CN109815001A - Application processing method, device and mandatory system - Google Patents

Application processing method, device and mandatory system Download PDF

Info

Publication number
CN109815001A
CN109815001A CN201711154162.0A CN201711154162A CN109815001A CN 109815001 A CN109815001 A CN 109815001A CN 201711154162 A CN201711154162 A CN 201711154162A CN 109815001 A CN109815001 A CN 109815001A
Authority
CN
China
Prior art keywords
application
accessed
trustship
hosts applications
abnormal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201711154162.0A
Other languages
Chinese (zh)
Inventor
邓隽
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Alibaba Group Holding Ltd
Original Assignee
Alibaba Group Holding Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alibaba Group Holding Ltd filed Critical Alibaba Group Holding Ltd
Priority to CN201711154162.0A priority Critical patent/CN109815001A/en
Publication of CN109815001A publication Critical patent/CN109815001A/en
Pending legal-status Critical Current

Links

Abstract

The embodiment of the present application discloses a kind of application processing method, device and mandatory system.The described method includes: obtaining the trustship statistical information of application;The trustship statistical information is matched with using recognition strategy, determines that exception hosts applications, the exception hosts applications include application of the amount of access in fixed time limit lower than threshold value;Stop the operation of the abnormal hosts applications, and discharges the occupied system resource of the abnormal hosts applications.Using each embodiment of the application, the resource consumption of corpse application hosting can be reduced, reduces product cost.

Description

Application processing method, device and mandatory system
Technical field
The application belongs to computer data processing technology field more particularly to a kind of application processing method, device and trustship System.
Background technique
With the rapid development of computer and internet, the quantity of the applications such as various PC, mobile terminal APP, web application is got over Come huger.The trusteeship service for having some service providers that can provide application at present for example provides one kind based on cloud computing architecture Web application hosting environment, can help application developer (user for needing trustship) simplify web application building And maintenance, and can be extended according to the growth that application access amount and data store.Application hosting can be stored in by user In the hosted platform that service provider provides (such as traditional virtual host, PaaS product), using the application server that it is provided, greatly Facilitate user's application and development.
But there are a large amount of corpse applications in the application of current many trustship product trustships, the corpse application is typically referred to Without amount of access application within the time limit of specified.Corpse is applied compared to one of obvious characteristic of normal use as a long time without amount of access. At present for these corpse applications, traditional approach would generally select not do specially treated, and corpse is applied and normal use mixes It disposes and corpse is kept to apply in normal operating condition.Fig. 1 is a kind of application deployment signal of existing conventional application hosting Figure carries out normal trustship processing as normal use as shown in Figure 1, such as applying corpse, then appears in the clothes of storage application Occurs corpse simultaneously using the layout situation with normal use on business device.Obviously such corpse is applied and normal use mixes cloth Office's mode, needs when control centre is handled while considering normal use and corpse application, will increase application hosting scheduling strategy Complexity is unfavorable for managing and maintaining for application hosting.Also, the available resources of single server (machine) are limited, these are stiff Corpse application also can the machine resources such as committed memory, port, CPU so that the money provided on single server for normal use Source relative reduction, and the corpse application for being constantly in operating status can provide the money of the single server of resource then for normal use Source waste.
Summary of the invention
The application is designed to provide a kind of application processing method, device and mandatory system, it is possible to reduce corpse application support The resource consumption of pipe reduces product cost.
A kind of application processing method, device and mandatory system provided by the present application are achieved in that
A kind of application processing method, which comprises
Obtain the trustship statistical information of application;
The trustship statistical information is matched with using recognition strategy, confirms the visit applied in fixed time limit The amount of asking is lower than threshold value;
Stop the operation of the application, and discharges the occupied system resource of application.
It is a kind of to apply processing unit, including at least one processor and for the storage of storage processor executable instruction Device, the processor are realized when executing described instruction:
Obtain the trustship statistical information of application;
The trustship statistical information is matched with using recognition strategy, determines exception hosts applications, the abnormal support Pipe application includes application of the amount of access in fixed time limit lower than threshold value;
Stop the operation of the abnormal hosts applications, and discharges the occupied system resource of the abnormal hosts applications.
A kind of computer readable storage medium is stored thereon with computer instruction, and it is following that described instruction is performed realization Step:
Obtain the trustship statistical information of application;
The trustship statistical information is matched with using recognition strategy, determines exception hosts applications, the abnormal support Pipe application includes application of the amount of access in fixed time limit lower than threshold value;
Stop the operation of the abnormal hosts applications, and discharges the occupied system resource of the abnormal hosts applications.
A kind of application hosting system, including processor, the memory for storage processor executable instruction, the first storage Unit, the second storage unit, the application of the first storage unit storage operation, the second storage unit storage are out of service Application, the processing realizes when executing described instruction:
Obtain the trustship statistical information applied in the first storage unit;
The trustship statistical information is matched with using recognition strategy, determines exception hosts applications, the abnormal support Pipe application includes application of the amount of access in fixed time limit lower than threshold value;
Stop the operation of the abnormal hosts applications, and discharges the occupied system resource of the abnormal hosts applications;
The abnormal hosts applications are migrated to second storage unit.
A kind of application processing method, device and mandatory system provided by the present application, setting judge whether it is abnormal trustship and answer Recognition strategy is applied, whether can be abnormal hosts applications with the application of Auto-matching trustship, and be its mark.By application After recognition strategy matching treatment, if abnormal hosts applications, then can stop the operation of abnormal hosts applications and discharge described different The occupied system resource of normal hosts applications.After stopping abnormal hosts applications, abnormal hosts applications can be set to inoperative shape State, then the system resources such as abnormal hosts applications no longer committed memory, port, CPU, more non-so as to allow single machine to dispose The abnormal hosts applications of operating status effectively solve the problem of resource waste during abnormal hosts applications trustship, effective Reduction resource consumption, reduce product cost.
Detailed description of the invention
In order to illustrate the technical solutions in the embodiments of the present application or in the prior art more clearly, to embodiment or will show below There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this The some embodiments recorded in application, for those of ordinary skill in the art, in the premise of not making the creative labor property Under, it is also possible to obtain other drawings based on these drawings.
Fig. 1 is a kind of application deployment schematic diagram of existing conventional application hosting;
Fig. 2 is a kind of method flow schematic diagram of embodiment of herein described method;
Fig. 3 is that application decision center according to recognition strategy judges whether application to be identified is stiff in the application one embodiment The treatment process schematic diagram of corpse application;
Fig. 4 is in a kind of application scenarios of embodiment of the application to the schematic diagram of a scenario of corpse application isolation deployment;
Fig. 5 is in the application scenarios of the application another kind embodiment to the schematic diagram of a scenario of corpse application isolation deployment;
Fig. 6 is a kind of flow diagram of application processing method another kind embodiment provided by the present application;
Fig. 7 is the method flow schematic diagram of herein described another embodiment of method;
Fig. 8 is the example process schematic diagram of the request of processing access corpse application in the application one embodiment;
Fig. 9 is the method flow schematic diagram of herein described method another kind embodiment;
Figure 10 is a kind of structural schematic diagram of application hosting server example provided by the present application.
Specific embodiment
In order to make those skilled in the art better understand the technical solutions in the application, below in conjunction with the application reality The attached drawing in example is applied, the technical scheme in the embodiment of the application is clearly and completely described, it is clear that described implementation Example is merely a part but not all of the embodiments of the present application.Based on the embodiment in the application, this field is common The application protection all should belong in technical staff's every other embodiment obtained without creative efforts Range.
Fig. 2 is a kind of a kind of method flow diagram of embodiment of herein described application processing method.Although the application provides As the following examples or method operating procedure shown in the drawings or apparatus structure, but based on conventional or without creative labor Move in the method or device may include more or part merge after less operating procedure or modular unit.In logic Property in the step of there is no necessary causalities or structure, the execution sequence of these steps or the modular structure of device are not limited to The embodiment of the present application or execution shown in the drawings sequence or modular structure.The dress in practice of the method or modular structure It sets, server or end product are in application, can be according to embodiment or method shown in the drawings or modular structure progress sequence Execute or it is parallel execute (such as parallel processor or multiple threads environment, even include distributed treatment, server The implementation environment of cluster).
Application hosting typically refers to the application that user is managed in physical machine or virtual machine, and main includes providing resource environment Application deployment and by scheduling starting application (make using in operating status), stop application (making using in non-operating state) Deng.There are a large amount of corpse applications in the application of current many trustship product trustships, these corpse applications are considered exception Hosts applications.In some embodiments of the present application, in most cases, the abnormal hosts applications may include the specified phase Corpse application without amount of access in limiting, but the application is not excluded for also may include amount of access in fixed time limit in other embodiments Lower than threshold value using (may be considered a kind of situation that amount of access is lower than threshold value without amount of access in fixed time limit) or some It can also be defined in implement scene including no application code or the application that cannot be normally accessed, an implementation provided by the present application In the application scenarios of example, an application decision center can be disposed, then according to configurable application recognition strategy to determine The application of trustship is normal use or abnormal hosts applications, and can stamp corresponding label for hosted application.It needs Illustrate, although being primarily directed within the instruction time limit in some embodiments that this specification provides without amount of access Corpse application, such corpse application can be considered as one of abnormal hosts applications, but this specification is not excluded for others in fact Apply other in example and be defined as abnormal hosts applications, for example, can be accessed but cannot be run because there is no application deployment code or The application of output result also can be defined as abnormal hosts applications.Correspondingly, normal use described herein can wrap In operating status and occupying system resources applications are included, or are marked as the application of normal use.
In general, application hosted by user can be usually stored in the resource pool of system or server.The present embodiment It may include the machine (such as physical machine or virtual machine) of multiple storage hosts applications, Mei Geji in application scenarios, in resource pool Device can store the one or more application of one or more users respectively, include that normal use and may deposit in these applications Abnormal hosts applications, such as the corpse application in one month without amount of access.
Application in resource pool can be unified storage on a machine, be also possible to be respectively stored in different machines On.In one implement scene of the present embodiment, application hosted by user can be stored in resource pool, the resource pool It may include one or more for storing the hosted storage unit applied.Such storage unit may include dedicated for Store the machine of hosts applications, such as memory or private server.Then the application in available resource pool, judges respectively Using whether being abnormal corpse application.Can be pre-configured with for judge it is to be identified application whether be abnormal hosts applications application Recognition strategy.In this way, it is described after the matching of application recognition strategy, determine that application to be identified for abnormal hosts applications, then may be used Think described to be identified using mark, a marker character (or label) specifically can be set, marks the application to be identified to be Abnormal hosts applications are such as labeled as " corpse application ".In this way, corresponding using the application recognition strategy that the application embodiment provides Some trustship statistical informations are identified, determine which is abnormal support in the application of processing trustship storage by match decision Pipe application.Abnormal hosts applications can be set to non-fortune by the operation for then stopping abnormal hosts applications by application schedules center Row state makes the system resources such as abnormal hosts applications no longer committed memory, port, CPU, so that single machine can be disposed Exception hosts applications as much as possible.
A kind of specific embodiment as shown in Fig. 2, in a kind of a kind of embodiment of application processing method provided by the present application, The method may include:
S1: the trustship statistical information of application is obtained.
After determining application to be identified, the trustship statistical information of the available some predefined types of hosts applications.The support Pipe statistical information indicates to can be used for reacting or calculating whether to be identified apply in resource pool is that the data that corpse is applied are believed Breath usually may include mark informations such as the attribute information, such as code information, version of some static state of application etc., can also be with The information, such as cycle access amount etc. gone out including some dynamic statistics.In the present embodiment, it pre-designed can need wait know Which the trustship statistical information that do not apply, it is possible to specify the trustship of one or more type of the application to be identified counts letter Breath as identification application whether be corpse apply trustship statistical information.In general, the trustship of the application to be identified of required acquisition Statistical information is usually associated with the application recognition strategy of configuration.The trustship statistical information of acquisition may include the support of an application Pipe statistical information also may include the trustship statistical information for the multiple applications chosen.
S2: the trustship statistical information is matched with using recognition strategy, determines exception hosts applications, the exception Hosts applications include application of the amount of access in fixed time limit lower than threshold value.
It can be pre-configured in the present embodiment for judging whether application to be identified is abnormal hosts applications using identification Strategy.Described may include the judgment rule of one or more identification exception hosts applications using recognition strategy, such as using Without amount of access, non-application deployment code etc. in one month, specifically need can be handled according to different implement scenes and application hosting That seeks the abnormal hosts applications of the corresponding identification of configuration applies recognition strategy.Certainly, the application is not excluded for described using recognition strategy The embodiment that can also be configured or construct with real-time online.In the case where computer performance allows, can be constructed with real-time online, Recognition strategy is applied in configuration, modification, or even can dynamically change in matching treatment according to different needs apply identification each time Strategy.Described can store in the server of application hosting using recognition strategy, such as can be and be arranged in server Application decision center.Certainly, the application recognition strategy can be dynamically, and configuration can be remodified by operating personnel, Such as add, judgment rule therein is deleted or modified etc..It is described to apply recognition strategy in a kind of embodiment provided by the present application It is configured to include at least one of following:
It applies within the specified period without amount of access;
It applies in specified period hiccup amount of access lower than threshold value;
Using without corresponding operation code;
Using cannot normally be accessed.
Abnormal hosts applications can will be labeled as using the application that recognition strategy matches with above-mentioned.
Can may include following 4 kinds of strategies according in the different corresponding setting parameters, such as an example of strategy:
What can normally be accessed applies in the first predetermined period without amount of access;
The amount of access applied in the second predetermined period that can be normally accessed is less than access thresholds;
The application that can be normally accessed is without the corresponding operation code of deployment;
Applying cannot normally be accessed in third predetermined period.
In specific example, such as what can normally be accessed apply in one month without amount of access, amount of access 0, or Person, what can normally be accessed applies in continuous two months amount of access less than 3 times, or can normally be accessed using no portion The application code of user oneself is affixed one's name to, alternatively, the application of trustship can be cannot normally be accessed in a predetermined period.Certainly, also May include other identification application whether be abnormal hosts applications apply recognition strategy, and the deformation based on foregoing description, Transformation etc..In actual match processing, if the trustship statistical information hit of application to be identified can be set using in recognition strategy Any one, i.e., it is believed that application to be identified is abnormal hosts applications.First predetermined period, second pre- among the above Phase can be arranged according to the type of hosts applications, design requirement, trustship requirement, monitoring requirement etc. in fixed cycle, third predetermined period The time cycle answered.Lower than in threshold value, the setting of the threshold value can unify the amount of access applied in fixed time limit Setting standard can come into force to all applications, different threshold values, such as one month can also be arranged according to different applications respectively The access times of interior any application are that the application access number of specified type in 0 or one month is inferior lower than 3.Specific threshold Value can be configured with the scene demand of fundamental difference.
Such as shown in Fig. 3, Fig. 3 be in the application one embodiment application decision center judged according to recognition strategy it is to be identified Using whether be abnormal hosts applications treatment process schematic diagram, the corpse in Fig. 3 applies as abnormal hosts applications.Obtain to After the trustship statistical information for identifying application, the trustship statistical information can be matched with using recognition strategy.Then may be used Whether to be abnormal hosts applications according to the matched result confirmation application to be identified.The trustship statistical information and application Recognition strategy match specifically matching embodiment and can be designed by operating personnel, can be according to practical solution implement scene Design different matching ways.For example, in the present embodiment implement scene, described using recognition strategy may include a plurality of sentencing Disconnected application is the identification condition of corpse application, such as using the amount of access applied in one month (the non-natural moon) is 0, or can be with The application normally accessed does not have application deployment code, or applies in predetermined period (7 days) cannot be by normally access etc..? When the trustship statistical information of the application to be identified obtained according to acquisition is matched with the application recognition strategy, if the trustship Statistical information meets using any one in recognition strategy, then may determine that application to be identified is corpse application.
Certainly, in the application others embodiment, also can be set at least N met described using in recognition strategy or Person meets wherein specified some conditional plans, or even when meeting the full terms rule for applying recognition strategy, just can be confirmed Application to be identified is abnormal hosts applications.The application is not excluded in further embodiments, also can be set when the trustship is united Meter information be unsatisfactory for it is described using a certain item of recognition strategy or several when confirm that the application to be identified is not answered for abnormal trustship With as long as determining that application to be identified is not abnormal hosts applications for example, to be identified apply has amount of access in one month.
In the present embodiment, the trustship statistical information can be matched with what is configured using recognition strategy, is confirmed Whether the application to be identified is abnormal hosts applications.Described can be previously according to different implement scenes using recognition strategy Or identification demand configures different conditional plans, the matching way of trustship statistical information and application recognition strategy can also be according to reality Apply scene or identifying processing demand setting matching treatment mode.
S3: stop the operation of the abnormal hosts applications, and discharge the occupied system resource of the abnormal hosts applications.
It is described after the matching of application recognition strategy, determine that the application to be identified, then can be with for abnormal hosts applications For it is described it is to be identified apply mark, specifically can be set a marker character (or label), it is different for marking the application to be identified Normal hosts applications are such as labeled as " corpse application ".In this way, the application recognition strategy provided using the application embodiment is to application Some trustship statistical informations identified, determine which is answered for corpse in the application of processing trustship storage by match decision With.Then corpse application is stopped by application schedules center, corpse application is set to non-operating state, then corpse application no longer accounts for With system resources such as memory, port, CPU, so that single machine can dispose corpse application as much as possible.
In the further processing mode of the application, when identifying that abnormal hosts applications are parked in the operation of abnormal hosts applications Afterwards, isolation deployment can be carried out for abnormal hosts applications.In the present embodiment implement scene, it can identify each in resource pool The application stored on machine confirms whether the application is abnormal hosts applications, if abnormal hosts applications, then stops the application Operation after, carried out isolation deployment.One for specifically can and being individually stored in resource pool is specifically used to store exception In the machine of hosts applications.
The deployment of isolation described in the present embodiment may include by abnormal hosts applications and normal use in logic and/or object Different storage regions is divided into reason.Concrete implementation mode may include applying corpse on one storage machine M1 to migrate Onto another storage machine M2, M2 can be the storage unit of setting mainly or exclusively applied for storing corpse.Its In his implementation, the described isolation deployment also may include in the same physical memory cell, it is same in example resource pool One machine marks off the memory space for being individually used for storage corpse application, can be centrally placed and be known by application recognition strategy Not Chu corpse application.The schematic diagram of a scenario that corpse application isolation is disposed in a kind of application scenarios of embodiment of Fig. 4 the application, Fig. 5 is in the application scenarios of the application another kind embodiment to the schematic diagram of a scenario of corpse application isolation deployment.Specific example In, the region that individually storage corpse is applied can be marked off on same machine as shown in Figure 4, it can also be such as Fig. 5 It is shown, an application schedules center can be disposed, isolation deployment corpse application is realized by scheduling according to the label of application, it can be with Corpse application is moved on the machine specified in resource pool, the independent centrally stored corpse application identified.Fig. 6 is the application The method flow schematic diagram of another embodiment of the method.
Using the application embodiment, realizes and deployment is isolated with corpse application in the normal use in of trustship, for Individually for the machine (can be server) of storage normal use, since normal use tool bears obvious signs, answered with corpse Come with being easily discriminated, and normal use it is centrally stored in the machine (machine can be set and only store normal use, or It can store a small amount of corpse application).The centrally stored mode of such corpse application isolation deployment, normal use can be significantly simple Change the scheduling strategy and deployment strategy of normal use.Storage is mixed with corpse application compared to existing conventional normal use Trustship mode can be improved the efficiency of management of hosts applications, simplify the scheduling strategy of normal use and then improve at application schedules Manage efficiency.
In one embodiment of the application, non-operating state can be set by the abnormal hosts applications of isolation deployment, stopped The only operation of abnormal hosts applications reduces machine resources consumption.Such as corpse application can be stopped by application schedules center, it will Application labeled as corpse application is set as non-operating state.The corpse application in non-operating state can be occupied no longer in this way The system resources such as memory, port, CPU, corpse, which is applied, itself reduces resource consumption.In addition it can make isolation part The single machine of administration's corpse application can dispose corpse application as much as possible, and corpse is applied separately to concentrate with normal use and is deposited Storage, from the scheduling resource consumption that will further be effectively reduced machine on the other hand.It should be noted that in non- Which resource the corpse application of operating status, which specifically occupies and still maintain, occupies resource or newly occupies other resources etc., tool Body can need to be configured with business processing demand in server or system or different network layers further according to scene.This reality Applying example includes based on other realities for implementing that application is labeled as after non-operating state to reducing accordingly some resource consumption modes Apply scheme.
Although identifying corpse application it should be noted that describing in one embodiment scene of the application, and by corpse Using independent storage, the embodiment of deployment is isolated with normal use, such embodiment can be adapted for most trustships and answer With quantity is more, corpse is applied in the implement scene less compared to normal use.Above-described embodiment is only exemplary, but this Application is not excluded in other implement scenes, identifies normal use according to using recognition strategy, then that normal use is independent The embodiment of storage.It should be understood that identifying normal use and normal use isolation deployment being identified deadlock with above-mentioned Corpse application and by the essence of corpse application isolation deployment be it is the same or similar, for without creative the application embodiment The alternative way of expected deformation, transformation etc., belongs within the protection scope of the application.
In another embodiment of herein described method, the abnormal hosts applications that deployment is isolated still can receive visiting It asks request, ensures that exception hosts applications still are able to normally handle when access request arrives.Therefore, implementation provided in this embodiment Scheme can enable to start automatically when the abnormal hosts applications of non-operating state are requested, and normally handle request message.Fig. 7 It is the method flow schematic diagram of herein described another embodiment of method, as shown in fig. 7, the method can also include:
S501: receiving the access request of application, when determining that accessed application is out of service, starts described interviewed Ask the operation of application;
S502: after the accessed application start completion, the access request is sent to described accessed answer With being handled.
Fig. 8 is the treatment process schematic diagram of the request of processing access corpse application in one exemplary scene of the application.Such as Fig. 8 Shown, when corpse application request reaches, intelligent starting enhances whether module can (be corpse according to the application state information of caching Using and whether in operate normally in) perception corpse application starting state.If corpse application is not in operating status, intelligence Starting enhancing module can keep in access request and application schedules center is notified to start corpse application.When corpse application start completion Afterwards, rear end corpse can be just forwarded requests to using access layer using upper.The data of above-mentioned caching may include using domain name, answer With whether being whether corpse application and current application are in the data information of operation, can be looked for by the domain-name information in request It whether is corpse application judgement afterwards using operating status to corresponding application.It can be by processing it can be seen from this example The access layer of application request is enhanced, and fit applications control centre realizes that corpse is applied in no access request in inoperative State (release busy resource) is in normal operating condition when there is access request.The enhancing module makes non-operating state Corpse application can start automatically when requested, and normally processing request, ensure that the application in non-operating state can also be located Reason business.
In one embodiment of the method that this specification provides, the accessed application of the determination is out of service, May include:
Obtain the application state information of caching, the application state information includes the domain name of application, using whether being abnormal The mark information of hosts applications, using whether information in operating status;
According to the accessed application of the domain-name information positioning in the access request, determined according to the application state information Accessed application is out of service.
If accessed is abnormal hosts applications, accessed abnormal hosts applications are in operation shape after having handled request State, and occupy certain resource.Although abnormal hosts applications are accessed, the access state of normal use may not necessarily be reached (for instance it can be possible that access is primary once in a while, access may need the longer period next time, or only jump to abnormal trustship and answer With, and do not run an application program really).To advanced optimize the utilization of resources, the another kind of herein described method is real It applies in example, it is non-for can judging whether accessed abnormal hosts applications need to reset according to the matching strategy of normal use Operating status.Fig. 9 is the method flow schematic diagram of herein described method another kind embodiment, as shown in figure 9, described interviewed After the abnormal hosts applications asked have handled the access request, the method can also include:
S601: judge whether the accessed application meets operation holding condition;
S602: it if not satisfied, then stopping the operation of the accessed application, and discharges shared by the accessed application System resource.
In the present embodiment scene, after accessed abnormal hosts applications have handled access request, if meeting normal use Operation keep condition, then can be marked and be revised as normal use by abnormal hosts applications.It can continue to keep being somebody's turn to do at this time The normal operating condition of accessed abnormal hosts applications.If accessed abnormal hosts applications are unsatisfactory for operation holding condition, The operation of the accessed application can then be stopped, and discharged described accessed using occupied system resource.Although Be currently at starting state, in operation, but may its operating status label or before non-operating state, at this time may be used Its operating status is revised as normal operating condition accordingly.Application in normal operating condition, can be the same as hosted Other normal uses are the same, occupy the resources such as corresponding CPU, port, can be accessed request directly access or carry out other Access strategy processing etc..
In general, determining whether accessed abnormal hosts applications meet operation holding condition and determine that application to be identified is It is no tactful similar opposite or corresponding for what is applied extremely.In some embodiments of the present application, the operation maintaining item of application Different duration classifications can be set in part, such as can be set to have amount of access in normal use 1 month, and accessed If corpse application is that can determine whether to be discontented with without amount of access in 24 hours (or other periods, such as 1 hour or 72 hours) The matching strategy of sufficient normal use.The advantage that one of be it is possible to prevente effectively from activating trustship because of interim burst access Apply problem of resource waste be no longer accessed within subsequent very long activation cycle again caused by.
In another embodiment, if accessed abnormal hosts applications meet normal use after restarting Holding condition is run, then the accessed abnormal hosts applications can be migrated out to the storage region of the isolation deployment at this time. In the storage region for such as moving to normal use, the normal use for accessing it with normal trustship, normally concentrates deployment together, Rationalization partition, optimization storage location provide convenience to simplify and optimizing application schedules strategy.Therefore, the method is another In kind embodiment, can also include:
S7: if the accessed application meets operation holding condition, the accessed application is migrated out described The storage region of deployment is isolated.
In this way, scheme will can further be determined as corpse application but subsequent and meet normal use through this embodiment Application be stored in the storage region of normal use again, apply normal use and corpse and more clear, reasonable deployment be isolated. The described application of the present embodiment migrates specific implementation can be as aforementioned described, can be by the application schedules of setting The heart is handled, and will be applied according to the marker character of application or label and is assigned to corresponding storage region.
Certainly, in another embodiment, if accessed abnormal hosts applications are unsatisfactory for the matching plan of the normal use Slightly, then it can continue to keep its abnormal hosts applications state, and managed after access request at which from the operating status after starting It is set as non-operating state, to discharge the resource occupied when restarting.Therefore, another embodiment of herein described method In, it, will be described accessed different if the accessed abnormal hosts applications are unsatisfactory for the matching strategy of the normal use Normal hosts applications are set as non-operating state.
If the accessed abnormal hosts applications are unsatisfactory for normal use matching strategy, the application to be identified is kept For the label of abnormal hosts applications;It, will and after the accessed abnormal hosts applications have handled corresponding access request The operating status for the abnormal hosts applications being accessed is set as non-operating state.The present embodiment can further decrease trustship The resource consumption of abnormal hosts applications, reduces the cost of trustship product in.
Application hosting method provided by the above embodiment, by the application identification plan for judging whether it is abnormal hosts applications Slightly, whether the application that can automatically identify trustship is corpse application, and is its mark.By applying recognition strategy matching treatment Afterwards, if corpse application, then corpse application isolation deployment can be individually stored in the region of individually (or special), and it is normal Using being isolated.By corpse application isolation deployment, normal use concentration can be made to be deployed on single server, while allowing list The corpse application of a large amount of non-operating states of platform server disposition can simplify the scheduling strategy of normal use trustship in this way, reduce The dispatch deal in-fighting of normal use improves the management effect of application schedules treatment effeciency and application hosting and reduces product Cost.And it is possible to by isolation deployment corpse application be set as non-operating state, discharge its occupancy CPU, port, The resources such as memory substantially reduce corpse and apply resource impact in application hosting, reduce the cost of application hosting product.
Based on application hosting method described above, the application also provides a kind of using processing unit.The device can With include the use of the system (including distributed system) of herein described method, software (application), module, component, server, Client etc. simultaneously combines the necessary device for implementing hardware.Such as can for setting application decision center, application schedules center, The application device is realized using the one therein or several combination such as access layer (intelligent starting enhancing module).Based on same wound New design, the device in a kind of embodiment provided by the present application is as described in the following examples.The reality solved the problems, such as due to device Existing scheme is similar to method, therefore the implementation of the specific device of the application may refer to the implementation of preceding method, repeats place not It repeats again.Although device described in following embodiment is preferably realized with software, hardware or software and hardware Combination being realized and may and being contemplated specific.A kind of a kind of embodiment of application processing unit provided by the present application, institute Stating device may include at least one processor and the memory for storage processor executable instruction, and the processor executes It is realized when described instruction:
Obtain the trustship statistical information of application;
The trustship statistical information is matched with using recognition strategy, determines exception hosts applications, the abnormal support Pipe application includes application of the amount of access in fixed time limit lower than threshold value;
Stop the operation of the abnormal hosts applications, and discharges the occupied system resource of the abnormal hosts applications.
The abnormal application that will identify that stops application, and is set as non-operating state, then abnormal hosts applications no longer occupy The system resources such as memory, port, CPU effectively reduce machine resources consumption, and it is as much as possible that single machine is disposed Abnormal hosts applications.
In another embodiment of the application hosting device provided by the present application, when the processor executes described instruction Also realize:
The abnormal hosts applications are subjected to isolation deployment.
In a kind of herein described application processing unit another kind embodiment, the processing goes back reality when executing described instruction It is existing:
The access request for receiving application starts the accessed application when determining that accessed application is out of service Operation;
After the accessed application start completion, the access request is sent to the accessed application and is carried out Processing.
In the present embodiment, the abnormal hosts applications that deployment is isolated still can receive access request, ensure that access is asked Exception hosts applications still are able to normally handle when asking arrival.Therefore, embodiment provided in this embodiment can make inoperative The abnormal hosts applications of state can start automatically when requested, and normally handle request message.
In a kind of herein described application processing unit another kind embodiment, the accessed application of the determination has stopped transporting It goes, specifically may include:
Obtain the application state information of caching, the application state information includes the domain name of application, using whether being abnormal The mark information of hosts applications, using whether information in operating status;
According to the accessed application of the domain-name information positioning in the access request, determined according to the application state information Accessed application is out of service.
In a kind of herein described application processing unit another kind embodiment, handled in the accessed application described After access request, the processor is also realized:
Judge whether the accessed application meets operation holding condition;
If not satisfied, then stopping the operation of the accessed application, and discharge described accessed using occupied System resource.
It can specifically be enhanced by the access layer to processing application request, fit applications control centre realizes corpse It applies in no access request in non-operating state (release busy resource), when there is access request in normal operation shape State.Start automatically when can enable the corpse application of non-operating state requested in this way, and normally processing request, at guarantee It also can handle business in the application of non-operating state.
In a kind of herein described application processing unit another kind embodiment, in the accessed abnormal hosts applications mark It is denoted as after normal use, the processor is also realized:
If the accessed application meets operation holding condition, the accessed application is migrated out into the isolation The storage region of deployment.
In a kind of a kind of herein described embodiment using processing unit, the application recognition strategy be configured to include It is at least one of following:
It applies within the specified period without amount of access;
It applies in specified period hiccup amount of access lower than threshold value;
Using without corresponding operation code;
Using cannot normally be accessed.
Device provided by the present application can allow single machine deployment big in the practical application of application hosting device and product The corpse application of amount non-operating state or the corpse application that may include a small amount of operating status, can effectively solve corpse application Problem of resource waste during trustship, effective reduction resource consumption reduce product cost.
Embodiment of the method provided by the embodiment of the present application can be in mobile terminal, server cluster, distributed system Server or similar arithmetic unit in execute.For on the background server for operating in application hosting product, Figure 10 It is the hardware block diagram for implementing a kind of server of application processing method of the embodiment of the present invention.As shown in Figure 10, server 10 may include that (processor 102 can include but is not limited to micro process to one or more (one is only shown in figure) processors 102 The processing unit of device MCU or programmable logic device FPGA etc.), memory 104 for storing data and for communicating function The transmission module 106 of energy.It will appreciated by the skilled person that structure shown in Fig. 10 is only to illustrate, not to upper The structure for stating electronic device causes to limit.For example, server 10 may also include the more or less component than shown in Figure 10, It such as can also include other processing hardware.Or with the configuration different from shown in Figure 10.
Memory 104 can be used for storing the software program and module of application software, such as the search in the embodiment of the present invention Corresponding program instruction/the module of method, the software program and module that processor 102 is stored in memory 104 by operation, Thereby executing various function application and data processing, that is, realize above-mentioned searching method.Memory 104 may include that high speed is deposited at random Reservoir may also include nonvolatile memory, such as one or more magnetic storage device, flash memory or other are non-volatile Solid-state memory.In some instances, memory 104 can further comprise the memory remotely located relative to processor 102, These remote memories can pass through network connection to terminal 10.The example of above-mentioned network includes but is not limited to interconnect Net, intranet, local area network, mobile radio communication and combinations thereof.
Transmission module 106 is used to that data to be received or sent via a network.Above-mentioned network specific example may include The wireless network that the communication providers of terminal 10 provide.In an example, transmission module 106 includes that a network is suitable Orchestration (Network Interface Controller, NIC), can be connected by base station with other network equipments so as to Internet is communicated.In an example, transmission module 106 can be radio frequency (Radio Frequency, RF) module, For wirelessly being communicated with internet.
Device or method described above can be used in the server of trustship product such as fictitious host computer, trustship products application Deng, for user provide application trustship processing.The server can be individual server, be also possible to more application clothes The system cluster of business device composition, the service being also possible in distributed system.
Server provided by the present application, can solve machine resources consumption problem during abnormal hosts applications trustship and Optimization should dispatch, and the resource consumption of abnormal hosts applications is reduced by reasonable effective means, improve server process efficiency with Performance.
The application method described above or device can be stored in readable storage medium storing program for executing by computer program code On, it is realized by the program instruction on processor load and execution readable storage medium storing program for executing.Therefore, the application also provides a kind of computer Readable storage medium storing program for executing is stored thereon with computer instruction, and described instruction, which is performed, to be performed the steps of
Obtain the trustship statistical information of application;
The trustship statistical information is matched with using recognition strategy, determines exception hosts applications, the abnormal support Pipe application includes application of the amount of access in fixed time limit lower than threshold value;
Stop the operation of the abnormal hosts applications, and discharges the occupied system resource of the abnormal hosts applications.
The computer readable storage medium may include the physical unit for storing information, usually by message digit It is stored again by the media in the way of electricity, magnetic or optics etc. after change.Computer-readable storage medium described in the present embodiment It may include: that the device of information is stored in the way of electric energy such as that matter, which has, various memory, such as RAM, ROM;In the way of magnetic energy Store information device such as, hard disk, floppy disk, tape, core memory, magnetic bubble memory, USB flash disk;It is stored and is believed using optical mode The device of breath such as, CD or DVD.Certainly, there are also the readable storage medium storing program for executing of other modes, such as quantum memory, graphene to store Device etc..
The application also provides a kind of application hosting system, and the application hosting system may include processor, for storing The memory of processor-executable instruction, the first storage unit, the second storage unit, the first storage unit storage operation Using second storage unit stores application out of service, and the processing is realized when executing described instruction:
Obtain the trustship statistical information applied in the first storage unit;
The trustship statistical information is matched with using recognition strategy, determines exception hosts applications, the abnormal support Pipe application includes application of the amount of access in fixed time limit lower than threshold value;
Stop the operation of the abnormal hosts applications, and discharges the occupied system resource of the abnormal hosts applications;
The abnormal hosts applications are migrated to second storage unit.
The application hosting system specifically can include but is not limited to such as fictitious host computer, trustship products application (platform) Deng.
In addition, it is necessary to explanation, although some systems, server, computer-readable storage is described above in the application Some embodiments of medium, but with reference to the description of preceding method or device, system described herein, server, computer can Reading storage medium can also include other embodiments, such as judges whether the accessed corpse application meets and normally answer Matching strategy migrates the accessed corpse application for the matching strategy for meeting the normal use to normal use storage Region is unsatisfactory for the matching strategy of the normal use for the accessed corpse application in the accessed corpse application It is set as system, the server, computer readable storage medium of the embodiments such as non-operating state.It does not do and repeats one by one herein.
A kind of application processing method, device and mandatory system provided by the embodiments of the present application, setting judge whether it is abnormal Whether hosts applications apply recognition strategy, can be abnormal hosts applications with the application of Auto-matching trustship, and be its mark.Through It crosses after applying recognition strategy matching treatment, if abnormal hosts applications, then can stop the operation of abnormal hosts applications and release The occupied system resource of the exception hosts applications, then the systems such as abnormal hosts applications no longer committed memory, port, CPU provide Source, so as to allow single machine to dispose the corpse application of a large amount of non-operating states, effectively during solution corpse application hosting Problem of resource waste, effective reduction resource consumption, reduce product at.Further can by abnormal hosts applications every From deployment, it is individually stored in the region of individually (or special), is isolated with normal use.Pass through abnormal hosts applications isolation part Administration can be such that normal use concentration is deployed on single server, while single server being allowed to dispose a large amount of non-operating states Corpse application can simplify the scheduling strategy of normal use trustship in this way, reduce the dispatch deal in-fighting of normal use, and raising is answered With the management effect of dispatch deal efficiency and application hosting and reduce product cost.
Although mentioning the type of trustship statistical information in teachings herein, being asked using different configurations, the access of recognition strategy The processing mode asked is described using the data definition of Data Migration or the like, acquisition, interaction, calculating, judgement etc., still, this Shen It please be not limited to meet industry communication standard, standard data structure, computer disposal and storage rule or the application Situation described in embodiment.In certain professional standards or the practice processes for using customized mode or embodiment to describe slightly Modified embodiment also may be implemented above-described embodiment it is identical, it is equivalent or it is close or deformation after it is anticipated that implementation result. Using the embodiment of the acquisitions such as these modifications or deformed data acquisition, storage, judgement, processing mode, still may belong to Within the scope of the optional embodiment of the application.
In the 1990s, the improvement of a technology can be distinguished clearly be on hardware improvement (for example, Improvement to circuit structures such as diode, transistor, switches) or software on improvement (improvement for method flow).So And with the development of technology, the improvement of current many method flows can be considered as directly improving for hardware circuit. Designer nearly all obtains corresponding hardware circuit by the way that improved method flow to be programmed into hardware circuit.Cause This, it cannot be said that the improvement of a method flow cannot be realized with hardware entities module.For example, programmable logic device (Programmable Logic Device, PLD) (such as field programmable gate array (Field Programmable Gate Array, FPGA)) it is exactly such a integrated circuit, logic function determines device programming by user.By designer Voluntarily programming comes a digital display circuit " integrated " on a piece of PLD, designs and makes without asking chip maker Dedicated IC chip.Moreover, nowadays, substitution manually makes IC chip, this programming is also used instead mostly " is patrolled Volume compiler (logic compiler) " software realizes that software compiler used is similar when it writes with program development, And the source code before compiling also write by handy specific programming language, this is referred to as hardware description language (Hardware Description Language, HDL), and HDL is also not only a kind of, but there are many kind, such as ABEL (Advanced Boolean Expression Language)、AHDL(Altera Hardware Description Language)、Confluence、CUPL(Cornell University Programming Language)、HDCal、JHDL (Java Hardware Description Language)、Lava、Lola、MyHDL、PALASM、RHDL(Ruby Hardware Description Language) etc., VHDL (Very-High-Speed is most generally used at present Integrated Circuit Hardware Description Language) and Verilog.Those skilled in the art also answer This understands, it is only necessary to method flow slightly programming in logic and is programmed into integrated circuit with above-mentioned several hardware description languages, The hardware circuit for realizing the logical method process can be readily available.
Controller can be implemented in any suitable manner, for example, controller can take such as microprocessor or processing The computer for the computer readable program code (such as software or firmware) that device and storage can be executed by (micro-) processor can Read medium, logic gate, switch, specific integrated circuit (Application Specific Integrated Circuit, ASIC), the form of programmable logic controller (PLC) and insertion microcontroller, the example of controller includes but is not limited to following microcontroller Device: ARC 625D, Atmel AT91SAM, Microchip PIC18F26K20 and Silicone Labs C8051F320 are deposited Memory controller is also implemented as a part of the control logic of memory.It is also known in the art that in addition to Pure computer readable program code mode is realized other than controller, can be made completely by the way that method and step is carried out programming in logic Controller is obtained to come in fact in the form of logic gate, switch, specific integrated circuit, programmable logic controller (PLC) and insertion microcontroller etc. Existing identical function.Therefore this controller is considered a kind of hardware component, and to including for realizing various in it The device of function can also be considered as the structure in hardware component.Or even, it can will be regarded for realizing the device of various functions For either the software module of implementation method can be the structure in hardware component again.
System, server, device, module or the unit that above-described embodiment illustrates, specifically can be by computer chip or reality Body is realized, or is realized by the product with certain function.It is a kind of typically to realize that equipment is computer.Specifically, calculating Machine can be for example personal computer, laptop computer, vehicle-mounted human-computer interaction device, cellular phone, camera phone, intelligence electricity It is words, personal digital assistant, media player, navigation equipment, electronic mail equipment, game console, tablet computer, wearable The combination of any equipment in equipment or these equipment.
Although this application provides the method operating procedure as described in embodiment or flow chart, based on conventional or noninvasive The means for the property made may include more or less operating procedure.The step of enumerating in embodiment sequence is only numerous steps One of execution sequence mode, does not represent and unique executes sequence.It, can be with when device in practice or end product execute It is executed according to embodiment or method shown in the drawings sequence or parallel executes (such as parallel processor or multiple threads Environment, even distributed data processing environment).The terms "include", "comprise" or its any other variant are intended to Non-exclusive inclusion, so that process, method, product or equipment including a series of elements are not only wanted including those Element, but also including other elements that are not explicitly listed, or further include for this process, method, product or equipment Intrinsic element.In the absence of more restrictions, be not precluded include the process, method of the element, product or There is also other identical or equivalent elements in person's equipment.
For convenience of description, it is divided into various modules when description apparatus above with function to describe respectively.Certainly, implementing this The function of each module can be realized when application in the same or multiple software and or hardware, can also will realize same function Can module by multiple submodule or subelement combination realize etc..Installation practice described above is only schematic , for example, the division of the unit, only a kind of logical function partition, there may be another division manner in actual implementation, Such as multiple units or components can be combined or can be integrated into another system, or some features can be ignored, or not hold Row.Another point, shown or discussed mutual coupling, direct-coupling or communication connection can be through some interfaces, The indirect coupling or communication connection of device or unit can be electrical property, mechanical or other forms.
It is also known in the art that other than realizing controller in a manner of pure computer readable program code, it is complete Entirely can by by method and step carry out programming in logic come so that controller with logic gate, switch, specific integrated circuit, programmable Logic controller realizes identical function with the form for being embedded in microcontroller etc..Therefore this controller is considered one kind Hardware component, and the structure that the device for realizing various functions that its inside includes can also be considered as in hardware component.Or Person even, can will be considered as realizing the device of various functions either the software module of implementation method can be hardware again Structure in component.
The present invention be referring to according to the method for the embodiment of the present invention, the process of equipment (system) and computer program product Figure and/or block diagram describe.It should be understood that every one stream in flowchart and/or the block diagram can be realized by computer program instructions The combination of process and/or box in journey and/or box and flowchart and/or the block diagram.It can provide these computer programs Instruct the processor of general purpose computer, special purpose computer, Embedded Processor or other programmable data processing devices to produce A raw machine, so that being generated by the instruction that computer or the processor of other programmable data processing devices execute for real The device for the function of being specified in present one or more flows of the flowchart and/or one or more blocks of the block diagram.
These computer program instructions, which may also be stored in, is able to guide computer or other programmable data processing devices with spy Determine in the computer-readable memory that mode works, so that it includes referring to that instruction stored in the computer readable memory, which generates, Enable the manufacture of device, the command device realize in one box of one or more flows of the flowchart and/or block diagram or The function of being specified in multiple boxes.
These computer program instructions also can be loaded onto a computer or other programmable data processing device, so that counting Series of operation steps are executed on calculation machine or other programmable devices to generate computer implemented processing, thus in computer or The instruction executed on other programmable devices is provided for realizing in one or more flows of the flowchart and/or block diagram one The step of function of being specified in a box or multiple boxes.
In a typical configuration, calculating equipment includes one or more processors (CPU), input/output interface, net Network interface and memory.
Memory may include the non-volatile memory in computer-readable medium, random access memory (RAM) and/or The forms such as Nonvolatile memory, such as read-only memory (ROM) or flash memory (flash RAM).Memory is computer-readable medium Example.
Computer-readable medium includes permanent and non-permanent, removable and non-removable media can be by any method Or technology come realize information store.Information can be computer readable instructions, data structure, the module of program or other data. The example of the storage medium of computer includes, but are not limited to phase change memory (PRAM), static random access memory (SRAM), moves State random access memory (DRAM), other kinds of random access memory (RAM), read-only memory (ROM), electric erasable Programmable read only memory (EEPROM), flash memory or other memory techniques, read-only disc read only memory (CD-ROM) (CD-ROM), Digital versatile disc (DVD) or other optical storage, magnetic cassettes, tape magnetic disk storage or other magnetic storage devices Or any other non-transmission medium, can be used for storage can be accessed by a computing device information.As defined in this article, it calculates Machine readable medium does not include temporary computer readable media (transitory media), such as the data-signal and carrier wave of modulation.
It will be understood by those skilled in the art that embodiments herein can provide as method, system or computer program product. Therefore, complete hardware embodiment, complete software embodiment or embodiment combining software and hardware aspects can be used in the application Form.It is deposited moreover, the application can be used to can be used in the computer that one or more wherein includes computer usable program code The shape for the computer program product implemented on storage media (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.) Formula.
The application can describe in the general context of computer-executable instructions executed by a computer, such as program Module.Generally, program module includes routines performing specific tasks or implementing specific abstract data types, programs, objects, group Part, data structure etc..The application can also be practiced in a distributed computing environment, in these distributed computing environments, by Task is executed by the connected remote processing devices of communication network.In a distributed computing environment, program module can be with In the local and remote computer storage media including storage equipment.
All the embodiments in this specification are described in a progressive manner, same and similar portion between each embodiment Dividing may refer to each other, and each embodiment focuses on the differences from other embodiments.Especially for system reality For applying example, since it is substantially similar to the method embodiment, so being described relatively simple, related place is referring to embodiment of the method Part explanation.
The above description is only an example of the present application, is not intended to limit this application.For those skilled in the art For, various changes and changes are possible in this application.All any modifications made within the spirit and principles of the present application are equal Replacement, improvement etc., should be included within the scope of the claims of this application.

Claims (16)

1. a kind of application processing method, which is characterized in that the described method includes:
Obtain the trustship statistical information of application;
The trustship statistical information is matched with using recognition strategy, determines exception hosts applications, the exception trustship is answered With including application that amount of access in fixed time limit is lower than threshold value;
Stop the operation of the abnormal hosts applications, and discharges the occupied system resource of the abnormal hosts applications.
2. a kind of application processing method as described in claim 1, which is characterized in that after the operation for stopping the application, institute State method further include:
The abnormal hosts applications are subjected to isolation deployment.
3. a kind of application processing method as claimed in claim 1 or 2, which is characterized in that the method also includes:
The access request for receiving application starts the fortune of the accessed application when determining that accessed application is out of service Row;
After the accessed application start completion, the access request is sent at the accessed application Reason.
4. a kind of application processing method as claimed in claim 3, which is characterized in that the accessed application of the determination has stopped Operation, comprising:
The application state information of caching is obtained, the application state information includes the domain name of application, using whether being abnormal trustship The mark information of application, using whether information in operating status;
According to the accessed application of the domain-name information positioning in the access request, determined according to the application state information interviewed The application asked is out of service.
5. a kind of application processing method as claimed in claim 3, which is characterized in that handled institute in the accessed application After stating access request, the method also includes:
Judge whether the accessed application meets operation holding condition;
If not satisfied, then stopping the operation of the accessed application, and discharge described accessed using occupied system Resource.
6. a kind of application processing method as described in claim 5, which is characterized in that the method also includes:
If the accessed application meets operation holding condition, the accessed application is migrated out into the isolation and is disposed Storage region.
7. a kind of application processing method as described in claim 1, which is characterized in that the application recognition strategy is configured to wrap It includes at least one of following:
It applies within the specified period without amount of access;
It applies in specified period hiccup amount of access lower than threshold value;
Using without corresponding operation code;
Using cannot normally be accessed.
8. a kind of apply processing unit, which is characterized in that including at least one processor and for the executable finger of storage processor The memory of order, the processor are realized when executing described instruction:
Obtain the trustship statistical information of application;
The trustship statistical information is matched with using recognition strategy, determines exception hosts applications, the exception trustship is answered With including application that amount of access in fixed time limit is lower than threshold value;
Stop the operation of the abnormal hosts applications, and discharges the occupied system resource of the abnormal hosts applications.
9. as claimed in claim 8 a kind of using processing unit, which is characterized in that the processor is gone back when executing described instruction It realizes:
The abnormal hosts applications are subjected to isolation deployment.
10. a kind of as claimed in claim 8 or 9 apply processing unit, which is characterized in that when the processing executes described instruction Also realize:
The access request for receiving application starts the accessed application when determining that accessed application is out of service Operation;
After the accessed application start completion, the access request is sent at the accessed application Reason.
11. as claimed in claim 10 a kind of using processing unit, which is characterized in that the processor determines accessed answers With out of service, comprising:
The application state information of caching is obtained, the application state information includes the domain name of application, using whether being abnormal trustship The mark information of application, using whether information in operating status;
According to the accessed application of the domain-name information positioning in the access request, determined according to the application state information interviewed The application asked is out of service.
12. as claimed in claim 10 a kind of using processing unit, which is characterized in that handled in the accessed application After the access request, the processor is also realized:
Judge whether the accessed application runs holding condition,;
If not satisfied, then stopping the operation of the accessed application, and discharge described accessed using occupied system Resource.
13. as claimed in claim 12 a kind of using processing unit, which is characterized in that when the processor executes described instruction Also realize:
If the accessed application meets operation holding condition, the accessed application is migrated out into the isolation and is disposed Storage region.
14. as claimed in claim 8 a kind of using processing unit, which is characterized in that the application recognition strategy is configured to Including at least one of following:
It applies within the specified period without amount of access;
It applies in specified period hiccup amount of access lower than threshold value;
Using without corresponding operation code;
Using cannot normally be accessed.
15. a kind of computer readable storage medium, is stored thereon with computer instruction, which is characterized in that described instruction is performed When perform the steps of
Obtain the trustship statistical information of application;
The trustship statistical information is matched with using recognition strategy, determines exception hosts applications, the exception trustship is answered With including application that amount of access in fixed time limit is lower than threshold value;
Stop the operation of the abnormal hosts applications, and discharges the occupied system resource of the abnormal hosts applications.
16. a kind of application hosting system, which is characterized in that including processor, for the storage of storage processor executable instruction Device, the first storage unit, the second storage unit, the application of the first storage unit storage operation, second storage unit Application out of service is stored, the processing is realized when executing described instruction:
Obtain the trustship statistical information applied in the first storage unit;
The trustship statistical information is matched with using recognition strategy, determines exception hosts applications, the exception trustship is answered With including application that amount of access in fixed time limit is lower than threshold value;
Stop the operation of the abnormal hosts applications, and discharges the occupied system resource of the abnormal hosts applications;
The abnormal hosts applications are migrated to second storage unit.
CN201711154162.0A 2017-11-20 2017-11-20 Application processing method, device and mandatory system Pending CN109815001A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711154162.0A CN109815001A (en) 2017-11-20 2017-11-20 Application processing method, device and mandatory system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711154162.0A CN109815001A (en) 2017-11-20 2017-11-20 Application processing method, device and mandatory system

Publications (1)

Publication Number Publication Date
CN109815001A true CN109815001A (en) 2019-05-28

Family

ID=66598432

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711154162.0A Pending CN109815001A (en) 2017-11-20 2017-11-20 Application processing method, device and mandatory system

Country Status (1)

Country Link
CN (1) CN109815001A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110933226A (en) * 2019-11-11 2020-03-27 深圳前海氢氧科技有限公司 Application program remote hosting method and device

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050188345A1 (en) * 2004-02-19 2005-08-25 International Business Machines Corporation Method and system of transforming an application into an on-demand service
CN102377598A (en) * 2010-08-26 2012-03-14 中国移动通信集团公司 Internet application custody system, equipment and method
CN103858113A (en) * 2011-10-13 2014-06-11 国际商业机器公司 Protecting memory of a virtual guest
WO2014169496A1 (en) * 2013-04-16 2014-10-23 Tencent Technology (Shenzhen) Company Limited Method and system for handling message on instant messaging open platform
CN104410712A (en) * 2014-12-16 2015-03-11 国家电网公司 Application example management method, as well as user access request processing method and system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050188345A1 (en) * 2004-02-19 2005-08-25 International Business Machines Corporation Method and system of transforming an application into an on-demand service
CN102377598A (en) * 2010-08-26 2012-03-14 中国移动通信集团公司 Internet application custody system, equipment and method
CN103858113A (en) * 2011-10-13 2014-06-11 国际商业机器公司 Protecting memory of a virtual guest
WO2014169496A1 (en) * 2013-04-16 2014-10-23 Tencent Technology (Shenzhen) Company Limited Method and system for handling message on instant messaging open platform
CN104410712A (en) * 2014-12-16 2015-03-11 国家电网公司 Application example management method, as well as user access request processing method and system

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110933226A (en) * 2019-11-11 2020-03-27 深圳前海氢氧科技有限公司 Application program remote hosting method and device

Similar Documents

Publication Publication Date Title
US9686141B2 (en) Systems and methods for resource sharing between two resource allocation systems
JP6716149B2 (en) Blockchain-based data processing method and apparatus
CN109117260A (en) A kind of method for scheduling task, device, equipment and medium
CN108009006A (en) The dispatching method and device of I/O requests
CN110096528A (en) The method, apparatus and system of formation sequence in a kind of distributed system
CN109615081A (en) A kind of Model forecast system and method
CN104838360A (en) Quota-based resource management
CN107577523B (en) Task execution method and device
CN103443770A (en) Terminal device, process management method and process management program
CN106776395B (en) A kind of method for scheduling task and device of shared cluster
CN104636202A (en) Computer system and scheduling method thereof
CN107800546A (en) The management method and device of a kind of broadcast message
CN106484882A (en) A kind of management method of database connection pool and device
CN107807847A (en) The management method and terminal device of application process
CN106886450A (en) Method for scheduling task and system
CN107368367A (en) Processing method, device and the electronic equipment of resource allocation
CN110008027A (en) Operation method, device, terminal and the storage medium of process
CN116185629A (en) Task execution method and device, storage medium and electronic equipment
CN105308566B (en) The expansible timing device wheel of on-demand
US10042659B1 (en) Caching virtual contexts for sharing of physical instances of a hardware resource
CN108449378A (en) A kind of information-pushing method, device and equipment
CN107615711A (en) System for event propagation
CN108390914A (en) A kind of service update method and device, system
CN116932175B (en) Heterogeneous chip task scheduling method and device based on sequence generation
CN109815001A (en) Application processing method, device and mandatory system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20190528

RJ01 Rejection of invention patent application after publication