CN115988078A - Communication method, system, electronic device and storage medium - Google Patents

Communication method, system, electronic device and storage medium Download PDF

Info

Publication number
CN115988078A
CN115988078A CN202211502111.3A CN202211502111A CN115988078A CN 115988078 A CN115988078 A CN 115988078A CN 202211502111 A CN202211502111 A CN 202211502111A CN 115988078 A CN115988078 A CN 115988078A
Authority
CN
China
Prior art keywords
server
cluster
proxy
access request
access
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211502111.3A
Other languages
Chinese (zh)
Inventor
江志坤
叶慧杰
赵慧婷
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China United Network Communications Group Co Ltd
Unicom Digital Technology Co Ltd
Original Assignee
China United Network Communications Group Co Ltd
Unicom Digital Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China United Network Communications Group Co Ltd, Unicom Digital Technology Co Ltd filed Critical China United Network Communications Group Co Ltd
Priority to CN202211502111.3A priority Critical patent/CN115988078A/en
Publication of CN115988078A publication Critical patent/CN115988078A/en
Pending legal-status Critical Current

Links

Images

Abstract

The application provides a communication method, a communication system, electronic equipment and a storage medium, relates to the technical field of communication, and is used for solving the problem that network security risk is high due to the large exposed surface of an interface of a service node in the related art. The method comprises the following steps: in the case where the first server requests access to the second server, the first server determines whether it belongs to the same server cluster as the second server; under the condition that the first server and the second server belong to the same server cluster, the first server sends an access request to the second server to request to access the service in the second server; under the condition that the first server and the second server do not belong to the same server cluster, the first server sends an access request to the second server through the first proxy server to request to access the service in the second server; the first proxy server is located in a server cluster corresponding to the first server.

Description

Communication method, system, electronic device and storage medium
Technical Field
The present application relates to the field of communications technologies, and in particular, to a communication method, a communication system, an electronic device, and a storage medium.
Background
The block chain technology (also called as distributed account book technology) is a decentralized distributed database technology, has the characteristics of decentralization, openness and transparency, no tampering, trustiness and the like, and is suitable for application scenes with high requirements on data reliability.
In a point-to-point (p 2 p) communication application scene based on a block chain structure, all service nodes are located in the same local area network, and the network structure is simple and efficient. However, in the cross-cloud and cross-domain distributed networking process in different production environments, the interface exposure area of each service node is large, which brings serious influence on network security.
Disclosure of Invention
The application provides a communication method, a communication system, an electronic device and a storage medium, which are used for solving the problem of higher network security risk caused by large interface exposure area of a service node in the related art.
In order to achieve the purpose, the following technical scheme is adopted in the application:
in a first aspect, a communication method is provided, and the method includes: in the case where the first server requests access to the second server, the first server determines whether it belongs to the same server cluster as the second server; under the condition that the first server and the second server belong to the same server cluster, the first server sends an access request to the second server to request to access the service in the second server; under the condition that the first server and the second server do not belong to the same server cluster, the first server sends an access request to the second server through the first proxy server to request to access the service in the second server; the first proxy server is located in a server cluster corresponding to the first server.
Optionally, the access request includes an identification of the second server; under the condition that the first server and the second server do not belong to the same server cluster, the first server sends an access request to the second server through the first proxy server so as to request to access the service in the second server, and the method comprises the following steps: under the condition that the first server and the second server do not belong to the same server cluster, the first server sends an access request to the first proxy server; the first proxy server receives the access request, and determines a server cluster of the second server from a first mapping relation comprising a plurality of server identifications and a plurality of server cluster identifications according to the identification of the second server; and the first proxy server determines a second proxy server from a second mapping relation comprising a plurality of server cluster identifications and a plurality of proxy server identifications according to the server cluster of the second server, and sends an access request to the second proxy server so as to instruct the second proxy server to forward the access request to the second server.
Optionally, the method further comprises: the second proxy server forwards the access request to the second server; the second server sends the service to which the first server requests access to the first server through the second proxy server in response to the access request.
Optionally, the determining, by the first server, whether the first server and the second server belong to the same server cluster includes: a first server acquires cluster information of a server to which the first server belongs; the server cluster information comprises the identification of each server in the server cluster corresponding to the first server; the first server judges whether the identifier of the second server exists in the affiliated server cluster information or not, under the condition that the identifier of the second server exists in the affiliated server cluster information, the first server determines that the first server and the second server belong to the same server cluster, and under the condition that the identifier of the second server does not exist in the affiliated server cluster information, the first server determines that the first server and the second server do not belong to the same server cluster.
In a second aspect, a communication system is provided, comprising a first server, a second server, a first proxy server, and a second proxy server; the first server is used for determining whether the first server and the second server belong to the same server cluster or not under the condition that the first server requests to access the second server; the first server is also used for sending an access request to the second server to request to access the service in the second server under the condition that the first server and the second server belong to the same server cluster; the first server is also used for sending an access request to the second server through the first proxy server to request to access the service in the second server under the condition that the first server and the second server do not belong to the same server cluster; the first proxy server is located in a server cluster corresponding to the first server.
Optionally, the access request includes an identification of the second server; the first server is specifically used for sending an access request to the first proxy server under the condition that the first server and the second server do not belong to the same server cluster; the first proxy server is used for receiving the access request and determining a server cluster of the second server from a first mapping relation comprising a plurality of server identifications and a plurality of server cluster identifications according to the identification of the second server; and the first proxy server is further used for determining the second proxy server from a second mapping relation comprising a plurality of server cluster identifications and a plurality of proxy server identifications according to the server cluster of the second server, and sending an access request to the second proxy server to instruct the second proxy server to forward the access request to the second server.
Optionally, the second proxy server is configured to forward the access request to the second server; the second server is further configured to send, to the first server, the service to which the first server requests access through the second proxy server in response to the access request.
Optionally, the first server is specifically configured to: acquiring cluster information of a server; the server cluster information comprises the identification of each server in the server cluster corresponding to the first server; judging whether the identification of the second server exists in the affiliated server cluster information, determining that the server cluster is affiliated with the same server cluster as the second server under the condition that the identification of the second server exists in the affiliated server cluster information, and determining that the server cluster is not affiliated with the same server cluster as the second server under the condition that the identification of the second server does not exist in the affiliated server cluster information.
In a third aspect, an electronic device is provided, including: a processor, a memory for storing processor-executable instructions; wherein the processor is configured to execute the instructions to implement the communication method of the first aspect described above.
In a fourth aspect, there is provided a computer readable storage medium having instructions stored thereon, which when executed by a processor of an electronic device, enable the electronic device to perform the communication method of the first aspect as described above.
The technical scheme provided by the embodiment of the application at least has the following beneficial effects: in the case where the first server requests access to the second server, the first server determines whether it belongs to the same cluster of servers as the second server. Under the condition that the first server and the second server belong to the same server cluster, the first server sends an access request to the second server to request to access the service in the second server; therefore, direct communication is realized when the servers in the cluster access each other, and the communication efficiency is improved. Under the condition that the first server and the second server do not belong to the same server cluster, the first server sends an access request to the second server through the first proxy server to request to access the service in the second server; the first proxy server is located in a server cluster corresponding to the first server. Therefore, when the server accesses each other across the cluster, the single outlet and the single inlet when the server accesses the outside and is accessed by the outside in the cluster are realized through the unified switching service, so that the interface exposure surface of the service node is reduced, a safe and convenient network protection means is conveniently provided for cross-domain distributed networking among different companies, and the network security risk is further reduced.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings used in the embodiments or the prior art descriptions will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present application, and other drawings can be obtained by those skilled in the art without creative efforts.
Fig. 1 is a schematic diagram of a typical block network topology according to an embodiment of the present disclosure;
fig. 2 is a schematic structural diagram of a communication system according to an embodiment of the present application;
fig. 3 is a first flowchart illustrating a communication method according to an embodiment of the present application;
fig. 4 is a flowchart illustrating a second communication method according to an embodiment of the present disclosure;
fig. 5 is a schematic diagram of communication between different operators according to an embodiment of the present application;
fig. 6 is a schematic structural diagram of a server according to an embodiment of the present application;
fig. 7 is a schematic structural diagram of an electronic device according to an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments obtained by a person of ordinary skill in the art based on the embodiments in the present application without making any creative effort belong to the protection scope of the present application.
It should be noted that in the embodiments of the present application, words such as "exemplary" or "for example" are used to indicate examples, illustrations or explanations. Any embodiment or design described herein as "exemplary" or "e.g.," is not necessarily to be construed as preferred or advantageous over other embodiments or designs. Rather, use of the word "exemplary" or "such as" is intended to present relevant concepts in a concrete fashion.
It should be noted that in the embodiments of the present application, "of", "corresponding" and "corresponding" may be sometimes used in combination, and it should be noted that the intended meaning is consistent when the difference is not emphasized.
For the convenience of clearly describing the technical solutions of the embodiments of the present application, in the embodiments of the present application, the terms "first", "second", and the like are used for distinguishing the same items or similar items with basically the same functions and actions, and those skilled in the art can understand that the terms "first", "second", and the like are not limited in number or execution order.
Before explaining the embodiments of the present application in detail, some related technologies related to the embodiments of the present application will be described.
The block chain technology (also called as distributed book technology) is a decentralized distributed database technology, has the characteristics of decentralization, openness and transparency, no tampering, trustiness and the like, and is suitable for application scenes with high requirements on data reliability.
The block chain is typical P2P point-to-point communication, and nodes are directly communicated with each other to form a cross-mesh communication topology. As shown in fig. 1, a typical block network topology is illustrated. All the nodes are located in the same local area network and can directly communicate.
In a block chain structure-based point-to-point (p 2 p) communication application scenario, all service nodes are located in the same local area network, and the network structure is simple and efficient. However, in the cross-cloud and cross-domain distributed networking process under different production environments, the interface exposure area of each service node is large, which brings serious influence on network security.
In view of this, the present application provides a communication method, where a unified switching service is developed, a service in a cluster provides a unified target address to the outside for an external request to access, and a unified source address is used for making a request when accessing the outside and being accessed by the outside, so as to implement a single exit and a single entry when accessing the outside and being accessed by the outside in the cluster, thereby reducing an interface exposure surface of a service node and improving network security.
The following describes a communication method provided in an embodiment of the present application in detail with reference to the accompanying drawings.
Fig. 2 illustrates an exemplary application scenario diagram provided in an embodiment of the present application. As shown in fig. 2, the communication method provided in the embodiment of the present application may be applied to the communication system 10. The communication system 10 comprises a first server cluster 11 and a second server cluster 12, wherein the first server cluster 11 comprises a first proxy server 111 and a plurality of first servers 112, and the second server cluster 12 comprises a second proxy server 121 and a plurality of second servers 122.
In the first server cluster 11, the first servers 112 are directly connected in a p2p manner, and each first server 112 is connected in a communication manner with the first proxy server 111.
Similarly, in the second server cluster 12, the second servers 122 are directly connected in communication in a p2p manner, and each second server 122 is connected in communication with the second proxy server 121.
It should be noted that the communication connection may be a wired connection or a wireless connection, which is not limited in this embodiment of the present application.
A unified inlet and a unified outlet are arranged between the first server cluster 11 and the second server cluster 12. The unified ingress and unified egress may be stored in respective proxy servers, such as the first proxy server 111 and the second proxy server 121.
When a server in one server cluster needs to cross-cluster access to a server in another server cluster (e.g., the first server 112 accesses the second server 122), the access request needs to be forwarded through the proxy server.
Specifically, the first server 112 first sends the access request to the first proxy server 111, and since the unified exit of the first server cluster 11 is stored in the first proxy server 111, the first proxy server 111 can send the access request to the second proxy server 121 through the unified exit. Accordingly, second server 122 receives the access request and sends the access request to second server 122.
Accordingly, after receiving the access request, the second server 122 sends the requested service resource to the second proxy server 121 in response to the access request. Since the second proxy server 121 has the same entry stored therein for the first server cluster 11, the second proxy server 121 can send the service resource to the first proxy server 111 through the same entry. The first proxy server 111 receives the service resource and sends the service resource to the first server 112.
The following describes a communication method provided in the embodiment of the present application with reference to the communication system shown in fig. 2.
Fig. 3 is a flow diagram illustrating a method of communication, according to some example embodiments. In some embodiments, the above communication method may be applied to each server as shown in fig. 2, and may also be applied to other similar devices.
As shown in fig. 3, the communication method provided in the embodiment of the present application includes the following steps S201 to S203.
S201, under the condition that the first server requests to access the second server, the first server determines whether the first server and the second server belong to the same server cluster.
As a possible implementation manner, the first server obtains the cluster information of the server to which the first server belongs, where the cluster information of the server to which the first server belongs includes the identifier of each server in the server cluster corresponding to the first server. Further, the first server determines whether the identifier of the second server exists in the affiliated server cluster information, determines that the first server and the second server belong to the same server cluster under the condition that the identifier of the second server exists in the affiliated server cluster information, and determines that the first server and the second server do not belong to the same server cluster under the condition that the identifier of the second server does not exist in the affiliated server cluster information.
It should be noted that the first server and the second server may be any one of the servers in fig. 1.
S202, under the condition that the first server and the second server belong to the same server cluster, the first server sends an access request to the second server to request to access the service in the second server.
As a possible implementation manner, in the case that the first server determines that the first server and the second server belong to the same server cluster, the first server directly sends an access request to the second server to request access to the service in the second server.
S203, under the condition that the first server and the second server do not belong to the same server cluster, the first server sends an access request to the second server through the first proxy server to request to access the service in the second server.
The first proxy server is located in a server cluster corresponding to the first server.
As a possible implementation manner, when the first server determines that the first server and the second server belong to different server clusters, the first server sends the access request to a first proxy server in the server cluster to which the first server belongs, and sends the access request to the second server through the first proxy server to request to access the service in the second server.
Accordingly, the second proxy server forwards the access request to the second server. Further, the second server sends the service, which the first server requests to access, to the first server through the second proxy server in response to the access request.
The technical scheme provided by the embodiment of the application at least has the following beneficial effects: in the case where the first server requests access to the second server, the first server determines whether it belongs to the same cluster of servers as the second server. Under the condition that the first server and the second server belong to the same server cluster, the first server sends an access request to the second server to request to access the service in the second server; therefore, direct communication is realized when the servers in the cluster access each other, and the communication efficiency is improved. Under the condition that the first server and the second server do not belong to the same server cluster, the first server sends an access request to the second server through the first proxy server so as to request to access the service in the second server; the first proxy server is located in a server cluster corresponding to the first server. Therefore, when the servers access each other across the cluster, single exit and single entry when the servers access the outside and are accessed by the outside in the cluster are realized through the unified switching service, so that the interface exposure of the service nodes is reduced, a safe and convenient network protection means is conveniently provided for cross-domain distributed networking among different companies, and the network security risk is further reduced.
In some embodiments, the access request includes an identification of the second server in order to request access to a service in the second server. As shown in fig. 4, the above S203 provided in the embodiment of the present application specifically includes the following S2031 to S2033:
s2031, under the condition that the first server and the second server do not belong to the same server cluster, the first server sends an access request to the first proxy server.
As a possible implementation manner, in a case that the first server determines that the first server and the second server belong to different server clusters, the first server sends an access request to a first proxy server in the server cluster.
S2032, the first proxy server receives the access request and determines a server cluster of the second server from a first mapping relation comprising a plurality of server identifications and a plurality of server cluster identifications according to the identification of the second server.
As a possible implementation manner, after receiving the access request sent by the first server, the first proxy server determines, with the server identifier in the access request, a server cluster of the second server from a first mapping relationship including a plurality of server identifiers and a plurality of server cluster identifiers.
S2033, the first proxy server determines the second proxy server from the second mapping relationship including the multiple server cluster identifiers and the multiple proxy server identifiers according to the server cluster of the second server, and sends an access request to the second proxy server to instruct the second proxy server to forward the access request to the second server.
As a possible implementation manner, after determining the server cluster where the second server is located, the first proxy server determines, according to the server cluster of the second server, the second proxy server, that is, the proxy server in the server cluster of the second server, from a second mapping relationship including the plurality of server cluster identifiers and the plurality of proxy server identifiers. Further, the first proxy server sends an access request to the second proxy server to instruct the second proxy server to forward the access request to the second server.
Illustratively, as shown in fig. 5, the physical resources of the a operator are located in a city, and the resource type is k8s cluster. The physical resources of the operator B are located in the city B, and the resource type is a virtual machine. The two parties carry out network intercommunication through a private line, and the inside of the system transfers the network layer by layer to the position of the resource through an isolation area. The operator A and the operator B both have strict network isolation and safety prevention and control requirements, and the related access addresses of the two parties are different from the service local address. The internal servers of the operator A adopt a p2p mode for direct communication, and similarly, the internal servers of the operator B also adopt a p2p mode for direct communication.
When a server (called an a server for short) in an operator a in a city a needs to access a server (called a B server for short) in an operator B in a city B, the server a first sends an access request to a proxy server in the cluster, the proxy server routes the access request to a large area device of the operator a (called province C in large area, for example), the large area device of the operator a routes the access request to a large area device of the operator B (called province D in large area, for example), and then the large area device of the operator B routes the access request to the proxy server of the cluster where the server B is located through a switching device. Further, the proxy server of the cluster where the B server is located forwards the access request to the B server.
It can be understood that, by developing a multi-Protocol adaptation component, one address uniformly monitors all Transmission Control Protocol (TCP) requests in the cluster, and identifies specific application layer protocols through message keywords, and then processes the specific application layer protocols respectively, thereby reducing the complexity of the application layer protocols from N to 1. By developing the internal and external network mapping adaptation component, simultaneously recording the internal and external communication addresses of the service and distinguishing the cluster to which the client server belongs, the internal communication address is adopted when the services in the cluster communicate with each other, and the external communication address is used when the services in the cluster access the external services.
The foregoing embodiments mainly introduce the solutions provided in the embodiments of the present application from the perspective of apparatuses (devices). It is understood that, in order to implement the above method, the device or apparatus includes hardware structures and/or software modules corresponding to the execution of each method flow, and the hardware structures and/or software modules corresponding to the execution of each method flow may constitute a material information determination device. Those of skill in the art will readily appreciate that the present application is capable of implementing the steps of the various illustrative algorithms described in connection with the embodiments disclosed herein in hardware or a combination of hardware and computer software. Whether a function is performed as hardware or computer software drives hardware depends upon the particular application and design constraints imposed on the solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
In the embodiment of the present application, the device or the apparatus may be divided into the functional modules according to the method example, for example, the device or the apparatus may divide each functional module corresponding to each function, or may integrate two or more functions into one processing module. The integrated module can be realized in a hardware mode, and can also be realized in a software functional module mode. It should be noted that, in the embodiment of the present application, the division of the module is schematic, and is only one logic function division, and there may be another division manner in actual implementation.
Fig. 6 is a schematic diagram illustrating a structure of a server according to an example embodiment. Referring to fig. 6, the server 30 provided in the embodiment of the present application includes a determining unit 301 and a sending unit 302.
In the case where the first server requests access to the second server, the determining unit 301 is configured to determine whether the second server belongs to the same server cluster as the first server.
In a case that the first server and the second server belong to the same server cluster, the sending unit 302 is configured to send an access request to the second server to request to access a service in the second server.
In a case that the first server and the second server do not belong to the same server cluster, the sending unit 302 is configured to send the access request to the second server through a first proxy server to request to access a service in the second server; the first proxy server is located in a server cluster corresponding to the first server.
Fig. 7 is a schematic structural diagram of an electronic device provided in the present application. As shown in fig. 7, the electronic device 40 may include at least one processor 401 and a memory 402 for storing processor-executable instructions, wherein the processor 401 is configured to execute the instructions in the memory 402 to implement the communication method in the above-described embodiments.
In addition, the electronic device 40 may also include a communication bus 403 and at least one communication interface 404.
Processor 401 may be a Central Processing Unit (CPU), a micro-processing unit, an ASIC, or one or more integrated circuits configured to control the execution of programs in accordance with the present invention.
The communication bus 403 may include a path that transfers information between the above components.
The communication interface 404 may be any device, such as a transceiver, for communicating with other devices or communication networks, such as an ethernet, a Radio Access Network (RAN), a Wireless Local Area Network (WLAN), etc.
The memory 402 may be, but is not limited to, a read-only memory (ROM) or other type of static storage device that may store static information and instructions, a Random Access Memory (RAM) or other type of dynamic storage device that may store information and instructions, an electrically erasable programmable read-only memory (EEPROM), a compact disk read-only memory (CD-ROM) or other optical disk storage, optical disk storage (including compact disk, laser disk, optical disk, digital versatile disk, blu-ray disk, etc.), a magnetic disk storage medium or other magnetic storage device, or any other medium that can be used to carry or store desired program code in the form of instructions or data structures and that can be accessed by a computer. The memory may be separate and coupled to the processor 401 via a bus. The memory may also be integrated with the processor 401.
The memory 402 is used for storing instructions for executing the scheme of the application, and is controlled by the processor 401 to execute. The processor 401 is configured to execute instructions stored in the memory 402 to implement the functions of the method of the present application.
As an example, in connection with fig. 6, the determining unit 301 and the sending unit 302 in the server 30 implement the same functions as the processor 401 in fig. 7.
In particular implementations, processor 401 may include one or more CPUs, such as CPU0 and CPU1 in fig. 7, as one embodiment.
In particular implementations, electronic device 40 may include multiple processors, such as processor 401 and processor 407 in fig. 7, for example, as an embodiment. Each of these processors may be a single-core (single-CPU) processor or a multi-core (multi-CPU) processor. A processor herein may refer to one or more devices, circuits, and/or processing cores for processing data (e.g., computer program instructions).
In particular implementations, electronic device 40 may also include an output device 405 and an input device 406, as one embodiment. An output device 405 is in communication with the processor 401 and may display information in a variety of ways. For example, the output device 405 may be a Liquid Crystal Display (LCD), a Light Emitting Diode (LED) display device, a Cathode Ray Tube (CRT) display device, a projector (projector), or the like. The input device 406 is in communication with the processor 401 and can accept input from a user object in a variety of ways. For example, the input device 406 may be a mouse, keyboard, touch screen device, or sensing device, among others.
Those skilled in the art will appreciate that the configuration shown in fig. 7 is not limiting to the electronic device 40 and may include more or fewer components than shown, or some components may be combined, or a different arrangement of components may be used.
In addition, the present application also provides a computer-readable storage medium, wherein when the instructions in the computer-readable storage medium are executed by the processor of the electronic device, the electronic device is enabled to execute the communication method provided by the above embodiment.
In addition, the present application also provides a computer program product, which includes computer instructions, when the computer instructions are run on an electronic device, the electronic device is caused to execute the communication method provided in the above embodiment.
Other embodiments of the present application will be apparent to those skilled in the art from consideration of the specification and practice of the invention disclosed herein. This application is intended to cover any variations, uses, or adaptations of the invention following, in general, the principles of the application and including such departures from the present disclosure as come within known or customary practice within the art to which the invention pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the application being indicated by the following claims.

Claims (10)

1. A method of communication, the method comprising:
in the case where a first server requests access to a second server, the first server determines whether the second server belongs to the same cluster of servers as the first server;
in the case that the first server and the second server belong to the same server cluster, the first server sends an access request to the second server to request access to a service in the second server;
in the case that the first server and the second server do not belong to the same server cluster, the first server sends the access request to the second server through a first proxy server to request access to a service in the second server; the first proxy server is located in a server cluster corresponding to the first server.
2. The communication method according to claim 1, wherein the access request includes an identification of the second server; the sending, by the first server to the second server through the first proxy server, the access request to request access to the service in the second server in a case that the first server and the second server do not belong to the same server cluster, includes:
in the case that the first server and the second server do not belong to the same server cluster, the first server sends the access request to the first proxy server;
the first proxy server receives the access request, and determines a server cluster of the second server from a first mapping relation comprising a plurality of server identifications and a plurality of server cluster identifications according to the identification of the second server;
and the first proxy server determines a second proxy server from a second mapping relation comprising a plurality of server cluster identifications and a plurality of proxy server identifications according to the server cluster of the second server, and sends the access request to the second proxy server so as to instruct the second proxy server to forward the access request to the second server.
3. The communication method of claim 2, wherein the method further comprises:
the second proxy server forwarding the access request to the second server;
and the second server responds to the access request and sends the service which is requested to be accessed by the first server to the first server through the second proxy server.
4. The communication method according to claim 1, wherein the first server determining whether the first server and the second server belong to the same server cluster comprises:
the first server acquires cluster information of the server; the server cluster information comprises the identification of each server in the server cluster corresponding to the first server;
the first server judges whether the identifier of the second server exists in the cluster information of the server to which the first server belongs, the first server determines that the first server and the second server belong to the same server cluster under the condition that the identifier of the second server exists in the cluster information of the server to which the first server belongs, and the first server determines that the first server and the second server do not belong to the same server cluster under the condition that the identifier of the second server does not exist in the cluster information of the server to which the first server belongs.
5. A communication system comprising a first server, a second server, a first proxy server, and a second proxy server;
the first server is used for determining whether the first server and the second server belong to the same server cluster under the condition that the first server requests to access the second server;
the first server is further used for sending an access request to the second server to request to access the service in the second server under the condition that the first server and the second server belong to the same server cluster;
the first server is further configured to send the access request to the second server through a first proxy server to request access to a service in the second server when the first server and the second server do not belong to the same server cluster; the first proxy server is located in a server cluster corresponding to the first server.
6. The communication system of claim 5, wherein the access request includes an identification of the second server;
the first server is specifically configured to send the access request to the first proxy server when the first server and the second server do not belong to the same server cluster;
the first proxy server is used for receiving the access request and determining a server cluster of the second server from a first mapping relation comprising a plurality of server identifications and a plurality of server cluster identifications according to the identification of the second server;
the first proxy server is further configured to determine, according to the server cluster of the second server, a second proxy server from a second mapping relationship including a plurality of server cluster identifiers and a plurality of proxy server identifiers, and send the access request to the second proxy server to instruct the second proxy server to forward the access request to the second server.
7. The communication system of claim 6, wherein the second proxy server is configured to forward the access request to the second server;
the second server is further configured to send, to the first server, the service to which the first server requests access through the second proxy server in response to the access request.
8. The communication system of claim 5, wherein the first server is specifically configured to:
acquiring cluster information of a server to which the server belongs; the cluster information of the subordinate servers comprises the identification of each server in a server cluster corresponding to the first server;
judging whether the identifier of the second server exists in the affiliated server cluster information, determining that the second server belongs to the same server cluster under the condition that the identifier of the second server exists in the affiliated server cluster information, and determining that the second server does not belong to the same server cluster under the condition that the identifier of the second server does not exist in the affiliated server cluster information.
9. An electronic device, comprising: a processor, a memory for storing instructions executable by the processor; wherein the processor is configured to execute instructions to implement the communication method of any one of claims 1-4.
10. A computer-readable storage medium having instructions stored thereon, wherein the instructions in the computer-readable storage medium, when executed by a processor of an electronic device, enable the electronic device to perform the communication method of any one of claims 1-4.
CN202211502111.3A 2022-11-28 2022-11-28 Communication method, system, electronic device and storage medium Pending CN115988078A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211502111.3A CN115988078A (en) 2022-11-28 2022-11-28 Communication method, system, electronic device and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211502111.3A CN115988078A (en) 2022-11-28 2022-11-28 Communication method, system, electronic device and storage medium

Publications (1)

Publication Number Publication Date
CN115988078A true CN115988078A (en) 2023-04-18

Family

ID=85968887

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211502111.3A Pending CN115988078A (en) 2022-11-28 2022-11-28 Communication method, system, electronic device and storage medium

Country Status (1)

Country Link
CN (1) CN115988078A (en)

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110636103A (en) * 2019-07-22 2019-12-31 中山大学 Unified scheduling method for multi-heterogeneous cluster jobs and API (application program interface)
CN111460460A (en) * 2020-04-02 2020-07-28 北京金山云网络技术有限公司 Task access method, device, proxy server and machine-readable storage medium
CN113360882A (en) * 2021-05-27 2021-09-07 北京百度网讯科技有限公司 Cluster access method, device, electronic equipment and medium
CN113778709A (en) * 2021-08-25 2021-12-10 北京达佳互联信息技术有限公司 Interface calling method, device, server and storage medium
CN113923204A (en) * 2021-10-29 2022-01-11 深圳证券信息有限公司 Request forwarding method, device, equipment and readable storage medium
CN114025021A (en) * 2021-11-18 2022-02-08 上海道客网络科技有限公司 Communication method, system, medium and electronic device across Kubernetes cluster
CN114025009A (en) * 2021-10-20 2022-02-08 北京奥星贝斯科技有限公司 Method, system, proxy server and device for forwarding request
CN114153566A (en) * 2021-12-20 2022-03-08 浪潮电子信息产业股份有限公司 Cross-processor architecture multi-container inter-cluster service discovery method, device and equipment
CN114884955A (en) * 2022-06-14 2022-08-09 平安科技(深圳)有限公司 Transparent agent deployment system and method

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110636103A (en) * 2019-07-22 2019-12-31 中山大学 Unified scheduling method for multi-heterogeneous cluster jobs and API (application program interface)
CN111460460A (en) * 2020-04-02 2020-07-28 北京金山云网络技术有限公司 Task access method, device, proxy server and machine-readable storage medium
CN113360882A (en) * 2021-05-27 2021-09-07 北京百度网讯科技有限公司 Cluster access method, device, electronic equipment and medium
CN113778709A (en) * 2021-08-25 2021-12-10 北京达佳互联信息技术有限公司 Interface calling method, device, server and storage medium
CN114025009A (en) * 2021-10-20 2022-02-08 北京奥星贝斯科技有限公司 Method, system, proxy server and device for forwarding request
CN113923204A (en) * 2021-10-29 2022-01-11 深圳证券信息有限公司 Request forwarding method, device, equipment and readable storage medium
CN114025021A (en) * 2021-11-18 2022-02-08 上海道客网络科技有限公司 Communication method, system, medium and electronic device across Kubernetes cluster
CN114153566A (en) * 2021-12-20 2022-03-08 浪潮电子信息产业股份有限公司 Cross-processor architecture multi-container inter-cluster service discovery method, device and equipment
CN114884955A (en) * 2022-06-14 2022-08-09 平安科技(深圳)有限公司 Transparent agent deployment system and method

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
李慧, 林中强, 李岩: "Web服务器集群系统的实现方法及负载管理", 计算机应用, no. 05, 28 May 2001 (2001-05-28) *

Similar Documents

Publication Publication Date Title
US11777790B2 (en) Communications methods and apparatus for migrating a network interface and/or IP address from one Pod to another Pod in a Kubernetes system
US10798157B2 (en) Technologies for transparent function as a service arbitration for edge systems
CN112039942A (en) Subscription and publishing method and server
US20060080417A1 (en) Method, system and program product for automated topology formation in dynamic distributed environments
US10116642B2 (en) Identity management over multiple identity providers
CN112104754B (en) Network proxy method, system, device, equipment and storage medium
CN110554927A (en) Micro-service calling method based on block chain
EP3531749B1 (en) Management method, management unit and system for network function
WO2019100266A1 (en) Mobile edge host-machine service notification method and apparatus
US7966394B1 (en) Information model registry and brokering in virtualized environments
WO2021185083A1 (en) Vnf instantiation method and device
US20220294806A1 (en) Integrity verified paths between entities in a container-orchestration system
CN113886794A (en) Computing cluster system, security authentication method, node device and storage medium
CN113361913A (en) Communication service arranging method, device, computer equipment and storage medium
TW202301118A (en) Dynamic microservices allocation mechanism
CN108512779B (en) Control information transmission method, server and system
US10785056B1 (en) Sharing a subnet of a logically isolated network between client accounts of a provider network
CN108028806A (en) The method and apparatus that virtual resource is distributed in network function virtualization NFV networks
CN109076027B (en) Network service request
CN111327447B (en) Distributed system, arbitration method, node device and storage medium
CN113342457A (en) Kubernetes scheduling method based on registration and discovery of Eureka service
CN115988078A (en) Communication method, system, electronic device and storage medium
CN113905094B (en) Industrial Internet integration method, device and system
CN112994942B (en) SDN control method and device
CN114979286A (en) Access control method, device and equipment for container service and computer storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination