CN116192952A - Domain name routing-based access method, device, computer equipment and storage medium - Google Patents

Domain name routing-based access method, device, computer equipment and storage medium Download PDF

Info

Publication number
CN116192952A
CN116192952A CN202211607200.4A CN202211607200A CN116192952A CN 116192952 A CN116192952 A CN 116192952A CN 202211607200 A CN202211607200 A CN 202211607200A CN 116192952 A CN116192952 A CN 116192952A
Authority
CN
China
Prior art keywords
target
cluster
address
domain name
source
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211607200.4A
Other languages
Chinese (zh)
Inventor
朱磊磊
许俊彦
陈宏泽
侯彪
邬稳
刘伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Merchants Union Consumer Finance Co Ltd
Original Assignee
Merchants Union Consumer Finance Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Merchants Union Consumer Finance Co Ltd filed Critical Merchants Union Consumer Finance Co Ltd
Priority to CN202211607200.4A priority Critical patent/CN116192952A/en
Publication of CN116192952A publication Critical patent/CN116192952A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/74Address processing for routing

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The application relates to an access method, an access device, computer equipment and a storage medium based on domain name routing. The method comprises the following steps: the DNS of the source cluster receives an access request from a source operation system, and identifies domain name information of a target operation system carried in the access request to obtain an identification result; the source operation system is a system belonging to a source cluster; if the identification result represents that the target operation system and the source operation system do not belong to the same cluster, analyzing the access request to the outbound proxy; the outbound proxy end queries an environment DNS based on domain name information to obtain an entry IP address of a target cluster where a target running system is located, and initiates a first call request to a management object of the target cluster based on the entry IP address; and the management object initiates a second call request to the target operation system according to the first call request, so that the target operation system returns corresponding first target data according to the second call request. By adopting the method, cross-cluster access can be realized.

Description

Domain name routing-based access method, device, computer equipment and storage medium
Technical Field
The present disclosure relates to the field of computer technologies, and in particular, to an access method, an access device, a computer device, and a storage medium based on domain name routing.
Background
Kubernetes, also known as K8s, is an application for managing, orchestrating, and scheduling containers in multiple hosts. Because the Kubernetes have the characteristics of simple and efficient application deployment and operation and maintenance, currently, many newly-built systems are based on the Kubernetes deployment, but the Kubernetes cluster has the effect of natural network isolation, namely, each service in the cluster can be automatically accessed through a domain name, the domain name cannot be identified to the service outside the cluster, so that K8s has no cross-cluster service and discovery capability, and cross-cluster access cannot be realized. Therefore, how to achieve the K8s cross-cluster access becomes a technical problem to be solved by those skilled in the art.
Disclosure of Invention
In view of the foregoing, it is desirable to provide an access method, apparatus, computer device, and storage medium based on domain name routing that can achieve cross-cluster access.
In a first aspect, the present application provides a domain name routing based access method. The method comprises the following steps:
the DNS of the source cluster receives an access request from a source operation system, and identifies domain name information of a target operation system carried in the access request to obtain an identification result; the source operation system is a system belonging to the source cluster;
If the identification result represents that the target running system and the source running system do not belong to the same cluster, analyzing the access request to an outbound proxy;
the outbound proxy end queries an environment DNS based on the domain name information to obtain an entry IP address of a target cluster where a target running system is located, and initiates a first call request to a management object of the target cluster based on the entry IP address;
and the management object initiates a second call request to the target operation system according to the first call request, so that the target operation system returns corresponding first target data according to the second call request.
In one embodiment, the parsing the access request to the outbound proxy includes:
returning the proxy IP address of the outbound proxy end according to the domain name information;
and the outbound proxy end receives a proxy request sent by the source running system according to the proxy IP address.
In one embodiment, the querying the environment DNS based on the domain name information to obtain the entry IP address of the target cluster where the target operating system is located includes:
searching and obtaining a proxy target address based on the domain name information;
Initiating a query request to the environment DNS according to the proxy target address;
and the environment DNS queries according to the query request to obtain an entry IP address of the target cluster, and sends the entry IP address to the outbound proxy.
In one embodiment, the initiating a second call request to the target operating system according to the first call request includes:
receiving the first call request, and initiating an analysis request to the DNS of the target cluster according to the first call request, so that the DNS of the target cluster obtains the IP address of the target running system through analysis according to the domain name information carried in the first call request;
and initiating a second call request to the target operating system according to the IP address of the target operating system.
In one embodiment, if the identification result indicates that the target running system and the source running system belong to the same cluster, the IP address of the target running system is returned to the source running system;
and the source operating system initiates an interface calling request to the target operating system according to the IP address of the target operating system.
In one embodiment, the method further comprises:
The environment DNS receives an access request sent by a virtual machine operation system; the access request carries domain name information of a target operation system;
the environment DNS returns an entry IP address of a target cluster where the target running system is located according to the domain name information;
the virtual machine operation system initiates a first interface call request to a management object of the target cluster according to the entry IP address of the target cluster;
the management object receives the first interface call request and analyzes the IP address of the target operating system according to domain name information carried in the first interface call request;
the management object initiates a second call request to the target operating system according to the IP address of the target operating system so as to enable the target operating system to return second target data;
and returning the second target data to the virtual machine operation system.
In a second aspect, the present application also provides an access device based on domain name routing. The device comprises:
the source cluster DNS is used for receiving an access request from a source operation system, identifying domain name information of a target operation system carried in the access request, and obtaining an identification result; the access request carries domain name information of a target operation system, and the source operation system is a system belonging to the source cluster;
The source cluster DNS is further used for resolving the access request to an outbound proxy if the identification result characterizes that the target running system and the source running system do not belong to the same cluster;
the outbound proxy end is used for inquiring the environment DNS based on the domain name information to obtain an entry IP address of a target cluster where a target running system is located, and initiating a first call request to a management object of the target cluster based on the entry IP address;
and the management object is used for initiating a second call request to the target operation system according to the first call request so that the target operation system returns corresponding first target data according to the second call request.
In a third aspect, the present application also provides a computer device. The computer device comprises a memory and a processor, wherein the memory stores a computer program, and the processor realizes the steps of the access method based on domain name routing when executing the computer program.
In a fourth aspect, the present application also provides a computer-readable storage medium. The computer readable storage medium has stored thereon a computer program which, when executed by a processor, implements the steps of the domain name routing based access method described above.
In a fifth aspect, the present application also provides a computer program product. The computer program product comprises a computer program which, when executed by a processor, implements the steps of the domain name routing based access method described above.
According to the access method, the access device, the computer equipment and the storage medium based on the domain name routing, the identification result is obtained by identifying the access request of the source operation system, when the identification result represents that the target operation system and the source operation system do not belong to the same cluster, the access request is resolved to the outbound proxy end, so that the outbound proxy end queries according to domain name information to obtain the entry IP address of the target cluster where the target operation system is located, and a first call request is initiated to the management object of the target cluster based on the entry IP address, so that the management object initiates a second call request to the target operation system according to the first call request, partition scheduling of the access request is achieved, and cross-cluster scheduling of the source operation system is further achieved.
Drawings
FIG. 1 is an application environment diagram of a domain name routing based access method in one embodiment;
FIG. 2 is a flow diagram of a domain name routing based access method in one embodiment;
FIG. 3 is a first call link schematic diagram of a domain name routing based access method in one embodiment;
FIG. 4 is a flowchart illustrating a step of determining an entry IP address of a target cluster in one embodiment;
FIG. 5 is a flow chart of a domain name routing based access method in another embodiment;
FIG. 6 is a schematic diagram of a source cluster architecture of a domain name routing based access method in one embodiment;
FIG. 7 is a second call link diagram of a domain name routing based access method in one embodiment;
FIG. 8 is a flow chart of a domain name routing based access method in another embodiment;
FIG. 9 is a schematic diagram of virtual machine and source cluster architecture of a domain name routing based access method in one embodiment;
FIG. 10 is a third call link diagram of a domain name routing based access method in one embodiment;
FIG. 11 is a block diagram of an access device based on domain name routing in one embodiment;
fig. 12 is an internal structural diagram of a computer device in one embodiment.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application will be further described in detail with reference to the accompanying drawings and examples. It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the present application.
The embodiment of the application provides an access method based on domain name routing, which can be applied to an application environment shown in fig. 1. Where a cluster may refer to a group of computers, the cluster as a whole provides a set of network resources to users, and these individual computers are nodes of the cluster. The clusters communicate with each other through a network. A corresponding DNS and management object are provided in each cluster, and DNS in the clusters is called local DNS. Outside the cluster, a global DNS, i.e. an ambient DNS, is also provided. DNS may refer to a domain name system (Domain NameSystem) for enabling translation of domain names with IP addresses. DNS within a cluster is responsible for service resolution within a cluster to enable calls within a cluster. The environment DNS is used for analyzing the target service to the entrance of the cluster where the service is located so as to realize the calling of the cross-cluster. When a source operation system initiates an access request, a DNS of a cluster where the source operation system is located receives the access request, identifies domain name information of a target operation system carried in the access request, obtains an identification result, analyzes the access request to an outbound proxy end if the identification result represents that the target operation system and the source operation system do not belong to the same cluster, queries the outbound proxy end to an environment DNS based on the domain name information to obtain an entry IP address of the target cluster where the target operation system is located, initiates a first call request to a management object of the target cluster based on the entry IP address, and initiates a second call request to the target operation system according to the first call request, so that the target operation system receives the access request of the source operation system and returns corresponding first target data according to the second call request. The clusters may be K8s clusters or non-K8 s clusters.
In one embodiment, as shown in fig. 2 and 3, there is provided an access method based on domain name routing, including the steps of:
step 202, a DNS of a source cluster receives an access request from a source operation system, and identifies domain name information of a target operation system carried in the access request to obtain an identification result; the source operating system belongs to a system of source clusters.
The DNS of the source cluster may refer to a local DNS that belongs to the source cluster, and is responsible for service resolution in the source cluster, so as to implement service call in the cluster. Local DNS cannot discover service calls that are not local clusters.
A source operating system may refer to a system that initiates an access request, which is a system that belongs to a source cluster.
An access request may refer to a request initiated by a source operating system to access a target operating system. The access request carries domain name information of the target operating system.
In an exemplary embodiment, after a source operating system sends an access request, a DNS in a cluster where the source operating system is located first receives the access request, and identifies domain name information of a target operating system carried in the access request, so as to obtain an identification result, so as to identify whether the access request belongs to a cross-cluster.
For example, when the identification result is that the identification is successful, the identification result may indicate that the access request belongs to an access inside the cluster, that is, the target operating system and the source operating system belong to the same cluster. When the identification result is that the identification fails, the identification result can indicate that the access request belongs to the cross-cluster access, namely the target running system and the source running system do not belong to the same cluster.
Step 204, if the identification result represents that the target running system and the source running system do not belong to the same cluster, analyzing the access request to the outbound proxy;
the outbound proxy may refer to a proxy interface for traffic partition scheduling. And storing the entry domain name information of the cluster where the target operating system is located in the outbound proxy end, wherein the entry domain name information can send a request to the environment DNS so as to acquire the entry IP address of the cluster where the target operating system is located. For example, the function of the outbound proxy may be implemented by nginnxproxy, or may be implemented by other manners.
When the DNS in the source cluster cannot identify the access request, it is illustrated that the corresponding identification result indicates that the target operating system and the source operating system do not belong to the same cluster, where the access request is a cross-cluster access, and the DNS in the source cluster resolves the access request to the outbound proxy of the same cluster (source cluster), so that the outbound proxy obtains the entry domain name information of the cluster where the target operating system is located based on the access request.
It is noted that in this application, both the source cluster and the target cluster are relatively speaking. The cluster where the source operating system initiates access is called the source cluster, and the cluster where the target operating system needs to access is called the target cluster.
In some embodiments, when the source runtime system is performing an intra-cluster access, the target runtime system and the source runtime system belong to the same cluster, where the source cluster and the target cluster are the same cluster.
Step 206, the proxy end is queried in the environment DNS based on the domain name information to obtain the entry IP address of the target cluster where the target running system is located, and a first call request is initiated to the management object of the target cluster based on the entry IP address.
Where the ambient DNS may refer to a global DNS that is used to enable call access across clusters.
The ingress IP address may refer to the ingress internet protocol address of the target cluster.
The management object may refer to an API (Application Programming Interface ) object that manages external access to services in the cluster. For example, the management object may be ingress.
The outbound proxy terminal queries the environment DNS based on domain name information carried in the access request to obtain an entry IP address of a target cluster where the target operating system is located, and initiates a first call request to a management object of the target cluster according to the entry IP address after obtaining the entry IP address.
For example, the ngginxproxy may initiate a query request to the ambient DNS to cause the ambient DNS to query for the ingress IP address of the target cluster according to the query request, and send the ingress IP address back to NginxProxy, nginxProxy to receive the ingress IP address and initiate the first call request to the ingress according to the ingress IP address.
In step 208, the management object initiates a second call request to the target operating system according to the first call request, so that the target operating system returns corresponding first target data according to the second call request.
The first target data may refer to data returned by the target operating system. The first target data may be response information for receiving the access request, or may be corresponding data generated according to the access request.
Illustratively, after receiving the first call request, the management object initiates a resolution request to the DNS of the target cluster, so that the DNS of the target cluster resolves the first call request, and returns the IP address of the target running system to the management object, so that the management object accesses the target running system.
When the second call request is initiated by the management object of the target cluster during cross-cluster access, the access is equivalent to the access in the target cluster, and the processing mode is similar to the service in the cluster at this time, and the processing can be performed with reference to the service in the cluster.
According to the access method based on domain name routing, the access request of the source operation system is identified to obtain an identification result, when the identification result represents that the target operation system and the source operation system do not belong to the same cluster, the access request is resolved to the outbound proxy end, so that the outbound proxy end queries according to domain name information to obtain the entry IP address of the target cluster where the target operation system is located, and a first call request is initiated to a management object of the target cluster based on the entry IP address, so that the management object initiates a second call request to the target operation system according to the first call request, partition scheduling of the access request is achieved, and cross-cluster scheduling of the source operation system is achieved.
In some embodiments, referring to fig. 3, the step of "resolving an access request to an outbound proxy" includes, but is not limited to, the steps of: returning a proxy IP address of the proxy end according to the domain name information; the outbound receives a proxy request sent by the source operating system according to the proxy IP address.
The proxy IP address may indicate an IP address to the proxy, i.e. an internet protocol address to the proxy.
A proxy request may refer to a request sent by a source operating system to initiate access to a proxy source operating system.
Illustratively, DNS in the source cluster queries according to the domain name information to obtain a proxy IP address to the proxy, and after the source running system obtains the proxy IP address, generates and transmits a proxy request based on the proxy IP address, so that the source running system initiates a query request to the environment DNS to the proxy.
According to the technical scheme, the proxy IP address is returned according to the domain name information, so that the source operating system can conveniently initiate a proxy request to the outbound proxy end, the resolution of the domain name information in the access request is realized, the DNS in the cluster can conveniently resolve the access request to the outbound proxy end, and cross-cluster access is facilitated.
Referring to fig. 4, in some embodiments, the step of "obtaining the entry IP address of the target cluster where the target running system is located based on the domain name information by querying the environment DNS" includes, but is not limited to, the following steps:
step 402, searching and obtaining a proxy target address based on domain name information.
Wherein the proxy target address may refer to a backend server IP address of the target cluster.
Illustratively, the outbound proxy obtains the proxy target address according to the domain name information and a preset database.
Step 404, a query request is initiated to the ambient DNS according to the proxy destination address.
The query request carries the IP address of the back-end server of the target cluster.
In step 406, the environmental DNS queries to obtain the entry IP address of the target cluster according to the query request, and sends the entry IP address to the proxy.
The outbound proxy initiates a query request to the environment DNS according to the proxy target address, so that the environment DNS queries in a preset database according to the query request to obtain an entry IP address of the target cluster, and sends the entry IP address to the proxy.
In some embodiments, the step of "initiating a second call request to the target operating system based on the first call request" includes, but is not limited to, the steps of: receiving a first call request, and initiating an analysis request to the DNS of the target cluster according to the first call request, so that the DNS of the target cluster obtains the IP address of the target running system through analysis according to the domain name information carried in the first call request; and initiating a second call request to the target operating system according to the IP address of the target operating system.
Specifically, the sending proxy sends a first call request to a management object of the target cluster according to an entry IP address of the target cluster, the management object initiates an analysis request to a DNS of the target cluster after receiving the first call request, so that the DNS of the target cluster analyzes according to domain name information carried in the first call request to obtain an IP address of a target operation system, the management object receives the IP address of the target operation system, and initiates a second call request to the target operation system according to the IP address of the target operation system, so that the target operation system returns first target data.
Referring to fig. 5, 6 and 7, in some embodiments, the domain name routing based access method further includes, but is not limited to, the following steps:
step 502, if the identification result indicates that the target operating system and the source operating system belong to the same cluster, returning the IP address of the target operating system to the source operating system.
In step 504, the source operating system initiates an interface call request to the target operating system according to the IP address of the target operating system.
Specifically, in this embodiment, when the DNS in the source cluster can identify the domain name information carried in the access request, it is indicated that the target operating system and the source operating system belong to the same cluster, and at this time, the access request is access in the cluster, in this case, the DNS in the source cluster can directly determine the IP address of the target operating system according to the domain name information. After the source operating system obtains the IP address of the target operating system, the source operating system directly initiates an interface calling request to the target operating system according to the IP address of the target operating system so as to realize the access to the target operating system.
Referring to fig. 8, 9 and 10, in some embodiments, the domain name routing based access method further includes, but is not limited to, the following steps:
Step 802, an environment DNS receives an access request sent by a virtual machine operation system; the access request carries domain name information of the target operating system.
The virtual machine operation system may refer to a system operating in a virtual machine. The access request is now an access between the virtual machine and the cluster.
In step 804, the environment DNS returns the entry IP address of the target cluster where the target operating system is located according to the domain name information.
In step 806, the virtual machine running system initiates a first interface call request to the management object of the target cluster according to the entry IP address of the target cluster.
In step 808, the management object receives the first interface call request, and resolves the IP address of the target operating system according to the domain name information carried in the first interface call request.
In step 810, the management object initiates a second call request to the target operating system according to the IP address of the target operating system, so that the target operating system returns the second target data.
The second target data may refer to data generated according to an access request from the virtual machine. The second target data may be information related to the access acceptance, or may be data generated in response to an access request.
Step 812, the second target data is sent back to the virtual machine operating system.
Specifically, in this embodiment, the environment DNS receives an access request from the virtual machine operating system, and parses domain name information carried in the access request to determine an entry IP address of a target cluster where the target operating system is located. After receiving the entry IP address of the target cluster, the virtual machine operation system sends a first interface call request to the management object of the target cluster according to the entry IP address, so that the DNS of the target cluster determines the IP address of the target operation system according to the domain name information carried in the first interface call request, returns the IP address of the target operation system to the management object, and initiates a second interface call request to the target operation system according to the IP address of the target operation system, so that the target operation system returns second target data, and access between the virtual machine and the cluster is realized.
It is noted that the second target data is first returned to the management object, and then the management object forwards the second target data to the virtual machine running system.
It should be understood that, although the steps in the flowcharts related to the above embodiments are sequentially shown as indicated by arrows, these steps are not necessarily sequentially performed in the order indicated by the arrows. The steps are not strictly limited to the order of execution unless explicitly recited herein, and the steps may be executed in other orders. Moreover, at least some of the steps in the flowcharts described in the above embodiments may include a plurality of steps or a plurality of stages, which are not necessarily performed at the same time, but may be performed at different times, and the order of the steps or stages is not necessarily performed sequentially, but may be performed alternately or alternately with at least some of the other steps or stages.
Based on the same inventive concept, the embodiment of the application also provides a domain name routing-based access device for implementing the above related domain name routing-based access method. The implementation of the solution provided by the device is similar to the implementation described in the method above.
In one embodiment, as shown in fig. 11, there is provided an access device based on domain name routing, including: source cluster DNS1102, outbound proxy 1104, and management object 1106, wherein:
the source cluster DNS1102 is configured to receive an access request from a source operating system, and identify domain name information of a target operating system carried in the access request, so as to obtain an identification result; the access request carries domain name information of a target operation system, and the source operation system is a system belonging to a source cluster;
the source cluster DNS is also used for resolving the access request to the outbound proxy end if the identification result indicates that the target operation system and the source operation system do not belong to the same cluster;
the outbound proxy 1104 is configured to query the environment DNS based on the domain name information to obtain an entry IP address of a target cluster where the target operating system is located, and initiate a first call request to a management object of the target cluster based on the entry IP address;
And the management object 1106 is used for initiating a second call request to the target running system according to the first call request, so that the target running system returns corresponding first target data according to the second call request.
In some embodiments, the source cluster DNS is further configured to return a proxy IP address to the proxy according to the domain name information. The outbound proxy end is also used for receiving a proxy request sent by the source running system according to the proxy IP address.
In some embodiments, the domain name routing based access device further comprises an ambient DNS.
The outbound proxy end is also used for searching and obtaining a proxy target address based on domain name information; initiating a query request to an environment DNS according to the proxy target address; the environment DNS is used for inquiring according to the inquiry request to obtain the entry IP address of the target cluster, and sending the entry IP address to the proxy end.
In some embodiments, the domain name routing based access device further comprises: the source runs the system.
The management object is used for receiving the first call request, and initiating an analysis request to the DNS of the target cluster according to the first call request, so that the DNS of the target cluster obtains the IP address of the target running system through analysis according to the domain name information carried in the first call request; the management object is further configured to initiate a second call request to the target operating system according to the IP address of the target operating system.
In some embodiments, the source cluster DNS is further configured to return the IP address of the target operating system to the source operating system if the identifying result indicates that the target operating system and the source operating system belong to the same cluster; the source operating system is also used for initiating an interface call request to the target operating system according to the IP address of the target operating system.
In some embodiments, the domain name routing based access device further comprises: the virtual machine runs the system. The environment DNS is used for receiving an access request sent by the virtual machine operation system; the access request carries domain name information of the target operating system, and returns an entry IP address of the target cluster where the target operating system is located according to the domain name information. The virtual machine running system is used for initiating a first interface calling request to a management object of the target cluster according to the entry IP address of the target cluster. The management object is used for receiving the first interface call request, resolving the domain name information carried in the first interface call request to obtain the IP address of the target operation system, and initiating a second call request to the target operation system according to the IP address of the target operation system so as to enable the target operation system to return second target data. The target running system is used for returning the second target data to the virtual machine running system.
The various modules in the domain name routing based access device described above may be implemented in whole or in part in software, hardware, and combinations thereof. The above modules may be embedded in hardware or may be independent of a processor in the computer device, or may be stored in software in a memory in the computer device, so that the processor may call and execute operations corresponding to the above modules.
In one embodiment, a computer device is provided, which may be a server, and the internal structure of which may be as shown in fig. 12. The computer device includes a processor, a memory, an Input/Output interface (I/O) and a communication interface. The processor, the memory and the input/output interface are connected through a system bus, and the communication interface is connected to the system bus through the input/output interface. Wherein the processor of the computer device is configured to provide computing and control capabilities. The memory of the computer device includes a non-volatile storage medium and an internal memory. The non-volatile storage medium stores an operating system, computer programs, and a database. The internal memory provides an environment for the operation of the operating system and computer programs in the non-volatile storage media. The database of the computer device is used to store domain name information. The input/output interface of the computer device is used to exchange information between the processor and the external device. The communication interface of the computer device is used for communicating with an external terminal through a network connection. The computer program is executed by a processor to implement a domain name routing based access method.
It will be appreciated by those skilled in the art that the structure shown in fig. 12 is merely a block diagram of some of the structures associated with the present application and is not limiting of the computer device to which the present application may be applied, and that a particular computer device may include more or fewer components than shown, or may combine certain components, or have a different arrangement of components.
In one embodiment, a computer device is provided comprising a memory and a processor, the memory having stored therein a computer program, the processor when executing the computer program performing the steps of: the DNS of the source cluster receives an access request from a source operation system, and identifies domain name information of a target operation system carried in the access request to obtain an identification result; the source operation system is a system belonging to a source cluster; if the identification result represents that the target operation system and the source operation system do not belong to the same cluster, analyzing the access request to the outbound proxy; the outbound proxy end queries an environment DNS based on domain name information to obtain an entry IP address of a target cluster where a target running system is located, and initiates a first call request to a management object of the target cluster based on the entry IP address; and the management object initiates a second call request to the target operation system according to the first call request, so that the target operation system returns corresponding first target data according to the second call request.
In one embodiment, the processor when executing the computer program further performs the steps of: returning a proxy IP address of the proxy end according to the domain name information; the outbound receives a proxy request sent by the source operating system according to the proxy IP address.
In one embodiment, the processor when executing the computer program further performs the steps of: searching and obtaining a proxy target address based on domain name information; initiating a query request to an environment DNS according to the proxy target address; and the environment DNS queries according to the query request to obtain the entry IP address of the target cluster, and sends the entry IP address to the proxy end.
In one embodiment, the processor when executing the computer program further performs the steps of: receiving a first call request, and initiating an analysis request to the DNS of the target cluster according to the first call request, so that the DNS of the target cluster obtains the IP address of the target running system through analysis according to the domain name information carried in the first call request; and initiating a second call request to the target operating system according to the IP address of the target operating system.
In one embodiment, the processor when executing the computer program further performs the steps of: if the identification result represents that the target running system and the source running system belong to the same cluster, returning an IP address of the target running system to the source running system; the source operating system initiates an interface call request to the target operating system according to the IP address of the target operating system.
In one embodiment, the processor when executing the computer program further performs the steps of: the environment DNS receives an access request sent by a virtual machine operation system; the access request carries domain name information of the target operating system; the environment DNS returns an entry IP address of a target cluster where the target running system is located according to the domain name information; the virtual machine running system initiates a first interface calling request to a management object of the target cluster according to the entry IP address of the target cluster; the management object receives a first interface call request and analyzes the domain name information carried in the first interface call request to obtain an IP address of a target operating system; the management object initiates a second call request to the target operating system according to the IP address of the target operating system so as to enable the target operating system to return second target data; and returning the second target data to the virtual machine operation system.
In one embodiment, a computer readable storage medium is provided having a computer program stored thereon, which when executed by a processor, performs the steps of: the DNS of the source cluster receives an access request from a source operation system, and identifies domain name information of a target operation system carried in the access request to obtain an identification result; the source operation system is a system belonging to a source cluster; if the identification result represents that the target operation system and the source operation system do not belong to the same cluster, analyzing the access request to the outbound proxy; the outbound proxy end queries an environment DNS based on domain name information to obtain an entry IP address of a target cluster where a target running system is located, and initiates a first call request to a management object of the target cluster based on the entry IP address; and the management object initiates a second call request to the target operation system according to the first call request, so that the target operation system returns corresponding first target data according to the second call request.
In one embodiment, the computer program when executed by the processor further performs the steps of: returning a proxy IP address of the proxy end according to the domain name information; the outbound receives a proxy request sent by the source operating system according to the proxy IP address.
In one embodiment, the computer program when executed by the processor further performs the steps of: searching and obtaining a proxy target address based on domain name information; initiating a query request to an environment DNS according to the proxy target address; and the environment DNS queries according to the query request to obtain the entry IP address of the target cluster, and sends the entry IP address to the proxy end.
In one embodiment, the computer program when executed by the processor further performs the steps of: receiving a first call request, and initiating an analysis request to the DNS of the target cluster according to the first call request, so that the DNS of the target cluster obtains the IP address of the target running system through analysis according to the domain name information carried in the first call request; and initiating a second call request to the target operating system according to the IP address of the target operating system.
In one embodiment, the computer program when executed by the processor further performs the steps of: if the identification result represents that the target running system and the source running system belong to the same cluster, returning an IP address of the target running system to the source running system; the source operating system initiates an interface call request to the target operating system according to the IP address of the target operating system.
In one embodiment, the computer program when executed by the processor further performs the steps of: the environment DNS receives an access request sent by a virtual machine operation system; the access request carries domain name information of the target operating system; the environment DNS returns an entry IP address of a target cluster where the target running system is located according to the domain name information; the virtual machine running system initiates a first interface calling request to a management object of the target cluster according to the entry IP address of the target cluster; the management object receives a first interface call request and analyzes the domain name information carried in the first interface call request to obtain an IP address of a target operating system; the management object initiates a second call request to the target operating system according to the IP address of the target operating system so as to enable the target operating system to return second target data; and returning the second target data to the virtual machine operation system.
In one embodiment, a computer program product is provided comprising a computer program which, when executed by a processor, performs the steps of: the DNS of the source cluster receives an access request from a source operation system, and identifies domain name information of a target operation system carried in the access request to obtain an identification result; the source operation system is a system belonging to a source cluster; if the identification result represents that the target operation system and the source operation system do not belong to the same cluster, analyzing the access request to the outbound proxy; the outbound proxy end queries an environment DNS based on domain name information to obtain an entry IP address of a target cluster where a target running system is located, and initiates a first call request to a management object of the target cluster based on the entry IP address; and the management object initiates a second call request to the target operation system according to the first call request, so that the target operation system returns corresponding first target data according to the second call request.
In one embodiment, the computer program when executed by the processor further performs the steps of: returning a proxy IP address of the proxy end according to the domain name information; the outbound receives a proxy request sent by the source operating system according to the proxy IP address.
In one embodiment, the computer program when executed by the processor further performs the steps of: searching and obtaining a proxy target address based on domain name information; initiating a query request to an environment DNS according to the proxy target address; and the environment DNS queries according to the query request to obtain the entry IP address of the target cluster, and sends the entry IP address to the proxy end.
In one embodiment, the computer program when executed by the processor further performs the steps of: receiving a first call request, and initiating an analysis request to the DNS of the target cluster according to the first call request, so that the DNS of the target cluster obtains the IP address of the target running system through analysis according to the domain name information carried in the first call request; and initiating a second call request to the target operating system according to the IP address of the target operating system.
In one embodiment, the computer program when executed by the processor further performs the steps of: if the identification result represents that the target running system and the source running system belong to the same cluster, returning an IP address of the target running system to the source running system; the source operating system initiates an interface call request to the target operating system according to the IP address of the target operating system.
In one embodiment, the computer program when executed by the processor further performs the steps of: the environment DNS receives an access request sent by a virtual machine operation system; the access request carries domain name information of the target operating system; the environment DNS returns an entry IP address of a target cluster where the target running system is located according to the domain name information; the virtual machine running system initiates a first interface calling request to a management object of the target cluster according to the entry IP address of the target cluster; the management object receives a first interface call request and analyzes the domain name information carried in the first interface call request to obtain an IP address of a target operating system; the management object initiates a second call request to the target operating system according to the IP address of the target operating system so as to enable the target operating system to return second target data; and returning the second target data to the virtual machine operation system.
Those skilled in the art will appreciate that implementing all or part of the above described methods may be accomplished by way of a computer program stored on a non-transitory computer readable storage medium, which when executed, may comprise the steps of the embodiments of the methods described above. Any reference to memory, database, or other medium used in the various embodiments provided herein may include at least one of non-volatile and volatile memory. The nonvolatile Memory may include Read-Only Memory (ROM), magnetic tape, floppy disk, flash Memory, optical Memory, high density embedded nonvolatile Memory, resistive random access Memory (ReRAM), magnetic random access Memory (Magnetoresistive Random Access Memory, MRAM), ferroelectric Memory (Ferroelectric Random Access Memory, FRAM), phase change Memory (Phase Change Memory, PCM), graphene Memory, and the like. Volatile memory can include random access memory (Random Access Memory, RAM) or external cache memory, and the like. By way of illustration, and not limitation, RAM can be in the form of a variety of forms, such as static random access memory (Static Random Access Memory, SRAM) or dynamic random access memory (Dynamic Random Access Memory, DRAM), and the like. The databases referred to in the various embodiments provided herein may include at least one of relational databases and non-relational databases. The non-relational database may include, but is not limited to, a blockchain-based distributed database, and the like. The processors referred to in the embodiments provided herein may be general purpose processors, central processing units, graphics processors, digital signal processors, programmable logic units, quantum computing-based data processing logic units, etc., without being limited thereto.
The technical features of the above embodiments may be arbitrarily combined, and all possible combinations of the technical features in the above embodiments are not described for brevity of description, however, as long as there is no contradiction between the combinations of the technical features, they should be considered as the scope of the description.
The above examples only represent a few embodiments of the present application, which are described in more detail and are not to be construed as limiting the scope of the present application. It should be noted that it would be apparent to those skilled in the art that various modifications and improvements could be made without departing from the spirit of the present application, which would be within the scope of the present application. Accordingly, the scope of protection of the present application shall be subject to the appended claims.

Claims (10)

1. An access method based on domain name routing, the method comprising:
the DNS of the source cluster receives an access request from a source operation system, and identifies domain name information of a target operation system carried in the access request to obtain an identification result; the source operation system is a system belonging to the source cluster;
if the identification result represents that the target running system and the source running system do not belong to the same cluster, analyzing the access request to an outbound proxy;
The outbound proxy end queries an environment DNS based on the domain name information to obtain an entry IP address of a target cluster where a target running system is located, and initiates a first call request to a management object of the target cluster based on the entry IP address;
and the management object initiates a second call request to the target operation system according to the first call request, so that the target operation system returns corresponding first target data according to the second call request.
2. The method of claim 1, wherein resolving the access request to an outbound proxy comprises:
returning the proxy IP address of the outbound proxy end according to the domain name information;
and the outbound proxy end receives a proxy request sent by the source running system according to the proxy IP address.
3. The method of claim 1, wherein the querying the environment DNS based on the domain name information to obtain the ingress IP address of the target cluster in which the target operating system is located includes:
searching and obtaining a proxy target address based on the domain name information;
initiating a query request to the environment DNS according to the proxy target address;
and the environment DNS queries according to the query request to obtain an entry IP address of the target cluster, and sends the entry IP address to the outbound proxy.
4. The method of claim 1, wherein the initiating a second call request to the target operating system based on the first call request comprises:
receiving the first call request, and initiating an analysis request to the DNS of the target cluster according to the first call request, so that the DNS of the target cluster obtains the IP address of the target running system through analysis according to the domain name information carried in the first call request;
and initiating a second call request to the target operating system according to the IP address of the target operating system.
5. The method of any one of claims 1 to 4, further comprising:
if the identification result represents that the target running system and the source running system belong to the same cluster, returning the IP address of the target running system to the source running system;
and the source operating system initiates an interface calling request to the target operating system according to the IP address of the target operating system.
6. The method according to any one of claims 1 to 4, further comprising:
the environment DNS receives an access request sent by a virtual machine operation system; the access request carries domain name information of a target operation system;
The environment DNS returns an entry IP address of a target cluster where the target running system is located according to the domain name information;
the virtual machine operation system initiates a first interface call request to a management object of the target cluster according to the entry IP address of the target cluster;
the management object receives the first interface call request and analyzes the domain name information carried in the first interface call request to obtain the IP address of the target operation system;
the management object initiates a second call request to the target operating system according to the IP address of the target operating system so as to enable the target operating system to return second target data;
and returning the second target data to the virtual machine operation system.
7. An access device based on domain name routing, the device comprising:
the source cluster DNS is used for receiving an access request from a source operation system, identifying domain name information of a target operation system carried in the access request, and obtaining an identification result; the access request carries domain name information of a target operation system, and the source operation system is a system belonging to the source cluster;
The source cluster DNS is further used for resolving the access request to an outbound proxy if the identification result characterizes that the target running system and the source running system do not belong to the same cluster;
the outbound proxy end is used for inquiring the environment DNS based on the domain name information to obtain an entry IP address of a target cluster where a target running system is located, and initiating a first call request to a management object of the target cluster based on the entry IP address;
and the management object is used for initiating a second call request to the target operation system according to the first call request so that the target operation system returns corresponding first target data according to the second call request.
8. A computer device comprising a memory and a processor, the memory storing a computer program, characterized in that the processor implements the steps of the method of any of claims 1 to 6 when the computer program is executed.
9. A computer readable storage medium, on which a computer program is stored, characterized in that the computer program, when being executed by a processor, implements the steps of the method of any of claims 1 to 6.
10. A computer program product comprising a computer program, characterized in that the computer program, when being executed by a processor, implements the steps of the method of any of claims 1 to 6.
CN202211607200.4A 2022-12-14 2022-12-14 Domain name routing-based access method, device, computer equipment and storage medium Pending CN116192952A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211607200.4A CN116192952A (en) 2022-12-14 2022-12-14 Domain name routing-based access method, device, computer equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211607200.4A CN116192952A (en) 2022-12-14 2022-12-14 Domain name routing-based access method, device, computer equipment and storage medium

Publications (1)

Publication Number Publication Date
CN116192952A true CN116192952A (en) 2023-05-30

Family

ID=86451390

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211607200.4A Pending CN116192952A (en) 2022-12-14 2022-12-14 Domain name routing-based access method, device, computer equipment and storage medium

Country Status (1)

Country Link
CN (1) CN116192952A (en)

Similar Documents

Publication Publication Date Title
US10356038B2 (en) Shared multi-tenant domain name system (DNS) server for virtual networks
US20100235509A1 (en) Method, Equipment and System for Resource Acquisition
CN113746887A (en) Cross-cluster data request processing method, device and storage medium
CN108924215B (en) Service discovery processing method and device based on tree structure
US20170154073A1 (en) System and method for retrieving data
CN111885216B (en) DNS query method, device, equipment and storage medium
CN113507475B (en) Cross-domain access method and device
CN114095430A (en) Processing method, system and working node of access message
CN111586201A (en) Domain name resolution system, method, device and storage medium
CN111752681A (en) Request processing method, device, server and computer readable storage medium
CN112100152A (en) Service data processing method, system, server and readable storage medium
CN112583760B (en) Object storage access method, device, equipment and computer storage medium
US10986065B1 (en) Cell-based distributed service architecture with dynamic cell assignment
CN109413224B (en) Message forwarding method and device
CN111428114B (en) Index creation method and device of elastic search engine
CN113301173A (en) Domain name updating system and method, message forwarding method and server
CN116192952A (en) Domain name routing-based access method, device, computer equipment and storage medium
US10452295B1 (en) Data routing in information processing system utilizing persistent memory
CN116389599A (en) Gateway service request processing method and device and cloud native gateway system management method and device
CN114172853B (en) Configuration method and device of traffic forwarding and bare computer server
CN115858590A (en) Domain name query request processing method, computer device, apparatus, medium, and product
CN115426333A (en) Multi-cluster access system and method for object storage
US7058773B1 (en) System and method for managing data in a distributed system
US10958580B2 (en) System and method of performing load balancing over an overlay network
CN117453380B (en) Cluster container group scheduling method, system and computer equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Country or region after: China

Address after: 518000 Room 201, building A, No. 1, Qian Wan Road, Qianhai Shenzhen Hong Kong cooperation zone, Shenzhen, Guangdong (Shenzhen Qianhai business secretary Co., Ltd.)

Applicant after: Zhaolian Consumer Finance Co.,Ltd.

Address before: 518000 Room 201, building A, No. 1, Qian Wan Road, Qianhai Shenzhen Hong Kong cooperation zone, Shenzhen, Guangdong (Shenzhen Qianhai business secretary Co., Ltd.)

Applicant before: MERCHANTS UNION CONSUMER FINANCE Co.,Ltd.

Country or region before: China

CB02 Change of applicant information