CN110177144A - A method of based on private clound one-key duplication application environment - Google Patents

A method of based on private clound one-key duplication application environment Download PDF

Info

Publication number
CN110177144A
CN110177144A CN201910447981.7A CN201910447981A CN110177144A CN 110177144 A CN110177144 A CN 110177144A CN 201910447981 A CN201910447981 A CN 201910447981A CN 110177144 A CN110177144 A CN 110177144A
Authority
CN
China
Prior art keywords
environment
application
duplication
configuration
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910447981.7A
Other languages
Chinese (zh)
Other versions
CN110177144B (en
Inventor
杨利平
尹芳
连先崇
冯译
冯旭松
丘慧彬
高志强
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wan Hui Cci Capital Ltd
Original Assignee
Wan Hui Cci Capital Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wan Hui Cci Capital Ltd filed Critical Wan Hui Cci Capital Ltd
Priority to CN201910447981.7A priority Critical patent/CN110177144B/en
Publication of CN110177144A publication Critical patent/CN110177144A/en
Application granted granted Critical
Publication of CN110177144B publication Critical patent/CN110177144B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/70Software maintenance or management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1095Replication or mirroring of data, e.g. scheduling or transport for data synchronisation between network nodes

Abstract

The invention discloses a kind of methods based on private clound one-key duplication application environment, include the following steps: user's sign-on access cloud platform, and in cloud front end environment management page, inquiry filters out the application environment for needing to replicate, clicks the reproduction button in its card label;Target environment information is configured, target environment coding waits environment duplication to execute completion automatically after determining;In environment reproduction process, front and back end is communicated by websocket, and user obtains environment duplication implementing result in real time;After the completion of duplication executes, user may have access to the environment for newly copying and, wherein the application disposed and data are all consistent with source environment.The environment for only needing to safeguard complete set by the method user copies more set of environments from the complete environment of maintenance to cope with parallel exploitation and test job to environment when having business development and testing requirement.

Description

A method of based on private clound one-key duplication application environment
Technical field
The present invention relates to running environment processing technology fields, more particularly to one kind to be based on private clound one-key duplication application environment Method.
Background technique
All the time, software development debugging and test environment, which all exist, has lacked the high problem of maintenance cost not enough, more, Annoying software development and test team.Traditional solution is that Practical adjustment balances between demand and cost, builds dimension A few set software systems environment are protected, concurrent software development and testing requirement are coped with, disadvantage mainly has the following:
The resources costs for needing to occupy several set of environments for a long time, for the operation system of some complexity, such as financial debt-credit field Micro services operation system, the exploitation of complete set and test environment need to dispose dozens or even hundreds of applications, even if making With the utilization rate problem of cloud and container technique settlement server resource, but the complete environment of several sets is maintained still to need to occupy for a long time Significant component of resources costs, in the business demand not busy period, it may appear that the component environment free time occupies the case where resource.
Need to put into the manpower maintenance cost of several set of environments for a long time, each change of system requires synchronous maintenance, has several Set of environments just needs synchronous execution several times, and the more set of environments of artificial maintenance take time and effort, and are easy to appear configuration item or database foot The nonsynchronous situation of this execution.
Be difficult to cope with the concurrent environment use demand increased suddenly, when unexpected increased business demand, occur it is bigger and Hair exploitation and test environmental demand, when exceeding existing number of contexts, for the operation system of such as this kind of complexity in financial debt-credit field For, the exploitation test environment that increase deployment complete set is a fairly cumbersome thing, needs to take a substantial amount of time Carry out application deployment, modification configuration, synchrodata, adjust logical whole system link, tends not to meet business Quick thread in time Demand.
Summary of the invention
Technical problem to be solved by the invention is to provide a kind of users only to need to safeguard the environment of complete set, is there is industry When business exploitation and testing requirement, more set of environments are copied from the complete environment of maintenance to cope with parallel exploitation and test job pair The method of the demand of environment.
In order to solve the above technical problems, the technical solution used in the present invention is: a kind of answered based on private clound one-key duplication With the method for environment, it is characterised in that include the following steps:
User's sign-on access cloud platform, in cloud platform front end environment management page, inquiry filters out the application ring for needing to replicate The reproduction button in its card label is clicked in border;
Target environment information is configured, target environment coding waits environment duplication to execute completion automatically after determining;
In environment reproduction process, front and back end is communicated by websocket, and user obtains environment duplication implementing result in real time;
Duplication execute after the completion of, user may have access to newly copies come environment, wherein the application disposed and data all with source Environment is consistent.
A further technical solution lies in user's sign-on access cloud platform, in cloud platform front end environment management page, according to The coding inquiry of family input filters out the coding for needing the source environment replicated, clicks the reproduction button in its card label;
Target environment information is configured, the target environment information waits environment duplication to execute completion automatically after determining, described Target environment information may include target environment coding, title, said target environment space etc.;
In environment reproduction process, the front end and rear end of the cloud platform are communicated by websocket, and user can obtain in real time Environment replicates implementing result;
It replicates after the completion of executing, user may have access to the new environment for copying and, described to copy what the new environment come was disposed Using and data be all consistent with the application of source environment and data.
Copy the system of new environment a further technical solution lies in: the source environment the specific implementation process is as follows:
When user submit copying surroundings information request arrive cloud platform service end environment replication processes interface when, the cloud put down Platform server-side is by calling the extension API of catalog this kubernetes independently propagated through to obtain all deployment of source environment The values information of application, to the values information of source environment application deployment according to regular working process is disposed after, formed to multiple The environmental applications of system dispose values information, then call corresponding kubernetes extension API complete new environment creation and It is disposed using clone, is copying also duplication deployment and the consistent application of source environment in the new environment come coding.
A further technical solution lies in: the application for having accessed configuration center, cloud platform server-side when environment replicates The configuration information of source environmental applications is obtained according to the scheduled rule of environment configurations automatic realize, and to new environment application deployment Configuration generates and modification.
A further technical solution lies in: the application configuration for having accessed the configuration center uses configuration center Then configuration item purpose environment configuration information needed for configuration is read calls the configuration modification interface of configuration center, generation is a should The target environment configuration information of project;For the configuration information of other application, then using intact strategy duplication deployment;Benefit With the characteristic of coding internal services access name and different coding the access isolation of kubernetes, connection configuration uses inter access Mode, realizes the decoupling of configuration item and environment, and multiple environment can be used same configuration item information, not need to modify.
A further technical solution lies in: after the completion of the deployment of the database of new environment, one database number of system creation According to the background task of clone, completes source environment data base data and export and imported into the work of new environment database, realize duplication Environment out is consistent with source environmental data.
The beneficial effects of adopting the technical scheme are that the method can answer in quick copy deployment automatically With user maps out the work without what operation was applied one by one.New environment configuration information automatically generates and multi-environment adaptation, user Without reexamining and being arranged the connection applied one by one configuration.Database application and the fully synchronized duplication of data, save user Create the work synchronous with database structure, data is safeguarded of multiple environment data bases.Convenient and fast environment duplication realizes, can allow user After demand is online, the environment for deleting and copying and is trusted, discharge resource.Reach with with building, is finished the effect deleted.With Family only needs to safeguard the environment of complete set, when having business development and testing requirement, copies from the complete environment of maintenance more Set of environments copes with the demand of parallel exploitation and test job to environment.
Detailed description of the invention
The present invention will be further described in detail below with reference to the accompanying drawings and specific embodiments.
Fig. 1 is the flow chart of the method for the embodiment of the present invention;
Fig. 2 is the interface button figure of the method for the embodiment of the present invention;
Fig. 3 is the setting information figure of the method for the embodiment of the present invention;
Fig. 4 is the real-time results hum pattern of the method for the embodiment of the present invention;
Fig. 5 is the method for the embodiment of the present invention and new environment hum pattern;
Fig. 6 is the source environmental applications hum pattern of the method for the embodiment of the present invention;
Fig. 7 is the new environment application message figure of the method for the embodiment of the present invention;
Fig. 8 is the database information figure of the method for the embodiment of the present invention;
Fig. 9 is that the method Uxie configuration center of the embodiment of the present invention checks configuration interface figure.
Specific embodiment
With reference to the attached drawing in the embodiment of the present invention, technical solution in the embodiment of the present invention carries out clear, complete Ground description, it is clear that described embodiment is only a part of the embodiments of the present invention, instead of all the embodiments.It is based on Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every other Embodiment shall fall within the protection scope of the present invention.
In the following description, numerous specific details are set forth in order to facilitate a full understanding of the present invention, but the present invention can be with Implemented using other than the one described here other way, those skilled in the art can be without prejudice to intension of the present invention In the case of do similar popularization, therefore the present invention is not limited by the specific embodiments disclosed below.
Overall, the embodiment of the invention discloses a kind of methods based on private clound one-key duplication application environment, including such as Lower step:
User's sign-on access cloud platform, in cloud front end environment management page, inquiry filters out the application environment for needing to replicate, point Hit the reproduction button in its card label;
Target environment information is configured, target environment coding waits environment duplication to execute completion automatically after determining;
In environment reproduction process, front and back end is communicated by websocket, and user obtains environment duplication implementing result in real time;
Duplication execute after the completion of, user may have access to newly copies come environment, wherein the application disposed and data all with source Environment is consistent.
For replicating a jirachi-sit environment from jirachi-staging environment
As shown in Fig. 2, user's sign-on access Wan Huijila prays research and development cloud platform, before cloud-dashboard researches and develops cloud End ring border management page, inquiry filter out jirachi-staging environment, click the reproduction button in its card label.
Such as Fig. 3, target environment information is configured, target environment encodes jirachi-sit, and it is multiple to may wait for environment after determining System executes completion automatically.
Such as Fig. 4, in environment reproduction process, front and back end is communicated by websocket, and user can obtain environment duplication in real time and hold Row result.
Such as Fig. 5, Fig. 6, Fig. 7, after the completion of duplication executes, user may have access to the jirachi-sit environment for newly copying and, inner The application of edge administration and data are all consistent with source environment jirachi-staging.
As shown in Figure 1, jirachi-staging copies the system specific implementation process of jirachi-sit such as such as Fig. 1 Under:
When user submits the request of copying surroundings information to research and develop cloud server terminal environment replication processes interface to Jirachi, Jirachi researches and develops cloud server terminal by calling the extension API of this kubernetes of catalog to obtain source environment space The information of all application deployment of jirachi-staging, as shown in fig. 6, jirachi-staging environment is deployed with 6 in total Using.After the application message working process of source environment, environmental applications information to be copied is formed, is then called corresponding Kubernetes extends the creation and application clone's deployment that API completes new environment.The appearance of kubernetes cluster is wherein used Device orchestration technology and helm assure reason technical functionality and realize.As shown in fig. 7, newly copying in the jirachi-sit environment come Also duplication is deployed with 6 and the consistent application of the source jirachi-staging environment.
As shown in figure 9, realization obtains the configuration information of source environmental applications for the application for having accessed Uxie configuration center It takes, and the configuration of new environment application deployment is generated and modified.If jirachi-server is applied, we use configuration center The jirachi-staging environment configuration information of jirachi-server project is read in configuration, then calls matching for configuration center Modification interface is set, the jirachi-sit environment configuration information of portion jirachi-server project is generated.For other application Configuration information, then using intact strategy duplication deployment.Using kubernetes coding internal-internal service access and The characteristic of different coding access isolation, connection configuration use inter access mode, realize the decoupling of configuration item and environment, Duo Gehuan Same configuration item information can be used in border, does not need to modify.As equally use http://jirachi-server-http/ as Url connection, jirachi-staging environment using connection be jirachi-staging environment jirachi-server Service, jirachi-sit environment using connection be jirachi-sit environment jirachi-server service.
After the completion of the deployment of the database of new environment, system will create the background task of a database data clone, complete The work of new environment database is exported and imported at source environment data base data, realizes the environment and source environment number for copying According to being consistent.As shown in fig. 7, newly copying the mysql of the jirachi-sit environment and the source jrachi-staging environment that come The data of database are consistent.
It is realized by above technology, user need to only click a key and can easily complete to replicate a set of new environment, solve The problem of test environment newly developed of Dynamical Deployment complete set takes time and effort, and only need to safeguard a set of source environment, it saves more The cost overhead of set of environments maintenance.

Claims (6)

1. a kind of method based on private clound one-key duplication application environment, it is characterised in that include the following steps:
User's sign-on access cloud platform, in cloud platform front end environment management page, inquiry filters out the application environment for needing to replicate, point Hit the reproduction button in its card label;
Target environment information is configured, target environment coding waits environment duplication to execute completion automatically after determining;
In environment reproduction process, front and back end is communicated by websocket, and user obtains environment duplication implementing result in real time;
Duplication execute after the completion of, user may have access to newly copies come environment, wherein the application disposed and data all with source environment It is consistent.
2. the method as described in claim 1 based on private clound one-key duplication application environment, it is characterised in that:
User's sign-on access cloud platform filters out need according to the coding inquiry of user's input in cloud platform front end environment management page The coding for the source environment to be replicated clicks the reproduction button in its card label;
Target environment information is configured, the target environment information waits environment duplication to execute completion, the target automatically after determining Environmental information includes target environment coding, title, said target environment space;
In environment reproduction process, the front end and rear end of the cloud platform are communicated by websocket, and it is multiple that user obtains environment in real time Implementing result processed;
After the completion of duplication executes, user may have access to the new environment for copying and, the application for copying the new environment deployment come It is all consistent with the application of source environment and data with data.
3. the method as claimed in claim 2 based on private clound one-key duplication application environment, which is characterized in that the source environment Copy the system of new environment the specific implementation process is as follows:
When user submits the request of copying surroundings information to arrive cloud platform service end environment replication processes interface, the cloud platform is taken Business end is by calling the extension API of catalog this kubernetes independently propagated through to obtain all application deployment of source environment Values information, to the values information of source environment application deployment according to regular working process is disposed after, formed to be copied Environmental applications dispose values information, and corresponding kubernetes extension API is then called to complete the creation and application of new environment Clone's deployment is copying also duplication deployment and the consistent application of source environment in the new environment come coding.
4. the method as claimed in claim 2 based on private clound one-key duplication application environment, it is characterised in that: for access The application of configuration center, cloud platform server-side answers source environment according to automatic realize of the scheduled rule of environment configurations when environment replicates Configuration information obtains, and the configuration of new environment application deployment is generated and modified.
5. the method as claimed in claim 4 based on private clound one-key duplication application environment, it is characterised in that: for access The application configuration of the configuration center, configuration item purpose environment configuration information needed for being read using the configuration of configuration center, then The configuration modification interface of configuration center is called, the target environment configuration information of a project is generated;For matching for other application Confidence breath, then using intact strategy duplication deployment;Utilize the coding internal services access name and difference of kubernetes The characteristic of coding access isolation, connection configuration use inter access mode, realize the decoupling of configuration item and environment, multiple environment can Using same configuration item information, do not need to modify.
6. the method as described in claim 1 based on private clound one-key duplication application environment, it is characterised in that: in new environment After the completion of database deployment, the background task of one database data clone of system creation is completed source environment data base data and is led Out and it is imported into the work of new environment database, realizes that the environment for copying and is consistent with source environmental data.
CN201910447981.7A 2019-05-27 2019-05-27 Method for copying application environment by one key based on private cloud Active CN110177144B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910447981.7A CN110177144B (en) 2019-05-27 2019-05-27 Method for copying application environment by one key based on private cloud

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910447981.7A CN110177144B (en) 2019-05-27 2019-05-27 Method for copying application environment by one key based on private cloud

Publications (2)

Publication Number Publication Date
CN110177144A true CN110177144A (en) 2019-08-27
CN110177144B CN110177144B (en) 2021-10-08

Family

ID=67696128

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910447981.7A Active CN110177144B (en) 2019-05-27 2019-05-27 Method for copying application environment by one key based on private cloud

Country Status (1)

Country Link
CN (1) CN110177144B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111813683A (en) * 2020-07-14 2020-10-23 深圳前海移联科技有限公司 Universal automatic software test environment synchronization method
CN111897551A (en) * 2020-08-03 2020-11-06 上海嗨酷强供应链信息技术有限公司 Platform and method for rapidly cloning software environment in cloud environment
CN113448837A (en) * 2020-11-03 2021-09-28 北京新氧科技有限公司 Development and test environment deployment method, system, electronic device, and medium

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102075381A (en) * 2010-12-14 2011-05-25 云海创想信息技术(北京)有限公司 Automatic test platform server and system applied to cloud storage
US20120016621A1 (en) * 2010-07-13 2012-01-19 Salesforce.Com, Inc. Method and system for multi-mode testing through operation interface and scenario abstraction in a multi-tenant database environment
CN104793946A (en) * 2015-04-27 2015-07-22 广州杰赛科技股份有限公司 Application deployment method and system based on cloud computing platform
US20160026457A1 (en) * 2010-02-25 2016-01-28 Microsoft Technology Licensing, Llc. Automated deployment and servicing of distributed applications
CN105487892A (en) * 2015-11-26 2016-04-13 武大吉奥信息技术有限公司 Inter-cloud GIS service deploying system in Linux environment
CN107465548A (en) * 2017-08-17 2017-12-12 北京云纵信息技术有限公司 The dispositions method and device of code
CN107707658A (en) * 2017-10-11 2018-02-16 郑州云海信息技术有限公司 A kind of private clound building method and system

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160026457A1 (en) * 2010-02-25 2016-01-28 Microsoft Technology Licensing, Llc. Automated deployment and servicing of distributed applications
US20120016621A1 (en) * 2010-07-13 2012-01-19 Salesforce.Com, Inc. Method and system for multi-mode testing through operation interface and scenario abstraction in a multi-tenant database environment
CN102075381A (en) * 2010-12-14 2011-05-25 云海创想信息技术(北京)有限公司 Automatic test platform server and system applied to cloud storage
CN104793946A (en) * 2015-04-27 2015-07-22 广州杰赛科技股份有限公司 Application deployment method and system based on cloud computing platform
CN105487892A (en) * 2015-11-26 2016-04-13 武大吉奥信息技术有限公司 Inter-cloud GIS service deploying system in Linux environment
CN107465548A (en) * 2017-08-17 2017-12-12 北京云纵信息技术有限公司 The dispositions method and device of code
CN107707658A (en) * 2017-10-11 2018-02-16 郑州云海信息技术有限公司 A kind of private clound building method and system

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
HUI-SHAN CHEN等: ""Towards the Automated Fast Deployment and Clone of Private Cloud Service: The Ezilla Toolkit"", 《2013 IEEE 5TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGY AND SCIENCE》 *
JIE CHEN等: ""Research on SLA-based Business Automatic Deployment of Private Cloud Platform"", 《2016 INTERNATIONAL CONFERENCE ON INFORMATION SYSTEM AND ARTIFICIAL INTELLIGENCE (ISAI)》 *
张容齐: ""基于云计算平台的服务自动化部署机制研究"", 《中国优秀硕士学位论文全文数据库》 *
汪源: ""云化业务平台中业务自动部署的设计与实现"", 《中国优秀硕士学位论文全文数据库》 *

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111813683A (en) * 2020-07-14 2020-10-23 深圳前海移联科技有限公司 Universal automatic software test environment synchronization method
CN111813683B (en) * 2020-07-14 2023-10-03 深圳前海移联科技有限公司 Universal automatic synchronization method for software testing environment
CN111897551A (en) * 2020-08-03 2020-11-06 上海嗨酷强供应链信息技术有限公司 Platform and method for rapidly cloning software environment in cloud environment
CN113448837A (en) * 2020-11-03 2021-09-28 北京新氧科技有限公司 Development and test environment deployment method, system, electronic device, and medium
CN113448837B (en) * 2020-11-03 2024-03-19 北京新氧科技有限公司 Development and test environment deployment method, system, electronic equipment and medium

Also Published As

Publication number Publication date
CN110177144B (en) 2021-10-08

Similar Documents

Publication Publication Date Title
US10462002B2 (en) Automatically determining requirements for provisioning a hosted computing environment
KR102121159B1 (en) Event-driven blockchain workflow processing
US9531609B2 (en) Virtual service automation
CN110177144A (en) A method of based on private clound one-key duplication application environment
CN100518181C (en) Transparent transference of non-state conversation between servers
CN102929771B (en) Log recording apparatus and log recording method
CN104216912A (en) Method and device for achieving non-intrusive service form workflow
US10339039B2 (en) Virtual service interface
US20080098048A1 (en) Migrating temporary data of a session
Boschi et al. RabbitMQ cookbook
CN107229466B (en) Method, system and storage medium for business development of enterprise branch office
CN109902117A (en) Operation system analysis method and device
CN114048264A (en) Consensus intelligent contract algorithm
CN109522364A (en) A kind of strange land data double-way synchronous method and system
CN110417857B (en) Block chain protocol processing device, processing method and block chain
CN109614271A (en) Control method, device, equipment and the storage medium of multiple company-data consistency
Long et al. An overview of PCTE: A basis for a portable common tool environment
CN116679907B (en) Artificial intelligence information processing method and device, electronic equipment and storage medium
CN109918867A (en) Peer system file source tracing method based on block chain
CN111131472A (en) Building method of Apollo configuration center
Chen et al. Alternative solutions for distributed simulation cloning
Feuerlicht et al. Service Consumer Framework-Managing Service Evolution from a Consumer Perspective
CN107577680A (en) Real-time text retrieval system and its implementation based on HBase big datas
CN110191048A (en) A kind of customer service information management method and system
WO2023050110A1 (en) Method for implementing automatic password change having fault tolerance mechanism for cloud host and cloud bastion host

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant