CN112100048B - Self-adaptive inspection method and device for server - Google Patents

Self-adaptive inspection method and device for server Download PDF

Info

Publication number
CN112100048B
CN112100048B CN202011015945.2A CN202011015945A CN112100048B CN 112100048 B CN112100048 B CN 112100048B CN 202011015945 A CN202011015945 A CN 202011015945A CN 112100048 B CN112100048 B CN 112100048B
Authority
CN
China
Prior art keywords
server
log
alarm
hardware
connection
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202011015945.2A
Other languages
Chinese (zh)
Other versions
CN112100048A (en
Inventor
陶承
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Construction Bank Corp
Original Assignee
China Construction Bank Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Construction Bank Corp filed Critical China Construction Bank Corp
Priority to CN202011015945.2A priority Critical patent/CN112100048B/en
Publication of CN112100048A publication Critical patent/CN112100048A/en
Application granted granted Critical
Publication of CN112100048B publication Critical patent/CN112100048B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/34Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment
    • G06F11/3466Performance evaluation by tracing or monitoring
    • G06F11/3476Data logging
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/3003Monitoring arrangements specially adapted to the computing system or computing system component being monitored
    • G06F11/3006Monitoring arrangements specially adapted to the computing system or computing system component being monitored where the computing system is distributed, e.g. networked systems, clusters, multiprocessor systems

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Quality & Reliability (AREA)
  • General Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • Computer Hardware Design (AREA)
  • Mathematical Physics (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The application discloses a server self-adaptive inspection method and device, and equipment information of each server is acquired under the condition that an inspection instruction is received. And under the condition that the network of the server is not faulty, establishing connection with the server by using a connection protocol corresponding to the server according to a preset corresponding relation. And under the condition that the connection is normal, executing a log collection command according to the corresponding relation to obtain a hardware log of the server. Each alarm entry of the server is extracted from the hardware log. And screening target alarm items from the alarm items. And storing the target alarm items into log summarization, and displaying the log summarization. Therefore, according to the method provided by the application, protocol connection can be built in a self-adaptive mode aiming at different types of servers, log collection commands are called to acquire hardware logs, alarm items are extracted from the hardware logs, log summarization is generated, a user is assisted in inspecting each server, and compared with manual inspection, inspection efficiency is improved obviously.

Description

Self-adaptive inspection method and device for server
Technical Field
The application relates to the technical field of data processing, in particular to a server self-adaptive inspection method and device.
Background
Currently, the inspection mode of the data center server adopts manual inspection, i.e. the server equipment in the machine room is manually inspected in a mode of looking at the alarm lamp and listening to the alarm sound. However, as the number of production rooms and operating equipment increases, not only is a significant amount of labor costs consumed, but also the efficiency is low. Obviously, the manual inspection mode is gradually unable to adapt to the development requirement of the age.
Disclosure of Invention
The applicant found that:
currently, the main stream servers of all manufacturers are provided with hardware management control modules (Baseboard Management Controller, BMC), and when the servers fail and generate alarm sounds and alarm lamp prompts, corresponding logs are generated in the BMC. Based on the BMC mechanism (namely, when the server fails, corresponding hardware logs are generated), the hardware faults of each server can be positioned by collecting and analyzing the hardware logs generated by the BMC of each server, and the automatic inspection of the server is realized.
In view of this, the present application provides a server self-adaptive inspection method and device, which aims to improve the efficiency of server inspection.
In order to achieve the above object, the present application provides the following technical solutions:
A server self-adaptive inspection method comprises the following steps:
under the condition of receiving the inspection instruction, acquiring the equipment information of each server;
under the condition that the network of the server is not faulty, establishing connection with the server by using a connection protocol corresponding to the server according to a preset corresponding relation; wherein the correspondence includes the server, the connection protocol, and a log collection command;
under the condition that the connection is normal, executing the log collection command corresponding to the server according to the corresponding relation to obtain a hardware log generated by a hardware management control module in the server;
extracting each alarm item of the server from the hardware log, wherein the alarm item is used for indicating hardware fault details of the server;
screening out target alarm items from the alarm items, wherein the alarm level and the alarm time indicated by the target alarm items meet preset screening conditions;
storing the target alarm item into a preset log summary;
and displaying the log summary.
Optionally, after the obtaining the device information of each server, the method further includes:
Performing network diagnosis on the IP addresses indicated by the equipment information;
if the IP address passes the network diagnosis, determining that the network of the server to which the IP address belongs is not faulty;
if the IP address does not pass the network diagnosis, determining the network fault of the server to which the IP address belongs;
and in the case of determining the network fault of the server, storing the equipment information of the server into the log summary, and marking the network fault of the server in the log summary.
Optionally, the performing network diagnosis on the IP address indicated by each piece of equipment information includes:
creating a producer queue;
storing the IP address indicated by each piece of equipment information into the producer queue;
creating a consumer thread queue; wherein the consumer thread queue comprises a plurality of threads; the thread is used for acquiring any one of the IP addresses from the producer queue and carrying out network diagnosis on the IP addresses;
and executing each thread in the consumer thread queue concurrently, and setting a global mutual exclusion lock for each thread.
Optionally, after establishing connection with the server, the method further includes:
And under the condition that the protocol connection fault is determined, storing the equipment information of the server into the log summary, and marking the server protocol connection fault in the log summary.
Optionally, the acquiring the device information of each server includes:
starting a preset script, retrieving each file under a preset file path, and displaying the file name of each file to a user through a local command prompt Fu Zhongduan; wherein the preset script includes logic for retrieving each of the files under the preset file path; the file types of the files comprise text files and table files;
analyzing a file format indicated by a target file name, determining a file type of a target file, and reading the target file according to the target file name and the file type to obtain equipment information of each server; the target file name is a file name which is input by a user through the command prompt terminal or is preconfigured in the preset script.
Optionally, the establishing connection with the server according to the preset corresponding relationship by using a connection protocol corresponding to the server includes:
Creating a producer queue;
storing said device information for each of said servers into said producer queue;
creating a consumer thread queue; wherein the consumer thread queue comprises a plurality of threads; the thread is used for acquiring the equipment information of any one server from the producer queue, and establishing connection with the server by using a connection protocol corresponding to the server according to a preset corresponding relation;
concurrently executing each thread in the consumer thread queue, and setting a global mutual exclusion lock for each thread;
and executing a log collection command corresponding to the server according to the corresponding relation to obtain a hardware log generated by a hardware management control module in the server, wherein the method comprises the following steps:
executing each thread in the consumer thread queue concurrently, wherein the thread is further used for executing a log collection command corresponding to the server according to the corresponding relation to obtain a hardware log generated by a hardware management control module in the server;
the extracting each alarm entry of the server from the hardware log includes:
concurrently executing each of the threads in the consumer thread queue, the threads further configured to extract each alert entry of the server from the hardware log;
The step of screening out the target alarm items from the alarm items comprises the following steps:
and concurrently executing each thread in the consumer thread queue, wherein the thread is also used for screening out a target alarm item from each alarm item.
Optionally, the server includes:
a first type server and a second type server;
the first type of server supports a log collecting tool protocol based on an intelligent platform management interface, and the second type of server supports a secure shell protocol.
A server adaptive inspection device, comprising:
the acquisition unit is used for acquiring the equipment information of each server under the condition of receiving the inspection instruction;
the connection unit is used for establishing connection with the server by using a connection protocol corresponding to the server according to a preset corresponding relation under the condition that the network of the server is not faulty; wherein the correspondence includes the server, the connection protocol, and a log collection command;
the execution unit is used for executing the log collection command corresponding to the server according to the corresponding relation under the condition that the connection is determined to be normal, so as to obtain a hardware log generated by a hardware management control module in the server;
An extracting unit, configured to extract, from the hardware log, each alarm entry of the server, where the alarm entry is used to indicate hardware fault details of the server;
the screening unit is used for screening out target alarm items from the alarm items, and the alarm level and the alarm time indicated by the target alarm items meet preset screening conditions;
the storage unit is used for storing the target alarm items into a preset log summary;
and the display unit is used for displaying the log summary.
A computer-readable storage medium comprising a stored program, wherein the program performs the server adaptive inspection method.
A server adaptive inspection device, comprising: a processor, a memory, and a bus; the processor is connected with the memory through the bus;
the memory is used for storing a program, and the processor is used for running the program, wherein the server self-adaptive inspection method is executed when the program runs.
According to the technical scheme, under the condition that the inspection instruction is received, equipment information of each server is obtained. And under the condition that the network of the server is not faulty, establishing connection with the server by using a connection protocol corresponding to the server according to a preset corresponding relation. The corresponding relation comprises a server, a connection protocol and a log collection command. Under the condition that the connection is normal, executing a log collection command corresponding to the server according to the corresponding relation to obtain a hardware log generated by a hardware management control module in the server. And extracting each alarm item of the server from the hardware log, wherein the alarm item is used for indicating hardware fault details of the server. And screening and obtaining target alarm items from all alarm items, wherein the alarm level and the alarm time indicated by the target alarm items meet preset screening conditions. And storing the target alarm item into a preset log summary, and displaying the log summary. Therefore, according to the method provided by the application, protocol connection can be built adaptively for different types of servers, log collection commands are called to acquire hardware logs, alarm items of the servers are extracted from the different types of hardware logs, log summarization is generated, and therefore a user is assisted in rapidly inspecting each server, and compared with manual inspection, inspection efficiency is improved obviously.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings that are required in the embodiments or the description of the prior art will be briefly described below, it being obvious that the drawings in the following description are only some embodiments of the present application, and that other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
Fig. 1 is a schematic diagram of a server adaptive routing inspection method provided in an embodiment of the present application;
fig. 2 is a schematic diagram of a method for obtaining server device information according to an embodiment of the present application;
FIG. 3 is a schematic diagram of a method for multi-threaded concurrent processing of ping checks of IP addresses according to an embodiment of the present application;
FIG. 4 is a schematic diagram of a method for multithreading concurrent log acquisition according to an embodiment of the present application;
fig. 5 is a schematic diagram of another server adaptive routing inspection method according to an embodiment of the present disclosure;
fig. 6 is a schematic structural diagram of a server adaptive inspection device according to an embodiment of the present application.
Detailed Description
The following description of the embodiments of the present application will be made clearly and fully with reference to the accompanying drawings, in which it is evident that the embodiments described are only some, but not all, of the embodiments of the present application. All other embodiments, which can be made by one of ordinary skill in the art without undue burden from the present disclosure, are within the scope of the present disclosure.
The flow of the embodiment of the application is applied to a server cluster, and specifically can be executed by a host in the server cluster, and is used for collecting and analyzing hardware logs generated by BMCs of all servers in the server cluster under the condition of receiving a routing inspection instruction, extracting alarm items of the servers from the hardware logs, collecting log summary of each alarm item with uniform construction format, and enabling a user to always locate hardware faults possibly happening in each server through the log summary, so that quick routing inspection of each server is realized.
In practical application, some manufacturers can repackage and upgrade the BMC and add corresponding characteristic functions to obtain advanced BMC function modules, such as Hua's iBMC module, h3c iLO module and dell iDRAC module, which have characteristic functions of advanced log inquiry, power state inspection, PCI card state monitoring and the like added on the basis of the standard functions of the BMC. Currently, the types of servers are largely divided into two types, one supporting the intelligent platform management interface based log collection tool (Intelligent PlatformManagement Interface, IPMI) protocol and the other supporting the Secure Shell (SSH) protocol. As such, the formats of the hardware logs generated by the BMCs of the various types may be different, and thus, useful information (specifically, an alarm entry of the server, which can indicate hardware failure details of the server) needs to be extracted from the hardware logs of the various types.
As shown in fig. 1, a schematic diagram of a server adaptive routing inspection method provided in an embodiment of the present application includes the following steps:
s101: and under the condition that a patrol instruction is received, calling a preset python script, acquiring the equipment information of each server, integrating the equipment information of each server, and constructing a host list.
The device information includes a serial number, an IP address, and a manufacturer. Specifically, the device information of each server is collected, and an obtained host list is constructed, as shown in table 1.
TABLE 1
Sequence number IP address Manufacturer(s)
6CU4380VAM 192.168.1.1 h3c
213093410 192.168.1.2 inspur
9400000700413536 192.168.1.3 sugon
06CMZZK 192.168.1.4 lenovo
2102310YKA10F7000285 192.168.1.5 huawei
6CU4380V90 192.168.1.6 hp
5JJM5X1 192.168.1.7 dell
It should be noted that the specific contents shown in table 1 above are only for illustration.
It should be emphasized that, the specific implementation process of calling the preset python script and obtaining the device information of each server may be referred to the steps shown in fig. 2 and the explanation of the steps described below.
S102: and performing network diagnosis (i.e. ping check) on each IP address in the host list, and judging whether the network of any server is normal.
If the IP address of the server passes the ping check, it is determined that the network of the server is normal, S103 is executed, and if the IP address of the server does not pass the ping check, it is determined that the network of the server is faulty, S104 is executed.
It should be noted that, the specific implementation process of performing ping check on each IP address in the host list includes: for each IP address, a preset sub-process module (a function in python is used to execute a specified command, and after the command is executed, obtain a result returned by the command), execute a ping command (a DOS command for checking whether the network is clear), obtain a return value of the ping command, determine a network state of the server according to the return value, specifically run sub-process.
It should be emphasized that, in order to improve the efficiency of ping inspection, each IP address in the host list may be pre-stored in the thread queue, and the multi-thread concurrent processing technology is utilized to use the ping inspection of any one IP address as a thread, batch process the ping inspection of the IP address, and add a global mutex lock for each thread, so as to ensure synchronization and security of each thread.
It should be noted that, for a specific implementation procedure of the ping check of the IP address for the multithreading concurrent processing, reference may be made to the steps shown in fig. 3 and the explanation of the steps.
S103: and storing the equipment information of the server into a preset effective host list.
After S103 is performed, S105 is continued.
S104: and storing the equipment information of the server into a preset log summary, and marking the network fault of the server in the log summary.
S105: and determining the type of each server in the effective host list according to the locally pre-stored corresponding relation.
The correspondence includes manufacturer, connection protocol, module type (for indicating a specific model of BMC in the server), and log collection command, and specifically, see table 2 below.
TABLE 2
Manufacturer(s) Connection protocol Module type Log collection commands
(Dawn) IPMI BMC Module-built-in IPMI Command sellist
Tide IPMI BMC Module-built-in IPMI Command sellist
Association/IBM IPMI BMC Module-built-in IPMI Command sellist
Huawei SSH iBMC module-built-in internal command ipmcgetevents
DELL SSH iDRAC module-built-in internal command showlog/record
HP/H3C SSH iLO Module-built-in internal Command showsystem/log
It should be noted that the details shown in table 2 above are only for illustration.
It should be emphasized that the types of servers are classified into servers supporting the IPMI protocol and servers supporting the SSH protocol.
S106: aiming at a server supporting an IPMI protocol, an IPMI protocol is used for establishing IPMI connection with the server, and whether the IPMI connection is normal or not is judged.
If the IPMI connection is normal, S107 is executed, and if the IPMI connection fails, S108 is executed.
S107: and executing a log collection command corresponding to the manufacturer of the server according to the corresponding relation to obtain a hardware log generated by the BMC in the server.
After S107 is performed, S112 is continued.
The specific implementation process for executing the log collection command corresponding to the manufacturer of the server aiming at the server supporting the IPMI protocol to obtain the hardware log generated by the BMC in the server is as follows: and calling a subspecies.Popen function in the local standard library, triggering the cmd terminal to execute a log collection command, acquiring return information (namely, a hardware log generated by the BMC and the data type of the return information is list) of the log collection command, and storing the return information to the local.
S108: and storing the equipment information of the server into a preset log summary, and marking the IPMI connection fault of the server in the log summary.
S109: and aiming at a server supporting the SSH protocol, using the SSH protocol to establish SSH connection with the server, and judging whether the SSH connection is normal or not.
If the SSH connection is normal, S110 is executed, and if the SSH connection fails, S111 is executed.
S110: and executing a log collection command corresponding to the manufacturer of the server according to the corresponding relation to obtain a hardware log generated by the BMC in the server.
After S110 is performed, S112 is continued.
The specific implementation process of executing the log collection command corresponding to the manufacturer of the server aiming at the server supporting the SSH protocol to obtain the hardware log generated by the BMC in the server is as follows: calling a paramiko function in a third-party class library, creating an SSHCLIENT object, calling an exec_command function in the SSHCLIENT object, executing a log collection command, calling a readlines function in a local library, acquiring return information of the log collection command (namely, a hardware log generated by the BMC, and the data type of the return information is list), and storing the return information to the local.
S111: and storing the equipment information of the server into a preset log summary, and marking the connection fault of the server SSH in the log summary.
S112: each alarm entry of the server is extracted from the hardware log.
Wherein, the alarm item comprises alarm level, alarm time and alarm detailed description information.
It should be noted that, for the server supporting the IPMI protocol, the specific implementation process of extracting each alarm entry of the server from the hardware log is as follows: and calling a get_log function in a local library, traversing all characters in a hardware log generated by the BMC to search a target character, wherein the target character is used for indicating an alarm item of a server, the alarm item comprises an alarm level, alarm time and alarm detailed description information, extracting the target character, and storing the target character into a preset numpy type two-dimensional array.
For a server supporting an SSH protocol, the specific implementation process of extracting each alarm item of the server from a hardware log is as follows: and calling a get_log function in a local library, traversing all characters in a hardware log generated by the BMC to search a target character, wherein the target character is used for indicating an alarm item of a server, the alarm item comprises an alarm level, alarm time and alarm detailed description information, extracting the target character, and storing the target character into a preset numpy type two-dimensional array.
It should be noted that, the alarm level, alarm time and detailed description information of the server are extracted from the hardware logs, and other useless and understandable information is filtered, so that the hardware logs of the servers of various types can be kept uniform in format, and the original obscure and complicated hardware logs become clear, thereby facilitating the user to clearly learn the running state of each server.
S113: and screening target alarm items from all alarm items to be used as effective logs.
After S113 is performed, S114 is continued.
The alarm level and the alarm time indicated in the target alarm item meet the screening conditions, and specific screening conditions can be set by a technician according to actual situations, for example, the alarm level is greater than a preset level, and a time point indicated by the alarm time is within a preset time period, etc.
It should be noted that, for the server supporting the IPMI protocol, the target alarm item is screened from the alarm items, and the specific implementation process of the target alarm item as the effective log is as follows: and calling a reconstruct_log function in the local library, screening the alarm level and the alarm time of the server, and storing alarm items which belong to the alarm level and the alarm time which meet the screening conditions into a preset effective log.
Aiming at a server supporting an SSH protocol, screening and obtaining a target alarm item from all alarm items, wherein the specific implementation process of the target alarm item serving as an effective log comprises the following steps: and calling a reconstruct_log function in the local library, screening the alarm level and the alarm time of the server, and storing alarm items which belong to the alarm level and the alarm time which meet the screening conditions into a preset effective log.
S114: and storing the effective log into a preset log summary.
In order to improve the log obtaining efficiency, the above-mentioned S105-S114 may be performed by using a multithreaded concurrent processing technology, and a specific implementation process may be referred to as steps shown in fig. 4 and explanation of the steps.
S115: and storing the log summary locally, and displaying the log summary to a user.
The file format of the log summary includes a txt text and an xls table, and the file name of the log summary may be a time date.
In summary, a preset script is called to obtain the device information of each server, network diagnosis is performed on the IP address of the server, if the network of the server fails, the device information of the server is stored in a log summary, and the network failure of the server is marked. If the network of the server is normal, different protocol connections are established for different types of servers, if the protocol connections are normal, a log collection command corresponding to a manufacturer to which the server belongs is executed according to a pre-stored corresponding relation, a hardware log generated by a BMC in the server is obtained, the hardware log is subjected to format transformation, the hardware log subjected to format transformation is analyzed, an effective log is obtained, and the effective log is stored in a log summarization. If the protocol connection fails, the equipment information of the server is stored in the log summary, and the server protocol connection failure is marked. Therefore, protocol connection can be built adaptively for different types of servers, log collection commands are called to acquire hardware logs, alarm entries of the servers are extracted from the different types of hardware logs, the alarm entries in log summary are uniform in format and clear in content, compatibility of the different types of hardware logs is achieved, and a user can know the running state of each server clearly. Based on the alarm items of each server recorded in the log summary, the system can assist a user to rapidly patrol each server, and compared with manual patrol, the system has the advantage that the patrol efficiency is obviously improved.
As shown in fig. 2, a schematic diagram of a method for obtaining server device information according to an embodiment of the present application includes the following steps:
s201: enabling the python script, retrieving each file under the preset file path, and displaying the file name of each file to the user through a local command prompt (cmd) terminal.
Wherein the python script includes logic for retrieving a file under a preset file path, the file type of the file including a text file and a table file.
In practical applications, the device information of the server is usually stored in the hosts file under the preset file path, and the file format indicated by the file name of the hosts file includes a. Txt text and a. Xls table.
Specifically, the implementation process of displaying the file names of the files to the user through the cmd terminal is as follows: "> > python autoinstection. Py" is performed in the command line of the cmd terminal.
S202: and receiving the file name input by the user through the cmd terminal.
The file to which the file name belongs is specifically a hosts file.
It should be noted that, the user may also pre-configure a argument in the python script, where the argument is used to indicate the file name of the host file, so that the user does not need to input the target file name through the cmd terminal.
It should be emphasized that if the parameter transmission is already configured in advance in the python script, after each file in the preset file path is retrieved, the file name of each file is not required to be displayed to the user through the cmd terminal, and S203 is simply executed directly.
Specifically, the implementation process of configuring the parameter transmission in the python script is as follows: "> > python automatic injection. Pyaaa. Xls", pyaaa. Xls is the file name, is performed in the command line of the cmd terminal.
S203: analyzing the file format indicated by the file name, determining the file type of the hosts file, and reading the hosts file according to the file name and the file type to obtain the equipment information of each server.
If the file format indicated by the file name is a text file, the host file is a text file, and if the file format indicated by the file name is an xls table, the host file is a table file. In other words, based on the file name and the file type, the hosts file can be adaptively read.
Specifically, if the file format indicated by the file name is a text of txt, the specific implementation process of reading the hosts file is as follows: calling an open function in a local system library, opening a host text, calling a readlines function to read the content in the host text, storing the content into a preset list object, calling a reshape function, and storing the list object as a two-dimensional array with a data type of numpy.
Specifically, if the file format indicated by the file name is an xls table, the specific implementation process of reading the host file is as follows: invoking an open_workbook function in a local third party class library, opening a hosts table, traversing the first sheet of the whole hosts table in a line circulation mode, storing elements in the hosts table into a preset two-dimensional array of numpy type, performing anomaly checking on the format of the hosts table, and deleting the hosts table if the format of the hosts table does not meet the preset requirement.
It should be noted that the specific implementation procedure described above is only for illustration.
S204: and saving the device information to the local.
In the present embodiment, the data type of the device information includes, but is not limited to, a two-dimensional array of numpy type.
In summary, based on the method provided in the embodiment, device information of each server can be effectively obtained.
As shown in fig. 3, a schematic diagram of a method for processing ping check of an IP address concurrently by multiple threads according to an embodiment of the present application includes the following steps:
s301: a producer queue is created.
The specific implementation process of creating the producer queue and the implementation principle of the producer queue are well known to those skilled in the art, and will not be described herein.
S302: the respective IP addresses are stored in a producer queue.
S303: a consumer thread queue is created.
Wherein the consumer thread queue comprises a plurality of threads, and the consumer thread queue comprises a plurality of threads; the thread is used for acquiring any one IP address from the producer queue and performing network diagnosis on the IP address. It should be noted that the specific implementation process of creating the consumer thread queue and the implementation principle of the consumer thread queue are well known to those skilled in the art, and will not be described herein.
S304: each thread in the consumer thread queue is executed concurrently.
The specific execution process of each thread is as follows:
s305: and calling a Thread function to acquire any one IP address from the producer queue.
S306: and calling a subspecies.call function in the local library, executing the ping instruction, and acquiring a return value of the ping instruction.
S307: and judging whether the ping check passes or not according to the return value.
If the ping check passes, S308 is performed, otherwise S309 is performed.
S308: and adding a global mutex lock for the thread, and adding the equipment information of the IP address to a preset effective host list.
After S308 is performed, S310 is continued.
It should be noted that, the specific implementation process of adding the global mutual exclusion lock to the thread and the implementation principle of the global mutual exclusion lock are common knowledge familiar to those skilled in the art, and are not described herein again.
S309: and adding a global mutual exclusion lock for the thread, and adding equipment information to which the IP address belongs to a preset log summary.
After S309 is performed, S310 is continued.
The global mutual exclusion lock is added for the threads, so that when a plurality of threads write operation is performed on the same log summary (namely, the equipment information of the IP address is added to the preset log summary), the uniformity of the equipment information in the log summary is ensured.
S310: releasing the global mutex lock of the thread.
In summary, each IP address is stored in the producer queue, and each thread in the consumer thread queue is executed concurrently by using the consumer thread queue, where each thread is configured to obtain any IP address from the producer queue, and perform network diagnosis on the IP address. In addition, a global mutual exclusion lock is set for each thread, so that the synchronization and safety of each thread and the uniformity of the information of each device added in the log summary are ensured. It can be seen that, based on the method provided in this embodiment, the network diagnosis efficiency of each IP address in the host list can be improved.
As shown in fig. 4, a schematic diagram of a method for multithreading concurrent processing log acquisition procedure according to an embodiment of the present application includes the following steps:
s401: a producer queue is created.
S402: and storing the equipment information of each server in the effective host list into a producer queue.
S403: a consumer thread queue is created.
Wherein the consumer thread queue comprises a plurality of threads. The thread is used for: any one server is obtained from the producer queue, and connection is established with the server by using a connection protocol corresponding to the server according to a preset corresponding relation (the corresponding relation comprises the server, the connection protocol and a log collection command); executing a log collection command corresponding to the server according to the corresponding relation to obtain a hardware log generated by a hardware management control module in the server; extracting each alarm item of the server from the hardware log; and screening target alarm items from the alarm items.
S404: each thread in the consumer thread queue is executed concurrently.
The specific execution process of each thread is as follows:
s405: and calling a Thread function, and acquiring the equipment information of any one server from the producer queue.
S406: and establishing connection with the server by using a connection protocol corresponding to the server according to the locally pre-stored corresponding relation, and judging whether the connection is normal or not.
If the connection is normal, S407 is executed, and if the connection is failed, S408 is executed.
S407: and executing a log collection command corresponding to the server according to the corresponding relation to obtain a hardware log generated by a hardware management control module in the server.
After S407 is performed, S409 is continued.
S408: and adding a global mutual exclusion lock for the thread, storing equipment information of the server into a preset log summary, and marking server protocol connection faults in the log summary.
After the execution of S408, S411 is continued.
The global mutual exclusion lock is added for the threads, so that when a plurality of threads write operation is performed on the same log summary (namely, the equipment information of the server is stored to the preset log summary), the uniformity of the equipment information in the log summary is ensured.
S409: each alarm entry of the server is extracted from the hardware log.
After S409 is performed, S410 is continued.
The specific implementation process and implementation principle of S409 are identical to those of S112, and are not described herein.
S410: and adding a global mutual exclusion lock for the thread, and screening out target alarm items from all alarm items to be used as effective logs.
After the execution of S410, S411 is continued.
The specific implementation procedure and implementation principle of S410 are the same as those of S113, and are not described herein.
S411: releasing the global mutex lock of the thread.
S412: and storing the effective log into a log summary.
In summary, the device information of each server in the valid host list is stored in the producer queue, and each thread in the consumer thread queue is executed concurrently by using the consumer thread queue, where each thread is used for: any one server is obtained from the producer queue, a connection protocol corresponding to the server is used for establishing connection with the server according to a preset corresponding relation, a log collection command corresponding to the server is executed according to the corresponding relation, a hardware log generated by a hardware management control module in the server is obtained, each alarm item of the server is extracted from the hardware log, and a target alarm item is obtained by screening each alarm item. In addition, a global mutual exclusion lock is set for each thread, so that thread synchronization and safety and uniformity of all equipment information stored in log summarization are guaranteed. Therefore, based on the method provided by the embodiment, the efficiency of hardware log acquisition and processing can be improved.
It should be noted that, in the above embodiment, the preset python script is called to obtain the device information of each server, which is a specific way for obtaining the device information of each server in the embodiment of the present application, and in addition, storing the device information of the server into the preset valid host list is also a specific way for storing the device information in the embodiment of the present application. Accordingly, the flow described in the above embodiment can be summarized as the method shown in fig. 5 described below.
Fig. 5 is a schematic diagram of another server adaptive routing inspection method according to an embodiment of the present application, including the following steps:
s501: and under the condition that the inspection instruction is received, acquiring the equipment information of each server.
The server comprises a first type server and a second type server, wherein the first type server supports a log collecting tool protocol based on an intelligent platform management interface, and the second type server supports a secure shell protocol.
S502: and under the condition that the network of the server is not faulty, establishing connection with the server by using a connection protocol corresponding to the server according to a preset corresponding relation.
The corresponding relation comprises a server, a connection protocol and a log collection command.
It should be noted that, the correspondence relationship mentioned in the embodiment shown in fig. 1 is only one specific implementation manner of the correspondence relationship described in this embodiment.
S503: under the condition that the connection is normal, executing a log collection command corresponding to the server according to the corresponding relation to obtain a hardware log generated by a hardware management control module in the server.
S504: each alarm entry of the server is extracted from the hardware log.
Wherein the alarm item is used for indicating hardware fault details of the server
S505: and screening target alarm items from the alarm items.
Wherein the alarm level and the alarm time indicated by the target alarm item meet the preset screening condition
S506: and storing the target alarm item into a preset log summary.
S507: and displaying log summarization.
In summary, under the condition that the inspection instruction is received, the equipment information of each server is acquired. And under the condition that the network of the server is not faulty, establishing connection with the server by using a connection protocol corresponding to the server according to a preset corresponding relation. The corresponding relation comprises a server, a connection protocol and a log collection command. Under the condition that the connection is normal, executing a log collection command corresponding to the server according to the corresponding relation to obtain a hardware log generated by a hardware management control module in the server. And extracting each alarm item of the server from the hardware log, wherein the alarm item is used for indicating hardware fault details of the server. And screening and obtaining target alarm items from all alarm items, wherein the alarm level and the alarm time indicated by the target alarm items meet preset screening conditions. And storing the target alarm item into a preset log summary, and displaying the log summary. Therefore, according to the method provided by the embodiment, protocol connection can be built adaptively for different types of servers, log collection commands are called to acquire hardware logs, alarm entries of the servers are extracted from the different types of hardware logs, log summarization is generated, and therefore a user is assisted in rapidly inspecting each server, and compared with manual inspection, inspection efficiency is improved obviously.
Corresponding to the server self-adaptive inspection method provided by the embodiment of the application, the embodiment of the application also provides a server self-adaptive inspection device.
Fig. 6 is a schematic structural diagram of a server adaptive routing inspection device according to an embodiment of the present application, including:
and an acquisition unit 100, configured to acquire device information of each server when receiving the inspection instruction.
The specific implementation process of acquiring the device information of each server by the acquisition unit comprises the following steps: starting a preset script, searching each file under a preset file path, and displaying the file name of each file to a user through a local command prompt Fu Zhongduan, wherein the preset script comprises logic for searching each file under the preset file path, the file types of the files comprise text files and table files, the file format indicated by a target file name is analyzed, the file type of the target file is determined, and the target file is read according to the target file name and the file type to obtain the equipment information of each server, wherein the target file name is the file name which is input by the user through a command prompt terminal or is preconfigured in the preset script. The server comprises a first type of server and a second type of server, wherein the first type of server supports a log collecting tool protocol based on an intelligent platform management interface, and the second type of server supports a secure shell protocol.
The diagnostic unit 200 is configured to perform network diagnosis on the IP address indicated by each device information, determine that the network of the server to which the IP address belongs is not faulty if the IP address passes the network diagnosis, and determine that the network of the server to which the IP address belongs is faulty if the IP address does not pass the network diagnosis.
The specific implementation process of the diagnosis unit for carrying out network diagnosis on the IP addresses indicated by the equipment information comprises the following steps: creating a producer queue, storing IP addresses indicated by the equipment information into the producer queue, and creating a consumer thread queue, wherein the consumer thread queue comprises a plurality of threads, the threads are used for acquiring any one IP address from the producer queue, performing network diagnosis on the IP address, executing each thread in the consumer thread queue concurrently, and setting a global mutual exclusion lock for each thread.
The first marking unit 300 is configured to store, in the event that a network failure of the server is determined, device information of the server into a log summary, and mark the network failure of the server in the log summary.
The connection unit 400 is configured to establish a connection with the server according to a preset correspondence relationship using a connection protocol corresponding to the server in the case that the network of the server is not faulty. The corresponding relation comprises a server, a connection protocol and a log collection command.
The specific implementation process of establishing connection with the server by using a connection protocol corresponding to the server according to a preset corresponding relation by the connection unit comprises the following steps: creating a producer queue, storing the equipment information of each server into the producer queue, creating a consumer thread queue, wherein the consumer thread queue comprises a plurality of threads, the threads are used for acquiring the equipment information of any one server from the producer queue, establishing connection with the servers by using a connection protocol corresponding to the servers according to a preset corresponding relation, concurrently executing each thread in the consumer thread queue, and setting global mutual exclusion locks for each thread.
And a second marking unit 500 for storing the device information of the server into the log summary and marking the server protocol connection fault in the log summary in case of determining the protocol connection fault.
And the execution unit 600 is configured to execute the log collection command corresponding to the server according to the correspondence when the connection is determined to be normal, so as to obtain the hardware log generated by the hardware management control module in the server.
Wherein, the execution unit is specifically used for: and executing each thread in the consumer thread queue concurrently, wherein the threads are also used for executing a log collection command corresponding to the server according to the corresponding relation to obtain a hardware log generated by a hardware management control module in the server.
And an extracting unit 700, configured to extract, from the hardware log, each alarm entry of the server, where the alarm entry is used to indicate hardware failure details of the server.
Wherein, the extraction unit is specifically used for: each thread in the consumer thread queue is concurrently executed, and the threads are also used to extract each alarm entry of the server from the hardware log.
And a screening unit 800, configured to screen out a target alarm item from the alarm items, where the alarm level and the alarm time indicated by the target alarm item meet the preset screening conditions.
Wherein, screening unit is specifically used for: and concurrently executing each thread in the consumer thread queue, wherein the threads are also used for screening out target alarm items from all alarm items.
And the storage unit 900 is configured to store the target alarm entry into a preset log summary.
And the display unit 1000 is used for displaying the log summary.
In summary, under the condition that the inspection instruction is received, the equipment information of each server is acquired. And under the condition that the network of the server is not faulty, establishing connection with the server by using a connection protocol corresponding to the server according to a preset corresponding relation. The corresponding relation comprises a server, a connection protocol and a log collection command. Under the condition that the connection is normal, executing a log collection command corresponding to the server according to the corresponding relation to obtain a hardware log generated by a hardware management control module in the server. And extracting each alarm item of the server from the hardware log, wherein the alarm item is used for indicating hardware fault details of the server. And screening and obtaining target alarm items from all alarm items, wherein the alarm level and the alarm time indicated by the target alarm items meet preset screening conditions. And storing the target alarm item into a preset log summary, and displaying the log summary. Therefore, according to the method provided by the embodiment, protocol connection can be built adaptively for different types of servers, log collection commands are called to acquire hardware logs, alarm entries of the servers are extracted from the different types of hardware logs, log summarization is generated, and therefore a user is assisted in rapidly inspecting each server, and compared with manual inspection, inspection efficiency is improved obviously.
The application also provides a computer readable storage medium, wherein the computer readable storage medium comprises a stored program, and the program executes the server self-adaptive inspection method provided by the application.
The application also provides a server self-adaptive inspection device, comprising: a processor, a memory, and a bus. The processor is connected with the memory through a bus, the memory is used for storing a program, the processor is used for running the program, and the self-adaptive inspection method for the server provided by the application is executed when the program runs, and comprises the following steps:
under the condition of receiving the inspection instruction, acquiring the equipment information of each server;
under the condition that the network of the server is not faulty, establishing connection with the server by using a connection protocol corresponding to the server according to a preset corresponding relation; wherein the correspondence includes the server, the connection protocol, and a log collection command;
under the condition that the connection is normal, executing a log collection command corresponding to the server according to the corresponding relation to obtain a hardware log generated by a hardware management control module in the server;
Extracting each alarm item of the server from the hardware log, wherein the alarm item is used for indicating hardware fault details of the server;
screening out target alarm items from the alarm items, wherein the alarm level and the alarm time indicated by the target alarm items meet preset screening conditions;
storing the target alarm item into a preset log summary;
and displaying the log summary.
Optionally, after the obtaining the device information of each server, the method further includes:
performing network diagnosis on the IP addresses indicated by the equipment information;
if the IP address passes the network diagnosis, determining that the server network to which the IP address belongs is not faulty;
if the IP address does not pass the network diagnosis, determining the network fault of the server to which the IP address belongs;
and in the case of determining the network failure of the server, storing the equipment information of the server into the log summary, and marking the network failure of the server in the log summary.
Optionally, the performing network diagnosis on the IP address indicated by each piece of equipment information includes:
creating a producer queue;
Storing the IP address indicated by each piece of equipment information into the producer queue;
creating a consumer thread queue; wherein the consumer thread queue comprises a plurality of threads; the thread is used for acquiring any one of the IP addresses from the producer queue and carrying out network diagnosis on the IP addresses;
and executing each thread in the consumer thread queue concurrently, and setting a global mutual exclusion lock for each thread.
Optionally, after establishing connection with the server, the method further includes:
and under the condition that the protocol connection fault is determined, storing the equipment information of the server into the log summary, and marking the server protocol connection fault in the log summary.
Optionally, the acquiring the device information of each server includes:
starting a preset script, retrieving each file under a preset file path, and displaying the file name of each file to a user through a local command prompt Fu Zhongduan; wherein the preset script includes logic for retrieving each of the files under the preset file path; the file types of the files comprise text files and table files;
Analyzing a file format indicated by a target file name, determining a file type of a target file, and reading the target file according to the target file name and the file type to obtain equipment information of each server; the target file name is a file name which is input by a user through the command prompt terminal or is preconfigured in the preset script.
Optionally, the establishing connection with the server according to the preset corresponding relationship by using a connection protocol corresponding to the server includes:
creating a producer queue;
storing said device information for each of said servers into said producer queue;
creating a consumer thread queue; wherein the consumer thread queue comprises a plurality of threads; the thread is used for acquiring the equipment information of any one server from the producer queue, and establishing connection with the server by using a connection protocol corresponding to the server according to a preset corresponding relation;
concurrently executing each thread in the consumer thread queue, and setting a global mutual exclusion lock for each thread;
and executing a log collection command corresponding to the server according to the corresponding relation to obtain a hardware log generated by a hardware management control module in the server, wherein the method comprises the following steps:
Executing each thread in the consumer thread queue concurrently, wherein the thread is further used for executing a log collection command corresponding to the server according to the corresponding relation to obtain a hardware log generated by a hardware management control module in the server;
the extracting each alarm entry of the server from the hardware log includes:
concurrently executing each of the threads in the consumer thread queue, the threads further configured to extract each alert entry of the server from the hardware log;
the step of screening out the target alarm items from the alarm items comprises the following steps:
and concurrently executing each thread in the consumer thread queue, wherein the thread is also used for screening out a target alarm item from each alarm item.
Optionally, the server includes:
a first type server and a second type server;
the first type of server supports a log collecting tool protocol based on an intelligent platform management interface, and the second type of server supports a secure shell protocol.
The functions described in the methods of the present application, if implemented in the form of software functional units and sold or used as a stand-alone product, may be stored in a computing device readable storage medium. Based on such understanding, a portion of the embodiments of the present application that contributes to the prior art or a portion of the technical solution may be embodied in the form of a software product stored in a storage medium, comprising several instructions for causing a computing device (which may be a personal computer, a server, a mobile computing device or a network device, etc.) to perform all or part of the steps of the methods described in the embodiments of the present application. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a random access Memory (RAM, random Access Memory), a magnetic disk, or an optical disk, or other various media capable of storing program codes.
In this specification, each embodiment is described in a progressive manner, and each embodiment is mainly described in a different point from other embodiments, so that the same or similar parts between the embodiments are referred to each other.
The previous description of the disclosed embodiments is provided to enable any person skilled in the art to make or use the present application. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the application. Thus, the present application is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.

Claims (10)

1. The self-adaptive inspection method for the server is characterized by comprising the following steps of:
under the condition of receiving the inspection instruction, acquiring the equipment information of each server;
under the condition that the network of the server is not faulty, establishing connection with the server by using a connection protocol corresponding to the server according to a preset corresponding relation; wherein the correspondence includes the server, the connection protocol, and a log collection command;
Under the condition that the connection is normal, executing the log collection command corresponding to the server according to the corresponding relation to obtain a hardware log generated by a hardware management control module in the server;
extracting each alarm item of the server from the hardware log, wherein the alarm item is used for indicating hardware fault details of the server;
screening out target alarm items from the alarm items, wherein the alarm level and the alarm time indicated by the target alarm items meet preset screening conditions;
storing the target alarm item into a preset log summary;
and displaying the log summary.
2. The method according to claim 1, wherein after the obtaining the device information of each server, further comprising:
performing network diagnosis on the IP addresses indicated by the equipment information;
if the IP address passes the network diagnosis, determining that the network of the server to which the IP address belongs is not faulty;
if the IP address does not pass the network diagnosis, determining the network fault of the server to which the IP address belongs;
and in the case of determining the network fault of the server, storing the equipment information of the server into the log summary, and marking the network fault of the server in the log summary.
3. The method of claim 2, wherein said performing network diagnostics on the IP address indicated by each of said device information comprises:
creating a producer queue;
storing the IP address indicated by each piece of equipment information into the producer queue;
creating a consumer thread queue; wherein the consumer thread queue comprises a plurality of threads; the thread is used for acquiring any one of the IP addresses from the producer queue and carrying out network diagnosis on the IP addresses;
and executing each thread in the consumer thread queue concurrently, and setting a global mutual exclusion lock for each thread.
4. The method according to claim 1, wherein after establishing a connection with the server according to the preset correspondence using a connection protocol corresponding to the server, further comprising:
and under the condition that the protocol connection fault is determined, storing the equipment information of the server into the log summary, and marking the server protocol connection fault in the log summary.
5. The method of claim 1, wherein the obtaining device information for each server comprises:
Starting a preset script, retrieving each file under a preset file path, and displaying the file name of each file to a user through a local command prompt Fu Zhongduan; wherein the preset script includes logic for retrieving each of the files under the preset file path; the file types of the files comprise text files and table files;
analyzing a file format indicated by a target file name, determining a file type of a target file, and reading the target file according to the target file name and the file type to obtain equipment information of each server; the target file name is a file name which is input by a user through the command prompt terminal or is preconfigured in the preset script.
6. The method according to claim 1, wherein the establishing a connection with the server using a connection protocol corresponding to the server according to a preset correspondence relationship includes:
creating a producer queue;
storing said device information for each of said servers into said producer queue;
creating a consumer thread queue; wherein the consumer thread queue comprises a plurality of threads; the thread is used for acquiring the equipment information of any one server from the producer queue, and establishing connection with the server by using a connection protocol corresponding to the server according to a preset corresponding relation;
Concurrently executing each thread in the consumer thread queue, and setting a global mutual exclusion lock for each thread;
and executing a log collection command corresponding to the server according to the corresponding relation to obtain a hardware log generated by a hardware management control module in the server, wherein the method comprises the following steps:
executing each thread in the consumer thread queue concurrently, wherein the thread is further used for executing a log collection command corresponding to the server according to the corresponding relation to obtain a hardware log generated by a hardware management control module in the server;
the extracting each alarm entry of the server from the hardware log includes:
concurrently executing each of the threads in the consumer thread queue, the threads further configured to extract each alert entry of the server from the hardware log;
the step of screening out the target alarm items from the alarm items comprises the following steps:
and concurrently executing each thread in the consumer thread queue, wherein the thread is also used for screening out a target alarm item from each alarm item.
7. The method according to any one of claims 1-6, wherein the server comprises:
A first type server and a second type server;
the first type of server supports a log collecting tool protocol based on an intelligent platform management interface, and the second type of server supports a secure shell protocol.
8. The utility model provides a server self-adaptation inspection device which characterized in that includes:
the acquisition unit is used for acquiring the equipment information of each server under the condition of receiving the inspection instruction;
the connection unit is used for establishing connection with the server by using a connection protocol corresponding to the server according to a preset corresponding relation under the condition that the network of the server is not faulty; wherein the correspondence includes the server, the connection protocol, and a log collection command;
the execution unit is used for executing the log collection command corresponding to the server according to the corresponding relation under the condition that the connection is determined to be normal, so as to obtain a hardware log generated by a hardware management control module in the server;
an extracting unit, configured to extract, from the hardware log, each alarm entry of the server, where the alarm entry is used to indicate hardware fault details of the server;
The screening unit is used for screening out target alarm items from the alarm items, and the alarm level and the alarm time indicated by the target alarm items meet preset screening conditions;
the storage unit is used for storing the target alarm items into a preset log summary;
and the display unit is used for displaying the log summary.
9. A computer readable storage medium, characterized in that the computer readable storage medium comprises a stored program, wherein the program performs the server adaptive inspection method of any one of claims 1-6.
10. A server adaptive inspection device, comprising: a processor, a memory, and a bus; the processor is connected with the memory through the bus;
the memory is used for storing a program, and the processor is used for running the program, wherein the program executes the server self-adaptive inspection method according to any one of claims 1-6.
CN202011015945.2A 2020-09-24 2020-09-24 Self-adaptive inspection method and device for server Active CN112100048B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011015945.2A CN112100048B (en) 2020-09-24 2020-09-24 Self-adaptive inspection method and device for server

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011015945.2A CN112100048B (en) 2020-09-24 2020-09-24 Self-adaptive inspection method and device for server

Publications (2)

Publication Number Publication Date
CN112100048A CN112100048A (en) 2020-12-18
CN112100048B true CN112100048B (en) 2024-01-26

Family

ID=73755657

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011015945.2A Active CN112100048B (en) 2020-09-24 2020-09-24 Self-adaptive inspection method and device for server

Country Status (1)

Country Link
CN (1) CN112100048B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113485886B (en) * 2021-06-25 2023-07-21 青岛海尔科技有限公司 Alarm log processing method and device, storage medium and electronic device
CN113419923A (en) * 2021-07-21 2021-09-21 成都晶宝星云科技有限公司 Automatic platform inspection method
CN115695405A (en) * 2021-07-28 2023-02-03 中移物联网有限公司 Equipment control method, device, control terminal, execution terminal and service terminal

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20130063866A (en) * 2011-12-07 2013-06-17 모다정보통신 주식회사 Diagonosis system for m2m device and the method thereof
JP2014203294A (en) * 2013-04-05 2014-10-27 株式会社日立製作所 Failure handling system and failure handling method
CN105224436A (en) * 2015-10-29 2016-01-06 曙光信息产业股份有限公司 A kind of operation condition of server method for supervising and device
JP2017033037A (en) * 2015-07-28 2017-02-09 キヤノン株式会社 Server apparatus, system, information processing method and program
CN108897665A (en) * 2018-06-29 2018-11-27 平安科技(深圳)有限公司 Blog management method, device, computer equipment and storage medium
CN108985053A (en) * 2018-06-27 2018-12-11 北京奇安信科技有限公司 distributed data processing method and device
CN109086155A (en) * 2018-07-27 2018-12-25 郑州云海信息技术有限公司 Server failure localization method, device, equipment and computer readable storage medium
CN110502400A (en) * 2019-08-23 2019-11-26 北京市燃气集团有限责任公司 Database method for inspecting and device
KR20200014255A (en) * 2019-11-15 2020-02-10 호스팅 글로벌(주) Network failure monitoring server and operating method thereof
CN111581002A (en) * 2020-04-29 2020-08-25 上海中通吉网络技术有限公司 Automatic fault reporting method, device and equipment for server fault
CN111694719A (en) * 2020-06-10 2020-09-22 腾讯科技(深圳)有限公司 Server fault processing method and device, storage medium and electronic equipment

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9384112B2 (en) * 2010-07-01 2016-07-05 Logrhythm, Inc. Log collection, structuring and processing

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20130063866A (en) * 2011-12-07 2013-06-17 모다정보통신 주식회사 Diagonosis system for m2m device and the method thereof
JP2014203294A (en) * 2013-04-05 2014-10-27 株式会社日立製作所 Failure handling system and failure handling method
JP2017033037A (en) * 2015-07-28 2017-02-09 キヤノン株式会社 Server apparatus, system, information processing method and program
CN105224436A (en) * 2015-10-29 2016-01-06 曙光信息产业股份有限公司 A kind of operation condition of server method for supervising and device
CN108985053A (en) * 2018-06-27 2018-12-11 北京奇安信科技有限公司 distributed data processing method and device
CN108897665A (en) * 2018-06-29 2018-11-27 平安科技(深圳)有限公司 Blog management method, device, computer equipment and storage medium
CN109086155A (en) * 2018-07-27 2018-12-25 郑州云海信息技术有限公司 Server failure localization method, device, equipment and computer readable storage medium
CN110502400A (en) * 2019-08-23 2019-11-26 北京市燃气集团有限责任公司 Database method for inspecting and device
KR20200014255A (en) * 2019-11-15 2020-02-10 호스팅 글로벌(주) Network failure monitoring server and operating method thereof
CN111581002A (en) * 2020-04-29 2020-08-25 上海中通吉网络技术有限公司 Automatic fault reporting method, device and equipment for server fault
CN111694719A (en) * 2020-06-10 2020-09-22 腾讯科技(深圳)有限公司 Server fault processing method and device, storage medium and electronic equipment

Also Published As

Publication number Publication date
CN112100048A (en) 2020-12-18

Similar Documents

Publication Publication Date Title
CN112100048B (en) Self-adaptive inspection method and device for server
CN109284269B (en) Abnormal log analysis method and device, storage medium and server
CN103049373B (en) A kind of localization method of collapse and device
CN114077525A (en) Abnormal log processing method and device, terminal equipment, cloud server and system
CN113504932B (en) Firmware data updating method and device
CN108572895B (en) Stability test method for automatically checking software and hardware configuration under Linux
CN114996103A (en) Page abnormity detection method and device, electronic equipment and storage medium
CN111090593A (en) Method, device, electronic equipment and storage medium for determining crash attribution
CN112988439B (en) Server fault discovery method and device, electronic equipment and storage medium
CN114461864A (en) Alarm tracing method and device
CN113708986B (en) Server monitoring apparatus, method and computer-readable storage medium
CN114629786A (en) Log real-time analysis method, device, storage medium and system
CN111651330B (en) Data acquisition method, data acquisition device, electronic equipment and computer readable storage medium
CN114064510A (en) Function testing method and device, electronic equipment and storage medium
CN113722229A (en) Software testing method and device, electronic equipment and storage medium
CN108845932B (en) Unit testing method and device of network library, storage medium and terminal
CN113238901A (en) Multi-device automatic testing method and device, storage medium and computer device
CN112860469A (en) Method, device, equipment and storage medium for collecting information of katon log
CN112380127A (en) Test case regression method, device, equipment and storage medium
CN117407207B (en) Memory fault processing method and device, electronic equipment and storage medium
CN114860549B (en) Buried data verification method, buried data verification device, buried data verification equipment and storage medium
CN115640236B (en) Script quality detection method and computing device
CN112364040B (en) Data checking method, device, medium and electronic equipment
CN116414610B (en) Method, device, equipment and storage medium for acquiring abnormal log fragments
CN111261271B (en) Service availability diagnosis method and device for video monitoring environment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant