CN115987557A - Inter-cluster calling method and device, computer equipment and storage medium - Google Patents

Inter-cluster calling method and device, computer equipment and storage medium Download PDF

Info

Publication number
CN115987557A
CN115987557A CN202211501516.5A CN202211501516A CN115987557A CN 115987557 A CN115987557 A CN 115987557A CN 202211501516 A CN202211501516 A CN 202211501516A CN 115987557 A CN115987557 A CN 115987557A
Authority
CN
China
Prior art keywords
cluster
information
authorization
identity
calling
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211501516.5A
Other languages
Chinese (zh)
Inventor
舒艳华
钟建庭
杨传池
袁东昊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Haizhichuang Technology Co ltd
Original Assignee
Shenzhen Haizhichuang Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Haizhichuang Technology Co ltd filed Critical Shenzhen Haizhichuang Technology Co ltd
Priority to CN202211501516.5A priority Critical patent/CN115987557A/en
Publication of CN115987557A publication Critical patent/CN115987557A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Landscapes

  • Storage Device Security (AREA)

Abstract

The application relates to an inter-cluster calling method, an inter-cluster calling device, computer equipment and a storage medium. The method comprises the following steps: acquiring basic information of a first cluster and authorization verification information of the first cluster, and uploading the basic information of the first cluster and the authorization verification information of the first cluster to a block chain; responding to the operation that the second cluster calls the first cluster, and acquiring the identity information of the second cluster and the identity identification information of the first cluster; according to the identity identification information of the first cluster, inquiring the identity information of the first cluster on the block chain and calling the authorization verification information of the first cluster; and under the condition that the authorization verification information contains the identity information of the second cluster, transmitting the authorization information of the first cluster to the chain node of the block chain of the second cluster, and calling the data information of the first cluster through the authorization information. By adopting the method, the calling efficiency of the multiple clusters can be improved.

Description

Inter-cluster calling method and device, computer equipment and storage medium
Technical Field
The present application relates to the field of cluster management technologies, and in particular, to a method and an apparatus for multi-cluster management, a computer device, and a storage medium.
Background
Kubernets (k 8s for short, an abbreviation used to replace 8 characters "ubernet" with 8) is an open source for managing containerization applications on multiple hosts in a cloud platform. Although simple and efficient deployment containerization can be realized by using kubernets, the cluster management complexity of kubernets is high, and particularly, a lot of pre-installation and pre-configuration processes are required to be carried out on an operating system and software during deployment, so that the technical requirement on a cluster administrator is high.
In a traditional inter-cluster calling mode, a kubernet cluster authority is decomposed into a set number of authorities, authority and authority nodes are divided according to cluster roles, a server side generates a directed acyclic graph formed by the authorities through a resolver, and a calling controller distributes the authorities in the directed acyclic graph to clusters corresponding to the authorities in a client side, so that calling among kubernet clusters is completed. However, the prior art includes a centralized control plane service program, rather than a decentralized manner, which increases the complexity of the entire system, thereby resulting in a less efficient call for multiple clusters
Disclosure of Invention
In view of the foregoing, it is desirable to provide an inter-cluster calling method, an inter-cluster calling apparatus, a computer device, a computer readable storage medium, and a computer program product.
In a first aspect, the present application provides an inter-cluster calling method. The method comprises the following steps:
acquiring basic information of a first cluster and authorization verification information of the first cluster, and uploading the basic information of the first cluster and the authorization verification information of the first cluster to a block chain; the authorization verification information is identity information of a cluster authorized to be accessed by the first cluster, and the data information comprises identity information and authorization information;
responding to an operation that a second cluster calls a first cluster, and acquiring identity information of the second cluster and identity identification information of the first cluster;
according to the identity identification information of the first cluster, inquiring the identity information of the first cluster on the block chain and calling the authorization verification information of the first cluster;
and transmitting the authorization information of the first cluster to a link node of a block chain of the second cluster under the condition that the authorization verification information contains the identity information of the second cluster, and calling the data information of the first cluster through the authorization information.
Optionally, the obtaining the authorization verification information of the first cluster includes:
responding to the authorization operation of a user, and acquiring the identity information of the clusters which are mutually called;
and storing the identity information of the mutually called clusters except the identity information of the first cluster in the first cluster, and calling the identity information of each mutually called cluster in the first cluster through an authorization information calling program to be used as the authorization verification information of the first cluster.
Optionally, the uploading the basic information of the first cluster and the authorization verification information of the first cluster to the blockchain includes:
and registering a chain node of the first cluster on the block chain according to the identity information of the first cluster, and uploading the authorization information of the first cluster and the authorization verification information of the first cluster to the block chain based on the chain node.
Optionally, the querying, according to the identification information of the first cluster, the identification information of the first cluster on the blockchain and calling the authorization and verification information of the first cluster include:
according to the identification information of the first cluster, inquiring the identification information of the first cluster corresponding to the identification information of the first cluster in the identification information of each cluster on the block chain;
based on the identity information of the first cluster, retrieving authorization verification information of the first cluster on a chain node of the first cluster.
Optionally, the retrieving, by the authorization information, the data information of the first cluster includes:
and determining an authorized calling range of the second cluster according to the authorization information, and transmitting the content data in the authorized calling range in the first cluster to the second cluster according to the authorized calling range.
Optionally, the method further includes:
acquiring new authorization verification information of the first cluster, uploading the new authorization verification information to a block chain, and replacing the authorization verification information;
and judging whether the new authorization verification information contains the identity information of the second cluster, and deleting the authorization information in the chain node of the second cluster on the block chain under the condition that the new authorization verification information does not contain the identity information of the second cluster.
In a second aspect, the present application further provides an inter-cluster calling apparatus. The device comprises:
the system comprises a first acquisition module, a block chain and a second acquisition module, wherein the first acquisition module is used for acquiring basic information of a first cluster and authorization verification information of the first cluster and uploading the basic information of the first cluster and the authorization verification information of the first cluster to the block chain; the authorization verification information is identity information of a cluster authorized to be accessed by the first cluster, and the data information comprises identity information and authorization information;
the second obtaining module is used for responding to the operation that the second cluster calls the first cluster, and obtaining the identity information of the second cluster and the identity identification information of the first cluster;
the calling module is used for inquiring the identity information of the first cluster on the block chain according to the identity identification information of the first cluster and calling the authorization verification information of the first cluster;
and the authorization module is used for transmitting the authorization information of the first cluster to the chain node of the block chain of the second cluster under the condition that the authorization verification information contains the identity information of the second cluster.
Optionally, the first obtaining module is specifically configured to:
responding to the authorization operation of a user, and acquiring the identity information of the clusters which are mutually called;
and storing the identity information of the mutually called clusters except the identity information of the first cluster in the first cluster, and calling the identity information of each mutually called cluster in the first cluster through an authorization information calling program to be used as the authorization verification information of the first cluster.
Optionally, the first obtaining module is specifically configured to:
and registering a chain node of the first cluster on the block chain according to the identity information of the first cluster, and uploading the authorization information of the first cluster and the authorization verification information of the first cluster to the block chain based on the chain node.
Optionally, the invoking module is specifically configured to:
according to the identification information of the first cluster, inquiring the identification information of the first cluster corresponding to the identification information of the first cluster in the identification information of each cluster on the block chain;
based on the identity information of the first cluster, retrieving authorization verification information of the first cluster on a chain node of the first cluster.
Optionally, the authorization module is specifically configured to:
and determining an authorized calling range of the second cluster according to the authorization information, and transmitting the content data in the authorized calling range in the first cluster to the second cluster according to the authorized calling range.
Optionally, the apparatus further comprises:
a third obtaining module, configured to obtain new authorization and verification information of the first cluster, upload the new authorization and verification information to a block chain, and replace the authorization and verification information;
and the judging module is used for judging whether the new authorization verification information contains the identity information of the second cluster or not, and deleting the authorization information in the chain node of the second cluster on the block chain under the condition that the new authorization verification information does not contain the identity information of the second cluster.
In a third aspect, the present application provides a computer device. The computer device comprises a memory storing a computer program and a processor implementing the steps of the method of any one of the first aspect when the computer program is executed.
In a fourth aspect, the present application provides a computer-readable storage medium. On which a computer program is stored which, when being executed by a processor, carries out the steps of the method of any one of the first aspects.
In a fifth aspect, the present application provides a computer program product. The computer program product comprises a computer program which, when executed by a processor, performs the steps of the method of any one of the first aspects.
The inter-cluster calling method, the inter-cluster calling device, the computer equipment and the storage medium acquire basic information of a first cluster and authorization verification information of the first cluster, and upload the basic information of the first cluster and the authorization verification information of the first cluster to a block chain; the authorization verification information is identity information of a cluster which the first cluster authorizes to access, and the data information comprises identity information and authorization information; responding to an operation that a second cluster calls a first cluster, and acquiring identity information of the second cluster and identity identification information of the first cluster; according to the identity identification information of the first cluster, inquiring the identity information of the first cluster on the block chain and calling the authorization verification information of the first cluster; and transmitting the authorization information of the first cluster to an on-chain node of a block chain of the second cluster under the condition that the authorization verification information contains the identity information of the second cluster. The authorization information among the clusters is transmitted through the block chain, so that the data among the clusters is called, the process of carrying out data distribution calling through a complex program is avoided, and the calling efficiency of multiple clusters is improved.
Drawings
FIG. 1 is a flow diagram that illustrates a method for inter-cluster calling in one embodiment;
FIG. 2 is a flow diagram that illustrates an example of an inter-cluster call in one embodiment;
FIG. 3 is a block diagram of an inter-cluster call device in one embodiment;
FIG. 4 is a diagram illustrating an internal structure of a computer device according to an embodiment.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the present application and are not intended to limit the present application.
The inter-cluster calling method provided by the embodiment of the application is applied to a terminal, can also be applied to a server, can also be applied to a system comprising the terminal and the server, and is realized through the interaction of the terminal and the server. The terminal may include, but is not limited to, various personal computers, notebook computers, tablet computers, and the like. The terminal transmits the authorization information among the clusters through the block chain, so that the data among the clusters is called, the process of carrying out data distribution calling through a complex program is avoided, and the calling efficiency of multiple clusters is improved.
In an embodiment, as shown in fig. 1, an inter-cluster calling method is provided, which is described by taking an example that the method is applied to a terminal, and includes the following steps:
step S101, obtaining the basic information of the first cluster and the authorization verification information of the first cluster, and uploading the basic information of the first cluster and the authorization verification information of the first cluster to a block chain.
The authorization verification information is identity information of a cluster authorized to be accessed by the first cluster, and the data information comprises the identity information and authorization information.
In this embodiment, the terminal uses the authorized cluster as a first cluster, and uses the cluster of the first cluster that needs to be accessed as a second cluster. And the terminal acquires the basic information of the first cluster and the authorization verification information of the first cluster through the data information which is sent by the first cluster and needs to upload the block chain. The cluster is Kubernetes (k 8s is an abbreviation formed by replacing 8 characters "ubernet" with 8). And the terminal uploads the acquired basic information of the first cluster and the authorization verification information of the first cluster to the chain node of the first cluster on the block chain.
Step S102, responding to the operation that the second cluster calls the first cluster, and acquiring the identity information of the second cluster and the identity identification information of the first cluster.
In this embodiment, the terminal responds to the operation of the second cluster calling the first cluster, and acquires the identity information of the second cluster and the identity identification information of the first cluster, which are transmitted by the second cluster. The identity information is the identity information of the first cluster and is used for querying the identity information of the first cluster on the block chain.
Step S103, according to the identity identification information of the first cluster, the identity information of the first cluster is inquired on the block chain, and the authorization verification information of the first cluster is called.
In this embodiment, the terminal queries, according to the identification information of the first cluster, the identification information of the first cluster from the identification information of each cluster on the block chain, and calls the authorization and verification information of the first cluster according to the identification information of the first cluster.
And step S104, transmitting the authorization information of the first cluster to the link node of the block chain of the second cluster under the condition that the authorization verification information contains the identity information of the second cluster, and calling the data information of the first cluster through the authorization information.
In this embodiment, the terminal determines whether the authorization verification information includes the identity information of the second cluster according to the authorization verification information of the first cluster. And under the condition that the authorization verification information does not contain the identity information of the second cluster, the terminal refuses to transmit the authorization information of the first cluster to the second cluster. And under the condition that the authorization verification information contains the identity information of the second cluster, the terminal transmits the authorization information of the first cluster to the chain node of the block chain of the second cluster. And the terminal calls the data information in the first cluster through the authorization information and transmits the data information to the second cluster.
Based on the scheme, the authorization information among the clusters is transmitted through the block chain, so that the data among the clusters is called, the process of carrying out data allocation calling through a complex program is avoided, and the calling efficiency of multiple clusters is improved.
Optionally, the obtaining of the authorization verification information of the first cluster includes: responding to the authorization operation of a user, and acquiring the identity information of the clusters which are mutually called; and storing the identity information of the mutually called clusters except the identity information of the first cluster in the first cluster, and calling the identity information of each mutually called cluster in the first cluster through an authorization information calling program to serve as authorization verification information of the first cluster.
In this embodiment, the terminal obtains the identity information of the clusters invoked with each other in response to an authorization operation of the user. In the case that one cluster needs to access the first cluster, the terminal stores the identity information of the inter-called clusters in the first cluster, except the identity information of the first cluster. And the terminal calls the identity information of each mutually called cluster in the first cluster through the authorization information calling program to serve as the authorization verification information of the first cluster. The authorization information calling program is a Kube-BlockChain information calling program, information specified by a user in a cluster can be called through the program, and the information can be uploaded to a block chain.
Based on the scheme, the authorization verification information of the first cluster is called through the authorization information calling program, and the efficiency of subsequently uploading the authorization verification information of the first cluster to the block chain is improved.
Optionally, uploading the basic information of the first cluster and the authorization verification information of the first cluster to the block chain, including:
and registering the on-chain node of the first cluster on the block chain according to the identity information of the first cluster, and uploading the authorization information of the first cluster and the authorization verification information of the first cluster to the block chain based on the on-chain node.
In this embodiment, the terminal registers, on the blockchain, a link node of the blockchain according to the identity information of the first cluster, and uploads the authorization and verification information of the first cluster and the authorization and verification information of the first cluster to the blockchain by the link node. Wherein the identity information of the node on the chain of the blockchain is the identity information of the first cluster. The user queries the identity information of the first cluster on the block chain, and the identity information of the first cluster can be obtained by querying the identity information of the node on the chain.
Based on the above scheme, an information transmission interface is provided for subsequently transmitting the authorization verification information of the first cluster and the authorization information of the first cluster to the blockchain by establishing the on-chain node of the first cluster.
Optionally, querying, according to the identity identification information of the first cluster, the identity information of the first cluster on the block chain and invoking the authorization verification information of the first cluster, including: according to the identity identification information of the first cluster, inquiring the identity information of the first cluster corresponding to the identity identification information of the first cluster in the identity information of each cluster on the block chain; based on the identity information of the first cluster, the authorization verification information of the first cluster is called on the chain nodes of the first cluster.
In this embodiment, the terminal queries, in the block chain, the identity information of the link node that is the same as the identity information of the first cluster from the identity information of the link nodes in each link according to the acquired identity identification information of the first cluster. And the terminal calls the authorization verification information of the first cluster stored in the node on the chain based on the identity information of the node on the chain.
Based on the scheme, the authorization verification information of the first cluster is called through the identity identification information, and the accuracy of calling the authorization verification information of the first cluster is improved.
Optionally, the authorization information includes authorization invocation range information of each cluster, and the data information of the first cluster is invoked through the authorization information, including:
and determining the authorized calling range of the second cluster according to the authorized information, and transmitting the content data in the authorized calling range in the first cluster to the second cluster according to the authorized calling range.
In this embodiment, the terminal determines the authorized calling range of the second cluster according to the authorization information transmitted to the second cluster. The authorized calling range is a range in which the first cluster authorizes other clusters to call the data information in the first cluster. And the terminal transmits the content data in the authorized calling range in the first cluster to the second cluster according to the authorized calling range, so that the task of calling the content data of the first cluster by the second cluster is completed.
Based on the scheme, the authority management intensity of mutual calling of the clusters is improved by limiting the authorized calling range of each cluster.
Optionally, the method further comprises: acquiring new authorization verification information of the first cluster, uploading the new authorization verification information to the block chain, and replacing the authorization verification information; and judging whether the new authorization verification information contains the identity information of the second cluster, and deleting the authorization information in the chain node of the second cluster on the block chain under the condition that the new authorization verification information does not contain the identity information of the second cluster.
In this embodiment, when the user changes the clusters that are called with each other, the terminal acquires new authorization verification information of the first cluster, and uploads the new authorization verification information to the blockchain based on the link node of the first cluster on the blockchain. And the terminal deletes the authorization verification information of the first cluster uploaded last time on the block chain. And the terminal judges whether the new authorization verification information contains the identity information of the second cluster or not on the block chain. In case the new authorization verification information comprises identity information of the second cluster, the terminal does nothing. And under the condition that the new authorization verification information does not contain the identity information of the second cluster, the terminal deletes the authorization information in the chain node of the second cluster on the block chain.
Based on the scheme, the authority information of the authorized clusters is managed by uploading the new authorization verification information, and the management efficiency among the clusters is improved.
The application also provides an inter-cluster calling example, as shown in fig. 2, the specific processing procedure includes the following steps:
step S201, in response to the authorization operation of the user, obtaining the identity information of the clusters called each other.
Step S202, storing the identity information of the mutually called clusters except the identity information of the first cluster in the first cluster, and calling the identity information of each mutually called cluster in the first cluster through an authorization information calling program to be used as authorization verification information of the first cluster.
Step S203, on the block chain, registering a link node of the first cluster according to the identity information of the first cluster, and uploading the authorization information of the first cluster and the authorization verification information of the first cluster to the block chain based on the link node.
Step S204, responding to the operation that the second cluster calls the first cluster, and acquiring the identity information of the second cluster and the identity identification information of the first cluster.
Step S205, according to the identification information of the first cluster, in the identification information of each cluster on the block chain, the identification information of the first cluster corresponding to the identification information of the first cluster is queried.
And step S206, based on the identity information of the first cluster, calling the authorization verification information of the first cluster from the chain nodes of the first cluster.
Step S207, transmitting the authorization information of the first cluster to the chain node of the block chain of the second cluster when the authorization verification information includes the identity information of the second cluster.
And S208, determining the authorized calling range of the second cluster according to the authorization information, and transmitting the content data in the authorized calling range in the first cluster to the second cluster according to the authorized calling range.
It should be understood that, although the steps in the flowcharts related to the embodiments described above are shown in sequence as indicated by the arrows, the steps are not necessarily performed in sequence as indicated by the arrows. The steps are not performed in the exact order shown and described, and may be performed in other orders, unless explicitly stated otherwise. Moreover, at least a part of the steps in the flowcharts related to the embodiments described above may include multiple steps or multiple stages, which are not necessarily performed at the same time, but may be performed at different times, and the execution order of the steps or stages is not necessarily sequential, but may be rotated or alternated with other steps or at least a part of the steps or stages in other steps.
Based on the same inventive concept, the embodiment of the present application further provides an inter-cluster calling apparatus for implementing the above-mentioned inter-cluster calling method. The implementation scheme for solving the problem provided by the device is similar to the implementation scheme described in the above method, so that specific limitations in one or more embodiments of the inter-cluster calling device provided below may refer to the above limitations on the inter-cluster calling method, and details are not described here.
In one embodiment, as shown in fig. 3, there is provided an inter-cluster calling apparatus including: a first obtaining module 310, a second obtaining module 320, a retrieving module 330, and an authorization module 340, wherein:
a first obtaining module 310, configured to obtain basic information of a first cluster and authorization and verification information of the first cluster, and upload the basic information of the first cluster and the authorization and verification information of the first cluster to a block chain; the authorization verification information is identity information of a cluster authorized to be accessed by the first cluster, and the data information comprises identity information and authorization information;
a second obtaining module 320, configured to obtain, in response to an operation that a second cluster calls a first cluster, identity information of the second cluster and identity identification information of the first cluster;
the invoking module 330 is configured to query, according to the identification information of the first cluster, the identification information of the first cluster on the block chain and invoke the authorization verification information of the first cluster;
an authorization module 340, configured to transmit the authorization information of the first cluster to an on-chain node of a block chain of the second cluster when the authorization verification information includes the identity information of the second cluster.
Optionally, the first obtaining module 310 is specifically configured to:
responding to the authorization operation of a user, and acquiring the identity information of the clusters which are mutually called;
and storing the identity information of the mutually called clusters except the identity information of the first cluster in the first cluster, and calling the identity information of each mutually called cluster in the first cluster through an authorization information calling program to be used as the authorization verification information of the first cluster.
Optionally, the first obtaining module 310 is specifically configured to:
and registering a chain node of the first cluster on the block chain according to the identity information of the first cluster, and uploading the authorization information of the first cluster and the authorization verification information of the first cluster to the block chain based on the chain node.
Optionally, the invoking module 330 is specifically configured to:
according to the identification information of the first cluster, inquiring the identification information of the first cluster corresponding to the identification information of the first cluster in the identification information of each cluster on the block chain;
based on the identity information of the first cluster, retrieving authorization verification information of the first cluster on a chain node of the first cluster.
Optionally, the authorization module 340 is specifically configured to:
and determining an authorized calling range of the second cluster according to the authorization information, and transmitting the content data in the authorized calling range in the first cluster to the second cluster according to the authorized calling range.
Optionally, the apparatus further comprises:
a third obtaining module, configured to obtain new authorization and verification information of the first cluster, upload the new authorization and verification information to a block chain, and replace the authorization and verification information;
and the judging module is used for judging whether the new authorization verification information contains the identity information of the second cluster or not, and deleting the authorization information in the chain node of the second cluster on the block chain under the condition that the new authorization verification information does not contain the identity information of the second cluster.
The modules in the inter-cluster calling device may be implemented in whole or in part by software, hardware, and a combination thereof. The modules can be embedded in a hardware form or independent of a processor in the computer device, and can also be stored in a memory in the computer device in a software form, so that the processor can call and execute operations corresponding to the modules.
In one embodiment, a computer device is provided, which may be a terminal, and its internal structure diagram may be as shown in fig. 4. The computer device includes a processor, a memory, a communication interface, a display screen, and an input device connected by a system bus. Wherein the processor of the computer device is configured to provide computing and control capabilities. The memory of the computer device comprises a nonvolatile storage medium and an internal memory. The non-volatile storage medium stores an operating system and a computer program. The internal memory provides an environment for the operation of an operating system and computer programs in the non-volatile storage medium. The communication interface of the computer device is used for communicating with an external terminal in a wired or wireless manner, and the wireless manner can be realized through WIFI, a mobile cellular network, NFC (near field communication) or other technologies. The computer program is executed by a processor to implement an inter-cluster call method. The display screen of the computer equipment can be a liquid crystal display screen or an electronic ink display screen, and the input device of the computer equipment can be a touch layer covered on the display screen, a key, a track ball or a touch pad arranged on the shell of the computer equipment, an external keyboard, a touch pad or a mouse and the like.
It will be appreciated by those skilled in the art that the configuration shown in fig. 4 is a block diagram of only a portion of the configuration associated with the present application, and is not intended to limit the computing device to which the present application may be applied, and that a particular computing device may include more or fewer components than shown, or may combine certain components, or have a different arrangement of components.
In an embodiment, there is provided a computer device comprising a memory having stored therein a computer program and a processor implementing the steps of the method of any of the first aspects when the computer program is executed.
In an embodiment, a computer-readable storage medium is provided, on which a computer program is stored, which computer program, when being executed by a processor, realizes the steps of the method of any one of the first aspect.
In an embodiment, a computer program product is provided, comprising a computer program which, when executed by a processor, performs the steps of the method of any one of the first aspect.
It should be noted that, the user information (including but not limited to user device information, user personal information, etc.) and data (including but not limited to data for analysis, stored data, presented data, etc.) referred to in the present application are information and data authorized by the user or sufficiently authorized by each party.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by hardware instructions of a computer program, which can be stored in a non-volatile computer-readable storage medium, and when executed, can include the processes of the embodiments of the methods described above. Any reference to memory, databases, or other media used in the embodiments provided herein can include at least one of non-volatile and volatile memory. The nonvolatile Memory may include Read-Only Memory (ROM), magnetic tape, floppy disk, flash Memory, optical Memory, high-density embedded nonvolatile Memory, resistive random access Memory (ReRAM), magnetic Random Access Memory (MRAM), ferroelectric Random Access Memory (FRAM), phase Change Memory (PCM), graphene Memory, and the like. Volatile Memory can include Random Access Memory (RAM), external cache Memory, and the like. By way of illustration and not limitation, RAM can take many forms, such as Static Random Access Memory (SRAM) or Dynamic Random Access Memory (DRAM), among others. The databases referred to in various embodiments provided herein may include at least one of relational and non-relational databases. The non-relational database may include, but is not limited to, a block chain based distributed database, and the like. The processors referred to in the various embodiments provided herein may be, without limitation, general purpose processors, central processing units, graphics processors, digital signal processors, programmable logic devices, quantum computing-based data processing logic devices, or the like.
The technical features of the above embodiments can be arbitrarily combined, and for the sake of brevity, all possible combinations of the technical features in the above embodiments are not described, but should be considered as the scope of the present specification as long as there is no contradiction between the combinations of the technical features.
The above-mentioned embodiments only express several embodiments of the present application, and the description thereof is more specific and detailed, but not construed as limiting the scope of the present application. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the concept of the present application, which falls within the scope of protection of the present application. Therefore, the protection scope of the present application shall be subject to the appended claims.

Claims (10)

1. An inter-cluster call method, comprising:
acquiring basic information of a first cluster and authorization verification information of the first cluster, and uploading the basic information of the first cluster and the authorization verification information of the first cluster to a block chain; the authorization verification information is identity information of a cluster authorized to be accessed by the first cluster, and the data information comprises identity information and authorization information;
responding to an operation that a second cluster calls a first cluster, and acquiring identity information of the second cluster and identity identification information of the first cluster;
according to the identity identification information of the first cluster, inquiring the identity information of the first cluster on the block chain and calling the authorization verification information of the first cluster;
and transmitting the authorization information of the first cluster to a link node of a block chain of the second cluster under the condition that the authorization verification information contains the identity information of the second cluster, and calling the data information of the first cluster through the authorization information.
2. The method of claim 1, wherein obtaining the authorization verification information of the first cluster comprises:
responding to the authorization operation of a user, and acquiring the identity information of the clusters which are mutually called;
and storing the identity information of the mutually called clusters except the identity information of the first cluster in the first cluster, and calling the identity information of each mutually called cluster in the first cluster through an authorization information calling program to serve as authorization verification information of the first cluster.
3. The method of claim 1, wherein uploading the basic information of the first cluster and the authorization verification information of the first cluster to a blockchain comprises:
and registering a chain node of the first cluster on the block chain according to the identity information of the first cluster, and uploading the authorization information of the first cluster and the authorization verification information of the first cluster to the block chain based on the chain node.
4. The method according to claim 2, wherein the querying the blockchain for the identity information of the first cluster and retrieving the authorization verification information of the first cluster according to the identity information of the first cluster comprises:
according to the identification information of the first cluster, inquiring the identification information of the first cluster corresponding to the identification information of the first cluster in the identification information of each cluster on the block chain;
based on the identity information of the first cluster, retrieving authorization verification information of the first cluster on a chain node of the first cluster.
5. The method of claim 1, wherein the retrieving the data information of the first cluster through the authorization information comprises:
and determining an authorized calling range of the second cluster according to the authorization information, and transmitting the content data in the authorized calling range in the first cluster to the second cluster according to the authorized calling range.
6. The method of claim 1, further comprising:
acquiring new authorization verification information of the first cluster, uploading the new authorization verification information to a block chain, and replacing the authorization verification information;
and judging whether the new authorization verification information contains the identity information of the second cluster, and deleting the authorization information in the chain node of the second cluster on the block chain under the condition that the new authorization verification information does not contain the identity information of the second cluster.
7. An apparatus for inter-cluster calling, the apparatus comprising:
the system comprises a first acquisition module, a block chain and a second acquisition module, wherein the first acquisition module is used for acquiring basic information of a first cluster and authorization verification information of the first cluster and uploading the basic information of the first cluster and the authorization verification information of the first cluster to the block chain; the authorization verification information is identity information of a cluster authorized to be accessed by the first cluster, and the data information comprises identity information and authorization information;
the second acquisition module is used for responding to the operation that the second cluster calls the first cluster and acquiring the identity information of the second cluster and the identity identification information of the first cluster;
the calling module is used for inquiring the identity information of the first cluster on the block chain according to the identity identification information of the first cluster and calling the authorization verification information of the first cluster;
and the authorization module is used for transmitting the authorization information of the first cluster to the chain node of the block chain of the second cluster under the condition that the authorization verification information contains the identity information of the second cluster.
8. A computer device comprising a memory and a processor, the memory storing a computer program, characterized in that the processor, when executing the computer program, implements the steps of the method of any of claims 1 to 6.
9. A computer-readable storage medium, on which a computer program is stored which, when being executed by a processor, carries out the steps of the method according to any one of claims 1 to 6.
10. A computer program product comprising a computer program, characterized in that the computer program realizes the steps of the method of any one of claims 1 to 6 when executed by a processor.
CN202211501516.5A 2022-11-28 2022-11-28 Inter-cluster calling method and device, computer equipment and storage medium Pending CN115987557A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211501516.5A CN115987557A (en) 2022-11-28 2022-11-28 Inter-cluster calling method and device, computer equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211501516.5A CN115987557A (en) 2022-11-28 2022-11-28 Inter-cluster calling method and device, computer equipment and storage medium

Publications (1)

Publication Number Publication Date
CN115987557A true CN115987557A (en) 2023-04-18

Family

ID=85972832

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211501516.5A Pending CN115987557A (en) 2022-11-28 2022-11-28 Inter-cluster calling method and device, computer equipment and storage medium

Country Status (1)

Country Link
CN (1) CN115987557A (en)

Similar Documents

Publication Publication Date Title
CN112532632A (en) Resource allocation method and device for multi-level cloud platform and computer equipment
CN114756627A (en) Alliance-chain-based digital asset processing method, system and storage medium
CN115987557A (en) Inter-cluster calling method and device, computer equipment and storage medium
CN114756293A (en) Service processing method, device, computer equipment and storage medium
CN114254278A (en) User account merging method and device, computer equipment and storage medium
CN112231377A (en) Data mapping method, system, device, server and storage medium
CN111813842B (en) Data processing method, device, system, equipment and storage medium
CN116150807B (en) Object storage method, system, computer device and storage medium
CN114785677B (en) Log management method, device, computer equipment, storage medium and program product
CN111522830B (en) Resource allocation method, computer device, and storage medium
CN116644444A (en) File access method, device, computer equipment and storage medium thereof
CN116546103A (en) Processing method, device, equipment, storage medium and product of distributed service
CN114092064A (en) Electric power big data processing batch processing system, method, device, equipment and medium
CN114416214A (en) Cross-network system integration method and device, computer equipment and storage medium
CN114915573A (en) Test method, device, equipment, storage medium and program product
CN115456568A (en) Process approval method, apparatus, computer device, storage medium, and program product
CN117270880A (en) Plug-in service privatization deployment method, device, computer equipment and storage medium
CN116909684A (en) Deployment method and device of low-code application, computer equipment and storage medium
CN117453759A (en) Service data processing method, device, computer equipment and storage medium
CN115934750A (en) Data query method and device based on StarRocks, computer equipment and storage medium
CN116109077A (en) Method, device, computer equipment and storage medium for processing guaranteed resources
CN117648336A (en) Data query method, device, computer equipment and storage medium
CN115118612A (en) Resource quota management method and device, computer equipment and storage medium
CN117575551A (en) Order management method, apparatus, computer device and storage medium
CN116880927A (en) Rule management method, device, computer equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination