CN107391374A - Middleware automatic checking method - Google Patents
Middleware automatic checking method Download PDFInfo
- Publication number
- CN107391374A CN107391374A CN201710600875.9A CN201710600875A CN107391374A CN 107391374 A CN107391374 A CN 107391374A CN 201710600875 A CN201710600875 A CN 201710600875A CN 107391374 A CN107391374 A CN 107391374A
- Authority
- CN
- China
- Prior art keywords
- inspection
- middleware
- data
- server
- checking method
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000007689 inspection Methods 0.000 claims abstract description 51
- 230000000875 corresponding Effects 0.000 claims abstract description 8
- 230000001360 synchronised Effects 0.000 claims abstract description 4
- 238000004040 coloring Methods 0.000 claims description 2
- 238000004519 manufacturing process Methods 0.000 claims description 2
- 230000000414 obstructive Effects 0.000 claims description 2
- 230000005540 biological transmission Effects 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 238000010606 normalization Methods 0.000 description 2
- 230000032683 aging Effects 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000006011 modification reaction Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/36—Preventing errors by testing or debugging software
- G06F11/3668—Software testing
- G06F11/3672—Test management
- G06F11/3692—Test management for test results analysis
Abstract
The invention discloses a kind of middleware automatic checking method, comprise the following steps:Operation Winscp softwares simultaneously start Winscp scripts, and push inspection script to remote computer and performs;Inspection flow is run, inspection result is obtained and inspection destination file is synchronized to info catalogues;The file data of info catalogues is imported into Excel forms;Inquire about corresponding sql and generate corresponding list data;Clear up the data repeated in form;Data are preserved to access databases;Data are compressed and send mail and are reserved in E-mail address to operating personnel.
Description
Technical field
The present invention relates to middleware product, more particularly, to a kind of middleware automatic checking method.
Background technology
Middleware is a kind of independent system software or service routine, and Distributed Application software is by this software in difference
Technology between shared resource.Middleware is located on the operating system of client/server, manages computer resource and net
Network communicates.It is the software for connecting two stand-alone utilities or autonomous system.The system being connected, though they have it is different
Interface, but remain to exchange information between each other by middleware.A critical path for performing middleware is information transmission.Pass through
Middleware, application program may operate in multi-platform or OS environment.The automation of middleware can be realized by having no direct products at present
Check, O&M team carries out spending time length during middleware inspection, and efficiency is low, and operation and maintenance expenses are with costly.
The content of the invention
The purpose of the present invention is a kind of middleware automatic checking method of design, when can help O&M team saving O&M
Between, efficiency is improved, operation and maintenance expenses is saved and uses, while ensure the validity, accuracy and normalization of inspection result.
To realize above goal of the invention, the technical scheme of use is:A kind of middleware automatic checking method, including it is following
Step:
S1:Run Winscp softwares;
S2:Start Winscp scripts, push inspection script to remote computer and perform script;
S3:Inspection flow is run, inspection result is obtained and inspection destination file is synchronized to info catalogues, comprise the following steps:
S3.1:Create patrol task;
S3.2:Obtain operating system cipher table;
S3.3:Login system, login successfully, obtain operation system information, then system reacquisition password retries login failure;
S3.4:Obtain middleware cipher table;
S3.5:Console is logged in, logins successfully, collects middleware information, login failure then reacquires password and retried;
S3.6:Collect middleware information and be organized into form;
S4:The file data of info catalogues is imported into Excel forms;
S5:Sql corresponding in " Sql " page is inquired about, and generates corresponding list data;Data wherein in form can be carried out
Date selects;
S6:Clear up the data repeated in form;
S7:Data are preserved to access databases;
S8:Data are compressed and send mail and are reserved in E-mail address to operating personnel.
Compared with prior art, the beneficial effects of the invention are as follows:
1)Maintenance work efficiency is improved, saves team's maintenance work amoun, operation and maintenance expenses is saved and uses, simplify and repeat maintenance work;
2)Customization is standardized to inspection project, Formatting Output, ensure that the accuracy and normalization of inspection result;
3)Ensure the ageing and accuracy of Data Collection;
4)Lightweight instrument, it is easy to maintenance, and extra performance expense will not be brought to operating system;
5)Reduce the workload of maintenance work personal information record;
6)Patrol frequency is improved, reduces monitoring time.
Brief description of the drawings
Fig. 1 is automation inspection flow chart;
Fig. 2 is middleware inspection flow chart;
Fig. 3 is performance inspection result figure;
Fig. 4 is safety patrol inspection result figure.
Embodiment
Accompanying drawing being given for example only property explanation, it is impossible to be interpreted as the limitation to this patent;
Below in conjunction with drawings and examples, the present invention is further elaborated.
Embodiment 1
Fig. 1 is refer to, Fig. 1 is automation inspection flow chart, is comprised the following steps:
S1:Run Winscp softwares;
S2:Start Winscp scripts, push inspection script to remote computer and perform script;
S3:Inspection flow is run, inspection result is obtained and inspection destination file is synchronized to info catalogues;
S4:The file data of info catalogues is imported into Excel forms;
S5:Sql corresponding in " Sql " page is inquired about, and generates corresponding list data;Data wherein in form can be carried out
Date selects;
S6:Clear up the data repeated in form;
S7:Data are preserved to access databases;
S8:Data are compressed and send mail and are reserved in E-mail address to operating personnel.
Preferably, the script in step S2 is write by Python, Perl push.
Preferably, the inspection flow in step S3 is patrolled comprising specified time inspection, interval time inspection and timeing closing
Inspection.
Fig. 2 is refer to, Fig. 2 is middleware inspection flow chart, is comprised the following steps:
S3.1:Create patrol task;
S3.2:Obtain operating system cipher table;
S3.3:Login system, login successfully, obtain operation system information, then system reacquisition password retries login failure;
S3.4:Obtain middleware cipher table;
S3.5:Console is logged in, logins successfully, collects middleware information, login failure then reacquires password and retried;
S3.6:Collect middleware information and be organized into form;
Preferably, middleware information is connected to by WebLogic built-in tool WebLogic Script Tool
In Adminserver MBean, then from MBean obtain domainRuntime (), ServerRuntimes (),
ThreadPoolRuntime (), JDBCDataSourceRuntimeMBeans specifying information obtain.
Preferably, middleware information form is realized by excel macroprogrammings.
Fig. 3, Fig. 4 are refer to, Fig. 3 is performance inspection result figure, and Fig. 4 is safety patrol inspection result figure, and generation form is inclusive
Can inspection form and safety patrol inspection form;Wherein performance inspection form includes inspection date, middleware server, domain name, IP
Location, Server Service names, Server states, Heap heaps idle condition, Hogging Thread Counts, thread running situation, JDBC leakages
Number;Safety patrol inspection form includes inspection date, middleware server name, domain name, IP, Server title, listening port, enables prison
Listen port, ssl listening ports, enable ssl listening ports, obstruction thread maximum duration, maximum opening socket number of words, transmission service
Device gauge outfit, Server Log Names, Server daily records roll type, Server daily record document retainings number, access Log Names,
Access daily records roll type, access document retainings number, production model, configuration type of audit, console context path, control
Platform session timeout processed, block threshold values, block duration, block reset the duration.
Preferably, generate in form with the threshold value in the different inspection project of different colouring discriminations.
Obviously, the above embodiment of the present invention is only intended to clearly illustrate example of the present invention, and is not pair
The restriction of embodiments of the present invention.For those of ordinary skill in the field, may be used also on the basis of the above description
To make other changes in different forms.There is no necessity and possibility to exhaust all the enbodiments.It is all this
All any modification, equivalent and improvement made within the spirit and principle of invention etc., should be included in the claims in the present invention
Protection domain within.
Claims (8)
1. a kind of middleware automatic checking method, it is characterised in that comprise the following steps:
S1:Run Winscp softwares;
S2:Start Winscp scripts, push inspection script to remote computer and perform script;
S3:Inspection flow is run, inspection result is obtained and inspection destination file is synchronized to info catalogues;
S4:The file data of info catalogues is imported into Excel forms;
S5:Sql corresponding in " Sql " page is inquired about, and generates corresponding list data;Data wherein in form can be carried out
Date selects;
S6:Clear up the data repeated in form;
S7:Data are preserved to access databases;
S8:Data are compressed and send mail and are reserved in E-mail address to operating personnel.
A kind of 2. middleware automatic checking method according to claim 1, it is characterised in that script in step S2 by
Python writes, Perl push.
3. a kind of middleware automatic checking method according to claim 1, it is characterised in that the operation in step S3 is patrolled
Inspection flow comprises the following steps:
S3.1:Create patrol task;
S3.2:Obtain operating system cipher table;
S3.3:Login system, login successfully, obtain operation system information, then system reacquisition password retries login failure;
S3.4:Obtain middleware cipher table;
S3.5:Console is logged in, logins successfully, collects middleware information, login failure then reacquires password and retried;
S3.6:Collect middleware information and be organized into form.
A kind of 4. middleware automatic checking method according to claim 3, it is characterised in that the centre in step S3.5
Part information first passes through the MBean that WebLogic built-in tool WebLogic Script Tool are connected to Adminserver, then from
In MBean obtain domainRuntime (), ServerRuntimes (), ThreadPoolRuntime (),
JDBCDataSourceRuntimeMBeans specifying information obtains.
A kind of 5. middleware automatic checking method according to claim 3, it is characterised in that the centre in step S3.6
Part information form is realized by excel macroprogrammings.
A kind of 6. middleware automatic checking method according to claim 3, it is characterised in that the generation in step S3.6
Form includes performance inspection form and safety patrol inspection form;Wherein performance inspection form include the inspection date, middleware server,
Domain name, IP address, Server Service names, Server states, Heap heaps idle condition, Hogging Thread Counts, thread operation feelings
Condition, JDBC leakage numbers;Safety patrol inspection form includes inspection date, middleware server name, domain name, IP, Server title, monitoring
Port, enable listening port, ssl listening ports, enable ssl listening ports, obstruction thread maximum duration, maximum opening socket
Number, send server gauge outfit, Server Log Names, Server daily records roll type, Server daily record document retainings number,
Access Log Names, access daily records roll type, access document retainings number, production model, configuration type of audit, control
Platform context path, console session timeout, block threshold values, block duration, block reset the duration.
7. a kind of middleware automatic checking method according to claim 6, it is characterised in that with difference in generation form
The different inspection project of colouring discrimination in threshold value.
A kind of 8. middleware automatic checking method according to claim 1, it is characterised in that the inspection stream in step S3
Journey includes specified time inspection, interval time inspection and timeing closing inspection.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710600875.9A CN107391374A (en) | 2017-07-21 | 2017-07-21 | Middleware automatic checking method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710600875.9A CN107391374A (en) | 2017-07-21 | 2017-07-21 | Middleware automatic checking method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107391374A true CN107391374A (en) | 2017-11-24 |
Family
ID=60337465
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710600875.9A Pending CN107391374A (en) | 2017-07-21 | 2017-07-21 | Middleware automatic checking method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107391374A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109992478A (en) * | 2019-03-29 | 2019-07-09 | 广东电网有限责任公司 | A kind of server method for inspecting and device |
CN111489457A (en) * | 2020-03-30 | 2020-08-04 | 中铁大桥科学研究院有限公司 | Method and system for inputting railway line turnout information |
CN113821497A (en) * | 2021-11-24 | 2021-12-21 | 深圳市佑荣信息科技有限公司 | Data maintenance method based on SQL automatic analysis and detection |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103366410A (en) * | 2013-07-29 | 2013-10-23 | 国家电网公司 | Intelligent inspection system for electrical equipment based on internet of things |
CN104518917A (en) * | 2015-01-26 | 2015-04-15 | 浪潮通信信息系统有限公司 | Automatic server patrol inspection method |
CN105528275A (en) * | 2015-12-04 | 2016-04-27 | 广东电网有限责任公司信息中心 | Database safety inspection method |
-
2017
- 2017-07-21 CN CN201710600875.9A patent/CN107391374A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103366410A (en) * | 2013-07-29 | 2013-10-23 | 国家电网公司 | Intelligent inspection system for electrical equipment based on internet of things |
CN104518917A (en) * | 2015-01-26 | 2015-04-15 | 浪潮通信信息系统有限公司 | Automatic server patrol inspection method |
CN105528275A (en) * | 2015-12-04 | 2016-04-27 | 广东电网有限责任公司信息中心 | Database safety inspection method |
Non-Patent Citations (1)
Title |
---|
郭孝基 等: ""WebLogic中间件自动化巡检研究与应用"", 《信息与电脑》 * |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109992478A (en) * | 2019-03-29 | 2019-07-09 | 广东电网有限责任公司 | A kind of server method for inspecting and device |
CN111489457A (en) * | 2020-03-30 | 2020-08-04 | 中铁大桥科学研究院有限公司 | Method and system for inputting railway line turnout information |
CN113821497A (en) * | 2021-11-24 | 2021-12-21 | 深圳市佑荣信息科技有限公司 | Data maintenance method based on SQL automatic analysis and detection |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104954189A (en) | Automatic server cluster detecting method and system | |
CN107391374A (en) | Middleware automatic checking method | |
CN102684927B (en) | A kind of method and apparatus of patrolling and examining the network equipment | |
CN102411533A (en) | Log-management optimizing method for clustered storage system | |
CN105320585A (en) | Method and device for achieving application fault diagnosis | |
CN107800565A (en) | Method for inspecting, device, system, computer equipment and storage medium | |
CN104361031B (en) | A kind of government data pre-processing system and processing method | |
CN103138988B (en) | Positioning treatment method and positioning treatment device of network faults | |
WO2020151483A1 (en) | Stress testing system for internet-of-things platform, method, device, and server | |
CN107133161B (en) | Method and device for generating client performance test script | |
CN104104734A (en) | Log analysis method and device | |
US20110113014A1 (en) | Methodology of Applying Storage and Logistics Center Model to Achieve Business Data Exchange between Systems | |
Sanjappa et al. | Analysis of logs by using logstash | |
CN105099733B (en) | The method and system of equipment safety management in safety control platform | |
CN103326902A (en) | Configurable monitoring system and monitoring method for distributed type mainframe performance testing data | |
CN107763794A (en) | The treating method and apparatus of fault data | |
CN103226768A (en) | System and method for automatically generating original lab record list in real time | |
CN103117878A (en) | Design method of Nagios-based distribution monitoring system | |
CN105824837A (en) | Log treatment method and device | |
Tavade et al. | Raspberry Pi: data logging IOT device | |
CN107689958B (en) | Network audit subsystem applied to cloud audit system | |
CN103812679B (en) | A kind of massive logs statistical analysis system and method | |
CN104598202A (en) | Command line management device and method | |
CN104967667B (en) | A kind of software stability test remote monitoring system based on cloud service | |
CN106161339A (en) | Obtain the method and device of IP access relation |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20171124 |
|
RJ01 | Rejection of invention patent application after publication |