CN113050983A - Method and system for designing middleware, electronic device and readable storage medium - Google Patents
Method and system for designing middleware, electronic device and readable storage medium Download PDFInfo
- Publication number
- CN113050983A CN113050983A CN202110326857.2A CN202110326857A CN113050983A CN 113050983 A CN113050983 A CN 113050983A CN 202110326857 A CN202110326857 A CN 202110326857A CN 113050983 A CN113050983 A CN 113050983A
- Authority
- CN
- China
- Prior art keywords
- alarm
- monitoring
- rule
- rules
- middleware
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 41
- 238000012544 monitoring process Methods 0.000 claims abstract description 115
- 238000013461 design Methods 0.000 claims abstract description 27
- 241001397306 Proales Species 0.000 claims abstract description 18
- 238000004590 computer program Methods 0.000 claims description 9
- 238000012423 maintenance Methods 0.000 abstract description 20
- 230000008859 change Effects 0.000 abstract description 7
- 238000004891 communication Methods 0.000 description 12
- 238000010586 diagram Methods 0.000 description 10
- 238000007726 management method Methods 0.000 description 10
- 238000005516 engineering process Methods 0.000 description 9
- 238000011161 development Methods 0.000 description 6
- 238000004519 manufacturing process Methods 0.000 description 6
- 230000008569 process Effects 0.000 description 5
- 238000012545 processing Methods 0.000 description 5
- 230000008901 benefit Effects 0.000 description 4
- 230000005540 biological transmission Effects 0.000 description 4
- 230000006870 function Effects 0.000 description 4
- 230000009286 beneficial effect Effects 0.000 description 2
- 239000013067 intermediate product Substances 0.000 description 2
- 230000007246 mechanism Effects 0.000 description 2
- 239000000047 product Substances 0.000 description 2
- 230000009471 action Effects 0.000 description 1
- 238000004422 calculation algorithm Methods 0.000 description 1
- 230000006835 compression Effects 0.000 description 1
- 238000007906 compression Methods 0.000 description 1
- 239000004744 fabric Substances 0.000 description 1
- 238000007689 inspection Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000006855 networking Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000002093 peripheral effect Effects 0.000 description 1
- 230000003252 repetitive effect Effects 0.000 description 1
- 230000010076 replication Effects 0.000 description 1
- 238000012827 research and development Methods 0.000 description 1
- 238000013515 script Methods 0.000 description 1
- 239000007787 solid Substances 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
- 230000001360 synchronised effect Effects 0.000 description 1
- 238000012360 testing method Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/70—Software maintenance or management
- G06F8/71—Version control; Configuration management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/30—Monitoring
- G06F11/3051—Monitoring arrangements for monitoring the configuration of the computing system or of the computing system component, e.g. monitoring the presence of processing resources, peripherals, I/O links, software programs
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/30—Monitoring
- G06F11/3065—Monitoring arrangements determined by the means or processing involved in reporting the monitored data
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Quality & Reliability (AREA)
- Software Systems (AREA)
- Computing Systems (AREA)
- Computer Security & Cryptography (AREA)
- Debugging And Monitoring (AREA)
Abstract
The application discloses a design method and system of middleware, an electronic device and a readable storage medium. The design method of the middleware comprises the following steps: a configuration step: configuring system rules through a front-end interface of proal; an output step: and the proa l outputs the system rule to the system and synchronously stores the system rule in a proa l database. The invention provides a design method, a system, electronic equipment and a readable storage medium of a middleware, which can enable operation and maintenance personnel to be separated from a k8s system to configure monitoring rules and alarm rules through a proal system, can rapidly complete the configuration of the monitoring rules and the alarm rules only by simple configuration, and can set the monitoring rules and the alarm rules which can be the monitored business aiming at the difference of each business, so that the monitoring system is more flexible. And the possibility of manual direct change is reduced, the labor cost can be reduced, the learning cost is low, and the method is more efficient.
Description
Technical Field
The present application relates to the field of container monitoring technologies, and in particular, to a method and a system for designing middleware, an electronic device, and a readable storage medium.
Background
With the development of enterprises, the stability requirement of the enterprises on the online service is higher and higher, and if the online service fails, huge loss is caused. Especially in the container environment, because of the specificity of the container, a more comprehensive and accurate understanding of the cluster state is needed, and the cluster state is analyzed and predicted. Along with the development of services, the requirements on the monitoring system are higher and higher, and the monitoring system is required to be comprehensive in monitoring, easy to configure and easy to manage. The excellent monitoring system can more conveniently and quickly expose some non-occurred problems as soon as possible. As services become more complex, monitoring systems become more complex to adapt to changes in the service. In the existing scheme, the monitoring and alarming functions are generally realized by using prometheus + alert manager, and in order to make the services more convenient to maintain, a mirror image of the monitoring and alarming services is made to run in a k8 cluster. This makes both services more stable. Making the configuration file into a configmap and hanging the configmap into the pod can enable the configuration to be effective in real time, but the configuration has higher requirements on operation and maintenance personnel, and the prior art application framework diagram is shown in fig. 2 because the personnel can be skilled to configure various resources in k8 s. As shown in FIG. 2, if the operation and maintenance personnel need to change the configuration of the monitoring system, the k8s cluster which can be skillfully configured is needed first, and the operation and maintenance personnel also need to be skillful in mastering prometheus query statements to complete configuration monitoring, which increases the skillful cost of the operation and maintenance personnel in no way. And in actual production, all monitoring rules are written into the same file. The configuration file is made larger and larger, which is inconvenient for daily maintenance and is easy to cause a thought error.
Therefore, aiming at the current situation, the invention provides a design method, a system, electronic equipment and a readable storage medium of the middleware, which can enable operation and maintenance personnel to be separated from a k8s system to configure monitoring rules and alarm rules through a real system, and can also realize the rapid configuration of the monitoring rules and the alarm rules by simple configuration without the operation and maintenance personnel needing to deeply know query statements, and the monitoring rules and the alarm rules which can be the monitored business are formulated according to the difference of each business, so that the monitoring system is more flexible. The possibility of manual direct change is reduced, labor cost can be reduced, learning cost is low, efficiency is high, maintenance is convenient, a large configuration file is not required to be maintained, and accordingly the risk of manual error is reduced.
Disclosure of Invention
The embodiment of the application provides a method, a system, an electronic device and a readable storage medium for designing a middleware, so as to at least solve the problem of subjective factor influence in the related art.
The invention provides a design method of a middleware, which comprises the following steps:
a configuration step: configuring system rules through a front-end interface of the deal;
an output step: and the proal outputs the system rule to the system and synchronously stores the system rule into a proal database.
In the above method for designing middleware, the system includes a monitoring system and an alarm system, and the system rules include monitoring rules and alarm rules.
In the above method for designing middleware, the configuring step includes configuring the monitoring rule and the alarm rule through the front-end interface of the deal.
In the above method for designing middleware, the outputting step includes that the deal synchronously stores the monitoring rule and the alarm rule in the deal database, and outputs the monitoring rule and the alarm rule to the monitoring system and the alarm system, if the monitoring system and the alarm system cannot be used normally, only end point of other available monitoring systems and alarm systems needs to be provided, and after the monitoring system and the alarm system are connected with the deal, the deal reads the monitoring rule and the alarm rule stored in the deal database, and outputs the monitoring rule and the alarm rule to the available monitoring systems and the alarm systems.
The present invention also provides a system for designing a middleware, which is applicable to the method for designing a middleware described above, the system for designing a middleware comprising:
a configuration unit: configuring system rules through a front-end interface of the deal;
an output unit: and the proal outputs the system rule to the system and synchronously stores the system rule into a proal database.
The system for designing the middleware comprises a monitoring system and an alarm system, wherein the system rules comprise monitoring rules and alarm rules.
In the above design system of the middleware, the monitoring rule and the alarm rule are configured through the front-end interface of the deal in the configuration unit.
In the design system of the middleware, the deal synchronously stores the monitoring rule and the alarm rule in the deal database and outputs the monitoring rule and the alarm rule to the monitoring system and the alarm system through an output unit, if the monitoring system and the alarm system cannot be used normally, only the endpoint of other available monitoring systems and alarm systems needs to be provided, and after the deal is connected with the deal, the deal reads the monitoring rule and the alarm rule stored in the deal database and outputs the monitoring rule and the alarm rule to the available monitoring system and the alarm system.
The present invention also provides an electronic device, including a memory, a processor, and a computer program stored on the memory and executable on the processor, wherein the processor implements the design method of the middleware described in any one of the above items when executing the computer program.
The invention also provides an electronic device readable storage medium, on which computer program instructions are stored, which, when executed by the processor, implement the method for designing middleware described in any one of the above.
Compared with the related technology, the invention provides a design method, a system, electronic equipment and a readable storage medium of the middleware, and the invention can enable operation and maintenance personnel to be separated from a k8s system to configure monitoring rules and alarm rules through a proal system, and the operation and maintenance personnel are not required to deeply know query statements, and can rapidly complete the configuration of the monitoring rules and the alarm rules only by simple configuration, and the monitoring rules and the alarm rules which can be the monitored business are formulated according to the difference of each business, so that the monitoring system is more flexible. The possibility of manual direct change is reduced, labor cost can be reduced, learning cost is low, efficiency is high, maintenance is convenient, a large configuration file is not required to be maintained, and accordingly the risk of manual error is reduced.
The details of one or more embodiments of the application are set forth in the accompanying drawings and the description below to provide a more thorough understanding of the application.
Drawings
The accompanying drawings, which are included to provide a further understanding of the application and are incorporated in and constitute a part of this application, illustrate embodiment(s) of the application and together with the description serve to explain the application and not to limit the application. In the drawings:
FIG. 1 is a flow chart of a method for designing middleware according to an embodiment of the present application;
FIG. 2 is a diagram of a prior art application framework according to an embodiment of the present application;
FIG. 3 is an architectural framework diagram according to an embodiment of the present application;
FIG. 4 is a diagram of a rule space framework according to an embodiment of the present application;
FIG. 5 is a schematic structural diagram of a design system of the middleware of the present invention;
fig. 6 is a frame diagram of an electronic device according to an embodiment of the present application.
Wherein the reference numerals are:
a configuration unit: 51;
an output unit: 52;
81: a processor;
82: a memory;
83: a communication interface;
80: a bus.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application will be described and illustrated below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the present application and are not intended to limit the present application. All other embodiments obtained by a person of ordinary skill in the art based on the embodiments provided in the present application without any inventive step are within the scope of protection of the present application.
It is obvious that the drawings in the following description are only examples or embodiments of the present application, and that it is also possible for a person skilled in the art to apply the present application to other similar contexts on the basis of these drawings without inventive effort. Moreover, it should be appreciated that such a development effort might be complex and tedious, but would nevertheless be a routine undertaking of design, fabrication, and manufacture for those of ordinary skill having the benefit of this disclosure, and thus should not be construed as a limitation of this disclosure.
Reference in the specification to "an embodiment" means that a particular feature, structure, or characteristic described in connection with the embodiment can be included in at least one embodiment of the specification. The appearances of the phrase in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments. Those of ordinary skill in the art will explicitly and implicitly appreciate that the embodiments described herein may be combined with other embodiments without conflict.
Unless defined otherwise, technical or scientific terms referred to herein shall have the ordinary meaning as understood by those of ordinary skill in the art to which this application belongs. Reference to "a," "an," "the," and similar words throughout this application are not to be construed as limiting in number, and may refer to the singular or the plural. The present application is directed to the use of the terms "including," "comprising," "having," and any variations thereof, which are intended to cover non-exclusive inclusions; for example, a process, method, system, article, or apparatus that comprises a list of steps or modules (elements) is not limited to the listed steps or elements, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus. Reference to "connected," "coupled," and the like in this application is not intended to be limited to physical or mechanical connections, but may include electrical connections, whether direct or indirect. The term "plurality" as referred to herein means two or more. "and/or" describes an association relationship of associated objects, meaning that three relationships may exist, for example, "A and/or B" may mean: a exists alone, A and B exist simultaneously, and B exists alone. The character "/" generally indicates that the former and latter associated objects are in an "or" relationship. Reference herein to the terms "first," "second," "third," and the like, are merely to distinguish similar objects and do not denote a particular ordering for the objects.
The invention relates to a container monitoring platform based on proal, which is briefly introduced below.
kubernets, K8s for short, is an abbreviation for 8 instead of 8 characters "ubernet". The Kubernetes is an open source and used for managing containerized applications on a plurality of hosts in a cloud platform, aims to make the application of the containerization simple and efficient to deploy (powerfull), and provides a mechanism for deploying, planning, updating and maintaining the applications. A traditional deployment of applications is to install the applications through plug-ins or scripts. The disadvantage of this is that the running, configuration, management, and all life cycles of the application will be bound to the current operating system, which is not beneficial to the upgrade update/rollback and other operations of the application, and certainly, some functions can be implemented by creating a virtual machine, but the virtual machine is very heavy and not beneficial to portability. The new mode is realized by deploying containers, each container is isolated from each other, each container has a file system, processes among the containers cannot influence each other, and computing resources can be distinguished. Compared with a virtual machine, the container can be deployed rapidly, and the container can be migrated among different clouds and different versions of operating systems because the container is decoupled from underlying facilities and a machine file system. The container occupies less resources and is fast to deploy, each application can be packaged into a container mirror image, the container has greater advantages due to the one-to-one relationship between each application and the container, and the container mirror image can be created for the application at the stage of build or release by using the container, because each application does not need to be combined with the rest of application stacks and does not depend on the production environment infrastructure, and a consistent environment can be provided from research and development to test and production. Similarly, containers are lighter weight, more "transparent" than virtual machines, which is more convenient to monitor and manage. Kubernets has the following characteristics of portability, supporting public cloud, private cloud, mixed cloud and multiple cloud (multi-cloud); the expansion is that the module is modularized, the plug-in is realized, the mounting can be realized, and the combination can be realized; automatic deployment, automatic restart, automatic replication, automatic scaling/expansion. Kubernetes is a container orchestration engine for Google open sources that supports automated deployment, large-scale scalable, application containerization management. When an application is deployed in a production environment, multiple instances of the application are typically deployed to load balance application requests. In Kubernetes, we can create multiple containers, each container runs an application instance inside, and then manage, discover and access the group of application instances through a built-in load balancing policy, and all the details do not need operation and maintenance personnel to perform complicated manual configuration and processing.
A container is a collection of interfaces between components and a platform in an application server. The container is produced along with the development of the thin client system. In developing a thin client system, a developer expends a great deal of effort to pay attention to thread security, matters, networks, resources, and so on, thereby reducing development efficiency. Since these solutions to these details are generally fixed or only parameter-changing, from the viewpoint of code reuse and design patterns, developers extract these bottom-level details, build platforms, and provide certain interfaces. Thus, the business developer need not be concerned with the implementation of these underlying details, but rather with the implementation of the business logic. The container is typically located within the application server, which is responsible for loading and maintenance. One container can only exist within one application server, and one application server can establish and maintain multiple containers. The containers generally comply with the configurable principle that the user of the container can achieve its own usage requirements by configuring the parameters of the container without modifying the code of the container. Containers are objects used to store and organize other objects. The class implementing the linked list is an example of a container. Such as C + + programming vector < double > mydata; creating a container mydata that stores a double type value may store entries for the base type or any type of type in the container. If the type argument of the STL container template is a class type, then the container may store objects of that type or objects of any derived class types. Typically, containers store copies of the objects we store in them, which automatically allocate and manage the memory occupied by the objects. When destroying objects of a container, the container is responsible for destroying the objects it contains and freeing the memory they occupy. One advantage of using STL containers to store objects is that we do not have to worry about managing their memory. In the actual development process, the importance of the data structure itself is not inferior to that of the algorithm operating on the data structure, and when a time-critical part exists in the program, the selection of the data structure becomes more important. Classical data structures are limited in number, but we often repeat codes written to implement vector, linked list, etc. structures, which are all very similar but vary in detail to accommodate variations in different data. The STL container provides us with the convenience of allowing us to construct their own data structures under specific types by reusing existing implementations, and by setting some template classes, the STL container provides support for the most common data structures, and the parameters of these templates allow us to specify the data types of the elements in the container, which can simplify many of our repetitive and tedious work.
The monitoring platform software is a full digital information transmission and management system based on network, belonging to the third generation of comprehensive network monitoring products of open technology. The system combines the modern audio and video compression technology, the network communication technology, the computer control technology and the streaming media transmission technology, adopts the modularized software design concept, and realizes the requirements of different customers in a component module mode; the system takes network centralized management and network transmission as a core to complete the whole process of information acquisition, transmission, control, management and storage, can be constructed on various private networks/local area networks/metropolitan area networks/wide area networks, is matched with mainstream hardware manufacturers in the market according to the super technology, and is compatible with various brands of hardware products. The monitoring networking and centralized management are really realized, authorized users can monitor the monitoring site on any computer of the network in real time, and a powerful and flexible comprehensive solution for centralized monitoring of the network is provided. The monitoring platform is divided into four modules: the management service module is the core of the system, is the main server of the whole system and bridges other service modules. The method is mainly used for managing all equipment of a system platform and communicating and synchronizing with other management servers. The management of configuration, equipment inspection, real-time access authority control and the like of mechanisms, personnel, equipment, tasks, alarms, logs and the like of the remote digital video equipment can be realized. When a plurality of clients need to check the same picture of a monitoring point at the same time, data congestion on a communication network line is inevitably caused, and network resources are seriously wasted. The streaming media server supports the forwarding of video and audio streams, when a plurality of clients need to access the same remote picture at the same time, the streaming media server can forward the video and audio streams, only one channel bandwidth network resource is occupied between the forwarding service and the front-end video channel, and then the forwarding server distributes the data to the plurality of clients. The streaming media service module is divided into a real-time streaming media service module and a playback streaming media service module. The real-time streaming media service module is used for forwarding the local real-time video stream. The playback streaming media service module is used for forwarding the local playback video stream. All brands of alarm hosts which can use Vista and CK keyboards, such as Honeywell, C & K, Bosch, time, and the like, can be managed. Through serial ports or network communication, independent alarm subsystems scattered in various places are networked, and an alarm management center can perform alarm control on any subsystem, such as: alarm arming, disarming, bypassing, alarm clearing, alarm output turning on and off, and the like. When any alarm subsystem has an alarm, the alarm management center can quickly and accurately display the detailed information of the alarm, such as: alarm place, name, type, subsystem number, defence area number etc to can carry out the linkage operation according to the warning plan that sets up in advance automatically, if: the video pops out the broadcast, plays appointed sound, video group broadcast, the video group sinks, the output of linkage warning, warning cloth withdraw of defence, TV wall switches, linkage cloud platform preset position, cruises, sends the cell-phone SMS, LED screen display shows, printer prints etc.. The client module is a module which is finally presented in front of a user and is used for the user to operate, and the client communicates with each service component to realize the monitoring operation of an electronic map, displaying real-time videos, playing back videos, controlling the action of a pan-tilt lens, controlling alarm input and output and the like, and the management functions of configuring the electronic map, external equipment, user permission and the like.
The invention provides a design method, a system, electronic equipment and a readable storage medium of a middleware, which can enable operation and maintenance personnel to be separated from a k8s system to configure monitoring rules and alarm rules through a proal system, and can rapidly complete the configuration of the monitoring rules and the alarm rules only by simple configuration without needing the operation and maintenance personnel to deeply know query statements, and the monitoring rules and the alarm rules which can be processed by the business are formulated according to the difference of each business, so that the monitoring system is more flexible. The possibility of manual direct change is reduced, labor cost can be reduced, learning cost is low, efficiency is high, maintenance is convenient, a large configuration file is not required to be maintained, and accordingly the risk of manual error is reduced. The following describes embodiments of the present application with reference to the design of the middleware as an example.
Example one
The embodiment provides a design method of middleware. Referring to fig. 1 to 4, fig. 1 is a flowchart illustrating a method for designing a middleware according to an embodiment of the present application; FIG. 2 is a diagram of a prior art application framework according to an embodiment of the present application; FIG. 3 is an architectural framework diagram according to an embodiment of the present application;
fig. 4 is a regular space frame diagram according to an embodiment of the present application, and as shown in the figure, the design method of the middleware includes the following steps:
configuration step S1: configuring system rules through a front-end interface of the deal;
output step S2: and the proal outputs the system rule to the system and synchronously stores the system rule into a proal database.
In an embodiment, the system comprises a monitoring system and an alarm system, and the system rules comprise monitoring rules and alarm rules.
In an embodiment, the configuring step S1 includes configuring the monitoring rule and the alarm rule through the front-end interface of the deal.
In the specific implementation, it can be seen from fig. 3 and 4 that proql is independent from k8s and is a set of separate configurations. The user can directly operate the front-end interface of the deal to directly change the monitoring system and the alarm system, so that the user is free from directly operating the k8s, and alarm and monitoring rules are configured in a page contact mode. And if the exclusive rule is customized only for a certain service, the proql system has a concept of a space. The user only needs to configure the rule in the space, so that the space and the service group can be bound together, and the exclusive rule only belonging to the service is realized. After a user configures a rule, the deal writes the rule to the monitoring system or the alarm system. And in order to avoid data loss, the data is convenient to copy and can be synchronously written into the database. Therefore, other people can conveniently search the data, and the backup function is also realized.
In an embodiment, the outputting step S2 includes that the deal synchronously stores the monitoring rule and the alarm rule in the deal database, and outputs the monitoring rule and the alarm rule to the monitoring system and the alarm system, if the monitoring system and the alarm system cannot be used normally, the deal only needs to provide an endpoint of the other available monitoring system and alarm system, and after connecting with the deal, the deal reads the monitoring rule and the alarm rule stored in the deal database, and outputs the monitoring rule and the alarm rule to the available monitoring system and the alarm system.
In specific implementation, if the monitoring system and the alarm system cannot be used normally, only the endpoint of other available monitoring systems and alarm systems needs to be provided and connected with the deal, the deal reads the monitoring rules and the alarm rules stored in the deal database and outputs the monitoring rules and the alarm rules to the available monitoring systems and alarm systems, and a complete set of available systems can be deployed quickly.
Therefore, the invention provides a design method, a system, electronic equipment and a readable storage medium of a middleware, which can enable operation and maintenance personnel to be separated from a k8s system to configure monitoring rules and alarm rules through a proal system, and can realize the rapid configuration of the monitoring rules and the alarm rules only by simple configuration without the operation and maintenance personnel deeply knowing query statements, and can set the monitoring rules and the alarm rules of the services according to the difference of the services, so that the monitoring system is more flexible. The possibility of manual direct change is reduced, labor cost can be reduced, learning cost is low, efficiency is high, maintenance is convenient, a large configuration file is not required to be maintained, and accordingly the risk of manual error is reduced.
Example two
Referring to fig. 5, fig. 5 is a schematic structural diagram of a design system of a middleware according to the present invention. As shown in fig. 5, the system for designing an intermediate product according to the present invention is applied to the method for designing an intermediate product, and includes:
the configuration unit 51: configuring system rules through a front-end interface of the deal;
the output unit 52: and the proal outputs the system rule to the system and synchronously stores the system rule into a proal database.
In this embodiment, the system includes a monitoring system and an alarm system, and the system rules include monitoring rules and alarm rules.
In this embodiment, the monitoring rule and the alarm rule are configured through the front-end interface of the deal in the configuration unit 51.
In this embodiment, the deal synchronously stores the monitoring rule and the alarm rule in the deal database, and outputs the monitoring rule and the alarm rule to the monitoring system and the alarm system through an output unit 52, if the monitoring system and the alarm system cannot be used normally, only an endpoint of other available monitoring systems and alarm systems needs to be provided, and after connecting with the deal, the deal reads the monitoring rule and the alarm rule stored in the deal database, and outputs the monitoring rule and the alarm rule to the available monitoring system and the available alarm system.
Example four
Referring to fig. 6, this embodiment discloses a specific implementation of an electronic device. The electronic device may include a processor 81 and a memory 82 storing computer program instructions.
Specifically, the processor 81 may include a Central Processing Unit (CPU), or A Specific Integrated Circuit (ASIC), or may be configured to implement one or more Integrated circuits of the embodiments of the present Application.
The memory 82 may be used to store or cache various data files for processing and/or communication use, as well as possible computer program instructions executed by the processor 81.
The processor 81 implements the design method of any middleware in the above embodiments by reading and executing the computer program instructions stored in the memory 82.
In some of these embodiments, the electronic device may also include a communication interface 83 and a bus 80. As shown in fig. 6, the processor 81, the memory 82, and the communication interface 83 are connected via the bus 80 to complete communication therebetween.
The communication interface 83 is used for implementing communication between modules, devices, units and/or equipment in the embodiment of the present application. The communication port 83 may also be implemented with other components such as: and data communication is carried out among external equipment, design equipment of image/middleware, a database, external storage, an image/data processing workstation and the like.
The bus 80 includes hardware, software, or both to couple the components of the electronic device to one another. Bus 80 includes, but is not limited to, at least one of the following: data Bus (Data Bus), Address Bus (Address Bus), Control Bus (Control Bus), Expansion Bus (Expansion Bus), and Local Bus (Local Bus). By way of example, and not limitation, Bus 80 may include an Accelerated Graphics Port (AGP) or other Graphics Bus, an Enhanced Industry Standard Architecture (EISA) Bus, a Front-Side Bus (FSB), a Hyper Transport (HT) Interconnect, an ISA (ISA) Bus, an InfiniBand (InfiniBand) Interconnect, a Low Pin Count (LPC) Bus, a memory Bus, a microchannel Architecture (MCA) Bus, a PCI (Peripheral Component Interconnect) Bus, a PCI-Express (PCI-X) Bus, a Serial Advanced Technology Attachment (SATA) Bus, a Video Electronics Bus (audio Electronics Association), abbreviated VLB) bus or other suitable bus or a combination of two or more of these. Bus 80 may include one or more buses, where appropriate. Although specific buses are described and shown in the embodiments of the application, any suitable buses or interconnects are contemplated by the application.
The electronic device may be connected to a design system of the middleware to implement the method described in connection with fig. 1 to 4.
The technical features of the embodiments described above may be arbitrarily combined, and for the sake of brevity, all possible combinations of the technical features in the embodiments described above are not described, but should be considered as being within the scope of the present specification as long as there is no contradiction between the combinations of the technical features.
The above-mentioned embodiments only express several embodiments of the present application, and the description thereof is more specific and detailed, but not construed as limiting the scope of the invention. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the concept of the present application, which falls within the scope of protection of the present application. Therefore, the protection scope of the present patent shall be subject to the appended claims.
Claims (10)
1. A method for designing middleware, comprising:
a configuration step: configuring system rules through a front-end interface of the deal;
an output step: and the proal outputs the system rule to the system and synchronously stores the system rule into a proal database.
2. The method for designing middleware of claim 1 wherein the system comprises a monitoring system and an alarm system, and the system rules comprise monitoring rules and alarm rules.
3. The method of claim 2, wherein the configuring step comprises configuring the monitoring rules and the alarm rules through the front-end interface of the deal.
4. The middleware design method according to claim 2, wherein the outputting step includes that the deal synchronously stores the monitoring rule and the alarm rule in the deal database, and outputs the monitoring rule and the alarm rule to the monitoring system and the alarm system, if the monitoring system and the alarm system cannot be used normally, only end point of other available monitoring systems and alarm systems needs to be provided, and after the end point is connected with the deal, the deal reads the monitoring rule and the alarm rule stored in the deal database, and outputs the monitoring rule and the alarm rule to the available monitoring systems and the alarm systems.
5. A system for designing middleware, which is applied to the method for designing middleware according to any one of claims 1 to 4, said system for designing middleware comprising:
a configuration unit: configuring system rules through a front-end interface of the deal;
an output unit: and the proal outputs the system rule to the system and synchronously stores the system rule into a proal database.
6. The middleware design system in accordance with claim 7 wherein said system includes a monitoring system and an alarm system, and said system rules include monitoring rules and alarm rules.
7. The middleware design system in accordance with claim 6, wherein said monitoring rule and said alarm rule are configured through said front-end interface of said deal in said configuration unit.
8. The middleware design system according to claim 7, wherein the deal synchronously stores the monitoring rule and the alarm rule in the deal database and outputs the monitoring rule and the alarm rule to the monitoring system and the alarm system through an output unit, if the monitoring system and the alarm system cannot be used normally, only an endpoint of other available monitoring systems and alarm systems needs to be provided, and after connecting with the deal, the deal reads the monitoring rule and the alarm rule stored in the deal database and outputs the monitoring rule and the alarm rule to the available monitoring systems and alarm systems.
9. An electronic device comprising a memory, a processor, and a computer program stored on the memory and executable on the processor, wherein the processor implements the design method of the middleware of any one of claims 1 to 4 when executing the computer program.
10. An electronic device readable storage medium having stored thereon computer program instructions which, when executed by the processor, implement the design method of middleware of any one of claims 1 to 4.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110326857.2A CN113050983A (en) | 2021-03-26 | 2021-03-26 | Method and system for designing middleware, electronic device and readable storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110326857.2A CN113050983A (en) | 2021-03-26 | 2021-03-26 | Method and system for designing middleware, electronic device and readable storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN113050983A true CN113050983A (en) | 2021-06-29 |
Family
ID=76515672
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110326857.2A Pending CN113050983A (en) | 2021-03-26 | 2021-03-26 | Method and system for designing middleware, electronic device and readable storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113050983A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115460342A (en) * | 2022-07-29 | 2022-12-09 | 浙江大华技术股份有限公司 | Service setting method and device of camera equipment and multi-path camera linkage system |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105653425A (en) * | 2015-12-28 | 2016-06-08 | 中国民航信息网络股份有限公司 | Complicated event processing engine based monitoring system |
CN111352800A (en) * | 2020-02-25 | 2020-06-30 | 京东数字科技控股有限公司 | Big data cluster monitoring method and related equipment |
CN111666189A (en) * | 2020-06-12 | 2020-09-15 | 中信银行股份有限公司 | Method and system for declaratively visually configuring Prometheus monitoring alarm |
CN112291114A (en) * | 2020-11-17 | 2021-01-29 | 恩亿科(北京)数据科技有限公司 | Data source monitoring method and system, electronic equipment and storage medium |
-
2021
- 2021-03-26 CN CN202110326857.2A patent/CN113050983A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105653425A (en) * | 2015-12-28 | 2016-06-08 | 中国民航信息网络股份有限公司 | Complicated event processing engine based monitoring system |
CN111352800A (en) * | 2020-02-25 | 2020-06-30 | 京东数字科技控股有限公司 | Big data cluster monitoring method and related equipment |
CN111666189A (en) * | 2020-06-12 | 2020-09-15 | 中信银行股份有限公司 | Method and system for declaratively visually configuring Prometheus monitoring alarm |
CN112291114A (en) * | 2020-11-17 | 2021-01-29 | 恩亿科(北京)数据科技有限公司 | Data source monitoring method and system, electronic equipment and storage medium |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115460342A (en) * | 2022-07-29 | 2022-12-09 | 浙江大华技术股份有限公司 | Service setting method and device of camera equipment and multi-path camera linkage system |
CN115460342B (en) * | 2022-07-29 | 2024-02-27 | 浙江大华技术股份有限公司 | Service setting method and device of camera equipment and multi-path camera linkage system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9971823B2 (en) | Dynamic replica failure detection and healing | |
US9880827B2 (en) | Managing software version upgrades in a multiple computer system environment | |
US11853816B2 (en) | Extending the Kubernetes API in-process | |
CN105653425B (en) | Monitoring system based on complex event processing engine | |
CN108513657B (en) | Data conversion method and backup server | |
US8825834B2 (en) | Automated cluster member management based on node capabilities | |
CN111209011A (en) | Cross-platform container cloud automatic deployment system | |
CN109684036B (en) | Container cluster management method, storage medium, electronic device and system | |
US11991094B2 (en) | Metadata driven static determination of controller availability | |
US10061665B2 (en) | Preserving management services with self-contained metadata through the disaster recovery life cycle | |
US11269838B2 (en) | Collision detection using state management of configuration items | |
CN113127150B (en) | Rapid deployment method and device of cloud primary system, electronic equipment and storage medium | |
US10338910B2 (en) | Multi-tenant upgrading | |
CN113050983A (en) | Method and system for designing middleware, electronic device and readable storage medium | |
US9871706B2 (en) | Intelligently managing pattern contents across multiple racks based on workload and human interaction usage patterns | |
WO2016078326A1 (en) | Method, apparatus and system for displaying names of virtual machine | |
US12026562B2 (en) | Industry opinionated API managed service | |
CN115373757A (en) | Solving method and device for cluster monitoring data loss in Promethues fragmentation mode | |
CN113051108A (en) | Data backup method and system | |
US10701176B1 (en) | Messaging using a hash ring with host groups | |
US11768704B2 (en) | Increase assignment effectiveness of kubernetes pods by reducing repetitive pod mis-scheduling | |
US12013774B2 (en) | Verification of core file debugging resources | |
US11816363B2 (en) | File based virtual disk management | |
JP7450726B2 (en) | Hybrid cloud asynchronous data synchronization | |
US11924031B2 (en) | Highly scalable container network interface operation to reduce startup overhead of functions |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |