CN112003749B - Host information adding method, system and electronic equipment - Google Patents

Host information adding method, system and electronic equipment Download PDF

Info

Publication number
CN112003749B
CN112003749B CN202010851279.XA CN202010851279A CN112003749B CN 112003749 B CN112003749 B CN 112003749B CN 202010851279 A CN202010851279 A CN 202010851279A CN 112003749 B CN112003749 B CN 112003749B
Authority
CN
China
Prior art keywords
host
operation code
information
response message
check value
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010851279.XA
Other languages
Chinese (zh)
Other versions
CN112003749A (en
Inventor
方浩
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Inspur Data Technology Co Ltd
Original Assignee
Beijing Inspur Data Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Inspur Data Technology Co Ltd filed Critical Beijing Inspur Data Technology Co Ltd
Priority to CN202010851279.XA priority Critical patent/CN112003749B/en
Publication of CN112003749A publication Critical patent/CN112003749A/en
Application granted granted Critical
Publication of CN112003749B publication Critical patent/CN112003749B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0803Configuration setting
    • H04L41/0823Configuration setting characterised by the purposes of a change of settings, e.g. optimising configuration for enhancing reliability
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/46Interconnection of networks
    • H04L12/4633Interconnection of networks using encapsulation techniques, e.g. tunneling
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
    • H04L67/025Protocols based on web technology, e.g. hypertext transfer protocol [HTTP] for remote control or remote monitoring of applications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]

Abstract

The application discloses a host information adding method, a system and electronic equipment, wherein the method is applied to a host management end and comprises the following steps: sending the collected message to all hosts through a multicast tunnel; obtaining a response message which is fed back by the host and corresponds to the collection message; and obtaining host information according to the response message, and adding host information corresponding to the host into the cluster information. Therefore, the method and the device adopt a multicast tunnel mode to send the collecting message to all the hosts, and after receiving the response message fed back by the hosts, the host information in the response message is added to the host information corresponding to the hosts and the cluster information, so that the automatic discovery of the hosts is realized, and the efficiency of the host discovery is improved.

Description

Host information adding method, system and electronic equipment
Technical Field
The present disclosure relates to the field of host discovery technologies, and in particular, to a method, a system, and an electronic device for adding host information.
Background
At present, management of a large number of hosts is generally realized at a management end through a broadcasting mode of the management end and the host end or a means of manually adding host information by technicians, but the efficiency of adding the host information is lower.
Therefore, how to provide a solution to the above technical problem is a problem that a person skilled in the art needs to solve at present.
Disclosure of Invention
The application aims to provide a host information adding method, a system and electronic equipment, which can improve the efficiency of adding a host. The specific scheme is as follows:
the application discloses a host information adding method, which is applied to a host management end and comprises the following steps:
sending the collected message to all hosts through a multicast tunnel;
acquiring a response message which is fed back by the host and corresponds to the collection message;
and obtaining host information according to the response message, and adding the host information into the cluster information.
Preferably, the obtaining host information according to the response message includes:
reading a first operation code from the response message, and judging whether the first operation code is a first preset operation code or not;
and if the first operation code is the first preset operation code, reading the host information from the response message.
Preferably, if the first operation code is the first preset operation code, the reading the host information includes:
if the first operation code is the first preset operation code, reading other information except the first operation code from the response message; the other information includes a check value and current host information,
acquiring a target check value according to the current host information, and judging whether the check value is consistent with the target check value or not;
and if the check value is consistent with the target check value, determining the current host information as the host information.
Preferably, the method further comprises:
and reading the host ssh key from the response message, and storing the host ssh key.
The application discloses a host information adding method, which is applied to a host and comprises the following steps:
acquiring a collection message sent by a host management end through a multicast tunnel;
generating a response message by utilizing host information according to the collected message;
and sending the response message to the host management end so that the host management end obtains the host information according to the response message and adds the host information to the cluster information.
Preferably, the generating a response message according to the collected message by using host information includes:
reading a second operation code in the collection message, and judging whether the second operation code is a second preset operation code or not;
if the second operation code is the second preset operation code, reading other management information except the second operation code from the collection message; the other management information comprises a management end check value and current management information;
acquiring a current management end check value according to the current management information, and judging whether the management end check value is consistent with the current management end check value or not;
if the management end check value is consistent with the current management end check value, acquiring the host information;
and generating the response message according to the host information.
Preferably, the method further comprises:
and reading the management ssh key from the collection message, and storing the management ssh key.
Preferably, the sending the response message to the host management end includes:
the response message is sent to the host management end according to a preset time interval;
correspondingly, the method further comprises the following steps:
if the second operation code is not the second preset operation code, judging whether the second operation code is a third preset operation code or not;
and if the third preset operation code is the third preset operation code, stopping sending the response message.
The application discloses electronic equipment includes:
a memory for storing a computer program;
and a processor for implementing the steps of the host information adding method as described above when executing the computer program.
The application discloses host computer information adds system includes:
the host management end is used for sending the collection message to all hosts through the multicast tunnel; acquiring a response message which is fed back by the host and corresponds to the collection message; obtaining host information according to the response message, and adding the host information into cluster information;
the hosts are used for acquiring the collecting messages; and generating the response message by utilizing the host information according to the collected message.
The application provides a host information adding method, which is applied to a host management end and comprises the following steps: sending the collected message to all hosts through a multicast tunnel; obtaining a response message which is fed back by the host and corresponds to the collection message; and obtaining host information according to the response message, and adding host information corresponding to the host into the cluster information.
Therefore, the method and the device adopt a multicast tunnel mode to send the collecting message to all the hosts, and after receiving the response message fed back by the hosts, the host information in the response message is added to the host information corresponding to the hosts and the cluster information, so that the automatic discovery of the hosts is realized, and the efficiency of the host discovery is improved.
The application also provides an electronic device and a host information adding system, which have the beneficial effects and are not described in detail herein.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings that are required to be used in the embodiments or the description of the prior art will be briefly described below, and it is obvious that the drawings in the following description are only embodiments of the present application, and that other drawings may be obtained according to the provided drawings without inventive effort to a person skilled in the art.
Fig. 1 is a flow chart of a method for adding host information according to an embodiment of the present application;
fig. 2 is a schematic diagram of a message transmission provided in an embodiment of the present application;
FIG. 3 is a flowchart illustrating another method for adding host information according to an embodiment of the present disclosure;
fig. 4 is a schematic diagram of a collection message according to an embodiment of the present application;
FIG. 5 is a schematic diagram of another collected message according to an embodiment of the present application;
fig. 6 is a schematic diagram of a response message provided in an embodiment of the present application.
Detailed Description
For the purposes of making the objects, technical solutions and advantages of the embodiments of the present application more clear, the technical solutions of the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is apparent that the described embodiments are some embodiments of the present application, but not all embodiments. All other embodiments, which can be made by one of ordinary skill in the art without undue burden from the present disclosure, are within the scope of the present disclosure.
At present, management of a large number of hosts is generally realized at a management end through a broadcasting mode of the management end and the host end or a means of manually adding host information by technicians, but the efficiency of adding the host information is lower. Based on the above technical problems, the present embodiment provides a method for adding host information, which can improve efficiency of adding a host, and referring to fig. 1, fig. 1 is a flow chart of the method for adding host information, which is provided in the embodiment of the present application, and is applied to a host management end, and specifically includes:
s101, sending a collection message to all hosts through a multicast tunnel;
the multicast tunnel is in the form of an IP-based multicast transmission mode, and IP-based multicast refers to that an IP message is forwarded to a specific group of receivers after being sent from a data source. Compared with the traditional unicast technology, the method can effectively save network bandwidth and reduce network load, and is often used in network services such as online live broadcast, network television, real-time data transmission, multimedia conference and the like.
In this embodiment, a multicast group is created, where the multicast group includes a host management end and all hosts, where the host management end is used as a sender of data and sends the data to a specific group of receivers, i.e. all hosts, where the receivers share an IP address (a class D address specific to the multicast group).
Of course, in this embodiment, sending the collection message to all hosts through the multicast tunnel may specifically include: and sending the collected message to the switch through the multicast tunnel, and then sending the collected message to all hosts by the switch. In the Incloude Sphere and Incloud oil product series, the networking form of the servers is shown in fig. 2, and fig. 2 is a schematic diagram of message transmission provided in the embodiment of the present application, and a group of servers and a management server are connected through a switch.
The embodiment does not limit the collected message, and the user can set the collected message in a user-defined manner, so long as the purpose of the embodiment can be achieved. The collecting the message may include: the second operation code, the management end configuration information, the host management end name, the management ssh key and the management end check value. Wherein, the second operation code may be 0x0001, defined as the management end collecting server host information; management end configuration information including IP of management end, software configuration information, etc.; the host management end name and the management ssh key are convenient for the management end and the server host end to avoid secret access; and the check value adopts the crc check to the transmission content (operation code, configuration information, host name and the like) so as to check whether the transmission content is correct or not at the host end.
S102, obtaining a response message which corresponds to the collection message and is fed back by the host;
after receiving the collection message, the host generates a corresponding response message, and then sends the response message to the host management end. The response message includes the host information, and of course, may also include other information, which may be set by the user in a user-defined manner, so long as the purpose of the embodiment can be achieved.
S103, obtaining host information according to the response message, and adding the host information into the cluster information.
And obtaining host information according to the response message, and then adding the host information into the cluster information, thereby completing the addition of the host into the production environment. The method and the system realize quick addition of each installed host to the production environment in the large-scale deployed environment. The cluster information comprises host information corresponding to a plurality of hosts. The host information comprises a MAC address, a host name, a host ssh key, a host model, a RAID card model, a firmware version, a PCI address, a network card model and state, a CPU model and a memory.
Further, when the response message includes the host information and the first operation code, in order to improve efficiency, obtaining the host information according to the response message includes: reading a first operation code from the response message, and judging whether the first operation code is a first preset operation code or not; if the first operation code is a first preset operation code, the host information is read from the response message.
In this embodiment, the first preset operation code may be 0x0002, specifically, the host returns the current host information to the host management end. Only when the first operation code is a first preset operation code, reading host information from the response message; if the first operation code is not the first preset operation code, there may be a loss of the response message or a modification of the response message, and the operation is ended or an alarm response is sent. Therefore, the first operation code is set in the response message, so that the host management end can obtain the host information more efficiently and safely.
Further, when the response message further includes a check value, in order to ensure that the data is not modified, if the first operation code is a first preset operation code, reading the host information includes: if the first operation code is a first preset operation code, reading other information except the first operation code from the response message; the other information comprises a check value and current host information, a target check value is obtained according to the current host information, and whether the check value is consistent with the target check value or not is judged; and if the check value is consistent with the target check value, determining the current host information as the host information.
If the first operation code is a first preset operation code, reading a check value and current host information; and performing crc calculation according to the current host information to obtain a target check value, comparing the target check value with the check value, if the two are consistent, determining that the current host information is not modified, if the two are inconsistent, determining that the current host information is modified, stopping any operation at the moment, or sending out alarm information. Therefore, the embodiment ensures the safety of the data by checking.
Further, the method further comprises the following steps: and reading the host ssh key from the response message, and storing the host ssh key. The host ssh key is a secret key which is accessed by the host management end and the host in a secret-free mode. And ensuring the secret-free access between the host and the host management terminal.
Based on the above technical solution, the embodiment adopts the multicast tunnel mode to send the collecting message to all the hosts, and adds the host information corresponding to the host to the cluster information after receiving the response message fed back by the host, thereby realizing the automatic discovery of the host and improving the efficiency of the host discovery.
Referring to fig. 3, fig. 3 is a flowchart of another method for adding host information, applied to a host, according to an embodiment of the present application, including:
s201, acquiring a collection message sent by a host management end through a multicast tunnel;
further, the method further comprises the following steps:
and reading the management ssh key from the collection message, and storing the management ssh key.
And the ssh key is managed, so that the management end and the server host end are convenient to access without secret. The management ssh key is a secret key which is accessed by a host management end and a host in a secret-free manner. And ensuring the secret-free access between the host and the host management terminal.
Further, in order to ensure the safety of the information and improve the efficiency, generating a response message according to the collected message by using the host information includes: reading a second operation code in the collected message, and judging whether the second operation code is a second preset operation code or not; if the second operation code is a second preset operation code, reading other management information except the second operation code from the collection message; other management information comprises a management end check value and current management information; acquiring a current management end check value according to the current management information, and judging whether the management end check value is consistent with the current management end check value or not; if the check value of the management end is consistent with the check value of the current management end, acquiring host information; and generating a response message according to the host information.
Wherein, the collecting message includes, but is not limited to: the second operation code, management end configuration information (current management information), host management end name and management ssh key, and management end check value. Whether the second operation code is consistent with the second preset operation code or not is judged to determine whether subsequent information can be read, if so, a management end check value and current management information are obtained, then the management end check value is checked, and only if the check is passed, the fact that the information is not tampered can be proved, and the safety of the information is ensured. Therefore, according to the method and the device, on one hand, whether the subsequent information can be read or not is judged through the second operation code, so that the efficiency is improved, and on the other hand, the information safety is guaranteed through verification.
Further, the sending the response message to the host management end includes: transmitting a response message to a host management end according to a preset time interval; correspondingly, the method further comprises the following steps: if the second operation code is not the second preset operation code, judging whether the second operation code is a third preset operation code or not; if the operation code is the third preset operation code, stopping sending the response message.
In this embodiment, a response message is sent to the host management end at each preset time interval, and when the second operation code of the received collection message is the third preset operation code, the host is characterized as having completed adding, and at this time, the message sent by the host is closed, and the host is considered as having been taken over by the host management end.
S202, generating a response message by utilizing host information according to the collected message;
s203, the response message is sent to the host management end, so that the host management end obtains host information according to the response message, and the host information is added to the cluster information.
Based on the above technical solution, the embodiment adopts the multicast tunnel mode to send the collecting message to all the hosts, and adds the host information corresponding to the host to the cluster information after receiving the response message fed back by the host, thereby realizing the automatic discovery of the host and improving the efficiency of the host discovery.
Based on any one of the foregoing embodiments, this embodiment provides a specific method for adding host information, including:
1) The host management end collects host information.
a) The host management end sends a collecting message to all hosts in the group through the multicast tunnel, wherein the collecting message comprises a second operation code (0 x0001 operation code) and also comprises the relevant information of the host of the management end.
Referring to fig. 4, fig. 4 is a schematic diagram of a collection message according to an embodiment of the present application.
Defining a second operation code as: 0x0001 is the management end to collect the information of the server host;
management end configuration information including IP of management end, software configuration information, etc.;
the host management end name and the management ssh key are convenient for the management end and the server host end to avoid secret access;
the management end check value adopts the crc check for the transmission content (operation code, configuration information, host name and the like) to check whether the transmission content is correct or not at the host end.
Referring to fig. 5, fig. 5 is a schematic diagram of another collected message provided in an embodiment of the present application, where a second operation code is defined as follows: and 0x0003 is an ACK response sent to the host after the management end collects and configures certain host information.
b) After the host management end finishes sending the collecting message, waiting for the host to respond and receive the response message; after receiving the response message of the host, firstly reading the content of the first 8bytes, checking whether the 5-8bytes are 0x0002 operation codes, if not, ignoring, if yes, reading the subsequent content, and after reading, checking whether the content is consistent by using the crc, and if not, ignoring. If so, recording the host information of the host. Reading a management ssh key, and adding the management ssh key to a host of a host management end.
c) The host management end sends a command (collection message) for collecting the host once every 2 seconds.
d) After the configuration is completed, the host management end sends out host information to confirm that the host management end has received and confirmed the host.
2) The host side collects information in response.
a) When the host starts, the host waits to receive the multicast internal collection message.
b) After receiving a collecting message sent by a host management end, firstly reading the content of the previous 8bytes, checking whether the 5-8bytes are 0x0001 or 0x0003 operation codes, and if not, ignoring; if the operation code is 0x0001, reading the subsequent content, checking whether the subsequent content is consistent by using the crc after the reading is completed, if not, ignoring the subsequent content, and if so, recording the configuration information of the host end to the relevant position to obtain a response message. And simultaneously reading the management ssh key, and adding the management ssh key of the host management end into the host. If the operation code is 0x0003, the message sent by the host outwards is closed, and the host is considered to be taken over by the host management end.
Referring to fig. 6, fig. 6 is a schematic diagram of a response message provided in an embodiment of the present application, where a first operation code is defined as follows: 0x0002 is the information that the host side returns the current host to the host management side.
The transmission content comprises information such as an MAC address, a host name, a host ssh key, a host model and the like, RAID card related information, a network card, a CPU, a memory and the like; and the check value adopts the crc check to the transmission content to check whether the transmission content is correct or not. c) After receiving, the message of 0x0002 operation code is sent to the outside, and the relevant information of the host is sent. After the completion of the transmission, the message of 0x0003 operation code is waited to be received.
It can be seen that a multicast-based host auto-discovery scheme is provided herein, comprising the following phases: the management end collects the relevant parameters of the host through multicast, the management end transmits the relevant configuration of the host through multicast, the host end completes the relevant configuration, the management end completes the automatic host adding process, the embodiment of the scheme based on the automatic host discovery of multicast avoids adding host information through a manual adding mode, the scheme is applicable to the host of an x86 or arm platform, is an automatic host discovery scheme realized by pure software, and has strong applicability.
The following describes an electronic device provided in an embodiment of the present application, where the electronic device described below and the host information adding method described above may be referred to correspondingly.
The present embodiment provides an electronic device including:
a memory for storing a computer program;
and a processor for implementing the steps of the host information adding method as described above when executing the computer program.
Since the embodiment of the electronic device portion corresponds to the embodiment of the host information adding method portion, the embodiment of the electronic device portion is referred to the description of the embodiment of the host information adding method portion, and is not repeated herein.
The following describes a host information adding system provided in the embodiments of the present application, where the host information adding system described below and the method described above may be referred to correspondingly.
The present embodiment provides a host information adding system, including:
the host management end is used for sending the collection message to all hosts through the multicast tunnel; obtaining a response message which is fed back by the host and corresponds to the collection message; obtaining host information according to the response message, and adding the host information into the cluster information;
the host computers are used for acquiring the collecting messages; and generating a response message by utilizing the host information according to the collected message.
Since the embodiment of the host information addition system portion corresponds to the embodiment of the method portion, the embodiment of the host information addition system portion is referred to the description of the embodiment of the method portion, and is not repeated herein.
In the description, each embodiment is described in a progressive manner, and each embodiment is mainly described by the differences from other embodiments, so that the same similar parts among the embodiments are mutually referred. For the device disclosed in the embodiment, since it corresponds to the method disclosed in the embodiment, the description is relatively simple, and the relevant points refer to the description of the method section.
Those of skill would further appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware, computer software, or combinations of both, and that the various illustrative elements and steps are described above generally in terms of functionality in order to clearly illustrate the interchangeability of hardware and software. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
The steps of a method or algorithm described in connection with the embodiments disclosed herein may be embodied directly in hardware, in a software module executed by a processor, or in a combination of the two. The software modules may be disposed in Random Access Memory (RAM), memory, read Only Memory (ROM), electrically programmable ROM, electrically erasable programmable ROM, registers, hard disk, a removable disk, a CD-ROM, or any other form of storage medium known in the art.
The above describes a method for adding host information, a system for adding host information and an electronic device provided by the present application in detail. Specific examples are set forth herein to illustrate the principles and embodiments of the present application, and the description of the examples above is only intended to assist in understanding the methods of the present application and their core ideas. It should be noted that it would be obvious to those skilled in the art that various improvements and modifications can be made to the present application without departing from the principles of the present application, and such improvements and modifications fall within the scope of the claims of the present application.

Claims (6)

1. The host information adding method is characterized by being applied to a host management end and comprising the following steps of:
sending the collected message to all hosts through a multicast tunnel;
acquiring a response message which is fed back by the host and corresponds to the collection message;
obtaining host information according to the response message, and adding the host information into cluster information;
the obtaining the host information according to the response message includes:
reading a first operation code from the response message, and judging whether the first operation code is a first preset operation code or not;
if the first operation code is the first preset operation code, the host information is read from the response message;
if the first operation code is not the first preset operation code, the condition that the response message is lost or the response message is changed may exist, and then ending the operation or sending out an alarm response;
and if the first operation code is the first preset operation code, reading the host information, including:
if the first operation code is the first preset operation code, reading other information except the first operation code from the response message; the other information includes a check value and current host information,
acquiring a target check value according to the current host information, and judging whether the check value is consistent with the target check value or not;
if the check value is consistent with the target check value, determining the current host information as the host information;
further comprises:
reading a host ssh key from the response message, and storing the host ssh key;
the host generates a response message corresponding to the collection message, including:
reading a second operation code in the collection message, and judging whether the second operation code is a second preset operation code or not;
if the second operation code is the second preset operation code, reading other management information except the second operation code from the collection message; the other management information comprises a management end check value and current management information;
acquiring a current management end check value according to the current management information, and judging whether the management end check value is consistent with the current management end check value or not;
if the management end check value is consistent with the current management end check value, acquiring the host information;
and generating the response message according to the host information.
2. A host information adding method, applied to a host, comprising:
acquiring a collection message sent by a host management end through a multicast tunnel;
generating a response message by utilizing host information according to the collected message;
the response message is sent to the host management end, so that the host management end obtains the host information according to the response message, and the host information is added to the cluster information;
the host management end obtains the host information according to the response message, and the method comprises the following steps:
reading a first operation code from the response message, and judging whether the first operation code is a first preset operation code or not;
if the first operation code is the first preset operation code, the host information is read from the response message;
if the first operation code is not the first preset operation code, the condition that the response message is lost or the response message is changed may exist, and then ending the operation or sending out an alarm response;
the host management end reads the host information if the first operation code is the first preset operation code, including:
if the first operation code is the first preset operation code, reading other information except the first operation code from the response message; the other information includes a check value and current host information,
acquiring a target check value according to the current host information, and judging whether the check value is consistent with the target check value or not;
if the check value is consistent with the target check value, determining the current host information as the host information;
the generating a response message by using host information according to the collected message includes:
reading a second operation code in the collection message, and judging whether the second operation code is a second preset operation code or not;
if the second operation code is the second preset operation code, reading other management information except the second operation code from the collection message; the other management information comprises a management end check value and current management information;
acquiring a current management end check value according to the current management information, and judging whether the management end check value is consistent with the current management end check value or not;
if the management end check value is consistent with the current management end check value, acquiring the host information;
and generating the response message according to the host information.
3. The host information adding method according to claim 2, characterized by further comprising:
and reading the management ssh key from the collection message, and storing the management ssh key.
4. The method for adding host information according to claim 3, wherein the sending the response message to the host management side includes:
the response message is sent to the host management end according to a preset time interval;
correspondingly, the method further comprises the following steps:
if the second operation code is not the second preset operation code, judging whether the second operation code is a third preset operation code or not;
and if the third preset operation code is the third preset operation code, stopping sending the response message.
5. An electronic device, comprising:
a memory for storing a computer program;
a processor for implementing the steps of the host information addition method according to any one of claims 1 to 4 when executing the computer program.
6. A host information adding system, comprising:
the host management end is used for sending the collection message to all hosts through the multicast tunnel; acquiring a response message which is fed back by the host and corresponds to the collection message; obtaining host information according to the response message, and adding the host information into cluster information;
the hosts are used for acquiring the collecting messages; generating the response message by utilizing the host information according to the collected message;
the host management end is specifically configured to read a first operation code from the response message, and determine whether the first operation code is a first preset operation code; if the first operation code is the first preset operation code, the host information is read from the response message; if the first operation code is not the first preset operation code, the condition that the response message is lost or the response message is changed may exist, and then ending the operation or sending out an alarm response; and if the first operation code is the first preset operation code, reading the host information, including: if the first operation code is the first preset operation code, reading other information except the first operation code from the response message; the other information comprises a check value and current host information, a target check value is obtained according to the current host information, and whether the check value is consistent with the target check value or not is judged; if the check value is consistent with the target check value, determining the current host information as the host information;
the host management end is further configured to read a host ssh key from the response message, and store the host ssh key;
the host is specifically configured to read a second operation code in the collected message, and determine whether the second operation code is a second preset operation code; if the second operation code is the second preset operation code, reading other management information except the second operation code from the collection message; the other management information comprises a management end check value and current management information; acquiring a current management end check value according to the current management information, and judging whether the management end check value is consistent with the current management end check value or not; if the management end check value is consistent with the current management end check value, acquiring the host information; and generating the response message according to the host information.
CN202010851279.XA 2020-08-21 2020-08-21 Host information adding method, system and electronic equipment Active CN112003749B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010851279.XA CN112003749B (en) 2020-08-21 2020-08-21 Host information adding method, system and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010851279.XA CN112003749B (en) 2020-08-21 2020-08-21 Host information adding method, system and electronic equipment

Publications (2)

Publication Number Publication Date
CN112003749A CN112003749A (en) 2020-11-27
CN112003749B true CN112003749B (en) 2023-07-14

Family

ID=73473927

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010851279.XA Active CN112003749B (en) 2020-08-21 2020-08-21 Host information adding method, system and electronic equipment

Country Status (1)

Country Link
CN (1) CN112003749B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112751709B (en) * 2020-12-29 2023-01-10 北京浪潮数据技术有限公司 Management method, device and system of storage cluster

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101242306B (en) * 2008-02-28 2012-10-03 成都市华为赛门铁克科技有限公司 Method, system, device and server for automatic discovery of network device
CN106559302A (en) * 2015-09-30 2017-04-05 中兴通讯股份有限公司 Single tunnel method for building up, device and system
CN106878181A (en) * 2016-12-29 2017-06-20 新华三技术有限公司 A kind of message transmitting method and device
CN108881450A (en) * 2018-06-27 2018-11-23 郑州云海信息技术有限公司 A kind of method and device carrying out equipment discovery in storage cluster
CN108900603A (en) * 2018-06-27 2018-11-27 郑州云海信息技术有限公司 A kind of server discovery methods, devices and systems

Also Published As

Publication number Publication date
CN112003749A (en) 2020-11-27

Similar Documents

Publication Publication Date Title
KR101457241B1 (en) Full mesh rates transaction in a network
JP6966542B2 (en) Live video transmission methods and systems and equipment
CN110881135B (en) Method, device, equipment and medium for optimizing microphone-connected transmission protocol
CN103795762A (en) Reverse agent test system and method
JP2002271393A (en) Network system, server, client, communication method and communication program
CN108696588B (en) Information sending method and equipment
CN111263239B (en) Video frame packet loss processing method and related device
CN112003749B (en) Host information adding method, system and electronic equipment
CN111371887B (en) Internet of things log transmission method, client, server, equipment and storage medium
CN105450479A (en) Method and apparatus for monitoring module
CN111181698B (en) Data processing method, device, equipment and medium
CN103684707A (en) Server-side and user-side message transmission processing method, message transmission method and message transmission system
CN111541555A (en) Group chat optimization method and related product
CN105812413B (en) Communication method and device
CN110809262A (en) Internet of things equipment operation and maintenance management method based on COAP protocol
CN106790728A (en) information push method and system
CN107612753B (en) Wireless information processing method and device and wireless access equipment
CN108600004B (en) Video server configuration management method and system
CN105721231A (en) Service quality sensing detection method and service quality sensing detection device
CN108712434A (en) A kind of implementation method based on the HD video live streaming recorded broadcast meeting consultation of doctors
JP4482545B2 (en) Information distribution apparatus and information distribution method
CN111781848A (en) Server connection method, device and system based on intelligent household equipment
WO2013000215A1 (en) Method and device for issuing notification message
CN112911594A (en) Intelligent equipment configuration networking method and device
CN111726679B (en) Video playing method, device, equipment and medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant