Unlock instant, AI-driven research and patent intelligence for your innovation.

Method, device, computer equipment and storage medium for access request processing

An access request and service access technology, applied in the field of communication, can solve the problems of increased database pressure, cache breakdown, low cache hit rate, etc., to prevent data skew, prevent cache breakdown, and improve stability.

Active Publication Date: 2022-06-17
BEIJING BYTEDANCE NETWORK TECH CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] At present, in service discovery, long-tail requests often cause a low cache hit rate. In this way, since no data is read in the cache, the data can only be read through the database, which causes the pressure on the database to increase instantaneously, and the cache occurs. breakdown
In addition, due to insufficient dispersion of cached data, a large amount of cached data is concentrated on one or several service instances (that is, data skew), which leads to a decline in service performance stability

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, device, computer equipment and storage medium for access request processing
  • Method, device, computer equipment and storage medium for access request processing
  • Method, device, computer equipment and storage medium for access request processing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0087] see figure 1 As shown, a flowchart of a method for processing an access request provided by an embodiment of the present disclosure, the method includes steps S101-S104, wherein:

[0088] S101: Receive a service access request sent by a service requester, and extract a target identification code from a request parameter carried in the service access request.

[0089] In this step, after receiving the service access request sent by the service requester, first obtain the request parameters carried by the service access request, and extract the target identification code from the request parameters. Here, using the target identification code, it can be determined A service instance used to provide services for the service requester. The request parameters may include the identification of the requested content, the identification of the service requesting end, the version of the service requesting end, etc.; the identification code may be an identification related to the ...

Embodiment 2

[0146] refer to Figure 3 to Figure 5 shown, image 3 One of the schematic diagrams of an apparatus 300 for processing an access request provided by an embodiment of the present disclosure is shown; Figure 4 A second schematic diagram of an apparatus 300 for processing an access request provided by an embodiment of the present disclosure is shown; Figure 5 A specific schematic diagram of the generating module 350 in the apparatus 300 for processing an access request provided by an embodiment of the present disclosure is shown.

[0147] like image 3 As shown, the apparatus 300 for processing an access request includes:

[0148] The extraction module 310 is configured to receive the service access request sent by the service requester, and extract the target identification code from the request parameters carried by the service access request;

[0149] A determination module 320, configured to determine whether the service access request belongs to a target access request...

Embodiment 3

[0179] Based on the same technical concept, an embodiment of the present disclosure also provides a computer device. refer to Image 6 As shown, a schematic structural diagram of a computer device 600 provided by an embodiment of the present disclosure includes a processor 601 , a memory 602 , and a bus 603 . Among them, the memory 602 is used to store the execution instructions, including the memory 6021 and the external memory 6022; the memory 6021 here is also called the internal memory, and is used to temporarily store the operation data in the processor 601 and the data exchanged with the external memory 6022 such as the hard disk, The processor 601 exchanges data with the external memory 6022 through the memory 6021. When the computer device 600 is running, the processor 601 communicates with the memory 602 through the bus 603, so that the processor 601 executes the following instructions:

[0180] Receive the service access request sent by the service requester, and ex...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present disclosure provides a method, device, computer equipment and storage medium for processing an access request. By extracting the target identification code from the received service access request sent by the service requesting end, and based on the frequency of occurrence of the target identification code, determine Whether the service access request belongs to the target access request, if not, based on the preset hash routing table, send the first network address of the service instance that matches the target identification code to the service requester, if it belongs to, then send the query to the service request end The requesting end sends the second network address of the service instance with the lowest traffic currently. Based on the above method, assigning service instances to service requesters through the hash routing table can prevent long-tail requests from causing cache breakdowns, and by assigning target access requests to service instances with low access volumes, data skew can be prevented In this way, each service instance can evenly process service access requests and improve service stability.

Description

technical field [0001] The present disclosure relates to the field of communication technologies, and in particular, to a method, an apparatus, a computer device, and a storage medium for processing an access request. Background technique [0002] Service discovery refers to using a registry to record the information of all services in the distributed system, so that in a service access request, other services can quickly find the network location (IP address and port) of these registered service instances. [0003] At present, the Internet server generally adopts the micro-service architecture. The characteristic of the micro-service architecture is that it is divided into multiple services that depend on each other in sequence, and each service has multiple instances. Get a list of IPs of downstream service instances. [0004] At present, long-tail requests often cause a low cache hit rate in service discovery. In this way, since no data is read in the cache, the data can...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L67/63H04L67/10H04L45/00H04L45/74
CPCH04L67/10H04L45/54H04L45/74H04L67/63
Inventor 姜磊丰亚东
Owner BEIJING BYTEDANCE NETWORK TECH CO LTD