CN111541563A - System and method for orderly effective configuration - Google Patents

System and method for orderly effective configuration Download PDF

Info

Publication number
CN111541563A
CN111541563A CN202010306525.3A CN202010306525A CN111541563A CN 111541563 A CN111541563 A CN 111541563A CN 202010306525 A CN202010306525 A CN 202010306525A CN 111541563 A CN111541563 A CN 111541563A
Authority
CN
China
Prior art keywords
configuration
changed
validation
module
configuration file
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010306525.3A
Other languages
Chinese (zh)
Inventor
张晓飞
吴道远
刘子夜
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chengdu Qianli Network Technology Co ltd
Original Assignee
Chengdu Qianli Network Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chengdu Qianli Network Technology Co ltd filed Critical Chengdu Qianli Network Technology Co ltd
Priority to CN202010306525.3A priority Critical patent/CN111541563A/en
Publication of CN111541563A publication Critical patent/CN111541563A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0803Configuration setting
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/02Standardisation; Integration
    • H04L41/0246Exchanging or transporting network management information using the Internet; Embedding network management web servers in network elements; Web-services-based protocols
    • H04L41/0253Exchanging or transporting network management information using the Internet; Embedding network management web servers in network elements; Web-services-based protocols using browsers or web-pages for accessing management information

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The invention provides a system and a method for orderly effective configuration, belonging to the field of configuration effectiveness. In order to solve the problems that the current configuration method can not independently take effect on the changed configuration and the configuration which is not changed does not need to be taken effect again, the invention comprises the following steps: firstly, loading each configuration file into a storage module; secondly, receiving configuration through a configuration module, and storing the received configuration into a corresponding configuration file; then, comparing whether the current configuration and the previous configuration are changed or not through a detection module, if so, recording, and after the comparison of all the configuration files is finished, uniformly sending all the changed configuration file names to an effective module; and finally, when the validation module receives the changed configuration file names, sequentially checking whether the changed configuration file names are included in the changed configuration file names according to the validation sequence of the configuration files, and if so, executing the corresponding BIN file to carry out configuration validation. The invention decouples the read-write and the effective configuration, and can independently take effect of the changed configuration.

Description

System and method for orderly effective configuration
Technical Field
The invention relates to the field of configuration validation, in particular to a system and a method for orderly validation configuration.
Background
At present, the configuration needs to be issued to the corresponding device from the local web or from the cloud and becomes effective, and it is now mainstream that the configuration of the cloud and the local web becomes effective.
In the existing configuration validation scheme, all configurations are in one configuration file, so that issuing one configuration validates all configurations again, for example, after clicking a save button from a local web, a system may need to be reloaded once to restart each program to validate all configurations, which greatly reduces efficiency.
Therefore, in the existing configuration validation scheme, the changed configuration cannot be validated independently, the configuration without being changed is not validated again, and the coupling of the configuration and the validation module is too strong to be separated, so that the validation code needs to be recoded when the upper layer WEBSERVER needs to be replaced.
Disclosure of Invention
The invention aims to provide a system and a method for orderly effective configuration, which can solve the problems that the current configuration method can not independently take effect on the configuration which is changed and the configuration which is not changed does not need to take effect again.
The invention solves the technical problem, and adopts the technical scheme that: the system for orderly effective configuration comprises a storage module, a configuration module, a detection module and an effective module, wherein the configuration module is connected with the storage module, and the configuration module and the effective module are both connected with the detection module;
the storage module is used for storing each configuration file;
the configuration module is used for receiving configuration and storing the configuration into a corresponding configuration file;
the detection module is used for comparing whether the current configuration and the previous configuration are changed or not, if so, the detection module records that all changed configuration file names are sent to the validation module in a unified way after all the configuration files are compared;
and the validation module is used for sequentially checking whether the changed configuration file names are contained in the changed configuration file names according to the validation sequence of the configuration files when the changed configuration file names are received, and executing the corresponding BIN files to carry out configuration validation if the changed configuration file names are contained in the changed configuration file names.
Further, the configuration is from the cloud or the local web.
Further, the configuration includes a plurality of json files.
Further, according to the strength of the correlation of each configuration, the configuration with strong correlation is stored in different configuration files, and the configuration without correlation and with weak correlation is stored in different configuration files.
Further, different profiles have different names, including lanConfig, wanConfig, ntpConfig, and sysConfig.
Further, when the detection module compares whether the current configuration and the previous configuration are changed, if there is a change, the flag bit of the changed configuration is set to 1, and the change flag bit of the configuration file corresponding to the changed configuration is also set to 1, and the validation module is notified.
Further, when the validation module receives the changed configuration file name, it sequentially checks whether the configuration file corresponding to each changed configuration is changed according to the configuration file validation sequence, if the changed flag bit of the configuration file is 1, the configuration file is changed, and when the configuration file is changed, it sequentially calls the validation BIN file corresponding to the changed configuration to validate the configuration according to the configuration file validation sequence.
The method for orderly effective configuration is applied to the system for orderly effective configuration and comprises the following steps:
step 1, loading each configuration file into a storage module;
step 2, receiving configuration through a configuration module, and storing the received configuration into a corresponding configuration file;
step 3, comparing whether the current configuration and the previous configuration are changed or not through the detection module, if so, recording, and after the comparison of all the configuration files is finished, uniformly sending the names of the changed configuration files to the validation module;
and 4, when the validation module receives the changed configuration file names, sequentially checking whether the changed configuration file names are contained in the changed configuration file names according to the validation sequence of the configuration files, and if so, executing the corresponding BIN files to carry out configuration validation.
Further, in step 3, when the detection module compares the current configurations with the previous configurations for change, if there is a change, the flag bit of the changed configuration is set to 1, and the change flag bit of the configuration file corresponding to the configuration depending on the change is also set to 1, and the validation module is notified.
Further, in step 4, when the validation module receives the changed names of the configuration files, it sequentially checks whether the configuration files corresponding to the changed configurations have a change according to the validation sequence of the configuration files, if the changed flag bit of the configuration file is 1, the configuration file has a change, and when the configuration file has a change, the validation BIN files corresponding to the changed configurations are sequentially called to validate the configurations according to the validation sequence of the configuration files.
The system and the method for orderly configuration in effect have the advantages that reading and writing and configuration in effect can be decoupled, configuration with variation can be independently performed in effect, configuration without variation in effect is not needed, and configuration efficiency is greatly improved.
Drawings
FIG. 1 is a flow chart of a method for ordered validation configuration in accordance with the present invention.
Detailed Description
The technical scheme of the invention is described in detail in the following with reference to the accompanying drawings.
The invention provides a system for orderly effective configuration, which comprises a storage module, a configuration module, a detection module and an effective module, wherein the configuration module is connected with the storage module, and the configuration module and the effective module are both connected with the detection module.
In the system, the storage module is used for storing each configuration file; the configuration module is used for receiving configuration and storing the configuration into a corresponding configuration file; the detection module is used for comparing whether the current configuration and the previous configuration are changed or not, if so, the detection module records that all changed configuration file names are sent to the validation module in a unified way after all the configuration files are compared; and the validation module is used for sequentially checking whether the changed configuration file names are contained in the changed configuration file names according to the validation sequence of the configuration files when the changed configuration file names are received, and executing the corresponding BIN files to carry out configuration validation if the changed configuration file names are contained in the changed configuration file names.
In practical applications, the configuration may come from the cloud or the local web. Also, the configuration may include a plurality of json files.
Moreover, according to the strength of the correlation of each configuration, the configuration with strong correlation can be stored in the same configuration file, and the configuration without correlation and with weak correlation can be stored in different configuration files.
Different configuration file names are different, and the names of the configuration files comprise lanConfig, wanConfig, ntpConfig, sysConfig and the like.
In the system, when the detection module compares whether the current configuration and the previous configuration are changed, if so, the flag bit of the changed configuration is set to be 1, the change flag bit of the configuration file corresponding to the changed configuration is also set to be 1, and the validation module is informed; when the validation module receives the changed configuration file names, whether the configuration files corresponding to the changed configurations are changed or not is sequentially checked according to the validation sequence of the configuration files, if the changed flag bit of the configuration files is 1, the configuration files are changed, and when the configuration files are changed, the validation BIN files corresponding to the changed configurations are sequentially called according to the validation sequence of the configuration files to carry out configuration validation.
In addition, the present invention also provides a method for orderly effective configuration, the flow chart of which is shown in fig. 1, wherein the method is applied to the system for orderly effective configuration, and comprises the following steps:
step 1, loading each configuration file into a storage module;
step 2, receiving configuration through a configuration module, and storing the received configuration into a corresponding configuration file;
step 3, comparing whether the current configuration and the previous configuration are changed or not through the detection module, if so, recording, and after the comparison of all the configuration files is finished, uniformly sending the names of the changed configuration files to the validation module;
and 4, when the validation module receives the changed configuration file names, sequentially checking whether the changed configuration file names are contained in the changed configuration file names according to the validation sequence of the configuration files, and if so, executing the corresponding BIN files to carry out configuration validation. In step 3 of the method, when the detection module compares whether the current configurations and the previous configurations have changed, if there is a change, the flag bit of the changed configuration is set to 1, and the changed flag bit of the configuration file corresponding to the changed configuration is also set to 1, and the validation module is notified.
In step 3, when the detection module compares whether the current configuration and the previous configuration are changed, if so, setting the flag bit of the changed configuration to be 1, setting the change flag bit of the configuration file corresponding to the changed configuration to be 1, and notifying the validation module.
In step 4, when the validation module receives the changed configuration file name, sequentially checking whether the configuration file corresponding to each changed configuration is changed according to the configuration file validation sequence, if the changed flag bit of the configuration file is 1, the configuration file is changed, and when the configuration file is changed, sequentially calling the validation BIN file corresponding to the changed configuration for configuration validation according to the configuration file validation sequence.
Examples
The embodiment of the invention takes the method of ordered effective configuration as an example for detailed description.
The method for orderly configuration in effect of the embodiment comprises the following steps:
step 1, loading each configuration file into a storage module.
Step 2, the configuration module receives the configuration from the cloud or the local web, and stores the received configuration in the corresponding configuration file.
Step 3, comparing whether the current configurations and the previous configurations are changed or not through the detection module, if so, recording, setting the flag bit of the changed configurations to be 1, and setting the change flag bit of the configuration file corresponding to the changed configurations to be 1, such as: when the configuration file connecting the extranet connection changes [ wanConfig ], vpn needs to be revalidated depending on the extranet change, so that the flag bits of vpncconfig and wanConfig are both set to 1.
After all the configuration files are compared, all the changed configuration file names are sent to the validation module in a unified mode.
And 4, when the validation module receives the changed configuration file names, sequentially checking whether the configuration files corresponding to the changed configurations are changed or not according to the validation sequence of the configuration files, if the changed zone bit of the configuration files is 1, changing the configuration files, and when the configuration files are changed, sequentially calling the validation BIN files corresponding to the changed configurations for configuration validation according to the validation sequence of the configuration files.
In the embodiment, only the configuration with the effective name of ntp server is effective, and other configurations without change are not effective, so that the configuration efficiency is greatly improved.

Claims (10)

1. The system for orderly effective configuration is characterized by comprising a storage module, a configuration module, a detection module and an effective module, wherein the configuration module is connected with the storage module, and the configuration module and the effective module are both connected with the detection module;
the storage module is used for storing each configuration file;
the configuration module is used for receiving configuration and storing the configuration into a corresponding configuration file;
the detection module is used for comparing whether the current configuration and the previous configuration are changed or not, if so, the detection module records that all changed configuration file names are sent to the validation module in a unified way after all the configuration files are compared;
and the validation module is used for sequentially checking whether the changed configuration file names are contained in the changed configuration file names according to the validation sequence of the configuration files when the changed configuration file names are received, and executing the corresponding BIN files to carry out configuration validation if the changed configuration file names are contained in the changed configuration file names.
2. The system of ordered validation configuration of claim 1, wherein the configuration is from a cloud or a local web.
3. The system of ordered validation configurations of claim 1, wherein the configuration comprises a plurality of json files.
4. The system according to claim 1, wherein the configurations with strong correlation are stored in the same configuration file, and the configurations without and with weak correlation are stored in different configuration files according to the strength of correlation of each configuration.
5. The system of ordered validation configurations of claim 4, wherein different configuration file names are different, said configuration file names comprising lanConfig, wanConfig, ntpConfig, and sysConfig.
6. The system according to claim 1, wherein when the detection module compares the current configurations with the previous configurations, if there is a change, the flag bit of the changed configuration is set to 1, and the change flag bit of the configuration file corresponding to the changed configuration is also set to 1, and the validation module is notified.
7. The system according to claim 1 or 6, wherein when the validating module receives the changed names of the configuration files, it sequentially checks whether there is a change in the configuration files corresponding to the changed configurations according to the validation sequence of the configuration files, if the flag bit of the change in the configuration files is 1, the configuration files are changed, and when there is a change in the configuration files, the validating BIN files corresponding to the changed configurations are sequentially called for validation according to the validation sequence of the configuration files.
8. The method for ordered validation configuration, applied to the system for ordered validation configuration according to any one of claims 1 to 7, is characterized by comprising the following steps:
step 1, loading each configuration file into a storage module;
step 2, receiving configuration through a configuration module, and storing the received configuration into a corresponding configuration file;
step 3, comparing whether the current configuration and the previous configuration are changed or not through the detection module, if so, recording, and after the comparison of all the configuration files is finished, uniformly sending the names of the changed configuration files to the validation module;
and 4, when the validation module receives the changed configuration file names, sequentially checking whether the changed configuration file names are contained in the changed configuration file names according to the validation sequence of the configuration files, and if so, executing the corresponding BIN files to carry out configuration validation.
9. The method according to claim 8, wherein in step 3, when the detection module compares the current configurations with the previous configurations, if there is a change, the flag bit of the changed configuration is set to 1, and the change flag bit of the configuration file corresponding to the changed configuration is also set to 1, and the validation module is notified.
10. The method for orderly validating configuration according to claim 8 or 9, wherein in step 4, when the validating module receives the changed name of the configuration file, it sequentially checks whether the configuration file corresponding to each changed configuration is changed according to the validation sequence of the configuration file, if the flag bit of the change of the configuration file is 1, the configuration file is changed, and if the configuration file is changed, the validation BIN file corresponding to the changed configuration is sequentially called for validation according to the validation sequence of the configuration file.
CN202010306525.3A 2020-04-17 2020-04-17 System and method for orderly effective configuration Pending CN111541563A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010306525.3A CN111541563A (en) 2020-04-17 2020-04-17 System and method for orderly effective configuration

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010306525.3A CN111541563A (en) 2020-04-17 2020-04-17 System and method for orderly effective configuration

Publications (1)

Publication Number Publication Date
CN111541563A true CN111541563A (en) 2020-08-14

Family

ID=71970592

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010306525.3A Pending CN111541563A (en) 2020-04-17 2020-04-17 System and method for orderly effective configuration

Country Status (1)

Country Link
CN (1) CN111541563A (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104199666A (en) * 2014-09-09 2014-12-10 北京京东尚科信息技术有限公司 Dynamic configuration method and device for application program
CN104717182A (en) * 2013-12-12 2015-06-17 华为技术有限公司 Security policy deployment method and device for network firewall
WO2017036335A1 (en) * 2015-09-01 2017-03-09 阿里巴巴集团控股有限公司 Code submitting method and device
CN110147241A (en) * 2019-04-16 2019-08-20 平安普惠企业管理有限公司 Program configures update method, electronic device, computer equipment and storage medium
CN110224878A (en) * 2019-06-28 2019-09-10 北京金山云网络技术有限公司 Gateway configures update method, device and server

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104717182A (en) * 2013-12-12 2015-06-17 华为技术有限公司 Security policy deployment method and device for network firewall
CN104199666A (en) * 2014-09-09 2014-12-10 北京京东尚科信息技术有限公司 Dynamic configuration method and device for application program
WO2017036335A1 (en) * 2015-09-01 2017-03-09 阿里巴巴集团控股有限公司 Code submitting method and device
CN110147241A (en) * 2019-04-16 2019-08-20 平安普惠企业管理有限公司 Program configures update method, electronic device, computer equipment and storage medium
CN110224878A (en) * 2019-06-28 2019-09-10 北京金山云网络技术有限公司 Gateway configures update method, device and server

Similar Documents

Publication Publication Date Title
EP4155966A1 (en) Blockchain data indexing method, and blockchain data storage method
CN100375038C (en) Finally agent optimization method and system of source in reorder two-stage refering
CN108985934B (en) Block chain modification method and device
CN105279089A (en) Method and device for obtaining page element
CN108958653A (en) A kind of space reclamation method, system and relevant apparatus based on bottom aggregate file
CN107016075A (en) Company-data synchronous method and device
CN107783850A (en) A kind of node tree chooses analytic method, device, server and the system of record
CN110209736A (en) Device, method and the storage medium of block chain data processing
CN114564500A (en) Method and system for implementing structured data storage and query in block chain system
CN107688624B (en) Log index construction method and device
CN114625804A (en) Big data-based user behavior data processing method and system and cloud platform
CN111541563A (en) System and method for orderly effective configuration
CN107274284B (en) Bidirectional matching method and device and transaction system
CN105278993B (en) A kind of drive module upgrade method and device based on linux system
CN114937316B (en) Software fault detection method, device, equipment and medium
CN115756765A (en) Distributed transaction processing method and device
US20070239794A1 (en) Method and system for updating logical information in databases
CN109978678B (en) Parameter management method and related equipment
CN114511314A (en) Payment account management method and device, computer equipment and storage medium
CN106776296A (en) Startup method, device and starting device that coverage rate is detected
CN112486506B (en) NAND Flash burning method and device
CN110932884B (en) Method and device for adding multiple networks to cloud physical machine
CN112783751A (en) Incremental code scanning method and device, electronic equipment and storage medium
CN109325149A (en) XML message search method and device
CN114154944B (en) Business auditing method, equipment and computer readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20200814

RJ01 Rejection of invention patent application after publication