Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and device for cluster management

A cluster management and cluster technology, applied in the field of communication, can solve the problems of business delay and long cluster restart time, and achieve the effect of reducing business delay

Active Publication Date: 2022-04-22
NEW H3C SECURITY TECH CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] When a new node is connected to the master node, or a slave node is separated from the master node, the master node needs to rebalance the load of each node in the cluster, that is, recalculate the hash value of each node, and the corresponding The hash value of the key value to be monitored (key), because the parameters used in calculating the hash value include the number of nodes, and the number of nodes changes, so the calculated hash value of each node and the value of each key value to be monitored The hash values ​​all change, which in turn leads to changes in the data that each node needs to monitor after re-balancing the load, resulting in more data migration and other work, resulting in a longer cluster restart time and business delays

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for cluster management
  • Method and device for cluster management
  • Method and device for cluster management

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0073] The following will clearly and completely describe the technical solutions in the embodiments of the application with reference to the drawings in the embodiments of the application. Apparently, the described embodiments are only some of the embodiments of the application, not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the scope of protection of this application.

[0074] For the convenience of understanding, firstly, the application scenario of the embodiment of the present application will be described. Applying the method of the embodiment of the present application, after the cluster is started or restarted, if there is no master node in the cluster, the master node will be elected. Or, during the cluster operation, each slave node in the cluster will periodically receive the heartbeat message sent by the master node to determine whether th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiments of the present application provide a method and device for cluster management, which relate to the field of communication technology and are used to solve the problem of long service delay caused by the restart process when there are new nodes or detached nodes in the cluster that need to be restarted. The scheme of the embodiment of the present application includes: obtaining a list of surviving nodes, the list of surviving nodes includes the Internet protocol IP addresses of each node that establishes a connection with the master node, and then calculating the hash value of the IP address of each node in the list of surviving nodes; according to each The hash value of the IP address of the node maps each node to a position on the hash ring, and then obtains the key value to be monitored corresponding to the data to be monitored, determines the hash value corresponding to each key value to be monitored, and then according to each The hash value corresponding to the key value to be monitored is mapped to the location of the hash ring to determine the monitoring range of each node.

Description

technical field [0001] The present application relates to the field of communication technologies, and in particular to a cluster management method and device. Background technique [0002] In the era of the Internet of Everything, huge amounts of data formatting is the basis for big data analysis and machine learning. The Fluentd log collection framework is a data collection tool with functions such as data collection, filtering, processing, and writing. Various complex processing of data. At present, in the face of massive data in the big data environment, there has been a multi-Fluentd instance technology based on consistency, that is, the cluster includes multiple Fluentd nodes, one Fluentd node is the master node, and the rest of the Fluentd nodes can be connected to the master node as slave nodes . [0003] When a new node is connected to the master node, or a slave node is separated from the master node, the master node needs to rebalance the load of each node in th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L67/1001H04L43/10
CPCH04L43/10H04L67/1001
Inventor 陶勇森
Owner NEW H3C SECURITY TECH CO LTD