CN117459360A - Data processing method, device, equipment, storage medium and program product - Google Patents

Data processing method, device, equipment, storage medium and program product Download PDF

Info

Publication number
CN117459360A
CN117459360A CN202210848651.0A CN202210848651A CN117459360A CN 117459360 A CN117459360 A CN 117459360A CN 202210848651 A CN202210848651 A CN 202210848651A CN 117459360 A CN117459360 A CN 117459360A
Authority
CN
China
Prior art keywords
control node
target
endpoint
node
nodes
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210848651.0A
Other languages
Chinese (zh)
Inventor
庞子勇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Tencent Domain Computer Network Co Ltd
Original Assignee
Shenzhen Tencent Domain Computer Network Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Tencent Domain Computer Network Co Ltd filed Critical Shenzhen Tencent Domain Computer Network Co Ltd
Priority to CN202210848651.0A priority Critical patent/CN117459360A/en
Publication of CN117459360A publication Critical patent/CN117459360A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/04Network management architectures or arrangements
    • H04L41/042Network management architectures or arrangements comprising distributed management centres cooperatively managing the network

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The application discloses a data processing method, a device, equipment, a storage medium and a program product, wherein the method comprises the following steps: the first control node acquires a registration request of a target endpoint and acquires a target management control node of a target endpoint set to which the target endpoint belongs; the first control node forwards the registration request to the target management control node so that the target management control node updates the set information of the target endpoint set based on the registration request and sends the set information to the proxy node associated with the target endpoint set; the proxy nodes associated with the set of target endpoints include target proxy nodes; and when the first control node receives a registration success response of the target management control node for the target endpoint, sending the registration success response to the target proxy node. By adopting the method and the device, the control performance of the service management network can be improved.

