WO2024077930A1 - 服务访问方法及装置、存储介质及电子设备 - Google Patents

服务访问方法及装置、存储介质及电子设备 Download PDF

Info

Publication number
WO2024077930A1
WO2024077930A1 PCT/CN2023/091101 CN2023091101W WO2024077930A1 WO 2024077930 A1 WO2024077930 A1 WO 2024077930A1 CN 2023091101 W CN2023091101 W CN 2023091101W WO 2024077930 A1 WO2024077930 A1 WO 2024077930A1
Authority
WO
WIPO (PCT)
Prior art keywords
service
node
external
cluster
address
Prior art date
Application number
PCT/CN2023/091101
Other languages
English (en)
French (fr)
Inventor
刘凯
赵建星
樊建刚
Original Assignee
京东科技信息技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 京东科技信息技术有限公司 filed Critical 京东科技信息技术有限公司
Publication of WO2024077930A1 publication Critical patent/WO2024077930A1/zh

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/56Provisioning of proxy services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/60Scheduling or organising the servicing of application requests, e.g. requests for application data transmissions using the analysis and optimisation of the required network resources

Definitions

  • the present disclosure relates to the field of communication technology, and in particular to a service access method and device, a storage medium, and an electronic device.
  • cluster technology is being used more and more widely.
  • Using cluster technology to build systems and platforms can not only reduce the cost of building systems and platforms, but also improve the processing capabilities of systems and platforms.
  • the present disclosure provides a service access method and device, a storage medium, and an electronic device.
  • the present disclosure provides a service access method, comprising:
  • Creating a resource instance for the custom resource component and using a controller of the custom resource component to generate a service component and a node list corresponding to the resource instance, wherein the node list is used to store the IP address of the service node of the external service;
  • calling the controller to detect each service node of the external service includes:
  • the controller is triggered to detect each service node of the external service based on the abnormality judgment rule, and determine the service node that meets the abnormality judgment rule as an abnormal service node.
  • the method further includes:
  • the IP address of the repaired service node is added to the node list.
  • the method further includes:
  • the repair reminder information is sent to remind the preset operation and maintenance personnel to maintain the abnormal service node.
  • the method further includes:
  • the service data is sent to the cluster application.
  • the present disclosure provides a service access device, including:
  • a first determining unit configured to determine an external service of a cluster, and register a custom resource component corresponding to the external service in the cluster;
  • a creation unit used to create a resource instance for the custom resource component, and use a controller of the custom resource component to generate a service component and a node list corresponding to the resource instance, wherein the node list is used to store the IP address of the service node of the external service;
  • a detection unit is used to call the controller to detect the external When an abnormal service node is detected, the IP address of the abnormal service node is deleted from the node list;
  • the access unit is used to determine the target IP address in the latest node list when receiving a service access request sent by the cluster application, and use the service component to access the service node corresponding to the target IP address in the service node of the external service.
  • the detection unit includes:
  • a determination subunit used to determine an abnormality judgment rule of the external service
  • the triggering subunit is used to trigger the controller to detect each service node of the external service based on the abnormality judgment rule, and determine the service node that meets the abnormality judgment rule as an abnormal service node.
  • the device further includes:
  • a first generating unit configured to generate a current node check record of the external service
  • An acquisition unit used to acquire the historical node inspection record of the external service
  • a second determining unit configured to determine whether there is a repaired service node among the service nodes of the external service based on the current node check record and the historical node check record of the external service;
  • the adding unit is configured to add the IP address of the repaired service node to the node list when it is determined that there is a repaired service node among the service nodes of the external service.
  • the device further includes:
  • a second generating unit configured to generate repair reminder information based on the IP address of the abnormal service node
  • the first sending unit is used to send the repair reminder information to remind the preset operation and maintenance personnel to maintain the abnormal service node.
  • the device further includes:
  • a receiving unit configured to receive service data sent by a service node corresponding to the target IP address among the service nodes of the external service
  • the second sending unit is configured to send the service data to the cluster application.
  • One aspect of the present disclosure provides a storage medium, which includes stored instructions, wherein when the instructions are executed, a device where the storage medium is located is controlled to execute the service access method as described above.
  • One aspect of the present disclosure provides an electronic device, including a memory and one or more instructions, wherein the one or more instructions are stored in the memory and are configured to be executed by one or more processors as described above for accessing the service.
  • FIG1 is a method flow chart of a service access method provided by an embodiment of the present disclosure
  • FIG2 is a flow chart of a method for adding an IP address of a service node provided in an embodiment of the present disclosure
  • FIG3 is a diagram showing an example scenario of a service access method provided by an embodiment of the present disclosure.
  • FIG4 is a timing diagram of a service access method provided by an embodiment of the present disclosure.
  • FIG5 is a schematic diagram of the structure of a service access device provided by an embodiment of the present disclosure.
  • FIG. 6 is a schematic diagram of the structure of an electronic device provided in an embodiment of the present disclosure.
  • Kubernetes is an open source containerized application for managing multiple hosts in a cloud platform.
  • CRD Custom Resource Definition
  • everything in Kubernetes can be regarded as a resource (Resource).
  • CRD is a custom resource definition, an extension capability provided by Kubernetes.
  • each resource instance in Kubernetes has a corresponding controller, which is equivalent to a state machine manager that manages the status of the corresponding resources.
  • Operator is a method for encapsulating, deploying and managing K8s applications. It registers user-defined CRDs and then uses the Controller to continuously detect the status of all CRs in the cluster. If the status is inconsistent with expectations, it will be adjusted.
  • the Controller component for Endpoint resources is responsible for detecting and updating Endpoint resources.
  • Endpoint is a resource type that describes a service instance in K8s. It is used here to describe the external service IP, port, protocol, and other information to be introduced.
  • Single-point or multi-point failure of a service usually, a service is deployed at multiple points to achieve high availability. It can tolerate the failure of one or more nodes and still provide services normally. When the failed node recovers and rejoins the service, it will not affect the normal provision of services. However, the service-dependent party usually requests the service through the service node IP. If the abnormal node IP is accessed, the service-dependent party will have an exception.
  • Kubernetes cluster Take Kubernetes cluster as an example.
  • object storage service For example, object storage service.
  • Applications running in Kubernetes cluster may rely on object storage service, which is usually deployed outside the cluster.
  • object storage service In the construction of small and medium-sized private clouds, many services outside the cluster are deployed in multiple nodes, such as Minio, an object storage service.
  • Minio an object storage service.
  • domain names can be associated with multiple service node IP addresses to introduce services outside the cluster into the cluster in the form of domain names; the latter creates a regular Service in the cluster and binds Endpoints with IP addresses to introduce services outside the cluster into the cluster.
  • Both of the above methods cannot detect node failures of external services. When a node of an external service fails and cannot provide services, it will cause service access anomalies in the cluster using the external service, affecting the operation of the cluster.
  • the present disclosure provides a service access method.
  • the method provided by the present disclosure can be used to periodically detect each service node of the external service of the cluster, and the IP addresses of abnormal service nodes can be deleted in time to ensure that the cluster can access the normal service nodes of the external service, thereby ensuring the normal operation of the cluster.
  • the present disclosure can be used in many general or special computing device environments or configurations, such as personal computers, server computers, handheld or portable devices, tablet devices, multi-processor devices, distributed computing environments including any of the above devices or devices, etc.
  • FIG. 1 is a flow chart of a method for accessing a service provided by an embodiment of the present disclosure, the specific description is as follows:
  • the cluster here may be a K8s cluster, and the external service may be a service that is deployed on multiple nodes, such as an object storage service; in some embodiments, one cluster may correspond to multiple external services.
  • the determination may be made according to the configuration instruction sent by the processing personnel, the configuration instruction may be parsed to obtain the service identification information, and the external service of the cluster may be determined based on the service identification information.
  • Custom resource components can be represented by CRD, which is a Kubernetes CRD.
  • CRD contains information such as the IP information of each service node of the external service, the service port information, and the exception judgment rules.
  • the exception judgment rules can also be understood as health check rules.
  • the exception judgment rules contain rule data for determining whether the service node is abnormal.
  • the cluster can use the pre-set Endpoint-operator to register the CRD in the cluster and start the controller corresponding to the CRD in the cluster.
  • S102 Create a resource instance for the custom resource component, and use the controller of the custom resource component to generate a service component and a node list corresponding to the resource instance, wherein the node list is used to store the IP address of the service node of the external service.
  • CR resource instance
  • Service service component
  • Endpoints node list
  • the generated service component and node list are associated with the resource instance, for example, the generated service component and node list are named using the name of the resource instance.
  • S103 Based on a preset detection cycle, call the controller to detect each service node of the external service, and when an abnormal service node is detected, delete the IP address of the abnormal service node from the node list.
  • the detection cycle can be set according to actual needs, for example, 3 days as a detection cycle, 5 hours as a detection cycle; each service node of the external service can be periodically detected.
  • the trigger controller After determining the abnormality judgment rule of the external service, the trigger controller detects each service node of the external service based on the abnormality judgment rule, and determines the service node that meets the abnormality judgment rule as an abnormal service node.
  • the service nodes of external services it is necessary to detect all service nodes of external services. Specifically, whether the service nodes are abnormal can be detected according to the abnormality judgment rules. For example, when the service node does not respond within a preset time, it can be determined that the service node meets the abnormality judgment rules. For example, when the status of the service node is offline or faulty, it can be determined that the service node meets the abnormality judgment rules. Examples of the situation where the service node meets the abnormality judgment rules are not given here.
  • the service node can be determined as an abnormal service node.
  • the IP address of the abnormal service node exists in the node list, the IP address of the abnormal service node needs to be deleted from the node list to ensure that the node list does not contain the IP address of the abnormal service node.
  • the repair reminder information includes but is not limited to the IP address of the abnormal service node, the abnormal situation, and the basic information of the node.
  • S104 When receiving a service access request sent by a cluster application, determine a target IP address in the latest node list, and use a service component to access a service node in a service node of an external service that corresponds to the target IP address.
  • Cluster applications are applications installed on the cluster. They can also be applications outside the cluster. Cluster applications can be used to access external services of the cluster.
  • the cluster determines the latest node list for the external service request.
  • the service nodes corresponding to each IP address in the latest node list can provide services normally.
  • An IP address is randomly selected from the latest node list as the target IP address, or the IP address with the least access traffic is used as the target IP address.
  • the service component of the resource instance corresponding to the external service is called to access the service node corresponding to the target IP address in the service node of the external service.
  • a service component when a service component accesses a service node in a service node of an external service that corresponds to a target IP address, it may send an access request to the service node that corresponds to the target IP address.
  • the access request includes a data feedback path; the service node sends service data to the cluster based on the data feedback path in the access request; after receiving the service data, the cluster sends the service data to the cluster application, thereby realizing service access to the external service.
  • the external service of the cluster is determined, and the custom resource component corresponding to the external service is registered in the cluster; a resource instance is created for the custom resource component, and the controller of the resource instance is used to generate a service component and a node list corresponding to the resource instance, and the node list is used to save the IP address of the service node of the external service; based on a preset detection cycle, the controller is called to detect each service node of the external service, and when an abnormal service node is detected, the IP address of the abnormal service node is deleted from the node list; when a service access request sent by the cluster application is received, the target IP address is determined in the latest node list, and the service component is used to access the service node corresponding to the target IP address in the external service.
  • Register the custom resource component corresponding to the external service introduce the external service into the cluster, generate the corresponding resource instance, and then use the controller corresponding to the resource instance to detect the service node of the external service, and delete the IP address of the detected abnormal service node from the node list to ensure that the node list does not contain the IP address of the abnormal service node, effectively ensuring that there will be no abnormality in accessing the external service and avoiding cluster abnormalities.
  • the IP address of the repaired service node can also be added to the node list.
  • the specific process is shown in FIG. 2 and is specifically described as follows:
  • the node inspection record contains the inspection results of all service nodes of the external service.
  • the inspection result of the service node can be abnormal or normal.
  • the historical node inspection record is a node inspection record of the external service in the previous detection cycle.
  • S203 Determine whether there is a repaired service node among the service nodes of the external service based on the current node inspection record and the historical node inspection record of the external service.
  • the present disclosure can effectively determine whether there is an IP address that needs to be added to the node list through the current node check record and the historical node check record of the external service. If it exists, The IP address is added to the node list. Therefore, the present disclosure can not only remove the IP addresses of abnormal service nodes, but also add the IP addresses of restored normal service nodes, thereby ensuring that there are always available IP addresses in the node list, further ensuring that the cluster can access external services and ensuring the stable operation of the cluster.
  • the cluster can be a K8s cluster 302, and the cluster application 3022 can be an application within the cluster or outside the cluster.
  • the cluster application 3022 can be an application (Application); the black solid line process (including S3001, S3002, S3003) in the figure illustrates the process of introducing an external service 304 into the cluster, and the black dotted line and dot-dash line process (including S3004) in the figure illustrate the process of cluster application accessing the external service 304 after the external service 304 is introduced into the cluster.
  • the external service 304 can include service node 1, service node 2, service node 3, and so on.
  • the service component 3024 in the figure can be represented by Service
  • the node list 3026 can be represented by Endpoints
  • the custom resource component 3028 can be represented by CRD.
  • the cluster application 3022 can access the external service introduced into the cluster through the cluster's Service, which realizes load balancing and high availability.
  • Endpoint-operator 30210 performs health checks on external services 304, such as checking whether there are abnormal service nodes in the external services.
  • a cluster application 402 provides a yaml file 4022 to a K8s cluster 404, such as kubectl apply cy.yaml, which enables the cluster to support the management of resource objects in yaml format.
  • Endpoint-operator 406 After Endpoint-operator 406 is started (S4002), it registers CRD in K8s cluster 404 (S4004).
  • CRD contains the node IP of the external service, service port Port, health check method, etc.; after registering CRD in Kubernetes, Endpoint-operator can start the corresponding controller (Controller), create a resource instance (CR) based on CRD (S4006), and the Controller generates a Service and Endpoints with the same name according to CR (S4008), and sets the Service and Endpoints in K8s (S4010); Endpoint-operator can also perform health checks on services outside the cluster periodically according to the CR definition (S4012), that is, check whether there are any abnormalities in each service node in the external service (S4014), update the CR status and Endpoints according to the check results (S4016), and update the CR resources and Endpoints resources in K8s (S4018).
  • S4012 the CR definition
  • S4014 that is, check whether there are any abnormalities in each service node in the external service
  • S4016 update the CR status and Endpoints according to the check results
  • Endpoint-operator when a service node in an external service fails, Endpoint-operator detects faulty nodes through periodic health checks, updates CR and Endpoints, and removes the IP of the faulty service node from Endpoints. When Application accesses external services through Service, traffic will not reach the faulty node, thus avoiding exceptions. When the faulty node is repaired, Endpoint-operator will also sense it, update CR and Endpoints, and add the repaired faulty node IP back to Endpoints so that it can continue to carry service access traffic.
  • the present invention can also be used as a reverse proxy solution based on Kubernetes to provide high-availability solutions for various service applications.
  • the embodiment of the present disclosure further provides a service access device, which is used to support the specific implementation of the method shown in FIG. 1 .
  • the device can be applied in a cluster.
  • FIG. 5 which is a schematic diagram of the structure of the device provided in the embodiment of the present disclosure, the specific description is as follows:
  • a first determining unit 501 is used to determine an external service of a cluster, and register a custom resource component corresponding to the external service in the cluster;
  • a creation unit 502 is used to create a resource instance for the custom resource component, and use a controller of the custom resource component to generate a service component and a node list corresponding to the resource instance, wherein the node list is used to store the IP address of the service node of the external service;
  • the detection unit 503 is used to call the controller to detect each service node of the external service based on a preset detection cycle, and when an abnormal service node is detected, delete the IP address of the abnormal service node from the node list;
  • the access unit 504 is used to determine the target IP address in the latest node list when receiving a service access request sent by the cluster application, and use the service component to access the service node corresponding to the target IP address in the service node of the external service.
  • the external service of the cluster is determined, and the custom resource component corresponding to the external service is registered in the cluster; a resource instance is created for the custom resource component, and a service component and a node list corresponding to the resource instance are generated using a controller of the resource instance, and the node list is used to store the IP address of the service node of the external service; based on a preset detection cycle, the controller is called to detect each service node of the external service, and when an abnormal service node is detected, When a service access request is received from a cluster application, the target IP address is determined in the latest node list, and the service component is used to access the service node corresponding to the target IP address in the external service.
  • the external service By registering the custom resource component corresponding to the external service in the cluster, the external service is introduced into the cluster, the corresponding resource instance is generated, and then the controller corresponding to the resource instance is used to detect the service node of the external service, and the IP address of the detected abnormal service node is deleted from the node list to ensure that the node list does not contain the IP address of the abnormal service node, effectively ensuring that there will be no abnormality in accessing the external service and avoiding cluster abnormalities.
  • the detection unit 503 of the device includes:
  • a determination subunit used to determine an abnormality judgment rule of the external service
  • the triggering subunit is used to trigger the controller to detect each service node of the external service based on the abnormality judgment rule, and determine the service node that meets the abnormality judgment rule as an abnormal service node.
  • the device further includes:
  • a first generating unit configured to generate a current node check record of the external service
  • An acquisition unit used to acquire the historical node inspection record of the external service
  • a second determining unit configured to determine whether there is a repaired service node among the service nodes of the external service based on the current node check record and the historical node check record of the external service;
  • the adding unit is configured to add the IP address of the repaired service node to the node list when it is determined that there is a repaired service node among the service nodes of the external service.
  • the device further includes:
  • a second generating unit configured to generate repair reminder information based on the IP address of the abnormal service node
  • the first sending unit is used to send the repair reminder information to remind the preset operation and maintenance personnel to maintain the abnormal service node.
  • the device further includes:
  • a receiving unit configured to receive service data sent by a service node corresponding to the target IP address among the service nodes of the external service
  • the second sending unit is configured to send the service data to the cluster application.
  • the embodiment of the present disclosure further provides a storage medium, which includes stored instructions, wherein when the instructions are executed, the device where the storage medium is located is controlled to execute the above-mentioned service access method.
  • the embodiment of the present disclosure also provides an electronic device, a structural diagram of which is shown in Figure 6, specifically including a memory 601 and one or more instructions 602, wherein the one or more instructions 602 are stored in the memory 601 and are configured to be executed by one or more processors 603 to execute the one or more instructions 602 to perform the above-mentioned service access method.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Debugging And Monitoring (AREA)

Abstract

本公开提供一种服务访问方法及装置、存储介质及电子设备,包括:确定集群的外部服务,在集群中注册与外部服务对应的自定义资源组件;为自定义资源组件创建资源实例后,生成服务组件和节点列表;基于检测周期,调用控制器检测外部服务的各个服务节点,当检测到异常的服务节点时,将异常的服务节点的IP地址从节点列表中删除;当接收到服务访问请求时,在最新的节点列表中确定目标IP地址,并使用服务组件访问外部服务的服务节点中与目标IP地址对应的服务节点。在集群中注册与外部服务对应的自定义资源组件,将外部服务引入集群,并对外部服务进行检测,将异常节点的IP从节点列表删除,从而保证不会访问到外部服务的异常节点,确保集群的正常运行。

Description

服务访问方法及装置、存储介质及电子设备
本公开基于申请号为202211252756.6、申请日为2022年10月13日、发明名称为《一种服务访问方法及装置、存储介质及电子设备》的中国专利申请提出,并要求该中国专利申请的优先权,该中国专利申请的全部内容在此引入本公开作为参考。
技术领域
本公开涉及通信技术领域,特别涉及一种服务访问方法及装置、存储介质及电子设备。
背景技术
随着计算机技术的发展,集群技术的应用越来越广泛,使用集群技术构建系统和平台,不仅可以降低构建系统和平台的成本,还可以提高系统和平台的处理能力。
发明内容
有鉴于此,本公开提供一种服务访问方法及装置、存储介质及电子设备。
为实现上述目的,本公开实施例提供如下技术方案:
本公开一个方面提供一种服务访问方法,包括:
确定集群的外部服务,在所述集群中注册与所述外部服务对应的自定义资源组件;
为所述自定义资源组件创建资源实例,并使用所述自定义资源组件的控制器生成与所述资源实例对应的服务组件和节点列表,所述节点列表用于保存所述外部服务的服务节点的IP地址;
基于预设的检测周期,调用所述控制器检测所述外部服务的各个服务节点,当检测到异常的服务节点时,将异常的服务节点的IP地址从所述节点列表中删除;
当接收到集群应用发送的服务访问请求时,在最新的节点列表中确 定目标IP地址,并使用所述服务组件访问所述外部服务的服务节点中与所述目标IP地址对应的服务节点。
根据本公开的一实施例,所述调用所述控制器检测所述外部服务的各个服务节点,包括:
确定所述外部服务的异常判断规则;
触发所述控制器基于所述异常判断规则检测所述外部服务的各个服务节点,并将满足所述异常判断规则的服务节点确定为异常的服务节点。
根据本公开的一实施例,所述方法还包括:
生成所述外部服务当前的节点检查记录;
获取所述外部服务的历史节点检查记录;
基于所述外部服务当前的节点检查记录和历史节点检查记录,确定所述外部服务的服务节点中是否存在修复的服务节点;
当确定所述外部服务的服务节点中存在修复的服务节点时,将该修复的服务节点的IP地址添加至所述节点列表中。
根据本公开的一实施例,所述方法还包括:
基于异常的服务节点的IP地址,生成修复提醒信息;
发送所述修复提醒信息,以提醒预设的运维人员对异常的服务节点进行维护。
根据本公开的一实施例,所述方法还包括:
接收所述外部服务的服务节点中与所述目标IP地址对应的服务节点发送的服务数据;
将所述服务数据向所述集群应用发送。
本公开一个方面提供一种服务访问装置,包括:
第一确定单元,用于确定集群的外部服务,在所述集群中注册与所述外部服务对应的自定义资源组件;
创建单元,用于为所述自定义资源组件创建资源实例,并使用所述自定义资源组件的控制器生成与所述资源实例对应的服务组件和节点列表,所述节点列表用于保存所述外部服务的服务节点的IP地址;
检测单元,用于基于预设的检测周期,调用所述控制器检测所述外 部服务的各个服务节点,当检测到异常的服务节点时,将异常的服务节点的IP地址从所述节点列表中删除;
访问单元,用于当接收到集群应用发送的服务访问请求时,在最新的节点列表中确定目标IP地址,并使用所述服务组件访问所述外部服务的服务节点中与所述目标IP地址对应的服务节点。
根据本公开的一实施例,所述检测单元,包括:
确定子单元,用于确定所述外部服务的异常判断规则;
触发子单元,用于触发所述控制器基于所述异常判断规则检测所述外部服务的各个服务节点,并将满足所述异常判断规则的服务节点确定为异常的服务节点。
根据本公开的一实施例,所述装置还包括:
第一生成单元,用于生成所述外部服务当前的节点检查记录;
获取单元,用于获取所述外部服务的历史节点检查记录;
第二确定单元,用于基于所述外部服务当前的节点检查记录和历史节点检查记录,确定所述外部服务的服务节点中是否存在修复的服务节点;
添加单元,用于当确定所述外部服务的服务节点中存在修复的服务节点时,将该修复的服务节点的IP地址添加至所述节点列表中。
根据本公开的一实施例,所述装置还包括:
第二生成单元,用于基于异常的服务节点的IP地址,生成修复提醒信息;
第一发送单元,用于发送所述修复提醒信息,以提醒预设的运维人员对异常的服务节点进行维护。
根据本公开的一实施例,所述装置还包括:
接收单元,用于接收所述外部服务的服务节点中与所述目标IP地址对应的服务节点发送的服务数据;
第二发送单元,用于将所述服务数据向所述集群应用发送。
本公开一个方面提供一种存储介质,所述存储介质包括存储的指令,其中,在所述指令运行时控制所述存储介质所在的设备执行如上所述的服务访问方法。
本公开一个方面提供一种电子设备,包括存储器,以及一个或者一个以上的指令,其中一个或者一个以上指令存储于存储器中,且经配置以由一个或者一个以上处理器执行如上所述的服务访问方法。
附图说明
为了更清楚地说明本公开实施例或现有技术中的技术方案,下面将对实施例或现有技术描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本公开的实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据提供的附图获得其他的附图。
图1为本公开实施例提供的一种服务访问方法的方法流程图;
图2为本公开实施例提供的添加服务节点的IP地址的方法流程图;
图3为本公开实施例提供的一种服务访问方法的场景示例图;
图4为本公开实施例提供的一种服务访问方法的时序图;
图5为本公开实施例提供的一种服务访问装置的结构示意图;
图6为本公开实施例提供的一种电子设备的结构示意图。
具体实施方式
下面将结合本公开实施例中的附图,对本公开实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例仅仅是本公开一部分实施例,而不是全部的实施例。基于本公开中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本公开保护的范围。
在本申请中,术语“包括”、“包含”或者其任何其他变体意在涵盖非排他性的包含,从而使得包括一系列要素的过程、方法、物品或者设备不仅包括那些要素,而且还包括没有明确列出的其他要素,或者是还包括为这种过程、方法、物品或者设备所固有的要素。在没有更多限制的情况下,由语句“包括一个……”限定的要素,并不排除在包括所述要素的过程、方法、物品或者设备中还存在另外的相同要素。
术语解释:
Kubernetes,简称K8s,是一个开源的,用于管理云平台中多个主机上的容器化的应用。
CRD,Custom Resource Definition,Kubernetes中一切都可以视为资源(Resource),CRD是自定义资源定义,Kubernetes提供的一种扩展能力。
CR,Custom Resource,资源实例。
Controller,Kubernetes中的每种资源实例都有对应的控制器,相当于一个状态机管理器,管理对应资源的状态。
Operator,是一种封装、部署和管理K8s应用的方法,注册用户自定义的CRD,而后通过Controller来不断地检测集群内所有CR的状态,如果状态和预期不一致则调整。
Endpoint-operator,针对Endpoint资源的Controller组件,负责探测、更新Endpoint资源。
Endpoint,K8s中描述服务实例的资源类型,这里用来描述将要引入的外部服务IP、端口及协议等信息。
服务单点或多点故障,通常一个服务为了实现高可用,采用多点部署的形式,可以容忍其中的一个或多个节点故障时,仍可以正常提供服务;当故障节点恢复后重新加入服务时,也同样不影响正常提供服务,但是,服务依赖方通常是通过服务节点IP来请求服务,如果访问到异常节点IP时,服务依赖方就会发生异常。
目前集群在应用时,除了会使用到自身的服务之外,还会使用到集群部署在集群外的服务,这种类型的服务称为外部服务,例如对象存储服务。外部服务通常使用多节点的方式构建,目前在使用外部服务时,集群无法确定外部服务中出现异常的节点,在集群访问到外部服务的异常节点时,会导致集群出现异常,影响集群的运行。
以Kubernetes集群为例,目前,集群在实际应用中,大多数Kubernetes集群用户都会用到集群外部的服务。例如,对象存储服务,运行在Kubernetes集群中的应用可能会依赖对象存储服务,而对象存储服务通常会部署在集群之外。在中小规模的私有云建设中,很多集群外服务采用多节点部署,如Minio,一种对象存储服务。目前,集群内引入 如Minio一样的集群外服务,通常是采用ExtenalName类型Service,或者Serivce+Endpoints的形式。前者是利用了域名能够关联多个服务节点IP地址的特点,将集群外服务以域名的方式引入集群内;后者是在集群内创建常规Service,以及绑定IP地址的Endpoints,将集群外服务引入集群内。上述两种方式均无法感知外部服务的节点故障的情况,当外部服务的某个节点故障,无法提供服务时,会导致使用外部服务的集群出现服务访问异常的情况,影响集群的运行。
本公开提供一种服务访问方法,应用本公开提供的方法可以周期性检测集群的外部服务的各个服务节点,及时的将异常的服务节点的IP地址删除,以确保集群可以访问外部服务的正常的服务节点,进而保证集群的正常运行。
本公开可用于众多通用或专用的计算装置环境或配置中。例如:个人计算机、服务器计算机、手持设备或便携式设备、平板型设备、多处理器装置、包括以上任何装置或设备的分布式计算环境等等。
本公开可以应用在Kubernetes集群中,参照图1,为本公开实施例提供的一种服务访问方法的方法流程图,具体说明如下所述:
S101、确定集群的外部服务,在集群中注册与外部服务对应的自定义资源组件。
此处的集群可以为K8s集群,外部服务可以为采用多节点部署的服务,例如对象存储服务;在一些实施例中,一个集群可以对应多个外部服务。
在确定集群的外部服务时,可以根据处理人员发送的配置指令进行确定,可以对配置指令进行解析,获取服务识别信息,基于服务识别信息确定集群的外部服务。
自定义资源组件可以使用CRD表示,CRD是定义的一个Kubernetes的CRD,CRD中包含外部服务的各个服务节点的IP信息、服务端口Port信息以及异常判断规则等信息,其中,异常判断规则还可以理解为健康检查规则,异常判断规则中包含判定服务节点是否异常的规则数据。
集群可以使用预先设置的Endpoint-operator将CRD注册到集群中,并在集群中启动与CRD对应的控制器(Controller)。
S102、为自定义资源组件创建资源实例,并使用自定义资源组件的控制器生成与资源实例对应的服务组件和节点列表,所述节点列表用于保存所述外部服务的服务节点的IP地址。
为自定义资源组件创建资源实例(CR),使用自定义资源组件的控制器基于资源实例的信息生成服务组件(Service)和节点列表(Endpoints),进一步的,生成的服务组件和节点列表与资源实例存在关联性,例如使用资源实例的名称为生成的服务组件和节点列表命名。
S103、基于预设的检测周期,调用控制器检测外部服务的各个服务节点,当检测到异常的服务节点时,将异常的服务节点的IP地址从节点列表中删除。
检测周期可以根据实际需求进行设置,例如3天作为一个检测周期,5个小时作为一个检测周期;可以周期性检测外部服务的各个服务节点。
在调用控制器检测外部服务的各个服务节点时,需要先确定外部服务的异常判断规则,具体可以通过资源实例获得,又或者可以通过自定义资源组件获取。
在确定外部服务的异常判断规则后,触发控制器基于异常判断规则检测外部服务的各个服务节点,并将满足异常判断规则的服务节点确定为异常的服务节点。
需要说明的是,需要检测外部服务所有的服务节点,具体可以按照异常判断规则检测服务节点是否异常,示例性的,当服务节点在预设的时间内未响应时,可以确定服务节点满足异常判断规则,又如,当服务节点的状态为掉线或是故障时,可以确定服务节点满足异常判断规则,关于服务节点满足异常判断规则的情况此处不再举例说明。
在服务节点满足异常判断规则时,可以将该服务节点确定为异常的服务节点,在节点列表中存在该异常的服务节点的IP地址时,需要将该异常的服务节点的IP地址从节点列表中删除,从而保证节点列表中不包含异常的服务节点的IP地址。
在一些实施例中,在本公开实施例提供的方法中,在将异常的服务节点的IP地址从节点列表删除后,可以基于异常的服务节点的IP地址, 生成修复提醒信息,并将修复提醒信息发送至预设的运维人员,以提醒运维人员对异常的服务节点进行维护,在一些实施例中,修复提醒信息中包括但不限于异常的服务节点的IP地址、异常情况以及节点的基本信息等。
S104、当接收到集群应用发送的服务访问请求时,在最新的节点列表中确定目标IP地址,并使用服务组件访问外部服务的服务节点中与目标IP地址对应的服务节点。
集群应用为安装在集群上的应用,还可以是集群外的应用,可以使用集群应用访问集群的外服服务。
用户需要访问集群的外部服务时,通过集群应用发送包含外部服务的标识信息的服务访问请求,集群确定该外部服务请求的最新的节点列表,最新的节点列表中的每个IP地址所对应的服务节点都可以正常提供服务,从最新的节点列表中随机选择一个IP地址作为目标IP地址,或是将访问流量最少的IP地址作为目标IP地址,调用与该外部服务对应的资源实例的服务组件访问外部服务的服务节点中与目标IP地址对应的服务节点。
在一些实施例中,在服务组件访问外部服务的服务节点中与目标IP地址对应的服务节点时,可以是向与目标IP地址对应的服务节点发送访问请求,在一些实施例中,访问请求中包含了数据反馈路径;服务节点基于访问请求中的数据反馈路径向集群发送服务数据;集群在接收到服务数据之后,将该服务数据向集群应用发送,由此实现了对外部服务的服务访问。
本公开实施例提供的方法中,确定集群的外部服务,在集群中注册与外部服务对应的自定义资源组件;为自定义资源组件创建资源实例,并使用资源实例的控制器生成与资源实例对应的服务组件和节点列表,节点列表用于保存外部服务的服务节点的IP地址;基于预设的检测周期,调用控制器检测外部服务的各个服务节点,当检测到异常的服务节点时,将异常的服务节点的IP地址从节点列表中删除;当接收到集群应用发送的服务访问请求时,在最新的节点列表中确定目标IP地址,并使用服务组件访问外部服务中与目标IP地址对应的服务节点。通过在集群 中注册外部服务对应的自定义资源组件,将外部服务引入集群,生成对应的资源实例,然后使用与资源实例对应的控制器检测外部服务的服务节点,将检测到的异常的服务节点的IP地址从节点列表中删除,以确保节点列表不包含异常的服务节点的IP地址,有效保证访问外部服务不会出现异常,避免集群出现异常。
本公开实施例提供的方法中,在基于预设的检测周期,调用控制器检测外部服务的各个服务节点后,还可以在节点列表中添加已经修复的服务节点的IP地址,具体过程如图2所示,具体说明如下所述:
S201、生成外部服务当前的节点检查记录。
在对外部服务的所有服务节点检测完成后,会生成外部服务在当前检测周期的节点检查记录,节点检查记录中包含外部服务的所有服务节点的检查结果,服务节点的检查结果可以为异常或是正常。
S202、获取外部服务的历史节点检查记录。
在一些实施例中,历史节点检查记录为外部服务在上一检测周期的节点检查记录。
S203、基于外部服务当前的节点检查记录和历史节点检查记录,确定外部服务的服务节点中是否存在修复的服务节点。
对于当前的节点检查记录中的每个检查结果,确定该检查结果是否表征为正常,当确定该检查结果表征为异常时,将与该检查结果对应的服务节点确定为异常的服务节点,当确定该检查结果表征为正常时,确定与该检查结果对应的服务节点,并在历史节点检查记录中查找属于该服务节点的历史检查结果,当历史检查结果表征为异常时,确定与该检查结果对应的服务节点为修复的服务节点;进一步的,有一种情况是历史节点检查记录中没有查找到属于该服务节点的历史检查结果,此时表明该服务节点为新增至外部服务的节点,在该服务节点的检查结果为正常时,可以将该服务节点的IP地址添加至节点列表。
S204、当确定外部服务服务节点中存在修复的服务节点时,将该修复的服务节点的IP地址添加至节点列表中。
本公开通过外部服务当前的节点检查记录和历史节点检查记录,可以有效的确定是否存在需要添加至节点列表中的IP地址,当存在时,将 该IP地址添加至节点列表中,由此,本公开不仅可以剔除异常的服务节点的IP地址,还可以添加恢复正常的服务节点的IP地址,由此可以保证节点列表中持续存在可使用的IP地址,进一步确保集群可以对外部服务进行访问,保证集群的稳定运行。
参照图3,为本公开实施例提供的一种服务访问方法的场景示例图,如图所示,集群可以为K8s集群302,集群应用3022可以为集群内的应用,也可以是集群外的应用,集群应用3022可以为应用程序(Application);图中的黑色实线的流程(包括S3001,S3002,S3003)说明了将外部服务304引入集群的过程,图中的黑色虚线和点划线的流程(包括S3004)说明了将外部服务304引入集群后,集群应用访问外部服务304的过程。外部服务304可以包括服务节点1、服务节点2、服务节点3等等。需要说明的是,图中的服务组件3024可以使用Service表示,节点列表3026可以使用Endpoints表示,自定义资源组件3028可以使用CRD表示。集群应用3022可以通过集群的Service来访问引入到集群内的外部服务,在实现了负载均衡的同时,还实现了高可用。Endpoint-operator 30210对外部服务304进行健康检查,例如检查外部服务中是否存在异常的服务节点。
参照图4,为本公开实施例提供的一种服务访问方法的时序图,如图所示,集群应用402向K8s集群404提供yaml文件4022,例如可以为kubectl apply cy.yaml,可以使集群支持yaml格式管理资源对象。Endpoint-operator 406启动(S4002)后,向K8s集群404中注册CRD(S4004),CRD中包含外部服务的节点IP,服务端口Port,健康检查方式等;Endpoint-operator在将CRD注册到Kubernetes中后,可启动对应的控制器(Controller),基于CRD创建一个资源实例(CR)(S4006),由Controller根据CR生成同名的Service及Endpoints(S4008),将Service及Endpoints设置在K8s中(S4010);Endpoint-operator还可根据CR定义,周期性地对集群外服务执行健康检查(S4012),即检查外部服务中的各个服务节点中是否存在异常(S4014),根据检查结果更新CR的状态和Endpoints(S4016),并更新K8s中的CR资源以及Endpoints资源(S4018)。在一些实施例中,当外部服务中某个服务节点故障时, Endpoint-operator通过周期性健康检查探测到故障节点,并更新CR及Endpoints,从Endpoints中剔除故障的服务节点的IP。Application在通过Service访问外部服务时,流量就不会到达故障节点,从而避免发生异常。当故障节点修复后,Endpoint-operator同样会感知到,并更新CR及Endpoints,在Endpoints中加回修复后的故障节点IP,使其能够继续承载服务访问流量。
应用本公开提供的方法,基于CRD将集群外服务引入Kubernetes集群内,可以在集群的外部服务单点或多点故障时,集群可以访问外部服务中正常的服务节点,从而不影响集群内的服务依赖方的正常运行,确保集群可以正常运行;在一些实施例中,本公开也可以作为一种基于Kubernetes的反向代理方案,为各种服务应用提供高可用解决方案。
与图1相对应的,本公开实施例还提供一种服务访问装置,该装置用于支持图1所示的方法具体的实现,该装置可以应用在集群中,参照图5,为本公开实施例提供的该装置的结构示意图,具体说明如下所述:
第一确定单元501,用于确定集群的外部服务,在所述集群中注册与所述外部服务对应的自定义资源组件;
创建单元502,用于为所述自定义资源组件创建资源实例,并使用所述自定义资源组件的控制器生成与所述资源实例对应的服务组件和节点列表,所述节点列表用于保存所述外部服务的服务节点的IP地址;
检测单元503,用于基于预设的检测周期,调用所述控制器检测所述外部服务的各个服务节点,当检测到异常的服务节点时,将异常的服务节点的IP地址从所述节点列表中删除;
访问单元504,用于当接收到集群应用发送的服务访问请求时,在最新的节点列表中确定目标IP地址,并使用所述服务组件访问所述外部服务的服务节点中与所述目标IP地址对应的服务节点。
本公开实施例提供的装置中,确定集群的外部服务,在集群中注册与外部服务对应的自定义资源组件;为自定义资源组件创建资源实例,并使用资源实例的控制器生成与资源实例对应的服务组件和节点列表,节点列表用于保存外部服务的服务节点的IP地址;基于预设的检测周期,调用控制器检测外部服务的各个服务节点,当检测到异常的服务节 点时,将异常的服务节点的IP地址从节点列表中删除;当接收到集群应用发送的服务访问请求时,在最新的节点列表中确定目标IP地址,并使用服务组件访问外部服务中与目标IP地址对应的服务节点。通过在集群中注册外部服务对应的自定义资源组件,将外部服务引入集群,生成对应的资源实例,然后使用与资源实例对应的控制器检测外部服务的服务节点,将检测到的异常的服务节点的IP地址从节点列表中删除,以确保节点列表不包含异常的服务节点的IP地址,有效保证访问外部服务不会出现异常,避免集群出现异常。
在本公开提供的另一实施例中,该装置的检测单元503,包括:
确定子单元,用于确定所述外部服务的异常判断规则;
触发子单元,用于触发所述控制器基于所述异常判断规则检测所述外部服务的各个服务节点,并将满足所述异常判断规则的服务节点确定为异常的服务节点。
在本公开提供的另一实施例中,该装置还包括:
第一生成单元,用于生成所述外部服务当前的节点检查记录;
获取单元,用于获取所述外部服务的历史节点检查记录;
第二确定单元,用于基于所述外部服务当前的节点检查记录和历史节点检查记录,确定所述外部服务的服务节点中是否存在修复的服务节点;
添加单元,用于当确定所述外部服务的服务节点中存在修复的服务节点时,将该修复的服务节点的IP地址添加至所述节点列表中。
在本公开提供的另一实施例中,该装置还包括:
第二生成单元,用于基于异常的服务节点的IP地址,生成修复提醒信息;
第一发送单元,用于发送所述修复提醒信息,以提醒预设的运维人员对异常的服务节点进行维护。
在本公开提供的另一实施例中,该装置还包括:
接收单元,用于接收所述外部服务的服务节点中与所述目标IP地址对应的服务节点发送的服务数据;
第二发送单元,用于将所述服务数据向所述集群应用发送。
本公开实施例还提供了一种存储介质,所述存储介质包括存储的指令,其中,在所述指令运行时控制所述存储介质所在的设备执行上述服务访问方法。
本公开实施例还提供了一种电子设备,其结构示意图如图6所示,具体包括存储器601,以及一个或者一个以上的指令602,其中一个或者一个以上指令602存储于存储器601中,且经配置以由一个或者一个以上处理器603执行所述一个或者一个以上指令602执行上述服务访问方法。
上述各个实施例的具体实施过程及其衍生方式,均在本公开的保护范围之内。
本说明书中的各个实施例均采用递进的方式描述,各个实施例之间相同相似的部分互相参见即可,每个实施例重点说明的都是与其他实施例的不同之处。尤其,对于系统或系统实施例而言,由于其基本相似于方法实施例,所以描述得比较简单,相关之处参见方法实施例的部分说明即可。以上所描述的系统及系统实施例仅仅是示意性的,其中所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部模块来实现本实施例方案的目的。本领域普通技术人员在不付出创造性劳动的情况下,即可以理解并实施。
专业人员还可以进一步意识到,结合本文中所公开的实施例描述的各示例的单元及算法步骤,能够以电子硬件、计算机软件或者二者的结合来实现,为了清楚地说明硬件和软件的可互换性,在上述说明中已经按照功能一般性地描述了各示例的组成及步骤。这些功能究竟以硬件还是软件方式来执行,取决于技术方案的特定应用和设计约束条件。专业技术人员可以对每个特定的应用来使用不同方法来实现所描述的功能,但是这种实现不应认为超出本公开的范围。
对所公开的实施例的上述说明,使本领域专业技术人员能够实现或使用本公开。对这些实施例的多种修改对本领域的专业技术人员来说将是显而易见的,本文中所定义的一般原理可以在不脱离本公开的精神或范围的情况下,在其它实施例中实现。因此,本公开将不会被限制于本 文所示的这些实施例,而是要符合与本文所公开的原理和新颖特点相一致的最宽的范围。

Claims (10)

  1. 一种服务访问方法,其中,包括:
    确定集群的外部服务,在所述集群中注册与所述外部服务对应的自定义资源组件;
    为所述自定义资源组件创建资源实例,并使用所述自定义资源组件的控制器生成与所述资源实例对应的服务组件和节点列表,所述节点列表用于保存所述外部服务的服务节点的IP地址;
    基于预设的检测周期,调用所述控制器检测所述外部服务的各个服务节点,当检测到异常的服务节点时,将异常的服务节点的IP地址从所述节点列表中删除;
    当接收到集群应用发送的服务访问请求时,在最新的节点列表中确定目标IP地址,并使用所述服务组件访问所述外部服务的服务节点中与所述目标IP地址对应的服务节点。
  2. 根据权利要求1所述的方法,其中,所述调用所述控制器检测所述外部服务的各个服务节点,包括:
    确定所述外部服务的异常判断规则;
    触发所述控制器基于所述异常判断规则检测所述外部服务的各个服务节点,并将满足所述异常判断规则的服务节点确定为异常的服务节点。
  3. 根据权利要求1所述的方法,其中,还包括:
    生成所述外部服务当前的节点检查记录;
    获取所述外部服务的历史节点检查记录;
    基于所述外部服务当前的节点检查记录和历史节点检查记录,确定所述外部服务的服务节点中是否存在修复的服务节点;
    当确定所述外部服务的服务节点中存在修复的服务节点时,将该修复的服务节点的IP地址添加至所述节点列表中。
  4. 根据权利要求1所述的方法,其中,还包括:
    基于异常的服务节点的IP地址,生成修复提醒信息;
    发送所述修复提醒信息,以提醒预设的运维人员对异常的服务节点进行维护。
  5. 根据权利要求1所述的方法,其中,还包括:
    接收所述外部服务的服务节点中与所述目标IP地址对应的服务节点发送的服务数据;
    将所述服务数据向所述集群应用发送。
  6. 一种服务访问装置,其中,包括:
    第一确定单元,用于确定集群的外部服务,在所述集群中注册与所述外部服务对应的自定义资源组件;
    创建单元,用于为所述自定义资源组件创建资源实例,并使用所述自定义资源组件的控制器生成与所述资源实例对应的服务组件和节点列表,所述节点列表用于保存所述外部服务的服务节点的IP地址;
    检测单元,用于基于预设的检测周期,调用所述控制器检测所述外部服务的各个服务节点,当检测到异常的服务节点时,将异常的服务节点的IP地址从所述节点列表中删除;
    访问单元,用于当接收到集群应用发送的服务访问请求时,在最新的节点列表中确定目标IP地址,并使用所述服务组件访问所述外部服务的服务节点中与所述目标IP地址对应的服务节点。
  7. 根据权利要求6所述的装置,其中,所述检测单元,包括:
    确定子单元,用于确定所述外部服务的异常判断规则;
    触发子单元,用于触发所述控制器基于所述异常判断规则检测所述外部服务的各个服务节点,并将满足所述异常判断规则的服务节点确定为异常的服务节点。
  8. 根据权利要求6所述的装置,其中,还包括:
    第一生成单元,用于生成所述外部服务当前的节点检查记录;
    获取单元,用于获取所述外部服务的历史节点检查记录;
    第二确定单元,用于基于所述外部服务当前的节点检查记录和历史节点检查记录,确定所述外部服务的服务节点中是否存在修复的服务节点;
    添加单元,用于当确定所述外部服务的服务节点中存在修复的服务节点时,将该修复的服务节点的IP地址添加至所述节点列表中。
  9. 一种存储介质,其中,所述存储介质包括存储的指令,其中,在 所述指令运行时控制所述存储介质所在的设备执行如权利要求1-5任意一项所述的服务访问方法。
  10. 一种电子设备,其中,包括存储器,以及一个或者一个以上的指令,其中一个或者一个以上指令存储于存储器中,且经配置以由一个或者一个以上处理器执行如权利要求1-5任意一项所述的服务访问方法。
PCT/CN2023/091101 2022-10-13 2023-04-27 服务访问方法及装置、存储介质及电子设备 WO2024077930A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202211252756.6 2022-10-13
CN202211252756.6A CN115580658A (zh) 2022-10-13 2022-10-13 一种服务访问方法及装置、存储介质及电子设备

Publications (1)

Publication Number Publication Date
WO2024077930A1 true WO2024077930A1 (zh) 2024-04-18

Family

ID=84584363

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2023/091101 WO2024077930A1 (zh) 2022-10-13 2023-04-27 服务访问方法及装置、存储介质及电子设备

Country Status (2)

Country Link
CN (1) CN115580658A (zh)
WO (1) WO2024077930A1 (zh)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115580658A (zh) * 2022-10-13 2023-01-06 京东科技信息技术有限公司 一种服务访问方法及装置、存储介质及电子设备

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20220131852A1 (en) * 2020-10-23 2022-04-28 EMC IP Holding Company LLC Dynamically unifying disparate user interface applications in a cloud native environment
CN115580658A (zh) * 2022-10-13 2023-01-06 京东科技信息技术有限公司 一种服务访问方法及装置、存储介质及电子设备

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20220131852A1 (en) * 2020-10-23 2022-04-28 EMC IP Holding Company LLC Dynamically unifying disparate user interface applications in a cloud native environment
CN115580658A (zh) * 2022-10-13 2023-01-06 京东科技信息技术有限公司 一种服务访问方法及装置、存储介质及电子设备

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
HANYOUQING: "Prometheus Operator - How to monitor an external service", SEGMENTFAULT, 21 April 2019 (2019-04-21), XP093158678, Retrieved from the Internet <URL:https://segmentfault.com/a/1190000018940961> *
MIKAILANGJIYANG: " Amazing Operation, Endpoints Outside K8s Clusters Can Also Change Dynamically", CSDN BLOG, 20 June 2020 (2020-06-20), XP093158676, Retrieved from the Internet <URL:https://blog.csdn.net/alex_yangchuansheng/article/details/122646357> *

Also Published As

Publication number Publication date
CN115580658A (zh) 2023-01-06

Similar Documents

Publication Publication Date Title
US10044551B2 (en) Secure cloud management agent
US11269718B1 (en) Root cause detection and corrective action diagnosis system
US8181071B2 (en) Automatically managing system downtime in a computer network
WO2020083189A1 (zh) 一种请求处理方法、装置及api网关和可读存储介质
WO2024077930A1 (zh) 服务访问方法及装置、存储介质及电子设备
EP2234331A1 (en) Network topology
WO2017215430A1 (zh) 一种集群内的节点管理方法及节点设备
US11088931B2 (en) Network speed detection
US20200249845A1 (en) Operation Data Accessing Device And Accessing Method Thereof
US11700255B2 (en) Feedback framework
US7093163B2 (en) Processing takeover method in multiple computer system
CN111782456B (zh) 异常检测方法、装置、计算机设备和存储介质
WO2021213171A1 (zh) 一种服务器切换方法、装置、管理节点及存储介质
US10185613B2 (en) Error determination from logs
US11593669B1 (en) Systems, methods, and apparatuses for detecting and creating operation incidents
US11422882B1 (en) Systems, methods, and apparatuses for determining causality for anomalies and/or events
US7724659B2 (en) Network-based autodiscovery system for MAC forwarding dispatcher
WO2023125755A1 (zh) 基于大规模集群的服务请求处理方法、装置、设备及介质
Smart The big picture
US9172584B1 (en) Method and system for high-availability cluster data protection
CN112583951B (zh) 应用层双活方法、装置、设备及存储介质
US8595349B1 (en) Method and apparatus for passive process monitoring
CN112882771A (zh) 应用系统的服务器切换方法及装置、存储介质及电子设备
CN107113074B (zh) 管理通信端点的系统、方法和非暂态计算机可用介质
CN117041350A (zh) 访问请求处理方法、装置、计算机设备和存储介质

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 23876141

Country of ref document: EP

Kind code of ref document: A1