WO2021012974A1 - 基于云平台的容器化应用网络流控方法、装置、设备及存储介质 - Google Patents

基于云平台的容器化应用网络流控方法、装置、设备及存储介质 Download PDF

Info

Publication number
WO2021012974A1
WO2021012974A1 PCT/CN2020/101557 CN2020101557W WO2021012974A1 WO 2021012974 A1 WO2021012974 A1 WO 2021012974A1 CN 2020101557 W CN2020101557 W CN 2020101557W WO 2021012974 A1 WO2021012974 A1 WO 2021012974A1
Authority
WO
WIPO (PCT)
Prior art keywords
flow control
network flow
application
access
configuration corresponding
Prior art date
Application number
PCT/CN2020/101557
Other languages
English (en)
French (fr)
Inventor
吴兵
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Publication of WO2021012974A1 publication Critical patent/WO2021012974A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/40Bus networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic control in data switching networks
    • H04L47/10Flow control; Congestion control
    • H04L47/24Traffic characterised by specific attributes, e.g. priority or QoS
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/108Network architectures or network communication protocols for network security for controlling access to devices or network resources when the policy decisions are valid for a limited amount of time

Definitions

  • This application relates to a containerized application network flow control method, device, equipment and storage medium based on a cloud platform.
  • This application provides a containerized application network flow control method, device, equipment, and storage medium based on a cloud platform to improve network resource utilization.
  • At least one embodiment of the present invention provides a containerized application network flow control method based on a cloud platform, including:
  • Network flow control parameters include multiple time periods and a network flow control configuration corresponding to each time period
  • An embodiment of the present invention provides a containerized application network flow control device based on a cloud platform, including:
  • the parameter obtaining unit is configured to obtain network flow control parameters, where the network flow control parameters include multiple time periods and the network flow control configuration corresponding to each time period;
  • the access control unit is configured to receive an access request to an application, determine the network flow control configuration corresponding to the application in the current period according to the network flow control parameter; perform access control according to the network flow control configuration corresponding to the application in the current period .
  • An embodiment of the present invention provides a containerized application network flow control device based on a cloud platform, including a memory and a processor, the memory stores a program, and when the program is read and executed by the processor, any The cloud platform-based containerized application network flow control method described in the embodiment.
  • An embodiment of the present invention provides a computer-readable storage medium, the computer-readable storage medium stores one or more programs, and the one or more programs can be executed by one or more processors to realize any The cloud platform-based containerized application network flow control method described in the embodiment.
  • FIG. 1 is a schematic diagram of the position of a network traffic control center (The Center Of Network Traffic Control, TCONTC) in a container cloud platform structure provided by an embodiment of the present invention
  • TCONTC The Center Of Network Traffic Control
  • FIG. 2 is a flowchart of a method for network flow control based on a cloud platform according to an embodiment of the present invention
  • FIG. 3 is a flowchart of another method for network flow control based on a cloud platform according to an embodiment of the present invention
  • FIG. 4 is a flowchart of a TCONTC flow control method according to an embodiment of the present invention.
  • FIG. 5 is a schematic diagram of the overall flow of a network flow control method according to an embodiment of the present invention.
  • FIG. 6 is a schematic diagram of an implementation of a network flow control method provided by an embodiment of the present invention.
  • FIG. 7 is a schematic diagram of an implementation of another network flow control method provided by an embodiment of the present invention.
  • FIG. 8 is a schematic diagram of the implementation of another network flow control method according to an embodiment of the present invention.
  • FIG. 9 is a block diagram of a network flow control device provided by an embodiment of the present invention.
  • FIG. 10 is a block diagram of a computer-readable storage medium according to an embodiment of the present invention.
  • FIG. 11 is a block diagram of a network flow control device provided by an embodiment of the present invention.
  • FIG. 1 is a schematic diagram of the position of a TCONTC in a container cloud platform structure provided by an embodiment of the present invention.
  • the container cloud platform architecture includes three parts: infrastructure 11, container cloud platform 12, and container application 13.
  • the basic equipment 11 includes a physical machine/virtual machine/Infrastructure as a Service (IAAS) 111
  • the container cloud platform 12 includes a container engine (such as docker) 121, an application orchestration (Kubernetes) 122, and a data volume management module 123.
  • the network management module 1210 is configured to perform unified management of the network resources of the cloud platform; including functions such as current limiting and current access flow acquisition.
  • the service registration center module 126 is configured to perform unified management of service information provided by container applications on the cloud platform.
  • the application management module 1211 is configured to manage the life cycle of container applications.
  • the container cloud platform 12 also includes a network traffic control center (The Center Of Network Traffic Control, TCONTC) 1212, which is set in the application management module 1211.
  • the TCONTC 1212 is configured to implement network flow control of container applications.
  • TCONTC1212 supports regular detection of traffic. Through interface operations, it can periodically detect the traffic currently accessed by each container application. The traffic currently accessed by each container application can be obtained from the network management module 1210.
  • TCONTC 1212 may also be set in the network management module 1210.
  • an embodiment of the present invention provides a containerized application network flow control method based on a cloud platform, including:
  • Step 201 Obtain network flow control parameters, where the network flow control parameters include a time period and its corresponding network flow control configuration.
  • Step 202 Receive an access request for an application, and perform access control according to the network flow control configuration corresponding to the application in the current period.
  • the application is a container application.
  • the solution provided by this embodiment enriches the current limiting function of the container network, achieves time-based access control in the cloud platform, saves labor costs, and improves network resource utilization.
  • the time period and its corresponding network flow control configuration include: a first time period and its corresponding network flow control configuration, and a second time period and its corresponding network flow control configuration.
  • the first period is, for example, a period when the business is relatively busy, which may also be called a busy period
  • the second period is, for example, a period when the business is not busy, and may also be called a normal period.
  • the time period is only divided into two, the first time period and the second time period. In other embodiments, it can also be divided into more time periods.
  • the values of the first time period and the second time period can be determined according to the number of access requests applied during system operation.
  • the network flow control configuration includes at least one of a flow threshold and access priority information. For example, set a flow threshold for the first period and another threshold for the second period. When the first period is a busy period, set a larger threshold, and when the second period is a normal period, set a smaller threshold. Traffic threshold.
  • the access priority information can be two priorities, high priority and low priority, or more priority.
  • the performing access control according to the network flow control configuration corresponding to the application in the current period includes:
  • access control is performed according to the access priority information in the network flow control configuration corresponding to the current time period; when the application traffic is not When the traffic threshold in the network flow control configuration corresponding to the application in the current period is exceeded, the access request is sent to the container application.
  • the performing access control according to the access priority information in the network flow control configuration corresponding to the current period includes:
  • the first preset condition is, for example, that the priority of the current access request is high priority
  • the second preset condition is, for example, that the priority of the current access request is low priority. This is only an example, and the first preset condition and the second preset condition can be set as needed.
  • the acquiring network flow control parameters includes: acquiring the network flow control parameters through a predefined system deployment definition descriptor (System Deploy Define Description, SDDD) entity.
  • SDDD System Deploy Define Description
  • the SDDD entity is implemented using at least one of the following: a database, a file, and a Representational State Transfer (REST) interface.
  • a database e.g., a database
  • a file e.g., a file
  • REST Representational State Transfer
  • the file is, for example, a yaml file.
  • the yaml file is as follows:
  • the busy period of service 1 (service1) is 9:00-10:00, other periods are normal periods, the threshold of busy periods is 50M, and the priority is 1, the threshold of normal periods is 10M, and the priority is 1.
  • (Business 2service2) busy period is 9:30-10:00, other periods are normal periods, the threshold for busy periods is 50M, priority is 1, the threshold for normal periods is 10M, priority is 2
  • business 3 ( The busy period of service3) is 9:00-10:00, other periods are normal periods, the threshold of the busy period is 50M, the priority is 1, the threshold of the normal period is 10M, and the priority is 3.
  • an embodiment of the present invention provides a method for network flow control of containerized applications based on a cloud platform, which includes the following steps:
  • Step 301 Define SDDD entities.
  • SDDD entities such as databases, files, and REST interface methods.
  • SDDD entities include network flow control parameters, including time periods and corresponding network flow control configurations (access priority, access threshold, etc.).
  • the SDDD entity can be defined by the user or pre-configured in the system.
  • Step 302 Receive the user's request for access to the application, and read the application information, including: reading the network flow control parameters of the SDDD entity, and loading them into TCONTC for subsequent use.
  • Step 303 Start the network flow control process.
  • Step 304 Receive an access response from the application to the access request, and send it to the user.
  • the application is a container application.
  • the time period is divided into busy time period and normal time period, and the priority is divided into high priority and non-high priority.
  • the network flow control process includes:
  • Step 401 Read SDDD information.
  • step 402 it is detected whether the current time is a busy time period of the application, if the current time is a busy time period, step 404 is executed, and if the current time is not a busy time period, step 403 is executed.
  • Step 403 Load the network flow control configuration in the normal period, and execute step 405.
  • Step 404 load the network flow control configuration during the busy time period, and execute step 405.
  • Step 405 Detect whether the current flow of the application exceeds the preset threshold; if the current flow does not exceed the preset threshold, go to step 408; if the current flow exceeds the preset threshold, go to step 406.
  • step 406 it is judged whether the current visit is of high priority, if the current visit is of high priority, step 408 is executed, and if the current visit is not of high priority, step 407 is executed.
  • the judging whether the current access is of high priority refers to judging whether the application accessed by the current access request is of high priority.
  • Step 407 Put the access request into the access queue, and go to step 409; the access requests in the access queue are sent to the application in turn.
  • Step 408 Access the application directly, that is, send an access request to the application.
  • Step 409 Receive the access response returned by the application.
  • Figure 5 is a schematic diagram of the overall flow of a network flow control method provided by an embodiment of the present invention.
  • the application has been deployed normally and can be accessed normally. As shown in Figure 5, it includes:
  • Step 501 The container cloud platform receives the SDDD entity configured by the user and the application access request sent by the user.
  • Step 502 TCONTC loads the SDDD entity to obtain network flow control parameters.
  • Step 503 TCONTC obtains the network information and registration information of the application from the service registration center.
  • Step 504 TCONTC obtains the current access traffic of the application, and performs access control according to the network flow control parameters and the current access traffic.
  • the control process please refer to FIG. 4, which will not be repeated here.
  • Step 505 Send the access request to the container application.
  • Step 506 Receive the access response returned by the container application.
  • Step 507 Send the access response to the user.
  • the yaml file is taken as the SDDD entity. As shown in Figure 6, including:
  • Step 601 Receive the SDDD entity yaml file uploaded by the user, where the SDDD entity yaml file is generated according to the actual network traffic requirements of the application, and receives the user's access request to the application through the browser or interface.
  • the yaml file is just an example and can be other types of files.
  • Step 602 TCONTC is started, and the network flow control parameters are obtained by loading the SDDD entity yaml file.
  • Step 603 According to the service name of the application to be accessed, TCONTC obtains the network information and registration information of the application from the service registration center.
  • Step 604 TCONTC activates the function of obtaining application access traffic regularly, obtains the access traffic of the application, and saves it in the database to provide data support for network traffic control.
  • TCONTC calls the interface of the network management module to achieve current traffic acquisition and access control, and performs the following operations:
  • a Determine whether the current time is the busy time period of the application. If the current time is a busy time period, load the network flow control configuration of the busy time period; if the current time is not a busy time period, load the network flow control configuration of the normal time period.
  • step b Start threshold judgment. Compare the current flow of the application with the preset threshold. If the current flow of the application does not exceed the preset threshold, the application is directly accessed. If the current flow of the application exceeds the preset threshold, the network flow priority control process is started, and step c is executed.
  • TCONTC judges whether the current access is of high priority according to the network flow control configuration. If the current access is of high priority, it will directly access the application. If the current access is not of high priority, it will put the access request into the access queue and access the application in turn .
  • Step 605 The access request reaches the container application.
  • Step 606 The container application generates an access response according to the access request, and sends the access response to the container cloud platform.
  • step 607 the container cloud platform feeds back the access response to the browser or interface of the user, completing the access process.
  • the database table is the SDDD entity. As shown in Figure 7, it includes:
  • Step 701 Receive the SDDD entity database entity table configured by the user according to the actual network traffic requirements of the application, and receive the user's access request to the application through the browser or interface.
  • Step 702 TCONTC is started, and network flow control parameters are obtained by reading the database entity table.
  • Step 703 According to the service name of the application, TCONTC obtains the network information and registration information of the application from the service registration center.
  • Step 704 Start the function of regularly obtaining application access traffic and save it in the database to provide data support for network traffic control.
  • TCONTC calls the interface of the network management module to achieve current traffic acquisition and access control, and performs the following operations:
  • a Determine whether the current time is the busy time period of the application. If the current time is a busy time period, load the network flow control configuration of the busy time period; if the current time is not a busy time period, load the network flow control configuration of the normal time period.
  • step b Start threshold judgment. Compare the current flow of the application with the preset threshold. If the current flow of the application does not exceed the preset threshold, the application is directly accessed. If the current flow of the application exceeds the preset threshold, the network flow priority control process is started, and step c is executed.
  • TCONTC judges whether the current access is of high priority according to the network flow control configuration. If the current access is of high priority, it will directly access the application. If the current access is not of high priority, it will put the access request into the access queue and access the application in turn .
  • Step 705 The access request arrives at the container application.
  • Step 706 The container application generates an access response according to the access request, and sends the access response to the container cloud platform.
  • Step 707 The container cloud platform feeds back the access response to the browser or interface of the user, completing the access process.
  • the REST interface is taken as the SDDD entity, as shown in Figure 8, including:
  • step 801 the user generates a REST interface according to the actual network traffic requirements of the application, receives the SDDD entity-REST interface uniform resource locator (URL) configured by the user, and receives the user's access request to the application through a browser or interface .
  • URL uniform resource locator
  • Step 802 TCONTC is started, and network flow control parameters are obtained through the REST interface.
  • Step 803 According to the service name of the application, TCONTC obtains the network information and registration information of the application from the service registration center.
  • Step 804 Start the function of regularly acquiring application access traffic, and save it in the database to provide data support for network flow priority control.
  • TCONTC calls the interface of the network management module to achieve current traffic acquisition and access control, and performs the following operations:
  • a Determine whether the current time is the busy time period of the application. If the current time is a busy time period, load the network flow control configuration of the busy time period; if the current time is not a busy time period, load the network flow control configuration of the normal time period.
  • step b Start threshold judgment. Compare the current flow of the application with the preset threshold. If the current flow of the application does not exceed the preset threshold, the application is directly accessed. If the current flow of the application exceeds the preset threshold, the network flow priority control process is started, and step c is executed.
  • TCONTC judges whether the current access is of high priority according to the network flow control configuration. If the current access is of high priority, it will directly access the application. If the current access is not of high priority, it will put the access request into the access queue and access the application in turn .
  • Step 805 The access request reaches the container application.
  • Step 806 The container application generates an access response according to the access request, and sends the access response to the container cloud platform.
  • step 807 the container cloud platform feeds back the access response to the browser or interface of the user, completing the access process.
  • an embodiment of the present invention provides a containerized application network flow control device 90 based on a cloud platform, which includes a memory 910 and a processor 920.
  • the memory 910 stores a program, and the program is When reading and executing, the processor 920 implements the containerized application network flow control method based on the cloud platform described in any embodiment.
  • an embodiment of the present invention provides a computer-readable storage medium 100.
  • the computer-readable storage medium stores one or more programs 1010, and the one or more programs 1010 can be stored by one or more programs. Executed by each processor to implement the containerized application network flow control method based on the cloud platform described in any embodiment.
  • an embodiment of the present invention provides a containerized application network flow control device based on a cloud platform, including:
  • the parameter obtaining unit 1110 is configured to obtain network flow control parameters, where the network flow control parameters include a time period and its corresponding network flow control configuration.
  • the access control unit 1120 is configured to receive an access request for an application, and perform access control according to the network flow control configuration corresponding to the application in the current period.
  • the functional modules/units in the system, and the device can be implemented as software, firmware, hardware, and appropriate combinations thereof.
  • the division between functional modules/units mentioned in the above description does not necessarily correspond to the division of physical components; for example, a physical component may have multiple functions, or a function or step may consist of multiple The physical components cooperate to execute.
  • Some or all components may be implemented as software executed by a processor, such as a digital signal processor or a microprocessor, or as hardware, or as an integrated circuit, such as an application specific integrated circuit.
  • Such software may be distributed on a computer-readable medium, and the computer-readable medium may include a computer storage medium (or non-transitory medium) and a communication medium (or transitory medium).
  • Computer storage medium includes volatile and non-volatile, removable and non-removable implemented in any method or technology for storing information (such as computer-readable instructions, data structures, program modules, or other data) medium.
  • Computer storage media include but are not limited to Random Access Memory (RAM), Read-Only Memory (ROM), Electrically Erasable Programmable Read-Only Memory, EEPROM) , Flash memory or other memory technology, compact disc read-only memory (CD-ROM), digital versatile disc (Digital Video Disc, DVD) or other optical disc storage, magnetic cassettes, tapes, magnetic disk storage or other magnetic
  • RAM Random Access Memory
  • ROM Read-Only Memory
  • EEPROM Electrically Erasable Programmable Read-Only Memory
  • Flash memory or other memory technology
  • compact disc read-only memory CD-ROM
  • digital versatile disc Digital Video Disc, DVD
  • magnetic cassettes tapes
  • magnetic disk storage magnetic disk storage or other magnetic
  • communication media usually

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Telephonic Communication Services (AREA)

Abstract

本文公开了一种基于云平台的容器化应用网络流控方法、装置、设备及存储介质。该基于云平台的容器化应用网络流控方法包括:获取网络流控参数,所述网络流控参数中包括多个时段及每个时段对应的网络流控配置;接收对应用的访问请求,根据所述网络流控参数确定所述应用在当前时段对应的网络流控配置;根据所述应用在当前时段对应的网络流控配置进行访问控制。

Description

基于云平台的容器化应用网络流控方法、装置、设备及存储介质
本申请要求在2019年07月23日提交中国专利局、申请号为201910667771.9的中国专利申请的优先权,该申请的全部内容通过引用结合在本申请中。
技术领域
本申请涉及一种基于云平台的容器化应用网络流控方法、装置、设备及存储介质。
背景技术
在银行证券金融单位、政府单位、大型企事业单位、园区及高校等行业基本上都有自身的虚拟化技术。这种虚拟化技术在一定的程度上降低了运维复杂性,提升了资源的使用率,但上述虚拟化技术存在应用系统复杂、安装部署繁琐、开发更新频繁等问题。随着容器技术的不断发展和完善,容器云的价值也逐渐发掘出来,可以从本质上更好的解决上述的问题。
不管是要搭建公有云的容器云平台还是为企业提供容器云平台的私有部署或解决方案,都会面临一个问题:容器网络限流的问题。针对这个问题,Kubernetes提供了多种解决方案。但是在一些特定的场景中,这些方案中并没使网络资源利用率达到最佳。
发明内容
本申请提供了一种基于云平台的容器化应用网络流控方法、装置、设备及存储介质,提高网络资源利用率。
本发明至少一实施例提供一种基于云平台的容器化应用网络流控方法,包括:
获取网络流控参数,所述网络流控参数中包括多个时段及每个时段对应的网络流控配置;
接收对应用的访问请求,根据所述网络流控参数确定所述应用在当前时段对应的网络流控配置;
根据所述应用在当前时段对应的网络流控配置进行访问控制。
本发明一实施例提供一种基于云平台的容器化应用网络流控装置,包括:
参数获取单元,设置为获取网络流控参数,所述网络流控参数中包括多个 时段及每个时段对应的网络流控配置;
访问控制单元,设置为接收对应用的访问请求,根据所述网络流控参数确定所述应用在当前时段对应的网络流控配置;根据所述应用在当前时段对应的网络流控配置进行访问控制。
本发明一实施例提供一种基于云平台的容器化应用网络流控设备,包括存储器和处理器,所述存储器存储有程序,所述程序在被所述处理器读取执行时,实现任一实施例所述的基于云平台的容器化应用网络流控方法。
本发明一实施例提供一种计算机可读存储介质,所述计算机可读存储介质存储有一个或者多个程序,所述一个或者多个程序可被一个或者多个处理器执行,以实现任一实施例所述的基于云平台的容器化应用网络流控方法。
附图说明
图1为本发明一实施例提供的一种网流控制中心(The Center Of Network Traffic Control,TCONTC)在容器云平台结构中的位置示意图;
图2为本发明一实施例提供的一种基于云平台的网络流控方法流程图;
图3为本发明一实施例提供的另一种基于云平台的网络流控方法流程图;
图4为本发明一实施例提供的一种TCONTC流控方法的流程图;
图5为本发明一实施例提供的一种网络流控方法的整体流程示意图;
图6为本发明一实施例提供的一种网络流控方法的实施示意图;
图7为本发明一实施例提供的另一种网络流控方法的实施示意图;
图8为本发明一实施例提供的另一种网络流控方法的实施示意图;
图9为本发明一实施例提供的一种网络流控设备框图;
图10为本发明一实施例提供的一种计算机可读存储介质框图;
图11为本发明一实施例提供的一种网络流控装置框图。
具体实施方式
下文中将结合附图对本发明实施例进行说明。
在附图的流程图示出的步骤可以在诸如一组计算机可执行指令的计算机系统中执行。并且,虽然在流程图中示出了逻辑顺序,但是在一些情况下,可以以不同于此处的顺序执行所示出或描述的步骤。
在一种场景中,应用的访问量在一时间段暴增而在其他时间访问量非常少, 常用的固定限流并不适用于此种情况。所以,针对这种情况,需要提供一种解决方法来进行兼容。
图1为本发明一实施例提供的一种TCONTC在容器云平台结构中的位置示意图。如图1所示,容器云平台架构包括三部分:基础设施11、容器云平台12和容器应用13。其中,基础设备11包括物理机/虚机/基础设施即服务(Infrastructure as a Service,IAAS)111,容器云平台12包括容器引擎(比如docker)121,应用编排(Kubernetes)122,数据卷管理模块123、资源监控管理模块124、持续集成模块125、服务注册中心模块126、服务管理模块127、日志管理模块128、镜像管理模块129、网络管理模块1210、应用管理模块1211;容器应用13包括多个容器131。其中,
网络管理模块1210设置为,对云平台的网络资源进行统一管理;包括限流、当前访问流量获取等功能。
服务注册中心模块126设置为,对云平台上容器应用提供的服务信息进行统一管理。
应用管理模块1211设置为,对容器应用的生命周期管理。
所述容器云平台12还包括网流控制中心(The Center Of Network Traffic Control,TCONTC)1212,设置在应用管理模块1211中。所述TCONTC1212设置为实现容器应用的网络流控。TCONTC1212支持定时检测流量,通过界面操作,能够定时的检测每个容器应用当前访问的流量。可以从网络管理模块1210获取每个容器应用当前访问的流量。
在其他实施例中,TCONTC1212也可以设置在网络管理模块1210。
如图2所示,本发明一实施例提供一种基于云平台的容器化应用网络流控方法,包括:
步骤201,获取网络流控参数,所述网络流控参数中包括时段及其对应的网络流控配置。
步骤202,接收对应用的访问请求,根据该应用在当前时段对应的网络流控配置进行访问控制。
本实施例中,应用为容器应用。
采用本实施例提供的方案,与相关技术相比,丰富了容器网络限流的功能,达到了在云平台中分时段进行访问控制,节省了人力成本,提高了网络资源利用率。
在一实施例中,所述时段及其对应的网络流控配置包括:第一时段及其对 应的网络流控配置,第二时段及其对应的网络流控配置。第一时段比如为业务比较繁忙的时段,也可以称为繁忙时段,第二时段比如为业务不繁忙的时段,也可以称为正常时段。此处将时段仅划分为2个,第一时段和第二时段,在其他实施例中,也可以划分为更多时段。第一时段和第二时段的数值可以根据系统运营时应用的访问请求的数量来决定。
在一实施例中,所述网络流控配置包括流量阈值、访问优先级信息中的至少之一。比如,为第一时段设置一流量阈值,为第二时段设置另一流量阈值,当第一时段为繁忙时段时,设置一个较大的阈值,当第二时段为正常时段时,设置一个较小的流量阈值。访问优先级信息可以是高优先级、低优先级两个优先级,也可以是更多优先级。
在一实施例中,所述根据该应用在当前时段对应的网络流控配置进行访问控制包括:
当所述应用的流量超过该应用在当前时段对应的网络流控配置中的流量阈值时,根据当前时段对应的网络流控配置中的访问优先级信息进行访问控制;当所述应用的流量未超过该应用在当前时段对应的网络流控配置中的流量阈值时,将所述访问请求发送给所述容器应用。
即未超过流量阈值时,直接进行访问,超过流量阈值时,根据优先级进行后续处理。
在一实施例中,所述根据当前时段对应的网络流控配置中的访问优先级信息进行访问控制包括:
根据当前时段对应的网络流控配置中的访问优先级信息确定所述访问请求的优先级;当所述访问请求的优先级满足第一预设条件时,将所述访问请求发送给所述容器应用;当所述访问请求的优先级满足第二预设条件时,将所述访问请求加入访问队列。
在一实施例中,第一预设条件比如为,当前访问请求的优先级为高优先级;第二预设条件比如为,当前访问请求的优先级为低优先级。此处仅为示例,第一预设条件和第二预设条件可以根据需要设定。
在一实施例中,所述获取网络流控参数包括:通过预定义的系统部署定义描述符(System Deploy Define Description,SDDD)实体获取网络流控参数。
在一实施例中,所述SDDD实体使用以下至少之一实现:数据库、文件、表征状态转移(Representational State Transfer,REST)接口。
当SDDD实体使用文件实现时,该文件比如为yaml文件,该yaml文件如下所示:
name:n_config
#网控优先级
priorityLevel:
-1service1
-2service2
-3service3
#服务网控信息
service:
name:service1
#应用繁忙访问时间
startBusyTime:9:00
endBusyTime:10:00
#访问阈值
threshold:10M
busyThreshold:50M
#繁忙时优先级别(同级别是从上往下)
busyLevel:1
service:
name:service2
startBusyTime:9:30
endBusyTime:10:00
threshold:10M
busyThreshold:50M
busyLevel:1
service:
name:service3
startBusyTime:9:00
endBusyTime:10:00
threshold:10M
busyThreshold:50M
busyLevel:1
可以看到,业务1(service1)的繁忙时段为9:00-10:00,其他时段为正常时段,繁忙时段的阈值为50M,优先级为1,正常时段的阈值为10M,优先级为1;(业务2service2)的繁忙时段为9:30-10:00,其他时段为正常时段,繁忙时段的阈值为50M,优先级为1,正常时段的阈值为10M,优先级为2;业务3(service3)的繁忙时段为9:00-10:00,其他时段为正常时段,繁忙时段的阈值为50M,优先级为1,正常时段的阈值为10M,优先级为3。
如图3所示,本发明一实施例提供一种基于云平台对容器化应用进行网络流控的方法,包括以下步骤:
步骤301:定义SDDD实体。
支持数据库、文件、REST接口方式等定义SDDD实体,SDDD实体中包括网络流控参数,包括时段及其对应网络流控配置(访问优先级、访问阈值等)。
SDDD实体可以由用户定义,也可以在系统中预配置。
步骤302,接收用户对应用的访问请求,读取应用信息,包括:读取SDDD实体的网络流控参数,加载到TCONTC中,供其后续使用。
步骤303,启动网络流控流程。
在该步骤中,需要根据获取的信息进行繁忙判断、阈值判断和优先级判断,根据不同的判断情况进入不同的分支情况,该网络流控流程可参考图4。
步骤304,接收应用对所述访问请求的访问响应,发送给用户。
所述应用为容器应用。
本实施例中,时段分为繁忙时段和正常时段,优先级分为高优先级和非高优先级,如图4所示,网络流控流程包括:
步骤401,读取SDDD信息。
步骤402,检测当前时间是否为该应用的繁忙时间段,如果当前时间是繁忙时间段,执行步骤404,如果当前时间不是繁忙时间段,执行步骤403。
步骤403,加载正常时段的网络流控配置,执行步骤405。
步骤404,加载繁忙时间段的网络流控配置,执行步骤405。
步骤405,检测应用的当前流量是否超过预设阈值;如果当前流量未超过预设阈值,执行步骤408;如果当前流量超过预设阈值,执行步骤406。
步骤406,判断当前访问是否为高优先级,如果当前访问是高优先级,执行步骤408,如果当前访问不是高优先级,执行步骤407。
所述判断当前访问是否为高优先级是指:判断当前访问请求所访问的应用是否为高优先级。
步骤407,将所述访问请求放入访问队列,转到步骤409;访问队列中的访问请求依次发送给应用。
步骤408,直接访问应用,即将访问请求发送给应用。
步骤409,接收应用返回的访问响应。
图5为本发明一实施例提供的一种网络流控方法的整体流程示意图,应用已正常部署且能正常访问。如图5所示,包括:
步骤501,容器云平台接收用户配置的SDDD实体,以及用户发送的对应用的访问请求。
步骤502,TCONTC加载SDDD实体,获取网络流控参数。
步骤503,TCONTC从服务注册中心获取该应用的网络信息,注册信息等。
步骤504,TCONTC获取应用当前的访问流量,根据网络流控参数和当的访问流量进行访问控制,控制过程请参考图4,此处不再赘述。
步骤505,将访问请求发送给容器应用。
步骤506,接收容器应用返回的访问响应。
步骤507,将所述访问响应发送给用户。
实施例一:
本实施例中,以yaml文件为SDDD实体。如图6所示,包括:
步骤601,接收用户上传的SDDD实体yaml文件,其中,所述SDDD实体yaml文件根据应用的实际网络流量需求生成,接收用户通过浏览器或者接口对应用的访问请求。
yaml文件仅为示例,可以是其他类型的文件。
步骤602,TCONTC启动,通过加载SDDD实体yaml文件,获取网络流控 参数。
步骤603,根据待访问的应用的服务名,TCONTC从服务注册中心获取该应用的网络信息,注册信息等。
步骤604,TCONTC启动定时获取应用访问流量功能,获取应用的访问流量,并将其保存至数据库中,为网络流控提供数据支持。TCONTC调用网络管理模块的接口实现当前流量获取和访问控制,同时执行以下操作:
a、判断当前时间是否为该应用的繁忙时间段,如果当前时间是繁忙时间段,则加载繁忙时间段的网络流控配置,如果当前时间不是繁忙时间段,加载正常时段的网络流控配置。
b、启动阈值判断。比较应用当前的流量与预设阈值。如果应用当前的流量未超过预设阈值,则直接访问应用,如果应用当前的流量超过预设阈值,启动网流优先级控制流程,执行步骤c。
c、TCONTC根据网络流控配置判断当前访问是否为高优先级,如果当前访问是高优先级,则直接访问应用,如果当前访问不是高优先级,将访问请求放入访问队列中,依次访问应用。
步骤605,访问请求到达容器应用。
步骤606,该容器应用根据访问请求生成访问响应,将访问响应发送给容器云平台。
步骤607,容器云平台将访问响应反馈给用户的浏览器或接口,完成了此次访问流程。
实施例二:
本实施例中,以数据库表为SDDD实体。如图7所示,包括:
步骤701,接收用户根据应用的实际网络流量需求配置的SDDD实体数据库实体表,以及,接收用户通过浏览器或者接口对应用的访问请求。
步骤702,TCONTC启动,通过读取数据库实体表,获取网络流控参数。
步骤703,根据应用的服务名,TCONTC从服务注册中心获取该应用的网络信息,注册信息等。
步骤704,启动定时获取应用访问流量功能,并将其保存至数据库中,为网络流控提供数据支持。TCONTC调用网络管理模块的接口实现当前流量获取和访问控制,同时执行以下操作:
a、判断当前时间是否为该应用的繁忙时间段,如果当前时间是繁忙时间段,则加载繁忙时间段的网络流控配置,如果当前时间不是繁忙时间段,加载正常时段的网络流控配置。
b、启动阈值判断。比较应用当前的流量与预设阈值。如果应用当前的流量未超过预设阈值,则直接访问应用,如果应用当前的流量超过预设阈值,启动网流优先级控制流程,执行步骤c。
c、TCONTC根据网络流控配置判断当前访问是否为高优先级,如果当前访问是高优先级,则直接访问应用,如果当前访问不是高优先级,将访问请求放入访问队列中,依次访问应用。
步骤705,访问请求到达容器应用。
步骤706,该容器应用根据访问请求生成访问响应,将访问响应发送给容器云平台。
步骤707,容器云平台将访问响应反馈给用户的浏览器或接口,完成了此次访问流程。
实施例三:
本实施例中,以REST接口为SDDD实体,如图8所示,包括:
步骤801,用户根据应用的实际网络流量需求生成REST接口,接收用户配置的SDDD实体-REST接口统一资源定位系统(uniform resource locator,URL),以及,接收用户通过浏览器或者接口对应用的访问请求。
步骤802,TCONTC启动,通过REST接口获取网络流控参数。
步骤803,根据应用的服务名,TCONTC从服务注册中心获取该应用的网络信息,注册信息等。
步骤804,启动定时获取应用访问流量功能,并将其保存至数据库中,为网流优先级控制提供数据支持。TCONTC调用网络管理模块的接口实现当前流量获取和访问控制,同时执行以下操作:
a、判断当前时间是否为该应用的繁忙时间段,如果当前时间是繁忙时间段,则加载繁忙时间段的网络流控配置,如果当前时间不是繁忙时间段,加载正常时段的网络流控配置。
b、启动阈值判断。比较应用当前的流量与预设阈值。如果应用当前的流量未超过预设阈值,则直接访问应用,如果应用当前的流量超过预设阈值,启动网流优先级控制流程,执行步骤c。
c、TCONTC根据网络流控配置判断当前访问是否为高优先级,如果当前访问是高优先级,则直接访问应用,如果当前访问不是高优先级,将访问请求放入访问队列中,依次访问应用。
步骤805,访问请求到达容器应用。
步骤806,该容器应用根据访问请求生成访问响应,将访问响应发送给容器云平台。
步骤807,容器云平台将访问响应反馈给用户的浏览器或接口,完成了此次访问流程。
如图9所示,本发明一实施例提供一种基于云平台的容器化应用网络流控设备90,包括存储器910和处理器920,所述存储器910存储有程序,所述程序在被所述处理器920读取执行时,实现任一实施例所述的基于云平台的容器化应用网络流控方法。
如图10所示,本发明一实施例提供一种计算机可读存储介质100,所述计算机可读存储介质存储有一个或者多个程序1010,所述一个或者多个程序1010可被一个或者多个处理器执行,以实现任一实施例所述的基于云平台的容器化应用网络流控方法。
如图11所示,本发明一实施例提供一种基于云平台的容器化应用网络流控装置,包括:
参数获取单元1110,设置为获取网络流控参数,所述网络流控参数中包括时段及其对应的网络流控配置。
访问控制单元1120,设置为接收对应用的访问请求,根据该应用在当前时段对应的网络流控配置进行访问控制。
参数获取单元1110和访问控制单元1120的实现细节请参考方法实施例,此处不再赘述。
上文中所公开方法中的全部或一些步骤、系统、装置中的功能模块/单元可以被实施为软件、固件、硬件及其适当的组合。在硬件实施方式中,在以上描述中提及的功能模块/单元之间的划分不一定对应于物理组件的划分;例如,一个物理组件可以具有多个功能,或者一个功能或步骤可以由多个物理组件合作执行。一些组件或所有组件可以被实施为由处理器,如数字信号处理器或微处理器执行的软件,或者被实施为硬件,或者被实施为集成电路,如专用集成电路。这样的软件可以分布在计算机可读介质上,计算机可读介质可以包括计算机存储介质(或非暂时性介质)和通信介质(或暂时性介质)。术语计算机存储介质包括在用于存储信息(诸如计算机可读指令、数据结构、程序模块或其 他数据)的任何方法或技术中实施的易失性和非易失性、可移除和不可移除介质。计算机存储介质包括但不限于随机存取存储器(Random Access Memory,RAM)、只读存储器(Read-Only Memory,ROM)、带电可擦可编程只读存储器(Electrically Erasable Programmable Read-Only Memory,EEPROM)、闪存或其他存储器技术、光盘只读存储器(Compact Disc Read-Only Memory,CD-ROM)、数字多功能盘(Digital Video Disc,DVD)或其他光盘存储、磁盒、磁带、磁盘存储或其他磁存储装置、或者可以设置为存储期望的信息并且可以被计算机访问的任何其他的介质。此外,通信介质通常包含计算机可读指令、数据结构、程序模块或者诸如载波或其他传输机制之类的调制数据信号中的其他数据,并且可包括任何信息递送介质。

Claims (10)

  1. 一种基于云平台的容器化应用网络流控方法,包括:
    获取网络流控参数,所述网络流控参数中包括多个时段及每个时段对应的网络流控配置;
    接收对应用的访问请求,根据所述网络流控参数确定所述应用在当前时段对应的网络流控配置;
    根据所述应用在当前时段对应的网络流控配置进行访问控制。
  2. 根据权利要求1所述的方法,其中,所述多个时段及每个时段对应的网络流控配置包括:第一时段及所述第一时段对应的网络流控配置,第二时段及所述第二时段对应的网络流控配置。
  3. 根据权利要求1所述的方法,其中,所述网络流控配置包括流量阈值和访问优先级信息中的至少之一。
  4. 根据权利要求3所述的方法,其中,所述根据所述应用在当前时段对应的网络流控配置进行访问控制包括:
    在所述应用的流量超过所述应用在当前时段对应的网络流控配置中的流量阈值的情况下,根据所述当前时段对应的网络流控配置中的访问优先级信息进行访问控制;
    在所述应用的流量未超过所述应用在当前时段对应的网络流控配置中的流量阈值的情况下,将所述访问请求发送给所述应用。
  5. 根据权利要求4所述的方法,其中,所述根据所述当前时段对应的网络流控配置中的访问优先级信息进行访问控制包括:
    根据所述当前时段对应的网络流控配置中的访问优先级信息确定所述访问请求的优先级;
    在所述访问请求的优先级满足第一预设条件的情况下,将所述访问请求发送给所述容器应用;
    在所述访问请求的优先级满足第二预设条件的情况下,将所述访问请求加入访问队列。
  6. 根据权利要求1至5中任一项所述的方法,其中,所述获取网络流控参数包括:
    通过预定义的系统部署定义描述符实体获取所述网络流控参数。
  7. 根据权利要求6所述的方法,其中,所述系统部署定义描述符实体使用以下至少之一实现:数据库、文件、表征状态转移REST接口。
  8. 一种基于云平台的容器化应用网络流控装置,包括:
    参数获取单元,设置为获取网络流控参数,所述网络流控参数中包括多个时段及每个时段对应的网络流控配置;
    访问控制单元,设置为接收对应用的访问请求,根据所述网络流控参数确定所述应用在当前时段对应的网络流控配置;根据所述应用在当前时段对应的网络流控配置进行访问控制。
  9. 一种基于云平台的容器化应用网络流控设备,包括存储器和处理器,所述存储器存储有程序,所述程序在被所述处理器读取执行时,实现如权利要求1至7中任一项所述的基于云平台的容器化应用网络流控方法。
  10. 一种计算机可读存储介质,存储有至少一个程序,所述至少一个程序可被至少一个处理器执行,以实现如权利要求1至7中任一项所述的基于云平台的容器化应用网络流控方法。
PCT/CN2020/101557 2019-07-23 2020-07-13 基于云平台的容器化应用网络流控方法、装置、设备及存储介质 WO2021012974A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201910667771.9 2019-07-23
CN201910667771.9A CN112291287A (zh) 2019-07-23 2019-07-23 基于云平台的容器化应用网络流控方法及设备、存储介质

Publications (1)

Publication Number Publication Date
WO2021012974A1 true WO2021012974A1 (zh) 2021-01-28

Family

ID=74193196

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2020/101557 WO2021012974A1 (zh) 2019-07-23 2020-07-13 基于云平台的容器化应用网络流控方法、装置、设备及存储介质

Country Status (2)

Country Link
CN (1) CN112291287A (zh)
WO (1) WO2021012974A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115277503A (zh) * 2022-06-24 2022-11-01 北京天融信网络安全技术有限公司 一种监控网络流量的方法、装置、存储介质及电子设备

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7113990B2 (en) * 2002-05-29 2006-09-26 Distributed Management Information Systems, Inc. System and process for allocating flow capacity in a network
CN101056274A (zh) * 2007-06-15 2007-10-17 中兴通讯股份有限公司 一种分时流量管理方法及装置
CN101436987A (zh) * 2008-10-06 2009-05-20 中兴通讯股份有限公司 QoS服务的调度配置方法和装置
CN101588555A (zh) * 2008-05-21 2009-11-25 中兴通讯股份有限公司 短消息的流量控制方法及短消息网关
CN101888337A (zh) * 2010-06-29 2010-11-17 武汉绿色网络信息服务有限责任公司 一种基于控制矩阵的网络实时流量控制方法
US20110231769A1 (en) * 2010-03-18 2011-09-22 Tovar Tom C Systems and Methods for Scheduling Online Access

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101404811B (zh) * 2008-11-17 2010-12-08 中兴通讯股份有限公司 一种小区短信的流量控制方法及系统
US9800483B2 (en) * 2012-04-13 2017-10-24 CirrusWorks, Inc. Method and apparatus for dynamic bandwidth allocation for optimizing network utilization
CN108112038B (zh) * 2016-11-24 2021-06-01 深圳市云网万店科技有限公司 一种控制访问流量的方法及装置
CN108696445A (zh) * 2018-05-28 2018-10-23 深圳市零度智控科技有限公司 流量控制方法、移动终端及计算机可读存储介质
CN109274547A (zh) * 2018-08-17 2019-01-25 中国平安人寿保险股份有限公司 基于网络安全的服务熔断方法、装置、设备及存储介质
CN109842565B (zh) * 2018-12-15 2023-03-28 平安科技(深圳)有限公司 接口限流方法、装置、电子设备及存储介质

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7113990B2 (en) * 2002-05-29 2006-09-26 Distributed Management Information Systems, Inc. System and process for allocating flow capacity in a network
CN101056274A (zh) * 2007-06-15 2007-10-17 中兴通讯股份有限公司 一种分时流量管理方法及装置
CN101588555A (zh) * 2008-05-21 2009-11-25 中兴通讯股份有限公司 短消息的流量控制方法及短消息网关
CN101436987A (zh) * 2008-10-06 2009-05-20 中兴通讯股份有限公司 QoS服务的调度配置方法和装置
US20110231769A1 (en) * 2010-03-18 2011-09-22 Tovar Tom C Systems and Methods for Scheduling Online Access
CN101888337A (zh) * 2010-06-29 2010-11-17 武汉绿色网络信息服务有限责任公司 一种基于控制矩阵的网络实时流量控制方法

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115277503A (zh) * 2022-06-24 2022-11-01 北京天融信网络安全技术有限公司 一种监控网络流量的方法、装置、存储介质及电子设备
CN115277503B (zh) * 2022-06-24 2024-03-15 北京天融信网络安全技术有限公司 一种监控网络流量的方法、装置、存储介质及电子设备

Also Published As

Publication number Publication date
CN112291287A (zh) 2021-01-29

Similar Documents

Publication Publication Date Title
EP3739845B1 (en) Borrowing data storage resources in a distributed file system
US10637916B2 (en) Method and device for storage resource allocation for video cloud storage
CN110795244B (zh) 一种任务分配方法、装置、设备及介质
US9836516B2 (en) Parallel scanners for log based replication
CN109151512A (zh) Cdn网络中获取内容的方法及装置
US20170153909A1 (en) Methods and Devices for Acquiring Data Using Virtual Machine and Host Machine
WO2021012974A1 (zh) 基于云平台的容器化应用网络流控方法、装置、设备及存储介质
CN114064780A (zh) 会话信息的处理方法、系统、装置、存储介质及电子设备
CN108124021B (zh) 网际协议ip地址获取、网站访问的方法、装置及系统
CN108255853B (zh) 一种插件式的请求异步处理方法以及系统
CN117407159A (zh) 内存空间的管理方法及装置、设备、存储介质
CN110365743B (zh) 一种基于Zookeeper实现的支持多种可自定义负载算法的负载均衡器实现方法
CN110011850B (zh) 云计算系统中服务的管理方法和装置
CN114661246B (zh) 一种存储控制的方法和装置
CN113157415B (zh) 农场渲染方法、装置、电子设备和存储介质
CN106899652B (zh) 一种推送业务处理结果的方法及装置
CN112468558B (zh) 基于混合云的请求转发方法、装置、终端及存储介质
WO2021077747A1 (zh) 一种实现应用加载的方法、装置、计算机存储介质及终端
CN116155829A (zh) 网络流量处理方法、装置、介质及电子设备
CN112583862A (zh) 数据并发的处理方法、装置、存储介质及设备
CN115328978B (zh) 一种连接池的连接方法和服务器
CN106507224B (zh) 一种获取目标文件的方法及相关装置
CN114153399B (zh) 存储系统的数据存储方法、装置、控制装置和介质
CN115190177B (zh) 请求处理方法、装置、计算机设备、存储介质和程序产品
CN114221946B (zh) 基于对象网关管理文件的方法、装置、设备及存储介质

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 20844009

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 20844009

Country of ref document: EP

Kind code of ref document: A1

122 Ep: pct application non-entry in european phase

Ref document number: 20844009

Country of ref document: EP

Kind code of ref document: A1

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 27/09/2022)

122 Ep: pct application non-entry in european phase

Ref document number: 20844009

Country of ref document: EP

Kind code of ref document: A1