CN111858254A - Data processing method and device, computing equipment and medium - Google Patents

Data processing method and device, computing equipment and medium Download PDF

Info

Publication number
CN111858254A
CN111858254A CN202010727563.6A CN202010727563A CN111858254A CN 111858254 A CN111858254 A CN 111858254A CN 202010727563 A CN202010727563 A CN 202010727563A CN 111858254 A CN111858254 A CN 111858254A
Authority
CN
China
Prior art keywords
information
application
equipment
network
topological relation
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010727563.6A
Other languages
Chinese (zh)
Other versions
CN111858254B (en
Inventor
陈庆
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Industrial and Commercial Bank of China Ltd ICBC
Original Assignee
Industrial and Commercial Bank of China Ltd ICBC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Industrial and Commercial Bank of China Ltd ICBC filed Critical Industrial and Commercial Bank of China Ltd ICBC
Priority to CN202010727563.6A priority Critical patent/CN111858254B/en
Publication of CN111858254A publication Critical patent/CN111858254A/en
Application granted granted Critical
Publication of CN111858254B publication Critical patent/CN111858254B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/3003Monitoring arrangements specially adapted to the computing system or computing system component being monitored
    • G06F11/3006Monitoring arrangements specially adapted to the computing system or computing system component being monitored where the computing system is distributed, e.g. networked systems, clusters, multiprocessor systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/3051Monitoring arrangements for monitoring the configuration of the computing system or of the computing system component, e.g. monitoring the presence of processing resources, peripherals, I/O links, software programs
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/32Monitoring with visual or acoustical indication of the functioning of the machine
    • G06F11/323Visualisation of programs or trace data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/32Monitoring with visual or acoustical indication of the functioning of the machine
    • G06F11/324Display of status information
    • G06F11/327Alarm or error message display
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Abstract

The present disclosure provides a method of processing data. The method comprises the steps of obtaining application information of a plurality of application programs; determining running equipment clusters of a plurality of application programs according to the application information; acquiring equipment information and network information of each running equipment cluster; determining the equipment topological relation and the network topological relation of each running equipment cluster according to the equipment information and the network information; and generating a visual view according to the application information, the equipment topological relation and the network topological relation. The disclosure also provides a data processing device, a computing device and a computer storage medium.

Description

Data processing method and device, computing equipment and medium
Technical Field
The present disclosure relates to the field of computer technologies, and in particular, to a data processing method and apparatus, a computing device, and a computer storage medium.
Background
When the related technology monitors the data center, different monitoring systems are respectively set for the system, the application, the network and the hardware equipment of the data center, and the systems are relatively independent and have no association. The monitoring information obtained by the related technology comes from different dimensions, and the information is scattered. With the increasing scale of the data center, the topological structure of the data center is more and more complex, and the corresponding monitoring information is more and more numerous, so that it is difficult for the data center manager and the operation and maintenance personnel to master the operation information of the data center in the global level.
Disclosure of Invention
One aspect of the present disclosure provides a data processing method, including: acquiring application information of a plurality of application programs; determining running equipment clusters of the plurality of application programs according to the application information; acquiring equipment information and network information of each running equipment cluster; determining the equipment topological relation and the network topological relation of each running equipment cluster according to the equipment information and the network information; and generating a visual view according to the application information, the equipment topological relation and the network topological relation.
Optionally, the visualization view includes a device topology column corresponding to each application; the method further comprises the following steps: and in response to detecting a click operation aiming at a device topology column corresponding to a target application program, displaying the graphic identification of each device in the running device cluster of the target application program.
Optionally, the method further comprises: and responding to the clicking operation of the graphic identifier of the target equipment, and displaying all application programs running on the target equipment.
Optionally, the visualization view includes a network topology column corresponding to each application; the method further comprises the following steps: and responding to the click operation detected for the network topology column corresponding to the target application program, and displaying the network connection relation of the network where the running equipment cluster of the target application program is located in a graphical mode.
Optionally, the method further comprises: receiving alarm information; and displaying a preset animation effect in the visual view according to the alarm grade represented by the alarm information.
Optionally, the method further includes: receiving alarm information; determining a recovery path according to the alarm information, wherein the recovery path comprises at least one recovery link, and each recovery link corresponds to a recovery script; presenting the at least one recovery link; and responding to the clicking operation aiming at the recovery link, and executing the recovery script corresponding to the recovery link.
Optionally, the visualization view includes a key indicator column corresponding to each application; the method further comprises the following steps: and acquiring a key index of the application program, and displaying the key index through a key index column corresponding to the application program.
Another aspect of the present disclosure provides an apparatus for processing data, including: the first acquisition module is used for acquiring application information of a plurality of application programs; the first determining module is used for determining running equipment clusters of the plurality of application programs according to the application information; the second acquisition module is used for acquiring the equipment information and the network information of each running equipment cluster; the second determining module is used for determining the equipment topological relation and the network topological relation of each running equipment cluster according to the equipment information and the network information; and the generation module is used for generating a visual view according to the application information, the equipment topological relation and the network topological relation.
Another aspect of the disclosure provides a computing device comprising: one or more processors; storage means for storing one or more programs, wherein the one or more programs, when executed by the one or more processors, cause the one or more processors to implement the method as described above.
Another aspect of the present disclosure provides a computer-readable storage medium storing computer-executable instructions for implementing the method as described above when executed.
Another aspect of the disclosure provides a computer program comprising computer executable instructions for implementing the method as described above when executed.
According to the embodiment of the disclosure, the application programs are used as the display dimensions, the application information, the equipment topological relation and the network topological relation are integrated, and the visual view is generated, so that the visualization of the hardware topological architecture, the network topological architecture and the application topological architecture of each application program is realized, and a user can master the full-dimensional information containing the application information, the equipment topological relation and the network topological relation through the visual view.
Drawings
For a more complete understanding of the present disclosure and the advantages thereof, reference is now made to the following descriptions taken in conjunction with the accompanying drawings, in which:
fig. 1 schematically illustrates an application scenario of a processing method of data and a processing apparatus of data according to an embodiment of the present disclosure;
FIG. 2 schematically shows a flow chart of a method of processing data according to an embodiment of the present disclosure;
FIG. 3 schematically illustrates a front view in a visualization view according to an embodiment of the present disclosure;
FIG. 4 schematically illustrates a device topology view according to an embodiment of the present disclosure;
FIG. 5 schematically illustrates an alert information view when an alert information is presented according to an embodiment of the present disclosure;
FIG. 6 schematically shows a schematic diagram illustrating a restoration path according to an embodiment of the present disclosure;
FIG. 7 schematically shows a block diagram of a processing device of data according to an embodiment of the present disclosure; and
FIG. 8 schematically illustrates a block diagram of a computer system suitable for implementing the above-described method according to an embodiment of the present disclosure.
Detailed Description
Hereinafter, embodiments of the present disclosure will be described with reference to the accompanying drawings. It should be understood that the description is illustrative only and is not intended to limit the scope of the present disclosure. In the following detailed description, for purposes of explanation, numerous specific details are set forth in order to provide a thorough understanding of the embodiments of the disclosure. It may be evident, however, that one or more embodiments may be practiced without these specific details. Moreover, in the following description, descriptions of well-known structures and techniques are omitted so as to not unnecessarily obscure the concepts of the present disclosure.
The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the disclosure. The terms "comprises," "comprising," and the like, as used herein, specify the presence of stated features, steps, operations, and/or components, but do not preclude the presence or addition of one or more other features, steps, operations, or components.
All terms (including technical and scientific terms) used herein have the same meaning as commonly understood by one of ordinary skill in the art unless otherwise defined. It is noted that the terms used herein should be interpreted as having a meaning that is consistent with the context of this specification and should not be interpreted in an idealized or overly formal sense.
Where a convention analogous to "at least one of A, B and C, etc." is used, in general such a construction is intended in the sense one having skill in the art would understand the convention (e.g., "a system having at least one of A, B and C" would include but not be limited to systems that have a alone, B alone, C alone, a and B together, a and C together, B and C together, and/or A, B, C together, etc.). Where a convention analogous to "A, B or at least one of C, etc." is used, in general such a construction is intended in the sense one having skill in the art would understand the convention (e.g., "a system having at least one of A, B or C" would include but not be limited to systems that have a alone, B alone, C alone, a and B together, a and C together, B and C together, and/or A, B, C together, etc.).
Some block diagrams and/or flow diagrams are shown in the figures. It will be understood that some blocks of the block diagrams and/or flowchart illustrations, or combinations thereof, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, or other programmable data processing apparatus, such that the instructions, which execute via the processor, create means for implementing the functions/acts specified in the block diagrams and/or flowchart block or blocks. The techniques of this disclosure may be implemented in hardware and/or software (including firmware, microcode, etc.). In addition, the techniques of this disclosure may take the form of a computer program product on a computer-readable storage medium having instructions stored thereon for use by or in connection with an instruction execution system.
The embodiment of the disclosure provides a data processing method and a data processing device capable of applying the method. The method comprises the steps of obtaining application information of a plurality of application programs; determining running equipment clusters of a plurality of application programs according to the application information; acquiring equipment information and network information of each running equipment cluster; determining the equipment topological relation and the network topological relation of each running equipment cluster according to the equipment information and the network information; and generating a visual view according to the application information, the equipment topological relation and the network topological relation.
Fig. 1 schematically illustrates an application scenario of a data processing method and a data processing apparatus according to an embodiment of the present disclosure. It should be noted that fig. 1 is only an example of a scenario in which the embodiments of the present disclosure may be applied to help those skilled in the art understand the technical content of the present disclosure, but does not mean that the embodiments of the present disclosure may not be applied to other devices, systems, environments or scenarios.
As shown in FIG. 1, the application scenario according to this embodiment includes a monitoring system 11, a configuration management system 12, an event, change management system 13, an emergency management system 14, various in-band and out-of-band management systems 15, other systems and parks 16, and a full-dimensional visualization management system 20.
The monitoring system 11 is used for monitoring the running state and performance capacity information of the system, the application, the network and the hardware equipment, and giving alarm information when the index exceeds a preset threshold value; the core of the configuration management system 12 is a Configuration Management Database (CMDB) for storing information of each configuration item from dimensions of a system, an application, a network, hardware, and the like; the event/change management system 13 is used for storing the contents of events and changes; the emergency management system 14 generally includes emergency personnel architecture and contact details, emergency operation manuals for each specialty (e.g., system, application, network, hardware device); various in-band and out-of-band management systems 15, which are used for providing channels and interfaces for operation and maintenance operations of application, system and hardware levels; other information maintained by the system and campus 16 includes: application architecture information, software version commissioning information, an operation and maintenance technical manual, a fault report, a knowledge base and the like. Where the knowledge base can be used to give repair methods for common faults.
The full-dimensional visualization management system 20 may be used to read configuration items in the configuration management system 12, take an application as a dimension, comb the network topology, device topology, application topology of the application, and generate a graphical topology structure.
The full-dimensional visualization management system 20 may utilize information already available to the emergency management system 14 to associate the application with the corresponding emergency personnel architecture, emergency manual, one-touch recovery script.
The full-dimensional visualization management system 20 may sort the existing technical maintenance manual, emergency management system, and knowledge base, and associate the corresponding fault handling methods. When the monitoring alarm information is received, the alarm information can be analyzed, and a recovery path is given.
The full-dimensional visualization management system 20 may generate a graphical topology structure by using configuration items in the configuration management system and an upstream-downstream relationship of an application program, determine a fault influence range according to monitoring alarm information when receiving the monitoring alarm information, and display influence conditions of a fault on a device, a network, and the application program based on the graphical topology structure.
Fig. 2 schematically shows a flow chart of a method of processing data according to an embodiment of the present disclosure.
As shown in fig. 2, the method includes operations S210 to S230.
In operation S210, application information of a plurality of application programs is acquired.
According to an embodiment of the present disclosure, the application may include, for example, all running applications in the data center, such as an application for exporting services to the outside.
According to an embodiment of the present disclosure, application information of an application program may be read from a CMDB database. The application information of the application may include, for example, a name of the application, a running device cluster running the application, where the device cluster may include one or more devices. It should be noted that the above application information is only an example, and in an actual application, the application information may further include information related to the application program, such as a type of the application program, a corresponding operation and maintenance person, and an operating system, and this is not specifically limited in this disclosure.
In operation S220, a running device cluster of the plurality of application programs is determined according to the application information.
According to the embodiment of the disclosure, the running device cluster of each application program can be obtained by analyzing the obtained application information.
In operation S230, device information and network information of each running device cluster are acquired.
According to an embodiment of the present disclosure, device information and network information of the running device cluster may be read from the CMDB database. The device information of the operating device cluster may include, for example, hardware information of each device in the operating device cluster, such as a model, an affiliated machine room, an affiliated cabinet, hardware configuration, operation and maintenance personnel, and the like. The network information of the running device cluster may include, for example, a network connection relationship of a network in which the running device cluster is located, for example, a connection relationship of each device in the running device cluster, and an upstream-downstream relationship between the running device cluster and other devices in the network.
In operation S240, the device topology relationship and the network topology relationship of each running device cluster are determined according to the device information and the network information.
In operation S250, a visual view is generated according to the application information, the device topological relation, and the network topological relation.
According to an embodiment of the present disclosure, the visualization view may be used to expose application information, device topology relationships, and network topology relationships of each application to a user.
According to the embodiment of the disclosure, the application programs are used as the display dimensions, the application information, the equipment topological relation and the network topological relation are integrated, and the visual view is generated, so that the visualization of the hardware topological architecture, the network topological architecture and the application topological architecture of each application program is realized, and a user can master the full-dimensional information containing the application information, the equipment topological relation and the network topological relation through the visual view.
The visualization views are further described below in conjunction with specific embodiments. Those skilled in the art will appreciate that the following example embodiments are only for the understanding of the present disclosure, and the present disclosure is not limited thereto.
Fig. 3 schematically illustrates a front view in a visualization view according to an embodiment of the present disclosure.
According to the embodiment of the disclosure, the list shown in fig. 3 may be generated according to all running applications of the data center. Each row in the list corresponds to an application. Each row may contain one or more columns.
Illustratively, in this embodiment, each row includes one or more of a key indicator column, a detailed information column, a network topology column, a device topology column, an emergency column, and an alarm information column.
According to the embodiment of the disclosure, when the alarm information is received, the preset animation effect can be displayed in the visual view according to the alarm level represented by the alarm information. For example, if software and hardware related to an application program fail (whether the normal operation of the application program is affected or not), and an alarm message is generated, after receiving the alarm message, in the visual view, the background or text color of a line of information corresponding to the application program is changed to a color corresponding to the alarm level, and the alarm message is flashed.
According to the embodiment of the disclosure, the key index of the application program can be obtained from the monitoring system, and then the key index is displayed through the key index column corresponding to the application program. The key indicators may include, for example, transaction amount, response time, and the like.
According to the embodiment of the disclosure, when a user clicks a device topology column, an application program corresponding to the device topology column may be used as a target application program, and in response to detecting a click operation for the device topology column, a graphic identifier of each device in a running device cluster of the target application program is displayed. When a user clicks one of the graphic identifiers, the device corresponding to the graphic identifier may be used as a target device, and all application programs running on the target device are displayed in response to a clicking operation on the graphic identifier of the target device.
By way of example, fig. 4 schematically shows a device topology view according to an embodiment of the present disclosure. As shown in fig. 4, the target application is distributed over two clusters of devices, cluster a and cluster B, each cluster having 4 servers. The X-symbol on the server icon indicates the server failure. When a user clicks an icon of one of the servers, all the application programs running on the server are shown in response to a clicking operation on the icon, for example, application A, application B, application C and application D running on a failed server are shown in response to the user clicking the icon of the failed server.
According to the embodiment of the disclosure, when a user clicks a network topology column, an application program corresponding to the network topology column can be used as a target application program, and in response to the click operation of the network topology column, the network connection relationship of a network where an operating device cluster of the target application program is located is displayed in a graphical mode.
According to the embodiment of the disclosure, when a user clicks an emergency column, in response to detecting a clicking operation for the emergency column, emergency data of an application program is presented. The emergency data may include, for example, emergency personnel structures and contact information, an emergency manual, a related one-key recovery script link, and the like, and the emergency data corresponding to each application program may be read from the emergency management system. According to the embodiment of the disclosure, when a user clicks an alarm information column, the alarm information of an application program can be displayed in response to the detection of the clicking operation of the user. The alarm information can be acquired from an event and change management system.
According to the embodiment of the disclosure, when a user clicks an alarm information column, in response to detecting a click operation for the alarm information column, alarm information of an application program corresponding to the alarm information column is displayed.
Fig. 5 schematically shows an alarm information view when displaying alarm information according to an embodiment of the present disclosure.
As shown in FIG. 5, the alarm information view may include, for example, the columns of alarm time, alarm information, alarm classification, alarm level, network topology, device topology, restoration path, detailed information, and so on. The network topology and device topology columns are used for displaying network device information, connection relation, hardware device information and the like in a graphical mode when a user clicks. The recovery path column is used to show the recovery path when the user clicks. The restoration path may be obtained from a technical maintenance manual and an emergency management system.
Fig. 6 schematically shows a schematic diagram illustrating a restoration path according to an embodiment of the present disclosure. As shown in fig. 6, if there are multiple restoration paths in the failure, the restoration paths may be given in a recommended order, and if the first restoration path is unsuccessful in restoration, the second restoration path may be continuously selected.
According to the embodiment of the disclosure, when the alarm information is received, the alarm information can be firstly analyzed, and the recovery path is given according to the alarm information. Corresponding to the alarm information generated by the software-type fault, the corresponding recovery path may include one or more recovery links, each recovery link corresponding to a recovery script. The recovery links are then presented to the user for selection by the user. When a user clicks one of the recovery links, responding to the clicking operation aiming at the recovery link, and executing a recovery script corresponding to the recovery link so as to try to repair the fault corresponding to the alarm information.
For example, if the alarm information shows that the hard disk is failed, the restoration path is to submit the change and replace the failed hard disk. And if the alarm information shows that the system is hung (hang), the recovery path is the emergency restart, a one-key recovery link is provided, the user clicks one key to recover, and a script for restarting the system is operated. If the alarm information is that the transaction response time is slow and the fault reason can not be located, the provided recovery path is to isolate the related system and provide a one-key isolated script.
The monitoring systems in the related art are relatively independent, when a certain component in the data center is in fault, the monitoring system corresponding to the component can generate alarm information, but the alarm information can only indicate the component in fault, and the range influenced by the fault in the whole data center cannot be intuitively reflected. According to the data processing method disclosed by the embodiment of the disclosure, a plurality of monitoring systems can be associated and integrated, so that a user can master information such as monitoring, configuration, operation and maintenance, emergency information and the like of each application program in a full-dimensional manner. When a certain part in the data center breaks down, the fault influence range can be determined according to the alarm information, and the influence conditions of the display equipment, the network and the application are visualized. And through being associated with systems such as an emergency management system, various in-band and out-of-band management systems and the like, the recovery path and suggestion of fault processing can be displayed based on fault information, and the automation and intelligence level of operation and maintenance is improved.
Fig. 7 schematically shows a block diagram of a processing device of data according to an embodiment of the present disclosure.
As shown in fig. 7, the data processing apparatus 700 includes a first obtaining module 710, a first determining module 720, a second obtaining module 730, a second determining module 740, and a generating module 750. The processing means 400 of this data may for example perform the method described above with reference to fig. 2.
Specifically, the first obtaining module 710 may be configured to obtain application information of a plurality of application programs, for example.
The first determining module 720, for example, can be used for determining a running device cluster of a plurality of application programs according to the application information.
The second obtaining module 730 may be configured to obtain device information and network information of each running device cluster, for example.
The second determining module 740 may be configured to determine a device topology relationship and a network topology relationship of each running device cluster according to the device information and the network information, for example.
The generating module 750 may be used to generate a visualization view according to the application information, the device topology relationship, and the network topology relationship, for example.
Any number of modules, sub-modules, units, sub-units, or at least part of the functionality of any number thereof according to embodiments of the present disclosure may be implemented in one module. Any one or more of the modules, sub-modules, units, and sub-units according to the embodiments of the present disclosure may be implemented by being split into a plurality of modules. Any one or more of the modules, sub-modules, units, sub-units according to embodiments of the present disclosure may be implemented at least in part as a hardware circuit, such as a Field Programmable Gate Array (FPGA), a Programmable Logic Array (PLA), a system on a chip, a system on a substrate, a system on a package, an Application Specific Integrated Circuit (ASIC), or may be implemented in any other reasonable manner of hardware or firmware by integrating or packaging a circuit, or in any one of or a suitable combination of software, hardware, and firmware implementations. Alternatively, one or more of the modules, sub-modules, units, sub-units according to embodiments of the disclosure may be at least partially implemented as a computer program module, which when executed may perform the corresponding functions.
For example, any plurality of the first obtaining module 710, the first determining module 720, the second obtaining module 730, the second determining module 740, and the generating module 750 may be combined and implemented in one module, or any one of the modules may be split into a plurality of modules. Alternatively, at least part of the functionality of one or more of these modules may be combined with at least part of the functionality of the other modules and implemented in one module. According to an embodiment of the present disclosure, at least one of the first obtaining module 710, the first determining module 720, the second obtaining module 730, the second determining module 740, and the generating module 750 may be implemented at least in part as a hardware circuit, such as a Field Programmable Gate Array (FPGA), a Programmable Logic Array (PLA), a system on a chip, a system on a substrate, a system on a package, an Application Specific Integrated Circuit (ASIC), or may be implemented by hardware or firmware in any other reasonable manner of integrating or packaging a circuit, or implemented by any one of three implementations of software, hardware, and firmware, or any suitable combination of any of them. Alternatively, at least one of the first obtaining module 710, the first determining module 720, the second obtaining module 730, the second determining module 740, and the generating module 750 may be at least partially implemented as a computer program module that, when executed, may perform a corresponding function.
FIG. 8 schematically illustrates a block diagram of a computer system suitable for implementing the above-described method according to an embodiment of the present disclosure. The computer system illustrated in FIG. 8 is only one example and should not impose any limitations on the scope of use or functionality of embodiments of the disclosure.
As shown in fig. 8, computer system 800 includes a processor 810 and a computer-readable storage medium 820. The computer system 800 may perform a method according to an embodiment of the disclosure.
In particular, processor 810 may include, for example, a general purpose microprocessor, an instruction set processor and/or related chip set and/or a special purpose microprocessor (e.g., an Application Specific Integrated Circuit (ASIC)), and/or the like. The processor 810 may also include on-board memory for caching purposes. Processor 810 may be a single processing unit or a plurality of processing units for performing different actions of a method flow according to embodiments of the disclosure.
Computer-readable storage medium 820, for example, may be a non-volatile computer-readable storage medium, specific examples including, but not limited to: magnetic storage devices, such as magnetic tape or Hard Disk Drives (HDDs); optical storage devices, such as compact disks (CD-ROMs); a memory, such as a Random Access Memory (RAM) or a flash memory; and so on.
The computer-readable storage medium 820 may include a computer program 821, which computer program 821 may include code/computer-executable instructions that, when executed by the processor 810, cause the processor 810 to perform a method according to an embodiment of the present disclosure, or any variation thereof.
The computer program 821 may be configured with, for example, computer program code comprising computer program modules. For example, in an example embodiment, code in computer program 821 may include one or more program modules, including for example 821A, modules 821B, … …. It should be noted that the division and number of modules are not fixed, and those skilled in the art may use suitable program modules or program module combinations according to actual situations, and when the program modules are executed by the processor 810, the processor 810 may execute the method according to the embodiment of the present disclosure or any variation thereof.
According to an embodiment of the present invention, at least one of the first obtaining module 710, the first determining module 720, the second obtaining module 730, the second determining module 740, and the generating module 750 may be implemented as a computer program module described with reference to fig. 8, which, when executed by the processor 810, may implement the respective operations described above.
The present disclosure also provides a computer-readable storage medium, which may be contained in the apparatus/device/system described in the above embodiments; or may exist separately and not be assembled into the device/apparatus/system. The computer-readable storage medium carries one or more programs which, when executed, implement the method according to an embodiment of the disclosure.
According to embodiments of the present disclosure, the computer-readable storage medium may be a non-volatile computer-readable storage medium, which may include, for example but is not limited to: a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the present disclosure, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device.
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present disclosure. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams or flowchart illustration, and combinations of blocks in the block diagrams or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
Those skilled in the art will appreciate that various combinations and/or combinations of features recited in the various embodiments and/or claims of the present disclosure can be made, even if such combinations or combinations are not expressly recited in the present disclosure. In particular, various combinations and/or combinations of the features recited in the various embodiments and/or claims of the present disclosure may be made without departing from the spirit or teaching of the present disclosure. All such combinations and/or associations are within the scope of the present disclosure.
While the disclosure has been shown and described with reference to certain exemplary embodiments thereof, it will be understood by those skilled in the art that various changes in form and details may be made therein without departing from the spirit and scope of the disclosure as defined by the appended claims and their equivalents. Accordingly, the scope of the present disclosure should not be limited to the above-described embodiments, but should be defined not only by the appended claims, but also by equivalents thereof.

Claims (10)

1. A method of processing data, comprising:
acquiring application information of a plurality of application programs;
determining running equipment clusters of the plurality of application programs according to the application information;
acquiring equipment information and network information of each running equipment cluster;
determining the equipment topological relation and the network topological relation of each running equipment cluster according to the equipment information and the network information; and
and generating a visual view according to the application information, the equipment topological relation and the network topological relation.
2. The method of claim 1, wherein the visualization view includes a device topology hurdle corresponding to each application;
the method further comprises the following steps: and in response to detecting a click operation aiming at a device topology column corresponding to a target application program, displaying the graphic identification of each device in the running device cluster of the target application program.
3. The method of claim 2, further comprising:
and responding to the clicking operation of the graphic identifier of the target equipment, and displaying all application programs running on the target equipment.
4. The method of claim 1, wherein the visualization view includes a network topology hurdle corresponding to each application;
the method further comprises the following steps: and responding to the click operation detected for the network topology column corresponding to the target application program, and displaying the network connection relation of the network where the running equipment cluster of the target application program is located in a graphical mode.
5. The method of claim 1, further comprising:
receiving alarm information; and
and displaying a preset animation effect in the visual view according to the alarm grade represented by the alarm information.
6. The method of claim 1, further comprising:
receiving alarm information;
determining a recovery path according to the alarm information, wherein the recovery path comprises at least one recovery link, and each recovery link corresponds to a recovery script;
presenting the at least one recovery link; and
and responding to the clicking operation aiming at the recovery link, and executing the recovery script corresponding to the recovery link.
7. The method of claim 1, wherein the visualization view includes a key metrics column corresponding to each application;
the method further comprises the following steps: and acquiring a key index of the application program, and displaying the key index through a key index column corresponding to the application program.
8. An apparatus for processing data, comprising:
the first acquisition module is used for acquiring application information of a plurality of application programs;
the first determining module is used for determining running equipment clusters of the plurality of application programs according to the application information;
the second acquisition module is used for acquiring the equipment information and the network information of each running equipment cluster;
the second determining module is used for determining the equipment topological relation and the network topological relation of each running equipment cluster according to the equipment information and the network information; and
and the generating module is used for generating a visual view according to the application information, the equipment topological relation and the network topological relation.
9. A computing device, comprising:
one or more processors;
a memory for storing one or more computer programs,
wherein the one or more computer programs, when executed by the one or more processors, cause the one or more processors to implement the method of any of claims 1 to 7.
10. A computer readable storage medium having stored thereon executable instructions which, when executed by a processor, cause the processor to carry out the method of any one of claims 1 to 7.
CN202010727563.6A 2020-07-24 2020-07-24 Data processing method, device, computing equipment and medium Active CN111858254B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010727563.6A CN111858254B (en) 2020-07-24 2020-07-24 Data processing method, device, computing equipment and medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010727563.6A CN111858254B (en) 2020-07-24 2020-07-24 Data processing method, device, computing equipment and medium

Publications (2)

Publication Number Publication Date
CN111858254A true CN111858254A (en) 2020-10-30
CN111858254B CN111858254B (en) 2023-08-22

Family

ID=72950175

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010727563.6A Active CN111858254B (en) 2020-07-24 2020-07-24 Data processing method, device, computing equipment and medium

Country Status (1)

Country Link
CN (1) CN111858254B (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113568860A (en) * 2021-07-23 2021-10-29 北京百度网讯科技有限公司 Deep learning-based topology mapping method, apparatus, medium, and program product
CN113722014A (en) * 2021-09-10 2021-11-30 拉卡拉支付股份有限公司 Application program configuration method, device, equipment, storage medium and program product
CN114567537A (en) * 2022-03-01 2022-05-31 中国工商银行股份有限公司 Information processing method, device, equipment and medium
CN115150289A (en) * 2022-05-26 2022-10-04 中国工商银行股份有限公司 Exception handling method and system based on composite monitoring
CN113194004B (en) * 2021-05-20 2023-04-07 中国工商银行股份有限公司 Network topology construction method and device, and network change processing method and device

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106970803A (en) * 2017-04-25 2017-07-21 北京理工大学 Analysis method and device that a kind of software systems develop
US20190190773A1 (en) * 2017-12-15 2019-06-20 International Business Machines Corporation Building and fixing a dynamic application topology in a cloud based environment leveraging log file data
CN110249588A (en) * 2017-02-03 2019-09-17 维萨国际服务协会 System and method for detecting network topology
CN110795148A (en) * 2019-10-28 2020-02-14 北京旷视科技有限公司 Method and device for generating layout file and electronic equipment

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110249588A (en) * 2017-02-03 2019-09-17 维萨国际服务协会 System and method for detecting network topology
CN106970803A (en) * 2017-04-25 2017-07-21 北京理工大学 Analysis method and device that a kind of software systems develop
US20190190773A1 (en) * 2017-12-15 2019-06-20 International Business Machines Corporation Building and fixing a dynamic application topology in a cloud based environment leveraging log file data
CN110795148A (en) * 2019-10-28 2020-02-14 北京旷视科技有限公司 Method and device for generating layout file and electronic equipment

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113194004B (en) * 2021-05-20 2023-04-07 中国工商银行股份有限公司 Network topology construction method and device, and network change processing method and device
CN113568860A (en) * 2021-07-23 2021-10-29 北京百度网讯科技有限公司 Deep learning-based topology mapping method, apparatus, medium, and program product
CN113568860B (en) * 2021-07-23 2022-08-19 北京百度网讯科技有限公司 Deep learning-based multi-machine cluster topology mapping method and device and program product
CN113722014A (en) * 2021-09-10 2021-11-30 拉卡拉支付股份有限公司 Application program configuration method, device, equipment, storage medium and program product
CN114567537A (en) * 2022-03-01 2022-05-31 中国工商银行股份有限公司 Information processing method, device, equipment and medium
CN114567537B (en) * 2022-03-01 2024-01-30 中国工商银行股份有限公司 Information processing method, device, equipment and medium
CN115150289A (en) * 2022-05-26 2022-10-04 中国工商银行股份有限公司 Exception handling method and system based on composite monitoring
CN115150289B (en) * 2022-05-26 2024-04-02 中国工商银行股份有限公司 Anomaly handling method and system based on composite monitoring

Also Published As

Publication number Publication date
CN111858254B (en) 2023-08-22

Similar Documents

Publication Publication Date Title
CN111858254B (en) Data processing method, device, computing equipment and medium
US7856575B2 (en) Collaborative troubleshooting computer systems using fault tree analysis
US11157392B2 (en) Debugging through causality and temporal pattering in a event processing system
US10303533B1 (en) Real-time log analysis service for integrating external event data with log data for use in root cause analysis
US9836952B2 (en) Alarm causality templates for network function virtualization
EP3734520A1 (en) Fault analysis and prediction using empirical architecture analytics
CN107807877B (en) Code performance testing method and device
JP5223413B2 (en) IT system troubleshooting device, troubleshooting method and program therefor
US9495234B1 (en) Detecting anomalous behavior by determining correlations
US10860454B2 (en) Analyzing large-scale data processing jobs
WO2014078397A2 (en) Diagnosing distributed applications using application logs and request processing paths
CN106681701B (en) Task display method and device
US11645172B1 (en) Managing data center failure events
US10127017B2 (en) Devops management
CN104750605A (en) Method for including kernel object information in user dump
WO2020202433A1 (en) Information processing device and api usage history display program
CN112769615B (en) Anomaly analysis method and device
US10552282B2 (en) On demand monitoring mechanism to identify root cause of operation problems
WO2022000285A1 (en) Health index of a service
CN113227978B (en) Automatic anomaly detection in a computer processing pipeline
CN112988432A (en) Method, system, and medium for locating faults using diagnostic analysis of a platter
CN114253809A (en) Integrated operation and maintenance monitoring method and system based on multi-component big data platform

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant