Cluster access method and related product

An access method and cluster technology, applied in the cluster field, can solve problems such as cluster access failure and Hadoop cluster cluster configuration changes, and achieve the effect of avoiding access failure and improving the probability of successful cluster access.

Active Publication Date: 2019-12-20
HUAWEI CLOUD COMPUTING TECH CO LTD
View PDF7 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, as the business scale of the enterprise grows, the Hadoop cluster will continue to add nodes to meet business needs, and at the same time will continue to update and eliminate failed nodes, that is, the nodes of the Hadoop cluster will continue to change, so the cluster configuration of the Hadoop cluster will change
If the client used to access the cluster is still using the old cluster configuration, it may cause cluster access failure

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cluster access method and related product
  • Cluster access method and related product
  • Cluster access method and related product

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0068] The technical solution in this application will be described below with reference to the accompanying drawings.

[0069] A cluster is a group of computers that are independent of each other and interconnected through a high-speed network. They form a group and are managed in a single system mode; each computer in the cluster can be used as a node in the cluster. Usually, the user equipment can access the corresponding cluster through the client, and the client is used to connect with the cluster. The client receives the user's access request, finds the cluster corresponding to the access request, and uses the nodes in the cluster to execute the access request.

[0070] Since the client versions corresponding to each cluster are different, and some clients need to store the configuration information of the cluster in the environment variables of the running process of the client, this makes it difficult for a client to be compatible with multiple clusters. That is to sa...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a cluster access method and a related product. The cluster access method comprises the following steps: a client proxy device receives a first access request of a first clustersent by user equipment; the client proxy device uses a first client to control the first cluster to process the first access request, wherein the first client is started by the client proxy device according to first configuration information of the first cluster; when the client proxy device detects that the first configuration information is updated, the client proxy device starts a second clientaccording to the updated first configuration information; and when the client proxy device receives a second access request of the first cluster, the target cluster is controlled to process the second access request by using the second client. Therefore, the access failure caused by the fact that the user process processes the access cluster by using the non-updated client can be effectively avoided, and the probability of cluster access success is improved.

Description

technical field [0001] The present application relates to the field of cluster technology, in particular to a cluster access method and related products. Background technique [0002] Enterprises usually use clients to securely access Hadoop clusters to process related big data tasks. However, as the business scale of the enterprise grows, the Hadoop cluster will continue to add nodes to meet business needs, and at the same time will continue to update and eliminate failed nodes, that is, the nodes of the Hadoop cluster will continue to change, so the cluster configuration of the Hadoop cluster will change. If the client used to access the cluster is still using the old cluster configuration, cluster access may fail. Contents of the invention [0003] This application provides a cluster access method and related products, which can update the client in time to ensure the success rate of cluster access. [0004] In the first aspect, the present application provides a clus...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/10H04L63/08H04L67/1044H04L67/56
Inventor 谢镇鸿
Owner HUAWEI CLOUD COMPUTING TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products