CN110727664A - Method and device for executing target operation on public cloud data - Google Patents

Method and device for executing target operation on public cloud data Download PDF

Info

Publication number
CN110727664A
CN110727664A CN201910881582.1A CN201910881582A CN110727664A CN 110727664 A CN110727664 A CN 110727664A CN 201910881582 A CN201910881582 A CN 201910881582A CN 110727664 A CN110727664 A CN 110727664A
Authority
CN
China
Prior art keywords
metadata
current task
target data
group information
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910881582.1A
Other languages
Chinese (zh)
Inventor
高海峰
赵平
元鹏
章富刚
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Lianwei Information Technology Co Ltd
Original Assignee
Shanghai Lianwei Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Lianwei Information Technology Co Ltd filed Critical Shanghai Lianwei Information Technology Co Ltd
Priority to CN201910881582.1A priority Critical patent/CN110727664A/en
Publication of CN110727664A publication Critical patent/CN110727664A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/21Design, administration or maintenance of databases
    • G06F16/215Improving data quality; Data cleansing, e.g. de-duplication, removing invalid entries or correcting typographical errors
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/22Indexing; Data structures therefor; Storage structures
    • G06F16/2282Tablespace storage structures; Management thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database

Abstract

The application aims to provide a method and equipment for executing target operation on public cloud data; the method comprises the steps that a user terminal matches a plurality of public cloud account identification information corresponding to identity authentication information of a user, respectively sends a plurality of metadata requests to a plurality of network devices, and receives a plurality of metadata sent by the plurality of network devices based on the metadata requests; then, performing a cleaning operation on the metadata to obtain a plurality of corresponding target data, and determining group information of each target data; and responding to an operation instruction input by the user on the single interface of the user terminal, and executing corresponding target operation on corresponding target data by the user terminal based on at least one item of group information. According to the cloud account management method and the cloud account management system, a plurality of public cloud accounts can be managed through one user terminal, and the problems of unified identification, display and management of the cloud accounts and cloud resources in a cloud environment are solved.

Description

Method and device for executing target operation on public cloud data
Technical Field
The present application relates to the field of computer information management, and in particular, to a technique for performing a target operation on public cloud data.
Background
Cloud computing has been developed for many years and is currently in a high-speed development stage, and multiple clouds are essential stages of cloud computing development. Due to the agility and digitization of enterprises, a large number of public clouds are used. Since the public cloud of each company has its own characteristics, most enterprises are in use in a cloudy form. Due to the fact that different departments and different legal entities exist in an enterprise, the situation that one cloud has multiple accounts can occur. This results in a large number of enterprise customers using multiple public clouds to support enterprise IT, so the IT personnel of the enterprise need to manage multiple different cloud platforms.
Disclosure of Invention
One object of the present application is to provide a method and apparatus for performing a target operation on public cloud data.
According to one aspect of the present application, a method for performing a target operation on target data is provided, which is applied to a user terminal. The method comprises the following steps:
acquiring identity authentication information of a user;
matching corresponding identification information of a plurality of public cloud account numbers based on the identity verification information, wherein each piece of identification information of the public cloud account numbers corresponds to a public cloud account number;
respectively sending a plurality of metadata requests to a plurality of network devices, wherein each metadata request comprises public cloud account identification information which is used for determining the access authority of a user to a corresponding public cloud account;
receiving a plurality of pieces of metadata transmitted by the plurality of network devices based on the metadata requests;
performing a cleansing operation on the metadata to obtain corresponding pieces of target data, and determining group information of each piece of target data; and
responding to an operation instruction input by a user on a single interface of the user terminal, and executing corresponding target operation on corresponding target data based on at least one item of group information, wherein the operation instruction comprises the at least one item of group information.
According to another aspect of the present application, there is provided an apparatus for performing a target operation on target data, wherein the apparatus comprises:
a processor; and
a memory arranged to store computer executable instructions that, when executed, cause the processor to perform the above method.
According to another aspect of the present application, there is provided a computer-readable medium storing instructions that, when executed by a computer, cause the computer to perform the above-described method.
Compared with the prior art, the method and the system have the advantages that the plurality of public cloud accounts can be managed through one user terminal, and the problems of unified identification, display and management of the cloud accounts and the cloud resources in the cloud environment are solved.
Drawings
Other features, objects and advantages of the present application will become more apparent upon reading of the following detailed description of non-limiting embodiments thereof, made with reference to the accompanying drawings in which:
FIG. 1 illustrates a system architecture of one embodiment of the present application;
FIG. 2 illustrates a flow diagram of a method for performing a targeted operation on public cloud data according to one embodiment of the present application;
FIG. 3 is an illustration of a task queue in one embodiment of the present application;
FIG. 4 is an illustration of a current task in the task queue of FIG. 3;
FIG. 5 is a diagram illustrating the transition between task execution states according to one embodiment of the present application;
FIG. 6 is a flow diagram illustrating queue task execution according to one embodiment of the present disclosure;
FIG. 7 is a diagram illustrating the transition of metadata cleansing states according to one embodiment of the present application;
FIG. 8 is a schematic flow chart of metadata cleansing in one embodiment of the present application;
FIG. 9 illustrates functional modules of an exemplary system that may be used in various embodiments of the present application.
The same or similar reference numbers in the drawings identify the same or similar elements.
Detailed Description
The present application is described in further detail below with reference to the attached figures.
In a typical configuration of the present application, the terminal, the device serving the network, and the trusted party each include one or more processors (e.g., Central Processing Units (CPUs)), input/output interfaces, network interfaces, and memory.
The Memory may include volatile Memory in a computer readable medium, Random Access Memory (RAM), and/or nonvolatile Memory such as Read Only Memory (ROM) or Flash Memory. Memory is an example of a computer-readable medium.
Computer-readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, Phase-Change Memory (PCM), Programmable Random Access Memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read-Only Memory (ROM), Electrically erasable Programmable Read-Only Memory (EEPROM), Flash Memory (Flash Memory) or other Memory technology, Compact Disc Read-Only Memory (CD-ROM), Digital Versatile Disc (Digital Versatile Disc, DVD) or other optical storage, magnetic tape or other magnetic storage media, magnetic tape or other non-magnetic storage devices, may be used to store information that may be accessed by the computing device.
The device referred to in this application includes, but is not limited to, a user device, a network device, or a device formed by integrating a user device and a network device through a network. The user equipment includes, but is not limited to, any mobile electronic product, such as a smart phone, a tablet computer, etc., capable of performing human-computer interaction with a user (e.g., human-computer interaction through a touch panel), and the mobile electronic product may employ any operating system, such as an Android operating system, an iOS operating system, etc. The network Device includes an electronic Device capable of automatically performing numerical calculation and information processing according to a preset or stored instruction, and the hardware includes, but is not limited to, a microprocessor, an Application Specific Integrated Circuit (ASIC), a Programmable Logic Device (PLD), a Field Programmable Gate Array (FPGA), a Digital Signal Processor (DSP), an embedded Device, and the like. The network device includes but is not limited to a computer, a network host, a single network server, a plurality of network server sets or a cloud of a plurality of servers; here, the Cloud is composed of a large number of computers or web servers based on Cloud Computing (Cloud Computing), which is a kind of distributed Computing, one virtual supercomputer consisting of a collection of loosely coupled computers. Including, but not limited to, the internet, a wide area Network, a metropolitan area Network, a local area Network, a VPN Network, a wireless Ad Hoc Network (Ad Hoc Network), etc. Preferably, the device may also be a program running on the user device, the network device, or a device formed by integrating the user device and the network device, the touch terminal, or the network device and the touch terminal through a network.
Of course, those skilled in the art will appreciate that the foregoing is by way of example only, and that other existing or future devices, which may be suitable for use in the present application, are also encompassed within the scope of the present application and are hereby incorporated by reference.
In the description of the present application, "a plurality" means two or more unless specifically limited otherwise.
The present application first provides a system architecture for performing a target operation on public cloud data. As shown in FIG. 1, the system adopts a B/S mode and a micro-service architecture, and is generally divided into a user layer, a middle layer, a data layer and a cloud layer. Wherein:
-a user layer: the user accesses the system through a PC computer or a third-party system.
-an intermediate layer: the expandability of the system is considered to carry out front-end and back-end separation design, distributed deployment can be carried out rapidly, a front-end page is deployed to a Web server independently, and a back-end application is deployed to an application server independently; the application service can construct cluster providing services, including unified security authentication, statistical analysis service, query service, visualization service, database access service, configuration service, timing task service and the like, the interface server provides independent services for a third party, and the user layer performs data request interaction with the middle layer through Webservices or Restful in order to prevent the third party from influencing a service system during interaction.
-a data layer: the database server can perform dual-computer hot standby, master-slave operation and the like, an independent cache server is added, and pages and common data are cached, so that the pressure of the database is relieved, the bottleneck of database reading and writing is solved, and the normal operation of the database is ensured.
-cloud layer: and self-defining a timing task, synchronizing resource data in a timed slave cloud (Alice cloud, Azure, AWS and Tencent cloud), synchronizing metadata in the slave cloud, and finishing cleaning and storing the data according to a defined rule through data cleaning service.
Based on the above architecture, in particular, the present application provides a method for performing a target operation on public cloud data. The method is applied to a user terminal and is supported by corresponding network equipment (such as a cloud server). Referring to fig. 2, the method includes step S100, step S200, step S300, step S400, step S500, and step S600. The following describes a specific embodiment of the present application by taking a user terminal as an example.
Specifically, in step S100, the user terminal acquires authentication information of the user. For example, a user inputs his or her user identification (e.g., system account name) and authentication information (e.g., account password) at a user terminal.
In step S200, the user terminal matches a plurality of pieces of public cloud account identification information corresponding to the authentication information, where each piece of public cloud account identification information corresponds to a public cloud account. For example, a user account logged in by an administrator corresponds to a number of public cloud accounts managed by the administrator; in some cases, different administrators may manage different public cloud accounts for the same set of systems.
In step S300, the user terminal sends a plurality of metadata requests to the plurality of network devices, respectively, where each metadata request includes public cloud account identification information, and the public cloud account identification information is used to determine an access right of the user to a corresponding public cloud account. For example, the plurality of network devices correspond to a plurality of different cloud platforms, respectively. The access right of a user to a certain cloud account is determined by related account information provided by the user in some embodiments, for example, aristo needs to obtain fields of entering accessKeyId and accessSecret, and Azure (cloud service platform provided by amazon) needs to obtain fields of entering subscribentid and clientSecret. And after the entry is successful, verifying whether the entered account is available.
In step S400, the user terminal receives a plurality of pieces of metadata transmitted by the plurality of network devices based on the metadata request. The metadata is mainly information describing a data property (property) and is used for supporting functions such as indicating a storage location, history data, resource searching, file recording and the like.
In step S500, the user terminal performs a cleansing operation on the metadata to obtain corresponding pieces of target data, and determines group information of each piece of target data. In some embodiments, according to different data cleansing rules of the cloud platforms, the content of the metadata is cleansed into the corresponding data structure, including checking data consistency, processing invalid values and missing values, and the like.
In step S600, in response to an operation instruction input by a user on a single interface of the user terminal, the user terminal performs a corresponding target operation on corresponding target data based on at least one item of group information, where the operation instruction includes the at least one item of group information. In some embodiments, the corresponding operation results are also presented in the single interface.
Therefore, a user can manage a plurality of cloud accounts only in a single user interface without processing each cloud account.
In some embodiments, in step S300, the user terminal sends a plurality of metadata requests to the plurality of network devices respectively based on a preset time interval. For example, after the user's authentication information is acquired, the system performs the above operations at regular intervals by itself, so as to reduce the operation burden of the user and improve the real-time performance of the local data.
In some embodiments, step S300 includes substep S310, substep S320, substep S330, and substep S340 (neither shown). In sub-step S310, the user terminal creates a task queue, where the task queue includes a plurality of metadata request tasks corresponding to the plurality of public cloud account identification information; in substep S320, the user terminal obtains a current task in the task queue and determines an executable state of the current task; in the substep S330, if the executable state of the current task is non-executable, the user terminal moves the current task to the tail of the task queue; in the sub-step S340, if the executable state of the current task is executable, the user terminal executes the current task to send a corresponding metadata request to a corresponding network device, and removes the current task after the current task is executed. In order to automatically execute some tasks and reduce the burden of an administrator, some tasks are provided with a cycle state, and the cycle state is used for representing whether the task needs to be automatically executed again after the task is executed at this time. Accordingly, in some embodiments, in sub-step S340, if the executable state of the current task is executable, the user terminal executes the current task to send a corresponding metadata request to a corresponding network device; if the cycle state of the current task is true, moving the current task to the tail of the task queue after the current task is executed; otherwise, the current task is removed after the current task is executed.
For example, the system manages information synchronization of various cloud account resources (basic resources, bills and the like); after the synchronization task is successfully created, the synchronization task is saved in a task queue to be executed, as shown in fig. 3. An account task in the task queue comprises a plurality of subtasks of resource information, each account task has only one state, the task state is divided into (executable, to be executed, in execution, execution completed, execution error), and the task records the next execution time and marks whether to loop the task (for example, 0-no, 1-yes). Referring to the task execution flow illustrated in fig. 6, the system first obtains the first task (i.e., "current task") in the queue, and determines whether it is executable, where fig. 4 illustrates an exemplary logical structure of the current task; if the current task can not be executed, the current task is moved to the tail of the queue, otherwise the current task is set to be in execution (so as to avoid conflict during parallel processing), the task is put into the execution thread pool, and the task is executed through the subtask concurrent coroutine. After the current task is executed, marking the completion state of the current task as 'completed'; and checking the cycle identifier, if the current task is a cycle task, still moving the task to the tail of the queue, and otherwise, removing the task from the queue. For ease of illustration, FIG. 5 illustrates the transition process between task states.
In some embodiments, in step S500, the user terminal performs a cleansing operation on the metadata based on the cleansing rule table to obtain corresponding pieces of target data. The pieces of target data are scrubbed into respective data structures in some embodiments.
Taking Azure as an example, a metadata structure is shown in the following table:
TABLE 1
Figure BDA0002206026310000071
Figure BDA0002206026310000081
The metadata is flushed according to the data flushing rules into the data structure shown in table 2 below, and the tags, subscription ids, resource GUIDs in the metadata are flushed into the tag table (the data structure is shown in table 3 below).
TABLE 2
Figure BDA0002206026310000082
Figure BDA0002206026310000091
TABLE 3
Figure BDA0002206026310000092
Defining the metadata cleaning state as follows:
-unwashed (0): indicating that the metadata has not performed cleansing;
-in washing (1): indicating that metadata is performing cleansing;
-cleaned (2): indicating that the metadata has been flushed.
See fig. 7 for the transition between the states. Based on the state transition relationships, FIG. 8 illustrates a metadata cleansing flow. Firstly, loading metadata with a cleaning state of 'uncleaned', and setting the cleaning state of the metadata as 'cleaning in' to avoid conflict generated in parallel operation; cleaning the fabric according to cleaning rules and algorithms; and after the cleaning is finished, setting the cleaning state of the metadata as cleaned. When the metadata in the plurality of pieces of metadata include unwashed metadata, performing a cleansing operation on the metadata in the metadata whose cleansing state is unwashed based on a cleansing rule table to obtain a plurality of corresponding pieces of target data, and setting the cleansing state of the metadata as cleansed until there is no metadata whose cleansing state is "unwashed".
In some embodiments, in step S500, group information for each piece of target data is determined based on a group decision tree. For example, an Alice cloud server (ECS), an Tencent cloud server, an Azure virtual machine and an AWS EC2 are cleaned into virtual machines in a unified way; ali cloud RDS (relational Database service), Tencent cloud Database, Azure Database and AWS RDS, which are cleaned into databases in a unified way; alice cloud Load Balancing, Tencent cloud Load Balancing, Azure Load Balancing, AWS Elastic Load Balancing, and uniformly cleaning the Load Balancing. The decision tree is a process of carrying out tree classification on sample data from top to bottom, and comprises nodes and directed edges. The nodes are divided into internal nodes, each of which represents a feature or attribute, and leaf nodes, which represent categories. All samples are clustered together, starting from the top root node. Through the division of the root node, the samples are divided into different child nodes. And further dividing according to the characteristics of the child nodes until all samples are specified to a certain category. Common decision tree algorithms are ID3, C4.5, CART. Taking the ID3 algorithm as an example, for a sample set D, the number of classes is K, and the empirical entropy of the data set D is represented as:
Figure BDA0002206026310000101
wherein C iskIs a subset of samples belonging to class k in the sample set D, | Ck| represents the number of elements of the subset, | D | represents the number of elements of the sample set.
The empirical conditional entropy H (D | a) of a certain feature a for the data set D is then calculated as:
Figure BDA0002206026310000111
wherein D isiRepresenting D in which feature A takes a sample subset of the ith value, DikRepresents DiOf the sample subset belonging to class k.
The information gain g (D, a) can then be expressed as the difference between the two, giving:
g(D,A)=H(D)-H(D|A)
in some embodiments, in step S600, a user terminal detects an operation instruction input by a user at a single interface in a browser application of the user terminal; and responding to the operation instruction, the user terminal executes corresponding target operation on corresponding target data based on at least one item of group information, wherein the operation instruction comprises the at least one item of group information. Here, the target operations include, but are not limited to, resource management, resource group management, bill acquisition/display/analysis, resource analysis, and the like. Accordingly, in some embodiments, the target data includes at least any one of:
-billing data;
-resource consumption data;
-resource total amount data;
-cloud account usage data;
system prompt data including, but not limited to, alarms, errors, account related information, etc.
To facilitate management and access of relevant application data by various departments, in some embodiments, the group information includes at least one of:
-application group information;
-department group information;
-resource group information.
The present application also provides a computer readable storage medium having stored thereon computer code which, when executed, performs a method as in any one of the preceding.
The present application also provides a computer program product, which when executed by a computer device, performs the method of any of the preceding claims.
The present application further provides a computer device, comprising:
one or more processors;
a memory for storing one or more computer programs;
the one or more computer programs, when executed by the one or more processors, cause the one or more processors to implement the method of any preceding claim.
FIG. 9 illustrates an exemplary system that can be used to implement the various embodiments described in this application.
As shown in fig. 9, in some embodiments, the system 1000 may be configured as any of the user terminal devices in the various embodiments described herein. In some embodiments, system 1000 may include one or more computer-readable media (e.g., system memory or NVM/storage 1020) having instructions and one or more processors (e.g., processor(s) 1005) coupled with the one or more computer-readable media and configured to execute the instructions to implement modules to perform the actions described herein.
For one embodiment, system control module 1010 may include any suitable interface controllers to provide any suitable interface to at least one of the processor(s) 1005 and/or to any suitable device or component in communication with system control module 1010.
The system control module 1010 may include a memory controller module 1030 to provide an interface to the system memory 1015. Memory controller module 1030 may be a hardware module, a software module, and/or a firmware module.
System memory 1015 may be used to load and store data and/or instructions, for example, for system 1000. For one embodiment, system memory 1015 may include any suitable volatile memory, such as suitable DRAM. In some embodiments, the system memory 1015 may include a double data rate type four synchronous dynamic random access memory (DDR4 SDRAM).
For one embodiment, system control module 1010 may include one or more input/output (I/O) controllers to provide an interface to NVM/storage 1020 and communication interface(s) 1025.
For example, NVM/storage 1020 may be used to store data and/or instructions. NVM/storage 1020 may include any suitable non-volatile memory (e.g., flash memory) and/or may include any suitable non-volatile storage device(s) (e.g., one or more Hard Disk drive(s) (HDD (s)), one or more Compact Disc (CD) drive(s), and/or one or more Digital Versatile Disc (DVD) drive (s)).
NVM/storage 1020 may include storage resources that are physically part of a device on which system 1000 is installed or may be accessed by the device and not necessarily part of the device. For example, NVM/storage 1020 may be accessed over a network via communication interface(s) 1025.
Communication interface(s) 1025 may provide an interface for system 1000 to communicate over one or more networks and/or with any other suitable device. System 1000 may communicate wirelessly with one or more components of a wireless network according to any of one or more wireless network standards and/or protocols.
For one embodiment, at least one of the processor(s) 1005 may be packaged together with logic for one or more controller(s) of the system control module 1010, e.g., memory controller module 1030. For one embodiment, at least one of the processor(s) 1005 may be packaged together with logic for one or more controller(s) of the system control module 1010 to form a System In Package (SiP). For one embodiment, at least one of the processor(s) 1005 may be integrated on the same die with logic for one or more controller(s) of the system control module 1010. For one embodiment, at least one of the processor(s) 1005 may be integrated on the same die with logic of one or more controllers of the system control module 1010 to form a system on a chip (SoC).
In various embodiments, system 1000 may be, but is not limited to being: a server, a workstation, a desktop computing device, or a mobile computing device (e.g., a laptop computing device, a handheld computing device, a tablet, a netbook, etc.). In various embodiments, system 1000 may have more or fewer components and/or different architectures. For example, in some embodiments, system 1000 includes one or more cameras, a keyboard, a Liquid Crystal Display (LCD) screen (including a touch screen display), a non-volatile memory port, multiple antennas, a graphics chip, an Application Specific Integrated Circuit (ASIC), and speakers.
It should be noted that the present application may be implemented in software and/or a combination of software and hardware, for example, implemented using Application Specific Integrated Circuits (ASICs), general purpose computers or any other similar hardware devices. In one embodiment, the software programs of the present application may be executed by a processor to implement the steps or functions described above. Likewise, the software programs (including associated data structures) of the present application may be stored in a computer readable recording medium, such as RAM memory, magnetic or optical drive or diskette and the like. Additionally, some of the steps or functions of the present application may be implemented in hardware, for example, as circuitry that cooperates with the processor to perform various steps or functions.
In addition, some of the present application may be implemented as a computer program product, such as computer program instructions, which when executed by a computer, may invoke or provide methods and/or techniques in accordance with the present application through the operation of the computer. Those skilled in the art will appreciate that the form in which the computer program instructions reside on a computer-readable medium includes, but is not limited to, source files, executable files, installation package files, and the like, and that the manner in which the computer program instructions are executed by a computer includes, but is not limited to: the computer directly executes the instruction, or the computer compiles the instruction and then executes the corresponding compiled program, or the computer reads and executes the instruction, or the computer reads and installs the instruction and then executes the corresponding installed program. Computer-readable media herein can be any available computer-readable storage media or communication media that can be accessed by a computer.
Communication media includes media by which communication signals, including, for example, computer readable instructions, data structures, program modules, or other data, are transmitted from one system to another. Communication media may include conductive transmission media such as cables and wires (e.g., fiber optics, coaxial, etc.) and wireless (non-conductive transmission) media capable of propagating energy waves such as acoustic, electromagnetic, RF, microwave, and infrared. Computer readable instructions, data structures, program modules, or other data may be embodied in a modulated data signal, for example, in a wireless medium such as a carrier wave or similar mechanism such as is embodied as part of spread spectrum techniques. The term "modulated data signal" means a signal that has one or more of its characteristics set or changed in such a manner as to encode information in the signal. The modulation may be analog, digital or hybrid modulation techniques.
By way of example, and not limitation, computer-readable storage media may include volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information such as computer-readable instructions, data structures, program modules or other data. For example, computer-readable storage media include, but are not limited to, volatile memory such as random access memory (RAM, DRAM, SRAM); and non-volatile memory such as flash memory, various read-only memories (ROM, PROM, EPROM, EEPROM), magnetic and ferromagnetic/ferroelectric memories (MRAM, FeRAM); and magnetic and optical storage devices (hard disk, tape, CD, DVD); or other now known media or later developed that can store computer-readable information/data for use by a computer system.
An embodiment according to the present application comprises an apparatus comprising a memory for storing computer program instructions and a processor for executing the program instructions, wherein the computer program instructions, when executed by the processor, trigger the apparatus to perform a method and/or a solution according to the aforementioned embodiments of the present application.
It will be evident to those skilled in the art that the present application is not limited to the details of the foregoing illustrative embodiments, and that the present application may be embodied in other specific forms without departing from the spirit or essential attributes thereof. The present embodiments are therefore to be considered in all respects as illustrative and not restrictive, the scope of the application being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein. Any reference sign in a claim should not be construed as limiting the claim concerned. Furthermore, it is obvious that the word "comprising" does not exclude other elements or steps, and the singular does not exclude the plural. A plurality of units or means recited in the apparatus claims may also be implemented by one unit or means in software or hardware. The terms first, second, etc. are used to denote names, but not any particular order.

Claims (12)

1. A method for executing target operation on target data is applied to a user terminal, wherein the method comprises the following steps:
acquiring identity authentication information of a user;
matching corresponding identification information of a plurality of public cloud account numbers based on the identity verification information, wherein each piece of identification information of the public cloud account numbers corresponds to a public cloud account number;
respectively sending a plurality of metadata requests to a plurality of network devices, wherein each metadata request comprises public cloud account identification information which is used for determining the access authority of a user to a corresponding public cloud account;
receiving a plurality of pieces of metadata transmitted by the plurality of network devices based on the metadata requests;
performing a cleansing operation on the metadata to obtain corresponding pieces of target data, and determining group information of each piece of target data;
responding to an operation instruction input by a user on a single interface of the user terminal, and executing corresponding target operation on corresponding target data based on at least one item of group information, wherein the operation instruction comprises the at least one item of group information.
2. The method of claim 1, wherein the step of sending a plurality of metadata requests to a plurality of network devices, respectively, comprises:
and respectively sending a plurality of metadata requests to a plurality of network devices based on a preset time interval.
3. The method of claim 1, wherein the step of sending a plurality of metadata requests to a plurality of network devices, respectively, comprises:
creating a task queue, wherein the task queue comprises a plurality of metadata request tasks corresponding to the plurality of public cloud account identification information;
acquiring a current task in the task queue and determining an executable state of the current task;
if the executable state of the current task is unexecutable, moving the current task to the tail of the task queue;
and if the executable state of the current task is executable, executing the current task to send a corresponding metadata request to corresponding network equipment, and removing the current task after the current task is executed.
4. The method of claim 3, wherein the step of executing the current task to send a corresponding metadata request to a corresponding network device and removing the current task after the current task is executed if the current task is executable, comprises:
if the executable state of the current task is executable, executing the current task to send a corresponding metadata request to corresponding network equipment;
if the cycle state of the current task is true, moving the current task to the tail of the task queue after the current task is executed; otherwise
And removing the current task after the current task is executed.
5. The method of claim 1, wherein said step of performing a cleansing operation on said metadata to obtain respective pieces of target data comprises:
and executing a cleaning operation on the metadata based on a cleaning rule table to obtain corresponding pieces of target data.
6. The method of claim 5, wherein the step of performing a cleansing operation on the metadata based on a cleansing rule table to obtain a corresponding plurality of pieces of target data comprises:
when the metadata comprises unwashed metadata, performing cleaning operation on the metadata with the cleaning state of unwashed in the metadata based on a cleaning rule table to obtain corresponding target data, and setting the cleaning state of the metadata to be cleaned.
7. The method of claim 5, wherein the step of determining group information for each piece of target data comprises:
group information for each piece of target data is determined based on the group decision tree.
8. The method according to claim 1, wherein the step of performing a corresponding target operation on the corresponding target data based on at least one item of group information in response to an operation instruction input by a user at a single interface of the user terminal, wherein the operation instruction includes the at least one item of group information, comprises:
detecting an operation instruction input by a user at a single interface in a browser application of the user terminal;
in response to the operation instruction, performing a corresponding target operation on corresponding target data based on at least one item of group information, wherein the operation instruction includes the at least one item of group information.
9. The method of claim 8, wherein the target data comprises at least any one of:
billing data;
resource consumption data;
resource total amount data;
cloud account usage data;
the system prompts for data.
10. The method of claim 1, wherein the group information comprises at least any one of:
application group information;
department group information;
resource group information.
11. An apparatus for performing a target operation on target data, wherein the apparatus comprises:
a processor; and
a memory arranged to store computer-executable instructions that, when executed, cause the processor to perform operations according to the method of any one of claims 1 to 10.
12. A computer-readable medium storing instructions that, when executed, cause a system to perform operations of any of the methods of claims 1-10.
CN201910881582.1A 2019-09-18 2019-09-18 Method and device for executing target operation on public cloud data Pending CN110727664A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910881582.1A CN110727664A (en) 2019-09-18 2019-09-18 Method and device for executing target operation on public cloud data

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910881582.1A CN110727664A (en) 2019-09-18 2019-09-18 Method and device for executing target operation on public cloud data

Publications (1)

Publication Number Publication Date
CN110727664A true CN110727664A (en) 2020-01-24

Family

ID=69219219

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910881582.1A Pending CN110727664A (en) 2019-09-18 2019-09-18 Method and device for executing target operation on public cloud data

Country Status (1)

Country Link
CN (1) CN110727664A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111651177A (en) * 2020-05-27 2020-09-11 上海龙旗科技股份有限公司 Android platform-based number writing method and device and computer readable medium
CN112532723A (en) * 2020-11-27 2021-03-19 北京浪潮数据技术有限公司 Account management method, cloud management layer, equipment and medium
CN112769782A (en) * 2020-12-29 2021-05-07 上海联蔚盘云科技有限公司 Method and equipment for multi-cloud security baseline management
CN112765246A (en) * 2020-12-30 2021-05-07 北京知因智慧科技有限公司 Task processing method and device, electronic equipment and storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103942104A (en) * 2014-04-23 2014-07-23 北京金山网络科技有限公司 Task managing method and device
CN109067697A (en) * 2018-05-29 2018-12-21 中国联合网络通信有限公司杭州市分公司 A kind of user account management-control method and readable medium for mixed cloud
CN109634733A (en) * 2018-12-13 2019-04-16 成都四方伟业软件股份有限公司 Task scheduling and managing method, device and operation management server

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103942104A (en) * 2014-04-23 2014-07-23 北京金山网络科技有限公司 Task managing method and device
CN109067697A (en) * 2018-05-29 2018-12-21 中国联合网络通信有限公司杭州市分公司 A kind of user account management-control method and readable medium for mixed cloud
CN109634733A (en) * 2018-12-13 2019-04-16 成都四方伟业软件股份有限公司 Task scheduling and managing method, device and operation management server

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
PRODROMOS MAKRIS等: "A User-Oriented, Customizable Infrastructure Sharing Approach for Hybrid Cloud Computing Environments", 《2011 IEEE THIRD INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGY AND SCIENCE》 *

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111651177A (en) * 2020-05-27 2020-09-11 上海龙旗科技股份有限公司 Android platform-based number writing method and device and computer readable medium
CN111651177B (en) * 2020-05-27 2024-03-12 上海龙旗科技股份有限公司 Number writing method, device and computer readable medium based on android platform
CN112532723A (en) * 2020-11-27 2021-03-19 北京浪潮数据技术有限公司 Account management method, cloud management layer, equipment and medium
CN112769782A (en) * 2020-12-29 2021-05-07 上海联蔚盘云科技有限公司 Method and equipment for multi-cloud security baseline management
CN112765246A (en) * 2020-12-30 2021-05-07 北京知因智慧科技有限公司 Task processing method and device, electronic equipment and storage medium

Similar Documents

Publication Publication Date Title
US20220335338A1 (en) Feature processing tradeoff management
US20210374610A1 (en) Efficient duplicate detection for machine learning data sets
US20200050968A1 (en) Interactive interfaces for machine learning model evaluations
CN110727664A (en) Method and device for executing target operation on public cloud data
US11100420B2 (en) Input processing for machine learning
US9712410B1 (en) Local metrics in a service provider environment
Zhao et al. Cloud data management
US20150379425A1 (en) Consistent filtering of machine learning data
CN107870845A (en) Towards the management method and system of micro services framework applications
CN110719320B (en) Method and equipment for generating public cloud configuration adjustment information
CN111049904A (en) Method and equipment for monitoring multiple public cloud resources
US9959157B1 (en) Computing instance migration
US10182104B1 (en) Automatic propagation of resource attributes in a provider network according to propagation criteria
CN110427295A (en) A kind of monitoring method, equipment and the readable medium of cloud platform resource
US9246688B1 (en) Dataset licensing
Tannir Optimizing Hadoop for MapReduce
CN110704851A (en) Public cloud data processing method and device
Ahmed et al. Big Data Analytics and Cloud Computing: A Beginner's Guide
US10320896B2 (en) Intelligent mapping for an enterprise grid
US11349930B2 (en) Identifying and deleting idle remote sessions in a distributed file system
US20170344454A1 (en) Determining dynamic statistics based on key value patterns
JP7221652B2 (en) External change detection
CN112769782A (en) Method and equipment for multi-cloud security baseline management
US11954531B2 (en) Use of relational databases in ephemeral computing nodes
US20220300822A1 (en) Forgetting data samples from pretrained neural network models

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: 200231 5th floor, building 2, 188 Pingfu Road, Xuhui District, Shanghai

Applicant after: Shanghai Lianwei Digital Technology Group Co.,Ltd.

Address before: 200231 5th floor, building 2, 188 Pingfu Road, Xuhui District, Shanghai

Applicant before: Shanghai Lianwei Information Technology Co.,Ltd.

CB02 Change of applicant information
RJ01 Rejection of invention patent application after publication

Application publication date: 20200124

RJ01 Rejection of invention patent application after publication