CN108595247A - A kind of detection method, device and equipment - Google Patents

A kind of detection method, device and equipment Download PDF

Info

Publication number
CN108595247A
CN108595247A CN201810271370.7A CN201810271370A CN108595247A CN 108595247 A CN108595247 A CN 108595247A CN 201810271370 A CN201810271370 A CN 201810271370A CN 108595247 A CN108595247 A CN 108595247A
Authority
CN
China
Prior art keywords
detection
item
application
dependence item
detected
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810271370.7A
Other languages
Chinese (zh)
Other versions
CN108595247B (en
Inventor
崔晓旻
岳明亮
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Advanced New Technologies Co Ltd
Advantageous New Technologies Co Ltd
Original Assignee
Alibaba Group Holding Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alibaba Group Holding Ltd filed Critical Alibaba Group Holding Ltd
Priority to CN201810271370.7A priority Critical patent/CN108595247B/en
Publication of CN108595247A publication Critical patent/CN108595247A/en
Application granted granted Critical
Publication of CN108595247B publication Critical patent/CN108595247B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • G06F9/45533Hypervisors; Virtual machine monitors
    • G06F9/45558Hypervisor-specific management and integration aspects
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • G06F9/45533Hypervisors; Virtual machine monitors
    • G06F9/45558Hypervisor-specific management and integration aspects
    • G06F2009/45591Monitoring or debugging support

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Stored Programmes (AREA)

Abstract

A kind of detection method of this disclosure, device and equipment, this method will be divided into strong dependence item and weak dependence item using relied on institute is functional, obstructed out-of-date to relying on item detection by force, forbid using startup, to forbid the RS using place to be mounted to LVS, relying on by force, item is obstructed out-of-date by the weak dependence item of detection, illustrate using at this time may there is only slight defects, but it is still available on the whole, therefore permissible application starts, to allow RS to be mounted to LVS, and adjustment appropriate is carried out to the application.In this way, not only ensure that the reliability of application, but also improve the flexibility of detection.

Description

A kind of detection method, device and equipment
Technical field
This specification is related to a kind of field of computer technology more particularly to detection method, device and equipment.
Background technology
Currently, providing the method for service using Linux virtual server (Linux Virtual Server, LVS) It is used widely, as shown in Figure 1.
Fig. 1 is provides the network architecture diagram of service using LVS.In Fig. 1, the application for being used to provide service is mounted on really On server (Real Server, RS), when application starts, RS can be mounted on LVS, and asking for external transmission is received by LVS It asks, request is distributed to each RS for being mounted to LVS itself, and handled according to request by RS, handling result is returned by LVS Outside is gone back to, that is, externally being serviced by LVS.
With the refinement of business, the equipment for supporting different business is often physically isolated, e.g., in Fig. 1, branch The equipment for holding different business is individually positioned in different computer rooms, and each computer room externally provides service by the LVS of itself, often The equal carries of RS of a computer room are on the LVS of computer room itself.
Since the service that an application is provided tends to rely on multiple business, using can normally provide service Premise be exactly between computer room where these business can normal communication, and the functions of the equipments in these computer rooms are normal.
In order to ensure that the reliability of application is usually detected (e.g., RS carries by LVS to the application in the prior art Whether available or RS other Network status etc. in port on to LVS), still, the detection carried out by LVS is excessively limited to, and lacks Flexibility, therefore, it is necessary to a kind of detection methods, under the premise of ensureing application reliability, to improve the flexibility of detection.
Invention content
A kind of detection method of this specification offer, device and equipment, to solve the detection of prior art LVS progress excessively The problem of limitation, shortage flexibility.
Present description provides a kind of detection methods, including:
Judge whether to trigger the detection to application;
If triggering the detection to the application, according in advance for the strong dependence item of the application settings and weak dependence , the strong dependence item and weak dependence item are detected;
Pass through when to the strong dependence item detection, and obstructed out-of-date to the weak dependence item detection, the application is allowed to open It is dynamic, so that the real server RS where the application is mounted on Linux virtual server LVS, and do not passed through according to detection Weak dependence item, the application is adjusted;
It is obstructed out-of-date when being detected to the strong dependence item, forbid the application to start, to forbid the RS to be mounted to LVS On.
Present description provides a kind of detection device, application is installed in described device, described device includes:
Judgment module judges whether to trigger the detection to application;
Detection module is answered according to advance for described if the judgment module determines detection of the triggering to the application Strong dependence item with setting and weak dependence item are detected the strong dependence item and weak dependence item;
Starting module passes through when the detection module detects the strong dependence item, and not to the weak dependence item detection By when, allow the application to start, so that described device is mounted on Linux virtual server LVS, and obstructed according to detecting The weak dependence item crossed, is adjusted the application;When the detection module is obstructed out-of-date to the strong dependence item detection, forbid The application starts, to forbid described device to be mounted on LVS.
Present description provides a kind of detection device, application is installed in the equipment, the equipment includes one or more A memory and processor, the memory stores program, and is configured to be executed by one or more of processors Following steps:
Judge whether to trigger the detection to application;
If triggering the detection to the application, according in advance for the strong dependence item of the application settings and weak dependence , the strong dependence item and weak dependence item are detected;
Pass through when to the strong dependence item detection, and obstructed out-of-date to the weak dependence item detection, the application is allowed to open It is dynamic so that the equipment is mounted on Linux virtual server LVS, and according to detection not by weak dependence item, answer described With being adjusted;
It is obstructed out-of-date when being detected to the strong dependence item, forbid the application to start, to forbid the equipment to be mounted to LVS On.
Above-mentioned at least one technical solution that this specification uses can reach following advantageous effect:
The method that LVS only detects the Network status of RS compared with the prior art, the application are active by the relied on institute of application Can be divided into it is strong rely on item and weak dependence item, obstructed out-of-date to relying on item detection by force, forbid using starting, to forbid applying place RS be mounted to LVS, relying on by force, item is obstructed out-of-date by weak the dependences item of detection, illustrates that application at this time may there is only slight Defect, it is but still available on the whole, therefore permissible application starts, and to allow RS to be mounted to LVS, and is fitted to the application When adjustment.In this way, not only ensure that the reliability of application, but also improve the flexibility of detection.
Description of the drawings
Attached drawing described herein is used for providing further understanding this specification, forms part of this specification, The illustrative embodiments and their description of this specification do not constitute the improper restriction to this specification for explaining this specification. In the accompanying drawings:
Fig. 1 is provides the network architecture diagram of service using LVS;
Fig. 2 is the detection process schematic diagram that this specification provides;
Each detection schematic diagram that Fig. 3 is relied on by the application that this specification provides;
Fig. 4 is the strong detail flowchart for relying on item and weak dependence item of detection that this specification provides;
Fig. 5 is the structural schematic diagram for the detection device that this specification provides;
Fig. 6 is the structural schematic diagram for the detection device that this specification provides.
Specific implementation mode
The method of the application of LVS detections at present is only to be detected to the Network status of the RS where the application, e.g., detects RS Whether the port for being mounted to LVS can be used, and still, port is available, be not meant to using certain available, using can normally provide Service also relies on its process on RS, the business of connection number and other computer rooms other than depending on Network status Deng.Therefore, functional be divided into of the relied on institute of application is relied on by force item and weak dependence item by this specification, if relying on item detection by force Do not pass through, then forbid using starting, if rely on by force item detection by by weak dependences item detects and does not pass through, allow to start, and can Adjustment appropriate is carried out to application.
In order to make those skilled in the art more fully understand the technical solution in this specification one or more embodiment, Below in conjunction with the attached drawing in this specification one or more embodiment, to the technology in this specification one or more embodiment Scheme is clearly and completely described, it is clear that and described embodiment is only this specification a part of the embodiment, rather than Whole embodiments.The embodiment of base in this manual, those of ordinary skill in the art are not before making creative work The every other embodiment obtained is put, the range of this specification protection should be all belonged to.
Fig. 2 is the detection process schematic diagram that this specification provides, and specifically includes following steps:
S200:Judge whether to trigger the detection to application, if so, executing step S202, otherwise return to step S200.
In the present specification, using on RS, same application can be mounted on multiple RS, and RS can be mounted on LVS, Service is externally provided by LVS, when some RS No starting or when being shielded by LVS, the same application installed on other RS is still Service can be provided by LVS, a LVS and multiple RS is arranged in a computer room, if depending on other using the service provided Business is then needed through the communication between LVS progress computer rooms, and a RS can directly access it when the RS with other computer rooms is communicated The LVS of his computer room, without being accessed by the LVS where itself computer room, this is identical with the network architecture shown in FIG. 1.
For the application that one is mounted on RS, the main body for detecting the application can be mounted on the RS Another application, can also be the plug-in unit carried in the application or function module.
In the present specification, judging whether the method for triggering the detection to application can be specifically, when receiving for opening When moving the enabled instruction of the application, the detection to the application is triggered.Certainly, the method for detection trigger can also be other methods, Such as, when the specified function of the application is triggered, the detection to the application is triggered, alternatively, when preset detection time arrives, The detection to the application is triggered, the application is without limitation.
S202:According in advance be directed to the application settings strong dependence item and weak dependence item, to the strong dependence item and it is weak according to Bad item is detected.
In the present specification, it can normally provide an application to functional be divided into of the relied on institute of service and rely on item by force With weak dependence item.
The strong dependence item refers to whether being capable of providing the larger multiple detections of service impact to the application, if appointed Anticipating, a detection is abnormal, then the application cannot provide service.Such as, multiple detections that item is included are relied on by force specifically may be used To be:RS where the application is mounted to whether the port on LVS available or other Network status of the RS, this applies in the RS On the connection number that whether process normal, the RS can be provided whether in specified range etc..
The weak dependence item refers to whether being capable of providing the smaller multiple detections of service impact to the application, if appointed One or several detections of anticipating are abnormal, then the application still is able to provide the service of part.Such as, what weak dependence item was included is multiple Detection can be specifically:This using required access soft load address whether can subscribe to, the RS where the application whether It is whether normal etc. to have received the heartbeat response of every other RS, all protocol functions for being supported of the application.Obviously, using institute The soft load address that need to be accessed cannot subscribe to entirely, but can only subscribe to a part, using still can externally providing service, institute It is a weak dependence item with this.Certainly, if all soft load address cannot subscribe to, that is likely to be RS and another Communication between a server for providing soft load address is abnormal, and this belongs to strong and relies on item, as shown in Figure 3.
To relying on item by force and when weak dependence item is detected, can be preferentially detected to relying on item by force, if strong rely on Item detection does not pass through, then no longer needs to be detected weak dependence item, directly executes step S208, is detected if relying on item by force Pass through, then can continue to be detected weak dependence item.When being detected to relying on item by force, if all to rely on that item includes by force The detection of detection passes through, then can determine and pass through to relying on item detection by force, if the detection of at least one detection does not pass through, really It is fixed not pass through to relying on item detection by force.Similar, when being detected to weak dependence item, if all detections for including to weak dependence item The detection of item passes through, then can determine and pass through to the detection of weak dependence item, if the detection of at least one detection does not pass through, it is determined that right Weak dependence item detection does not pass through.
S204:When to the strong dependence item and the detection of weak dependence item by when, allow the application to start, so that described It is mounted on LVS using the RS at place.
S206:Pass through when to the strong dependence item detection, and obstructed out-of-date to the weak dependence item detection, is answered described in permission With startup, so that the real server RS where the application is mounted on Linux virtual server LVS, and not according to detection By weak dependence item, the application is adjusted.
S208:It is obstructed out-of-date when being detected to the strong dependence item, forbid the application to start, to forbid the RS to be mounted to On LVS.
By it is above-mentioned it is strong rely on item and it is weak rely on item definition it is found that ought rely on by force item detection it is obstructed out-of-date, application cannot carry For service, and ought rely on by force item detection pass through but weak dependences item detection it is obstructed out-of-date, using remain to offer part service, because This, if the two by detection, can directly allow using starting, so that the RS where the application is mounted on LVS.If strong rely on Item detection passes through but the detection of weak dependence item does not pass through, and also allows using startup, so that the RS where the application is mounted on LVS, Can also according to detection not by weak dependence item, application is adjusted, where specifically can adjust the application and/or the application Configuration parameter of RS etc..Such as, it adjusts the priority of application, adjust the priority etc. of RS where the application.If relying on item inspection by force Survey does not pass through, then no matter whether weak dependence item is by detection, forbids using starting, to forbid the RS carries where the application On LVS.
Further, due to when being detected to the strong dependence item of application and weak dependence item, it may be necessary to which first starting should It using (e.g., detect this apply the process on RS whether normal etc.), then is detected, therefore, when relying on by force, item detection is obstructed It is out-of-date, forbid the method that the application starts that can be specifically:Positive closing application, so that LVS shields the RS where the application.
Since certain functions that application is relied on may not at once start when starting detection application, and it can lag and open It is dynamic, therefore, in order to improve the accuracy of detection, the method that repeated detection is used in this specification, specifically, relying on item for strong Including each detection, which is detected;If passing through detection detection, continue to detect strong dependence item packet Other detections included;If not passing through to detection detection, judge whether the detection number carried out to the detection reaches Threshold value, if reaching, it is determined that detection detection is not passed through, if not up to, being detected again to the detection, until The detection reaches the threshold value by the number for detecting or being detected to the detection.
Similar, for each detection that weak dependence item includes, which is detected;If being examined to the detection Survey passes through, then continues to detect other detections that weak dependence item includes;If not passing through to detection detection, judge to the inspection Survey whether the detection number that item carries out reaches threshold value, if reaching, it is determined that detection detection is not passed through, if not up to, The detection is detected again, until the detection reaches described by the number for detecting or being detected to the detection Threshold value.
Wherein, above-mentioned threshold value can be configured as needed, e.g., be set as 30.That is, for rely on by force item or it is weak according to Any detection that Lai Xiangzhong includes, if at 30 times detect in once pass through, then be considered as the detection by detect, 30 It is secondary not by detection, then be considered as the detection and do not pass through detection.
In view of preferentially detecting the strong principle for relying on item, item and the weak side for relying on item will be relied on by specifically being detected in this specification Method can be as shown in Figure 4.
It is the detection method that one or more embodiments of this specification provide above, is based on same thinking, this explanation Book additionally provides corresponding detection device, as shown in Figure 5.
Application is installed in described device;
Judgment module 501 judges whether to trigger the detection to application;
Detection module 502, if the judgment module 501 determines that detection of the triggering to the application, basis are directed in advance The strong dependence item and weak dependence item of the application settings, are detected the strong dependence item and weak dependence item;
Starting module 503 passes through when the detection module 502 detects the strong dependence item, and to the weak dependence item It is obstructed out-of-date to detect, and the application is allowed to start, so that described device is mounted on Linux virtual server LVS, and according to inspection Survey not by weak dependence item, the application is adjusted;When the detection module 502 is obstructed to the strong dependence item detection It is out-of-date, forbid the application to start, to forbid described device to be mounted on LVS.
The judgment module 501 is specifically used for, and when receiving the enabled instruction for starting application, determines triggering to institute State the detection of application.
The detection module 502 is specifically used for, and is preferentially detected to the strong dependence item;If being examined to the strong dependence item Survey passes through, then is detected to the weak dependence item.
The strong dependence item includes multiple detections;The weak dependence item includes multiple detections;
The detection module 502 is specifically used for, to it is described it is strong rely on item all detections for including detect pass through when, really It is fixed that the strong dependence item detection is passed through;At least one detection detection for including to the strong dependence item is obstructed out-of-date, determines The strong dependence item detection is not passed through;At least one detection detection for including to the weak dependence item is obstructed out-of-date, determines The weak dependence item detection is not passed through.
The detection module 502 is specifically used for, for it is described it is strong rely on item each detection for including, to the detection into Row detection;If passing through detection detection, continue to detect described strong other detections for relying on item and including;If to the detection Item detection does not pass through, then judges whether the detection number carried out to the detection reaches threshold value, if reaching, it is determined that the detection Item detection does not pass through, if not up to, being detected again to the detection, until the detection is by detection or to the detection The number that item is detected reaches the threshold value.
The detection module 502 is specifically used for, for it is described it is weak rely on item each detection for including, to the detection into Row detection;If passing through detection detection, continue to detect described weak other detections for relying on item and including;If to the detection Item detection does not pass through, then judges whether the detection number carried out to the detection reaches threshold value, if reaching, it is determined that the detection Item detection does not pass through, if not up to, being detected again to the detection, until the detection is by detection or to the detection The number that item is detected reaches the threshold value.
This specification also correspondence provides a kind of detection device, as shown in Figure 6.Application is installed, the equipment in the equipment Including one or more memories and processor, the memory stores program, and is configured to by one or more A processor executes following steps:
Judge whether to trigger the detection to application;
If triggering the detection to the application, according in advance for the strong dependence item of the application settings and weak dependence , the strong dependence item and weak dependence item are detected;
Pass through when to the strong dependence item detection, and obstructed out-of-date to the weak dependence item detection, the application is allowed to open It is dynamic so that the equipment is mounted on Linux virtual server LVS, and according to detection not by weak dependence item, answer described With being adjusted;
It is obstructed out-of-date when being detected to the strong dependence item, forbid the application to start, to forbid the equipment to be mounted to LVS On.
In the 1990s, the improvement of a technology can be distinguished clearly be on hardware improvement (for example, Improvement to circuit structures such as diode, transistor, switches) or software on improvement (improvement for method flow).So And with the development of technology, the improvement of current many method flows can be considered as directly improving for hardware circuit. Designer nearly all obtains corresponding hardware circuit by the way that improved method flow to be programmed into hardware circuit.Cause This, it cannot be said that the improvement of a method flow cannot be realized with hardware entities module.For example, programmable logic device (Programmable Logic Device, PLD) (such as field programmable gate array (Field Programmable Gate Array, FPGA)) it is exactly such a integrated circuit, logic function determines device programming by user.By designer Voluntarily programming comes a digital display circuit " integrated " on a piece of PLD, designs and makes without asking chip maker Dedicated IC chip.Moreover, nowadays, substitution manually makes IC chip, this programming is also used instead mostly " patrols Volume compiler (logic compiler) " software realizes that software compiler used is similar when it writes with program development, And the source code before compiling also write by handy specific programming language, this is referred to as hardware description language (Hardware Description Language, HDL), and HDL is also not only a kind of, but there are many kind, such as ABEL (Advanced Boolean Expression Language)、AHDL(Altera Hardware Description Language)、Confluence、CUPL(Cornell University Programming Language)、HDCal、JHDL (Java Hardware Description Language)、Lava、Lola、MyHDL、PALASM、RHDL(Ruby Hardware Description Language) etc., VHDL (Very-High-Speed are most generally used at present Integrated Circuit Hardware Description Language) and Verilog.Those skilled in the art also answer This understands, it is only necessary to method flow slightly programming in logic and is programmed into integrated circuit with above-mentioned several hardware description languages, The hardware circuit for realizing the logical method flow can be readily available.
Controller can be implemented in any suitable manner, for example, controller can take such as microprocessor or processing The computer for the computer readable program code (such as software or firmware) that device and storage can be executed by (micro-) processor can Read medium, logic gate, switch, application-specific integrated circuit (Application Specific Integrated Circuit, ASIC), the form of programmable logic controller (PLC) and embedded microcontroller, the example of controller includes but not limited to following microcontroller Device:ARC 625D, Atmel AT91SAM, Microchip PIC18F26K20 and Silicone Labs C8051F320, are deposited Memory controller is also implemented as a part for the control logic of memory.It is also known in the art that in addition to Pure computer readable program code mode is realized other than controller, can be made completely by the way that method and step is carried out programming in logic Controller is obtained in the form of logic gate, switch, application-specific integrated circuit, programmable logic controller (PLC) and embedded microcontroller etc. to come in fact Existing identical function.Therefore this controller is considered a kind of hardware component, and to including for realizing various in it The device of function can also be considered as the structure in hardware component.Or even, it can will be regarded for realizing the device of various functions For either the software module of implementation method can be the structure in hardware component again.
System, device, module or the unit that above-described embodiment illustrates can specifically realize by computer chip or entity, Or it is realized by the product with certain function.It is a kind of typically to realize that equipment is computer.Specifically, computer for example may be used Think personal computer, laptop computer, cellular phone, camera phone, smart phone, personal digital assistant, media play It is any in device, navigation equipment, electronic mail equipment, game console, tablet computer, wearable device or these equipment The combination of equipment.
For convenience of description, it is divided into various units when description apparatus above with function to describe respectively.Certainly, implementing this The function of each unit is realized can in the same or multiple software and or hardware when specification.
It should be understood by those skilled in the art that, the embodiment of this specification can be provided as method, system or computer journey Sequence product.Therefore, in terms of this specification can be used complete hardware embodiment, complete software embodiment or combine software and hardware Embodiment form.Moreover, it wherein includes computer usable program code that this specification, which can be used in one or more, The computer implemented in computer-usable storage medium (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.) The form of program product.
This specification is with reference to the method, equipment (system) and computer according to this specification one or more embodiment The flowchart and/or the block diagram of program product describes.It should be understood that flow chart and/or side can be realized by computer program instructions The combination of the flow and/or box in each flow and/or block and flowchart and/or the block diagram in block diagram.It can provide These computer program instructions are set to the processing of all-purpose computer, special purpose computer, Embedded Processor or other programmable datas Standby processor is to generate a machine so that is executed by computer or the processor of other programmable data processing devices Instruction generates specifies for realizing in one flow of flow chart or multiple flows and/or one box of block diagram or multiple boxes Function device.
These computer program instructions, which may also be stored in, can guide computer or other programmable data processing devices with spy Determine in the computer-readable memory that mode works so that instruction generation stored in the computer readable memory includes referring to Enable the manufacture of device, the command device realize in one flow of flow chart or multiple flows and/or one box of block diagram or The function of being specified in multiple boxes.
These computer program instructions also can be loaded onto a computer or other programmable data processing device so that count Series of operation steps are executed on calculation machine or other programmable devices to generate computer implemented processing, in computer or The instruction executed on other programmable devices is provided for realizing in one flow of flow chart or multiple flows and/or block diagram one The step of function of being specified in a box or multiple boxes.
In a typical configuration, computing device includes one or more processors (CPU), input/output interface, net Network interface and memory.
Memory may include computer-readable medium in volatile memory, random access memory (RAM) and/or The forms such as Nonvolatile memory, such as read-only memory (ROM) or flash memory (flash RAM).Memory is computer-readable medium Example.
Computer-readable medium includes permanent and non-permanent, removable and non-removable media can be by any method Or technology realizes information storage.Information can be computer-readable instruction, data structure, the module of program or other data. The example of the storage medium of computer includes, but are not limited to phase transition internal memory (PRAM), static RAM (SRAM), moves State random access memory (DRAM), other kinds of random access memory (RAM), read-only memory (ROM), electric erasable Programmable read only memory (EEPROM), fast flash memory bank or other memory techniques, read-only disc read only memory (CD-ROM) (CD-ROM), Digital versatile disc (DVD) or other optical storages, magnetic tape cassette, tape magnetic disk storage or other magnetic storage apparatus Or any other non-transmission medium, it can be used for storage and can be accessed by a computing device information.As defined in this article, it calculates Machine readable medium does not include temporary computer readable media (transitory media), such as data-signal and carrier wave of modulation.
It should also be noted that, the terms "include", "comprise" or its any other variant are intended to nonexcludability Including so that process, method, commodity or equipment including a series of elements include not only those elements, but also wrap Include other elements that are not explicitly listed, or further include for this process, method, commodity or equipment intrinsic want Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that wanted including described There is also other identical elements in the process of element, method, commodity or equipment.
This specification can describe in the general context of computer-executable instructions executed by a computer, such as journey Sequence module.Usually, program module include routines performing specific tasks or implementing specific abstract data types, program, object, Component, data structure etc..One or more embodiments that this specification can also be put into practice in a distributed computing environment, at this In a little distributed computing environment, by executing task by the connected remote processing devices of communication network.It is counted in distribution It calculates in environment, program module can be located in the local and remote computer storage media including storage device.
Each embodiment in this specification is described in a progressive manner, identical similar portion between each embodiment Point just to refer each other, and each embodiment focuses on the differences from other embodiments.Especially for system reality For applying example, since it is substantially similar to the method embodiment, so description is fairly simple, related place is referring to embodiment of the method Part explanation.
It is above-mentioned that this specification specific embodiment is described.Other embodiments are in the scope of the appended claims It is interior.In some cases, the action recorded in detail in the claims or step can be come according to different from the sequence in embodiment It executes and desired result still may be implemented.In addition, the process described in the accompanying drawings not necessarily require show it is specific suitable Sequence or consecutive order could realize desired result.In some embodiments, multitasking and parallel processing be also can With or it may be advantageous.
The foregoing is merely one or more embodiments of this specification, are not limited to this specification.For For those skilled in the art, one or more embodiments of this specification can have various modifications and variations.It is all in this explanation Any modification, equivalent replacement, improvement and so within the spirit and principle of one or more embodiments of book, should be included in Within the right of this specification.

Claims (13)

1. a kind of detection method, including:
Judge whether to trigger the detection to application;
If triggering the detection to the application, basis is directed to the strong dependence item of the application settings and weak dependence item in advance, right The strong dependence item and weak dependence item are detected;
Pass through when to the strong dependence item detection, and obstructed out-of-date to the weak dependence item detection, the application is allowed to start, with Real server RS where making the application is mounted on Linux virtual server LVS, and according to detection not by it is weak according to Lai Xiang is adjusted the application;
It is obstructed out-of-date when being detected to the strong dependence item, forbid the application to start, to forbid the RS to be mounted on LVS.
2. the method as described in claim 1 judges whether to trigger the detection to application, specifically include:
When receiving the enabled instruction for starting application, detection of the triggering to the application is determined.
3. the method as described in claim 1 is detected the strong dependence item and weak dependence item, specifically includes:
Preferentially the strong dependence item is detected;
If passing through to the strong dependence item detection, the weak dependence item is detected.
4. the method as described in claims 1 to 3 is any, the strong dependence item includes multiple detections;The weak dependence item packet Include multiple detections;
The strong dependence item detection is passed through, is specifically included:
All detections that the strong dependence item includes are detected and are passed through;
The strong dependence item detection is not passed through, is specifically included:
At least one detection detection for including to the strong dependence item does not pass through;
To not passing through to the weak dependence item detection, specifically include:
At least one detection detection for including to the weak dependence item does not pass through.
5. method as claimed in claim 4 is detected the strong dependence item, specifically includes:
For the strong each detection for relying on item and including, which is detected;
If passing through detection detection, continue to detect described strong other detections for relying on item and including;
If not passing through to detection detection, judge whether the detection number carried out to the detection reaches threshold value, if reaching, It then determines and detection detection is not passed through, if not up to, being detected again to the detection, until the detection passes through Detection or the number being detected to the detection reach the threshold value.
6. method as claimed in claim 4 is detected the weak dependence item, specifically includes:
For the weak each detection for relying on item and including, which is detected;
If passing through detection detection, continue to detect described weak other detections for relying on item and including;
If not passing through to detection detection, judge whether the detection number carried out to the detection reaches threshold value, if reaching, It then determines and detection detection is not passed through, if not up to, being detected again to the detection, until the detection passes through Detection or the number being detected to the detection reach the threshold value.
7. a kind of detection device, application is installed in described device, described device includes:
Judgment module judges whether to trigger the detection to application;
Detection module, if the judgment module determines that detection of the triggering to the application, basis are set for the application in advance Fixed strong dependence item and weak dependence item are detected the strong dependence item and weak dependence item;
Starting module passes through when the detection module detects the strong dependence item, and does not pass through to the weak dependence item detection When, allow the application to start so that described device is mounted on Linux virtual server LVS, and according to detection not by Weak dependence item, is adjusted the application;When the detection module is obstructed out-of-date to the strong dependence item detection, forbid described Using startup, to forbid described device to be mounted on LVS.
8. device as claimed in claim 7, the judgment module is specifically used for, and refers to for starting the startup of application when receiving When enabling, detection of the triggering to the application is determined.
9. device as claimed in claim 7, the detection module is specifically used for, and is preferentially detected to the strong dependence item; If passing through to the strong dependence item detection, the weak dependence item is detected.
10. the device as described in claim 7~9 is any, the strong dependence item includes multiple detections;The weak dependence item packet Include multiple detections;
The detection module is specifically used for, to it is described it is strong rely on item all detections for including detect pass through when, determination is to institute Strong dependence item detection is stated to pass through;At least one detection detection for including to the strong dependence item is obstructed out-of-date, determines to described Strong dependence item detection does not pass through;At least one detection detection for including to the weak dependence item is obstructed out-of-date, determines to described Weak dependence item detection does not pass through.
Each of 11. device as claimed in claim 10, the detection module is specifically used for, include for the strong dependence item Detection is detected the detection;If passing through to detection detection, continue to detect its strong for relying on that item includes His detection;If not passing through to detection detection, judge whether the detection number carried out to the detection reaches threshold value, if Reach, it is determined that detection detection is not passed through, if not up to, being detected again to the detection, until the detection Item reaches the threshold value by the number for detecting or being detected to the detection.
Each of 12. device as claimed in claim 10, the detection module is specifically used for, include for the weak dependence item Detection is detected the detection;If passing through to detection detection, continue to detect its weak for relying on that item includes His detection;If not passing through to detection detection, judge whether the detection number carried out to the detection reaches threshold value, if Reach, it is determined that detection detection is not passed through, if not up to, being detected again to the detection, until the detection Item reaches the threshold value by the number for detecting or being detected to the detection.
13. a kind of detection device, application is installed in the equipment, the equipment includes one or more memories and processing Device, the memory store program, and are configured to execute following steps by one or more of processors:
Judge whether to trigger the detection to application;
If triggering the detection to the application, basis is directed to the strong dependence item of the application settings and weak dependence item in advance, right The strong dependence item and weak dependence item are detected;
Pass through when to the strong dependence item detection, and obstructed out-of-date to the weak dependence item detection, the application is allowed to start, with So that the equipment is mounted on Linux virtual server LVS, and according to detection not by weak dependence item, to it is described apply into Row adjustment;
It is obstructed out-of-date when being detected to the strong dependence item, forbid the application to start, to forbid the equipment to be mounted on LVS.
CN201810271370.7A 2018-03-29 2018-03-29 Detection method, device and equipment Active CN108595247B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810271370.7A CN108595247B (en) 2018-03-29 2018-03-29 Detection method, device and equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810271370.7A CN108595247B (en) 2018-03-29 2018-03-29 Detection method, device and equipment

Publications (2)

Publication Number Publication Date
CN108595247A true CN108595247A (en) 2018-09-28
CN108595247B CN108595247B (en) 2021-10-29

Family

ID=63623833

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810271370.7A Active CN108595247B (en) 2018-03-29 2018-03-29 Detection method, device and equipment

Country Status (1)

Country Link
CN (1) CN108595247B (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101561774A (en) * 2009-03-31 2009-10-21 深圳创维数字技术股份有限公司 Monitoring method and monitoring system of self-defined protocol service program
EP2701068A1 (en) * 2011-04-19 2014-02-26 Murakumo Corporation Network access system
CN104038376A (en) * 2014-06-30 2014-09-10 浪潮(北京)电子信息产业有限公司 Method and device for managing real servers and LVS clustering system
CN104423944A (en) * 2013-08-29 2015-03-18 中国银联股份有限公司 Software application system
CN104993953A (en) * 2015-06-19 2015-10-21 北京奇虎科技有限公司 Method for detecting network service state and device detecting network service state
KR20160044623A (en) * 2014-10-15 2016-04-26 극동대학교 산학협력단 Load Balancing Method for a Linux Virtual Server
CN106100940A (en) * 2016-08-25 2016-11-09 上海斐讯数据通信技术有限公司 A kind of network message supervising device and monitoring method thereof

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101561774A (en) * 2009-03-31 2009-10-21 深圳创维数字技术股份有限公司 Monitoring method and monitoring system of self-defined protocol service program
EP2701068A1 (en) * 2011-04-19 2014-02-26 Murakumo Corporation Network access system
CN104423944A (en) * 2013-08-29 2015-03-18 中国银联股份有限公司 Software application system
CN104038376A (en) * 2014-06-30 2014-09-10 浪潮(北京)电子信息产业有限公司 Method and device for managing real servers and LVS clustering system
KR20160044623A (en) * 2014-10-15 2016-04-26 극동대학교 산학협력단 Load Balancing Method for a Linux Virtual Server
CN104993953A (en) * 2015-06-19 2015-10-21 北京奇虎科技有限公司 Method for detecting network service state and device detecting network service state
CN106100940A (en) * 2016-08-25 2016-11-09 上海斐讯数据通信技术有限公司 A kind of network message supervising device and monitoring method thereof

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
HONG TANG 等: "Construction and Application of Linux Virtual Server Cluster for Scientific Computing", 《2008 IFIP INTERNATIONAL CONFERENCE ON NETWORK AND PARALLEL COMPUTING》 *
周莹莲 等: "服务器负载均衡技术研究", 《计算机与数字工程》 *

Also Published As

Publication number Publication date
CN108595247B (en) 2021-10-29

Similar Documents

Publication Publication Date Title
JP6716149B2 (en) Blockchain-based data processing method and apparatus
TWI709931B (en) Method, device and electronic equipment for detecting indicator abnormality
CN111885082B (en) Web application package processing method, device and equipment
CN108549562A (en) A kind of method and device of image load
KR20150108216A (en) Method for processing input and an electronic device thereof
CN109144756A (en) A kind of method and device of stack overflow processing
CN110033130A (en) The monitoring method and device of abnormal traffic
CN108595246A (en) A kind of method, apparatus and equipment of operation application
CN108762913A (en) service processing method and device
US20220004404A1 (en) Application processing method and apparatus
CN109391512A (en) A kind of service issuing method, device and electronic equipment
CN108540524A (en) A kind of method, equipment and readable medium for establishing social networks
CN107678834A (en) A kind of Android simulator detection method and device based on hardware configuration
CN109144600A (en) A kind of operation method of application program, equipment and computer-readable medium
US20170308238A1 (en) Electronic device and method for preventing unintended operation of electronic device
CN108304313A (en) It is a kind of for the device of data test, client and method
CN108595247A (en) A kind of detection method, device and equipment
CN110046052A (en) A kind of service calling method and device
CN108388385A (en) A kind of method, apparatus and equipment of displaying red packet
CN108536613A (en) Data clearing method, device and server
CN108345536A (en) A kind of dispositions method, device and the equipment of continuous integrating environment
CN107066872A (en) Plug-in right control method and device, plug-in system
CN110245166A (en) Verification of data method and device
CN108681492A (en) Data processing method and device
WO2016058484A1 (en) Method and apparatus for processing screen sensitive information

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20201021

Address after: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands

Applicant after: Innovative advanced technology Co.,Ltd.

Address before: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands

Applicant before: Advanced innovation technology Co.,Ltd.

Effective date of registration: 20201021

Address after: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands

Applicant after: Advanced innovation technology Co.,Ltd.

Address before: A four-storey 847 mailbox in Grand Cayman Capital Building, British Cayman Islands

Applicant before: Alibaba Group Holding Ltd.

TA01 Transfer of patent application right
GR01 Patent grant
GR01 Patent grant