Description

Data processing method, device, equipment, storage medium and program product
Technical Field
The present invention relates to the field of computer technologies, and in particular, to a data processing method, apparatus, device, storage medium, and program product.
Background
With the large-scale popularization of mobile internet and the large-scale popularization of entertainment service, more and more network design schemes in the internet industry can perform control operations such as adding, deleting, changing and the like for a certain application client (e.g., game client) so as to establish a stable service management network, so that the stable quality of the service management network needs to be controlled. In general, a service management network is implemented based on micro services, and a service grid is divided into a control plane and a data plane, and global management rules under the service management network, metadata maintenance in the service grid and the like are implemented through a unified control plane, so that decoupling of a user service and the control plane is achieved.
Disclosure of Invention
The embodiment of the application provides a data processing method, a device, equipment, a storage medium and a program product, which can improve the control performance of a service management network.
In one aspect, an embodiment of the present application provides a data processing method, including:
the first control node acquires a registration request of a target endpoint and acquires a target management control node of a target endpoint set to which the target endpoint belongs; the registration request comprises a target endpoint, a target endpoint set to which the target endpoint belongs and a target proxy node to which the target endpoint is connected; the target management control node is a control node for managing a target endpoint set;
the first control node forwards the registration request to the target management control node so that the target management control node updates the set information of the target endpoint set based on the registration request and sends the set information to the proxy node associated with the target endpoint set; the proxy nodes associated with the set of target endpoints include target proxy nodes;
and when the first control node receives a registration success response of the target management control node for the target endpoint, sending the registration success response to the target proxy node.
An aspect of an embodiment of the present application provides a data processing apparatus, including:
the request acquisition module is used for acquiring a registration request of a target endpoint by the first control node;
the first node acquisition module is used for acquiring a target management control node of a target endpoint set to which a target endpoint belongs; the registration request comprises a target endpoint, a target endpoint set to which the target endpoint belongs and a target proxy node to which the target endpoint is connected; the target management control node is a control node for managing a target endpoint set;
The request forwarding module is used for forwarding the registration request to the target management control node by the first control node so that the target management control node updates the set information of the target endpoint set based on the registration request and sends the set information to the proxy node associated with the target endpoint set; the proxy nodes associated with the set of target endpoints include target proxy nodes;
and the response sending module is used for sending the registration success response to the target proxy node when the first control node receives the registration success response of the target management control node to the target endpoint.
Wherein, the first node acquisition module includes:
the target node determining unit is used for acquiring a mapping relation between the control node and the endpoint set from the operation memory corresponding to the first control node if the first control node is the main control node, and determining a target management control node of a target endpoint set to which the target endpoint belongs from the mapping relation; the main control node is a control node with the management authority to the control node;
the target node obtaining unit is configured to obtain a target management control node of the target endpoint set from the master control node if the first control node is not the master control node.
Wherein the target node acquisition unit includes:
a node searching subunit, configured to search the master control node if the first control node is not the master control node;
a node selecting subunit, configured to send a main control node selecting request for a control node to be voted to other control nodes, where the other control nodes are control nodes other than the first control node, if the main control node is not found;
and the target node determining subunit is used for determining the control node to be voted as the main control node if the other control nodes vote through the control node to be voted, and acquiring a target management control node of the target endpoint set from the main control node.
Wherein, the data processing device still includes:
the path acquisition module is used for acquiring an endpoint path of the target endpoint by the first control node based on the registration request if the first control node is the target management control node;
the information updating module is used for updating the set information of the target endpoint set based on the endpoint path, sending the set information to the proxy node associated with the target endpoint set and sending the set information to other control nodes;
and the process execution module is used for executing a process of acquiring the target management control node of the target endpoint set to which the target endpoint belongs if the first control node is not the target management control node.
Wherein, the data processing device still includes:
the second node acquisition module is used for acquiring N control nodes if the first control node does not find the target management control node, wherein N is a positive integer; the N control nodes comprise first control nodes;
and the set sending module is used for sending the target endpoint set to the main control node so that the main control node can acquire the space utilization information of the N control nodes, and determining the target management control node according to the space utilization information.
The first node obtaining module is specifically configured to obtain a target management control node of a target endpoint set to which a target endpoint sent by the master control node belongs.
Wherein, the first node acquisition module further includes:
the candidate node determining unit is configured to determine candidate control nodes for the target endpoint set based on the space utilization information corresponding to the N control nodes, and send the candidate control nodes to other control nodes if the first control node does not find the target management control node and the first control node is the master control node; the other control nodes refer to control nodes except the first control node in the N control nodes; n is a positive integer;
The voting information acquisition unit is used for acquiring voting information of other control nodes aiming at the candidate control nodes, and if the voting information is used for indicating the passage of voting, the candidate control nodes are determined to be target management control nodes aiming at the target endpoint set;
and the process execution unit is used for returning to execute the process that the first control node determines candidate control nodes aiming at the target endpoint set based on the space utilization information corresponding to the N control nodes respectively and sends the candidate control nodes to other control nodes if the voting information is used for indicating that the voting does not pass.
Wherein, the data processing device still includes:
the request receiving module is used for receiving a communication request sent by the target endpoint by the first control node; the communication request comprises a communication destination object and a communication message;
the type acquisition module is used for acquiring the type of the communication destination object;
the object path acquisition module is used for acquiring an endpoint path corresponding to the communication destination object if the communication destination object is an endpoint, and sending the communication message to the communication destination object based on the endpoint path;
the terminal acquisition module is used for acquiring the terminal included in the terminal set if the communication target object is the terminal set, carrying out hash processing on the set information of the communication target object, and determining the terminal to be transmitted from the terminal included in the communication target object based on the hash result;
And the message sending module is used for acquiring the endpoint path corresponding to the endpoint to be sent and sending the communication message to the endpoint to be sent based on the endpoint path of the endpoint to be sent.
In one aspect, the present application provides a computer device comprising: a processor, a memory, a network interface;
the processor is connected to the memory and the network interface, where the network interface is used to provide a data communication function, the memory is used to store a computer program, and the processor is used to call the computer program to make the computer device execute the method in the embodiment of the present application.
In one aspect, embodiments of the present application provide a computer readable storage medium having a computer program stored therein, the computer program being adapted to be loaded by a processor and to perform a method according to embodiments of the present application.
In one aspect, embodiments of the present application provide a computer program product or computer program comprising computer instructions stored in a computer-readable storage medium; the processor of the computer device reads the computer instructions from the computer-readable storage medium, and the processor executes the computer instructions, so that the computer device performs the methods in the embodiments of the present application.
In this embodiment of the present application, when a computer device (for example, a first control node) having a service management network control function obtains a registration request of a target endpoint, the registration request may be forwarded to the target management control node by obtaining a target management control node of a target endpoint set to which the target endpoint belongs, so that the target management control node updates set information of the target endpoint set based on the registration request, and sends the set information to an agent node associated with the target endpoint set. And when the first control node receives a registration success response of the target management control node for the target endpoint, sending the registration success response to the target proxy node. The computer equipment can forward the registration request to the target management control node, so that the target management control node updates the set information of the target endpoint set based on the registration request and then sends the updated set information to the proxy node corresponding to the target endpoint set. Therefore, according to the embodiment of the application, by distributing the unique management control node to each endpoint set, the service cluster scale supported by the service management network is gradually increased (for example, the service management network exceeds ten thousands of nodes), different management control nodes are partnered, the pressure of the service management network is decomposed, the general quantity operation level of the whole system is subjected to level reduction processing after the partitioning, the general quantity operation level of the whole system is changed to the small quantity operation level of each management control node, the target endpoint set is controlled through the target management control node, so that when one endpoint set is changed, a certain control node performs information updating, further orderly operation of the system is still guaranteed, updated information is sent to proxy nodes related to the information, and the proxy nodes possibly affected by the endpoint set can timely acquire the latest information, so that normal operation and real-time updating of the service are guaranteed, and performance and stability of the service management network are further improved.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings that are required in the embodiments or the description of the prior art will be briefly described below, it being obvious that the drawings in the following description are only some embodiments of the present application, and that other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
Fig. 1 is a schematic architecture diagram of a service management network according to an embodiment of the present application;
FIG. 2 is a schematic flow chart of a data processing method according to an embodiment of the present application;
FIG. 3 is an interactive flow diagram for target endpoint registration provided by an embodiment of the present application;
FIG. 4 is a schematic flow chart of a data processing method according to an embodiment of the present application;
FIG. 5 is an interactive flow diagram for a target endpoint to communicate with other endpoints provided by embodiments of the present application;
fig. 6 is a schematic view of a scenario for service management network control according to an embodiment of the present application;
FIG. 7 is a schematic diagram of a data processing apparatus according to an embodiment of the present application;
fig. 8 is a schematic structural diagram of a computer device according to an embodiment of the present application.
Detailed Description
The following description of the embodiments of the present application will be made clearly and fully with reference to the accompanying drawings, in which it is evident that the embodiments described are only some, but not all, of the embodiments of the present application. All other embodiments, which can be made by one of ordinary skill in the art based on the embodiments herein without making any inventive effort, are intended to be within the scope of the present application.
The embodiment of the application provides a method for performing service management network control, which can relate to the field of big data.
Big data (Big data) refers to a data set which cannot be captured, managed and processed by a conventional software tool within a certain time range, and is a massive, high-growth-rate and diversified information asset which needs a new processing mode to have stronger decision-making ability, insight discovery ability and flow optimization ability. With the advent of the cloud age, big data has attracted more and more attention, and special techniques are required for big data to effectively process a large amount of data within a tolerant elapsed time. Technologies applicable to big data include massively parallel processing databases, data mining, distributed file systems, distributed databases, cloud computing platforms, the internet, and scalable storage systems.
If the service data of the object (such as a user) needs to be collected in the application, before and during collection, a prompt interface or a popup window is displayed, wherein the prompt interface or the popup window is used for prompting the user to collect the service data related to the user currently, and the related step of data acquisition is started only after the user sends confirmation operation to the prompt interface or the popup window is acquired, otherwise, the data acquisition is ended. The acquired target service data is used in a reasonable and legal scene, application, or the like. Optionally, in some scenarios where the usage object service data is needed but is not authorized by the usage object, authorization may be requested from the usage object, and when the authorization passes, the usage object service data may be reused.
Referring to fig. 1, fig. 1 is a schematic architecture diagram of a service management network according to an embodiment of the present application. As shown in fig. 1, any one of the nodes (e.g., control node or proxy node, etc.) or endpoints (e.g., control node 1C shown in fig. 1) 1 Proxy node 1001A 1 Or endpoint 111E 1 Etc.) may be either a specific entity device or a logical device (virtual logical device), which is not limited herein, wherein the entity device may include a server and a terminal device, or the entity device may be a server or a terminal device. Optionally, the database 10D, control node 1C shown in fig. 1 1 Proxy node 1001A 1 And endpoint 111E 1 Etc. may also be run entirely on one device.
The architecture shown in fig. 1 may be referred to herein as a service management network (Tmesh), which may include a control plane 11P and a data plane 12P. The service management network may support control plane support for micro-service technology. The micro-service technology may be implemented by a service grid (servicemail) or the like. Among other things, the control plane (control plane) may provide available and performance-stable service discovery functions, routing management functions, configuration management functions, and the like. The control plane may be used to run processes (control processes), maintain databases (control db), and the like. The control plane may be a cluster comprising N control nodes, N being a positive integer. Wherein the control plane 11P may include the database 10D and N control nodes, N being a positive integer, for example, as shown in fig. 1, the N control nodes may include the control node 1C 1 Control node 1C 2 … control node 1C n The first control node may be any one of the N control nodes. The data plane may provide single-endpoint to single-endpoint or single-endpoint to multi-endpoint performance-stable communication functionality based on rich routing configurations. The data plane 12P may include proxy nodes connected under each control node, e.g., M proxy nodes (agents or sidecars) respectively connected under N control nodes, M being a positive integer, as shown in fig. 1, proxy node 1001A 1 Proxy node 1001A 2 、…Proxy node 100nA m The target proxy node refers to a proxy node associated with a target endpoint, wherein the first control node refers to a control node to which the target proxy node is connected, i.e., the first control node is determined by the target proxy node. The database 10D is used to store all data in the entire service management network, it being understood that the control node 1C 1 Control node 1C 2 … control node 1C n The control clusters are formed, the number of the control nodes in the control clusters can be correspondingly adjusted according to the number scale of the proxy nodes in the data plane 12P, and if the number scale of the proxy nodes in the data plane 12P is gradually increased, the number of the control nodes in the clusters can be increased. Wherein each proxy node may be connected to k endpoints, where k is a natural number, and optionally, k corresponding to each proxy node may be the same or different, as in fig. 1, proxy node 1001A 1 And endpoint 111E 1 … and endpoint 111E k Is connected with each other.
Alternatively, the number of proxy nodes in the data plane 12P may be based on the endpoint 111E for the bearer traffic 1 、…、1nmE k Is adjusted. Alternatively, the control node and the proxy node may communicate using any communication method, for example, through a communication protocol, where the communication protocol may include, but is not limited to, a transmission control protocol (Transmission Control Protocol, TCP) and a user datagram protocol (UDP, user Datagram Protocol), or may communicate through a logical channel or a physical channel, and the like, which is not limited herein. Optionally, the control nodes and the proxy nodes under the same control node can communicate in any communication mode, and the communication mode between the control nodes and the proxy nodes can be seen. If the proxy nodes under different control nodes communicate with each other, the control nodes respectively connected with the proxy nodes can be used as relays to further communicate. The communication mode between the proxy node and the endpoint may be a communication protocol of a transmission layer, or may be a communication method between multiple processes in a software system, for example, may be communication through TCP or may be communication through TCP Communication is performed through Shared Memory (SHM). Among other things, TCP may be used to transport instructions that cannot be lost.
It should be noted that, the endpoint is a unit for dividing the application type or the application scale, and is used for providing services, for example, the target endpoint may be a real game server in the game application, or the target endpoint may be a process of sending and receiving messages to and from the outside by means of a service grid (micro service technology) according to a specified rule. The endpoint set may include at least one endpoint, the number of endpoints in the endpoint set may be dynamically adjusted according to the specific circumstances in the service management network (e.g., memory usage, etc.), and the endpoint set may be a partition of non-entities. The actual naming of the endpoints may refer to the naming of the internet protocol (Internet Protocol, IP), or may take the form of a sequential naming (e.g. a number sequence or a letter sequence, or a combination of numbers and letters, etc.), etc. For example, if an endpoint is named 1.2, the number "1" on a bit may indicate the endpoint set to which the endpoint belongs, the number "2" after a decimal point may indicate the endpoint identity number (Identity document, ID) of the endpoint in the endpoint set, other endpoints, and so on. It should be noted that, if a endpoints have the same identifier of the endpoint set to which the endpoints belong, a endpoints belong to the same endpoint set, and a is a positive integer. The control node (tcontrollsvr) may be a unit (e.g., a single computer device or a logically-oriented node) that implements service management functions in a service management network, where the service management functions may include capabilities such as service discovery, routing management, and configuration management that provide high availability capabilities. A proxy node may be a unit (e.g., a single computer device or a logically node) with data transfer capabilities, i.e., providing high performance, on a point-to-point, point-to-multipoint, and other types of communication capabilities for rich routing configurations.
In order to improve the control performance of the service management network, N control nodes are deployed in the control plane 11P, and the control nodes can be considered to have different identities in different attribute dimensions, where the attribute dimensions includeIncluding a set management attribute dimension, a control management attribute dimension, and the like, for example, in the set management attribute dimension, if a control node has management authority for an endpoint set, the control node may consider the identity in the set management attribute dimension as the management control node of the corresponding endpoint set, for example, assuming that the control node 1C 1 Having the management authority for the endpoint set 1, this control node 1C is indicated 1 The identity under the aggregate management attribute dimension is the management control node (own) of endpoint aggregate 1. In the control management attribute dimension, if one control node has control authority for other control nodes, the control node may consider the identity in the control management attribute dimension as the master control node, for example, assume that the control node 1C 1 If the control authority of other control nodes is provided, the control node 1C 1 The identity under the dimension of the control management attribute is a Master control node (Master); if one control node does not have control authority for the other control node, the control node may consider the identity under the control management attribute dimension as a slave control node, for example, assume the control node 1C 1 If the control authority of the other control node is not provided, the control node 1C 1 The identity under the control management attribute dimension is the slave control node (follow).
Further, referring to fig. 2, fig. 2 is a flow chart of a data processing method according to an embodiment of the present application. As shown in fig. 2, the data processing method may at least include the following steps S101 to S103:
in step S101, a first control node obtains a registration request of a target endpoint, and obtains a target management control node of a target endpoint set to which the target endpoint belongs.
Specifically, the first control node may obtain a registration request sent by a target proxy node to which the target endpoint is connected, and specifically, the target endpoint may transmit the registration request to the target proxy node; alternatively, the target endpoint may send a registration request, and if the target proxy node connected to the target endpoint detects the registration request, the target proxy node obtains the registration request. Further, the target proxy node transmits the registration request to the first control node, wherein the first control node refers to the control node connected with the target proxy node. Alternatively, each endpoint may belong to an endpoint set, that is, when each endpoint registers, an endpoint set is added to register, that is, when the target proxy node obtains a registration request, the target endpoint set to which the target endpoint belongs may be obtained.
Specifically, taking a target endpoint as an example, one endpoint set may be selected from the endpoint sets as a target endpoint set, the target endpoint is associated with the target endpoint set, specifically, the number of endpoints included in each endpoint set may be obtained, the target endpoint set may be selected from the endpoint sets based on the number of endpoints included in each endpoint set, further optionally, if the number of endpoints included in each endpoint set is greater than the endpoint association threshold, a new endpoint set may be created, the new endpoint set is determined to be the target endpoint set, and the target endpoint is associated with the target endpoint set. Or, the target endpoint attribute of the target endpoint may be obtained, the set attribute corresponding to the endpoint set may be obtained, the endpoint set corresponding to the set attribute matched with the target endpoint attribute may be determined as the target endpoint set, and the target endpoint may be associated to the target endpoint set. Alternatively, the endpoint attributes may include, but are not limited to, service state attributes (stateful or stateless), subnet type attributes of the endpoint's network address, or traffic class attributes that the endpoint is running. For example, if an endpoint needs to store data carried by the request when initiating the request, the data may be called by other requests, or when processing service logic corresponding to the request, the data carried by other requests needs to be adopted, the service state attribute of the endpoint may be considered to be a stateful attribute; if an endpoint initiates a request that carries all the data required to process the business logic corresponding to the request, the service state attribute of the endpoint may be considered a stateless attribute. Alternatively, the service state attribute of the endpoint may be determined based on the duration of the service provided by the endpoint, and in particular, the determination manner of the service state attribute may be determined based on the actual application of the endpoint. Alternatively, if an endpoint provides a stateful service, then the service state attribute of the endpoint may be considered a stateful attribute; if an endpoint provides stateless services, the service state attribute of the endpoint may be considered a stateless attribute. For example, an endpoint providing an item purchase service, such as purchasing a game item in a mall at a game client, may require multiple steps of placing a shopping cart, confirming an order, paying, etc., and may determine a service status attribute of the endpoint providing the item purchase service as a stateful attribute.
Optionally, in a possible manner, hash processing may be performed on the target endpoint to obtain an endpoint hash, a target endpoint set to which the target endpoint belongs and a target proxy node to which the target endpoint is connected are determined based on the endpoint hash, and the steps S101 to S103 are executed based on the target endpoint, the target endpoint set and the target proxy node, so as to implement registration of the target endpoint. Optionally, the endpoint hash may include a first hash and a second hash, specifically, a first hash algorithm is adopted to perform hash processing on the target endpoint to obtain a first hash, and a target endpoint set to which the target endpoint belongs is determined based on the first hash; and carrying out hash processing on the target endpoint by adopting a second hash algorithm to obtain a second hash, and determining the target agent node based on the second hash. The first hash algorithm may be an algorithm for calculating a target endpoint set to which the target endpoint belongs, and the first hash algorithm adopted in the running process of the target endpoint may be fixed, so that the target endpoint may join the same endpoint set after being dropped; the second hash algorithm may refer to an algorithm for calculating a target proxy node to which the target endpoint belongs, and the second hash algorithm adopted during the operation of the target endpoint may be fixed, so that the target endpoint may be connected to the same proxy node after disconnection. Optionally, if the target endpoint offline duration is greater than or equal to the stateful attribute duration threshold, the first hash algorithm and the second hash algorithm associated with the target endpoint may be updated, or may not be updated. The threshold value of the stateful property time length can be determined according to the general standard of the current hash processing on the internet, or can be self-adjusted according to the maximum time length required to be reserved for the endpoint providing the stateful service, or can be based on manual setting and the like.
Taking an endpoint as an example, assuming that the endpoint is an application usage process, where the application usage process is a process that needs to maintain at least a state holding duration, such as an in-game process, where the in-game process may refer to a game being played, such as a game copy being played, a game in a chess game, or a game in a game in a game class, where the application usage process is exited from a currently associated application space only when the application usage process ends a corresponding application task, e.g., the application usage process is a game copy being played, and the current game copy (i.e., an associated application space) is exited when the game copy (i.e., an application task) is ended; the application using process is a game of chess and card game, and when the game of chess and card game (namely application task) is ended, the game room (namely associated application space) where the game of chess and card game is located is exited. Therefore, if the endpoint has a offline condition in the running process, the endpoint needs to be added into the original application space, and the possible mode can be adopted, so that the endpoint can be added into the previous endpoint set and connected to the original proxy node, and the endpoint can be added into the original application space, so that the endpoint can continue to run the process before offline, and the running efficiency and reliability of the endpoint are improved.
The set of endpoints may be comprised of at least one endpoint. Endpoints join a set of endpoints at the time they initially enter the network. Taking the target endpoint as an example, assume that set partitioning is performed based on a traffic type attribute including game data, for example, the game attribute of the target endpoint may be acquired at the time of registration of the target endpoint. Wherein the game attributes may be game type attributes (e.g., action, adventure, simulation, role-playing, leisure, and others), game play mode attributes (e.g., game play mode attributesComputer-side operation, cell-phone-side operation, web-page operation, applet operation, etc.), game suitability using age attributes (e.g., infant, young child, teenager, middle-aged or elderly, etc.), or game operation requirement attributes (e.g., whether network is required, a requirement for network speed, a requirement for hardware configuration performance, a requirement for hardware kind, etc.). And acquiring an endpoint set corresponding to the set attribute matched with the game attribute of the target endpoint, associating the target endpoint to the acquired endpoint set, and determining the endpoint set as a target endpoint set. Optionally, if the endpoint set of the set attribute matching the game attribute of the target endpoint is not obtained, a new endpoint set is created, the new endpoint set is determined as the target endpoint set, the target endpoint is associated to the target endpoint set, and a registration request is sent to the target proxy node based on the target endpoint and the target endpoint set. For example, the game attribute is a game type attribute, and assuming that the obtained endpoint attribute of the target endpoint is an action, the endpoint set having the set attribute of "action" is determined as a target endpoint set, and the target endpoint is associated with the target endpoint set. Alternatively, a set of endpoints that matches the service state attribute of the target endpoint may be obtained, and the target endpoint may be associated with the set of target endpoints. The target endpoint set may be named according to the number. Alternatively, the target endpoint set may be named based on common characteristics. The target endpoint set may also be named according to the requirements of the object of use of the traffic carried by the target endpoint, which is not limited herein. For example, with endpoint 111E 1 For example, assuming that the endpoint is a target endpoint, set information of a target endpoint set is obtained, and assuming that the obtained target endpoint set is a Group1, a target proxy node (i.e., proxy node 1001A) connected to the target endpoint is determined according to the target endpoint and the target endpoint set 1 ) A registration request is sent. The first control node (i.e., proxy node 1001A in fig. 1) 1 Connected control node 1C 1 ) Acquisition target endpoint (i.e., endpoint 111E of FIG. 1) 1 ) Is requested by the target proxy node (i.e., the proxy node of figure 1)1001A 1 ) Messaging takes place. Wherein a target endpoint (i.e., endpoint 111E of FIG. 1) is assumed 1 ) Is the control node 1C shown in fig. 1 2
The registration request comprises a target endpoint, a target endpoint set to which the target endpoint belongs and a target proxy node to which the target endpoint is connected; the target management control node refers to a control node for managing a target endpoint set.
Optionally, in the control node management manner (1), the first control node may store set information of all endpoint sets in the service management network, and if the set information in the target endpoint set is updated (for example, the target endpoint is registered), the first control node may send the updated endpoint path of the target endpoint to the proxy node associated with the target endpoint set, and the first control node may send the updated set information in the target endpoint set to other control nodes. The first control node acquires the set information of the target endpoint set, and determines a target management control node of the target endpoint set based on the set information of the target endpoint set. If the first control node is a target management control node of the target endpoint set, updating set information of the target endpoint set based on the registration request, sending the set information of the target endpoint set to a proxy node associated with the target endpoint set, and sending the updated set information of the target endpoint set to other control nodes, wherein the other control nodes refer to control nodes except the target management control node in the N control nodes, so that each control node can store the set information of all endpoint sets; if the first control node is not the target management control node of the target endpoint set, the target endpoint set to which the target endpoint belongs is searched, and step S102 is executed.
Optionally, in the control node management mode (2), the first control node may store the set information of the endpoint set that the first control node has the management authority, that is, the set information of the endpoint set that is not managed by the first control node is not stored in the control node. If the set information in the target endpoint set is updated (e.g., the target endpoint is registered), the first control node may send the endpoint path updated by the target endpoint to the proxy node associated with the target endpoint set.
If the first control node is a target management control node, the first control node directly processes the registration request, and updates the set information related to the target endpoint in the managed target endpoint set of the first control node, thereby completing the registration request of the target endpoint. The first control node may send the updated endpoint path of the target endpoint to the proxy node associated with the target endpoint set.
It should be noted that, if the first control node is a target management control node, the first control node obtains an endpoint path of the target endpoint based on the registration request; updating set information of a target endpoint set based on the endpoint path, sending the set information to a proxy node associated with the target endpoint set, and sending a registration success response to the target proxy node; and if the first control node is not the target management control node, executing a process of acquiring the target management control node of the target endpoint set to which the target endpoint belongs. For example, as shown in FIG. 1, if the target endpoint is endpoint 111E 1 The target endpoint set to which the target endpoint belongs is Group1, and the target management control node corresponding to the target endpoint set "Group1" is assumed to be control node 1C 1 The target endpoint obtains the proxy node 111E connected to the target endpoint 1 As a target proxy node, sending a registration request to the target proxy node, the target proxy node acquiring a control node connected to the target proxy node as a first control node, namely control node 1C 1 The first control node passes through the target proxy node 111E 1 "get target endpoint" 111E 1 "registration request, get the target endpoint" 111E 1 "belonging target endpoint set," i.e., "Group1", knowing that the target management control node corresponding to the target endpoint set "Group1" is control node 1C 1 That is, the first control node is the target management control node of the target endpoint set, and is directly stored in the control nodeIn the aggregate information, the endpoint 111E is based on the registration request 1 Endpoint information (e.g., endpoint 111E) 1 Endpoint path of) to Group1 to obtain new version of Group1 set information. After this, the control node 1C 1 The new version of Group1 set information may be sent to the proxy node associated with Group1 (e.g., proxy node 100nA 1 Etc.).
Specifically, if the first control node is not the target management control node and the first control node is the master control node, the first control node obtains a mapping relationship between the control node and the endpoint set from the running memory corresponding to the first control node, where the mapping relationship is used to indicate the management authority of the control node on the endpoint set, that is, the control node has the management authority on the endpoint set having the mapping relationship with the control node, that is, the management control node of the endpoint set. The Master control node (Master) refers to a control node having management authority to the control node. For example, the master control node may be a control node for assigning a management control node to a set of endpoints. In a service management network, the number of master control nodes is at most one in the same period. When a new service management network is established, the first control node initiates an election signal, and after receiving the election signal sent by the first control node, all control nodes (i.e. also including the first control node) in the service management network can respond to the election signal to participate in the election, and select one control node to become a main control node according to the election rule. Optionally, when a new competitive signal is received in the service management network, a master control node in the service management network may be searched, if the master control node exists in the current service management network, the master control node performs blocking waiting processing for the competitive signal until the master control node is off line, and blocking waiting processing for the competitive signal is finished, so as to further compete for the new master control node. And if the first control node is not the main control node, acquiring a target management control node of the target endpoint set from the main control node.
If the first control node is not the target management control node, the first control node is not the master control node, and the master control node needs to be searched first. If the master control node is not found, a master control node selection request for the to-be-voted control node is sent to other control nodes, wherein the other control nodes refer to the control nodes except the first control node, and the to-be-voted control node can be any control node and refers to the control node supported by the first control node. If the other control nodes pass the voting of the control nodes to be voted, determining the control nodes to be voted as the main control node, and acquiring the target management control node of the target endpoint set from the main control node. Optionally, when the to-be-voted control node is determined as the master control node, if there is missing data in the master control node, the missing data may be obtained from the database and stored. The master control node has management authority for the control node, is used for managing the mapping relation between the control node and the endpoint set, and does not need to store the mapping relation before becoming the master control node, so that when the to-be-voted control node is determined as the master control node, partial data loss may exist, the missing data can be obtained, and data supplementation is performed, so that the integrity of the data is ensured, and the master control node can better manage other control nodes.
Alternatively, a master node query request may be sent to (N-1) control nodes, and the master node may be determined based on the master node query request. Alternatively, the master control node may be looked up from a database; alternatively, the first control node itself stores the master control node. Specifically, address information of the master control node and the like can be acquired.
If the first control node does not find the target management control node and the first control node is the main control node, the first control node determines candidate control nodes for the target endpoint set based on the space utilization information corresponding to the N control nodes respectively, and sends the candidate control nodes to other control nodes; the other control nodes refer to control nodes except the first control node in the N control nodes; n is a positive integer; acquiring voting information of other control nodes aiming at candidate control nodes, and if the voting information is used for indicating voting to pass, determining the candidate control nodes as target management control nodes aiming at target endpoint sets; if the voting information is used for indicating that the voting does not pass, returning to the process of executing the candidate control nodes aiming at the target endpoint set and sending the candidate control nodes to other control nodes by the first control node based on the space utilization information corresponding to the N control nodes. Alternatively, the master control node may determine the target management control node for the target endpoint set directly from the control nodes.
The main control node distributes the target management control nodes of the target endpoint sets, so that each endpoint set has at least two endpoints even when at least two endpoint sets are changed in one service management network, a plurality of endpoints are started simultaneously, a control plane (such as a control plane 11P in figure 1) exists, the control plane can uniformly spread the endpoint sets to the management control nodes respectively corresponding to the endpoint sets, each management control node is guaranteed to only manage the endpoint set change of the management control node, and the problem of lock robbing during endpoint starting is avoided. In addition, even if the database has slow response, the management control node can process the change of the endpoint set, so that adverse effects of database abnormality on endpoint change in the communication equipment cluster are weakened, and the stability of the communication equipment cluster control is enhanced.
Further, if the first control node does not find the target management control node, N control nodes are obtained, wherein N is a positive integer; the N control nodes comprise first control nodes; and sending the target endpoint set to the main control node so that the main control node obtains the space utilization information of the N control nodes, and determining the target management control node according to the space utilization information. Further, a target management control node of a target endpoint set to which the target endpoint sent by the master control node belongs is obtained. The space utilization information may be a utilization rate of a storage memory of the control node or a remaining available space. For example, if the space utilization information is the remaining available space, the master control node may acquire the space utilization information of N control nodes, and then may transmit N control nodes And ordering the space utilization information of the control nodes, and determining the control node with the largest ordering as a target management control node. For example, assuming that the space utilization information is the utilization rate of the storage memory, the space utilization information of the N control nodes may be ranked, and the control node with the lowest ranking (i.e., the control node with the lowest utilization rate of the storage memory) may be determined as the target management control node. Alternatively, the master control node may randomly acquire one control node from the N control nodes, as a target management control node of the target endpoint set; alternatively, the master control node may determine a target management control node for the target endpoint set based on control node polling, e.g., assuming control node polling as "control node 1C" as shown in FIG. 1 1 —>Control node 1C 2 —>…—>Control node 1C n —>Control node 1C 1 … ", the last assigned management control node is control node 1C 2 Then the control node 1C may be 3 Determined as a target management control node, etc.
In step S102, the first control node forwards the registration request to the target management control node, so that the target management control node updates the set information of the target endpoint set based on the registration request, and sends the set information to the proxy node associated with the target endpoint set.
Specifically, the first control node forwards the registration request to the target management control node based on the acquired path information of the target management control node. The target management control node updates the target endpoint set according to the requirement of the registration request based on the received registration request, then the target management control node can distinguish old version set information of the target endpoint set before updating, determines the set information of the updated target endpoint set as new version set information, and distributes new version numbers for the target endpoint set. Further, the target management control node may send the new version of the set information of the target endpoint set to each proxy node associated with the target endpoint set. Wherein the proxy node associated with the target endpoint set is a proxy node to which endpoints in the target endpoint set are connected. It should be noted thatThe update processing may include performing a new process of an endpoint in the endpoint set based on the registration request, performing a transition of an endpoint traffic state in the endpoint set based on the communication message, for example, as shown in fig. 1, taking the endpoint 111E1 as an example, assuming that the endpoint is a target endpoint, acquiring set information of the target endpoint set, assuming that the acquired target endpoint set is determined as a Group (Group 1), sending the registration request to a target proxy node (i.e., proxy node 1001 A1) connected to the target endpoint according to the target endpoint and the target endpoint set, assuming that the first control node is control node 1C 1 The target management control node is control node 1C 2 Then the control node 1C 1 At receiving endpoint 111E 1 Through proxy node 1001A 1 After the transmitted registration request, forwarding the registration request to the control node 1C 2 Control node 1C 2 Endpoint 111E based on registration request 1 Adding the endpoint information of Group1 into the Group1 set information to obtain new version of Group1 set information. Control node 1C 2 Sending the new version of Group1 set information to the proxy node associated with Group1, e.g., assume proxy node 1001A 1 The endpoint in Group1 is connected down, and then the new version of the aggregate information of Group1 is sent to the proxy node 1001A 1
Alternatively, in the control node management mode (1), the target management control node may update the set information of the target endpoint set based on the registration request, and send the set information to the proxy node associated with the target endpoint set. The set information of the target endpoint set may further be sent to other control nodes, where the other control nodes refer to control nodes other than the target management control node in the N control nodes, so that each control node may store the set information of all endpoint sets.
In the control node management mode (2), the target management control node may update the set information of the target endpoint set based on the registration request, and send the set information to the proxy node associated with the target endpoint set. When the target management control node sends the set information to the proxy node associated with the target endpoint set, the target management control node may obtain the endpoint path of the endpoint included in the target endpoint set from the updated set information, determine, based on the endpoint path of the endpoint included in the target endpoint set, the proxy node connected to the endpoint included in the target endpoint set, that is, the proxy node associated with the target endpoint set, and send the updated set information to the proxy node associated with the target endpoint set.
Step S103, when the first control node receives the registration success response of the target management control node for the target endpoint, the first control node sends the registration success response to the target proxy node.
Specifically, the registration success response may be a flag that the target endpoint is successfully registered in the target management control node, and the sending of the registration success response represents that endpoint information of the target endpoint has been successfully updated into the target endpoint set. For example, as shown in FIG. 1, if the target endpoint is endpoint 111E 1 The target endpoint set is 1Group, and the target proxy node is proxy node 1001A 1 The first control node is control node 1C 1 The target management control node is control node 1C 2 Then when the control node 1C 1 Receiving control node 1C 2 For endpoint 111E 1 In response to successful registration of control node 1C 1 Sends a registration success response to proxy node 1001A 1
Optionally, if a new endpoint applies for registration in the endpoint set, the proxy node associated with the existing endpoint in the endpoint set and the proxy node associated with the endpoint applying for registration will vote to determine whether the registration of the new endpoint applying for registration is changed with the version of the endpoint set. For example, if Group1 is a stateful attribute and the current version number of Group1 is 2, the Group1 includes endpoint 1.1 and endpoint 1.2, and the new endpoint applies for registration to Group1 to become 1.3, then the management control node C of Group1 1 A version change procedure for Group1 may be initiated. For example, group1 management control node C 1 The version number of Group1 may be changed to 3 by a self-increment process (e.g. adding 1 to the current version number),proxy node a with which endpoint 1.1 is associated 1 Proxy node a with which endpoint 1.2 is associated 3 Proxy node a associated with new application registration endpoint 1.3 5 The voting process may be performed for the registration request of endpoint 1.3 based on the condition of each proxy node (e.g., the total number of associated endpoints or the performance utilization of the proxy node). If the voting is successful, determining the version number of the Group1 as 3, and transmitting the version number of the Group1 to a management control node of the Group1 in a service management network; if the vote is not passed, the version number of Group1 is restored to the version number before the self-increment processing (i.e., the version number is restored to 2), and the transmission processing is performed to the management control node of Group1 for the version number of Group1 in the service management network.
For ease of understanding, further referring to fig. 3, fig. 3 is an interactive flowchart for target endpoint registration provided in an embodiment of the present application. As shown in fig. 3, the method at least includes the following steps S301 to S309:
Step S301, target endpoint 3E 1 To the proxy node 3A 1 A registration request is sent.
The specific process of this step may be referred to the specific description of step S101 in the embodiment corresponding to fig. 3, and will not be described herein. Wherein the proxy node 3A 1 Is the target endpoint 3E 1 The connected proxy node, i.e. the target proxy node.
Step S302, agent node 3A 1 To control node 3C 1 A registration request is sent.
The specific process of this step may be referred to the specific description of step S101 in the embodiment corresponding to fig. 3, and will not be described herein. Agent node 3A 1 Sending a registration request to the connected control node, here assumed to be in communication with the proxy node 3A 1 The connected control node is control node 3C 1 I.e. the control node 3C 1 Is the first control node.
Step S303, control node 3C 1 To the master control node 3C 2 And sending the message to inquire the target management control node.
The specific process of this step may be referred to the specific description of step S101 in the embodiment corresponding to fig. 3, and will not be described herein.
Step S304, master control node 3C 2 To control node 3C 1 And returning a query result.
The specific process of this step may be referred to the specific description of step S101 in the embodiment corresponding to fig. 3, and will not be described herein. That is, the control node 3C 1 Slave master control node 3C 2 Acquiring a target management control node, and assuming the target management control node is 3C 3 Step S303 is performed.
Step S305, control node 3C 1 To the target management control node 3C 3 The registration request is forwarded.
The specific process of this step may be referred to the specific description of step S102 in the embodiment corresponding to fig. 3, and will not be described herein.
Step S306, target management control node 3C 3 Registration updates are performed to update relevant information about the target endpoint, such as the endpoint path of the endpoint.
The specific process of this step may be referred to the specific description of step S102 in the embodiment corresponding to fig. 3, and will not be described herein.
Step S307, target management control node 3C 3 To control node 3C 1 And sending a registration success response.
The specific process of this step may be referred to the specific description of step S103 in the embodiment corresponding to fig. 3, and will not be described herein.
Step S308, control node 3C 1 To the proxy node 3A 1 And sending a registration success response.
The specific process of this step may be referred to the specific description of step S103 in the embodiment corresponding to fig. 3, and will not be described herein.
Step S309, agent node 3A 1 Toward target endpoint 3E 1 And sending a registration success response.
The specific process of this step may be referred to the specific description of step S103 in the embodiment corresponding to fig. 3, and will not be described herein.
Furthermore, the target management control node may update the set information of the target endpoint set based on the logout request, and perform deletion processing of endpoints in the endpoint set, and the like. Specifically, a first control node acquires a logout request of a target endpoint, and acquires a target management control node of a target endpoint set to which the target endpoint belongs; the logout request comprises a target endpoint, a target endpoint set to which the target endpoint belongs and a target proxy node to which the target endpoint is connected; the target management control node refers to a control node for managing a target endpoint set. The first control node forwards the logout request to the target management control node so that the target management control node updates the set information of the target endpoint set based on the logout request and sends the set information to the proxy node associated with the target endpoint set; the proxy nodes associated with the set of target endpoints include target proxy nodes. And when the first control node receives a logout success response of the target management control node to the target endpoint, sending the logout success response to the target proxy node. This procedure may refer to the relevant processing procedure of the registration request of the target endpoint, and will not be described here in detail. The target endpoint that initiates the registration request and the target endpoint that initiates the logout request may be the same endpoint or may be different endpoints, i.e., both target endpoints may be any endpoint in the service management network.
In the embodiment of the application, the target management control node is distributed to further reduce the dimension of the data magnitude of the large-scale data processing requirement, so that the stability of the registration process of the target endpoint is associated with the performance of the control node at the target stock, the target management control node updates the set information of the endpoint set by receiving the registration request sent by the first control node, and the registration process of the target endpoint is managed by the special control node, so that the time for registering the target endpoint to the database is reduced compared with the time for registering the plurality of endpoints, and the registration efficiency of the target endpoint is improved. The high-efficiency endpoint registration is beneficial to ensuring the control performance of the service management network, so that the control performance of the service management network can be improved by adopting the method and the device.
Further, referring to fig. 4, fig. 4 is a flow chart of a data processing method according to an embodiment of the present application. As shown in fig. 4, the method may at least include the following steps S201 to S205:
step S201, a first control node receives a communication request sent by a target endpoint; the communication request includes a communication destination object and a communication message.
Specifically, the communication request may refer to a request for the target endpoint to communicate with the communication destination object. A complete communication process may include a target endpoint sending a communication request to a proxy node associated with the target endpoint, the proxy node associated with the target endpoint forwarding the communication request to a first control node, the first control node forwarding the communication request to a proxy node associated with a communication destination object, the proxy node associated with the communication destination object sending the communication request to an endpoint indicated by the communication destination object.
The proxy node (i.e., the target proxy node) associated with the target endpoint may search for the endpoint path of the endpoint indicated by the communication destination object, and if the endpoint path of the endpoint indicated by the communication destination object is found, send the communication request based on the found endpoint path of the endpoint indicated by the communication destination object. Further, if the proxy node connected to the communication destination object and the proxy node connected to the target endpoint are associated with the same control node, the proxy node associated with the target endpoint may directly send the communication request to the proxy node associated with the communication destination object. If the proxy node connected to the communication destination object and the proxy node connected to the target endpoint are respectively associated with different control nodes, the proxy node associated with the target endpoint sends a communication request to the first control node (i.e., the control node connected to the target proxy node), where the communication request further includes an endpoint path of the endpoint indicated by the communication destination object.
Optionally, when the communication destination object is an endpoint, the endpoint indicated by the communication destination object is the communication destination object, and the target proxy node may find an endpoint path corresponding to the communication destination object, and if found, send a communication request to the first control node, where the communication request includes the communication destination object and a communication message, and the communication request may also include the endpoint path of the communication destination object; if not, sending a communication request to the first control node, wherein the communication request comprises a communication destination object and a communication message. When the communication destination object is an endpoint set, the target proxy node may search the set information of the communication destination object, if the set information of the communication destination object is found, determine an endpoint included in the communication destination object from the set information of the communication destination object, obtain an endpoint to be sent from endpoints included in the communication destination object, where the endpoint to be sent may be some or all endpoints in the endpoints included in the communication destination object, for example, may be any one endpoint or any plurality of endpoints in the endpoints included in the communication destination object, where the endpoint indicated by the communication destination object is the endpoint to be sent, obtain an endpoint path of the endpoint to be sent from the set information of the communication destination object, send a communication request to the first control node, where the communication request includes the communication destination object and the communication message, and where the communication request may also include an endpoint path of the endpoint to be sent; if the aggregate information of the communication destination object is not found, the target proxy node sends a communication request to the first control node, wherein the communication request comprises the communication destination object and a communication message.
Further, if the communication request includes an endpoint path of the endpoint indicated by the communication destination object, the first control node may send the communication message to the endpoint indicated by the communication destination object directly based on the endpoint path of the endpoint indicated by the communication destination object; if the communication request does not include the endpoint path of the endpoint indicated by the communication destination object, step S202 is performed.
Step S202, a communication destination object type is acquired.
Specifically, the object type of the communication destination object may be an endpoint type or an endpoint set type. If the object type of the communication destination object is the endpoint type, executing step S203; if the object type of the communication destination object is the endpoint set type, step S204 is executed.
In step S203, if the communication destination is an endpoint, an endpoint path corresponding to the communication destination is acquired, and the communication message is transmitted to the communication destination based on the endpoint path.
Optionally, the first control node may obtain set information of an endpoint set to which the communication destination object belongs, obtain a communication path corresponding to the communication destination object based on the set information of the endpoint set to which the communication destination object belongs, specifically, obtain an endpoint path of the communication destination object from the set information of the endpoint set to which the communication destination object belongs, and determine the endpoint path of the communication destination object as the communication path. Further, the first control node may transmit the communication message to the communication destination object based on the acquired communication path. Specifically, the communication path may include a proxy node and a control node through which the communication destination object is transmitted, that is, the proxy node and the control node associated with the communication destination object. For example, if a communication message is sent to endpoint 121E 1 That is, the communication destination object is the end point 121E 1 The communication path may be "control node 1C 2 Proxy node 1002A 1 Endpoint 121E 1 ". The first control node may send a communication message to the control node 1C via a communication path 2 Control node 1C 2 Sending communication messages to proxy node 1002A based on a communication path 1 Proxy node 1002A 1 Sending communication messages to endpoint 121E based on communication paths 1 (i.e., the communication destination object).
When the first control node obtains the set information of the endpoint set to which the communication destination object belongs, the first control node may search the endpoint set to which the communication destination object belongs from the set information of the endpoint set stored in the first control node. If the endpoint set to which the communication destination object belongs is found, the communication path corresponding to the communication destination object may be obtained based on the set information of the endpoint set to which the communication destination object belongs.
If the endpoint set of the communication destination object is not found, the first control node can find the endpoint set of the communication destination object from the database, and acquire the set information of the endpoint set of the communication destination object; or the first control node may obtain, from the master control node, an endpoint set to which the communication destination object belongs, and obtain set information of the endpoint set to which the communication destination object belongs; or, the first control node may send a communication path acquisition request to other control nodes, where the other control nodes search for set information of endpoint sets managed by each other based on the communication path acquisition request, and further acquire a communication path, and the control node that acquires the communication path sends the communication path to the first control node, so that the first control node acquires the communication path, that is, the first control node receives the communication path sent by the target control node, where the target control node refers to the control node that searches for the endpoint set to which the communication destination object belongs; alternatively, the first control node may acquire the endpoint set to which the communication destination object belongs from the main control node and the database at the same time, and the process of acquiring the communication path of the communication destination object from the other object in which the message is not acquired from the main control node and the database may be stopped when the first control node receives the communication path of the communication destination object, for example, the process of acquiring the communication path of the communication destination object from the main control node may be stopped when the first control node searches the communication path of the communication destination object from the database.
In step S204, if the communication destination object is an endpoint set, endpoints included in the endpoint set are obtained, hash processing is performed on the set information of the communication destination object, and an endpoint to be transmitted is determined from the endpoints included in the communication destination object based on the hash result.
Specifically, the first control node may directly obtain the aggregate information of the communication destination object, and determine the endpoint to be sent based on the endpoint included in the communication destination object. For example, a hash process may be performed on the endpoints included in the endpoint set to obtain the endpoint to be sent; alternatively, the method can also be used for collecting the endpoints in a random selection modeAmong the included endpoints, the endpoint to be transmitted is determined. The number of the endpoints to be sent is one or at least two, and the number of the endpoints to be sent is smaller than or equal to the number of endpoints included in the communication destination object. And acquiring an endpoint path of the endpoint to be sent from the collection information of the communication destination object, determining the endpoint path of the endpoint to be sent as a communication path corresponding to the communication destination object, and sending the communication message to the endpoint to be sent based on the acquired communication path. Specifically, the communication path may include proxy nodes and control nodes through which the endpoint to be sent is sent, that is, proxy nodes and control nodes associated with the endpoint to be sent. For example, if a communication message is sent to endpoint 121E 2 I.e., endpoint to be sent is endpoint 121E 2 The communication path may be "control node 1C 2 Proxy node 1002A 1 Endpoint 121E 2 ". The first control node may send a communication message to the control node 1C via a communication path 2 Control node 1C 2 Sending communication messages to proxy node 1002A based on a communication path 1 Proxy node 1002A 1 Sending communication messages to endpoint 121E based on communication paths 2 (i.e., the endpoint to be sent).
When the first control node obtains the set information of the communication destination object, the first control node may search the communication destination object from the set information of the endpoint set stored in the first control node. If the communication destination object is found, the endpoint to be sent can be determined based on the set information of the communication destination object, and the communication path corresponding to the endpoint to be sent is obtained. If the communication destination object is not found, the first control node can find the communication destination object from the database and acquire the aggregate information of the communication destination object; or the first control node can acquire the communication destination object from the main control node and acquire the collection information of the communication destination object; or the first control node may acquire the management control node of the communication destination object, send an aggregate information acquisition request to the management control node of the communication destination object, and feed back the aggregate information of the communication destination object to the first control node based on the aggregate information acquisition request, so that the first control node acquires the aggregate information of the communication destination object, determine an endpoint to be sent based on the aggregate information of the communication destination object, acquire a communication path corresponding to the endpoint to be sent, and so on.
Step S205, an endpoint path corresponding to the endpoint to be sent is obtained, and the communication message is sent to the endpoint to be sent based on the endpoint path of the endpoint to be sent.
Specifically, the communication path is obtained to send the communication message, after the communication message is successfully sent by the endpoint to be sent, a communication success response can be sent to the first control node, and further, the first control node can send the communication success response to the target endpoint to be processed, so that a complete feedback mechanism is formed, and the updating instantaneity of the service management network is improved.
Further, for example, as shown in FIG. 1, the endpoint 11mE k (identification number 3.1) and endpoint 111E in Group2 by hashing 1 (ID number 2.1) if the communication destination object (i.e. endpoint 111E) 1 ) Associated proxy node 1001A 1 Group2 version number stored in the memory is 3, and the endpoint is 11mE k Associated proxy node 1001A m Group2 version number stored in the memory is 2, then endpoint 11mE k Through proxy node 1001A m The transmitted communication request will be sent by proxy node 1001A 1 Returns and prompts the current proxy node 1001A m The stored Group2 version number is too low and proxy node 1001A m Upon receipt of a response with a version number that is too low, the associated control node 1C may be proactively directed 1 Acquiring the latest version number information of Group2 and controlling node 1C 1 To the management control node 1C 2 Transmitting version number query message, control node 1C 1 Obtaining the management control node 1C 2 Version number reply message of (1C), control node 1C 1 Directing version number reply message to proxy node 1001A m Transmitting proxy node 1001A m Updating Group2 version number based on version number reply message, proxy node 1001A m The hash process may be re-performed. General purpose medicineAnd after version number updating, consistency of hash processing results is ensured under the condition that different endpoints running micro services are not updated timely, and stability of a service management network is enhanced.
Further, if the memory of the first control node does not have the set information associated with the communication destination object, the first control node may store the set information associated with the communication destination object in the first control node. If the set information associated with the communication destination object is stored in the memory of the first control node, the set information of the communication destination object stored in the first control node can be directly acquired when the endpoint in the set information associated with the communication destination object is called for communication next time, the acquisition processing is not required to be carried out again, and the operation efficiency of the service management network is improved; if the acquired aggregate information of the communication destination object is not stored in the memory of the first control node, the acquired aggregate information of the communication destination object is acquired from the management control node each time, so that the accuracy of the acquired aggregate information of the communication destination object is ensured (namely, the acquired aggregate information of the communication destination object is newly changed in the service management network).
Referring to fig. 5, fig. 5 is an interaction flow chart for a target endpoint to communicate with other endpoints according to an embodiment of the present application. As shown in fig. 5, the method at least includes the following steps S501 to S503:
step S501, target endpoint 5E 1 To the proxy node 5A 1 A communication request is sent.
The specific process of this step may be referred to the specific description of step S201 in the embodiment corresponding to fig. 4, and will not be described herein.
Step S502, agent node 5A 1 To control node 5C 1 A communication request is sent.
The specific process of this step may be referred to the specific description of step S201 in the embodiment corresponding to fig. 4, and will not be described herein.
Step S503, acquiring a communication path to the endpoint 5E to be sent 2 Sending a communication request。
The specific process of this step may be referred to the specific description of step S202-step S205 in the embodiment corresponding to fig. 4, and will not be described herein. If the communication destination is an endpoint, the endpoint path of the communication destination is obtained, and at this time, the endpoint 5E is to be transmitted 2 I.e. the communication destination object, based on the endpoint path of the communication destination object to the endpoint 5E to be sent 2 A communication request is sent. If the communication destination object is an endpoint set, acquiring an endpoint to be sent from endpoints included in the communication destination object, determining an endpoint path of the endpoint to be sent as a communication path, wherein the communication path is the endpoint path of the endpoint to be sent in the communication destination object (i.e. the endpoint set), and sending the endpoint to be sent 5E 2 A communication request is sent.
In the embodiment of the application, a multi-copy control plane is provided, a master control node and a plurality of slave control nodes are supported, and on the premise of ensuring high availability, a management control node which only has management authority for the endpoint set is allocated to each endpoint set, so that when the scale of the supported service cluster is gradually increased, and the starting equipment exceeds tens of thousands of service clusters, the service cluster system still maintains excellent performance and stability. The main control node can adjust the mapping relation between the management control node and the endpoint set based on the requirement, thereby ensuring the dynamic allocation of the identity identification number of the endpoint. For example, if there is an abnormality (such as a disconnection, a logout, or a logout) of one control node, the control node may be recorded as an abnormal control node, and the master control node may reassign one management control node to the endpoint set managed by the abnormal control node. And because of the existence of the target management control node, the logic of the endpoint of the stateful service for carrying out business change and voting processing associated with other services is more simplified, not only supporting dynamic telescopic upgrading on the endpoint aiming at the micro-service, but also supporting personalized configuration of the micro-service, and optimizing the performance of the business cluster system. The existence of the target management control node ensures that the service management network can still query path information through the target management control node when the conditions such as database abnormality and the like are sudden, and the stability of the service cluster system function (namely, the stability of the service management network control) is improved.
Further, referring to fig. 6, fig. 6 is a schematic view of a scenario for service management network control according to an embodiment of the present application. Wherein the control plane 61P shown in fig. 6 may include a database 60D, a control node 6C 1 Control node 6C 2 Control node 6C 3 Data plane 62P may include proxy node 6001A 1 Proxy node 6001A 2 Proxy node 6002A 1 Proxy node 6003A 1 Proxy node 6003A 2 In fig. 6, execution paths 601 to 608 are all steps that can be communicated.
If communication is desired between endpoints under the same proxy node (i.e., endpoint 611E) 1 Needs and endpoints 611E 2 Communication is performed), then a communication message may be sent to the proxy node 6001A via the execution path 601 1 Proxy node 6001A 1 And send the communication message to endpoint 611E via execution path 602 2 Implement endpoint 611E 1 And endpoint 611E 2 Communication between them. Optionally, endpoint 611E 1 And endpoint 611E 2 The communication between may be via proxy node 6001A 1 Message transfer is carried out; alternatively, if there is a communication channel between the various endpoints connected under the same proxy node, endpoint 611E 1 Sending communication messages to endpoint 611E based on the communication channel 2
If communication is required between the endpoints of different proxy nodes under the same control node (611E) 1 Needs and endpoint 612E 2 Communication is performed), then a communication message may be sent to the proxy node 6001A via the execution path 601 1 Proxy node 6001A 1 And then sends the communication message to the proxy node 6001A via the execution path 603 2 Proxy node 6001A 2 And send the communication message to endpoint 612E via execution path 604 2 Implement endpoint 611E 1 And endpoint 612E 2 Communication between them.
If the endpoints under different control nodes need to communicate611E (611E) 1 Needs and endpoint 621E 2 Communication is performed), then a communication message may be sent to the proxy node 6001A via the execution path 601 1 Proxy node 6001A 1 And then sends the communication message to control node 6C via execution path 605 1 Control node 6C 1 Communication messages may be sent to control node 6C through execution path 606 2 Control node 6C 2 And then sends the communication message to proxy node 6002A via execution path 606 1 Proxy node 6002A 1 And send the communication message to endpoint 621E via execution path 608 2 Implement endpoint 611E 1 And endpoint 621E 2 Communication between them.
In the embodiment of the application, the endpoints, the proxy nodes and the control nodes are divided into different levels, the overall communication between the endpoints is divided into three types, and different devices are used for controlling the service management network according to the different types of communication between the endpoints. And the main control node is used for distributing the target management control node to the endpoint set, the target management control node is used for managing the endpoint set, and the main control node, the target management control node and other control nodes are matched with each other in high efficiency, so that the high-availability and high-performance basic capability of the service management network in the aspects of service management, routing management, fault recovery and the like is ensured. The limitation that the cluster size is increased and delay is caused is eliminated, and when the supported service cluster size is gradually increased and the starting equipment exceeds tens of thousands of equipment, the service cluster system still maintains excellent performance and stability.
Further, referring to fig. 7, fig. 7 is a schematic structural diagram of a data processing apparatus according to an embodiment of the present application. The data processing means may be a computer program (comprising program code) running in a computer device, for example the data processing means is an application software; the device can be used for executing corresponding steps in the method provided by the embodiment of the application. As shown in fig. 7, the data processing apparatus 1 may include: a request acquisition module 11, a first node acquisition module 12, a request forwarding module 13 and a response sending module 14.
A request acquisition module 11, configured to acquire a registration request of a target endpoint by a first control node;
a first node obtaining module 12, configured to obtain a target management control node of a target endpoint set to which a target endpoint belongs; the registration request comprises a target endpoint, a target endpoint set to which the target endpoint belongs and a target proxy node to which the target endpoint is connected; the target management control node is a control node for managing a target endpoint set;
a request forwarding module 13, configured to forward, by the first control node, a registration request to the target management control node, so that the target management control node updates set information of the target endpoint set based on the registration request, and sends the set information to a proxy node associated with the target endpoint set; the proxy nodes associated with the set of target endpoints include target proxy nodes;
The response sending module 14 is configured to send a registration success response to the target proxy node when the first control node receives the registration success response of the target management control node for the target endpoint.
The specific functional implementation manners of the request acquiring module 11, the first node acquiring module 12, the request forwarding module 13, and the response transmitting module 14 may refer to step S101 to step S103 in the corresponding embodiment of fig. 2, which are not described herein.
Referring again to fig. 7, the first node obtaining module 12 includes:
the target node determining unit 121 is configured to, if the first control node is a master control node, obtain a mapping relationship between the control node and the endpoint set from an operation memory corresponding to the first control node, and determine a target management control node of a target endpoint set to which the target endpoint belongs from the mapping relationship; the main control node is a control node with the management authority to the control node;
the target node obtaining unit 122 is configured to obtain, if the first control node is not the master control node, a target management control node of the target endpoint set from the master control node.
The specific functional implementation manner of the target node determining unit 121 and the target node obtaining unit 122 may refer to step S101 in the corresponding embodiment of fig. 2, which is not described herein.
Referring to fig. 7 again, the target node obtaining unit 122 includes:
a node searching subunit 1221, configured to search the master control node if the first control node is not the master control node;
the node selection subunit 1222 is configured to send a main control node selection request for a control node to be voted to other control nodes, where the other control nodes are control nodes other than the first control node, if the main control node is not found;
the target node determining subunit 1223 is configured to determine the to-be-voted control node as a master control node if the to-be-voted control node passes through the other control nodes, and obtain the target management control node of the target endpoint set from the master control node.
The specific functional implementation manners of the node searching subunit 1221, the node selecting subunit 1222, and the target node determining subunit 1223 may be referred to the step S101 in the corresponding embodiment of fig. 2, and will not be described herein.
Referring again to fig. 7, the data processing apparatus 1 further includes:
the path obtaining module 15 is configured to obtain, if the first control node is a target management control node, an endpoint path of the target endpoint based on the registration request by the first control node;
An information updating module 16, configured to update set information of the target endpoint set based on the endpoint path, send the set information to a proxy node associated with the target endpoint set, and send the set information to other control nodes;
and the process execution module 17 is configured to execute a process of acquiring the target management control node of the target endpoint set to which the target endpoint belongs if the first control node is not the target management control node.
The specific function implementation manner of the path obtaining module 15, the information updating module 16, and the process executing module 17 may refer to step S102 in the corresponding embodiment of fig. 2, and will not be described herein.
Referring again to fig. 7, the data processing apparatus 1 further includes:
the second node obtaining module 18 is configured to obtain N control nodes if the first control node does not find the target management control node, where N is a positive integer; the N control nodes comprise first control nodes;
and the set sending module 19 is configured to send the target endpoint set to the master control node, so that the master control node obtains space utilization information of the N control nodes, and determines a target management control node according to the space utilization information.
The first node obtaining module 12 is specifically configured to obtain a target management control node of a target endpoint set to which a target endpoint sent by the master control node belongs.
The specific functional implementation manner of the second node obtaining module 18 and the aggregate sending module 19 may refer to step S102 in the corresponding embodiment of fig. 2, which is not described herein.
Referring again to fig. 7, the first node obtaining module 12 further includes:
a candidate node determining unit 123, configured to determine, if the first control node does not find the target management control node and the first control node is the master control node, candidate control nodes for the target endpoint set based on the space utilization information corresponding to the N control nodes, and send the candidate control nodes to other control nodes; the other control nodes refer to control nodes except the first control node in the N control nodes; n is a positive integer;
a voting information obtaining unit 124, configured to obtain voting information of other control nodes for the candidate control nodes, and if the voting information is used to instruct voting to pass, determine the candidate control node as a target management control node for the target endpoint set;
The process execution unit 125 is configured to return to executing a process in which the first control node determines candidate control nodes for the target endpoint set based on the space utilization information corresponding to the N control nodes, respectively, and sends the candidate control nodes to other control nodes if the voting information indicates that the voting does not pass.
The specific functional implementation manner of the candidate node determining unit 123, the voting information obtaining unit 124, and the process executing unit 125 may refer to step S101 in the corresponding embodiment of fig. 2, and will not be described herein.
Referring again to fig. 7, the data processing apparatus 1 further includes:
a request receiving module 20, configured to receive, by a first control node, a communication request sent by a target endpoint; the communication request comprises a communication destination object and a communication message;
a type acquisition module 21 for acquiring a communication destination object type;
the object path obtaining module 22 is configured to obtain an endpoint path corresponding to the communication destination object if the communication destination object is an endpoint, and send a communication message to the communication destination object based on the endpoint path;
the endpoint obtaining module 23 is configured to obtain endpoints included in the endpoint set if the communication destination object is the endpoint set, hash the set information of the communication destination object, and determine an endpoint to be sent from the endpoints included in the communication destination object based on the hash result;
The message sending module 24 is configured to obtain an endpoint path corresponding to the endpoint to be sent, and send the communication message to the endpoint to be sent based on the endpoint path of the endpoint to be sent.
The specific function implementation manners of the request receiving module 20, the type obtaining module 21, the object path obtaining module 22, the endpoint obtaining module 23, and the message sending module 24 may refer to step S201 to step S205 in the corresponding embodiment of fig. 4, which are not described herein. In addition, the description of the beneficial effects of the same method is omitted.
Further, referring to fig. 8, fig. 8 is a schematic structural diagram of a computer device according to an embodiment of the present application. As shown in fig. 8, the computer device 1000 may include: at least one processor 1001, such as a CPU, at least one network interface 1004, a user interface 1003, a memory 1005, at least one communication bus 1002. Wherein the communication bus 1002 is used to enable connected communication between these components. The user interface 1003 may include a Display (Display), a Keyboard (Keyboard), and the network interface 1004 may optionally include a standard wired interface, a wireless interface (e.g., WI-FI interface), among others. The memory 1005 may be a high-speed RAM memory or a non-volatile memory (non-volatile memory), such as at least one disk memory. The memory 1005 may also optionally be at least one storage device located remotely from the aforementioned processor 1001. As shown in fig. 8, the memory 1005, which is one type of computer storage medium, may include an operating system, a network communication module, a user interface module, and a device control application.
In the computer device 1000 shown in FIG. 8, the network interface 1004 may provide network communication functions; while user interface 1003 is primarily used as an interface for providing input to a user; and the processor 1001 may be used to invoke a device control application stored in the memory 1005 to implement:
acquiring target text detection data, and performing character picture conversion on the target text detection data to obtain target visual picture information corresponding to the target text detection data; performing visual feature extraction processing on the target visual picture information to obtain target picture hidden features corresponding to the target visual picture information; performing text vectorization processing on the target text detection data to obtain target text features corresponding to the target text detection data, and performing semantic fusion processing on the target text features and the target picture hidden features to obtain quality probability parameters corresponding to the target text detection data; the quality probability parameter is used to characterize the text quality of the target text detection data.
It should be understood that the computer device 1000 described in the embodiments of the present application may perform the description of the data processing method in the embodiments corresponding to fig. 1, fig. 2, fig. 3, fig. 4, fig. 5, fig. 6, and fig. 7, and may also perform the description of the data processing apparatus 1 in the embodiments corresponding to fig. 7, which are not repeated herein. In addition, the description of the beneficial effects of the same method is omitted.
The embodiment of the present application further provides a computer readable storage medium, where a computer program is stored, where the computer program includes program instructions, where the program instructions when executed by a processor implement a data processing method provided by each step in fig. 1, fig. 2, fig. 3, fig. 4, fig. 5, fig. 6, and fig. 7, and specifically refer to an implementation manner provided by each step in fig. 1, fig. 2, fig. 3, fig. 4, fig. 5, fig. 6, and fig. 7, which is not repeated herein. In addition, the description of the beneficial effects of the same method is omitted.
The computer readable storage medium may be the data processing apparatus provided in any one of the foregoing embodiments or an internal storage unit of the computer device, for example, a hard disk or a memory of the computer device. The computer readable storage medium may also be an external storage device of the computer device, such as a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) card, a flash card (flash card) or the like, which are provided on the computer device. Further, the computer-readable storage medium may also include both internal storage units and external storage devices of the computer device. The computer-readable storage medium is used to store the computer program and other programs and data required by the computer device. The computer-readable storage medium may also be used to temporarily store data that has been output or is to be output.
Embodiments of the present application also provide a computer program product or computer program comprising computer instructions stored in a computer-readable storage medium. The processor of the computer device reads the computer instructions from the computer readable storage medium, and the processor executes the computer instructions, so that the computer device can execute the data processing method in the embodiments corresponding to fig. 1, fig. 2, fig. 3, fig. 4, fig. 5, fig. 6, and fig. 7, which are not described herein. In addition, the description of the beneficial effects of the same method is omitted.
The term "comprising" and any variations thereof in the description of the embodiments of the present application and in the claims and drawings is intended to cover a non-exclusive inclusion. For example, a process, method, apparatus, article, or device that comprises a list of steps or elements is not limited to the list of steps or modules but may, in the alternative, include other steps or modules not listed or inherent to such process, method, apparatus, article, or device.
Those of ordinary skill in the art will appreciate that the elements and algorithm steps described in connection with the embodiments disclosed herein may be embodied in electronic hardware, in computer software, or in a combination of the two, and that the elements and steps of the examples have been generally described in terms of function in the foregoing description to clearly illustrate the interchangeability of hardware and software. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
The methods and related devices provided in the embodiments of the present application are described with reference to the method flowcharts and/or structure diagrams provided in the embodiments of the present application, and each flowchart and/or block of the method flowcharts and/or structure diagrams may be implemented by computer program instructions, and combinations of flowcharts and/or blocks in the flowchart and/or block diagrams. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks. These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or structural diagram block or blocks. These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or structures.
The foregoing disclosure is only illustrative of the preferred embodiments of the present application and is not intended to limit the scope of the claims herein, as the equivalent of the claims herein shall be construed to fall within the scope of the claims herein.

Claims (11)

1. A method of data processing, comprising:
the method comprises the steps that a first control node obtains a registration request of a target endpoint and obtains a target management control node of a target endpoint set to which the target endpoint belongs; the registration request comprises the target endpoint, a target endpoint set to which the target endpoint belongs and a target proxy node to which the target endpoint is connected; the target management control node is a control node for managing the target endpoint set;
the first control node forwards the registration request to the target management control node, so that the target management control node updates the set information of the target endpoint set based on the registration request and sends the set information to a proxy node associated with the target endpoint set; the proxy nodes associated with the target endpoint set include the target proxy nodes;
and when the first control node receives a registration success response of the target management control node for the target endpoint, the registration success response is sent to the target proxy node.
2. The method according to claim 1, wherein the obtaining the target management control node of the target endpoint set to which the target endpoint belongs comprises:
if the first control node is a main control node, the first control node obtains a mapping relation between the control node and the endpoint set from an operation memory corresponding to the first control node, and determines a target management control node of a target endpoint set to which the target endpoint belongs from the mapping relation; the main control node is a control node with management authority to the control node;
and if the first control node is not the main control node, acquiring a target management control node of the target endpoint set from the main control node.
3. The method of claim 2, wherein if the first control node is not the master control node, obtaining the target management control node of the target endpoint set from the master control node comprises:
if the first control node is not the main control node, searching the main control node;
if the master control node is not found, a master control node selection request for the to-be-voted control node is sent to other control nodes, wherein the other control nodes refer to control nodes except the first control node;
And if the other control nodes vote on the control node to be voted, determining the control node to be voted as a main control node, and acquiring a target management control node of the target endpoint set from the main control node.
4. The method according to claim 1, wherein the method further comprises:
if the first control node is a target management control node, the first control node acquires an endpoint path of the target endpoint based on the registration request;
updating set information of the target endpoint set based on the endpoint path, sending the set information to a proxy node associated with the target endpoint set, and sending a registration success response to the target proxy node;
and if the first control node is not the target management control node, executing the process of acquiring the target management control node of the target endpoint set to which the target endpoint belongs.
5. The method according to claim 1, wherein the method further comprises:
if the first control node does not find the target management control node, N control nodes are obtained, wherein N is a positive integer; the N control nodes comprise the first control node;
The target endpoint set is sent to a main control node, so that the main control node obtains space utilization information of the N control nodes, and a target management control node is determined according to the space utilization information;
the target management control node for obtaining the target endpoint set to which the target endpoint belongs includes:
and acquiring a target management control node of a target endpoint set to which the target endpoint belongs, which is sent by the master control node.
6. The method according to claim 1, wherein the obtaining the target management control node of the target endpoint set to which the target endpoint belongs comprises:
if the first control node does not find the target management control node and the first control node is a main control node, the first control node determines candidate control nodes aiming at the target endpoint set based on space utilization information corresponding to N control nodes respectively and sends the candidate control nodes to other control nodes; the other control nodes refer to control nodes except the first control node in the N control nodes; n is a positive integer;
acquiring voting information of the other control nodes for the candidate control nodes, and if the voting information is used for indicating voting to pass, determining the candidate control nodes as target management control nodes for the target endpoint set;
And if the voting information is used for indicating that the voting does not pass, returning to the process of executing the candidate control nodes aiming at the target endpoint set and sending the candidate control nodes to other control nodes by the first control node based on the space utilization information corresponding to the N control nodes respectively.
7. The method as recited in claim 1, further comprising:
the first control node receives a communication request sent by the target endpoint; the communication request comprises a communication destination object and a communication message;
acquiring the type of the communication destination object;
if the communication destination object is an endpoint, acquiring an endpoint path corresponding to the communication destination object, and sending the communication message to the communication destination object based on the endpoint path;
if the communication destination object is an endpoint set, acquiring endpoints included in the endpoint set, carrying out hash processing on set information of the communication destination object, and determining an endpoint to be sent from the endpoints included in the communication destination object based on a hash result;
and acquiring an endpoint path corresponding to the endpoint to be sent, and sending the communication message to the endpoint to be sent based on the endpoint path of the endpoint to be sent.
8. A data processing apparatus, comprising:
the request acquisition module is used for acquiring a registration request of a target endpoint by the first control node;
the first node acquisition module is used for acquiring a target management control node of a target endpoint set to which the target endpoint belongs; the registration request comprises the target endpoint, a target endpoint set to which the target endpoint belongs and a target proxy node to which the target endpoint is connected; the target management control node is a control node for managing the target endpoint set;
a request forwarding module, configured to forward, by the first control node, the registration request to the target management control node, so that the target management control node updates set information of the target endpoint set based on the registration request, and sends the set information to a proxy node associated with the target endpoint set; the proxy nodes associated with the target endpoint set include the target proxy nodes;
and the response sending module is used for sending the registration success response to the target proxy node when the first control node receives the registration success response of the target management control node to the target endpoint.
9. A computer device, comprising: a processor, a memory, and a network interface;
the processor is connected to the memory and the network interface, wherein the network interface is configured to provide a data communication function, the memory is configured to store a computer program, and the processor is configured to invoke the computer program to cause the computer device to perform the method of any of claims 1 to 7.
10. A computer readable storage medium, characterized in that the computer readable storage medium has stored therein a computer program adapted to be loaded and executed by a processor to cause a computer device having the processor to perform the method of any of claims 1 to 7.
11. A computer program product, characterized in that the computer program product comprises a computer program stored in a computer readable storage medium, the computer program being adapted to be read and executed by a processor such that a computer device with the processor is provided with the method according to any one of claims 1 to 7.
CN202210848651.0A 2022-07-19 2022-07-19 Data processing method, device, equipment, storage medium and program product Pending CN117459360A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210848651.0A CN117459360A (en) 2022-07-19 2022-07-19 Data processing method, device, equipment, storage medium and program product

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210848651.0A CN117459360A (en) 2022-07-19 2022-07-19 Data processing method, device, equipment, storage medium and program product

Publications (1)

Publication Number Publication Date
CN117459360A true CN117459360A (en) 2024-01-26

Family

ID=89580482

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210848651.0A Pending CN117459360A (en) 2022-07-19 2022-07-19 Data processing method, device, equipment, storage medium and program product

Country Status (1)

Country Link
CN (1) CN117459360A (en)

Similar Documents

Publication Publication Date Title
US8764567B2 (en) System and method for implementing turn-based online games
JP5741150B2 (en) Relay device, relay program, and relay method
CN111801925B (en) Block chain based system and method for propagating data in a network
CN108881354B (en) Push information storage method and device, server and computer storage medium
CN101163117B (en) Packet management method, packet resource sharing method and instant communication equipment
US9792311B2 (en) System and method for managing a partitioned database of user relationship data
CN109379448B (en) File distributed deployment method and device, electronic equipment and storage medium
JP2001282756A (en) Mobile agent control method
US20120310956A1 (en) System and method for processing graphs of user relationships in an online service
CN111338806B (en) Service control method and device
US20160277289A1 (en) Federation of controllers management using packet context
CN112698838B (en) Multi-cloud container deployment system and container deployment method thereof
CN112121413A (en) Response method, system, device, terminal and medium of function service
WO2017128713A1 (en) Method and device for publishing subscription message
JP2012118709A (en) Distribution system, storage capacity decision program, and storage capacity decision method
CN103259866A (en) DNS zone file multi-node transmission method and system
CN114338063A (en) Message queue system, service processing method, and computer-readable storage medium
CN111935242A (en) Data transmission method, device, server and storage medium
CN109120556B (en) A kind of method and system of cloud host access object storage server
WO2017067374A1 (en) Message push method and push server
CN112351106B (en) Service grid platform containing event grid and communication method thereof
CN103166860A (en) Method and device for peer-to-peer (P2P) overlay network data migration
CN106209680A (en) Information processor and method
WO2017032110A1 (en) Application message processing system and method, and application device
CN107370805B (en) Service processing method and device and service processing system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination