Specific implementation mode
The method of the application of LVS detections at present is only to be detected to the Network status of the RS where the application, e.g., detects RS
Whether the port for being mounted to LVS can be used, and still, port is available, be not meant to using certain available, using can normally provide
Service also relies on its process on RS, the business of connection number and other computer rooms other than depending on Network status
Deng.Therefore, functional be divided into of the relied on institute of application is relied on by force item and weak dependence item by this specification, if relying on item detection by force
Do not pass through, then forbid using starting, if rely on by force item detection by by weak dependences item detects and does not pass through, allow to start, and can
Adjustment appropriate is carried out to application.
In order to make those skilled in the art more fully understand the technical solution in this specification one or more embodiment,
Below in conjunction with the attached drawing in this specification one or more embodiment, to the technology in this specification one or more embodiment
Scheme is clearly and completely described, it is clear that and described embodiment is only this specification a part of the embodiment, rather than
Whole embodiments.The embodiment of base in this manual, those of ordinary skill in the art are not before making creative work
The every other embodiment obtained is put, the range of this specification protection should be all belonged to.
Fig. 2 is the detection process schematic diagram that this specification provides, and specifically includes following steps:
S200:Judge whether to trigger the detection to application, if so, executing step S202, otherwise return to step S200.
In the present specification, using on RS, same application can be mounted on multiple RS, and RS can be mounted on LVS,
Service is externally provided by LVS, when some RS No starting or when being shielded by LVS, the same application installed on other RS is still
Service can be provided by LVS, a LVS and multiple RS is arranged in a computer room, if depending on other using the service provided
Business is then needed through the communication between LVS progress computer rooms, and a RS can directly access it when the RS with other computer rooms is communicated
The LVS of his computer room, without being accessed by the LVS where itself computer room, this is identical with the network architecture shown in FIG. 1.
For the application that one is mounted on RS, the main body for detecting the application can be mounted on the RS
Another application, can also be the plug-in unit carried in the application or function module.
In the present specification, judging whether the method for triggering the detection to application can be specifically, when receiving for opening
When moving the enabled instruction of the application, the detection to the application is triggered.Certainly, the method for detection trigger can also be other methods,
Such as, when the specified function of the application is triggered, the detection to the application is triggered, alternatively, when preset detection time arrives,
The detection to the application is triggered, the application is without limitation.
S202:According in advance be directed to the application settings strong dependence item and weak dependence item, to the strong dependence item and it is weak according to
Bad item is detected.
In the present specification, it can normally provide an application to functional be divided into of the relied on institute of service and rely on item by force
With weak dependence item.
The strong dependence item refers to whether being capable of providing the larger multiple detections of service impact to the application, if appointed
Anticipating, a detection is abnormal, then the application cannot provide service.Such as, multiple detections that item is included are relied on by force specifically may be used
To be:RS where the application is mounted to whether the port on LVS available or other Network status of the RS, this applies in the RS
On the connection number that whether process normal, the RS can be provided whether in specified range etc..
The weak dependence item refers to whether being capable of providing the smaller multiple detections of service impact to the application, if appointed
One or several detections of anticipating are abnormal, then the application still is able to provide the service of part.Such as, what weak dependence item was included is multiple
Detection can be specifically:This using required access soft load address whether can subscribe to, the RS where the application whether
It is whether normal etc. to have received the heartbeat response of every other RS, all protocol functions for being supported of the application.Obviously, using institute
The soft load address that need to be accessed cannot subscribe to entirely, but can only subscribe to a part, using still can externally providing service, institute
It is a weak dependence item with this.Certainly, if all soft load address cannot subscribe to, that is likely to be RS and another
Communication between a server for providing soft load address is abnormal, and this belongs to strong and relies on item, as shown in Figure 3.
To relying on item by force and when weak dependence item is detected, can be preferentially detected to relying on item by force, if strong rely on
Item detection does not pass through, then no longer needs to be detected weak dependence item, directly executes step S208, is detected if relying on item by force
Pass through, then can continue to be detected weak dependence item.When being detected to relying on item by force, if all to rely on that item includes by force
The detection of detection passes through, then can determine and pass through to relying on item detection by force, if the detection of at least one detection does not pass through, really
It is fixed not pass through to relying on item detection by force.Similar, when being detected to weak dependence item, if all detections for including to weak dependence item
The detection of item passes through, then can determine and pass through to the detection of weak dependence item, if the detection of at least one detection does not pass through, it is determined that right
Weak dependence item detection does not pass through.
S204:When to the strong dependence item and the detection of weak dependence item by when, allow the application to start, so that described
It is mounted on LVS using the RS at place.
S206:Pass through when to the strong dependence item detection, and obstructed out-of-date to the weak dependence item detection, is answered described in permission
With startup, so that the real server RS where the application is mounted on Linux virtual server LVS, and not according to detection
By weak dependence item, the application is adjusted.
S208:It is obstructed out-of-date when being detected to the strong dependence item, forbid the application to start, to forbid the RS to be mounted to
On LVS.
By it is above-mentioned it is strong rely on item and it is weak rely on item definition it is found that ought rely on by force item detection it is obstructed out-of-date, application cannot carry
For service, and ought rely on by force item detection pass through but weak dependences item detection it is obstructed out-of-date, using remain to offer part service, because
This, if the two by detection, can directly allow using starting, so that the RS where the application is mounted on LVS.If strong rely on
Item detection passes through but the detection of weak dependence item does not pass through, and also allows using startup, so that the RS where the application is mounted on LVS,
Can also according to detection not by weak dependence item, application is adjusted, where specifically can adjust the application and/or the application
Configuration parameter of RS etc..Such as, it adjusts the priority of application, adjust the priority etc. of RS where the application.If relying on item inspection by force
Survey does not pass through, then no matter whether weak dependence item is by detection, forbids using starting, to forbid the RS carries where the application
On LVS.
Further, due to when being detected to the strong dependence item of application and weak dependence item, it may be necessary to which first starting should
It using (e.g., detect this apply the process on RS whether normal etc.), then is detected, therefore, when relying on by force, item detection is obstructed
It is out-of-date, forbid the method that the application starts that can be specifically:Positive closing application, so that LVS shields the RS where the application.
Since certain functions that application is relied on may not at once start when starting detection application, and it can lag and open
It is dynamic, therefore, in order to improve the accuracy of detection, the method that repeated detection is used in this specification, specifically, relying on item for strong
Including each detection, which is detected;If passing through detection detection, continue to detect strong dependence item packet
Other detections included;If not passing through to detection detection, judge whether the detection number carried out to the detection reaches
Threshold value, if reaching, it is determined that detection detection is not passed through, if not up to, being detected again to the detection, until
The detection reaches the threshold value by the number for detecting or being detected to the detection.
Similar, for each detection that weak dependence item includes, which is detected;If being examined to the detection
Survey passes through, then continues to detect other detections that weak dependence item includes;If not passing through to detection detection, judge to the inspection
Survey whether the detection number that item carries out reaches threshold value, if reaching, it is determined that detection detection is not passed through, if not up to,
The detection is detected again, until the detection reaches described by the number for detecting or being detected to the detection
Threshold value.
Wherein, above-mentioned threshold value can be configured as needed, e.g., be set as 30.That is, for rely on by force item or it is weak according to
Any detection that Lai Xiangzhong includes, if at 30 times detect in once pass through, then be considered as the detection by detect, 30
It is secondary not by detection, then be considered as the detection and do not pass through detection.
In view of preferentially detecting the strong principle for relying on item, item and the weak side for relying on item will be relied on by specifically being detected in this specification
Method can be as shown in Figure 4.
It is the detection method that one or more embodiments of this specification provide above, is based on same thinking, this explanation
Book additionally provides corresponding detection device, as shown in Figure 5.
Application is installed in described device;
Judgment module 501 judges whether to trigger the detection to application;
Detection module 502, if the judgment module 501 determines that detection of the triggering to the application, basis are directed in advance
The strong dependence item and weak dependence item of the application settings, are detected the strong dependence item and weak dependence item;
Starting module 503 passes through when the detection module 502 detects the strong dependence item, and to the weak dependence item
It is obstructed out-of-date to detect, and the application is allowed to start, so that described device is mounted on Linux virtual server LVS, and according to inspection
Survey not by weak dependence item, the application is adjusted;When the detection module 502 is obstructed to the strong dependence item detection
It is out-of-date, forbid the application to start, to forbid described device to be mounted on LVS.
The judgment module 501 is specifically used for, and when receiving the enabled instruction for starting application, determines triggering to institute
State the detection of application.
The detection module 502 is specifically used for, and is preferentially detected to the strong dependence item;If being examined to the strong dependence item
Survey passes through, then is detected to the weak dependence item.
The strong dependence item includes multiple detections;The weak dependence item includes multiple detections;
The detection module 502 is specifically used for, to it is described it is strong rely on item all detections for including detect pass through when, really
It is fixed that the strong dependence item detection is passed through;At least one detection detection for including to the strong dependence item is obstructed out-of-date, determines
The strong dependence item detection is not passed through;At least one detection detection for including to the weak dependence item is obstructed out-of-date, determines
The weak dependence item detection is not passed through.
The detection module 502 is specifically used for, for it is described it is strong rely on item each detection for including, to the detection into
Row detection;If passing through detection detection, continue to detect described strong other detections for relying on item and including;If to the detection
Item detection does not pass through, then judges whether the detection number carried out to the detection reaches threshold value, if reaching, it is determined that the detection
Item detection does not pass through, if not up to, being detected again to the detection, until the detection is by detection or to the detection
The number that item is detected reaches the threshold value.
The detection module 502 is specifically used for, for it is described it is weak rely on item each detection for including, to the detection into
Row detection;If passing through detection detection, continue to detect described weak other detections for relying on item and including;If to the detection
Item detection does not pass through, then judges whether the detection number carried out to the detection reaches threshold value, if reaching, it is determined that the detection
Item detection does not pass through, if not up to, being detected again to the detection, until the detection is by detection or to the detection
The number that item is detected reaches the threshold value.
This specification also correspondence provides a kind of detection device, as shown in Figure 6.Application is installed, the equipment in the equipment
Including one or more memories and processor, the memory stores program, and is configured to by one or more
A processor executes following steps:
Judge whether to trigger the detection to application;
If triggering the detection to the application, according in advance for the strong dependence item of the application settings and weak dependence
, the strong dependence item and weak dependence item are detected;
Pass through when to the strong dependence item detection, and obstructed out-of-date to the weak dependence item detection, the application is allowed to open
It is dynamic so that the equipment is mounted on Linux virtual server LVS, and according to detection not by weak dependence item, answer described
With being adjusted;
It is obstructed out-of-date when being detected to the strong dependence item, forbid the application to start, to forbid the equipment to be mounted to LVS
On.
In the 1990s, the improvement of a technology can be distinguished clearly be on hardware improvement (for example,
Improvement to circuit structures such as diode, transistor, switches) or software on improvement (improvement for method flow).So
And with the development of technology, the improvement of current many method flows can be considered as directly improving for hardware circuit.
Designer nearly all obtains corresponding hardware circuit by the way that improved method flow to be programmed into hardware circuit.Cause
This, it cannot be said that the improvement of a method flow cannot be realized with hardware entities module.For example, programmable logic device
(Programmable Logic Device, PLD) (such as field programmable gate array (Field Programmable Gate
Array, FPGA)) it is exactly such a integrated circuit, logic function determines device programming by user.By designer
Voluntarily programming comes a digital display circuit " integrated " on a piece of PLD, designs and makes without asking chip maker
Dedicated IC chip.Moreover, nowadays, substitution manually makes IC chip, this programming is also used instead mostly " patrols
Volume compiler (logic compiler) " software realizes that software compiler used is similar when it writes with program development,
And the source code before compiling also write by handy specific programming language, this is referred to as hardware description language
(Hardware Description Language, HDL), and HDL is also not only a kind of, but there are many kind, such as ABEL
(Advanced Boolean Expression Language)、AHDL(Altera Hardware Description
Language)、Confluence、CUPL(Cornell University Programming Language)、HDCal、JHDL
(Java Hardware Description Language)、Lava、Lola、MyHDL、PALASM、RHDL(Ruby
Hardware Description Language) etc., VHDL (Very-High-Speed are most generally used at present
Integrated Circuit Hardware Description Language) and Verilog.Those skilled in the art also answer
This understands, it is only necessary to method flow slightly programming in logic and is programmed into integrated circuit with above-mentioned several hardware description languages,
The hardware circuit for realizing the logical method flow can be readily available.
Controller can be implemented in any suitable manner, for example, controller can take such as microprocessor or processing
The computer for the computer readable program code (such as software or firmware) that device and storage can be executed by (micro-) processor can
Read medium, logic gate, switch, application-specific integrated circuit (Application Specific Integrated Circuit,
ASIC), the form of programmable logic controller (PLC) and embedded microcontroller, the example of controller includes but not limited to following microcontroller
Device:ARC 625D, Atmel AT91SAM, Microchip PIC18F26K20 and Silicone Labs C8051F320, are deposited
Memory controller is also implemented as a part for the control logic of memory.It is also known in the art that in addition to
Pure computer readable program code mode is realized other than controller, can be made completely by the way that method and step is carried out programming in logic
Controller is obtained in the form of logic gate, switch, application-specific integrated circuit, programmable logic controller (PLC) and embedded microcontroller etc. to come in fact
Existing identical function.Therefore this controller is considered a kind of hardware component, and to including for realizing various in it
The device of function can also be considered as the structure in hardware component.Or even, it can will be regarded for realizing the device of various functions
For either the software module of implementation method can be the structure in hardware component again.
System, device, module or the unit that above-described embodiment illustrates can specifically realize by computer chip or entity,
Or it is realized by the product with certain function.It is a kind of typically to realize that equipment is computer.Specifically, computer for example may be used
Think personal computer, laptop computer, cellular phone, camera phone, smart phone, personal digital assistant, media play
It is any in device, navigation equipment, electronic mail equipment, game console, tablet computer, wearable device or these equipment
The combination of equipment.
For convenience of description, it is divided into various units when description apparatus above with function to describe respectively.Certainly, implementing this
The function of each unit is realized can in the same or multiple software and or hardware when specification.
It should be understood by those skilled in the art that, the embodiment of this specification can be provided as method, system or computer journey
Sequence product.Therefore, in terms of this specification can be used complete hardware embodiment, complete software embodiment or combine software and hardware
Embodiment form.Moreover, it wherein includes computer usable program code that this specification, which can be used in one or more,
The computer implemented in computer-usable storage medium (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.)
The form of program product.
This specification is with reference to the method, equipment (system) and computer according to this specification one or more embodiment
The flowchart and/or the block diagram of program product describes.It should be understood that flow chart and/or side can be realized by computer program instructions
The combination of the flow and/or box in each flow and/or block and flowchart and/or the block diagram in block diagram.It can provide
These computer program instructions are set to the processing of all-purpose computer, special purpose computer, Embedded Processor or other programmable datas
Standby processor is to generate a machine so that is executed by computer or the processor of other programmable data processing devices
Instruction generates specifies for realizing in one flow of flow chart or multiple flows and/or one box of block diagram or multiple boxes
Function device.
These computer program instructions, which may also be stored in, can guide computer or other programmable data processing devices with spy
Determine in the computer-readable memory that mode works so that instruction generation stored in the computer readable memory includes referring to
Enable the manufacture of device, the command device realize in one flow of flow chart or multiple flows and/or one box of block diagram or
The function of being specified in multiple boxes.
These computer program instructions also can be loaded onto a computer or other programmable data processing device so that count
Series of operation steps are executed on calculation machine or other programmable devices to generate computer implemented processing, in computer or
The instruction executed on other programmable devices is provided for realizing in one flow of flow chart or multiple flows and/or block diagram one
The step of function of being specified in a box or multiple boxes.
In a typical configuration, computing device includes one or more processors (CPU), input/output interface, net
Network interface and memory.
Memory may include computer-readable medium in volatile memory, random access memory (RAM) and/or
The forms such as Nonvolatile memory, such as read-only memory (ROM) or flash memory (flash RAM).Memory is computer-readable medium
Example.
Computer-readable medium includes permanent and non-permanent, removable and non-removable media can be by any method
Or technology realizes information storage.Information can be computer-readable instruction, data structure, the module of program or other data.
The example of the storage medium of computer includes, but are not limited to phase transition internal memory (PRAM), static RAM (SRAM), moves
State random access memory (DRAM), other kinds of random access memory (RAM), read-only memory (ROM), electric erasable
Programmable read only memory (EEPROM), fast flash memory bank or other memory techniques, read-only disc read only memory (CD-ROM) (CD-ROM),
Digital versatile disc (DVD) or other optical storages, magnetic tape cassette, tape magnetic disk storage or other magnetic storage apparatus
Or any other non-transmission medium, it can be used for storage and can be accessed by a computing device information.As defined in this article, it calculates
Machine readable medium does not include temporary computer readable media (transitory media), such as data-signal and carrier wave of modulation.
It should also be noted that, the terms "include", "comprise" or its any other variant are intended to nonexcludability
Including so that process, method, commodity or equipment including a series of elements include not only those elements, but also wrap
Include other elements that are not explicitly listed, or further include for this process, method, commodity or equipment intrinsic want
Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that wanted including described
There is also other identical elements in the process of element, method, commodity or equipment.
This specification can describe in the general context of computer-executable instructions executed by a computer, such as journey
Sequence module.Usually, program module include routines performing specific tasks or implementing specific abstract data types, program, object,
Component, data structure etc..One or more embodiments that this specification can also be put into practice in a distributed computing environment, at this
In a little distributed computing environment, by executing task by the connected remote processing devices of communication network.It is counted in distribution
It calculates in environment, program module can be located in the local and remote computer storage media including storage device.
Each embodiment in this specification is described in a progressive manner, identical similar portion between each embodiment
Point just to refer each other, and each embodiment focuses on the differences from other embodiments.Especially for system reality
For applying example, since it is substantially similar to the method embodiment, so description is fairly simple, related place is referring to embodiment of the method
Part explanation.
It is above-mentioned that this specification specific embodiment is described.Other embodiments are in the scope of the appended claims
It is interior.In some cases, the action recorded in detail in the claims or step can be come according to different from the sequence in embodiment
It executes and desired result still may be implemented.In addition, the process described in the accompanying drawings not necessarily require show it is specific suitable
Sequence or consecutive order could realize desired result.In some embodiments, multitasking and parallel processing be also can
With or it may be advantageous.
The foregoing is merely one or more embodiments of this specification, are not limited to this specification.For
For those skilled in the art, one or more embodiments of this specification can have various modifications and variations.It is all in this explanation
Any modification, equivalent replacement, improvement and so within the spirit and principle of one or more embodiments of book, should be included in
Within the right of this specification.