[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN114244696B - Deployment method and configuration platform of configuration information - Google Patents

Deployment method and configuration platform of configuration information Download PDF

Info

Publication number
CN114244696B
CN114244696B CN202111315991.9A CN202111315991A CN114244696B CN 114244696 B CN114244696 B CN 114244696B CN 202111315991 A CN202111315991 A CN 202111315991A CN 114244696 B CN114244696 B CN 114244696B
Authority
CN
China
Prior art keywords
configuration information
configuration
inherited
target
color block
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202111315991.9A
Other languages
Chinese (zh)
Other versions
CN114244696A (en
Inventor
陈彧晖
庄东梅
李江浩
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wangsu Science and Technology Co Ltd
Original Assignee
Wangsu Science and Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wangsu Science and Technology Co Ltd filed Critical Wangsu Science and Technology Co Ltd
Priority to CN202111315991.9A priority Critical patent/CN114244696B/en
Publication of CN114244696A publication Critical patent/CN114244696A/en
Application granted granted Critical
Publication of CN114244696B publication Critical patent/CN114244696B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0803Configuration setting
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0889Techniques to speed-up the configuration process

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The application discloses a deployment method and a configuration platform of configuration information, wherein the method is applied to the configuration platform and comprises the following steps: reading target configuration information, wherein part or all configuration items in the target configuration information are inherited from inherited configuration information; respectively generating color block identifiers corresponding to each configuration item in the target configuration information, and displaying the corresponding color block identifiers at the configuration items in the target configuration information; for any target configuration item in the target configuration information, if the color block identifier of the target configuration item is consistent with the color block identifier of the corresponding configuration item in the inherited configuration information, the target configuration item in the target configuration information is characterized to be completely inherited from the corresponding configuration item in the inherited configuration information. The technical scheme provided by the application can improve the deployment efficiency of the configuration information.

Description

Deployment method and configuration platform of configuration information
Technical Field
The application relates to the technical field of internet, in particular to a configuration information deployment method and a configuration platform.
Background
The content delivery network (Content Delivery Network, CDN) is an intelligent virtual network built on the basis of the existing network, and provides acceleration service for resources accessed by users by virtue of edge servers deployed in various places, so that the users can acquire required content nearby. The acceleration service for the resources is realized by means of configuration information of each resource deployed in the CDN network, and the configuration information includes, for example, a domain name, a service type, an acceleration area, acceleration content, an operator, and the like, which need acceleration.
With the increase of network nodes, configuration information to be deployed is also increased, and if detailed configuration information is to be deployed for each server, considerable manpower and material resources are consumed. At the same time, if the configuration information needs to be updated, the amount of data that needs to be processed is also quite large. Thus, there is a need for a more efficient deployment of configuration information.
Disclosure of Invention
The application aims to provide a configuration information deployment method and a configuration platform, which can improve the deployment efficiency of configuration information.
In order to achieve the above object, an aspect of the present application provides a method for deploying configuration information, where the method is applied to a configuration platform, and the method includes: reading target configuration information, wherein part or all configuration items in the target configuration information are inherited from inherited configuration information; respectively generating color block identifiers corresponding to each configuration item in the target configuration information, and displaying the corresponding color block identifiers at the configuration items in the target configuration information; for any target configuration item in the target configuration information, if the color block identifier of the target configuration item is consistent with the color block identifier of the corresponding configuration item in the inherited configuration information, the target configuration item in the target configuration information is characterized to be completely inherited from the corresponding configuration item in the inherited configuration information.
In order to achieve the above object, another aspect of the present application further provides a configuration platform, where the configuration platform includes a memory and a processor, where the memory is configured to store a computer program, and when the computer program is executed by the processor, the method for deploying configuration information is implemented.
From the above, the technical solutions provided by one or more embodiments of the present application can selectively inherit the configuration information to be deployed from the inherited configuration information, thereby simplifying complexity of deploying each configuration information one by one and improving deployment efficiency of the configuration information. Further, the configuration information can include a plurality of different configuration items, and in order to measure whether each configuration item is the same, the characteristics of the configuration items can be intuitively represented by adopting a color block identification mode. Specifically, the color block identifier of the configuration item can be displayed at the configuration item, so that whether the configuration item is consistent in the target configuration information and the inherited configuration information can be quickly identified by comparing the color block identifiers of the same configuration item in the target configuration information and the inherited configuration information. In the deployment process of the configuration information, whether the target configuration information is the same as the inherited configuration information or not is converted into the comparison process of the color block identification, so that the deployment process of the configuration information can be greatly simplified, the update efficiency of the configuration information is further improved, and the edge server can be ensured to provide services stably.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings that are needed in the description of the embodiments will be briefly described below, it being obvious that the drawings in the following description are only some embodiments of the present application, and that other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
FIG. 1 is a schematic diagram of a deployment procedure of configuration information in an embodiment of the present application;
FIG. 2 is a schematic diagram of configuration information in an embodiment of the present application;
FIG. 3 is a flow chart of inheritance of configuration information in an embodiment of the application;
FIG. 4 is a schematic diagram of color patch identification in an embodiment of the present application;
FIG. 5 is a schematic diagram of color block identification of inherited configuration information in an embodiment of the application;
FIG. 6 is a schematic diagram of color block identification of target configuration information in an embodiment of the application;
fig. 7 is a schematic diagram of an IP address set corresponding to a constraint in an embodiment of the present application;
fig. 8 is a schematic structural diagram of a configuration platform according to an embodiment of the present application.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the technical solutions of the present application will be clearly and completely described below in conjunction with the detailed description of the present application and the corresponding drawings. It will be apparent that the described embodiments are only some, but not all, of the embodiments of the application. All other embodiments, which can be made by those skilled in the art based on the embodiments of the present application without making any inventive effort, are intended to fall within the scope of the present application.
The application provides a deployment method of configuration information, which can be applied to a configuration platform. Referring to fig. 1, the method may include the following steps.
S1: and reading target configuration information, wherein part or all configuration items in the target configuration information are inherited from the inherited configuration information.
In this embodiment, the domain name configuration is illustrated in the CDN network, for example, when the configuration information is domain name configuration information, the configuration platform may deploy the domain name configuration information to the edge server according to the method, so that the edge server provides an acceleration service for each domain name according to the configuration information corresponding to each domain name. Corresponding configuration information can be deployed in the edge server aiming at different application scenes. For example, for a domain name resolution scenario, configuration information for performing domain name resolution may be deployed. For another example, for a resource scheduling scenario, configuration information for performing resource scheduling may be deployed. In the configuration information, a plurality of different configuration items may be included.
In this embodiment, the configuration items in the configuration information may be represented in different manners according to the functions to be implemented. For example, the configuration items may include matching conditions, filtering operators, available judgment operators, priority operators, selection operators, and the like. Wherein, the matching condition can be represented by M, the screening operator can be represented by C, the judging operator can be represented by A, the priority operator can be represented by P, and the selecting operator can be represented by S. The filtering operator, the judging operator, the priority operator and the selecting operator can be collectively called as an execution strategy, so that the matching condition and the execution strategy can form an MCAPS record, and a plurality of MCAPS records can be included in the configuration information.
Taking the scenario of domain name resolution as an example, for a target domain name, the configuration information may be as shown in fig. 2. In this configuration information, four MCAPS records may be included. Wherein the matching condition in each MCAPS record may comprise at least one of a geographical location (region), an autonomous domain (autonomous system, as), an operator (isppgroup). For example, in the first MCAPS record, the geographical location and the operator's restrictions may be included, while in the second through fourth MCAPS records, only the geographical location restrictions may be included. Of course, in practical applications, the MCAPS record may not include any constraint, in which case, the MCAPS record may serve any IP address field where the client is located or the IP address of the recursive server.
In practical applications, to simplify the deployment process of the configuration information, the configuration information to be deployed may be inherited from the inherited configuration information. Wherein part of the content or the whole content of the configuration item can be selectively inherited. For example, in an application scenario, in the configuration information of the edge server, the filtering operator may inherit from the inherited configuration information, while other configuration items may not inherit. This flexible inheritance approach makes it possible that only a portion of the same configuration items exist in the configuration information in the edge server as in the inherited configuration information.
In carrying out inheritance of the configuration information, in the configuration information of the edge server, an information identifier of the inherited configuration information may be carried, where the information identifier is used to characterize an identity of the inherited configuration information, for example, when the inherited configuration information is a domain name, the information identifier may be a domain name identifier. For example, most domain names may have basic configuration information, while some domain names may have adjustments to the basic configuration information for some particular regions. In view of this, a domain name final configuration information may be generated by inheritance.
Specifically, referring to fig. 3, when configuration information is set for a target domain name, the configuration information of the target domain name includes at least one domain name identifier of an inherited domain name; the domain name identification points to configuration information of the inherited domain name.
For example, in the configuration information of the target domain name, the following may be used: in this manner, xxx.com ", reference is made to inherited domain names. Where xxx.com is the domain name identity of the inherited domain name, parent may represent xxx.com as the inherited domain name. The actual configuration information of the inherited domain name can be queried upwards through the domain name identification of the inherited domain name. Of course, the configuration information of the inherited domain name may still include the domain name identifier of the inherited domain name of the previous level. By means of the layer-by-layer upward query mode, detailed configuration information can be queried finally. The domain name identifier may be an information identifier of inherited configuration information.
In practical applications, when setting configuration information for a target domain name, initial configuration information may be set first, and the domain name may select whether to inherit the configuration information from another domain name (inherited domain name). If the configuration information can be inherited from the inherited domain name, when the policy element is missing in the configuration information of a certain target domain name, the missing policy element can be inherited from the configuration information corresponding to the inherited domain name in the policy inheritance relationship. The policy element may be any element in MCAPS. When inheriting the missing policy element from the inherited domain name, a conflict may occur with other policy elements that exist themselves. In this case, the conflicting policy elements may be processed in a preset manner. For example, the filter operator C may collide, in which case, if the policy element inherited is a filter operator, the filter operator in the configuration information of the inherited domain name is reloaded (override) as the filter operator in the configuration information of the target domain name. Of course, depending on the application scenario, when the policy element is inherited, the methods of intersection (intersection), union (unit) and the like may be adopted, and are not limited to the heavy load method.
In one embodiment, if the missing policy element does not exist in the configuration information corresponding to the inherited domain name, the missing policy element may be inherited from a global default rule. By means of the step-by-step upward inheritance mode, it can be ensured that all required policy elements can be obtained from the configuration information of the domain name.
After inheriting the content of the configuration item from the inherited configuration information to form new configuration information, if some personalized settings need to be performed on the new configuration information, the corresponding configuration item can be directly added or modified in the new configuration information, and the inherited configuration information is not affected in the process, so that the customization and personalized configuration of the configuration information are increased. In addition, if the content in the inherited configuration information is changed, for example, some configuration items in the inherited configuration information are optimized, and the changed content is inherited into new configuration information, then the changed content in the new configuration information is changed accordingly, so if a plurality of configuration information with inherited relationships are required to be uniformly changed, only the content of the inherited configuration information is required to be changed, the changed content can be effective for the configuration items in other configuration information with inherited relationships according to the inherited relationships, the configuration information of inheritors is not required to be changed one by one, the complexity of configuration information deployment is simplified, and the deployment efficiency is improved.
S3: respectively generating color block identifiers corresponding to each configuration item in the target configuration information, and displaying the corresponding color block identifiers at the configuration items in the target configuration information; for any target configuration item in the target configuration information, if the color block identifier of the target configuration item is consistent with the color block identifier at the corresponding position in the inherited configuration information, the target configuration item in the target configuration information is characterized to be completely inherited from the inherited configuration information.
In this embodiment, in order to identify whether the content of the configuration item in the target configuration information is consistent with the content of the configuration item in the inherited configuration information, the color patch identifications corresponding to the configuration items in the target configuration information may be generated respectively, and similarly, the color patch identifications corresponding to the configuration items in the inherited configuration information may be generated respectively in the same manner.
Specifically, each configuration item corresponds to an actual configuration string, and the configuration string can define information such as functions adopted by the configuration item, parameters corresponding to the configuration item, and the like. The configuration string may be converted to a corresponding hash string by a hashing algorithm. For example, the MD5 value of the configuration string may be calculated. After the hash character string is obtained, the hash character string can be divided into a specified number of fields, and each field is respectively converted into different components in the color block identifier so as to form the color block identifier corresponding to the configuration item.
For example, a hash string may be represented as 6efc736f308149 eedb2 bc1f8c230042, which may be divided into six fields, respectively: 6efc73, 6f3081, 49eeda, b2bc1f, 8c2300, and 42, which can be converted into different components in the color patch identification, respectively.
In practical applications, the color block mark may be represented in the manner shown in fig. 4, and in the color block mark, the following six components may be included:
a background color of the first region;
a background color of the second region;
a first text filled in the first area and a second text filled in the second area;
the color of the first text;
the color of the second text;
line color for defining the outer contour of the first and second regions.
In fig. 4, the left rectangle may be a first region, the right rectangle may be a second region, the background color of the first region may be determined by 6efc73, and the color of the first text within the first region may be determined by 6f 3081. The background color of the second region may be determined by 49eeda and the color of the second text within the second region may be determined by b2bc1 f. The line color of the outer contour line (thicker rectangular line) can be determined by 8c 2300. The first text may be 4 and the second text may be 2.
Thus, in the manner described above, the hash string may ultimately be characterized by the color patch identification. For each configuration item, the representation may be made in this way. In addition, for the whole configuration information, a color block identifier of the whole configuration information can be generated in such a way that the whole color block identifier is generated for the target configuration information, and if the whole color block identifier of the target configuration information is consistent with the whole color block identifier of the inherited configuration information, the target configuration information is characterized to be completely inherited from the inherited configuration information.
Subsequently, by comparing the color block identifiers of the configuration items one by one, whether the contents of the two configuration items are consistent can be determined. And if the color block identification of the target configuration item is consistent with the color block identification at the corresponding position in the inherited configuration information, the target configuration item in the target configuration information is characterized to be completely inherited from the inherited configuration information. Correspondingly, if any component in the color block identifier of the target configuration item is inconsistent with the corresponding component of the color block identifier of the corresponding configuration item in the inherited configuration information, the target configuration item in the target configuration information is characterized as being different from the corresponding configuration item inherited from the inherited configuration information.
For example, fig. 5 and 6 show color block identifiers of a corresponding configuration item filter operator (candidate), an available judgment operator (available), and a priority operator (priority) in the inherited configuration information and the target configuration information, respectively, and by comparing color block identifiers of respective operators of the same configuration item in the inherited configuration information and the target configuration information, it can be judged that the filter operator of the target configuration information is not completely inherited from the inherited configuration information, that is, the configuration item "filter operator" of the target configuration information is different from the configuration item "filter operator" of the inherited configuration information, and the configuration item "available judgment operator" of the target configuration information "and the priority operator" are all completely inherited from the configuration item corresponding to the inherited configuration information.
In one embodiment, the configuration string of the configuration item is typically represented in JSON format, which typically includes multiple sets of key-value pairs. Since the arrangement order of the key value pairs in the configuration string is not explicitly specified, the calculated hash strings may be different due to the different arrangement order of the key value pairs. For example, the configuration string of the inherited configuration information is { "a":20, "b":30}, and the configuration string of the target configuration information is { "b":30, "a":20}, which are identical in practice, except that the calculated hash strings are different due to the different arrangement order of key value pairs, and thus the generated color patch identifications are also different.
In view of this, in the present embodiment, it is necessary to format the configuration string before calculating the hash string, and unify the arrangement order of key value pairs therein. Specifically, the arrangement order of keys may be set in advance. For example, the keys may be arranged in an order from a to z, and then for the configuration string { "b":30, "a":20}, as described above, the configuration string { "a":20, "b":30}, may be ordered in the order of the pre-specified keys to generate a formatted configuration string { "a":20 }. By the ordering mode, configuration character strings with consistent contents can be ensured, and after formatting is carried out, the calculated hash character strings are consistent, so that misjudgment is avoided.
It can be seen that a plurality of different configuration items can be included in the configuration information, and in order to measure whether each configuration item is the same, the characteristics of the configuration items can be visually represented by adopting a color block identification mode. Specifically, the color block identifier of the configuration item can be displayed at the configuration item, so that whether the configuration item is consistent in the target configuration information and the inherited configuration information can be quickly identified by comparing the color block identifiers of the same configuration item in the target configuration information and the inherited configuration information. In the deployment process of the configuration information, the comparison of the configuration information is converted into the comparison of the color block identifiers, so that the deployment process of the configuration information can be greatly simplified, the update efficiency of the configuration information is further improved, and the edge server can be ensured to provide services stably.
Based on the inheritance mode of the configuration information and the characterization mode of the color block identification, whether the configuration items with identical contents exist in the two configuration information can be rapidly determined under the condition of simplifying the configuration information deployment difficulty, so that an efficient basis is provided for subsequent configuration information updating.
In a specific application example, the configuration information of the accelerated domain name may be deployed in the edge server in the manner described above, and domain name resolution may be performed based on the deployed configuration information.
In this embodiment, the domain name resolution server may configure corresponding configuration information for the target domain name according to the foregoing manner, so that after receiving the domain name resolution request, the domain name resolution server may identify the configuration information corresponding to the domain name to be resolved according to the domain name to be resolved included in the domain name resolution request. In the configuration information, each constraint within the matching condition may correspond to a set of IP addresses. For example, for a defined condition of a geographic location, it is the set of individual IP addresses that are located within the geographic location that corresponds. One or more limiting conditions in the matching conditions can correspond to one or more IP address sets, and the IP address set corresponding to the intersection of the limiting conditions can be used as the IP address set limited by the matching conditions. For example, in fig. 7, the set of IP addresses in the shaded portion of fig. 7 can be obtained from the intersection of three constraints, geographic location, autonomous domain, and operator.
The set of IP addresses defined by the matching condition may be used as a reference basis for whether the matching condition is applicable to the current domain name resolution request. Specifically, if the domain name resolution request includes an IP address field where the client is located, and the IP address field where the client is located in the IP address set defined by the matching condition, then the matching condition is indicated to be applicable to the current domain name resolution request. For another example, if the IP address of the recursive server is in the set of IP addresses defined by the matching condition, the matching condition is also indicated to be applicable to the current domain name resolution request, provided that the domain name resolution request does not carry the IP address segment where the client is located, but carries the IP address of the recursive server in the domain name resolution process.
In the configuration information, each piece of MCAPS record may have a certain arrangement sequence, and when judging a matching condition applicable to the domain name resolution request, it may sequentially judge whether the IP address of the recursive server or the IP address field where the client is located in the IP address set defined by the current matching condition according to the arrangement sequence. If the matching condition is located, the current matching condition can be used as a target matching condition matched with the domain name resolution request.
For example, in fig. 2, the domain name resolution request carries the IP address of the recursive server, which is located in the Xiamen and which is served by the telecommunications. Thus, the domain name resolution request hits the first MCAPS record, and the matching condition in the first MCAPS record is the matching condition for the adaptation.
In this embodiment, after determining the target matching condition adapted to the domain name resolution request, a corresponding resource node may be allocated to the domain name resolution request according to the target execution policy bound to the target matching condition.
Specifically, the target execution policy may include four operators, such as CAPS, where each operator may undergo respective processing, so as to finally obtain which resource node should be fed back to the domain name resolution request.
Wherein, the filtering operator C (candidate) can generate a candidate list according to the matching condition, and the candidate list comprises candidate resource nodes determined from a resource node pool. A plurality of defined conditions in the matching conditions may be passed to the screening operator by an expression. In this expression, two kinds of arithmetic logic of "or" and "may be included. Different arithmetic logic may be represented in different forms. For example, a particular expression may be expressed as:
[[“sr:as.xm”,“sr:as.tw”],[“app:cs”]]
where sr: as.xm may define the geographical location "Xiamen" and sr: as.tw may define the geographical location "taiwan", the two geographical locations being located in the same bracket, and the bracket being the bracket of the innermost layer, the selection relationship between the two geographical locations may be "or". app:cs denotes a cache server. It can be seen that the innermost brackets define the geographic location and server type, respectively, and that the brackets in the two groups may be in an "and" relationship. That is, by the above expression, it is necessary to screen out the cache server located in Xiamen or Taiwan.
In this embodiment, each resource node may have a tag (tag) corresponding to itself, where the tag may represent a geographic location where the resource node is located, an operator supported by the resource node, a server type corresponding to the resource node, and so on. By comparing the above expression with the labels of the respective resource nodes, resource nodes conforming to the above expression can be screened out.
In practical applications, the expression may also have more forms, for example, a "no" expression may be adopted. By marking the condition with a label of "" to "", it can be shown that other resource nodes except the resource node defined by the condition can be used as the resource node for providing service. For example, an expression with a "-" label may be expressed as:
[[“~sr:as.cn.fj.xm”,“sr:as.cn.fj”],[“app:cs”]]
the expression represents a cache server (app: cs) of other fowls provinces (cn.fj) except for the Xiamen (cn.fj.xm).
It can be seen that, based on the screening operator, a candidate list can be generated in which candidate resource nodes determined from a pool of resource nodes can be included. The candidate list obtained in the above example includes resource nodes of cache servers in Xiamen or Taiwan.
In this embodiment, after determining candidate resource nodes based on the filtering operator, whether each candidate resource node is Available may be determined according to the Available determining operator a (Available). In particular, the availability judgment operator may identify producers associated with a candidate resource node and, in the event that each of the producers is available, judge that the candidate resource node is available. The producer associated with the candidate resource node may refer to a router/switch connected to the candidate resource node, a machine room where the candidate resource node is located, an access point cluster where the candidate resource node is located, and so on. To ensure availability of a candidate resource node, it may be determined that the candidate resource node is available when both of these associated producers are available.
In this embodiment, after determining available candidate resource nodes, the Priority of each candidate resource node may be determined according to a Priority operator P (Priority), so that one of the available candidate resource nodes is allocated to the domain name resolution request based on the determined Priority.
In practical applications, the domain name resolution request may carry an IP address field where the client is located, or may not carry an IP address field where the client is located, but carries an IP address of a recursive server that is in communication with the client. Based on different IP addresses, clusters of different candidate resource nodes may be obtained. For example, for a domain name resolution request carrying an IP address of a client, an available candidate resource node may be obtained through accurate node probing, or a matching candidate resource node may be obtained only through identification of a geographic location. The manner of accurate node detection can be recorded as PROBE, and the manner of geographic location based identification can be recorded as GEO. Thus, two different node screening modes, namely ECS-PROBE and ECS-GEO, can be provided for the IP address field (marked as ECS) where the client is located. Similarly, for the IP address of the recursive server (denoted as LIP), there are two different node screening approaches, LIP-PROBE and LIP-GEO. In general, the accuracy of the resource nodes obtained based on the client IP address and the accurate probing method is obviously higher, so the priority of the four node screening methods from high to low can be expressed as: ECS-PROBE > LIP-PROBE > ECS-GEO > LIP-GEO.
The above priority is adopted for different candidate resource nodes, and the confidence level of different screening modes can be combined to comprehensively measure. That is, a screening manner of each of the candidate resource nodes may be determined and a confidence level of the screening manner may be identified to set a priority of the candidate resource node based on the confidence level and the screening manner.
Specifically, if the candidate resource node is obtained by screening based on the IP address field where the client is located and the current confidence level meets the preset condition, the candidate resource node may be classified into the first priority.
And if the candidate resource node is obtained based on the screening of the IP address of the recursion server and the current confidence coefficient meets the preset condition, the candidate resource node can be divided into a second priority.
When the two priorities are not satisfied, whether the candidate resource node is obtained by screening based on the IP address field where the client is located can be judged, if so, the candidate resource node can be classified into a third priority, and if the IP address field where the client is located has a corresponding geographic position label.
If the candidate resource node is obtained based on the filtering of the IP address of the recursive server, and the IP address of the recursive server has a corresponding geographic location tag, the candidate resource node may be classified into the fourth priority.
If none of the above cases belong, the candidate resource node may be classified as a fifth priority.
For different candidate resource nodes, the priority operator P may perform the above processing, so as to determine the priority of the candidate resource node.
In one embodiment, the confidence level of the above screening method may be determined by:
and aiming at the IP addresses defined by the screening mode, if the number of the effectively detected access points reaches a specified number threshold, judging that the screening mode is credible.
The meaning of effective detection may mean that the detection time of the access point is not expired, wherein the expiration time may be 6 hours, and may be flexibly set in practical application, for example, may be 24 hours. The number threshold may be flexibly set according to actual requirements, for example, may be set to 14.
In addition, for the IP address defined by the screening mode, if a specified number of access points exist, and the detection method of each access point is in a preset list, the screening mode is determined to be credible.
The specified number of access points may be the top three access points, and the probing methods in the preset list may be, for example, ICMP probing methods and UDP probing methods.
In addition, for the IP address defined by the screening mode, if the detection result is in a preset range, the screening mode is determined to be credible.
The detection result may be an RTT (Round-Trip Time) value, and the preset range may be, for example, 0 to 2000ms.
In practical application, when the above three conditions meet one of them, the screening mode may be considered as trusted, and of course, when all the above three conditions are met, the screening mode may be considered as trusted, which is not limited in the present application.
In this embodiment, after determining the priority of each candidate resource node by the priority operator P, the IP address of the target resource node fed back to the client may be determined by the selection operator S (selection). In practical application, the selection operator S may take the candidate resource node with the highest priority as the feedback target resource node, and if there are multiple candidate resource nodes with the highest priority, the candidate resource node with the best performance and the most idle may be screened out according to the load balancing policy. After the target resource node is determined, the domain name resolution device can feed back the IP address of the target resource node to the client, and the client can initiate resource access to the target resource node.
In one embodiment, the same domain name is considered, and may be configured according to different network types (e.g., IPv4 and IPv 6). The supported candidate resource nodes may also be different for different network types. In view of this, different configuration information may be generated for the domain name for different network types. After receiving the domain name resolution request for the domain name, the network type corresponding to the domain name resolution request can be judged, so that the corresponding configuration information can be selected for screening the resource nodes.
It should be noted that, in this embodiment, the configuration information deployed in the edge server is a combination of the matching condition and the execution policy, and is not an optional IP address deployed directly. Therefore, even if the optional IP address is changed, the configuration information in the edge server will not change as long as the matching conditions and execution policy for screening the IP address are not changed. Therefore, even if the resource nodes in the network change frequently, the configuration information of the edge server cannot change accordingly, so that the complexity of configuration management is greatly improved, and the scheduling flexibility is improved.
In this specific application example, configuration information may be configured for the domain name in advance, and the configuration information may include matching conditions and corresponding execution policies. The domain name resolution request can be compared with each matching condition, so that the matched target matching condition is determined. The target execution policy with the target matching condition bound may screen out the resource nodes that are suitable for the domain name resolution request from among the plurality of resource nodes. By providing the IP address of the resource node to the client that initiated the domain name resolution request, the domain name resolution process can be completed. Therefore, through the mode, the appropriate resource nodes can be automatically screened out based on the configuration information of the domain name.
Referring to fig. 8, the present application further provides a configuration platform, where the configuration platform includes a memory and a processor, and the memory is configured to store a computer program, and when the computer program is executed by the processor, implement the deployment method of the configuration information.
In the present application, the memory may include physical means for storing information, typically by digitizing the information before storing it in a medium using electrical, magnetic or optical methods. The memory may in turn comprise: means for storing information by means of electrical energy, such as RAM or ROM; means for storing information using magnetic energy, such as hard disks, floppy disks, magnetic tape, magnetic core memory, bubble memory, or U disk; devices for storing information optically, such as CDs or DVDs. Of course, there are other ways of storing, such as quantum storage or graphene storage, etc.
In the present application, the processor may be implemented in any suitable manner. For example, the processor may take the form of, for example, a microprocessor or processor, and a computer-readable medium storing computer-readable program code (e.g., software or firmware) executable by the (micro) processor, logic gates, switches, application specific integrated circuits (Application Specific Integrated Circuit, ASIC), a programmable logic controller, and an embedded microcontroller, among others.
In this specification, each embodiment is described in a progressive manner, and identical and similar parts of each embodiment are referred to each other, and each embodiment is mainly described as different from other embodiments. In particular, for embodiments of the edge server, reference may be made to the description of embodiments of the method described above for a comparative explanation.
It will be appreciated by those skilled in the art that embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flowchart illustrations and/or block diagrams, and combinations of flows and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
In one typical configuration, a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The memory may include volatile memory in a computer-readable medium, random Access Memory (RAM) and/or nonvolatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM). Memory is an example of computer-readable media.
Computer readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of storage media for a computer include, but are not limited to, phase change memory (PRAM), static Random Access Memory (SRAM), dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), read Only Memory (ROM), electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium, which can be used to store information that can be accessed by a computing device. Computer-readable media, as defined herein, does not include transitory computer-readable media (transmission media), such as modulated data signals and carrier waves.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article or apparatus that comprises the element.
The foregoing description is only illustrative of the application and is not to be construed as limiting the application. Various modifications and variations of the present application will be apparent to those skilled in the art. Any modification, equivalent replacement, improvement, etc. which come within the spirit and principles of the application are to be included in the scope of the claims of the present application.

Claims (11)

1. A method for deploying configuration information, the method comprising:
reading target configuration information, wherein part or all configuration items in the target configuration information are inherited from inherited configuration information;
reading configuration character strings of each configuration item in the target configuration information, and generating a hash character string corresponding to the configuration character string;
dividing the hash character string into a specified number of fields, and respectively converting each field into different components in the color block identifiers to form the color block identifiers corresponding to the configuration items;
displaying corresponding color block identifiers at configuration items in the target configuration information; for any target configuration item in the target configuration information, if the color block identifier of the target configuration item is consistent with the color block identifier of the corresponding configuration item in the inherited configuration information, the target configuration item in the target configuration information is characterized to be completely inherited from the corresponding configuration item in the inherited configuration information.
2. The method of claim 1, wherein the color block identifier comprises the following components:
a background color of the first region;
a background color of the second region;
a first text filled in the first area and a second text filled in the second area;
the color of the first text;
the color of the second text;
line color for defining the outer contour of the first and second regions.
3. The method of claim 2, wherein for any one of the target configuration items, if any one of the component parts of the color block identifier of the target configuration item is inconsistent with the corresponding component part of the color block identifier of the corresponding configuration item in the inherited configuration information, characterizing the target configuration item in the target configuration information as different from the corresponding configuration item inherited from the inherited configuration information.
4. The method of claim 1, wherein the configuration string includes a plurality of key-value pairs therein; before generating the hash character string corresponding to the configuration character string, the method further comprises:
and sequencing the plurality of groups of key value pairs according to the pre-designated key sequence to generate a formatted configuration character string.
5. The method of claim 1, wherein the configuration items of the target configuration information include at least a matching condition and a filtering operator, the matching condition is used for defining a set of applicable IP addresses, the filtering operator is used for generating a candidate list according to the matching condition, and the candidate list includes candidate resource nodes determined from a resource node pool.
6. The method of claim 5, wherein the configuration item further comprises an availability judgment operator, wherein the availability judgment operator is used for identifying producers associated with candidate resource nodes, and determining that the candidate resource nodes are available if each producer is available.
7. The method of claim 5, wherein the configuration item further includes a priority operator, the priority operator being configured to determine a screening method for each candidate resource node, and identify a confidence level of the screening method, so as to set a priority of the candidate resource node based on the confidence level and the screening method.
8. The method according to claim 1, wherein the method further comprises:
if the strategy element is missing in the target configuration information, inheriting the missing strategy element from the inherited configuration information;
and if the missing policy element does not exist in the inherited configuration information, inheriting the missing policy element from a global default rule.
9. The method of claim 8, wherein in inheriting the missing policy element, the method further comprises:
and if the inherited strategy element is a filter operator, processing the filter operator in the inherited configuration information into the filter operator in the target configuration information in a preset mode.
10. The method according to claim 1, wherein the method further comprises:
and generating an integral color block identifier aiming at the target configuration information, and if the integral color block identifier of the target configuration information is consistent with the integral color block identifier of the inherited configuration information, representing that the target configuration information is completely inherited from the inherited configuration information.
11. A configuration platform comprising a memory and a processor, the memory being for storing a computer program which, when executed by the processor, implements the method of any one of claims 1 to 10.
CN202111315991.9A 2021-11-08 2021-11-08 Deployment method and configuration platform of configuration information Active CN114244696B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111315991.9A CN114244696B (en) 2021-11-08 2021-11-08 Deployment method and configuration platform of configuration information

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111315991.9A CN114244696B (en) 2021-11-08 2021-11-08 Deployment method and configuration platform of configuration information

Publications (2)

Publication Number Publication Date
CN114244696A CN114244696A (en) 2022-03-25
CN114244696B true CN114244696B (en) 2023-09-22

Family

ID=80748689

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111315991.9A Active CN114244696B (en) 2021-11-08 2021-11-08 Deployment method and configuration platform of configuration information

Country Status (1)

Country Link
CN (1) CN114244696B (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10225160B1 (en) * 2018-02-27 2019-03-05 Servicenow, Inc. Defining and enforcing operational associations between configuration item classes in managed networks
CN110881064A (en) * 2018-09-06 2020-03-13 阿里巴巴集团控股有限公司 Domain name configuration method and device
CN111488182A (en) * 2020-04-13 2020-08-04 北京字节跳动网络技术有限公司 System configuration method, device, equipment and storage medium

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10496419B2 (en) * 2016-06-10 2019-12-03 Apple Inc. Editing inherited configurations
US10628179B2 (en) * 2017-05-19 2020-04-21 Microsoft Technology Licensing, Llc Universal graphical user interface objects
US10693745B2 (en) * 2018-02-27 2020-06-23 Servicenow, Inc. Defining and enforcing operational associations between configuration item classes in managed networks
CN110858833B (en) * 2018-08-22 2022-09-30 京东方科技集团股份有限公司 Access control policy configuration method, device and system and storage medium

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10225160B1 (en) * 2018-02-27 2019-03-05 Servicenow, Inc. Defining and enforcing operational associations between configuration item classes in managed networks
CN110881064A (en) * 2018-09-06 2020-03-13 阿里巴巴集团控股有限公司 Domain name configuration method and device
CN111488182A (en) * 2020-04-13 2020-08-04 北京字节跳动网络技术有限公司 System configuration method, device, equipment and storage medium

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
李文 ; 王迎雪 ; 王颖 ; .基于分域的IT配置管理数据库信息模型.北京邮电大学学报.2009,(第1期),全文. *

Also Published As

Publication number Publication date
CN114244696A (en) 2022-03-25

Similar Documents

Publication Publication Date Title
US9811435B2 (en) System for virtual machine risk monitoring
CN106576054B (en) System and method for dynamic network device configuration
JP7502386B2 (en) Hierarchical API for defining multi-segment applications in SDDC
US9641643B2 (en) System and method for storing a skeleton representation of an application in a computerized organization
US10104187B2 (en) System, computer program, and method for dividing services into subsets based on interdependencies
US20210211363A1 (en) QoS-OPTIMIZED SELECTION OF A CLOUD MICROSERVICES PROVIDER
JP5349603B2 (en) Method and apparatus for terminal device management based on authority management
US11095573B2 (en) Recommendation engine for resource tagging
US9281992B2 (en) Method and system for identifying storage device
CN114244805B (en) Domain name configuration method and device
CN106201648A (en) A kind of virtual machine creation method and device
CN113867937A (en) Resource scheduling method and device for cloud computing platform and storage medium
CN110855458A (en) Configuration command generation method and equipment
US11489721B2 (en) Dynamic compliance management
US7903678B2 (en) Internet protocol address management system and method
CN114244696B (en) Deployment method and configuration platform of configuration information
CN113377499B (en) Virtual machine management method, device, equipment and readable storage medium
US20200304383A1 (en) Generation of templates for cloud computing platforms
US11588739B2 (en) Enhanced management of communication rules over multiple computing networks
CN108228272B (en) WEB container generation processing method, equipment and server
CN108370329B (en) Management method and device for management function object
US9081773B2 (en) Data source searching system and method thereof
US11811516B2 (en) System and method for internet numbers asset management
US11218487B1 (en) Predictive entity resolution
CN114500221A (en) Cloud system, public cloud control method, equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant