CN110888779A - File system read-only judgment method based on analog writing - Google Patents
File system read-only judgment method based on analog writing Download PDFInfo
- Publication number
- CN110888779A CN110888779A CN201911129031.6A CN201911129031A CN110888779A CN 110888779 A CN110888779 A CN 110888779A CN 201911129031 A CN201911129031 A CN 201911129031A CN 110888779 A CN110888779 A CN 110888779A
- Authority
- CN
- China
- Prior art keywords
- file system
- file
- read
- writing
- host
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/30—Monitoring
- G06F11/3003—Monitoring arrangements specially adapted to the computing system or computing system component being monitored
- G06F11/3034—Monitoring arrangements specially adapted to the computing system or computing system component being monitored where the computing system component is a storage system, e.g. DASD based or network based
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/30—Monitoring
- G06F11/3051—Monitoring arrangements for monitoring the configuration of the computing system or of the computing system component, e.g. monitoring the presence of processing resources, peripherals, I/O links, software programs
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/30—Monitoring
- G06F11/3065—Monitoring arrangements determined by the means or processing involved in reporting the monitored data
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D10/00—Energy efficient computing, e.g. low power processors, power management or thermal management
Abstract
The invention discloses a read-only judgment method of a file system based on analog writing, which comprises the following steps: s1) providing a host IP set to be patrolled; s2) connecting to the host to be inspected through SSH; s3) obtaining a file system list of the host to be inspected; s4) determining whether the file system list of the host to be inspected is read-only by writing the inspection time point in the log file. The file system read-only judgment method based on the analog writing can quickly judge the read-only conditions of all file systems in the target host on the premise of ensuring efficiency and safety, and further can associate distributed storage faults according to the judgment result.
Description
Technical Field
The invention relates to a method for judging read-only property of a file system, in particular to a method for judging read-only property of a file system based on analog writing.
Background
With the progress of informatization and the high-speed development of services, the application range of distributed storage is continuously expanded, the load-bearing service volume and the importance are gradually improved, and particularly under the condition that the popularization and application range of virtualization and cloud platform application is continuously expanded, the normal operation of all virtual machines on the distributed storage is influenced by the fault of the distributed storage, so that the fault pre-judgment and positioning of the distributed storage are particularly important.
The traditional distributed storage failure judgment mode is as follows: monitoring alarm and on-site inspection; monitoring and alarming, namely directly monitoring the storage operation state in a monitoring mode and sending an alarm when a fault occurs; and (4) field inspection, namely judging whether the storage fails or not by directly checking whether the indicator light of the storage equipment is abnormal or not.
Therefore, the above two methods have the problems of failure prediction failure and insufficient coverage, and a new judgment method is needed.
Disclosure of Invention
The technical problem to be solved by the invention is to provide a file system read-only judgment method based on analog writing, which can quickly judge the read-only conditions of all file systems in an object host on the premise of ensuring efficiency and safety, and further can associate distributed storage faults according to the judgment result.
The technical scheme adopted by the invention for solving the technical problems is to provide a read-only judgment method of a file system based on analog writing, which comprises the following steps: s1) providing a host IP set to be patrolled; s2) connecting to the host to be inspected through SSH; s3) obtaining a file system list of the host to be inspected; s4) determining whether the file system list of the host to be inspected is read-only by writing the inspection time point in the log file.
In the above method for determining read-only of file system based on analog writing, step S2 performs SSH connection verification on the IPs in the aggregate list in parallel, and step S3 lists all file system directories in the host after the verification is passed; the step S4 checks whether a disk _ check.log file exists in the directory, and if so, appends the current patrol date to the file and writes the result of the append operation to the disk _ check.log file under the unified path; and if the log file of disk _ check does not exist in the directory, adding the file and writing the current date, and writing the operation results of adding and adding the date into the log file of disk _ check.
In the above method for determining read-only status of file system based on analog writing, step S3 further includes removing the directories of the optical disc drive and the ISO mirror mount.
The file system read-only judgment method based on the simulated writing further comprises analyzing a routing inspection result in a disk check log file, and outputting an IP which cannot create a disk check log file or has an error written date and a corresponding file system directory list.
Compared with the prior art, the invention has the following beneficial effects: the invention provides a read-only judgment method of a file system based on analog writing.
Drawings
FIG. 1 is a flow chart of the read-only judgment of a file system based on analog writing according to the present invention;
FIG. 2 is a schematic diagram of an exemplary implementation of read-only determination based on a file system with write emulation;
fig. 3 is a schematic diagram of an architecture of the distributed storage a mounted to three application servers according to the present invention.
Detailed Description
The invention is further described below with reference to the figures and examples.
FIG. 1 is a flowchart illustrating the read-only determination of a file system based on an emulated write according to the present invention.
Referring to fig. 1, the method for determining read-only of a file system based on analog writing according to the present invention includes the following steps:
s1) providing a host IP set to be patrolled;
s2) connecting to the host to be inspected through SSH;
s3) obtaining a file system list of the host to be inspected;
s4) determining whether the file system list of the host to be inspected is read-only by writing the inspection time point in the log file.
Referring to fig. 2, the method for determining the read-only status of the file system according to the present invention includes the following steps: entering a host list to be checked, summarizing an IP list, performing SSH connection verification on the IPs in the list in parallel, and listing all file system directories (removing special directories of an optical drive and an ISO mirror image mount) in the host after the verification is passed; checking whether a disk _ check.log file exists in the directory, if so, adding the current patrol date into the file and writing the result of the adding operation into the disk _ check.log file under the unified path; if the directory does not have a disk _ check.log file, newly adding the file and writing the current date, and writing operation results of the newly added and added dates into a disk _ check.log file; after the operations are completed, the inspection result in the disk check log file is analyzed, and the IP and the corresponding file system directory list which cannot create the disk check log file or write the error date are output.
Next, a set of distributed storage A is mounted to the architecture of three application servers to simulate, verify and judge the read-only problem, and the architecture of a sample is shown in FIG. 3; the method comprises the steps that a centralized management server issues verification instructions to hosts to be checked, three hosts to be verified are respectively mounted with distributed storage A, a verification script is issued to the three hosts to be verified through the centralized management server, a read-only file system list is returned, the distributed storage A is associated according to a mounting source of a file system, and whether the distributed storage A has read-only faults or not is finally confirmed.
Although the present invention has been described with respect to the preferred embodiments, it will be understood by those skilled in the art that various changes in form and details may be made therein without departing from the spirit and scope of the invention as defined by the appended claims.
Claims (4)
1. A read-only judgment method of a file system based on analog writing is characterized by comprising the following steps:
s1) providing a host IP set to be patrolled;
s2) connecting to the host to be inspected through SSH;
s3) obtaining a file system list of the host to be inspected;
s4) determining whether the file system list of the host to be inspected is read-only by writing the inspection time point in the log file.
2. The method for determining read-only capability of file system based on emulated write of claim 1, wherein said step S2 performs SSH connection verification in parallel for the IPs in the aggregate list, and said step S3 lists all file system directories in the host after the verification is passed; the step S4 checks whether a disk _ check.log file exists in the directory, and if so, appends the current patrol date to the file and writes the result of the append operation to the disk _ check.log file under the unified path; and if the log file of disk _ check does not exist in the directory, adding the file and writing the current date, and writing the operation results of adding and adding the date into the log file of disk _ check.
3. The method for determining file system read-only of claim 2, wherein the step S3 further comprises removing the directories of the optical disc drive and ISO image mount.
4. The file system read-only judgment method based on the simulated writing as claimed in claim 2, further comprising analyzing the inspection result in the disk check log file, and outputting the IP and the corresponding file system directory list which cannot create the disk check log file or have the writing date error.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911129031.6A CN110888779B (en) | 2019-11-18 | 2019-11-18 | File system read-only judging method based on analog writing |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911129031.6A CN110888779B (en) | 2019-11-18 | 2019-11-18 | File system read-only judging method based on analog writing |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110888779A true CN110888779A (en) | 2020-03-17 |
CN110888779B CN110888779B (en) | 2023-07-07 |
Family
ID=69747802
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201911129031.6A Active CN110888779B (en) | 2019-11-18 | 2019-11-18 | File system read-only judging method based on analog writing |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110888779B (en) |
Citations (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7266556B1 (en) * | 2000-12-29 | 2007-09-04 | Intel Corporation | Failover architecture for a distributed storage system |
US20090248765A1 (en) * | 2008-03-27 | 2009-10-01 | Akidau Tyler A | Systems and methods for a read only mode for a portion of a storage system |
CN102662795A (en) * | 2012-03-20 | 2012-09-12 | 浪潮电子信息产业股份有限公司 | Metadata fault-tolerant recovery method in distributed storage system |
CN103729265A (en) * | 2013-12-30 | 2014-04-16 | 华为技术有限公司 | Method and device for protecting stored data |
CN104518917A (en) * | 2015-01-26 | 2015-04-15 | 浪潮通信信息系统有限公司 | Automatic server patrol inspection method |
US9507843B1 (en) * | 2013-09-20 | 2016-11-29 | Amazon Technologies, Inc. | Efficient replication of distributed storage changes for read-only nodes of a distributed database |
CN106487574A (en) * | 2016-04-01 | 2017-03-08 | 国家计算机网络与信息安全管理中心 | Automatic operating safeguards monitoring system |
US20170249216A1 (en) * | 2016-02-29 | 2017-08-31 | Red Hat, Inc. | Native snapshots in distributed file sytems |
CN107479823A (en) * | 2016-06-07 | 2017-12-15 | 阿里巴巴集团控股有限公司 | Data verification method and device in the test of random read-write file |
CN108038043A (en) * | 2017-12-22 | 2018-05-15 | 郑州云海信息技术有限公司 | A kind of distributed storage cluster alarm method, system and equipment |
CN108509153A (en) * | 2018-03-23 | 2018-09-07 | 新华三技术有限公司 | OSD selection methods, data write-in and read method, monitor and server cluster |
CN109995612A (en) * | 2019-03-21 | 2019-07-09 | 北京奇艺世纪科技有限公司 | A kind of service method for inspecting, device and electronic equipment |
US20190278916A1 (en) * | 2018-03-07 | 2019-09-12 | International Business Machines Corporation | Write-only limited-read filesystem |
-
2019
- 2019-11-18 CN CN201911129031.6A patent/CN110888779B/en active Active
Patent Citations (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7266556B1 (en) * | 2000-12-29 | 2007-09-04 | Intel Corporation | Failover architecture for a distributed storage system |
US20090248765A1 (en) * | 2008-03-27 | 2009-10-01 | Akidau Tyler A | Systems and methods for a read only mode for a portion of a storage system |
CN102662795A (en) * | 2012-03-20 | 2012-09-12 | 浪潮电子信息产业股份有限公司 | Metadata fault-tolerant recovery method in distributed storage system |
US9507843B1 (en) * | 2013-09-20 | 2016-11-29 | Amazon Technologies, Inc. | Efficient replication of distributed storage changes for read-only nodes of a distributed database |
CN103729265A (en) * | 2013-12-30 | 2014-04-16 | 华为技术有限公司 | Method and device for protecting stored data |
CN104518917A (en) * | 2015-01-26 | 2015-04-15 | 浪潮通信信息系统有限公司 | Automatic server patrol inspection method |
US20170249216A1 (en) * | 2016-02-29 | 2017-08-31 | Red Hat, Inc. | Native snapshots in distributed file sytems |
CN106487574A (en) * | 2016-04-01 | 2017-03-08 | 国家计算机网络与信息安全管理中心 | Automatic operating safeguards monitoring system |
CN107479823A (en) * | 2016-06-07 | 2017-12-15 | 阿里巴巴集团控股有限公司 | Data verification method and device in the test of random read-write file |
CN108038043A (en) * | 2017-12-22 | 2018-05-15 | 郑州云海信息技术有限公司 | A kind of distributed storage cluster alarm method, system and equipment |
US20190278916A1 (en) * | 2018-03-07 | 2019-09-12 | International Business Machines Corporation | Write-only limited-read filesystem |
CN108509153A (en) * | 2018-03-23 | 2018-09-07 | 新华三技术有限公司 | OSD selection methods, data write-in and read method, monitor and server cluster |
CN109995612A (en) * | 2019-03-21 | 2019-07-09 | 北京奇艺世纪科技有限公司 | A kind of service method for inspecting, device and electronic equipment |
Also Published As
Publication number | Publication date |
---|---|
CN110888779B (en) | 2023-07-07 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10474521B2 (en) | Service directory and fault injection management systems and methods | |
CN108768730B (en) | Method and device for operating intelligent network card | |
US11327742B2 (en) | Affinity recommendation in software lifecycle management | |
US10936386B2 (en) | Method, device and computer program product for monitoring access request | |
US11636016B2 (en) | Cloud simulation and validation system | |
CN104850495A (en) | Automatic detection method and device | |
US11436132B2 (en) | Stress test impact isolation and mapping | |
CN110109773A (en) | A kind of detection method and system of magnetic disk of virtual machine consistency | |
US8327189B1 (en) | Diagnosing an incident on a computer system using a diagnostics analyzer database | |
US8984333B2 (en) | Automatic computer storage medium diagnostics | |
US11036574B2 (en) | Recovery of first failure data capture logs | |
CN110888779A (en) | File system read-only judgment method based on analog writing | |
CN110875832B (en) | Abnormal service monitoring method, device and system and computer readable storage medium | |
US11599443B2 (en) | System and method for assessing an impact of malicious software causing a denial of service of components of industrial automation and control systems | |
CN115686921A (en) | Multipath anomaly detection and repair method, device, equipment and medium | |
EP3873056A1 (en) | System and method for assessing an impact of software on industrial automation and control systems | |
CN113986263A (en) | Code automation test method, device, electronic equipment and storage medium | |
CN107438259B (en) | Method for positioning network management system performance module fault | |
CN114721957B (en) | Software and hardware automatic testing method and device | |
US11645142B1 (en) | Use sequential set index for root cause location and problem verification | |
CN113886165B (en) | Verification method, device and equipment for firmware diagnosis function and readable medium | |
CN117112435B (en) | Vulnerability linkage detection result fusion method, storage medium and electronic equipment | |
US20230086852A1 (en) | Method, electronic device, and program product for failure handling | |
CN116633837A (en) | Vehicle logic channel communication test method and device, electronic equipment and storage medium | |
CN114048057A (en) | Test method and device of super-fusion system and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |