CN113050983A - Method and system for designing middleware, electronic device and readable storage medium - Google Patents

Method and system for designing middleware, electronic device and readable storage medium Download PDF

Info

Publication number
CN113050983A
CN113050983A CN202110326857.2A CN202110326857A CN113050983A CN 113050983 A CN113050983 A CN 113050983A CN 202110326857 A CN202110326857 A CN 202110326857A CN 113050983 A CN113050983 A CN 113050983A
Authority
CN
China
Prior art keywords
alarm
monitoring
rule
rules
middleware
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110326857.2A
Other languages
Chinese (zh)
Inventor
刘宏楠
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Minglue Zhaohui Technology Co Ltd
Original Assignee
Beijing Minglue Zhaohui Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Minglue Zhaohui Technology Co Ltd filed Critical Beijing Minglue Zhaohui Technology Co Ltd
Priority to CN202110326857.2A priority Critical patent/CN113050983A/en
Publication of CN113050983A publication Critical patent/CN113050983A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/70Software maintenance or management
    • G06F8/71Version control; Configuration management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/3051Monitoring arrangements for monitoring the configuration of the computing system or of the computing system component, e.g. monitoring the presence of processing resources, peripherals, I/O links, software programs
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/3065Monitoring arrangements determined by the means or processing involved in reporting the monitored data

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Quality & Reliability (AREA)
  • Software Systems (AREA)
  • Computing Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Debugging And Monitoring (AREA)

Abstract

The application discloses a design method and system of middleware, an electronic device and a readable storage medium. The design method of the middleware comprises the following steps: a configuration step: configuring system rules through a front-end interface of proal; an output step: and the proa l outputs the system rule to the system and synchronously stores the system rule in a proa l database. The invention provides a design method, a system, electronic equipment and a readable storage medium of a middleware, which can enable operation and maintenance personnel to be separated from a k8s system to configure monitoring rules and alarm rules through a proal system, can rapidly complete the configuration of the monitoring rules and the alarm rules only by simple configuration, and can set the monitoring rules and the alarm rules which can be the monitored business aiming at the difference of each business, so that the monitoring system is more flexible. And the possibility of manual direct change is reduced, the labor cost can be reduced, the learning cost is low, and the method is more efficient.

Description

Method and system for designing middleware, electronic device and readable storage medium
Technical Field
The present application relates to the field of container monitoring technologies, and in particular, to a method and a system for designing middleware, an electronic device, and a readable storage medium.
Background
With the development of enterprises, the stability requirement of the enterprises on the online service is higher and higher, and if the online service fails, huge loss is caused. Especially in the container environment, because of the specificity of the container, a more comprehensive and accurate understanding of the cluster state is needed, and the cluster state is analyzed and predicted. Along with the development of services, the requirements on the monitoring system are higher and higher, and the monitoring system is required to be comprehensive in monitoring, easy to configure and easy to manage. The excellent monitoring system can more conveniently and quickly expose some non-occurred problems as soon as possible. As services become more complex, monitoring systems become more complex to adapt to changes in the service. In the existing scheme, the monitoring and alarming functions are generally realized by using prometheus + alert manager, and in order to make the services more convenient to maintain, a mirror image of the monitoring and alarming services is made to run in a k8 cluster. This makes both services more stable. Making the configuration file into a configmap and hanging the configmap into the pod can enable the configuration to be effective in real time, but the configuration has higher requirements on operation and maintenance personnel, and the prior art application framework diagram is shown in fig. 2 because the personnel can be skilled to configure various resources in k8 s. As shown in FIG. 2, if the operation and maintenance personnel need to change the configuration of the monitoring system, the k8s cluster which can be skillfully configured is needed first, and the operation and maintenance personnel also need to be skillful in mastering prometheus query statements to complete configuration monitoring, which increases the skillful cost of the operation and maintenance personnel in no way. And in actual production, all monitoring rules are written into the same file. The configuration file is made larger and larger, which is inconvenient for daily maintenance and is easy to cause a thought error.
Therefore, aiming at the current situation, the invention provides a design method, a system, electronic equipment and a readable storage medium of the middleware, which can enable operation and maintenance personnel to be separated from a k8s system to configure monitoring rules and alarm rules through a real system, and can also realize the rapid configuration of the monitoring rules and the alarm rules by simple configuration without the operation and maintenance personnel needing to deeply know query statements, and the monitoring rules and the alarm rules which can be the monitored business are formulated according to the difference of each business, so that the monitoring system is more flexible. The possibility of manual direct change is reduced, labor cost can be reduced, learning cost is low, efficiency is high, maintenance is convenient, a large configuration file is not required to be maintained, and accordingly the risk of manual error is reduced.
Disclosure of Invention
The embodiment of the application provides a method, a system, an electronic device and a readable storage medium for designing a middleware, so as to at least solve the problem of subjective factor influence in the related art.
The invention provides a design method of a middleware, which comprises the following steps:
a configuration step: configuring system rules through a front-end interface of the deal;
an output step: and the proal outputs the system rule to the system and synchronously stores the system rule into a proal database.
In the above method for designing middleware, the system includes a monitoring system and an alarm system, and the system rules include monitoring rules and alarm rules.
In the above method for designing middleware, the configuring step includes configuring the monitoring rule and the alarm rule through the front-end interface of the deal.
In the above method for designing middleware, the outputting step includes that the deal synchronously stores the monitoring rule and the alarm rule in the deal database, and outputs the monitoring rule and the alarm rule to the monitoring system and the alarm system, if the monitoring system and the alarm system cannot be used normally, only end point of other available monitoring systems and alarm systems needs to be provided, and after the monitoring system and the alarm system are connected with the deal, the deal reads the monitoring rule and the alarm rule stored in the deal database, and outputs the monitoring rule and the alarm rule to the available monitoring systems and the alarm systems.
The present invention also provides a system for designing a middleware, which is applicable to the method for designing a middleware described above, the system for designing a middleware comprising:
a configuration unit: configuring system rules through a front-end interface of the deal;
an output unit: and the proal outputs the system rule to the system and synchronously stores the system rule into a proal database.
The system for designing the middleware comprises a monitoring system and an alarm system, wherein the system rules comprise monitoring rules and alarm rules.
In the above design system of the middleware, the monitoring rule and the alarm rule are configured through the front-end interface of the deal in the configuration unit.
In the design system of the middleware, the deal synchronously stores the monitoring rule and the alarm rule in the deal database and outputs the monitoring rule and the alarm rule to the monitoring system and the alarm system through an output unit, if the monitoring system and the alarm system cannot be used normally, only the endpoint of other available monitoring systems and alarm systems needs to be provided, and after the deal is connected with the deal, the deal reads the monitoring rule and the alarm rule stored in the deal database and outputs the monitoring rule and the alarm rule to the available monitoring system and the alarm system.
The present invention also provides an electronic device, including a memory, a processor, and a computer program stored on the memory and executable on the processor, wherein the processor implements the design method of the middleware described in any one of the above items when executing the computer program.
The invention also provides an electronic device readable storage medium, on which computer program instructions are stored, which, when executed by the processor, implement the method for designing middleware described in any one of the above.
Compared with the related technology, the invention provides a design method, a system, electronic equipment and a readable storage medium of the middleware, and the invention can enable operation and maintenance personnel to be separated from a k8s system to configure monitoring rules and alarm rules through a proal system, and the operation and maintenance personnel are not required to deeply know query statements, and can rapidly complete the configuration of the monitoring rules and the alarm rules only by simple configuration, and the monitoring rules and the alarm rules which can be the monitored business are formulated according to the difference of each business, so that the monitoring system is more flexible. The possibility of manual direct change is reduced, labor cost can be reduced, learning cost is low, efficiency is high, maintenance is convenient, a large configuration file is not required to be maintained, and accordingly the risk of manual error is reduced.
The details of one or more embodiments of the application are set forth in the accompanying drawings and the description below to provide a more thorough understanding of the application.
Drawings
The accompanying drawings, which are included to provide a further understanding of the application and are incorporated in and constitute a part of this application, illustrate embodiment(s) of the application and together with the description serve to explain the application and not to limit the application. In the drawings:
FIG. 1 is a flow chart of a method for designing middleware according to an embodiment of the present application;
FIG. 2 is a diagram of a prior art application framework according to an embodiment of the present application;
FIG. 3 is an architectural framework diagram according to an embodiment of the present application;
FIG. 4 is a diagram of a rule space framework according to an embodiment of the present application;
FIG. 5 is a schematic structural diagram of a design system of the middleware of the present invention;
fig. 6 is a frame diagram of an electronic device according to an embodiment of the present application.
Wherein the reference numerals are:
a configuration unit: 51;
an output unit: 52;
81: a processor;
82: a memory;
83: a communication interface;
80: a bus.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application will be described and illustrated below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the present application and are not intended to limit the present application. All other embodiments obtained by a person of ordinary skill in the art based on the embodiments provided in the present application without any inventive step are within the scope of protection of the present application.
It is obvious that the drawings in the following description are only examples or embodiments of the present application, and that it is also possible for a person skilled in the art to apply the present application to other similar contexts on the basis of these drawings without inventive effort. Moreover, it should be appreciated that such a development effort might be complex and tedious, but would nevertheless be a routine undertaking of design, fabrication, and manufacture for those of ordinary skill having the benefit of this disclosure, and thus should not be construed as a limitation of this disclosure.
Reference in the specification to "an embodiment" means that a particular feature, structure, or characteristic described in connection with the embodiment can be included in at least one embodiment of the specification. The appearances of the phrase in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments. Those of ordinary skill in the art will explicitly and implicitly appreciate that the embodiments described herein may be combined with other embodiments without conflict.
Unless defined otherwise, technical or scientific terms referred to herein shall have the ordinary meaning as understood by those of ordinary skill in the art to which this application belongs. Reference to "a," "an," "the," and similar words throughout this application are not to be construed as limiting in number, and may refer to the singular or the plural. The present application is directed to the use of the terms "including," "comprising," "having," and any variations thereof, which are intended to cover non-exclusive inclusions; for example, a process, method, system, article, or apparatus that comprises a list of steps or modules (elements) is not limited to the listed steps or elements, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus. Reference to "connected," "coupled," and the like in this application is not intended to be limited to physical or mechanical connections, but may include electrical connections, whether direct or indirect. The term "plurality" as referred to herein means two or more. "and/or" describes an association relationship of associated objects, meaning that three relationships may exist, for example, "A and/or B" may mean: a exists alone, A and B exist simultaneously, and B exists alone. The character "/" generally indicates that the former and latter associated objects are in an "or" relationship. Reference herein to the terms "first," "second," "third," and the like, are merely to distinguish similar objects and do not denote a particular ordering for the objects.
The invention relates to a container monitoring platform based on proal, which is briefly introduced below.
kubernets, K8s for short, is an abbreviation for 8 instead of 8 characters "ubernet". The Kubernetes is an open source and used for managing containerized applications on a plurality of hosts in a cloud platform, aims to make the application of the containerization simple and efficient to deploy (powerfull), and provides a mechanism for deploying, planning, updating and maintaining the applications. A traditional deployment of applications is to install the applications through plug-ins or scripts. The disadvantage of this is that the running, configuration, management, and all life cycles of the application will be bound to the current operating system, which is not beneficial to the upgrade update/rollback and other operations of the application, and certainly, some functions can be implemented by creating a virtual machine, but the virtual machine is very heavy and not beneficial to portability. The new mode is realized by deploying containers, each container is isolated from each other, each container has a file system, processes among the containers cannot influence each other, and computing resources can be distinguished. Compared with a virtual machine, the container can be deployed rapidly, and the container can be migrated among different clouds and different versions of operating systems because the container is decoupled from underlying facilities and a machine file system. The container occupies less resources and is fast to deploy, each application can be packaged into a container mirror image, the container has greater advantages due to the one-to-one relationship between each application and the container, and the container mirror image can be created for the application at the stage of build or release by using the container, because each application does not need to be combined with the rest of application stacks and does not depend on the production environment infrastructure, and a consistent environment can be provided from research and development to test and production. Similarly, containers are lighter weight, more "transparent" than virtual machines, which is more convenient to monitor and manage. Kubernets has the following characteristics of portability, supporting public cloud, private cloud, mixed cloud and multiple cloud (multi-cloud); the expansion is that the module is modularized, the plug-in is realized, the mounting can be realized, and the combination can be realized; automatic deployment, automatic restart, automatic replication, automatic scaling/expansion. Kubernetes is a container orchestration engine for Google open sources that supports automated deployment, large-scale scalable, application containerization management. When an application is deployed in a production environment, multiple instances of the application are typically deployed to load balance application requests. In Kubernetes, we can create multiple containers, each container runs an application instance inside, and then manage, discover and access the group of application instances through a built-in load balancing policy, and all the details do not need operation and maintenance personnel to perform complicated manual configuration and processing.
A container is a collection of interfaces between components and a platform in an application server. The container is produced along with the development of the thin client system. In developing a thin client system, a developer expends a great deal of effort to pay attention to thread security, matters, networks, resources, and so on, thereby reducing development efficiency. Since these solutions to these details are generally fixed or only parameter-changing, from the viewpoint of code reuse and design patterns, developers extract these bottom-level details, build platforms, and provide certain interfaces. Thus, the business developer need not be concerned with the implementation of these underlying details, but rather with the implementation of the business logic. The container is typically located within the application server, which is responsible for loading and maintenance. One container can only exist within one application server, and one application server can establish and maintain multiple containers. The containers generally comply with the configurable principle that the user of the container can achieve its own usage requirements by configuring the parameters of the container without modifying the code of the container. Containers are objects used to store and organize other objects. The class implementing the linked list is an example of a container. Such as C + + programming vector < double > mydata; creating a container mydata that stores a double type value may store entries for the base type or any type of type in the container. If the type argument of the STL container template is a class type, then the container may store objects of that type or objects of any derived class types. Typically, containers store copies of the objects we store in them, which automatically allocate and manage the memory occupied by the objects. When destroying objects of a container, the container is responsible for destroying the objects it contains and freeing the memory they occupy. One advantage of using STL containers to store objects is that we do not have to worry about managing their memory. In the actual development process, the importance of the data structure itself is not inferior to that of the algorithm operating on the data structure, and when a time-critical part exists in the program, the selection of the data structure becomes more important. Classical data structures are limited in number, but we often repeat codes written to implement vector, linked list, etc. structures, which are all very similar but vary in detail to accommodate variations in different data. The STL container provides us with the convenience of allowing us to construct their own data structures under specific types by reusing existing implementations, and by setting some template classes, the STL container provides support for the most common data structures, and the parameters of these templates allow us to specify the data types of the elements in the container, which can simplify many of our repetitive and tedious work.
The monitoring platform software is a full digital information transmission and management system based on network, belonging to the third generation of comprehensive network monitoring products of open technology. The system combines the modern audio and video compression technology, the network communication technology, the computer control technology and the streaming media transmission technology, adopts the modularized software design concept, and realizes the requirements of different customers in a component module mode; the system takes network centralized management and network transmission as a core to complete the whole process of information acquisition, transmission, control, management and storage, can be constructed on various private networks/local area networks/metropolitan area networks/wide area networks, is matched with mainstream hardware manufacturers in the market according to the super technology, and is compatible with various brands of hardware products. The monitoring networking and centralized management are really realized, authorized users can monitor the monitoring site on any computer of the network in real time, and a powerful and flexible comprehensive solution for centralized monitoring of the network is provided. The monitoring platform is divided into four modules: the management service module is the core of the system, is the main server of the whole system and bridges other service modules. The method is mainly used for managing all equipment of a system platform and communicating and synchronizing with other management servers. The management of configuration, equipment inspection, real-time access authority control and the like of mechanisms, personnel, equipment, tasks, alarms, logs and the like of the remote digital video equipment can be realized. When a plurality of clients need to check the same picture of a monitoring point at the same time, data congestion on a communication network line is inevitably caused, and network resources are seriously wasted. The streaming media server supports the forwarding of video and audio streams, when a plurality of clients need to access the same remote picture at the same time, the streaming media server can forward the video and audio streams, only one channel bandwidth network resource is occupied between the forwarding service and the front-end video channel, and then the forwarding server distributes the data to the plurality of clients. The streaming media service module is divided into a real-time streaming media service module and a playback streaming media service module. The real-time streaming media service module is used for forwarding the local real-time video stream. The playback streaming media service module is used for forwarding the local playback video stream. All brands of alarm hosts which can use Vista and CK keyboards, such as Honeywell, C & K, Bosch, time, and the like, can be managed. Through serial ports or network communication, independent alarm subsystems scattered in various places are networked, and an alarm management center can perform alarm control on any subsystem, such as: alarm arming, disarming, bypassing, alarm clearing, alarm output turning on and off, and the like. When any alarm subsystem has an alarm, the alarm management center can quickly and accurately display the detailed information of the alarm, such as: alarm place, name, type, subsystem number, defence area number etc to can carry out the linkage operation according to the warning plan that sets up in advance automatically, if: the video pops out the broadcast, plays appointed sound, video group broadcast, the video group sinks, the output of linkage warning, warning cloth withdraw of defence, TV wall switches, linkage cloud platform preset position, cruises, sends the cell-phone SMS, LED screen display shows, printer prints etc.. The client module is a module which is finally presented in front of a user and is used for the user to operate, and the client communicates with each service component to realize the monitoring operation of an electronic map, displaying real-time videos, playing back videos, controlling the action of a pan-tilt lens, controlling alarm input and output and the like, and the management functions of configuring the electronic map, external equipment, user permission and the like.
The invention provides a design method, a system, electronic equipment and a readable storage medium of a middleware, which can enable operation and maintenance personnel to be separated from a k8s system to configure monitoring rules and alarm rules through a proal system, and can rapidly complete the configuration of the monitoring rules and the alarm rules only by simple configuration without needing the operation and maintenance personnel to deeply know query statements, and the monitoring rules and the alarm rules which can be processed by the business are formulated according to the difference of each business, so that the monitoring system is more flexible. The possibility of manual direct change is reduced, labor cost can be reduced, learning cost is low, efficiency is high, maintenance is convenient, a large configuration file is not required to be maintained, and accordingly the risk of manual error is reduced. The following describes embodiments of the present application with reference to the design of the middleware as an example.
Example one
The embodiment provides a design method of middleware. Referring to fig. 1 to 4, fig. 1 is a flowchart illustrating a method for designing a middleware according to an embodiment of the present application; FIG. 2 is a diagram of a prior art application framework according to an embodiment of the present application; FIG. 3 is an architectural framework diagram according to an embodiment of the present application;
fig. 4 is a regular space frame diagram according to an embodiment of the present application, and as shown in the figure, the design method of the middleware includes the following steps:
configuration step S1: configuring system rules through a front-end interface of the deal;
output step S2: and the proal outputs the system rule to the system and synchronously stores the system rule into a proal database.
In an embodiment, the system comprises a monitoring system and an alarm system, and the system rules comprise monitoring rules and alarm rules.
In an embodiment, the configuring step S1 includes configuring the monitoring rule and the alarm rule through the front-end interface of the deal.
In the specific implementation, it can be seen from fig. 3 and 4 that proql is independent from k8s and is a set of separate configurations. The user can directly operate the front-end interface of the deal to directly change the monitoring system and the alarm system, so that the user is free from directly operating the k8s, and alarm and monitoring rules are configured in a page contact mode. And if the exclusive rule is customized only for a certain service, the proql system has a concept of a space. The user only needs to configure the rule in the space, so that the space and the service group can be bound together, and the exclusive rule only belonging to the service is realized. After a user configures a rule, the deal writes the rule to the monitoring system or the alarm system. And in order to avoid data loss, the data is convenient to copy and can be synchronously written into the database. Therefore, other people can conveniently search the data, and the backup function is also realized.
In an embodiment, the outputting step S2 includes that the deal synchronously stores the monitoring rule and the alarm rule in the deal database, and outputs the monitoring rule and the alarm rule to the monitoring system and the alarm system, if the monitoring system and the alarm system cannot be used normally, the deal only needs to provide an endpoint of the other available monitoring system and alarm system, and after connecting with the deal, the deal reads the monitoring rule and the alarm rule stored in the deal database, and outputs the monitoring rule and the alarm rule to the available monitoring system and the alarm system.
In specific implementation, if the monitoring system and the alarm system cannot be used normally, only the endpoint of other available monitoring systems and alarm systems needs to be provided and connected with the deal, the deal reads the monitoring rules and the alarm rules stored in the deal database and outputs the monitoring rules and the alarm rules to the available monitoring systems and alarm systems, and a complete set of available systems can be deployed quickly.
Therefore, the invention provides a design method, a system, electronic equipment and a readable storage medium of a middleware, which can enable operation and maintenance personnel to be separated from a k8s system to configure monitoring rules and alarm rules through a proal system, and can realize the rapid configuration of the monitoring rules and the alarm rules only by simple configuration without the operation and maintenance personnel deeply knowing query statements, and can set the monitoring rules and the alarm rules of the services according to the difference of the services, so that the monitoring system is more flexible. The possibility of manual direct change is reduced, labor cost can be reduced, learning cost is low, efficiency is high, maintenance is convenient, a large configuration file is not required to be maintained, and accordingly the risk of manual error is reduced.
Example two
Referring to fig. 5, fig. 5 is a schematic structural diagram of a design system of a middleware according to the present invention. As shown in fig. 5, the system for designing an intermediate product according to the present invention is applied to the method for designing an intermediate product, and includes:
the configuration unit 51: configuring system rules through a front-end interface of the deal;
the output unit 52: and the proal outputs the system rule to the system and synchronously stores the system rule into a proal database.
In this embodiment, the system includes a monitoring system and an alarm system, and the system rules include monitoring rules and alarm rules.
In this embodiment, the monitoring rule and the alarm rule are configured through the front-end interface of the deal in the configuration unit 51.
In this embodiment, the deal synchronously stores the monitoring rule and the alarm rule in the deal database, and outputs the monitoring rule and the alarm rule to the monitoring system and the alarm system through an output unit 52, if the monitoring system and the alarm system cannot be used normally, only an endpoint of other available monitoring systems and alarm systems needs to be provided, and after connecting with the deal, the deal reads the monitoring rule and the alarm rule stored in the deal database, and outputs the monitoring rule and the alarm rule to the available monitoring system and the available alarm system.
Example four
Referring to fig. 6, this embodiment discloses a specific implementation of an electronic device. The electronic device may include a processor 81 and a memory 82 storing computer program instructions.
Specifically, the processor 81 may include a Central Processing Unit (CPU), or A Specific Integrated Circuit (ASIC), or may be configured to implement one or more Integrated circuits of the embodiments of the present Application.
Memory 82 may include, among other things, mass storage for data or instructions. By way of example, and not limitation, memory 82 may include a Hard Disk Drive (Hard Disk Drive, abbreviated to HDD), a floppy Disk Drive, a Solid State Drive (SSD), flash memory, an optical Disk, a magneto-optical Disk, tape, or a Universal Serial Bus (USB) Drive or a combination of two or more of these. Memory 82 may include removable or non-removable (or fixed) media, where appropriate. The memory 82 may be internal or external to the data processing apparatus, where appropriate. In a particular embodiment, the memory 82 is a Non-Volatile (Non-Volatile) memory. In particular embodiments, Memory 82 includes Read-Only Memory (ROM) and Random Access Memory (RAM). The ROM may be mask-programmed ROM, Programmable ROM (PROM), Erasable PROM (FPROM), Electrically Erasable PROM (EFPROM), Electrically rewritable ROM (EAROM), or FLASH Memory (FLASH), or a combination of two or more of these, where appropriate. The RAM may be a Static Random-Access Memory (SRAM) or a Dynamic Random-Access Memory (DRAM), where the DRAM may be a Fast Page Mode Dynamic Random-Access Memory (FPMDRAM), an Extended data output Dynamic Random-Access Memory (EDODRAM), a Synchronous Dynamic Random-Access Memory (SDRAM), and the like.
The memory 82 may be used to store or cache various data files for processing and/or communication use, as well as possible computer program instructions executed by the processor 81.
The processor 81 implements the design method of any middleware in the above embodiments by reading and executing the computer program instructions stored in the memory 82.
In some of these embodiments, the electronic device may also include a communication interface 83 and a bus 80. As shown in fig. 6, the processor 81, the memory 82, and the communication interface 83 are connected via the bus 80 to complete communication therebetween.
The communication interface 83 is used for implementing communication between modules, devices, units and/or equipment in the embodiment of the present application. The communication port 83 may also be implemented with other components such as: and data communication is carried out among external equipment, design equipment of image/middleware, a database, external storage, an image/data processing workstation and the like.
The bus 80 includes hardware, software, or both to couple the components of the electronic device to one another. Bus 80 includes, but is not limited to, at least one of the following: data Bus (Data Bus), Address Bus (Address Bus), Control Bus (Control Bus), Expansion Bus (Expansion Bus), and Local Bus (Local Bus). By way of example, and not limitation, Bus 80 may include an Accelerated Graphics Port (AGP) or other Graphics Bus, an Enhanced Industry Standard Architecture (EISA) Bus, a Front-Side Bus (FSB), a Hyper Transport (HT) Interconnect, an ISA (ISA) Bus, an InfiniBand (InfiniBand) Interconnect, a Low Pin Count (LPC) Bus, a memory Bus, a microchannel Architecture (MCA) Bus, a PCI (Peripheral Component Interconnect) Bus, a PCI-Express (PCI-X) Bus, a Serial Advanced Technology Attachment (SATA) Bus, a Video Electronics Bus (audio Electronics Association), abbreviated VLB) bus or other suitable bus or a combination of two or more of these. Bus 80 may include one or more buses, where appropriate. Although specific buses are described and shown in the embodiments of the application, any suitable buses or interconnects are contemplated by the application.
The electronic device may be connected to a design system of the middleware to implement the method described in connection with fig. 1 to 4.
The technical features of the embodiments described above may be arbitrarily combined, and for the sake of brevity, all possible combinations of the technical features in the embodiments described above are not described, but should be considered as being within the scope of the present specification as long as there is no contradiction between the combinations of the technical features.
The above-mentioned embodiments only express several embodiments of the present application, and the description thereof is more specific and detailed, but not construed as limiting the scope of the invention. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the concept of the present application, which falls within the scope of protection of the present application. Therefore, the protection scope of the present patent shall be subject to the appended claims.

Claims (10)

1. A method for designing middleware, comprising:
a configuration step: configuring system rules through a front-end interface of the deal;
an output step: and the proal outputs the system rule to the system and synchronously stores the system rule into a proal database.
2. The method for designing middleware of claim 1 wherein the system comprises a monitoring system and an alarm system, and the system rules comprise monitoring rules and alarm rules.
3. The method of claim 2, wherein the configuring step comprises configuring the monitoring rules and the alarm rules through the front-end interface of the deal.
4. The middleware design method according to claim 2, wherein the outputting step includes that the deal synchronously stores the monitoring rule and the alarm rule in the deal database, and outputs the monitoring rule and the alarm rule to the monitoring system and the alarm system, if the monitoring system and the alarm system cannot be used normally, only end point of other available monitoring systems and alarm systems needs to be provided, and after the end point is connected with the deal, the deal reads the monitoring rule and the alarm rule stored in the deal database, and outputs the monitoring rule and the alarm rule to the available monitoring systems and the alarm systems.
5. A system for designing middleware, which is applied to the method for designing middleware according to any one of claims 1 to 4, said system for designing middleware comprising:
a configuration unit: configuring system rules through a front-end interface of the deal;
an output unit: and the proal outputs the system rule to the system and synchronously stores the system rule into a proal database.
6. The middleware design system in accordance with claim 7 wherein said system includes a monitoring system and an alarm system, and said system rules include monitoring rules and alarm rules.
7. The middleware design system in accordance with claim 6, wherein said monitoring rule and said alarm rule are configured through said front-end interface of said deal in said configuration unit.
8. The middleware design system according to claim 7, wherein the deal synchronously stores the monitoring rule and the alarm rule in the deal database and outputs the monitoring rule and the alarm rule to the monitoring system and the alarm system through an output unit, if the monitoring system and the alarm system cannot be used normally, only an endpoint of other available monitoring systems and alarm systems needs to be provided, and after connecting with the deal, the deal reads the monitoring rule and the alarm rule stored in the deal database and outputs the monitoring rule and the alarm rule to the available monitoring systems and alarm systems.
9. An electronic device comprising a memory, a processor, and a computer program stored on the memory and executable on the processor, wherein the processor implements the design method of the middleware of any one of claims 1 to 4 when executing the computer program.
10. An electronic device readable storage medium having stored thereon computer program instructions which, when executed by the processor, implement the design method of middleware of any one of claims 1 to 4.
CN202110326857.2A 2021-03-26 2021-03-26 Method and system for designing middleware, electronic device and readable storage medium Pending CN113050983A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110326857.2A CN113050983A (en) 2021-03-26 2021-03-26 Method and system for designing middleware, electronic device and readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110326857.2A CN113050983A (en) 2021-03-26 2021-03-26 Method and system for designing middleware, electronic device and readable storage medium

Publications (1)

Publication Number Publication Date
CN113050983A true CN113050983A (en) 2021-06-29

Family

ID=76515672

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110326857.2A Pending CN113050983A (en) 2021-03-26 2021-03-26 Method and system for designing middleware, electronic device and readable storage medium

Country Status (1)

Country Link
CN (1) CN113050983A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115460342A (en) * 2022-07-29 2022-12-09 浙江大华技术股份有限公司 Service setting method and device of camera equipment and multi-path camera linkage system

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105653425A (en) * 2015-12-28 2016-06-08 中国民航信息网络股份有限公司 Complicated event processing engine based monitoring system
CN111352800A (en) * 2020-02-25 2020-06-30 京东数字科技控股有限公司 Big data cluster monitoring method and related equipment
CN111666189A (en) * 2020-06-12 2020-09-15 中信银行股份有限公司 Method and system for declaratively visually configuring Prometheus monitoring alarm
CN112291114A (en) * 2020-11-17 2021-01-29 恩亿科(北京)数据科技有限公司 Data source monitoring method and system, electronic equipment and storage medium

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105653425A (en) * 2015-12-28 2016-06-08 中国民航信息网络股份有限公司 Complicated event processing engine based monitoring system
CN111352800A (en) * 2020-02-25 2020-06-30 京东数字科技控股有限公司 Big data cluster monitoring method and related equipment
CN111666189A (en) * 2020-06-12 2020-09-15 中信银行股份有限公司 Method and system for declaratively visually configuring Prometheus monitoring alarm
CN112291114A (en) * 2020-11-17 2021-01-29 恩亿科(北京)数据科技有限公司 Data source monitoring method and system, electronic equipment and storage medium

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115460342A (en) * 2022-07-29 2022-12-09 浙江大华技术股份有限公司 Service setting method and device of camera equipment and multi-path camera linkage system
CN115460342B (en) * 2022-07-29 2024-02-27 浙江大华技术股份有限公司 Service setting method and device of camera equipment and multi-path camera linkage system

Similar Documents

Publication Publication Date Title
US9971823B2 (en) Dynamic replica failure detection and healing
US9880827B2 (en) Managing software version upgrades in a multiple computer system environment
US11853816B2 (en) Extending the Kubernetes API in-process
CN105653425B (en) Monitoring system based on complex event processing engine
CN108513657B (en) Data conversion method and backup server
US8825834B2 (en) Automated cluster member management based on node capabilities
CN111209011A (en) Cross-platform container cloud automatic deployment system
CN109684036B (en) Container cluster management method, storage medium, electronic device and system
US11991094B2 (en) Metadata driven static determination of controller availability
US10061665B2 (en) Preserving management services with self-contained metadata through the disaster recovery life cycle
US11269838B2 (en) Collision detection using state management of configuration items
CN113127150B (en) Rapid deployment method and device of cloud primary system, electronic equipment and storage medium
US10338910B2 (en) Multi-tenant upgrading
CN113050983A (en) Method and system for designing middleware, electronic device and readable storage medium
US9871706B2 (en) Intelligently managing pattern contents across multiple racks based on workload and human interaction usage patterns
WO2016078326A1 (en) Method, apparatus and system for displaying names of virtual machine
US12026562B2 (en) Industry opinionated API managed service
CN115373757A (en) Solving method and device for cluster monitoring data loss in Promethues fragmentation mode
CN113051108A (en) Data backup method and system
US10701176B1 (en) Messaging using a hash ring with host groups
US11768704B2 (en) Increase assignment effectiveness of kubernetes pods by reducing repetitive pod mis-scheduling
US12013774B2 (en) Verification of core file debugging resources
US11816363B2 (en) File based virtual disk management
JP7450726B2 (en) Hybrid cloud asynchronous data synchronization
US11924031B2 (en) Highly scalable container network interface operation to reduce startup overhead of functions

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination