[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN117221323B - Service dynamic forwarding method - Google Patents

Service dynamic forwarding method Download PDF

Info

Publication number
CN117221323B
CN117221323B CN202311482692.3A CN202311482692A CN117221323B CN 117221323 B CN117221323 B CN 117221323B CN 202311482692 A CN202311482692 A CN 202311482692A CN 117221323 B CN117221323 B CN 117221323B
Authority
CN
China
Prior art keywords
service
proxy
load balancing
rule
address
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202311482692.3A
Other languages
Chinese (zh)
Other versions
CN117221323A (en
Inventor
朱旭平
宋彬
何文武
黄亚昌
申亚奇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Feidu Technology Co ltd
Original Assignee
Beijing Feidu Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Feidu Technology Co ltd filed Critical Beijing Feidu Technology Co ltd
Priority to CN202311482692.3A priority Critical patent/CN117221323B/en
Publication of CN117221323A publication Critical patent/CN117221323A/en
Application granted granted Critical
Publication of CN117221323B publication Critical patent/CN117221323B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention belongs to the technical field of service components, and provides a service dynamic forwarding method, which comprises the following steps: acquiring an access log of service analysis proxy-based service in a service list, and updating and selecting a load balancing service and a load balancing strategy based on the access log and a load balancing algorithm; and dynamically adjusting resources based on the threshold strategy, the predictive strategy and the queuing theory so as to finish service dynamic forwarding. The use of predictive policies will require proxied services to complete auto-proxy configuration and auto-complete configuration refresh. The delay is reduced, the throughput is improved, and the aim of improving the performance is fulfilled. The components can be expanded and maintained according to the needs, and the purposes of strong expandability and convenient maintenance are achieved. And the automatic configuration avoids the workload of manual maintenance configuration, and achieves the purpose of simple configuration.

Description

Service dynamic forwarding method
Technical Field
The invention belongs to the technical field of service components, and particularly relates to a service dynamic forwarding method.
Background
In the present digital age, the demands of enterprises and individuals on network services are increasing, and the network services have become an integral part of our lives and works from the fields of online shopping, social media to cloud computing, big data analysis and the like. As the diversity and complexity of network services continue to increase, developing and maintaining these services becomes increasingly challenging. The service broker component is to address the diversity, complexity and challenges of modern network services to provide a more powerful, efficient, secure service integration and management solution. This will help the enterprise better meet customer needs, increase competitiveness, and ensure that their web services are always in an optimal state.
Problems and challenges faced by the following service agent component:
1. performance problems: at high loads, service proxy forwarding components may become bottlenecks, resulting in latency and throughput problems.
2. Extensibility and maintainability: as the scale of systems grows, components may need to be able to be expanded and maintained without introducing additional complexity.
3. Configuration complexity: in handling complex agent rules and high-level functions, configuration errors may cause agents to be incorrect or introduce security vulnerabilities. And cannot dynamically update the configuration, requiring manual refreshing or restarting, etc.
Disclosure of Invention
Aiming at the problems in the prior art, the invention provides a service dynamic forwarding method which at least partially solves the problems of low component performance, insufficient expansibility and complex configuration in the prior art.
In a first aspect, an embodiment of the present disclosure provides a service dynamic forwarding method, including:
acquiring an access log of service analysis proxy-based service in a service list, and updating and selecting a load balancing service and a load balancing strategy based on the access log and a load balancing algorithm; and dynamically adjusting resources based on the threshold strategy, the predictive strategy and the queuing theory so as to finish service dynamic forwarding.
Optionally, the load balancing algorithm is combined to update the selected load balancing service and load balancing strategy; performing dynamic resource adjustment based on a threshold policy monitoring method, a predictive policy and a queuing theory to complete dynamic forwarding of services, including:
detecting a load through a load balancing algorithm;
managing load resources based on a threshold policy;
predicting a load based on a predictive strategy;
determining load resource requirements using queuing theory to meet corresponding performance objectives;
deep learning and machine learning techniques are used to build models to complete automatic proxy configuration and automatic configuration of services to be proxied.
Optionally, the load balancing algorithm includes polling, weighted polling, or weighted random.
Optionally, the threshold policy is based on CPU utilization, memory utilization, and/or request queue length.
Optionally, the threshold strategy and the predictive strategy include an adaptive learning algorithm or an exponential smoothing algorithm.
Optionally, before the step of obtaining the access log of the service analysis agent-based service in the service list, the method includes:
and accessing the proxy service in the service list, inquiring an actual service address through a route mapping, accessing the actual service address, recording an access log, and after the service of the actual service address returns the service content, calling a desensitization rule, a route rewriting rule and an encryption algorithm to process the returned service content.
Optionally, the step of accessing the proxy service in the service list includes resolving the proxy service to obtain a resolved result, where the resolved result includes a service address, service key information and metadata information, and storing the proxy address in the service list after automatically selecting a corresponding load balancing service and load balancing rule based on the resolved result.
Optionally, resolving the proxy service includes:
and resolving the service requiring the proxy, automatically matching and establishing the mapping relation between the routing rule and the actual service address, generating the proxy address and storing the proxy address into a relational database and a memory database.
Optionally, the steps of invoking the desensitization rule, the routing rewrite rule, and the encryption algorithm are preceded by:
analyzing and processing the extracted key information, and calling a sensitive data processor to customize a desensitization rule for the key information; calling a key information checker to judge whether information related to an original service address exists, and calling a rule engine to generate a route rewriting rule if the information related to the original service address exists; automatically selecting an encryption algorithm according to the key information; and storing the desensitization rule, the route rewriting rule and the encryption algorithm corresponding to the service into a database.
Optionally, the extracted key information includes:
and dynamically creating a service call client object according to a service protocol of the proxy service, executing a client method to call the service, transmitting the return information of the service into a text analysis model to deeply analyze the service return content, and automatically extracting key information and metadata information.
The service dynamic forwarding method provided by the invention detects the load through the load balancing algorithm and adjusts the resources according to the load condition. And (3) performing resource expansion or reduction operation based on a threshold strategy, predicting future loads based on a predictive strategy, and performing resource adjustment in advance. Resource requirements are determined using queuing theory to meet specific performance objectives. The use of predictive policies will require proxied services to complete auto-proxy configuration and auto-complete configuration refresh. The delay is reduced, the throughput is improved, and the aim of improving the performance is fulfilled. The components can be expanded and maintained according to the needs, and the purposes of strong expandability and convenient maintenance are achieved. And the automatic configuration avoids the workload of manual maintenance configuration, and achieves the purpose of simple configuration.
Drawings
The foregoing and other objects, features and advantages of the disclosure will be apparent from the following more particular descriptions of exemplary embodiments of the disclosure as illustrated in the accompanying drawings wherein like reference numbers generally represent like parts throughout the exemplary embodiments of the disclosure.
Fig. 1 is a flowchart of a service dynamic forwarding method provided in an embodiment of the present disclosure.
Detailed Description
Embodiments of the present disclosure are described in detail below with reference to the accompanying drawings.
It should be appreciated that the following specific embodiments of the disclosure are described in order to provide a better understanding of the present disclosure, and that other advantages and effects will be apparent to those skilled in the art from the present disclosure. It will be apparent that the described embodiments are merely some, but not all embodiments of the present disclosure. The disclosure may be embodied or practiced in other different specific embodiments, and details within the subject specification may be modified or changed from various points of view and applications without departing from the spirit of the disclosure. It should be noted that the following embodiments and features in the embodiments may be combined with each other without conflict. All other embodiments, which can be made by one of ordinary skill in the art without inventive effort, based on the embodiments in this disclosure are intended to be within the scope of this disclosure.
It is noted that various aspects of the embodiments are described below within the scope of the following claims. It should be apparent that the aspects described herein may be embodied in a wide variety of forms and that any specific structure and/or function described herein is merely illustrative. Based on the present disclosure, one skilled in the art will appreciate that one aspect described herein may be implemented independently of any other aspect, and that two or more of these aspects may be combined in various ways. For example, an apparatus may be implemented and/or a method practiced using any number of the aspects set forth herein. In addition, such apparatus may be implemented and/or such methods practiced using other structure and/or functionality in addition to one or more of the aspects set forth herein.
It should also be noted that the illustrations provided in the following embodiments merely illustrate the basic concepts of the disclosure by way of illustration, and only the components related to the disclosure are shown in the illustrations, rather than being drawn according to the number, shape and size of the components in actual implementation, and the form, number and proportion of the components in actual implementation may be arbitrarily changed, and the layout of the components may be more complex.
In addition, in the following description, specific details are provided in order to provide a thorough understanding of the examples. However, it will be understood by those skilled in the art that the aspects may be practiced without these specific details.
The embodiment discloses a service dynamic forwarding method, which comprises the following steps:
acquiring an access log of service analysis proxy-based service in a service list, and updating and selecting a load balancing service and a load balancing strategy based on the access log and a load balancing algorithm; and dynamically adjusting resources based on the threshold strategy, the predictive strategy and the queuing theory so as to finish service dynamic forwarding.
Optionally, the load balancing algorithm is combined to update the selected load balancing service and load balancing strategy; performing dynamic resource adjustment based on a threshold policy monitoring method, a predictive policy and a queuing theory to complete dynamic forwarding of services, including:
detecting a load through a load balancing algorithm;
managing load resources based on a threshold policy;
predicting a load based on a predictive strategy;
determining load resource requirements using queuing theory to meet corresponding performance objectives;
deep learning and machine learning techniques are used to build models to complete automatic proxy configuration and automatic configuration of services to be proxied.
Optionally, the load balancing algorithm includes polling, weighted polling, or weighted random.
Optionally, the threshold policy is based on CPU utilization, memory utilization, and/or request queue length.
Optionally, the threshold strategy and the predictive strategy include an adaptive learning algorithm or an exponential smoothing algorithm.
Optionally, before the step of obtaining the access log of the service analysis agent-based service in the service list, the method includes:
and accessing the proxy service in the service list, inquiring an actual service address through a route mapping, accessing the actual service address, recording an access log, and after the service of the actual service address returns the service content, calling a desensitization rule, a route rewriting rule and an encryption algorithm to process the returned service content.
Optionally, the step of accessing the proxy service in the service list includes resolving the proxy service to obtain a resolved result, where the resolved result includes a service address, service key information and metadata information, and storing the proxy address in the service list after automatically selecting a corresponding load balancing service and load balancing rule based on the resolved result.
Optionally, resolving the proxy service includes:
and resolving the service requiring the proxy, automatically matching and establishing the mapping relation between the routing rule and the actual service address, generating the proxy address and storing the proxy address into a relational database and a memory database.
Optionally, the steps of invoking the desensitization rule, the routing rewrite rule, and the encryption algorithm are preceded by:
analyzing and processing the extracted key information, and calling a sensitive data processor to customize a desensitization rule for the key information; calling a key information checker to judge whether information related to an original service address exists, and calling a rule engine to generate a route rewriting rule if the information related to the original service address exists; automatically selecting an encryption algorithm according to the key information; and storing the desensitization rule, the route rewriting rule and the encryption algorithm corresponding to the service into a database.
Optionally, the extracted key information includes:
and dynamically creating a service call client object according to a service protocol of the proxy service, executing a client method to call the service, transmitting the return information of the service into a text analysis model to deeply analyze the service return content, and automatically extracting key information and metadata information.
As shown in fig. 1, in a specific application scenario, the service dynamic forwarding method specifically includes the following steps:
step 1: and resolving the service requiring the proxy, automatically matching and establishing the mapping relation between the routing rule (Route) and the actual service address, generating the proxy address and storing the proxy address into a relational database and a memory database.
Step 2: the program automatically creates and starts service preprocessing tasks: according to different service protocols, a service calling client object is dynamically created, a client method is executed to call the service, return information of the service is transmitted into a text analysis model (transducer) to deeply analyze the service return content, and key information and Metadata (Metadata) information are automatically extracted.
Step 3: and (3) calling a key data processing engine, and performing secondary analysis processing on the key information extracted in the step (2): invoking a sensitive data processor to customize the desensitization rules for the critical information. And calling a key information checker to judge whether information related to the original service address exists, and calling a rule engine to generate a route rewriting rule if the information related to the original service address exists. And automatically judging and selecting a proper encryption algorithm according to the key information. And stores the desensitization rule, the route rewriting rule and the encryption algorithm of the service into a database.
Step 4: and (3) sending the address after the agent in the step (1) to a dynamic agent processing engine, and storing the agent address into a service list after the dynamic agent processing engine analyzes the service address, the service key information and the metadata information obtained in the step (1) and the step (2) and automatically selects proper and load balancing service and load balancing rules.
Step 5: the user accesses the proxy service obtained in the step 4, finds the actual service address through the route mapping, the component accesses the actual service address and records the access log, the program intercepts after the service returns the content, and the desensitization rule, the route rewriting rule and the encryption algorithm obtained in the step 3 are called to process the returned service content and then return.
Step 6: the service inspection tool obtains the access log of the proxy service from the service analysis step 5 in the service list in the step 4. And intelligently updating the selected load balancing service and load balancing strategy by combining a load balancing algorithm. The hardware monitoring tool is used for dynamically adjusting resources based on a threshold strategy monitoring method, a predictive strategy and a queuing theory, so that high performance and high availability of proxy service are ensured.
The basic principles of the present disclosure have been described above in connection with specific embodiments, however, it should be noted that the advantages, benefits, effects, etc. mentioned in the present disclosure are merely examples and not limiting, and these advantages, benefits, effects, etc. are not to be considered as necessarily possessed by the various embodiments of the present disclosure. Furthermore, the specific details disclosed herein are for purposes of illustration and understanding only, and are not intended to be limiting, since the disclosure is not necessarily limited to practice with the specific details described.
In this disclosure, relational terms such as first and second, and the like are used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Words such as "including," "comprising," "having," and the like are words of openness and mean "including but not limited to," and are used interchangeably therewith. The terms "or" and "as used herein refer to and are used interchangeably with the term" and/or "unless the context clearly indicates otherwise. The term "such as" as used herein refers to, and is used interchangeably with, the phrase "such as, but not limited to.
In addition, as used herein, the use of "or" in the recitation of items beginning with "at least one" indicates a separate recitation, such that recitation of "at least one of A, B or C" for example means a or B or C, or AB or AC or BC, or ABC (i.e., a and B and C). Furthermore, the term "exemplary" does not mean that the described example is preferred or better than other examples.
It is also noted that in the systems and methods of the present disclosure, components or steps may be disassembled and/or assembled. Such decomposition and/or recombination should be considered equivalent to the present disclosure.
Various changes, substitutions, and alterations are possible to the techniques described herein without departing from the teachings of the techniques defined by the appended claims. Furthermore, the scope of the claims of the present disclosure is not limited to the particular aspects of the process, machine, manufacture, composition of matter, means, methods and acts described above. The processes, machines, manufacture, compositions of matter, means, methods, or acts, presently existing or later to be developed that perform substantially the same function or achieve substantially the same result as the corresponding aspects described herein may be utilized. Accordingly, the appended claims are intended to include within their scope such processes, machines, manufacture, compositions of matter, means, methods, or acts.
The previous description of the disclosed aspects is provided to enable any person skilled in the art to make or use the present disclosure. Various modifications to these aspects will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other aspects without departing from the scope of the disclosure. Thus, the present disclosure is not intended to be limited to the aspects shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.
The foregoing description has been presented for purposes of illustration and description. Furthermore, this description is not intended to limit the embodiments of the disclosure to the form disclosed herein. Although a number of example aspects and embodiments have been discussed above, a person of ordinary skill in the art will recognize certain variations, modifications, alterations, additions, and subcombinations thereof.

Claims (8)

1. A method for dynamic forwarding of services, comprising:
acquiring services in a service list, analyzing access logs of proxy-based services, and updating and selecting load balancing services and load balancing strategies based on the access logs and a load balancing algorithm; performing dynamic resource adjustment based on a threshold strategy, a predictive strategy and a queuing theory so as to finish dynamic forwarding of the service;
before the step of obtaining an access log for the service analysis agent-based service in the service list, it comprises:
accessing proxy service in the service list, inquiring an actual service address through route mapping, accessing the actual service address, recording an access log, and after the actual service address is accessed to return service content, calling a desensitization rule, a route rewriting rule and an encryption algorithm to process the returned service content;
the steps of invoking the desensitization rule, the route rewriting rule and the encryption algorithm are preceded by:
calling a key information checker to judge whether information related to an original service address exists, and calling a rule engine to generate a route rewriting rule if the information related to the original service address exists;
the load balancing algorithm is combined to update and select load balancing service and load balancing strategy; performing dynamic resource adjustment based on a threshold policy monitoring method, a predictive policy and a queuing theory to complete dynamic forwarding of services, including:
detecting a load through a load balancing algorithm;
managing load resources based on a threshold policy;
predicting a load based on a predictive strategy;
determining load resource requirements using queuing theory to meet corresponding performance objectives;
deep learning and machine learning techniques are used to build models to complete automatic proxy configuration and automatic configuration of services to be proxied.
2. The service dynamic forwarding method of claim 1 wherein the load balancing algorithm comprises polling or weighted random.
3. The service dynamic forwarding method of claim 1 wherein the threshold policy is based on CPU utilization, memory utilization, and/or request queue length.
4. The service dynamic forwarding method of claim 1 wherein the threshold policy, the predictive policy, comprises an adaptive learning algorithm or an exponential smoothing algorithm.
5. The method according to claim 1, wherein the step of accessing the proxy service in the service list includes, before the step of accessing the proxy service in the service list, parsing the proxy service to obtain a parsing result, where the parsing result includes a service address, service key information and metadata information, and storing the proxy address in the service list after automatically selecting a corresponding load balancing service and load balancing rule based on the parsing result.
6. The service dynamic forwarding method of claim 5 wherein resolving the proxy service comprises:
and resolving the service requiring the proxy, automatically matching and establishing the mapping relation between the routing rule and the actual service address, generating the proxy address and storing the proxy address into a relational database and a memory database.
7. The service dynamic forwarding method of claim 1 wherein before the steps of invoking the desensitization rule, the routing rewrite rule, and the encryption algorithm further comprise:
analyzing and processing the extracted key information, and calling a sensitive data processor to customize a desensitization rule for the key information; automatically selecting an encryption algorithm according to the key information; and storing the desensitization rule, the route rewriting rule and the encryption algorithm corresponding to the service into a database.
8. The service dynamic forwarding method of claim 7 wherein the extracted key information comprises:
and dynamically creating a service call client object according to a service protocol of the proxy service, executing a client method to call the service, transmitting the return information of the service into a text analysis model to deeply analyze the service return content, and automatically extracting key information and metadata information.
CN202311482692.3A 2023-11-09 2023-11-09 Service dynamic forwarding method Active CN117221323B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311482692.3A CN117221323B (en) 2023-11-09 2023-11-09 Service dynamic forwarding method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311482692.3A CN117221323B (en) 2023-11-09 2023-11-09 Service dynamic forwarding method

Publications (2)

Publication Number Publication Date
CN117221323A CN117221323A (en) 2023-12-12
CN117221323B true CN117221323B (en) 2024-02-02

Family

ID=89039373

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311482692.3A Active CN117221323B (en) 2023-11-09 2023-11-09 Service dynamic forwarding method

Country Status (1)

Country Link
CN (1) CN117221323B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111124670A (en) * 2019-12-05 2020-05-08 航天科工网络信息发展有限公司 Tactical cloud-oriented micro-service platform
CN113746894A (en) * 2021-07-23 2021-12-03 济南浪潮数据技术有限公司 Method and device for realizing load balancing based on HDFS RBF routing layer
CN113949707A (en) * 2021-09-30 2022-01-18 上海浦东发展银行股份有限公司 OpenResty and K8S-based container cloud service discovery and load balancing method
CN113946450A (en) * 2021-11-03 2022-01-18 北京航空航天大学 Self-adaptive authorized polling load balancing system for K8S micro service framework

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10146593B2 (en) * 2017-02-17 2018-12-04 Sas Institute Inc. Techniques for decentralized load balancing
US20180287914A1 (en) * 2017-03-30 2018-10-04 Wipro Limited System and method for management of services in a cloud environment

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111124670A (en) * 2019-12-05 2020-05-08 航天科工网络信息发展有限公司 Tactical cloud-oriented micro-service platform
CN113746894A (en) * 2021-07-23 2021-12-03 济南浪潮数据技术有限公司 Method and device for realizing load balancing based on HDFS RBF routing layer
CN113949707A (en) * 2021-09-30 2022-01-18 上海浦东发展银行股份有限公司 OpenResty and K8S-based container cloud service discovery and load balancing method
CN113946450A (en) * 2021-11-03 2022-01-18 北京航空航天大学 Self-adaptive authorized polling load balancing system for K8S micro service framework

Also Published As

Publication number Publication date
CN117221323A (en) 2023-12-12

Similar Documents

Publication Publication Date Title
EP3667500B1 (en) Using a container orchestration service for dynamic routing
US10812409B2 (en) Network multi-tenancy for cloud based enterprise resource planning solutions
US9729557B1 (en) Dynamic throttling systems and services
US9686152B2 (en) Techniques for tracking resource usage statistics per transaction across multiple layers of protocols
US8745202B2 (en) Tracking remote browser crashes via cookies
US20220030007A1 (en) Real-time scanning of ip addresses
US8631465B2 (en) Terminal of an environment management station and a service user provided a service, method for processing an evaluation value of a terminal, a service request and a service providing
CN112087520B (en) Data processing method, device, equipment and computer readable storage medium
SG191557A1 (en) Methods and systems for service discovery and selection
US8600960B2 (en) Processing proposed changes to data
US20110119373A1 (en) Service workflow generation apparatus and method
CN112527504A (en) Multi-tenant resource quota management method and device, and computer equipment
WO2017039576A1 (en) Propagating belief information about malicious and benign nodes
US9891930B2 (en) Rapid identification of object properties in an evolving domain model of an enterprise application on the cloud
US7526772B2 (en) Method and apparatus for transforming systems management native event formats to enable correlation
CN117221323B (en) Service dynamic forwarding method
US20200184014A1 (en) Internet of everything
Scherb et al. Execution plans for serverless computing in information centric networking
US20120066554A1 (en) Application query control with cost prediction
US10866876B2 (en) Dynamically configurable operation information collection
US11366648B2 (en) Compiling monoglot function compositions into a single entity
US20120029961A1 (en) Method, device and computer program product for service balancing in an electronic communications system
CN110768957B (en) Network security cooperative processing method, system and storage medium
Sulaiman et al. Mamoc-android: Multisite adaptive computation offloading for android applications
CN108833108B (en) Signature verification method, device and medium based on content-centric network

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant