CN121418230A - A method and related apparatus for unified entry point management of multi-environment services in software development - Google Patents
A method and related apparatus for unified entry point management of multi-environment services in software developmentInfo
- Publication number
- CN121418230A CN121418230A CN202511296474.XA CN202511296474A CN121418230A CN 121418230 A CN121418230 A CN 121418230A CN 202511296474 A CN202511296474 A CN 202511296474A CN 121418230 A CN121418230 A CN 121418230A
- Authority
- CN
- China
- Prior art keywords
- service
- environment
- access request
- environment service
- unified
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Landscapes
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The application discloses a unified entry management method and a related device for multi-environment services in software development, which are used for solving the problem of decentralized multi-environment management in the development process. The method comprises the steps of configuring a unified portal gateway, enabling the unified portal gateway to access a plurality of environment services of software development, enabling each environment service to correspond to a complete operation environment of different stages of the software development respectively, analyzing request characteristics of an access request after the access request of a client is received, matching target environment services according to analysis results and preset routing rules, and routing the access request to the target environment services through the unified portal gateway.
Description
Technical Field
The application relates to the technical field of software development, in particular to a unified entry management method and a related device for multi-environment service in software development.
Background
With the development of society, the software development and operation process also increasingly emphasizes efficiency, stability and cooperativity. Under the background of digital transformation acceleration, the dependence of enterprises on software is continuously improved, and a software system is required to support core business operation and rapidly respond to market demand change, so that the complexity of research and development and operation links is greatly increased. In the process of software development and operation, enterprises generally need to deploy multiple sets of environments such as development, testing, acceptance, performance testing and the like to support the working requirements of different stages.
In the prior art, multiple environment management often employs a decentralized architecture. Each environment service has independent access addresses, and when a developer is debugged, the developer needs to frequently switch among the addresses of different environments, so that a plurality of addresses are required to be memorized, and misoperation is easily caused by input errors. When the cross-environment verification function is performed, besides the access address is to be switched, various access parameters such as database connection parameters, API call parameters and the like are required to be reconfigured, the process is complicated, and the fine difference of different environment configurations can cause deviation of test results, so that the accuracy and reliability of the test are affected.
The distributed architecture has the problem of portal fragmentation in actual operation and maintenance, because environments such as development, test, acceptance and performance test are respectively and independently connected to a public network, each set of environment is provided with a dedicated gateway, a public network IP and network configuration, a multi-portal parallel redundant architecture is formed, the repeated input of resources is caused, the hardware cost of a server, bandwidth and the like is increased, operation and maintenance personnel are required to simultaneously maintain a plurality of sets of gateway configuration files, and the SSL certificates are updated periodically, so that the management cost is increased.
Disclosure of Invention
The application discloses a unified entry management method and a related device for multi-environment services in software development, which are used for solving the problem of decentralized multi-environment management in the development process.
The first aspect of the application discloses a unified entry management method for multi-environment services in software development, which comprises the following steps:
configuring a unified portal gateway, wherein the unified portal gateway accesses a plurality of environment services of software development, and each environment service corresponds to a complete running environment of different stages of software development respectively;
After receiving an access request of a client, analyzing request characteristics of the access request;
matching the target environment service according to the analysis result and a preset routing rule;
and routing the access request to the target environment service through the unified portal gateway.
Optionally, the matching the target environment service according to the analysis result and the preset routing rule includes:
extracting key information related to the environmental service from the analysis result;
matching the key information with a preset routing rule, and screening out candidate environment services;
If the number of the candidate environment services is 1, determining the candidate environment services as target environment services;
and if the number of the candidate environment services is greater than 1, sequencing the candidate environment services according to a priority strategy in a preset routing rule, and selecting the candidate environment service with the highest ranking as a target environment service.
Optionally, after matching the target environment service according to the parsing result and the preset routing rule, the method further includes:
Initiating health state probe detection for the target environment service according to the preset routing rule, wherein the health state probe detection comprises service port connectivity verification, basic response time test and core component availability verification;
after the health probe detection passes, the step of routing the access request to the target environmental service through the unified portal gateway is performed.
Optionally, the initiating the health status probe detection for the target environmental service according to the preset routing rule includes:
Acquiring a service port from the registration information of the target environment service, sending a TCP connection request to the service port, and verifying whether connection is successfully established within a preset timeout time;
After the connection of the service port is successfully established, a health check response message is sent to the target environment service, the basic response time is recorded, and whether the basic response time meets the preset threshold requirement is checked according to the type of the target environment service;
analyzing the response message to extract a core component state identifier of the target environment service, and verifying whether the core component of the target environment service is in a preset normal running state according to the core component state identifier.
Optionally, after routing the access request to the target environment service through the unified portal gateway, the method further comprises:
And recording the route track data of the access request, and synchronizing the route track data to a log analysis platform in real time.
Optionally, the method further comprises:
And performing vulnerability detection and risk assessment on the unified entry gateway according to a preset period, and feeding back a vulnerability list generated by scanning, risk levels and repair suggestions to an operation and maintenance platform in real time.
Optionally, the method further comprises:
And when the target environment service cannot process the access request, re-selecting an alternative environment service, and routing the access request to the alternative environment service through the unified entry gateway.
The second aspect of the present application provides a unified portal management device for a multi-environment service in software development, comprising:
The configuration unit is used for configuring a unified portal gateway, the unified portal gateway accesses a plurality of environment services of software development, and each environment service corresponds to a complete operation environment of different stages of software development respectively;
The analysis unit is used for analyzing the request characteristics of the access request after receiving the access request of the client;
The matching unit is used for matching the target environment service according to the analysis result and a preset routing rule;
and the routing unit is used for routing the access request to the target environment service through the unified entry gateway.
The third aspect of the present application provides a unified portal management device for a multi-environment service in software development, comprising:
a processor, a memory, an input-output unit, and a bus;
The processor is connected with the memory, the input/output unit and the bus;
The memory holds a program that the processor invokes to perform any of the alternative methods as in the first aspect as well as the first aspect.
A fourth aspect of the application provides a computer readable storage medium having a program stored thereon, which when executed on a computer performs any of the alternative methods as in the first aspect and the first aspect.
From the above technical solutions, the embodiment of the present application has the following advantages:
According to the scheme, the unified entry gateway is configured to enable the multi-environment service to be accessed to the same entry, the redundant design of the multi-gateway and the multi-public network IP is replaced, the multi-address is not required to be memorized, only unified requests are required to be initiated, then request characteristics are analyzed, target environments are matched according to rules, the gateway is matched with target environment services according to preset routing rules, and therefore routing is automatically completed, manual address switching or parameter reconfiguration is not required, errors caused by address errors and parameter configuration deviation are reduced, development and debugging efficiency and testing process smoothness are improved, hardware repeated investment of a server, bandwidth and the like is reduced, meanwhile operation and maintenance are only required to maintain configuration and certificates of the unified gateway, independent operation for each environment is not required, operation and maintenance cost is reduced, and management cost is prevented from exponentially increasing along with the number of environments.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings that are needed in the embodiments or the description of the prior art will be briefly described below, it being obvious that the drawings in the following description are only some embodiments of the present application, and that other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
FIG. 1 is a flow chart of an embodiment of a unified portal management method for multi-environment services for software development according to the present application;
FIG. 2 is a flow chart of an embodiment of a matching target environment service provided by the present application;
FIG. 3 is a flow chart of an embodiment of performing health status probe detection according to the present application;
FIG. 4 is a flow chart illustrating an embodiment of the present application after completing routing an access request to a target environment service;
FIG. 5 is a block diagram of one embodiment of a unified portal management device for multiple environment services for software development provided by the present application;
fig. 6 is a block diagram of another embodiment of a unified portal management device for multi-environment service in software development according to the present application.
Detailed Description
In the following description, for purposes of explanation and not limitation, specific details are set forth such as the particular system architecture, techniques, etc., in order to provide a thorough understanding of the embodiments of the present application. It will be apparent, however, to one skilled in the art that the present application may be practiced in other embodiments that depart from these specific details. In other instances, detailed descriptions of well-known systems, devices, circuits, and methods are omitted so as not to obscure the description of the present application with unnecessary detail.
It should be understood that the terms "comprises" and/or "comprising," when used in this specification and the appended claims, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
It should also be understood that the term "and/or" as used in the present specification and the appended claims refers to any and all possible combinations of one or more of the associated listed items, and includes such combinations.
As used in the present description and the appended claims, the term "if" may be interpreted as "when..once" or "in response to a determination" or "in response to detection" depending on the context. Similarly, the phrase "if a determination" or "if a [ described condition or event ] is detected" may be interpreted in the context of meaning "upon determination" or "in response to determination" or "upon detection of a [ described condition or event ]" or "in response to detection of a [ described condition or event ]".
Furthermore, the terms "first," "second," "third," and the like in the description of the present specification and in the appended claims, are used for distinguishing between descriptions and not necessarily for indicating or implying a relative importance.
Reference in the specification to "one embodiment" or "some embodiments" or the like means that a particular feature, structure, or characteristic described in connection with the embodiment is included in one or more embodiments of the application. Thus, appearances of the phrases "in one embodiment," "in some embodiments," "in other embodiments," and the like in various places throughout this specification are not necessarily all referring to the same embodiment, but mean "one or more but not an embodiment" unless expressly specified otherwise. The terms "comprising," "including," "having," and variations thereof mean "including but not limited to," unless expressly specified otherwise.
Based on the above, the application discloses a unified entry management method for multi-environment service in software development, which is used for solving the problem of decentralized multi-environment management in the development process.
The following description of the embodiments of the present application will be made clearly and fully with reference to the accompanying drawings, in which it is evident that the embodiments described are only some, but not all embodiments of the application. All other embodiments, which can be made by those skilled in the art based on the embodiments of the application without making any inventive effort, are intended to be within the scope of the application.
The method of the present application may be applied to a server, a device, a terminal, or other devices having logic processing capabilities, and the present application is not limited thereto. For convenience of description, the following description will take an execution body as an example of a system.
Referring to fig. 1, the present application provides an embodiment of a unified portal management method for a software development multi-environment service, which includes:
101. configuring a unified portal gateway, wherein the unified portal gateway accesses a plurality of environment services of software development, and each environment service corresponds to a complete running environment of different stages of software development respectively;
Firstly, a high-performance gateway cluster is built, the gateway cluster supports basic functions such as protocol conversion, load balancing and the like, and then environment services of each stage are accessed to the gateway. And binding a unique identifier for each environment, associating a back-end service address, integrating public network IP and SSL certificates of all environments, and accessing different environment services by only a single entrance, thereby simplifying the configuration and operation and maintenance processes.
102. After receiving an access request of a client, analyzing request characteristics of the access request;
After the unified portal gateway configured in the last step receives the client access request, accurate routing and safety control are realized by analyzing the request characteristics, and key information in the access request is extracted to prepare for the accurate routing. Specifically, the unified portal gateway first extracts basic characteristics of an access request, including an access protocol, a request method, a target path, a request header, a client IP, a port, and the like. On this basis, the feature related to the environment route is emphasized to be resolved, such as the environment identification prefix in the path, the environment parameter in the request parameter, or the environment label carried in the request header.
103. Matching the target environment service according to the analysis result and a preset routing rule;
After the characteristics of the access request are analyzed, the corresponding target environment service is accurately matched according to a preset routing rule, and the access request is ensured to be correctly guided to the target environment service. The method comprises the steps of carrying out accurate matching according to environment prefixes in a request path, analyzing request parameters or environment marks in a request head if no explicit identifier exists in the path, and carrying out default matching on preset basic environments for requests without environment information.
104. The access request is routed to the target environmental service through the unified ingress gateway.
After the target environment service is matched, the access request is forwarded to the corresponding environment through the unified portal gateway, the access request is firstly standardized, the problem that the format of the access request cannot lose packets and the like in the transmission process is guaranteed, then the access request is connected with the target environment service, and the standardized access request is routed to the target environment service.
In the embodiment, the multi-environment service is accessed to the same portal through configuring the unified portal gateway to replace the redundant design of the multi-gateway and the multi-public network IP, only unified requests are required to be initiated without memorizing multiple addresses, then the request characteristics are analyzed and target environments are matched according to rules, and the gateway is matched with target environment services according to preset routing rules, so that routing is automatically completed, manual address switching or parameter reconfiguration is not required, errors caused by address errors and parameter configuration deviation are reduced, development and debugging efficiency and test flow smoothness are improved, hardware repeated investment of a server, bandwidth and the like is reduced, meanwhile, operation and maintenance are only required to maintain configuration and certificates of the unified gateway, independent operation for each environment is not required, operation and maintenance cost is reduced, and management cost is prevented from exponentially increasing along with the number of environments.
In step 103, the target environment service is matched according to the analysis result and the preset routing rule, referring to fig. 2, fig. 2 is an embodiment of the target environment service matching, which includes the following steps:
201. Extracting key information related to the environmental service from the analysis result;
The extracted key information is divided into three types, namely environment identification information such as a "prod" prefix in a request path, an "env=test" mark in a request parameter or an environment code in a request header, business characteristic information including a service name and an interface version of a request, which are used for matching specific services in the environment, and access attribute information such as an area to which a client IP belongs and an identity authority level carried by the request, and auxiliary judgment on whether the environment access condition is met.
In the extraction process, the system performs format verification and standardization processing on the information, for example, the environment marks in different formats are uniformly converted into a standard format.
202. Matching the key information with a preset routing rule, and screening out candidate environment services;
and screening candidate environment services meeting the conditions through preset routing rules based on the extracted key information, and reducing the target range. The preset routing rule adopts multi-condition combination matching logic, namely, matching corresponding environments (such as 'env=prod' matching production environments) according to environment identification information, screening related services (such as 'service=party' matching payment service) in the environments by combining service characteristic information, and finally verifying access authority (such as allowing specific IP sections to access the pre-production environments) through access attribute information.
Rules support fuzzy matching in combination with exact matching, e.g. "API/" may match all API interfaces under a certain environment service, and "API/user/v1" exactly matches the user service v1 version. In the matching process, the system records all environment services meeting the conditions as candidates, and if the key information is missing (such as no environment identifier), a default rule (such as matching development environment) is triggered.
203. If the number of the candidate environment services is 1, determining the candidate environment services as target environment services;
after screening out the unique candidate service, the system automatically checks the basic compatibility of the service and the request (such as whether the service state is "running" or not and whether the interface version is matched or not). If the verification is passed, immediately marking the verification as the target environment service, skipping the complex ordering flow, if the basis is incompatible (such as the service is off-line), triggering an exception handling mechanism, returning a friendly prompt and recording an error log.
204. If the number of the candidate environment services is greater than 1, sequencing all the candidate environment services according to a priority strategy in a preset routing rule, and selecting the candidate environment service with the highest ranking as a target environment service;
When a plurality of candidate environment services exist, the priority policy is used for sorting and optimizing, and the request is ensured to be routed to the optimal environment. The preset priority strategy comprises a multi-dimensional evaluation index:
First, environmental importance (e.g., production environment priority over test environment);
Secondly, service load state (such as service ranking with CPU utilization lower than 70 percent is top);
third, request affinity (e.g., preferential routing to the fastest service instance of the historical response);
Fourth, business rules (e.g., member requests are routed preferentially to dedicated service clusters).
In the sorting process, the system calculates the comprehensive score of each candidate service according to the preset weight, and the highest score is selected as a target. For example, the production environment service default weight is 10, the test environment is 5, and if the production environment load is too high (weight deduction 3), the composite score is 7, which is still higher than 5 points of the test environment.
205. Initiating health state probe detection for the target environment service according to a preset routing rule, wherein the health state probe detection comprises service port connectivity verification, basic response time test and core component availability verification;
206. After the health probe detection passes, the step of routing the access request to the target environmental service through the unified portal gateway is performed.
After the target environment service is determined, the health probe detects to ensure that the target environment service can normally process the request, and the request is prevented from being routed to the abnormal service. When the method is implemented, firstly, the connectivity of a target environment service port is verified, the network accessibility is confirmed through TCP handshake, secondly, the basic response time is tested, a simple detection request is sent, the response time is required to be lower than a preset threshold value, and finally, the availability of a core component is checked, and whether a database, a cache and the like on which the target environment service depends are normal or not is checked.
If all the indexes reach the standard, the health is judged, and if some indexes do not reach the standard, the abnormal is marked. The preset rules support dynamic adjustment of the detection frequency and threshold. After the health detection is passed, the gateway formally routes the request to the target environment service to complete the whole routing process.
In this embodiment, the key information is extracted from the analysis result, so that the content closely related to the target environment service can be accurately focused, the environment identifier, the service feature, the access attribute and the like are covered, and the route deviation caused by information deletion or error is avoided. The key information is matched with the preset routing rules to screen candidate environment services, the multi-condition combination matching logic can cope with complex and changeable request scenes, the matching flexibility is further improved in a fuzzy and accurate matching combination mode, the target range is reduced, and time and computing resources are saved. When the number of the candidate environment services is 1, the target is directly determined, the flow is simplified, the routing response time is shortened, the user access efficiency is improved, when the number is more than 1, the priority policy is ordered and selected, and multidimensional indexes such as the importance of the environment, the service load, the request affinity, the service rule and the like are synthesized, so that the resource allocation is more reasonable.
And initiating health state probe detection on the target environment service, covering key checks such as port connectivity, response time and core component availability, preventing access requests from being routed to the failed environment service, and ensuring service continuity and stability. The access request is routed only after detection, so that the routing efficiency is improved.
In the step 205, the health status probe detection is initiated for the target environment service according to the preset routing rule, referring to fig. 3, fig. 3 is an embodiment of performing the health status probe detection, which includes the following steps:
301. acquiring a service port from registration information of a target environment service, sending a TCP connection request to the service port, and verifying whether connection is successfully established within a preset timeout time;
And calling the registration information of the target environment service, and extracting the service port of the external communication. The unified entry gateway sends TCP connection requests to the service port according to preset frequency, and sets timeout time. If the connection is overtime or refused, marking as verification failure, and recording information such as fault port, request time and the like.
302. After the connection of the service port is successfully established, a health check response message is sent to the target environment service, the basic response time is recorded, and whether the basic response time meets the preset threshold requirement is checked according to the type of the target environment service;
After the environment service ports are connected, the response performance of the environment service needs to be further verified. Specifically, the system sends a standardized health check message to the target environment service, and synchronously records the complete time consumption from the sending of the message to the receiving of the response, namely the basic response time.
And if the response time exceeds the threshold value, marking the performance as abnormal, and generating early warning information by associating the service types. And the identification accuracy of service response performance abnormality is improved.
303. Analyzing the response message to extract the state identifier of the core component of the target environment service, and verifying whether the core component of the target environment service is in a preset normal running state according to the state identifier of the core component.
And receiving a health check response message returned by the target environment service, and extracting a state identification field of the core component through a preset analysis rule. Core components include, but are not limited to, databases, cache systems, message middleware, and storage services, and corresponding state identification fields include component connection status, resource usage, process survival flags, and the like. For different types of core components, standard identification values or ranges of normal running states are predefined to build a preset normal state library.
And comparing the extracted core component state identifier with a preset normal state library one by one. If the state identification of at least one core component does not accord with the preset standard, the core component is judged to be abnormal.
In this embodiment, step 301 accurately obtains the service port from the registration information and initiates TCP connection verification, and in combination with a preset timeout, can quickly identify the port unreachable problem.
Step 302 sets differential response time thresholds for different service types, records and verifies basic response time through health check messages, and after the e-commerce platform is applied, service response performance abnormality identification accuracy is improved.
Step 303 parses the response message to extract the core component status identifier, compares the core component status identifier with a preset normal status library, can early warn component faults such as a database, a cache and the like in advance, and further improves three layers of check layers from network connectivity, response performance to component availability, improves the accuracy and comprehensiveness of target environment service health detection, provides reliable status support for request routing, and ensures the running stability of cross-environment service.
After routing the access request to the target environment service, referring to fig. 4, fig. 4 is an embodiment after completing the routing of the access request to the target environment service, comprising the steps of:
401. Recording route track data of the access request, and synchronizing the route track data to a log analysis platform in real time;
When an access request enters the system and passes through each level of routing nodes, the system automatically records the information of each routing node, the processing time of each node, the data transmission state and other key routing track data, and after the record is completed, the system does not store the data in a delayed manner, but immediately synchronizes the routing track data generated in real time to a preset log analysis platform through a safe and stable data transmission channel, so that the log analysis platform can collect and analyze the data in time.
The recorded route track data are synchronized to the log analysis platform in real time, so that accurate and real-time data support can be provided for subsequent system performance optimization, fault investigation and access behavior monitoring, and related personnel can grasp the route dynamics of an access request at any time through the log analysis platform, and abnormal problems possibly existing in the route process can be found in time.
402. Performing vulnerability detection and risk assessment on the unified entry gateway according to a preset period, and feeding back a vulnerability list generated by scanning, risk levels and repair suggestions to an operation and maintenance platform in real time;
The system automatically starts a vulnerability detection program and a risk assessment mechanism aiming at the unified portal gateway according to a preset period, the vulnerability detection program can comprehensively scan ports, protocols, configuration parameters, operation components and the like of the unified portal gateway, check whether various security vulnerabilities such as authority vulnerabilities, code vulnerabilities and configuration vulnerabilities exist, generate a detailed vulnerability list, meanwhile, the risk assessment mechanism can classify the risks (such as low risk, medium risk, high risk and extremely high risk) of the unified portal gateway in a grading manner according to factors such as the hazard degree, the influence range and the possibility of being utilized of the vulnerabilities, and after the vulnerability detection and the risk assessment are completed, the system can transmit and feed back the generated vulnerability list, the corresponding risk level and specific repair suggestions (including repair steps, required tools, attention matters and the like) aiming at each vulnerability to the operation and maintenance platform in real time so as to ensure the normal and safe operation of the unified portal gateway.
403. And when the target environment service cannot process the access request, the alternative environment service is reselected, and the access request is routed to the alternative environment service through the unified portal gateway.
When an access request is routed to a target environment service, a system monitors the processing state of the target environment service on the access request in real time, if the access request cannot be processed normally due to the fact that the target environment service is monitored to be faulty, insufficient in resources or caused by other reasons, the system immediately triggers an alternative environment service selection mechanism, the alternative environment service selection mechanism automatically selects the most suitable alternative environment service from a preset alternative environment service list according to preset screening conditions, after the alternative environment service is determined, the system reroutes the access request originally sent to the target environment service to the selected alternative environment service through a unified portal gateway, the access request is received and processed by the alternative environment service, manual intervention is not needed in the whole process, automatic request route switching is achieved, influence on access request processing due to the fault of the target environment service is reduced to the maximum extent, and a user can obtain the system service normally.
In the embodiment, through recording the route track data of the access request in real time and synchronizing the route track data to the log analysis platform, the full-link tracking of the request circulation process can be realized, the route abnormality or fault node can be conveniently and rapidly positioned, the data support is provided for the system performance optimization, meanwhile, the compliance audit requirement can be met, and the observability and the problem investigation efficiency of the system are improved.
The method has the advantages that the vulnerability detection and risk assessment are carried out on the unified entry gateway according to the preset period, potential safety hazards can be found in time, and the operation and maintenance personnel can be helped to treat high-risk problems preferentially by combining with real-time feedback of vulnerability lists, risk grades and repair suggestions, so that security attacks are prevented in advance, the possibility of being invaded by the gateway is reduced, and the security and stability of the entry of the whole system are guaranteed.
When the target environment service can not process the request, the alternative service is automatically selected and rerouted, so that the interruption of the request processing can be avoided, the service unavailable time is reduced, the fault tolerance and service continuity of the system are improved, the user experience is optimized, the resource utilization rate is improved, and the efficient and reliable processing of the access request is ensured.
Referring to fig. 5, the present application provides an embodiment of a unified portal management device for multi-environment service in software development, including:
A configuration unit 501, configured to configure a unified portal gateway, where the unified portal gateway accesses a plurality of environment services of software development, each environment service corresponding to a complete operation environment of different stages of software development respectively;
The parsing unit 502 is configured to parse a request feature of an access request after receiving the access request of the client;
a matching unit 503, configured to match the target environmental service according to the analysis result and a preset routing rule;
Specifically, the matching unit 503 is further configured to:
extracting key information related to the environmental service from the analysis result;
Matching the key information with a preset routing rule, and screening out candidate environment services;
If the number of the candidate environment services is 1, determining the candidate environment services as target environment services;
And if the number of the candidate environment services is greater than 1, sequencing the candidate environment services according to a priority strategy in a preset routing rule, and selecting the candidate environment service with the highest ranking as the target environment service.
Specifically, the device further includes a detection unit 504, configured to:
Initiating health state probe detection for the target environment service according to a preset routing rule, wherein the health state probe detection comprises service port connectivity verification, basic response time test and core component availability verification;
After the health probe detection passes, the step of routing the access request to the target environmental service through the unified portal gateway is performed.
Specifically, the detection unit 504 is further configured to:
Acquiring a service port from registration information of a target environment service, sending a TCP connection request to the service port, and verifying whether connection is successfully established within a preset timeout time;
After the connection of the service port is successfully established, a health check response message is sent to the target environment service, the basic response time is recorded, and whether the basic response time meets the preset threshold requirement is checked according to the type of the target environment service;
Analyzing the response message to extract the state identifier of the core component of the target environment service, and verifying whether the core component of the target environment service is in a preset normal running state according to the state identifier of the core component.
A routing unit 505, configured to route the access request to the target environment service through the unified ingress gateway.
Specifically, the recording unit 506 is further included for:
and recording route track data of the access request, and synchronizing the route track data to the log analysis platform in real time.
Specifically, the method further comprises an evaluation unit 507 for:
and performing vulnerability detection and risk assessment on the unified portal gateway according to a preset period, and feeding back a vulnerability list generated by scanning, risk levels and repair suggestions to the operation and maintenance platform in real time.
Specifically, the method further includes a selecting unit 508, configured to:
And when the target environment service cannot process the access request, the alternative environment service is reselected, and the access request is routed to the alternative environment service through the unified portal gateway.
The embodiments refer to the embodiments of fig. 1 to 4, and are not described in detail herein.
Referring to fig. 6, the present application provides a unified portal management device for multi-environment services in software development, comprising:
A processor 601, a memory 602, an input-output unit 604, and a bus 603.
The processor 601 is connected to a memory 602, an input-output unit 604, and a bus 603.
The memory 602 holds programs that the processor 601 invokes to perform the methods as in fig. 1, 2,3 and 4.
The present application provides a computer readable storage medium having a program stored thereon, which when executed on a computer performs the method as in fig. 1, 2, 3 and 4.
It will be clear to those skilled in the art that, for convenience and brevity of description, specific working procedures of the above-described systems, apparatuses and units may refer to corresponding procedures in the foregoing method embodiments, which are not repeated herein.
In the several embodiments provided in the present application, it should be understood that the disclosed systems, devices, and methods may be implemented in other manners. For example, the apparatus embodiments described above are merely illustrative, e.g., the division of the units is merely a logical function division, and there may be additional divisions when actually implemented, e.g., multiple units or components may be combined or integrated into another system, or some features may be omitted or not performed. Alternatively, the coupling or direct coupling or communication connection shown or discussed with each other may be an indirect coupling or communication connection via some interfaces, devices or units, which may be in electrical, mechanical or other form.
The units described as separate units may or may not be physically separate, and units shown as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
In addition, each functional unit in the embodiments of the present application may be integrated in one processing unit, or each unit may exist alone physically, or two or more units may be integrated in one unit. The integrated units may be implemented in hardware or in software functional units.
The integrated units, if implemented in the form of software functional units and sold or used as stand-alone products, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present application may be embodied essentially or in part or all of the technical solution or in part in the form of a software product stored in a storage medium, including instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) to perform all or part of the steps of the method according to the embodiments of the present application. The storage medium includes a usb disk, a removable hard disk, a read-only memory (ROM), a random-access memory (RAM, random access memory), a magnetic disk, an optical disk, or other various media capable of storing program codes.
Claims (10)
1. A unified portal management method for a software development multi-environment service, comprising:
configuring a unified portal gateway, wherein the unified portal gateway accesses a plurality of environment services of software development, and each environment service corresponds to a complete running environment of different stages of software development respectively;
After receiving an access request of a client, analyzing request characteristics of the access request;
matching the target environment service according to the analysis result and a preset routing rule;
and routing the access request to the target environment service through the unified portal gateway.
2. The method of claim 1, wherein the matching the target environment service according to the parsing result and the preset routing rule comprises:
extracting key information related to the environmental service from the analysis result;
matching the key information with a preset routing rule, and screening out candidate environment services;
If the number of the candidate environment services is 1, determining the candidate environment services as target environment services;
and if the number of the candidate environment services is greater than 1, sequencing the candidate environment services according to a priority strategy in a preset routing rule, and selecting the candidate environment service with the highest ranking as a target environment service.
3. The method of claim 1, wherein after matching the target environment service according to the parsing result and the preset routing rule, the method further comprises:
Initiating health state probe detection for the target environment service according to the preset routing rule, wherein the health state probe detection comprises service port connectivity verification, basic response time test and core component availability verification;
after the health probe detection passes, the step of routing the access request to the target environmental service through the unified portal gateway is performed.
4. A method according to claim 3, wherein said initiating a health probe detection for said target environmental service according to said preset routing rules comprises:
Acquiring a service port from the registration information of the target environment service, sending a TCP connection request to the service port, and verifying whether connection is successfully established within a preset timeout time;
After the connection of the service port is successfully established, a health check response message is sent to the target environment service, the basic response time is recorded, and whether the basic response time meets the preset threshold requirement is checked according to the type of the target environment service;
analyzing the response message to extract a core component state identifier of the target environment service, and verifying whether the core component of the target environment service is in a preset normal running state according to the core component state identifier.
5. The method of claim 1, wherein after routing the access request to the target environment service through the unified portal gateway, the method further comprises:
And recording the route track data of the access request, and synchronizing the route track data to a log analysis platform in real time.
6. The method according to any one of claims 1 to 5, further comprising:
And performing vulnerability detection and risk assessment on the unified entry gateway according to a preset period, and feeding back a vulnerability list generated by scanning, risk levels and repair suggestions to an operation and maintenance platform in real time.
7. The method according to any one of claims 1 to 5, further comprising:
And when the target environment service cannot process the access request, re-selecting an alternative environment service, and routing the access request to the alternative environment service through the unified entry gateway.
8. A unified portal management device for a software development multi-environment service, comprising:
The configuration unit is used for configuring a unified portal gateway, the unified portal gateway accesses a plurality of environment services of software development, and each environment service corresponds to a complete operation environment of different stages of software development respectively;
The analysis unit is used for analyzing the request characteristics of the access request after receiving the access request of the client;
The matching unit is used for matching the target environment service according to the analysis result and a preset routing rule;
and the routing unit is used for routing the access request to the target environment service through the unified entry gateway.
9. A unified portal management device for a software development multi-environment service, comprising:
The system comprises a processor, a memory, an input-output unit and a bus, wherein the processor is connected with the memory, the input-output unit and the bus, the memory stores a program, and the processor calls the program to execute the unified entry management method of the software development multi-environment service according to any one of claims 1 to 7.
10. A computer-readable storage medium, wherein a program is stored on the computer-readable storage medium, and wherein the program, when executed on a computer, performs the unified portal management method for a software development environment service according to any one of claims 1 to 7.
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202511296474.XA CN121418230A (en) | 2025-09-11 | 2025-09-11 | A method and related apparatus for unified entry point management of multi-environment services in software development |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202511296474.XA CN121418230A (en) | 2025-09-11 | 2025-09-11 | A method and related apparatus for unified entry point management of multi-environment services in software development |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| CN121418230A true CN121418230A (en) | 2026-01-27 |
Family
ID=98488551
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN202511296474.XA Pending CN121418230A (en) | 2025-09-11 | 2025-09-11 | A method and related apparatus for unified entry point management of multi-environment services in software development |
Country Status (1)
| Country | Link |
|---|---|
| CN (1) | CN121418230A (en) |
-
2025
- 2025-09-11 CN CN202511296474.XA patent/CN121418230A/en active Pending
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN103152229B (en) | Monitor control index item Dynamic Configuration | |
| KR101489420B1 (en) | Policy processing method and network device | |
| US7882537B2 (en) | Method and apparatus for security policy management | |
| CN110808865B (en) | Passive industrial control network topology discovery method and industrial control network security management system | |
| CN111030873A (en) | Fault diagnosis method and device | |
| CN109039763A (en) | A kind of network failure nodal test method and Network Management System based on backtracking method | |
| WO2018214928A1 (en) | Method and apparatus for locating resolution fault, computer readable storage medium thereof, and computer device | |
| CN1866951B (en) | Method and system for detecting shared access hosts in network | |
| CN109165513B (en) | System configuration information inspection method and device and server | |
| JP2017199250A (en) | Computer system, data analysis method, and computer | |
| CN121418230A (en) | A method and related apparatus for unified entry point management of multi-environment services in software development | |
| CN111444156B (en) | Fault diagnosis method based on cloud computing | |
| CN116991724A (en) | Interface testing method and device based on monitoring log, electronic equipment and storage medium | |
| CN115987765A (en) | Host positioning method, device, electronic equipment and computer program product | |
| US20230208705A1 (en) | Method and system for analysing virtual network health, and network device | |
| CN115277357A (en) | Network fault analysis method, device, equipment and storage medium | |
| CN119676137B (en) | Testing method, device, electronic equipment and storage medium for outbound client | |
| EP3474489B1 (en) | A method and a system to enable a (re-)configuration of a telecommunications network | |
| CN119938403A (en) | Data processing method, device, electronic device, storage medium, security detection platform and computer program product | |
| CN121125591A (en) | Network communication protocol test system for geophysical special equipment | |
| KR20250073723A (en) | System and method checking consistency of vehicle data | |
| CN120675862A (en) | EBPF-based gateway fault positioning system and method and gateway | |
| CN121486484A (en) | Data monitoring method, device and system | |
| CN116781480A (en) | Failure root cause analysis methods, devices and related equipment | |
| CN121009003A (en) | An application evaluation method and apparatus |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PB01 | Publication | ||
| SE01 | Entry into force of request for substantive examination |