification
US11494184B1 (en) Creation of transportability container files for serverless applications
CN115686500A (en) Exposing cloud APIs based on supported hardware
KR102325986B1 (en) Method and system for dinamic application of storage encryption
CN111610982B (en) Application program development method, device and related system
Fischer et al. RPC based framework for partitioning IoT security software for trusted execution environments
CN109343970B (en) Application program-based operation method and device, electronic equipment and computer medium
CN115904361B (en) Data processing method, device, equipment and medium applied to micro-service
CN116700745A (en) Application deployment method and device based on container cloud platform, electronic equipment and medium
CN113626001B (en) API dynamic arrangement method and device based on script
US20150294241A1 (en) Enterprise integration platform
US20220237448A1 (en) Resource constraint aware deep learning model optimization for serverless-based inference systems
CN114756833A (en) Code obfuscation method, apparatus, device, medium, and program product
CN113535565A (en) Interface use case generation method, device, equipment, medium and program product
US20210373910A1 (en) Enabling a pre-boot screen to be accessed remotely
CN113342401A (en) Method, device, equipment and medium for generating application program installation package

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant