CN111541563A - System and method for orderly effective configuration - Google Patents
System and method for orderly effective configuration Download PDFInfo
- Publication number
- CN111541563A CN111541563A CN202010306525.3A CN202010306525A CN111541563A CN 111541563 A CN111541563 A CN 111541563A CN 202010306525 A CN202010306525 A CN 202010306525A CN 111541563 A CN111541563 A CN 111541563A
- Authority
- CN
- China
- Prior art keywords
- configuration
- changed
- validation
- module
- configuration file
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 18
- 238000010200 validation analysis Methods 0.000 claims abstract description 77
- 238000001514 detection method Methods 0.000 claims abstract description 24
- 230000000694 effects Effects 0.000 abstract description 10
- 230000008878 coupling Effects 0.000 description 1
- 238000010168 coupling process Methods 0.000 description 1
- 238000005859 coupling reaction Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/08—Configuration management of networks or network elements
- H04L41/0803—Configuration setting
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/02—Standardisation; Integration
- H04L41/0246—Exchanging or transporting network management information using the Internet; Embedding network management web servers in network elements; Web-services-based protocols
- H04L41/0253—Exchanging or transporting network management information using the Internet; Embedding network management web servers in network elements; Web-services-based protocols using browsers or web-pages for accessing management information
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
The invention provides a system and a method for orderly effective configuration, belonging to the field of configuration effectiveness. In order to solve the problems that the current configuration method can not independently take effect on the changed configuration and the configuration which is not changed does not need to be taken effect again, the invention comprises the following steps: firstly, loading each configuration file into a storage module; secondly, receiving configuration through a configuration module, and storing the received configuration into a corresponding configuration file; then, comparing whether the current configuration and the previous configuration are changed or not through a detection module, if so, recording, and after the comparison of all the configuration files is finished, uniformly sending all the changed configuration file names to an effective module; and finally, when the validation module receives the changed configuration file names, sequentially checking whether the changed configuration file names are included in the changed configuration file names according to the validation sequence of the configuration files, and if so, executing the corresponding BIN file to carry out configuration validation. The invention decouples the read-write and the effective configuration, and can independently take effect of the changed configuration.
Description
Technical Field
The invention relates to the field of configuration validation, in particular to a system and a method for orderly validation configuration.
Background
At present, the configuration needs to be issued to the corresponding device from the local web or from the cloud and becomes effective, and it is now mainstream that the configuration of the cloud and the local web becomes effective.
In the existing configuration validation scheme, all configurations are in one configuration file, so that issuing one configuration validates all configurations again, for example, after clicking a save button from a local web, a system may need to be reloaded once to restart each program to validate all configurations, which greatly reduces efficiency.
Therefore, in the existing configuration validation scheme, the changed configuration cannot be validated independently, the configuration without being changed is not validated again, and the coupling of the configuration and the validation module is too strong to be separated, so that the validation code needs to be recoded when the upper layer WEBSERVER needs to be replaced.
Disclosure of Invention
The invention aims to provide a system and a method for orderly effective configuration, which can solve the problems that the current configuration method can not independently take effect on the configuration which is changed and the configuration which is not changed does not need to take effect again.
The invention solves the technical problem, and adopts the technical scheme that: the system for orderly effective configuration comprises a storage module, a configuration module, a detection module and an effective module, wherein the configuration module is connected with the storage module, and the configuration module and the effective module are both connected with the detection module;
the storage module is used for storing each configuration file;
the configuration module is used for receiving configuration and storing the configuration into a corresponding configuration file;
the detection module is used for comparing whether the current configuration and the previous configuration are changed or not, if so, the detection module records that all changed configuration file names are sent to the validation module in a unified way after all the configuration files are compared;
and the validation module is used for sequentially checking whether the changed configuration file names are contained in the changed configuration file names according to the validation sequence of the configuration files when the changed configuration file names are received, and executing the corresponding BIN files to carry out configuration validation if the changed configuration file names are contained in the changed configuration file names.
Further, the configuration is from the cloud or the local web.
Further, the configuration includes a plurality of json files.
Further, according to the strength of the correlation of each configuration, the configuration with strong correlation is stored in different configuration files, and the configuration without correlation and with weak correlation is stored in different configuration files.
Further, different profiles have different names, including lanConfig, wanConfig, ntpConfig, and sysConfig.
Further, when the detection module compares whether the current configuration and the previous configuration are changed, if there is a change, the flag bit of the changed configuration is set to 1, and the change flag bit of the configuration file corresponding to the changed configuration is also set to 1, and the validation module is notified.
Further, when the validation module receives the changed configuration file name, it sequentially checks whether the configuration file corresponding to each changed configuration is changed according to the configuration file validation sequence, if the changed flag bit of the configuration file is 1, the configuration file is changed, and when the configuration file is changed, it sequentially calls the validation BIN file corresponding to the changed configuration to validate the configuration according to the configuration file validation sequence.
The method for orderly effective configuration is applied to the system for orderly effective configuration and comprises the following steps:
step 1, loading each configuration file into a storage module;
step 2, receiving configuration through a configuration module, and storing the received configuration into a corresponding configuration file;
step 3, comparing whether the current configuration and the previous configuration are changed or not through the detection module, if so, recording, and after the comparison of all the configuration files is finished, uniformly sending the names of the changed configuration files to the validation module;
and 4, when the validation module receives the changed configuration file names, sequentially checking whether the changed configuration file names are contained in the changed configuration file names according to the validation sequence of the configuration files, and if so, executing the corresponding BIN files to carry out configuration validation.
Further, in step 3, when the detection module compares the current configurations with the previous configurations for change, if there is a change, the flag bit of the changed configuration is set to 1, and the change flag bit of the configuration file corresponding to the configuration depending on the change is also set to 1, and the validation module is notified.
Further, in step 4, when the validation module receives the changed names of the configuration files, it sequentially checks whether the configuration files corresponding to the changed configurations have a change according to the validation sequence of the configuration files, if the changed flag bit of the configuration file is 1, the configuration file has a change, and when the configuration file has a change, the validation BIN files corresponding to the changed configurations are sequentially called to validate the configurations according to the validation sequence of the configuration files.
The system and the method for orderly configuration in effect have the advantages that reading and writing and configuration in effect can be decoupled, configuration with variation can be independently performed in effect, configuration without variation in effect is not needed, and configuration efficiency is greatly improved.
Drawings
FIG. 1 is a flow chart of a method for ordered validation configuration in accordance with the present invention.
Detailed Description
The technical scheme of the invention is described in detail in the following with reference to the accompanying drawings.
The invention provides a system for orderly effective configuration, which comprises a storage module, a configuration module, a detection module and an effective module, wherein the configuration module is connected with the storage module, and the configuration module and the effective module are both connected with the detection module.
In the system, the storage module is used for storing each configuration file; the configuration module is used for receiving configuration and storing the configuration into a corresponding configuration file; the detection module is used for comparing whether the current configuration and the previous configuration are changed or not, if so, the detection module records that all changed configuration file names are sent to the validation module in a unified way after all the configuration files are compared; and the validation module is used for sequentially checking whether the changed configuration file names are contained in the changed configuration file names according to the validation sequence of the configuration files when the changed configuration file names are received, and executing the corresponding BIN files to carry out configuration validation if the changed configuration file names are contained in the changed configuration file names.
In practical applications, the configuration may come from the cloud or the local web. Also, the configuration may include a plurality of json files.
Moreover, according to the strength of the correlation of each configuration, the configuration with strong correlation can be stored in the same configuration file, and the configuration without correlation and with weak correlation can be stored in different configuration files.
Different configuration file names are different, and the names of the configuration files comprise lanConfig, wanConfig, ntpConfig, sysConfig and the like.
In the system, when the detection module compares whether the current configuration and the previous configuration are changed, if so, the flag bit of the changed configuration is set to be 1, the change flag bit of the configuration file corresponding to the changed configuration is also set to be 1, and the validation module is informed; when the validation module receives the changed configuration file names, whether the configuration files corresponding to the changed configurations are changed or not is sequentially checked according to the validation sequence of the configuration files, if the changed flag bit of the configuration files is 1, the configuration files are changed, and when the configuration files are changed, the validation BIN files corresponding to the changed configurations are sequentially called according to the validation sequence of the configuration files to carry out configuration validation.
In addition, the present invention also provides a method for orderly effective configuration, the flow chart of which is shown in fig. 1, wherein the method is applied to the system for orderly effective configuration, and comprises the following steps:
step 1, loading each configuration file into a storage module;
step 2, receiving configuration through a configuration module, and storing the received configuration into a corresponding configuration file;
step 3, comparing whether the current configuration and the previous configuration are changed or not through the detection module, if so, recording, and after the comparison of all the configuration files is finished, uniformly sending the names of the changed configuration files to the validation module;
and 4, when the validation module receives the changed configuration file names, sequentially checking whether the changed configuration file names are contained in the changed configuration file names according to the validation sequence of the configuration files, and if so, executing the corresponding BIN files to carry out configuration validation. In step 3 of the method, when the detection module compares whether the current configurations and the previous configurations have changed, if there is a change, the flag bit of the changed configuration is set to 1, and the changed flag bit of the configuration file corresponding to the changed configuration is also set to 1, and the validation module is notified.
In step 3, when the detection module compares whether the current configuration and the previous configuration are changed, if so, setting the flag bit of the changed configuration to be 1, setting the change flag bit of the configuration file corresponding to the changed configuration to be 1, and notifying the validation module.
In step 4, when the validation module receives the changed configuration file name, sequentially checking whether the configuration file corresponding to each changed configuration is changed according to the configuration file validation sequence, if the changed flag bit of the configuration file is 1, the configuration file is changed, and when the configuration file is changed, sequentially calling the validation BIN file corresponding to the changed configuration for configuration validation according to the configuration file validation sequence.
Examples
The embodiment of the invention takes the method of ordered effective configuration as an example for detailed description.
The method for orderly configuration in effect of the embodiment comprises the following steps:
step 1, loading each configuration file into a storage module.
Step 2, the configuration module receives the configuration from the cloud or the local web, and stores the received configuration in the corresponding configuration file.
Step 3, comparing whether the current configurations and the previous configurations are changed or not through the detection module, if so, recording, setting the flag bit of the changed configurations to be 1, and setting the change flag bit of the configuration file corresponding to the changed configurations to be 1, such as: when the configuration file connecting the extranet connection changes [ wanConfig ], vpn needs to be revalidated depending on the extranet change, so that the flag bits of vpncconfig and wanConfig are both set to 1.
After all the configuration files are compared, all the changed configuration file names are sent to the validation module in a unified mode.
And 4, when the validation module receives the changed configuration file names, sequentially checking whether the configuration files corresponding to the changed configurations are changed or not according to the validation sequence of the configuration files, if the changed zone bit of the configuration files is 1, changing the configuration files, and when the configuration files are changed, sequentially calling the validation BIN files corresponding to the changed configurations for configuration validation according to the validation sequence of the configuration files.
In the embodiment, only the configuration with the effective name of ntp server is effective, and other configurations without change are not effective, so that the configuration efficiency is greatly improved.
Claims (10)
1. The system for orderly effective configuration is characterized by comprising a storage module, a configuration module, a detection module and an effective module, wherein the configuration module is connected with the storage module, and the configuration module and the effective module are both connected with the detection module;
the storage module is used for storing each configuration file;
the configuration module is used for receiving configuration and storing the configuration into a corresponding configuration file;
the detection module is used for comparing whether the current configuration and the previous configuration are changed or not, if so, the detection module records that all changed configuration file names are sent to the validation module in a unified way after all the configuration files are compared;
and the validation module is used for sequentially checking whether the changed configuration file names are contained in the changed configuration file names according to the validation sequence of the configuration files when the changed configuration file names are received, and executing the corresponding BIN files to carry out configuration validation if the changed configuration file names are contained in the changed configuration file names.
2. The system of ordered validation configuration of claim 1, wherein the configuration is from a cloud or a local web.
3. The system of ordered validation configurations of claim 1, wherein the configuration comprises a plurality of json files.
4. The system according to claim 1, wherein the configurations with strong correlation are stored in the same configuration file, and the configurations without and with weak correlation are stored in different configuration files according to the strength of correlation of each configuration.
5. The system of ordered validation configurations of claim 4, wherein different configuration file names are different, said configuration file names comprising lanConfig, wanConfig, ntpConfig, and sysConfig.
6. The system according to claim 1, wherein when the detection module compares the current configurations with the previous configurations, if there is a change, the flag bit of the changed configuration is set to 1, and the change flag bit of the configuration file corresponding to the changed configuration is also set to 1, and the validation module is notified.
7. The system according to claim 1 or 6, wherein when the validating module receives the changed names of the configuration files, it sequentially checks whether there is a change in the configuration files corresponding to the changed configurations according to the validation sequence of the configuration files, if the flag bit of the change in the configuration files is 1, the configuration files are changed, and when there is a change in the configuration files, the validating BIN files corresponding to the changed configurations are sequentially called for validation according to the validation sequence of the configuration files.
8. The method for ordered validation configuration, applied to the system for ordered validation configuration according to any one of claims 1 to 7, is characterized by comprising the following steps:
step 1, loading each configuration file into a storage module;
step 2, receiving configuration through a configuration module, and storing the received configuration into a corresponding configuration file;
step 3, comparing whether the current configuration and the previous configuration are changed or not through the detection module, if so, recording, and after the comparison of all the configuration files is finished, uniformly sending the names of the changed configuration files to the validation module;
and 4, when the validation module receives the changed configuration file names, sequentially checking whether the changed configuration file names are contained in the changed configuration file names according to the validation sequence of the configuration files, and if so, executing the corresponding BIN files to carry out configuration validation.
9. The method according to claim 8, wherein in step 3, when the detection module compares the current configurations with the previous configurations, if there is a change, the flag bit of the changed configuration is set to 1, and the change flag bit of the configuration file corresponding to the changed configuration is also set to 1, and the validation module is notified.
10. The method for orderly validating configuration according to claim 8 or 9, wherein in step 4, when the validating module receives the changed name of the configuration file, it sequentially checks whether the configuration file corresponding to each changed configuration is changed according to the validation sequence of the configuration file, if the flag bit of the change of the configuration file is 1, the configuration file is changed, and if the configuration file is changed, the validation BIN file corresponding to the changed configuration is sequentially called for validation according to the validation sequence of the configuration file.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010306525.3A CN111541563A (en) | 2020-04-17 | 2020-04-17 | System and method for orderly effective configuration |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010306525.3A CN111541563A (en) | 2020-04-17 | 2020-04-17 | System and method for orderly effective configuration |
Publications (1)
Publication Number | Publication Date |
---|---|
CN111541563A true CN111541563A (en) | 2020-08-14 |
Family
ID=71970592
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010306525.3A Pending CN111541563A (en) | 2020-04-17 | 2020-04-17 | System and method for orderly effective configuration |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111541563A (en) |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104199666A (en) * | 2014-09-09 | 2014-12-10 | 北京京东尚科信息技术有限公司 | Dynamic configuration method and device for application program |
CN104717182A (en) * | 2013-12-12 | 2015-06-17 | 华为技术有限公司 | Security policy deployment method and device for network firewall |
WO2017036335A1 (en) * | 2015-09-01 | 2017-03-09 | 阿里巴巴集团控股有限公司 | Code submitting method and device |
CN110147241A (en) * | 2019-04-16 | 2019-08-20 | 平安普惠企业管理有限公司 | Program configures update method, electronic device, computer equipment and storage medium |
CN110224878A (en) * | 2019-06-28 | 2019-09-10 | 北京金山云网络技术有限公司 | Gateway configures update method, device and server |
-
2020
- 2020-04-17 CN CN202010306525.3A patent/CN111541563A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104717182A (en) * | 2013-12-12 | 2015-06-17 | 华为技术有限公司 | Security policy deployment method and device for network firewall |
CN104199666A (en) * | 2014-09-09 | 2014-12-10 | 北京京东尚科信息技术有限公司 | Dynamic configuration method and device for application program |
WO2017036335A1 (en) * | 2015-09-01 | 2017-03-09 | 阿里巴巴集团控股有限公司 | Code submitting method and device |
CN110147241A (en) * | 2019-04-16 | 2019-08-20 | 平安普惠企业管理有限公司 | Program configures update method, electronic device, computer equipment and storage medium |
CN110224878A (en) * | 2019-06-28 | 2019-09-10 | 北京金山云网络技术有限公司 | Gateway configures update method, device and server |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP4155966A1 (en) | Blockchain data indexing method, and blockchain data storage method | |
CN100375038C (en) | Finally agent optimization method and system of source in reorder two-stage refering | |
CN108985934B (en) | Block chain modification method and device | |
CN105279089A (en) | Method and device for obtaining page element | |
CN108958653A (en) | A kind of space reclamation method, system and relevant apparatus based on bottom aggregate file | |
CN107016075A (en) | Company-data synchronous method and device | |
CN107783850A (en) | A kind of node tree chooses analytic method, device, server and the system of record | |
CN110209736A (en) | Device, method and the storage medium of block chain data processing | |
CN114564500A (en) | Method and system for implementing structured data storage and query in block chain system | |
CN107688624B (en) | Log index construction method and device | |
CN114625804A (en) | Big data-based user behavior data processing method and system and cloud platform | |
CN111541563A (en) | System and method for orderly effective configuration | |
CN107274284B (en) | Bidirectional matching method and device and transaction system | |
CN105278993B (en) | A kind of drive module upgrade method and device based on linux system | |
CN114937316B (en) | Software fault detection method, device, equipment and medium | |
CN115756765A (en) | Distributed transaction processing method and device | |
US20070239794A1 (en) | Method and system for updating logical information in databases | |
CN109978678B (en) | Parameter management method and related equipment | |
CN114511314A (en) | Payment account management method and device, computer equipment and storage medium | |
CN106776296A (en) | Startup method, device and starting device that coverage rate is detected | |
CN112486506B (en) | NAND Flash burning method and device | |
CN110932884B (en) | Method and device for adding multiple networks to cloud physical machine | |
CN112783751A (en) | Incremental code scanning method and device, electronic equipment and storage medium | |
CN109325149A (en) | XML message search method and device | |
CN114154944B (en) | Business auditing method, equipment and computer readable storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20200814 |
|
RJ01 | Rejection of invention patent application after publication |