Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A cluster authorization method and device based on unified management

A cluster and authorization time technology, applied in the cluster field, can solve problems such as inconsistent authorization time, the cluster stops providing services, and the entire cluster stops providing services, so as to achieve the effect of ensuring normal service provision

Active Publication Date: 2021-10-26
ZHENGZHOU YUNHAI INFORMATION TECH CO LTD
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The current authorization method for the cluster is to configure a monitoring module for each node of the cluster to independently calculate the authorization time of each node, but this method of independently calculating the authorization time for each node will lead to During the process, the authorization time of different nodes is inconsistent, which may lead to the invalidation of the authorization time of the node, and even stop the entire cluster from providing services.
Or, when the user artificially modifies the local time of some nodes in the cluster, the authorized time of the node may be inconsistent with that of other nodes, causing the entire cluster to stop providing services

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A cluster authorization method and device based on unified management
  • A cluster authorization method and device based on unified management
  • A cluster authorization method and device based on unified management

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] The following will clearly and completely describe the technical solutions in the embodiments of the application with reference to the drawings in the embodiments of the application. Apparently, the described embodiments are only some of the embodiments of the application, not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the scope of protection of this application.

[0043] In order to facilitate the understanding of the technical solution provided by the present application, a brief description of the research background of the technical solution of the present application is given below.

[0044] As we all know, as described in the background technology, with the advent of the era of big data and the continuous development of high-performance parallel computing technology, the amount of data that the storage system needs to process is increasin...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present application discloses a cluster authorization method and device based on unified management. The method includes: after determining the master node and the non-master node in the cluster, synchronizing the authorization time and authorization status of the master node of the cluster to other nodes in the cluster All non-master nodes, so that the authorization time and authorization status of all other non-master nodes in the cluster are consistent with the cluster master node. In this way, the authorization time and authorization status of all nodes in the cluster are guaranteed to be consistent, and unified management is realized. Cluster authorization. It can be seen that this application no longer uses the method of independently calculating the authorization time for each node, but after determining the master node and non-master nodes in the cluster, the authorization time and authorization status of the cluster master node are synchronized to all other nodes in the cluster. Non-master nodes, so as to realize the unified management of the authorization time and authorization state of each node in the cluster, thereby ensuring that the authorization time of all nodes in the cluster is consistent, and ensuring that the cluster can provide services normally.

Description

technical field [0001] The present application relates to the field of cluster technology, in particular to a unified management-based cluster authorization method and device. Background technique [0002] At present, with the advent of the data age and the continuous development of high-performance parallel computing technology, the amount of data that needs to be stored daily is increasing. In this context, distributed storage systems have begun to be widely used. [0003] For distributed storage systems, while increasing the capacity of the storage system, how to authorize the cluster of the storage system is also particularly important, especially when the company sells the product to the customer, the authorization of the cluster must be strictly controlled. So that the customer can only enjoy the corresponding service of the product within the authorized time. After the lease expires, if the customer can continue to enjoy the service of the product, it will cause certa...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/08H04J3/06
CPCH04J3/0638H04L67/1097
Inventor 王庆海
Owner ZHENGZHOU YUNHAI INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products