CN120474905A - Server access control method and device and electronic equipment - Google Patents
Server access control method and device and electronic equipmentInfo
- Publication number
- CN120474905A CN120474905A CN202510676716.1A CN202510676716A CN120474905A CN 120474905 A CN120474905 A CN 120474905A CN 202510676716 A CN202510676716 A CN 202510676716A CN 120474905 A CN120474905 A CN 120474905A
- Authority
- CN
- China
- Prior art keywords
- access
- server
- path
- configuration
- accessed
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Landscapes
- Computer And Data Communications (AREA)
Abstract
The application discloses a server access control method, a device and electronic equipment, and relates to the technical field of computers, wherein the method comprises the following steps: when a server access request of any type is received, a configuration template corresponding to the current protocol type is obtained by acquiring multi-path configuration data comprising configuration templates corresponding to different types of protocols, and an access configuration file is generated by combining configuration parameters input by a user. And executing the access operation of the server to be accessed based on the access configuration file automatically generated and the determined target access path, so that the complexity and the operation and maintenance cost of the configuration operation are reduced and the server access efficiency is further improved compared with a mode of writing the configuration file purely manually.
Description
Technical Field
The present application relates to the field of computer technologies, and in particular, to a method and an apparatus for controlling server access, and an electronic device.
Background
With the development of business diversity in enterprises, it is generally required to use various types of storage servers, such as file storage servers, block storage servers, object storage servers, and the like. In the related art, the access interfaces are not uniform due to the protocol difference between different types of servers, so that a user needs to write corresponding configuration files for different types of storage servers manually when using the storage servers, and the operation complexity and the operation and maintenance cost are increased.
Disclosure of Invention
The application provides a server access control method, a server access control device and electronic equipment, which at least solve the problems that in the related art, the access interfaces are not uniform due to protocol differences among different types of servers, so that a user needs to write corresponding configuration files for different types of storage servers manually when using the server, and the operation complexity and the operation and maintenance cost are increased.
The application provides a server access control method which is applied to a server access control system, wherein the server access control system comprises a plurality of types of servers, each type of server is configured with a plurality of access paths, the method comprises the steps of obtaining preset multi-path configuration data when a server access request is received, the preset multi-path configuration data comprise configuration templates corresponding to different types of protocols, access path information corresponding to different types of servers and priority information corresponding to the access paths, determining a target access path in a plurality of access paths corresponding to the server to be accessed according to address information of the server to be accessed contained in the server access request and the access path priority information contained in the preset multi-path configuration data, obtaining a configuration template corresponding to the protocol from the preset multi-path configuration data according to the protocol type corresponding to the target access path, generating an access configuration file according to configuration parameters input by a user, and operating the server to be accessed from the target access path according to the access configuration file and a driver corresponding to the protocol version of the target access path.
The application further provides a server access control device which is applied to a server access control system, wherein the server access control system comprises a plurality of types of servers, each type of server is configured with a plurality of access paths, the device comprises a first acquisition module, a generation module and an access module, wherein the first acquisition module is used for acquiring preset multi-path configuration data when a server access request is received, the preset multi-path configuration data comprises configuration templates corresponding to different types of protocols, access path information corresponding to different types of servers and priority information corresponding to the access paths, the first determination module is used for determining a target access path in a plurality of access paths corresponding to the server to be accessed according to address information of the server to be accessed contained in the server access request and the access path priority information contained in the preset multi-path configuration data, the generation module is used for acquiring the configuration templates corresponding to the protocols from the preset multi-path configuration data according to the protocol types, generating an access configuration file according to the configuration parameters input by a user, and the access module is used for operating the server to be accessed according to the protocol version types of the access configuration file and the driving corresponding to the target access path.
The application also provides electronic equipment, which comprises a memory and a processor, wherein the memory is used for storing a computer program, and the processor is used for realizing the steps of any server access control method when executing the computer program.
The present application also provides a computer readable storage medium having a computer program stored therein, wherein the computer program when executed by a processor implements the steps of any one of the server access control methods described above.
The application also provides a computer program product comprising a computer program which when executed by a processor implements the steps of any of the server access control methods described above.
According to the server access control method provided by the application, when a server access request of any type is received, the configuration template corresponding to the current protocol type is obtained by acquiring the multi-path configuration data comprising the configuration templates corresponding to different types of protocols, and the access configuration file is generated by combining the configuration parameters input by a user. And executing the access operation of the server to be accessed based on the access configuration file automatically generated and the determined target access path, so that the complexity and the operation and maintenance cost of the configuration operation are reduced and the server access efficiency is further improved compared with a mode of writing the configuration file purely manually.
Drawings
For a clearer description of embodiments of the present application, the drawings that are required to be used in the embodiments will be briefly described, it being apparent that the drawings in the following description are only some embodiments of the present application, and other drawings may be obtained according to the drawings without inventive effort for those skilled in the art.
Fig. 1 is a schematic flow chart of a server access control method according to an embodiment of the present application;
Fig. 2 is a block diagram of a server access control device according to an embodiment of the present application;
fig. 3 is a block diagram of an electronic device according to an embodiment of the present application.
Detailed Description
The following description of the embodiments of the present application will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present application, but not all embodiments. Based on the embodiments of the present application, all other embodiments obtained by a person of ordinary skill in the art without making any inventive effort are within the scope of the present application.
It should be noted that in the description of the present application, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. The terms "first," "second," and the like in this specification are used for distinguishing between similar objects and not necessarily for describing a particular sequential or chronological order.
The present application will be further described in detail below with reference to the drawings and detailed description for the purpose of enabling those skilled in the art to better understand the aspects of the present application.
With the development of business diversity of enterprises, multiple types of storage servers, such as file storage servers, e.g., NFS (Network FILE SYSTEM), SMB (SERVER MESSAGE Block), block storage servers, e.g., iSCSI (INTERNET SMALL Computer SYSTEM INTERFACE), object storage servers, e.g., S3 (Simple Storage Service), etc., are generally required to be used, and protocol differences between different types of servers cause non-uniform access interfaces, so that users need to manually perform different configuration and management on different storage servers when using the servers, thereby increasing operation complexity and operation and maintenance costs.
The embodiment of the application provides a server access control method which is applied to a server access control system, wherein the server access control system comprises a plurality of types of servers, each type of server is configured with a plurality of access paths, the server access control system architecture of the embodiment of the application can comprise a client, a multi-path configuration module, a storage access module and a plurality of storage servers, wherein the client can be used for initiating a server access request, the multi-path configuration module can be used for generating multi-path configuration data according to the type and configuration information of the storage servers, the storage access module can select a proper path to access the storage servers according to the multi-path configuration data, and the storage servers can be used for providing different types of storage resources. As shown in fig. 1, the method comprises the steps of:
Step S101, when a server access request is received, preset multi-path configuration data is obtained, wherein the preset multi-path configuration data comprises configuration templates corresponding to different types of protocols, access path information corresponding to different types of servers and priority information corresponding to access paths;
By storing the configuration templates corresponding to different types of protocols in advance, the user can input corresponding configuration parameters in a targeted manner, such as adding specific authentication information, connection parameters, configuration requirements and the like in a targeted manner for the different protocols. For example, for the S3 protocol, identity authentication parameters (such as access_key and secret_key), region information (region) parameters, and service endpoint (endpoint) parameters, and functional configuration parameters such as version control, lifecycle management, encryption, etc. are required to be configured, for the NFS protocol, server IP and export paths (paths), mount options (mount_options) are required to be configured, and the lack of corresponding configuration parameters may result in an inability to determine how to connect to a server or how to verify an identity, so that a corresponding cloud service may reject a corresponding service request. And dynamically associating the physical storage paths corresponding to the servers of different types with the protocol types, and supporting a mixed protocol path pool.
The priority of the access paths corresponding to different types of servers is preconfigured, so that when an access request to any type of server is received, the access path with the highest priority can be selected as a corresponding target access path based on priority information, the priority information corresponding to the access path can be the priority of each path determined in real time according to path performance indexes (such as throughput and response time length) of the access path corresponding to the different servers, in the actual use process, the determined path with the highest priority can be directly used as the optimal target access path, the priority information corresponding to the access path can also be priority setting rules or strategy information, such as determining the priority of the different access paths according to what rules or strategies, such as determining according to throughput or determining according to response time length, or setting different weights to the path performance indexes, and in the actual use process, the access path with the highest priority can be directly determined in real time according to the adopted rules or strategies.
Step S102, determining a target access path in a plurality of access paths corresponding to the server to be accessed according to address information of the server to be accessed contained in the server access request and access path priority information contained in preset multipath configuration data.
For example, the server to be accessed and the corresponding multiple access paths corresponding to the server access request may be determined according to the server address information, and the access path with the highest priority may be selected from the multiple access paths corresponding to the server to be accessed according to the priority determination manner in the previous step according to the priority information included in the preset multipath configuration data, where the priority information is included in the preset multipath configuration data.
Step S103, according to the protocol type corresponding to the target access path, a configuration template of the corresponding protocol is obtained from preset multi-path configuration data, and an access configuration file is generated according to configuration parameters input by a user.
The preset multipath configuration data includes configuration templates corresponding to different types of protocols, the corresponding configuration templates can be matched from the preset multipath configuration data through the protocol types corresponding to the selected target access paths, and the corresponding configuration parameters are correspondingly input by a user according to the configuration requirements of the configuration templates to generate an access configuration file of the server to be accessed. Specifically, when the protocol type is sniffed, the corresponding JSON/YAML configuration (such as that the AWS S3 template contains a bucket name, an area and an authentication field) can be loaded in the stored configuration template in advance, and the configuration template can be filled according to specific information which needs to be filled by a user or in a mode of automatically acquiring metadata of the corresponding field so as to generate an access configuration file according to the fields in the configuration template.
Step S104, according to the access configuration file and the driver corresponding to the protocol version type of the target access path, the access operation is carried out on the server to be accessed from the target access path.
Illustratively, the protocol version type of the server to be accessed can be obtained through sniffing by the protocol sniffing module, and the corresponding protocol driver is matched according to the protocol version type (such as NFSv3/v4, SMB2.0/3.0, etc.) of the server to be accessed. And according to the access configuration file and the drive corresponding to the protocol version type of the target access path, performing access operation on the server to be accessed from the target access path.
According to the server access control method provided by the embodiment of the application, when a server access request of any type is received, the configuration template corresponding to the current protocol type is obtained by acquiring the multi-path configuration data comprising the configuration templates corresponding to different types of protocols, and the access configuration file is generated by combining the configuration parameters input by a user. And executing the access operation of the server to be accessed based on the access configuration file automatically generated and the determined target access path, so that the complexity and the operation and maintenance cost of the configuration operation are reduced and the server access efficiency is further improved compared with a mode of writing the configuration file purely manually.
As an optional implementation manner of the embodiment of the application, the preset multipath configuration data further comprises a load balancing strategy corresponding to the cluster where the server is located, and in the embodiment of the application, the cluster where the server is located can share a server address, for example, a single entry is realized through virtual IP or domain name resolution, the storage operation of the data to be stored is realized through the load balancing strategy, and the load balancing strategy can comprise the selection operation of executing the storage operation server in the cluster under different use conditions so as to meet the storage requirement. The method further comprises the step of transferring the server access request to other servers in the cluster where the server to be accessed is located, wherein the other servers meet the requirements of the target performance indexes of the servers to be accessed when the target performance indexes of the servers to be accessed corresponding to the server access request do not meet the requirements. For example, the target performance index in the embodiment of the present application may include response time, etc., and may periodically collect the target performance index of the storage server, and adjust the load balancing policy in the multipath configuration data according to the target performance index. For example, when the response time of a certain storage server exceeds the preset time, the access request can be automatically transferred to other servers with faster response.
As an optional implementation manner of the embodiment of the present application, the access paths corresponding to each type of server at least include two protocol types of access paths, including the NFS protocol and the SMB protocol, or including the NFS protocol, the SMB protocol and the S3 protocol, and the protocol conversion module may be configured for incompatible protocols, so that different protocol data may implement communication transmission, where the method further includes:
When the target access path under any type of protocol fails, switching to the access path corresponding to other types of protocols, and taking the current access path as the target access path and marking the current access path as a degraded access state.
For example, for a protocol including only one target access path, when the target access path fails (such as a network interface is disconnected or a service process crashes), the target access path under any type of protocol may be directly switched to an access path corresponding to another type of protocol and used as a new target access path, if the current type of protocol corresponds to a plurality of target access paths, one access path fails, the target access path under the current protocol may be switched to another target access path first, and when all target access paths fail, the target access path is switched to an access path corresponding to another type of protocol and used as a new target access path. The target access path selected according to the path priority has the corresponding network performance which is the best access path in all the paths to be selected, and when the target access path fails and is switched to other access paths, the access path used by the current access request is indicated to be in a speed-down state, and the current access path is marked as a degradation access state and can be used for prompting technicians to monitor or adjust the current access request.
As an optional implementation manner of the application, for a plurality of access paths corresponding to the current type protocol, when one of the access paths is selected as a target access path according to the information such as the priority of the path, and when the target access path fails, the other remaining access paths under the current protocol and the access paths under other protocols can be secondarily selected according to the priority information, such as performance comparison operation such as response time length. If the other remaining access paths under the current protocol have paths with shorter response time length, the path under the current protocol is used as a new target access path, if the response time length of all other access paths under the current protocol is smaller than that of the access paths under other protocols, the new target access path is selected from the access paths under other protocols, and further, for the corresponding multiple access paths under other protocols, the path with the lowest load amount can be selected from the multiple access paths with the lowest load amount to be used as the new target access path. For a server corresponding to at least two protocol types of access paths, when the service request is a storage request, the access path corresponding to the protocol under the corresponding type can be determined by combining the data type to be stored. The server simultaneously comprises access paths of the NFS protocol, the SMB protocol and the S3 protocol, if the current access request is file storage, the target access path can be selected from the access paths corresponding to the NFS protocol and the SMB protocol according to the priority information, and if the current access request is video object storage, the target access path can be selected from the access paths corresponding to the S3 protocol according to the priority information.
As an optional implementation manner of the embodiment of the application, the method further comprises the steps of responding to query operation of the data copy when all access paths corresponding to the server to be accessed do not meet the use condition, determining the position of the data copy when the data copy is queried, carrying out consistency check on the data in the position of the data copy, updating the routing table and switching the access request of the server corresponding to the server to be accessed to the access path where the position of the data copy is located when the consistency check result meets the requirement.
Illustratively, all paths corresponding to the server to be accessed include all access paths under different protocols, and when all access paths do not meet the use condition, the method can include all access path I/O timeout (such as not responding for more than 3 seconds), then responding to the query operation of the data copy. The data copy can represent mirror image data stored under other server nodes, a specific query mode can be that a routing table is searched, key information such as a data position, path mapping, copy relation and the like is recorded in the routing table, whether the data copy exists or not and the corresponding data copy position can be determined by querying the metadata routing table, further, consistency check is carried out on the data in the data copy position to ensure the integrity of the data in the data copy to be accessed, and when the consistency check result meets the requirement, the information such as the path mapping in the routing table is updated and the access request of the server corresponding to the server to be accessed is switched to an access path where the data copy position is located. By updating the routing table, the system can preferably select a new copy path as an access path according to the updated routing table when the system accesses the same data next time.
As an optional implementation manner of the embodiment of the application, the method further comprises responding to the abnormal alarm operation when the data copy is not queried. Illustratively, when no copy of the data is available, an alarm operation is triggered, and a manager may be notified to perform manual fault checking and intervention by means of an IM message or the like. When the original server repairs and synchronizes the data, the routing table can be readjusted, and the original access path is switched back.
As an optional embodiment of the present application, determining, according to address information of a server to be accessed included in a server access request and access path priority information included in preset multipath configuration data, a target access path among a plurality of access paths corresponding to the server to be accessed includes:
and a step a1 of determining a corresponding access path according to the address information of the server to be accessed contained in the server access request, wherein the access path corresponding to the server to be accessed can be obtained from preset multi-path configuration data.
Step a2, determining the throughput and the running state information of the server to be accessed corresponding to each access path, wherein the running state information of each access path can comprise Round Trip Time (RTT) of each access path.
And a3, determining a target access path according to the throughput and running state information of each access path and the path priority information.
Illustratively, in combination with pre-configured path priority information, such as that of the low-latency path is highest, the lowest-latency path may be selected from the plurality of access paths as the target access path. Specifically, the path priority information of different resources to be stored may be different, for example, when the resources to be stored are large-volume video objects, the corresponding path priority information may be that the priority of the path with the highest bandwidth is the highest to set the weight score for the path with different bandwidths, and for other small-volume files, the corresponding path priority information may be that the priority of the low-delay path is the highest to set the weight score for the path with different delays. And selecting a target access path through the acquired attribute information of each path and the weight score determined by the path priority configuration strategy information, or inputting the throughput and running state information of the current server to be accessed corresponding to each access path into the AI model according to a pre-trained AI model, so that the AI model gives a path selection strategy, such as a priority local storage path (NVMe, non-Volatile Memory Express) and an alternative NFS path, based on the current parameters.
The method for acquiring the access paths comprises the steps of acquiring preset index data of access paths corresponding to each server according to target interval duration, and adjusting path priority information of a plurality of access paths corresponding to each server according to acquisition results.
In an exemplary embodiment, the access path priority information included in the preset multipath configuration data may include priority configuration policy information of paths under different protocols (for example, a path with a highest bandwidth has a highest priority or a path with a highest low delay has a highest priority), so that the access path with a highest priority may be determined in real time according to the priority configuration policy information, and the path priority information may further include configured priority information of multiple paths under each protocol. Specifically, preset index data (such as throughput, response time length and the like) of the access paths corresponding to each server can be collected according to a target interval time length, corresponding priority is set for each path according to priority configuration strategy information according to a collection result, when an access request is received, a path with the highest priority can be directly selected from preset multi-path configuration data types according to the priority of the pre-configured path, and when the amount of data to be stored is large, access paths which need to be used can be selected according to the order of the priority from high to low so as to ensure timeliness of data storage. By continuously collecting preset index data according to the target interval duration, the accuracy of the configured path priority result can be ensured. The embodiment of the application does not limit the target interval duration, and can be determined by a person skilled in the art according to the change condition of the path attribute information.
When a storage access request initiated by a user is received, an optimal access path is selected based on a dynamic path access strategy (such as priority determined by indexes such as maximum throughput and minimum delay), I/O operation is executed, if the I/O operation is successful, a result is returned to the user, if the I/O operation is overtime or failure, fault detection can be triggered, when other protocol access paths exist in the same server, access path switching operation is executed, the current access path is marked as a degraded access state (namely, the current path non-optimal path can be represented), and meanwhile, the access path corresponding to the current server recorded by a routing table in preset multi-path configuration data is updated. When the same server does not have other protocol access paths, checking whether a data copy exists through a routing table, if so, executing the current storage access request operation by adopting a path where the data copy exists and updating the routing table, if not, triggering an alarm operation, monitoring the performance of an original path, optimizing the weight fraction of the original path when the performance of the original path reaches the standard, and adopting the original path when the same storage access request is received next time.
The server access control method provided by the embodiment of the application realizes uniform access of heterogeneous storage servers through multi-path file configuration, creates a protocol-independent virtual file interface layer, provides a transparent access interface for upper-layer applications, shields the bottom layer protocol difference, solves the problems of interface fragmentation, complex configuration and low availability in a hybrid storage environment through dynamic protocol adaptation, multi-path load balancing and cross-protocol fault switching mechanism, can update multi-path strategies without restarting services, is suitable for flexible telescopic cloud computing, distributed storage and edge computing scenes, and realizes flexible call on hybrid storage resources. The system can support multiple types of main stream storage protocols, the configuration workload is reduced by 80%, and compared with a static multipath scheme, through dynamic path selection, the IOPS is improved by 30% -50%, and the reliability of the system is up to 99.95% due to the redundancy of the cross-protocol paths.
From the description of the above embodiments, it will be clear to a person skilled in the art that the method according to the above embodiments may be implemented by means of software plus the necessary general hardware platform, but of course also by means of hardware, but in many cases the former is a preferred embodiment.
The embodiment of the application also provides a server access control device which is applied to a server access control system, wherein the server access control system comprises a plurality of types of servers, and each type of server is provided with a plurality of access paths, and as shown in fig. 2, the device comprises:
The first obtaining module 201 is configured to obtain, when a server access request is received, preset multipath configuration data, where the preset multipath configuration data includes configuration templates corresponding to different types of protocols, access path information corresponding to different types of servers, and priority information corresponding to access paths. Specific reference is made to the description of the corresponding steps in the above method embodiments, and details are not repeated herein.
The first determining module 202 is configured to determine, according to address information of a server to be accessed included in the server access request and access path priority information included in the preset multipath configuration data, a target access path among multiple access paths corresponding to the server to be accessed. Specific reference is made to the description of the corresponding steps in the above method embodiments, and details are not repeated herein.
The generating module 203 is configured to obtain a configuration template of a corresponding protocol from preset multipath configuration data according to a protocol type corresponding to the target access path, and generate an access configuration file according to configuration parameters input by a user. Specific reference is made to the description of the corresponding steps in the above method embodiments, and details are not repeated herein.
And the access module 204 is configured to perform an access operation on the server to be accessed from the target access path according to the access configuration file and the driver corresponding to the protocol version type of the target access path. Specific reference is made to the description of the corresponding steps in the above method embodiments, and details are not repeated herein.
According to the server access control device provided by the embodiment of the application, when a server access request of any type is received, the configuration template corresponding to the current protocol type is obtained by acquiring the multi-path configuration data comprising the configuration templates corresponding to different types of protocols, and the access configuration file is generated by combining the configuration parameters input by a user. And executing the access operation of the server to be accessed based on the access configuration file automatically generated and the determined target access path, so that the complexity and the operation and maintenance cost of the configuration operation are reduced and the server access efficiency is further improved compared with a mode of writing the configuration file purely manually.
As an optional implementation manner of the embodiment of the application, the preset multi-path configuration data further comprises a load balancing strategy corresponding to the cluster where the server is located, and the device further comprises a transfer module for transferring the server access request to other servers where the target performance index of the cluster where the server to be accessed is located meets the requirement when the target performance index of the server to be accessed corresponding to the server access request does not meet the requirement.
The device comprises a server, a switching module, a degradation access state and a processing module, wherein the server is used for switching to the access path corresponding to other types of protocols when the target access path under any type of protocol fails, and taking the current access path as the target access path and marking the current access path as the degradation access state.
As an optional implementation manner of the embodiment of the application, the device further comprises a query module for responding to query operation of the data copy when all access paths corresponding to the server to be accessed do not meet the use condition, a second determination module for determining the position of the data copy when the data copy is queried, a verification module for carrying out consistency verification on the data in the position of the data copy, and an updating module for updating the routing table and switching the access request of the server corresponding to the server to be accessed to the access path where the position of the data copy is located when the consistency verification result meets the requirement.
As an optional implementation manner of the embodiment of the application, the device further comprises an alarm module, which is used for responding to the abnormal alarm operation when the data copy is not queried.
As an optional implementation manner of the embodiment of the application, the first determining module comprises a first determining submodule, a second determining submodule and a third determining submodule, wherein the first determining submodule is used for determining a corresponding access path according to address information of a server to be accessed contained in a server access request, the second determining submodule is used for determining throughput and running state information of each access path corresponding to the server to be accessed, and the third determining submodule is used for determining a target access path according to the throughput and running state information of each access path and path priority information.
The device for the access path information comprises a collection module, an adjustment module and a processing module, wherein the collection module is used for collecting preset index data of the access path corresponding to each server according to the target interval duration, and the adjustment module is used for adjusting path priority information of a plurality of access paths corresponding to each server according to a collection result.
The description of the features in the embodiment corresponding to the server access control device may refer to the related description of the embodiment corresponding to the server access control method, which is not described herein in detail.
The embodiment of the application also provides an electronic device comprising a memory 10 and a processor 20, as shown in fig. 3, the memory 10 having stored therein a computer program, the processor 20 being arranged to run the computer program to perform the steps of any of the server access control method embodiments described above.
Embodiments of the present application also provide a computer readable storage medium having a computer program stored therein, wherein the computer program is configured to perform the steps of any of the server access control method embodiments described above when run.
In an exemplary embodiment, the computer readable storage medium may include, but is not limited to, a U disk, a Read-Only Memory (ROM), a random access Memory (Random Access Memory, RAM), a removable hard disk, a magnetic disk, or an optical disk, etc. various media in which a computer program may be stored.
Embodiments of the present application also provide a computer program product comprising a computer program which, when executed by a processor, implements the steps of any of the server access control method embodiments described above.
Embodiments of the present application also provide another computer program product comprising a non-volatile computer readable storage medium storing a computer program which, when executed by a processor, implements the steps of any of the server access control method embodiments described above.
Those of skill would further appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware, computer software, or combinations of both, and that the various illustrative elements and steps are described above generally in terms of functionality in order to clearly illustrate the interchangeability of hardware and software. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
The method, the device and the electronic equipment for controlling server access provided by the application are described in detail. The principles and embodiments of the present application have been described herein with reference to specific examples, the description of which is intended only to facilitate an understanding of the method of the present application and its core ideas. It should be noted that it will be apparent to those skilled in the art that various modifications and adaptations of the application can be made without departing from the principles of the application and these modifications and adaptations are intended to be within the scope of the application as defined in the following claims.
Claims (10)
1. A server access control method, characterized in that it is applied to a server access control system including a plurality of types of servers, each type of server being configured with a plurality of access paths, the method comprising:
When a server access request is received, acquiring preset multipath configuration data, wherein the preset multipath configuration data comprises configuration templates corresponding to different types of protocols, access path information corresponding to different types of servers and priority information corresponding to access paths;
determining a target access path in a plurality of access paths corresponding to the server to be accessed according to the address information of the server to be accessed contained in the server access request and the access path priority information contained in the preset multi-path configuration data;
According to the protocol type corresponding to the target access path, a configuration template of a corresponding protocol is obtained from the preset multi-path configuration data, and an access configuration file is generated according to configuration parameters input by a user;
and according to the access configuration file and the drive corresponding to the protocol version type of the target access path, performing access operation on the server to be accessed from the target access path.
2. The method for controlling access to a server according to claim 1, wherein the preset multipath configuration data further includes a load balancing policy corresponding to a cluster in which the server is located, and the method further includes:
And when the target performance index of the server to be accessed corresponding to the server access request does not meet the requirement, transferring the server access request to other servers of which the target performance index meets the requirement in the cluster where the server to be accessed is located.
3. The method of claim 1, wherein the access paths corresponding to each type of server include at least two protocol types of access paths, and wherein the method further comprises:
When the target access path under any type of protocol fails, switching to the access path corresponding to other types of protocols, and taking the current access path as the target access path and marking the current access path as a degraded access state.
4. A server access control method according to claim 3, characterized in that the method further comprises:
when all access paths corresponding to the server to be accessed do not meet the use conditions, responding to the query operation of the data copy;
when the data copy is queried, determining the position of the data copy;
performing consistency check on the data in the data copy position;
And when the consistency check result meets the requirement, updating the routing table and switching the access request of the server corresponding to the server to be accessed to the access path where the data copy position is located.
5. The method of claim 4, further comprising responding to an anomaly alert operation when the copy of the data is not queried.
6. The server access control method according to claim 1 or 3, wherein the determining, according to address information of a server to be accessed included in the server access request and access path priority information included in the preset multipath configuration data, a target access path among a plurality of access paths corresponding to the server to be accessed includes:
determining a corresponding access path according to address information of a server to be accessed contained in the server access request;
Determining throughput and running state information of a server to be accessed corresponding to each access path;
And determining the target access path according to the throughput and running state information of each access path and the path priority information.
7. The server access control method according to claim 1, characterized in that the method further comprises:
Acquiring preset index data of an access path corresponding to each server according to the target interval duration;
And adjusting the path priority information of the multiple access paths corresponding to each server according to the acquisition result.
8. A server access control apparatus, characterized by being applied to a server access control system including a plurality of types of servers, each type of server being configured with a plurality of access paths, the apparatus comprising:
The first acquisition module is used for acquiring preset multipath configuration data when a server access request is received, wherein the preset multipath configuration data comprises configuration templates corresponding to different types of protocols, access path information corresponding to different types of servers and priority information corresponding to access paths;
The first determining module is used for determining a target access path in a plurality of access paths corresponding to the server to be accessed according to the address information of the server to be accessed contained in the server access request and the access path priority information contained in the preset multi-path configuration data;
The generation module is used for acquiring a configuration template of a corresponding protocol from the preset multi-path configuration data according to the protocol type corresponding to the target access path and generating an access configuration file according to the configuration parameters input by a user;
And the access module is used for performing access operation on the server to be accessed from the target access path according to the access configuration file and the drive corresponding to the protocol version type of the target access path.
9. An electronic device, comprising:
A memory for storing a computer program;
A processor for implementing the steps of the server access control method according to any one of claims 1 to 7 when executing said computer program.
10. A computer readable storage medium, characterized in that a computer program is stored in the computer readable storage medium, wherein the computer program, when being executed by a processor, implements the steps of the server access control method according to any one of claims 1 to 7.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202510676716.1A CN120474905A (en) | 2025-05-23 | 2025-05-23 | Server access control method and device and electronic equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202510676716.1A CN120474905A (en) | 2025-05-23 | 2025-05-23 | Server access control method and device and electronic equipment |
Publications (1)
Publication Number | Publication Date |
---|---|
CN120474905A true CN120474905A (en) | 2025-08-12 |
Family
ID=96628039
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202510676716.1A Pending CN120474905A (en) | 2025-05-23 | 2025-05-23 | Server access control method and device and electronic equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN120474905A (en) |
-
2025
- 2025-05-23 CN CN202510676716.1A patent/CN120474905A/en active Pending
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8533261B2 (en) | Extensible and programmable multi-tenant service architecture | |
US8972366B2 (en) | Cloud-based directory system based on hashed values of parent and child storage locations | |
CN101460907B (en) | Systems and methods for managing execution of programs | |
US20210211363A1 (en) | QoS-OPTIMIZED SELECTION OF A CLOUD MICROSERVICES PROVIDER | |
JP5526137B2 (en) | Selective data transfer storage | |
US20060242320A1 (en) | Method and apparatus for polling | |
US20120078948A1 (en) | Systems and methods for searching a cloud-based distributed storage resources using a set of expandable probes | |
WO2010036883A1 (en) | Mixed network architecture in data forwarding storage | |
WO2012125144A1 (en) | Systems and methods for sizing resources in a cloud-based environment | |
US20040139194A1 (en) | System and method of measuring and monitoring network services availablility | |
JP7593726B2 (en) | Blockchain management of provisioning failures | |
WO2018118812A1 (en) | On-demand generation of a contact center | |
US12170643B2 (en) | Application routing infrastructure for private-level redirect trapping and creation of NAT mapping to work with connectivity in cloud and customer networks | |
US7739364B2 (en) | Method and apparatus for dynamically reconfiguring a server system | |
WO2023100062A1 (en) | Managing nodes of a dbms | |
US12020081B2 (en) | Method to implement multi-tenant/shared redis cluster using envoy | |
US9544371B1 (en) | Method to discover multiple paths to disk devices cluster wide | |
US7711780B1 (en) | Method for distributed end-to-end dynamic horizontal scalability | |
US20050234961A1 (en) | Systems and Methods for providing a proxy for a shared file system | |
CN110011850B (en) | Management method and device for services in cloud computing system | |
CN120474905A (en) | Server access control method and device and electronic equipment | |
CN113840013B (en) | Document system for hierarchical management | |
CN107395416A (en) | A kind of data transmission method for uplink and server cluster | |
CN109302505B (en) | Data transmission method, system, device and storage medium | |
US10621148B1 (en) | Maintaining multiple object stores in a distributed file system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination |