CN110868313A - Inspection method, related device and readable storage medium - Google Patents

Inspection method, related device and readable storage medium Download PDF

Info

Publication number
CN110868313A
CN110868313A CN201810986011.XA CN201810986011A CN110868313A CN 110868313 A CN110868313 A CN 110868313A CN 201810986011 A CN201810986011 A CN 201810986011A CN 110868313 A CN110868313 A CN 110868313A
Authority
CN
China
Prior art keywords
cloud
cloud database
state information
execution process
inspection
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810986011.XA
Other languages
Chinese (zh)
Inventor
郑智恺
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Aijieyun Technology Co ltd
Original Assignee
Wangsu Science and Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wangsu Science and Technology Co Ltd filed Critical Wangsu Science and Technology Co Ltd
Priority to CN201810986011.XA priority Critical patent/CN110868313A/en
Publication of CN110868313A publication Critical patent/CN110868313A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/08Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
    • H04L43/0805Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters by checking availability
    • H04L43/0817Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters by checking availability by checking functioning
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/06Management of faults, events, alarms or notifications
    • H04L41/0681Configuration of triggering conditions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/12Network monitoring probes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/16Threshold monitoring

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Environmental & Geological Engineering (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The embodiment of the invention relates to the technical field of communication, and discloses a routing inspection method, a related device and a readable storage medium. The inspection method comprises the following steps: determining an execution process corresponding to each cloud database; respectively sending a polling request to each execution process, wherein each execution process acquires the running state information of the corresponding cloud database according to the received polling request; and receiving the running state information collected by each execution process. According to the embodiment of the invention, the execution process corresponding to each cloud database is determined, each execution process acquires the operation state information of the cloud database according to the operation mechanism and the maintenance means of the corresponding cloud database, and acquires the operation state information of the cloud data corresponding to each execution process, so that a plurality of cloud databases with different operation mechanisms and maintenance means can be inspected, the inspection complexity and the inspection difficulty are reduced, and the problems of all cloud databases can be found in time.

Description

Inspection method, related device and readable storage medium
Technical Field
The embodiment of the invention relates to the technical field of communication, in particular to a routing inspection method, a related device and a readable storage medium.
Background
With the rapid development of the current cloud computing industry, each cloud platform is dedicated to expanding the application product types of the platform, particularly the cloud database service aspect. In the service using process, the cloud database needs to be patrolled in order to ensure the normal operation of the cloud database, so that the operation state of the cloud database or a cloud host where the cloud database is located can be found in time, and an alarm can be given in time when abnormality is found.
The inventor finds that at least the following problems exist in the prior art: the cloud platform can provide various database services, and is required to perform polling on all databases. In the prior art, the operation mechanism and the maintenance means of each database are different, and the inspection mode in the prior art can only inspect one single database, so that the difficulty of timely finding the problems of all cloud database services in the cloud platform is greatly increased.
Disclosure of Invention
The invention aims to provide a routing inspection method, a related device and a readable storage medium, so that the difficulty and complexity of routing inspection of a plurality of cloud databases are reduced.
In order to solve the above technical problem, an embodiment of the present invention provides a polling method, including the following steps: determining an execution process corresponding to each cloud database; respectively sending a polling request to each execution process, wherein each execution process acquires the running state information of the corresponding cloud database according to the received polling request; and receiving the running state information collected by each execution process.
The embodiment of the invention also provides a patrol inspection device, which comprises: the acquisition module is used for acquiring the identity information of each cloud database; the determining module is used for determining an execution process corresponding to the identity information of the cloud database; the system comprises a sending module, a receiving module and a processing module, wherein the sending module is used for respectively sending inspection requests to each execution process, and each execution process respectively collects the running state information of the corresponding cloud database according to the received inspection requests; and the receiving module is used for receiving the running state information fed back by each execution process.
An embodiment of the present invention further provides a cloud server, including: at least one processor; and a memory communicatively coupled to the at least one processor; wherein the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the inspection method as described above.
The embodiment of the invention also provides a computer readable storage medium, which stores a computer program, and the computer program realizes the inspection method when being executed by a processor.
Compared with the prior art, the cloud database inspection method and the cloud database inspection system have the advantages that the execution process corresponding to each cloud database is determined, the execution process acquires the operation state information of the cloud database according to the operation mechanism and the maintenance means of the corresponding cloud database, and the operation state information of the cloud data corresponding to the acquisition of each execution process is acquired, so that inspection can be performed on a plurality of cloud databases with different operation mechanisms and maintenance means, the inspection complexity and the inspection difficulty are reduced, and the problems of all the cloud databases can be found in time.
In addition, determining the execution process corresponding to each cloud database specifically includes: acquiring identity information of each cloud database; and inquiring a matching list according to the identity information of the cloud databases, and determining the execution process corresponding to each cloud database according to the inquiry result, wherein the matching list stores the corresponding relation between the identity information of the cloud databases and the execution process. By inquiring the acquired identity information of each cloud database in the matching list, the execution process corresponding to each cloud database can be determined quickly and accurately, and therefore the routing inspection processing speed is increased.
In addition, the operation state information includes: state information of the cloud database and state information of a cloud host running the cloud database. The state information not only comprises the state information of the cloud databases, but also comprises the state information of the cloud host running each cloud database, so that the information obtained by routing inspection is more comprehensive.
In addition, receiving the running state information collected by each execution process specifically includes: receiving state information of the cloud database and state information of the cloud host acquired by each execution process, wherein the state information of the cloud database is acquired by the execution processes through ports of the client, each execution process initializes a port of the client according to the received routing inspection request, and acquires the state information of the cloud database through the ports of the client.
In addition, after receiving the running state information collected by each executing process, the method further comprises the following steps: and judging whether the parameter value in the running state information reaches a set threshold value, and if so, sending an alarm prompt. By comparing the parameter value in the running state information acquired by each execution process with the set threshold value, an alarm prompt is sent when the set threshold value is reached, so that a user can timely maintain the cloud database or the cloud host according to the alarm prompt.
In addition, the state information of the cloud host comprises processor occupancy rate, memory occupancy rate and disk occupancy rate of the cloud host; the state information of the cloud database comprises the activity of the cloud database, the service robustness of the cloud database and the master-slave synchronization of the cloud database.
Drawings
One or more embodiments are illustrated by way of example in the accompanying drawings, which correspond to the figures in which like reference numerals refer to similar elements and which are not to scale unless otherwise specified.
FIG. 1 is a flow chart of a patrol method according to a first embodiment of the present application;
FIG. 2 is a flow chart of a polling method in a second embodiment of the present application;
FIG. 3 is a schematic block diagram of an inspection device according to a third embodiment of the present application;
FIG. 4 is a schematic block diagram of an inspection device according to a fourth embodiment of the present application;
fig. 5 is a schematic structural diagram of a cloud server in a fifth embodiment of the present application.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention more apparent, embodiments of the present invention will be described in detail below with reference to the accompanying drawings. However, it will be appreciated by those of ordinary skill in the art that numerous technical details are set forth in order to provide a better understanding of the present application in various embodiments of the present invention. However, the technical solution claimed in the present application can be implemented without these technical details and various changes and modifications based on the following embodiments.
A first embodiment of the present invention relates to a patrol method that is executed by a control process of a cloud database service management component in a cloud platform. The specific process is shown in fig. 1, and comprises the following steps:
step 101, determining an execution process corresponding to each cloud database.
Specifically, in the embodiment, the identity information of each cloud database is acquired, the matching list is queried according to the identity information of the cloud database, and the execution process corresponding to each cloud database is determined according to the query result. The matching list stores the corresponding relationship between the identity information of the cloud database and the execution processes, and the identity information of the cloud database and the execution processes are in one-to-one correspondence, namely the identity information of one cloud database corresponds to one execution process.
It should be noted that a timing patrol inspection instruction is set in the control process, and when the set time is reached, the control process automatically performs a cloud database search process according to the timing patrol inspection instruction, that is, identity information of each cloud database is obtained by searching in the cloud platform. By inquiring the acquired identity information of each cloud database in the matching list, the execution process corresponding to each cloud database can be determined quickly and accurately, and therefore the routing inspection processing speed is increased.
In a specific implementation, the identity information of the mysql cloud database, that is, the ID number is 001, the identity information of the redis cloud database, that is, the ID number is 002, the execution process a corresponding to the cloud database with the ID number 001 is stored in the matching list, and the execution process B corresponding to the cloud database with the ID number 002 is stored in the matching list. Therefore, by querying the matching list, it can be determined that the execution process corresponding to the mysql cloud database with the ID number 001 is the execution process a, and the execution process corresponding to the mysql cloud database with the ID number 002 is the execution process B.
And 102, respectively sending a polling request to each execution process.
Specifically, the control process respectively sends inspection requests according to the determined execution processes, and each execution process acquires the running state information of the corresponding cloud database according to the received inspection requests.
In this embodiment, since one cloud database is run on one cloud host, the running state information of the cloud database includes: state information of a cloud database and state information of a cloud host running the cloud database. Wherein, the state information of the cloud database specifically includes: the method comprises the following steps of activity of the cloud database, service robustness of the cloud database and master-slave synchronization of the cloud database. The state information of the cloud host comprises the following steps: the processor occupancy, the memory occupancy and the disk occupancy of the cloud host. Of course, in this embodiment, the state information of the cloud database may also include other parameter values, and similarly, the state information of the cloud host may also include other parameter values, which is only described as an example in this embodiment. In this embodiment, the activity of the cloud database includes activity and non-activity, and if the activity is active, it indicates that the cloud database can normally provide a service, and if the activity is non-activity, it indicates that the cloud database cannot normally provide a service. The service robustness of the cloud database in the present embodiment means that if a certain type of cloud database service is to be completed, when a plurality of cloud databases are required to act together, one cloud database is used as a master database, other cloud databases providing the same type of cloud database service are used as slave databases, and the number of cloud databases completing a certain cloud database service is reduced, although the cloud database service can still be completed, the service robustness of the cloud database is reduced, the service robustness of the cloud database can be determined by judging the number of the same type of cloud databases which perform information transmission with a certain cloud database, for example, and if the number of the cloud databases of the same type for information transmission with a certain cloud database is 1-5, the cloud database is grade c, if the number of the cloud databases is 6-10, the cloud database is grade b, and if the number of the cloud databases is 11-15, the cloud database is grade a. In this embodiment, the master-slave synchronization of the cloud database refers to the real-time property of the slave instance in the cloud database acquiring data from the master instance.
It should be noted that, since each execution process respectively acquires the running state information of the cloud database corresponding to each execution process, although the acquired state information of the cloud database and the acquired state information of the cloud host are the same in type, the specific numerical values are different. For example, the executing process a acquires information of the mysql cloud database with the ID number of 001 and the cloud host 1 running the mysql cloud database, obtains that the state information of the mysql cloud database is active, obtains that the robustness of the cloud database service is a level a, and obtains that the state information of the cloud host 1 is: processor occupancy of 50%, memory occupancy of 60% and disk occupancy of 45%; the execution process B acquires information of a redis cloud database with the ID number of 002 and the cloud host 2 running the redis cloud database, the state information of the redis cloud database is obtained to be inactive, the service robustness of the cloud database is grade B, and the state information of the cloud host 2 is obtained to be: processor occupancy 80%, memory occupancy 70%, and disk occupancy 65%.
And 103, receiving the running state information collected by each execution process.
Specifically, state information of the cloud database and state information of the cloud host collected by each execution process are received. And the state information of the cloud database is acquired by the execution processes through the ports of the clients, each execution process initializes one port of the client according to the received routing inspection request, and the state information of the cloud database is acquired through the ports of the clients. And the state information of the cloud host running the cloud database is directly collected by the execution process.
It should be noted that, because the control process is the patrol request respectively sent to each execution process, but the operating environments of the cloud databases corresponding to each execution process are different, there is a difference in the completion time for each execution process to acquire the operating state information of the cloud database corresponding to each execution process. Therefore, the time for the control process to receive the running state information collected by each execution process is different, and although the receiving time is different, the time interval for receiving the running state information collected by each execution process is not large.
Compared with the prior art, the inspection method provided by the embodiment has the advantages that the execution processes corresponding to the cloud databases are determined, the execution processes acquire the operation state information of the cloud databases according to the operation mechanisms and the maintenance means of the corresponding cloud databases, and the operation state information of the cloud data corresponding to the acquisition of the execution processes is acquired, so that a plurality of cloud databases with different operation mechanisms and maintenance means can be inspected, the inspection complexity and the inspection difficulty are reduced, and the problems of all the cloud databases can be found in time.
A second embodiment of the present invention relates to a patrol method. The embodiment is further improved on the basis of the first embodiment, and the specific improvement is as follows: after receiving the running state information collected by each execution process, a step of judging whether the parameter value in the running state information reaches a set threshold value is added. The flow of the inspection method in this embodiment is shown in fig. 2. Specifically, in the present embodiment, step 201 to step 205 are included, where step 201 to step 203 are substantially the same as step 101 to step 103 in the first embodiment, and are not described herein again, and differences are mainly introduced below, and technical details that are not described in detail in the present embodiment may be referred to the inspection method provided in the first embodiment, and are not described herein again.
After step 203, step 204 is performed.
In step 204, it is determined whether the parameter value in the operation status information reaches a set threshold, if yes, step 205 is executed, otherwise, the inspection method is ended.
It should be noted that, after receiving the running state information collected by each execution process, the control process compares the parameter value in each received running state information with the set threshold, that is, determines whether the parameter value reaches the set threshold. However, since the service types of each cloud database are different, the thresholds corresponding to the running state information acquired for each execution process may be different, and the setting of the thresholds may be set according to the requirements of the user on the cloud database service.
In a specific implementation, the execution process a acquires information of the mysql cloud database with the ID number of 001 and the cloud host 1 running the mysql cloud database, obtains that the state information of the mysql cloud database is active, obtains a service robustness level of the cloud database, and obtains the state information of the cloud host 1 as follows: processor occupancy of 50%, memory occupancy of 60%, and disk occupancy of 45%. After receiving the running state information of the cloud database collected by the execution process A, the control process compares the running state information with a threshold value set by a user and aiming at mysql service. Setting the state information parameter value requirement of a cloud database aiming at mysql service as active, the robustness requirement grade of the cloud database service as a, and the parameter value requirement of a cloud host running the mysql cloud database that the processor occupancy is 55%, the memory occupancy is 55% and the disk occupancy is 55%. The control process judges the running state information acquired by the execution process A, and determines that the parameter value of the state information of the mysql cloud database reaches a set threshold value and the disk occupancy of the state information of the cloud host 1 reaches the set threshold value. Similarly, there may be thresholds set for other cloud databases, such as the redis cloud database, for the redis cloud database service. Of course, if the user has the same requirement for each cloud database service, the threshold corresponding to the running state information collected for each execution process may also be set to be the same, and the specific setting value of the threshold is not limited in this embodiment.
In step 205, an alarm prompt is issued.
It should be noted that, after determining that the parameter value in the running state information reaches the set threshold value, the control process sends an alarm prompt, and the specific alarm manner may be to alarm by triggering a mail.
Specifically, for the received running state information acquired by each execution process, as long as any one parameter value included in the state information of the cloud database and the state information of the cloud host reaches a set threshold value, an alarm prompt is sent, for example, an alarm is given through a mail, and the running state information acquired by each execution process is specifically described in the mail.
The execution process can also output the alarm prompt to the monitoring component in the cloud platform, and the monitoring component sends the alarm prompt, so that the specific way of sending the alarm prompt is not limited in the embodiment, and the execution process is within the protection scope of the application as long as the execution process can play a role in prompting a user.
Compared with the prior art, the inspection method provided by the embodiment has the advantages that the execution processes corresponding to the cloud databases are determined, the execution processes acquire the operation state information of the cloud databases according to the operation mechanisms and the maintenance means of the corresponding cloud databases, and the operation state information of the cloud data corresponding to the acquisition of the execution processes is acquired, so that a plurality of cloud databases with different operation mechanisms and maintenance means can be inspected, the inspection complexity and the inspection difficulty are reduced, and the problems of all the cloud databases can be found in time. And after receiving the running state information acquired by each execution process, judging whether the parameter value in the running state information reaches a set threshold value or not, and sending an alarm prompt after determining that the parameter value reaches the set threshold value, so that a user can timely maintain the cloud database or the cloud host according to the alarm prompt.
The steps of the above methods are divided for clarity, and the implementation may be combined into one step or split some steps, and the steps are divided into multiple steps, so long as the same logical relationship is included, which are all within the protection scope of the present patent; it is within the scope of the patent to add insignificant modifications to the algorithms or processes or to introduce insignificant design changes to the core design without changing the algorithms or processes.
The third embodiment of the invention relates to an inspection device, which has a specific structure as shown in fig. 3.
As shown in fig. 3, the inspection device includes: a determination module 301, a transmission module 302 and a reception module 303.
The determining module 301 is configured to determine an execution process corresponding to each cloud database.
A sending module 302, configured to send an inspection request to each execution process, where each execution process collects running state information of the corresponding cloud database according to the received inspection request.
The receiving module 303 is configured to receive the running state information collected by each execution process.
It should be understood that this embodiment is an example of the apparatus corresponding to the first embodiment, and may be implemented in cooperation with the first embodiment. The related technical details mentioned in the first embodiment are still valid in this embodiment, and are not described herein again in order to reduce repetition. Accordingly, the related-art details mentioned in the present embodiment can also be applied to the first embodiment.
A fourth embodiment of the present invention relates to an inspection apparatus. This embodiment is substantially the same as the third embodiment, and the specific configuration is as shown in fig. 4. Wherein, the main improvement lies in: the fourth embodiment is added with a judging module 304 and an alarming module 305 on the basis of the third embodiment.
The determining module 301 is configured to determine an execution process corresponding to each cloud database.
A sending module 302, configured to send an inspection request to each execution process, where each execution process collects running state information of the corresponding cloud database according to the received inspection request.
The receiving module 303 is configured to receive the running state information collected by each execution process.
And the judging module 304 is configured to judge whether a parameter value in the operation state information reaches a set threshold.
And the alarm module 305 is used for sending out an alarm prompt when the parameter value in the running state reaches a set threshold value.
It should be understood that this embodiment is an example of the apparatus corresponding to the second embodiment, and that this embodiment can be implemented in cooperation with the second embodiment. The related technical details mentioned in the second embodiment are still valid in this embodiment, and are not described herein again in order to reduce repetition. Accordingly, the related-art details mentioned in the present embodiment can also be applied to the second embodiment.
It should be noted that each module referred to in this embodiment is a logical module, and in practical applications, one logical unit may be one physical unit, may be a part of one physical unit, and may be implemented by a combination of multiple physical units. In addition, in order to highlight the innovative part of the present invention, elements that are not so closely related to solving the technical problems proposed by the present invention are not introduced in the present embodiment, but this does not indicate that other elements are not present in the present embodiment.
A fifth embodiment of the present invention relates to a cloud server, as shown in fig. 5, including at least one processor 501; and a memory 502 communicatively coupled to the at least one processor 501; the memory 502 stores instructions executable by the at least one processor 501, and the instructions are executed by the at least one processor 501, so that the at least one processor 501 can execute the inspection method in the above embodiments.
In this embodiment, the processor 501 is a Central Processing Unit (CPU), and the Memory 502 is a Random Access Memory (RAM). The processor 501 and the memory 502 may be connected by a bus or other means, and fig. 5 illustrates the connection by the bus as an example. The memory 502 is a non-volatile computer-readable storage medium, and may be used to store non-volatile software programs, non-volatile computer-executable programs, and modules, such as the programs for implementing the inspection tour method in the embodiments of the present application, in the memory 502. The processor 501 executes various functional applications and data processing of the device by executing nonvolatile software programs, instructions, and modules stored in the memory 502, that is, the patrol method described above is implemented.
The memory 502 may include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required for at least one function; the storage data area may store a list of options, etc. Further, the memory may include high speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other non-volatile solid state storage device. In some embodiments, memory 502 may optionally include memory located remotely from processor 501, which may be connected to an external device via a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.
One or more program modules are stored in the memory 502 and, when executed by the one or more processors 501, perform the patrol method of any of the method embodiments described above.
The product can execute the method provided by the embodiment of the application, has corresponding functional modules and beneficial effects of the execution method, and can refer to the method provided by the embodiment of the application without detailed technical details in the embodiment.
A sixth embodiment of the present application relates to a computer-readable storage medium having stored thereon a computer program which, when executed by a processor, is capable of implementing the inspection method according to any of the method embodiments of the present invention.
Those skilled in the art will understand that all or part of the steps in the method according to the above embodiments may be implemented by a program instructing related hardware to complete, where the program is stored in a storage medium and includes several instructions to enable a device (which may be a single chip, a chip, etc.) or a processor (processor) to execute all or part of the steps in the method according to the embodiments of the present application. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
It will be understood by those of ordinary skill in the art that the foregoing embodiments are specific examples for carrying out the invention, and that various changes in form and details may be made therein without departing from the spirit and scope of the invention in practice.

Claims (10)

1. A routing inspection method is characterized by comprising the following steps:
determining an execution process corresponding to each cloud database;
respectively sending an inspection request to each execution process, wherein each execution process acquires the running state information of the corresponding cloud database according to the received inspection request;
and receiving the running state information collected by each execution process.
2. The inspection method according to claim 1, wherein determining the execution process corresponding to each cloud database specifically includes:
acquiring identity information of each cloud database;
and querying a matching list according to the identity information of the cloud databases, and determining an execution process corresponding to each cloud database according to a query result, wherein the matching list stores the corresponding relation between the identity information of the cloud databases and the execution process.
3. The inspection method according to any one of claims 1 to 2, wherein the operating state information includes: state information of a cloud database and state information of a cloud host running the cloud database.
4. The inspection method according to claim 3, wherein the receiving the running state information collected by each execution process specifically includes:
receiving state information of the cloud database and state information of the cloud host acquired by each execution process, wherein the state information of the cloud database is acquired by the execution processes through ports of clients, and each execution process initializes one port of the client according to the received inspection request and acquires the state information of the cloud database through the port of the client.
5. The inspection method according to claim 4, wherein after receiving the running state information collected by each execution process, the method further comprises:
and judging whether the parameter value in the running state information reaches a set threshold value, and if so, sending an alarm prompt.
6. The inspection method according to claim 5, wherein the status information of the cloud host includes processor occupancy, memory occupancy and disk occupancy of the cloud host;
the state information of the cloud database comprises the activity of the cloud database, the service robustness of the cloud database and the master-slave synchronization of the cloud database.
7. An inspection device, comprising:
the determining module is used for determining the execution process corresponding to each cloud database;
the sending module is used for sending inspection requests to the execution processes respectively, wherein the execution processes respectively collect the running state information of the corresponding cloud database according to the received inspection requests;
and the receiving module is used for receiving the running state information acquired by each execution process.
8. The inspection device according to claim 7, wherein the determination module is specifically configured to:
acquiring identity information of each cloud database;
and querying a matching list according to the identity information of the cloud databases, and determining an execution process corresponding to each cloud database according to a query result, wherein the matching list stores the corresponding relation between the identity information of the cloud databases and the execution process.
9. A cloud server, comprising:
at least one processor; and the number of the first and second groups,
a memory communicatively coupled to the at least one processor; wherein the content of the first and second substances,
the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the inspection method of any one of claims 1 to 6.
10. A computer-readable storage medium storing a computer program, wherein the computer program, when executed by a processor, implements the inspection method of any one of claims 1 to 6.
CN201810986011.XA 2018-08-28 2018-08-28 Inspection method, related device and readable storage medium Pending CN110868313A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810986011.XA CN110868313A (en) 2018-08-28 2018-08-28 Inspection method, related device and readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810986011.XA CN110868313A (en) 2018-08-28 2018-08-28 Inspection method, related device and readable storage medium

Publications (1)

Publication Number Publication Date
CN110868313A true CN110868313A (en) 2020-03-06

Family

ID=69651238

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810986011.XA Pending CN110868313A (en) 2018-08-28 2018-08-28 Inspection method, related device and readable storage medium

Country Status (1)

Country Link
CN (1) CN110868313A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109684160A (en) * 2018-09-07 2019-04-26 平安科技(深圳)有限公司 Database method for inspecting, device, equipment and computer readable storage medium
CN112486966A (en) * 2020-11-26 2021-03-12 中国国家铁路集团有限公司 Expired data cleaning method and device and electronic equipment
CN113487286A (en) * 2021-07-14 2021-10-08 重庆大宽科技发展有限公司 Safety quality inspection system, method, computer equipment and storage medium
CN117135074A (en) * 2023-08-29 2023-11-28 铵泰克(北京)科技有限公司 TNA equipment based on FPGA and communication method thereof

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104657250A (en) * 2014-12-16 2015-05-27 无锡华云数据技术服务有限公司 Monitoring method for monitoring performance of cloud host
CN106407830A (en) * 2015-07-29 2017-02-15 阿里巴巴集团控股有限公司 Detection method and device of cloud-based database
CN107239379A (en) * 2017-05-10 2017-10-10 杭州铭师堂教育科技发展有限公司 Database performance Automatic monitoring systems based on salt
CN107800589A (en) * 2017-10-31 2018-03-13 普天东方通信集团有限公司 To the monitoring method of cloud platform access device, device and its cloud platform used

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104657250A (en) * 2014-12-16 2015-05-27 无锡华云数据技术服务有限公司 Monitoring method for monitoring performance of cloud host
CN106407830A (en) * 2015-07-29 2017-02-15 阿里巴巴集团控股有限公司 Detection method and device of cloud-based database
CN107239379A (en) * 2017-05-10 2017-10-10 杭州铭师堂教育科技发展有限公司 Database performance Automatic monitoring systems based on salt
CN107800589A (en) * 2017-10-31 2018-03-13 普天东方通信集团有限公司 To the monitoring method of cloud platform access device, device and its cloud platform used

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109684160A (en) * 2018-09-07 2019-04-26 平安科技(深圳)有限公司 Database method for inspecting, device, equipment and computer readable storage medium
CN112486966A (en) * 2020-11-26 2021-03-12 中国国家铁路集团有限公司 Expired data cleaning method and device and electronic equipment
CN113487286A (en) * 2021-07-14 2021-10-08 重庆大宽科技发展有限公司 Safety quality inspection system, method, computer equipment and storage medium
CN113487286B (en) * 2021-07-14 2023-04-07 重庆大宽科技发展有限公司 Safety quality inspection system, method, computer equipment and storage medium
CN117135074A (en) * 2023-08-29 2023-11-28 铵泰克(北京)科技有限公司 TNA equipment based on FPGA and communication method thereof
CN117135074B (en) * 2023-08-29 2024-05-28 铵泰克(北京)科技有限公司 TNA equipment based on FPGA and communication method thereof

Similar Documents

Publication Publication Date Title
CN110868313A (en) Inspection method, related device and readable storage medium
CN108566290B (en) Service configuration management method, system, storage medium and server
CN110489391B (en) Data processing method and related equipment
CN110572443B (en) Long connection state updating method, server and storage medium
US10343630B2 (en) Monitoring method and apparatus
CN111143163B (en) Data monitoring method, device, computer equipment and storage medium
CN110888783A (en) Monitoring method and device of micro-service system and electronic equipment
US10091110B2 (en) Edge-based load shedding system for fast data analysis and operating method thereof
CN107832169B (en) Memory data migration method and device, terminal equipment and storage medium
CN112199266B (en) Log transmission method and system for vehicle-mounted machine system, vehicle and storage medium
WO2019119322A1 (en) Test system and method, and related device
CN109151075B (en) Log processing method and device and electronic equipment
CN111143165A (en) Monitoring method and device
GB2553784A (en) Management of log data in electronic devices
CN109218407B (en) Code management and control method based on log monitoring technology and terminal equipment
CN114675983A (en) Business data processing method and device, storage medium and electronic equipment
CN110275793B (en) Detection method and equipment for MongoDB data fragment cluster
CN114157500A (en) Data packet processing method, electronic device and storage medium
CN111159009B (en) Pressure testing method and device for log service system
CN108880913B (en) traffic characteristic management method and device and central node server
CN110798492B (en) Data storage method and device and data processing system
CN113535344A (en) Network data processing method and device, server and storage medium
CN111092956A (en) Resource synchronization method, device, storage medium and equipment
CN110765089A (en) Distributed equipment and log recording method, device and storage medium thereof
US10674337B2 (en) Method and device for processing operation for device peripheral

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20210804

Address after: 518000 b1-1302, building B, Kexing Science Park, No. 15, Keyuan Road, Science Park community, Yuehai street, Nanshan District, Shenzhen, Guangdong

Applicant after: Shenzhen aijieyun Technology Co.,Ltd.

Address before: 5 / F, building a, Guangqi Cultural Plaza, 2899 a, Xietu Road, Xuhui District, Shanghai 200030

Applicant before: WANGSU SCIENCE & TECHNOLOGY Co.,Ltd.

TA01 Transfer of patent application right
RJ01 Rejection of invention patent application after publication

Application publication date: 20200306

RJ01 Rejection of invention patent application after publication