Load balancing flow processing method, system and computer medium for virtualized environment

文档序号:72682 发布日期:2021-10-01 浏览:16次 中文

阅读说明:本技术 虚拟化环境负载均衡流量处理方法、系统及计算机介质 (Load balancing flow processing method, system and computer medium for virtualized environment ) 是由 陈光辉 过育红 于 2021-07-01 设计创作,主要内容包括:本发明提供了虚拟化环境负载均衡流量处理方法、系统及计算机介质,包括:对经过负载均衡器且发往real server虚拟机的流量设置第一标记;挂载负载均衡器的第一主机将设置有第一标记的流量进行报文封装,所述报文的隧道封装标记设置第二标记;将设置有第二标记的报文通过隧道技术发送至real server虚拟机;挂载所述real server虚拟机的第二主机读取具有第二标记的报文,并在会话记录表中记录该报文路径信息;挂载所述real server虚拟机的第二主机查找会话记录表,如果存在正向流量,则表明该流量为需要返回负载均衡器的回程流量,使用会话表记录中的源端MAC地址作为回程报文的目的MAC地址,实现了虚拟化环境负载均衡源端网络地址保持不变,且real server虚拟机不需要再配置默认路由。(The invention provides a load balancing flow processing method, a system and a computer medium for a virtualized environment, comprising the following steps: setting a first mark for the flow which passes through the load balancer and is sent to the real server virtual machine; a first host mounting a load balancer packages the traffic provided with a first mark, and a tunnel packaging mark of the message is provided with a second mark; sending the message with the second mark to a real server virtual machine through a tunneling technology; reading a message with a second mark by a second host mounted with the real server virtual machine, and recording the path information of the message in a session record table; and searching a session record table by the second host mounting the real server virtual machine, if the forward flow exists, indicating that the flow is the return flow needing to be returned to the load balancer, and using the source-end MAC address in the session table record as the destination MAC address of the return message, so that the source-end network address of the load balancing of the virtualized environment is kept unchanged, and the real server virtual machine does not need to be configured with a default route.)

1. The load balancing flow processing method for the virtualization environment is characterized by comprising the following steps of:

setting a first mark for the flow which passes through the load balancer and is sent to the real server virtual machine;

a first host mounting a load balancer packages the traffic provided with a first mark, and a tunnel packaging mark of the message is provided with a second mark;

sending the message with the second mark to a real server virtual machine through a tunneling technology;

a second host mounted with the real server virtual machine identifies and reads a message with a second mark, and records the path information of the message in a session record table;

and the second host mounting the real server virtual machine searches a session record table, if the forward flow exists, the flow is indicated to be the return flow needing to be returned to the load balancer, and return message path information is set according to the message path information in the session table record.

2. The virtualization environment load balancing traffic processing method of claim 1, wherein a first flag of the traffic sent to the real server virtual machine is set by the load balancer through a PREROUTING chain in a flag Table of the IP Table, and the first flag is a character string.

3. The virtualized environment load balancing traffic processing method of claim 1, further comprising the first host of the load balancer determining whether the traffic has the first flag via a mark program.

4. The virtualized environment load balancing traffic handling method of claim 1, wherein the second flag is an improvement of a tunnel encapsulation flag reserved bit of the packet.

5. The method according to claim 4, wherein the tunnel encapsulation flag is 8 bits, and is characterized as "RRRRIRRR", and the R bit is a reserved bit, where an "I" bit is 1, which indicates that a tunnel encapsulation packet is valid, and an "0" bit, which indicates that the tunnel encapsulation packet is invalid, and when the second flag is set, the positions of the first 4 bits of the tunnel encapsulation flag are set to 1, that is, "iiirrr" is used as the second flag.

6. The method according to claim 4, further comprising reading the message path information by a second host mounting the real server virtual machine, and determining whether the message is a message passing through a tunnel, if so, further determining whether the message is provided with a second flag, if so, starting a session record table, and if not, forwarding the message according to a conventional route.

7. The virtualized environment load balancing traffic processing method according to claim 1 or 6, wherein the packet path information is a tunnel endpoint network address, a tunnel endpoint network identifier, a destination network address, a source end network address, a network protocol type, a destination port, a source end MAC address;

the return message path information is that the source MAC address is used as the destination MAC address of the return message, the tunnel endpoint network address is used as the destination network address of the outer header of the return encapsulated message, and the tunnel endpoint network identifier is used as the destination tunnel endpoint network identifier of the outer header of the return encapsulated message.

8. The method according to claim 6, wherein the tunneling technology is one of VXLAN, GRE, and MPLS, the session record table is stored using hash, and when the session record table is searched, the searched contents are src _ ip, src _ port, dst _ ip, dst _ port, and protocol.

9. Virtualization environment load balancing traffic processing system, characterized by, includes:

the source end is used for sending the network flow request;

the first network card is used for sending the network flow of the source end to the load balancer;

the load balancer is used for receiving the flow sent by the first network card and setting a first mark for the flow;

the first host is used for performing message tunnel encapsulation on the flow provided with the first mark, and the tunnel encapsulation mark of the message is provided with a second mark;

the second network card is used for receiving the message packaged by the load balancer and transmitting the message to the third network card through a network tunnel;

the third network card is used for receiving the message transmitted by the second network card and transmitting the message to the real server virtual machine;

the real server virtual machine is used for receiving and sending messages;

the second host is used for identifying and reading the message with the second mark, and recording the tunnel endpoint network address, the tunnel endpoint network identification, the destination network address, the source end network address, the network protocol type, the destination port, the source end port and the source end MAC address of the message in the session record table;

the second host is also used for searching the session record table, if the forward flow exists, the flow is indicated to be the return flow of the load balancer, the source-end MAC address in the session record table is used as the destination MAC address of the return message, the tunnel endpoint network address is used as the destination network address of the outer header of the return encapsulated message, and the tunnel endpoint network identifier is used as the destination tunnel endpoint network identifier of the outer header of the return encapsulated message;

the return message is sent by the real server virtual machine, and returns to the source end through a third network card, a network tunnel, a second network card, a load balancer and a first network card in sequence.

10. A computer medium having computer program instructions stored therein, which when read and executed by a processor, implement the system for automatically modifying network configuration based on cloud migration scenario of claim 9.

Technical Field

The invention relates to the technical field of computers, in particular to a virtualized environment load balancing flow processing method, a virtualized environment load balancing flow processing system and a computer medium.

Background

In a load balancing scenario, the server needs to identify the client for network security and big data analysis. Currently, seven-layer traffic is mainly acquired through x-forward-for of HTTP head, and client source IP acquisition modes of four-layer TCP and UDP traffic are mainly as follows.

The first technical scheme is as follows: in the DR mode of load balancing, the traffic of a client only changes a destination MAC address on a load balancer, the traffic is sent to a real server, the IP of the client is unchanged, and the real server can directly obtain a source IP of the client.

The second prior art scheme is: in the NAT mode of load balancing, a Destination Address Translation (hereinafter abbreviated as DNAT, referred to as Destination Network Address Translation) is performed on a load balancer for client traffic, a Destination IP is modified into an IP Address of a real server, a route is configured on the real server, a gateway points to the load balancer, the IP of the client is unchanged, and the real server can directly access a source IP of the client.

The third prior art scheme is as follows: in the FULL NAT mode with load balancing, the traffic of a client side is subjected to Source Address conversion (SNAT, called as Source Network Address Translation for short) and DNAT on a load balancer, a target IP is modified into an IP Address of a real server, a Source IP is modified into the IP Address of the load balancer, the Source IP of the client side is carried into a TCP message Option field on the load balancer through a TOA (TCP Option Address) module, a TOA patch is installed on the real server, the Source IP is stored into socket information when TCP connection is established, and the Source IP of the client side is obtained through system call.

In view of the above, there is a need to improve the load balancing traffic processing method in the virtualized environment in the prior art to solve the above problems.

Disclosure of Invention

The invention aims to disclose a load balancing flow processing method, a system and a computer medium of a virtualized environment, wherein a first mark is set for flow, a second mark is set for a tunnel encapsulation mark of the flow message, the message with the second mark is sent to a real server virtual machine by a tunnel technology, a host machine which is used for mounting the real server virtual machine reads and records path information of the message in a session record table mode, and formulates path information of a return stroke and encapsulates the return stroke message according to the path information of the message.

To achieve the first object, the present invention provides a method for processing load balancing traffic in a virtualized environment, comprising the following steps:

setting a first mark for the flow which passes through the load balancer and is sent to the real server virtual machine;

a first host mounting a load balancer packages the traffic provided with a first mark, and a tunnel packaging mark of the message is provided with a second mark;

sending the message with the second mark to a real server virtual machine through a tunneling technology;

a second host mounted with the real server virtual machine identifies and reads a message with a second mark, and records the path information of the message in a session record table;

and the second host mounting the real server virtual machine searches a session record table, if the forward flow exists, the flow is indicated to be the return flow needing to be returned to the load balancer, and return message path information is set according to the message path information in the session table record.

As a further improvement of the invention, a first mark of the traffic sent to the real server virtual machine is set by the load balancer through a PREROUTING chain in the rule Table of the IP Table, and the first mark is a character string.

As a further improvement of the present invention, the method further includes that the first host of the load balancer judges whether the traffic has the first flag through a mark program.

As a further improvement of the present invention, the second flag is an improvement of a tunnel encapsulation flag reserved bit of the packet.

As a further improvement of the present invention, the tunnel encapsulation flag is 8 bits, and is characterized as "rrriirrr", and the R bit is a reserved bit, where an "I" bit is 1, which indicates that the tunnel encapsulation packet is valid, and an "0" bit indicates that the tunnel encapsulation packet is invalid, and when the second flag is set, the positions of the first 4 bits of the tunnel encapsulation flag are set to 1, that is, "iiiirrrr" is used as the second flag.

As a further improvement of the present invention, the method further includes that the second host mounting the real server virtual machine reads the message path information and judges whether the message is a message passing through the tunnel, if so, further judges whether the message is provided with a second mark, if so, a session record table is started, and if not, forwarding is performed according to a conventional route.

As a further improvement of the present invention, the message path information is a tunnel endpoint network address, a tunnel endpoint network identifier, a destination network address, a source end network address, a network protocol type, a destination port, a source end port, and a source end MAC address;

the return message path information is that the source MAC address is used as the destination MAC address of the return message, the tunnel endpoint network address is used as the destination network address of the outer header of the return encapsulated message, and the tunnel endpoint network identifier is used as the destination tunnel endpoint network identifier of the outer header of the return encapsulated message.

As a further improvement of the present invention, the tunneling technology is one of VXLAN, GRE, and MPLS, the session record table is stored by using hash, and when the session record table is searched, the search contents are src _ ip, src _ port, dst _ ip, dst _ port, and protocol.

Based on the same inventive concept and to achieve the second objective of the present invention, the present application further discloses a virtualized environment load balancing traffic processing system, including:

the source end is used for sending the network flow request;

the first network card is used for sending the network flow of the source end to the load balancer;

the load balancer is used for receiving the flow sent by the first network card and setting a first mark for the flow;

the first host is used for performing message tunnel encapsulation on the flow provided with the first mark, and the tunnel encapsulation mark of the message is provided with a second mark;

the second network card is used for receiving the message packaged by the load balancer and transmitting the message to the third network card through a network tunnel;

the third network card is used for receiving the message transmitted by the second network card and transmitting the message to the real server virtual machine;

the real server virtual machine is used for receiving and sending messages;

the second host is used for identifying and reading the message with the second mark, and recording the tunnel endpoint network address, the tunnel endpoint network identification, the destination network address, the source end network address, the network protocol type, the destination port, the source end port and the source end MAC address of the message in the session record table;

the second host is also used for searching the session record table, if the forward flow exists, the flow is indicated to be the return flow of the load balancer, the source-end MAC address in the session record table is used as the destination MAC address of the return message, the tunnel endpoint network address is used as the destination network address of the outer header of the return encapsulated message, and the tunnel endpoint network identifier is used as the destination tunnel endpoint network identifier of the outer header of the return encapsulated message;

the return message is sent by the real server virtual machine, and returns to the source end through a third network card, a network tunnel, a second network card, a load balancer and a first network card in sequence.

Based on the same inventive concept and to achieve the third objective, the present application further discloses a computer medium, in which computer program instructions are stored, and the computer program instructions are read and executed by a processor to execute the system for automatically modifying network configuration based on cloud migration scenario as created in the second invention.

Compared with the prior art, the invention has the beneficial effects that:

by setting a first mark for the traffic which passes through the load balancer and is sent to the real server virtual machine, setting a second mark for the tunnel encapsulation mark of the traffic message, sending the message with the second mark to the real server virtual machine by the tunnel technology, reading and recording the path information of the message (tunnel endpoint network address, tunnel endpoint network identifier, destination network address, source end network address, network protocol type, destination port, source end port and source end MAC address) by the host which mounts the real server virtual machine in a session record table mode, formulating the path information of the backhaul and encapsulating the backhaul message by the path information of the message, on one hand, under the NAT mode, the network address of the load balancing source end of the virtualized environment is kept unchanged, namely the source end address is encapsulated into the message and is transmitted to the real server virtual machine by the tunnel technology and is read and identified, on the other hand, the real server virtual machine does not need to be configured with a default route, and the source end network address is kept unchanged and returns under the condition that the real server virtual machine does not change.

Drawings

FIG. 1 is a flow chart of a load balancing traffic processing method for a virtualized environment according to the present invention;

FIG. 2 is a topology diagram of a load balancing traffic handling system for a virtualized environment according to the present invention;

fig. 3 is a schematic diagram of a VXLAN message format according to the present invention;

fig. 4 is a schematic diagram of a VXLAN message format with a second tag according to the present invention;

FIG. 5 is a diagram of a format of a GRE message according to the present invention;

FIG. 6 is a diagram illustrating a format of a GRE message with a second tag according to the present invention;

FIG. 7 is a diagram illustrating a format of an MPLS message according to the present invention;

FIG. 8 is a schematic diagram of a computer media module according to the present invention.

Detailed Description

The present invention is described in detail with reference to the embodiments shown in the drawings, but it should be understood that these embodiments are not intended to limit the present invention, and those skilled in the art should understand that functional, methodological, or structural equivalents or substitutions made by these embodiments are within the scope of the present invention.

The following describes a specific implementation process of the present invention by using a plurality of embodiments.

The first embodiment is as follows:

referring to fig. 1, this embodiment discloses a specific implementation of a load balancing traffic processing method (hereinafter referred to as "method") in a virtualized environment.

Referring to fig. 1, in the present embodiment, the method includes the following steps S1 to S5, and in the present embodiment, the tunneling technology type is not distinguished, that is, the tunneling technology type may be any one of VXLAN, GRE, and MPLS.

Specifically, the method comprises the following steps:

step S1, setting a first mark for the traffic which passes through the load balancer and is sent to the real server virtual machine. Specifically, when a source end sends a traffic request, the source end sends the traffic request by using a TCP/IP or UDP/IP protocol, specifies an IP of a load balancer as a destination IP, specifies a port of a traffic listener of the load balancer as a destination port, and for the traffic of the destination IP and the destination port, the load balancer considers that the traffic needs to be sent to a real server virtual machine at a back end, sets a first flag for the traffic, where the first flag is a character string, and the character string is formed by combining english letters and arabic numbers, and in order to improve the identification degree of the first flag, the number of characters of the first flag is preferably 3 to 10, and certainly may be more bits, such as 0x4, x485, 94c42, 48594c, er8076c, x48594c4, wd076302a, and 0x48594c 42.

It should be further noted that, when setting the first identifier for the traffic, the load balancer sets the first flag through the forwarding chain in the rule Table of the IP Table, taking the first identifier "0 x48594c 42" as an example, the specific setting process is as follows:

iptables-t mangel-A PREROUTING-d VIP-P tcp--dport 80-j Mark--set-mark 0x48594c42。

step S2, the first host mounting the load balancer packages the traffic with the first label, and the tunnel package label of the packet sets the second label. Specifically, a first host of the load balancer judges whether a first mark is set in traffic through a mark program, performs packet encapsulation on the traffic with the first mark, a tunnel encapsulation mark of the packet sets a second mark, the encapsulated packet includes path information of the traffic (tunnel endpoint network address, tunnel endpoint network identifier, destination network address, source end network address, network protocol type, destination port, source end MAC address), the second mark is an improvement of a tunnel encapsulation mark reservation bit of the packet, the tunnel encapsulation mark reservation bit is different because the tunnel encapsulation technology types VXLAN, GRE and MPLS have different standard encapsulation formats, the step is to make a special mark, namely the second mark, by improving the reservation bit, so that the packet can be identified by a real server virtual machine at a back end, and according to the path information recorded by the packet, and the backhaul path information is made according to the path information.

And step S3, sending the message with the second mark to a real server virtual machine through a tunneling technology. Specifically, the encapsulated packet is sent to the back-end real server virtual machine through a tunneling technique.

And step S4, the second host mounting the real server virtual machine identifies and reads the message with the second mark, and records the message path information in a session record table. Specifically, the message path information is a tunnel endpoint network address, a tunnel endpoint network identifier, a destination network address, a source end network address, a network protocol type, a destination port, a source end port, and a source end MAC address; when reading a message, a second host mounted with the real server virtual machine first needs to judge whether the message has a second mark, if not, the message is forwarded according to a conventional route, if so, a session record table is started, the session record table adopts hash storage, and the session record table needs to store path information of the message, namely a tunnel endpoint network address (Vtep-ip), a tunnel endpoint network identifier (vni), a destination network address (dst _ ip), a source end network address (src _ ip), a network protocol type (protocol), a destination port (dst _ port), a source end port (src _ port), and a source end MAC Address (MAC), and the session record table stores content shown in table 1.

index src_ip src_port dst_ip dst_port protocol mac Vtep-ip vni
1 200.1.1.2 1000 10.1.1.2 80 6 02:83:49:f1:0b:4d 172.118.10.2 100
2 39.11.189.18 3233 10.1.1.2 102 17 02:17:7d:77:28:09 172.118.10.2 100

TABLE 1

Step S5, the second host mounting the real server virtual machine searches the session record table, if there is forward flow, it indicates that the flow is the return flow needed to return to the load balancer, and sets the return message path information based on the message path information in the session table record. Specifically, the backhaul message path information is a source MAC address serving as a destination MAC address of the backhaul message, a tunnel endpoint network address serving as a destination network address of an outer header of the backhaul encapsulation message, and a tunnel endpoint network identifier serving as a destination tunnel endpoint network identifier of the outer header of the backhaul encapsulation message; when a second host mounted with the real server virtual machine searches a session record table, the searched contents are src _ ip, src _ port, dst _ ip, dst _ port and protocol, and belong to path information of a traffic message, if the src _ ip and the src _ port exist is found, that is, it is stated that forward traffic exists, the traffic is indicated as backhaul traffic needing to be returned to a load balancer, the backhaul traffic is encapsulated into backhaul messages, and the backhaul messages make backhaul path information based on the path information of the traffic message, that is, a source MAC address in the searched session table record is used as a destination MAC address of the backhaul messages, a tunnel endpoint network address is used as a destination network address of an outer header of the backhaul encapsulation messages, and a tunnel endpoint network identifier is used as a destination tunnel endpoint network identifier of the outer header of the backhaul encapsulation messages.

Through the steps, a first mark is set for the flow which passes through the load balancer and is sent to the real server virtual machine, a second mark is set for the tunnel encapsulation mark of the flow message, the message with the second mark is sent to the real server virtual machine by the tunnel technology, the host which is mounted with the real server virtual machine reads and records the path information of the message (tunnel endpoint network address, tunnel endpoint network identification, destination network address, source end network address, network protocol type, destination port, source end port and source end MAC address) in a session record table mode, and the path information of the backhaul is formulated and the backhaul message is encapsulated by the path information of the message, on one hand, under the NAT mode, the load source end balanced network address of the virtualized environment is kept unchanged, namely, the source end address is encapsulated into the message and is sent to the real server virtual machine by the tunnel technology and is read and identified, on the other hand, the real server virtual machine does not need to be configured with a default route, and the source end network address is kept unchanged and returns under the condition that the real server virtual machine does not change.

Example two:

the difference from the first embodiment is that the tunneling type of the second embodiment is described by taking VXLAN as an example.

When the tunnel technology type is VXLAN, fig. 3 is a schematic view of a VXLAN message format, and under a normal condition, a tunnel encapsulation flag of the VXLAN message is 8bit, that is, VXLAN Flags in fig. 3 is characterized as "RRRRIRRR", and when an "I" bit is 1, it indicates that VXLAN ID in VXLAN is valid; when the "I" bit is 0, this indicates that the VXLAN ID in VXLAN is invalid, where "R" is a reserved bit, typically set to 0. In this embodiment, the reserved bit "R" of the tunnel encapsulation flag "RRRRIRRR" of the VXLAN message is modified, for example, the first four bits "R" of "RRRRIRRR" are all set to "I", that is, the second flag is set to "IIIIIRRR", specifically referring to the modified VXLAN message format schematic diagram of fig. 4, it is obvious that the reserved bit of the tunnel encapsulation flag "rrrrirrirrr" of the VXLAN message has seven bits in total, and any one or more reserved bits thereof can be set to be the second flag, and the present invention is not limited to the above example.

The load balancing traffic processing method for the virtualized environment disclosed in this embodiment has the same technical solutions as those in the first embodiment, please refer to the description of the first embodiment, and will not be described herein again.

Example three:

the difference from the first embodiment is that the tunneling type of the third embodiment is described by taking GRE as an example.

When the tunneling technology type is GRE, fig. 5 is a schematic diagram of a format of a GRE packet, and in a normal case, a tunnel encapsulation flag of the GRE packet is 5bit, that is, Flags in fig. 3 are characterized as "00000", and all "0" in the Flags are reserved bits and are usually set to 0. In this embodiment, a reserved bit "0" of a tunnel encapsulation flag "00000" of a GRE packet is modified, for example, a first bit "0" of "00000" is set to "1", that is, a second flag is set to "10000", specifically referring to fig. 6 of a modified format schematic diagram of a GRE packet, it is obvious that the reserved bit of the tunnel encapsulation flag "00000" of the GRE packet has five bits in total, and setting any one or more reserved bits therein can be used as the second flag, and is not limited to the above example.

The load balancing traffic processing method for the virtualized environment disclosed in this embodiment has the same technical solutions as those in the first embodiment, please refer to the description of the first embodiment, and will not be described herein again.

Example four:

the difference from the first embodiment is that the tunneling type in the fourth embodiment is described by taking MPLS as an example.

When the tunneling technology type is MPLS, fig. 7 is a schematic diagram of a format of an MPLS packet, and in a general case, a tunnel encapsulation Label of the MPLS packet is 20bit, that is, bits 4 to 13 in a Label in fig. 7 are reserved bits. In this embodiment, any one or more reserved bits in the MPLS packet Label are modified, so that the modified Label becomes the second Label.

The load balancing traffic processing method for the virtualized environment disclosed in this embodiment has the same technical solutions as those in the first embodiment, please refer to the description of the first embodiment, and will not be described herein again.

Example five:

referring to fig. 2, the embodiment further discloses a virtualized environment load balancing traffic processing system, including: the source end is used for sending the network flow request; the first network card is used for sending the network flow of the source end to the load balancer; the load balancer is used for receiving the flow sent by the first network card and setting a first mark for the flow; the first host is used for performing message encapsulation on the flow provided with the first mark, and the tunnel encapsulation mark of the message is provided with a second mark; the second network card is used for receiving the message packaged by the load balancer and transmitting the message to the third network card through a network tunnel; the third network card is used for receiving the message transmitted by the second network card and transmitting the message to the real server virtual machine; the real server virtual machine is used for receiving and sending messages; the second host is used for identifying and reading the message with the second mark, and recording the tunnel endpoint network address, the tunnel endpoint network identification, the destination network address, the source end network address, the network protocol type, the destination port, the source end port and the source end MAC address of the message in the session record table; the second host is also used for searching the session record table, if the forward flow exists, the flow is indicated to be the return flow of the load balancer, the source-end MAC address in the session record table is used as the destination MAC address of the return message, the tunnel endpoint network address is used as the destination network address of the outer header of the return encapsulated message, and the tunnel endpoint network identifier is used as the destination tunnel endpoint network identifier of the outer header of the return encapsulated message; the return message is sent by the real server virtual machine, and returns to the source end through a third network card, a network tunnel, a second network card, a load balancer and a first network card in sequence.

Specifically, a source end sends network traffic through a first network card, a destination network address and a port are set as a load balancer front-end monitor when the source end sends the network traffic, the load balancer receives the traffic sent by the first network card and sets a first mark for the traffic, and the first mark is a character string; the method comprises the steps that a first host identifies flow provided with a first mark and packages the flow, a second mark is arranged on a tunnel packaging mark of the flow, the second mark is an improvement of a tunnel packaging mark retaining bit of the flow, the packaged flow is transmitted to a third network card through a network tunnel by a second network card, the network tunnel is one of VXLAN, GRE and MPLS, and the VXLAN network tunnel is preferably selected; the third network card sends the message to the real server virtual machine, and the second host mounted with the real server virtual machine reads and records the path information (tunnel endpoint network address, tunnel endpoint network identification, destination network address, source end network address, network protocol type, destination port, source end port and source end MAC address) of the message in a session record table mode; the second host mounting the real server virtual machine further searches a session record table, if the forward flow exists, the flow is indicated to be the return flow of the load balancer, a source end MAC address in the session table record is used as a destination MAC address of a return message, a tunnel endpoint network address is used as a destination network address of an outer head of the return encapsulation message, and a tunnel endpoint network identifier is used as a destination tunnel endpoint network identifier of the outer head of the return encapsulation message; and the return message is sent by the real server virtual machine, sequentially passes through the third network card, the network tunnel, the second network card, the load balancer and the first network card, and returns to the source end.

The load balancing traffic processing system in the virtualized environment disclosed in this embodiment has the same technical solutions as those in the first embodiment, the second embodiment, the third embodiment, and the fourth embodiment, please refer to the description in the first embodiment, the second embodiment, the third embodiment, and the fourth embodiment, and details thereof are not repeated herein.

Example six:

referring to fig. 8, a computer-readable medium 900 stores computer program instructions 901, and when the computer program instructions 901 are read and executed by a processor 902, the system for automatically correcting network configuration based on cloud migration scenario according to the fourth embodiment is executed. The computer medium disclosed in this embodiment has the same technical solutions as those in the fourth embodiment, please refer to the fourth embodiment, and details are not described herein.

The various illustrative logical blocks, or elements, described in connection with the embodiments disclosed herein may be implemented or performed with a general purpose processor, a digital signal processor, an Application Specific Integrated Circuit (ASIC), a field programmable gate array or other programmable logic device, discrete gate or transistor logic, discrete hardware components, or any combination thereof designed to perform the functions described herein. A general-purpose processor may be a microprocessor, but in the alternative, the processor may be any conventional processor, controller, microcontroller, or state machine. A processor may also be implemented as a combination of computing devices, e.g., a digital signal processor and a microprocessor, a plurality of microprocessors, one or more microprocessors in conjunction with a digital signal processor core, or any other similar configuration.

The above-listed detailed description is only a specific description of a possible embodiment of the present invention, and they are not intended to limit the scope of the present invention, and equivalent embodiments or modifications made without departing from the technical spirit of the present invention should be included in the scope of the present invention.

It will be evident to those skilled in the art that the invention is not limited to the details of the foregoing illustrative embodiments, and that the present invention may be embodied in other specific forms without departing from the spirit or essential attributes thereof. The present embodiments are therefore to be considered in all respects as illustrative and not restrictive, the scope of the invention being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein. Any reference sign in a claim should not be construed as limiting the claim concerned.

Furthermore, it should be understood that although the present description refers to embodiments, not every embodiment may contain only a single embodiment, and such description is for clarity only, and those skilled in the art should integrate the description, and the embodiments may be combined as appropriate to form other embodiments understood by those skilled in the art.

14页详细技术资料下载
上一篇:一种医用注射器针头装配设备
下一篇:窗口控制方法、相关装置设备以及计算机可读存储介质

网友询问留言

已有0条留言

还没有人留言评论。精彩留言会获得点赞!

精彩留言,会给你点赞!