CN113051134A - Application system monitoring management method, device, equipment and storage medium - Google Patents

Application system monitoring management method, device, equipment and storage medium Download PDF

Info

Publication number
CN113051134A
CN113051134A CN202110423432.3A CN202110423432A CN113051134A CN 113051134 A CN113051134 A CN 113051134A CN 202110423432 A CN202110423432 A CN 202110423432A CN 113051134 A CN113051134 A CN 113051134A
Authority
CN
China
Prior art keywords
application
application program
target application
monitoring
program
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202110423432.3A
Other languages
Chinese (zh)
Other versions
CN113051134B (en
Inventor
袁园
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Industrial and Commercial Bank of China Ltd ICBC
Original Assignee
Industrial and Commercial Bank of China Ltd ICBC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Industrial and Commercial Bank of China Ltd ICBC filed Critical Industrial and Commercial Bank of China Ltd ICBC
Priority to CN202110423432.3A priority Critical patent/CN113051134B/en
Publication of CN113051134A publication Critical patent/CN113051134A/en
Application granted granted Critical
Publication of CN113051134B publication Critical patent/CN113051134B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/3003Monitoring arrangements specially adapted to the computing system or computing system component being monitored
    • G06F11/302Monitoring arrangements specially adapted to the computing system or computing system component being monitored where the computing system component is a software system
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/60Software deployment
    • G06F8/65Updates

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • General Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Mathematical Physics (AREA)
  • Quality & Reliability (AREA)
  • Stored Programmes (AREA)

Abstract

Provided are a method, a device, equipment and a storage medium for monitoring and managing an application system, wherein the method comprises the following steps: acquiring policy task information to be executed in an application system, wherein the policy task information comprises an application program to be updated and program updating time; determining a target application program set according to the application program to be updated and a preset dependency relationship, wherein the preset dependency relationship represents an operation relationship among the application programs; determining a target application node corresponding to each target application program according to the target application program set, wherein the target application node comprises at least one target application program meeting specified conditions; and monitoring and shielding management is carried out on all target application nodes according to the program updating time. The method can realize automatic detection of the shielding object, accurately control the shielding time period, improve the accuracy of alarm shielding, avoid mistaken alarm and missed alarm, and further improve the efficiency of monitoring and management of the application system.

Description

Application system monitoring management method, device, equipment and storage medium
Technical Field
The present disclosure relates to the field of operation and maintenance monitoring, and in particular, to a method, an apparatus, a device, and a storage medium for monitoring and managing an application system.
Background
In order to meet the continuous change of business requirements, the upgrading and iteration speed of the application system in the banking industry is faster and faster, and when the application system is upgraded, the application program needs to be stopped for installation and maintenance in a planned mode. In order to avoid that the monitoring system sends out a large amount of invalid alarms to influence normal alarms during the planned stop period of the application program, a monitoring system shielding period needs to be set. In the prior art, an operation and maintenance person manually combs a list of servers to which an application program scheduled to be maintained for shutdown belongs, sets a time period required to be shielded, and then introduces the time period into a monitoring system, when the monitoring system judges that the time reaches the start time of the shielding period, the shielding period takes effect, an alarm sent by the set server is shielded, when the maintenance of the application program is finished or the set shielding period end time is reached, the operation and maintenance person is required to manually adjust the shielding period to be finished or automatically finish after the set time point is reached, and the monitoring system resumes monitoring.
At present, with the popularization of distributed application and cloud computing, the number of application systems is increasing, the scale of servers is also becoming larger, and the association relationship between application programs and the servers and the association relationship between application programs and the application programs are becoming more complex. The existing manual combing of the list of the server in the screening period is complex in mode and long in time consumption, and the combing of the relationship between the server which is complicated in complexity and the application program is easy to miss. Meanwhile, the manually set masking period is estimated shutdown maintenance time, and only can include but cannot accurately conform to actual shutdown maintenance time, and if the time period set by the masking period is long, alarms beyond the real start time and end time of maintenance cannot be accurately sent.
Therefore, how to improve the efficiency of monitoring and managing the application system becomes a technical problem which needs to be solved urgently at present.
Disclosure of Invention
In view of the foregoing problems in the prior art, an object of the present invention is to provide a method, an apparatus, a device and a storage medium for monitoring and managing an application system, which can improve the efficiency of monitoring and managing the application system.
In order to solve the technical problems, the specific technical scheme is as follows:
in one aspect, a method for application system monitoring management is provided herein, the method comprising:
acquiring policy task information to be executed in an application system, wherein the policy task information comprises an application program to be updated and program updating time;
determining a target application program set according to the application program to be updated and a preset dependency relationship, wherein the preset dependency relationship represents an operation relationship among the application programs;
determining a target application node corresponding to each target application program according to the target application program set, wherein the target application node comprises at least one target application program meeting specified conditions;
and monitoring and shielding management is carried out on all target application nodes according to the program updating time.
Further, the establishing of the preset dependency relationship includes:
acquiring all application programs in an application system;
for any application program, acquiring the associated application program running in dependence on the application program to form a preset dependence relationship between the application program and the associated application program.
Further, the associated application includes at least one set of application in dependency relationship, and the upstream application in each set of dependency relationship depends on any application.
Further, the determining a target application program set according to the application program to be updated and a preset dependency relationship includes:
determining a preset dependency corresponding to the application program to be updated;
determining an associated application program according to the application program to be updated and a preset dependency relationship;
and acquiring a union of the application program to be updated and the associated application program to serve as a target application program set.
Further, the determining a target application node corresponding to each target application program according to the target application program set includes:
acquiring information of an application node which is configured in advance in an application system, wherein the application node comprises at least one application program meeting specified conditions;
and traversing each target application program in the target application program set, and determining a target application node corresponding to each target application program by combining the pre-configured application node information.
Preferably, the application programs of the specified condition are the same type of application program.
Further, the program update time includes an update start time and an update end time;
correspondingly, according to the program update time, monitoring shielding management is performed on all target application nodes, and the monitoring shielding management comprises the following steps:
judging whether the updating start time is reached;
if the update starting time is reached, monitoring shielding processing is carried out on the target application node so as to disconnect monitoring on the target application node;
continuously judging whether the updating ending time is reached;
and if the update ending time is reached, starting monitoring on the target application node so as to recover monitoring on the target application node.
In another aspect, an application system monitoring and managing apparatus is also provided herein, the apparatus including:
the system comprises a policy task information acquisition module, a policy task information processing module and a policy task processing module, wherein the policy task information acquisition module is used for acquiring policy task information to be executed in an application system, and the policy task information comprises an application program to be updated and program updating time;
the target application program set determining module is used for determining a target application program set according to the application program to be updated and a preset dependency relationship, wherein the preset dependency relationship represents the operation relationship among the application programs;
the target application node determining module is used for determining a target application node corresponding to each target application program according to the target application program set, wherein the target application node comprises at least one target application program meeting specified conditions;
and the monitoring management module is used for monitoring and shielding management on all target application nodes according to the program updating time.
In another aspect, a computer device is also provided herein, comprising a memory, a processor, and a computer program stored on the memory and executable on the processor, the processor implementing the method as described above when executing the computer program.
Finally, a computer-readable storage medium is also provided, which stores a computer program which, when executed by a processor, implements the method as described above.
By adopting the technical scheme, the application program to be updated and the program updating time are determined according to the policy task information to be executed in the application system, the target application program set to be monitored is determined according to the application program to be updated, all target application nodes in the target application program set are determined according to the application node information configured in advance, and monitoring shielding processing is performed by taking the target application nodes as the minimum granularity, so that the shielding object can be automatically detected, the shielding time period can be accurately controlled, the accuracy of alarm shielding is improved, false alarm and missed alarm are avoided, and the efficiency of monitoring and managing the application system is improved.
In order to make the aforementioned and other objects, features and advantages of the present invention comprehensible, preferred embodiments accompanied with figures are described in detail below.
Drawings
In order to more clearly illustrate the embodiments or technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art that other drawings can be obtained according to the drawings without creative efforts.
Fig. 1 is a schematic diagram illustrating an implementation environment of a monitoring management method for an application system according to an embodiment of the present disclosure;
FIG. 2 is a schematic diagram illustrating steps of a monitoring management method for an application system according to an embodiment of the present disclosure;
FIG. 3 is a schematic diagram illustrating a target application set determination step in an embodiment herein;
FIG. 4 is a schematic diagram illustrating steps of monitoring and managing a target application node in an embodiment of the present disclosure;
fig. 5 is a schematic structural diagram illustrating an application monitoring management apparatus provided in an embodiment of the present disclosure;
fig. 6 shows a schematic structural diagram of a computer device provided in an embodiment herein.
Description of the symbols of the drawings:
10. a monitoring system;
20. an application system;
30. an application system database;
100. a policy task information acquisition module;
200. a target application set determination module;
300. a target application node determination module;
400. a monitoring management module;
602. a computer device;
604. a processor;
606. a memory;
608. a drive mechanism;
610. an input/output module;
612. an input device;
614. an output device;
616. a presentation device;
618. a graphical user interface;
620. a network interface;
622. a communication link;
624. a communication bus.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments herein without making any creative effort, shall fall within the scope of protection.
It should be noted that the terms "first," "second," and the like in the description and claims herein and in the above-described drawings are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used is interchangeable under appropriate circumstances such that the embodiments herein described are capable of operation in sequences other than those illustrated or described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, apparatus, article, or device that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or device.
In the prior art, in order to avoid an alarm of a monitoring system during the planned stop of an application program, generally, a server is used as a granularity for shielding, specifically, an operation and maintenance person manually combs a server list of the application program which is planned to be shut down for maintenance, sets a time period which needs to be shielded, and then introduces the time period into the monitoring system, but the method for manually combing the server list in a shielding period is complex and time-consuming, and easily makes mistakes in combing the relationship between the server which is complicated to be confused and the application program, and simultaneously, estimates the manually set shielding period which is the shut down maintenance time and only can contain but cannot accurately agree with the actual shut down maintenance time, so that the monitoring efficiency of the monitoring system on the application system is reduced, the monitoring accuracy is difficult to guarantee.
In order to solve the above problem, embodiments of the present specification provide an application system monitoring management method, as shown in fig. 1, which is a schematic diagram of an implementation environment of the method, including a monitoring system 10, an application system 20 and an application system database 30, the application system may be a specific field system, such as a banking financial system, the monitoring system 10 monitors the application program in the application system 20 in real time, when the application program in the application system 20 is failed, the monitoring system 10 performs an alarm prompt, the application system 20 is configured as distinct application nodes, each application node including at least one application program meeting specified conditions, the monitoring system 10 uses the application node as a monitoring granularity to monitor the application program in the application node, so that monitoring of large granularity of the server is avoided; the application system database 30 stores configuration information of application nodes, dependency relationships among application programs and policy task information to be executed, so that the monitoring system 10 obtains the policy task information from the application system database 30, determines the application programs to be updated, then determines a determined target application program set to be monitored, and determines a target application node corresponding to each target application program according to the target application program set, thereby realizing the monitoring relationship of the target application nodes, automatically detecting a shielding object, accurately controlling a shielding time period, and improving the accuracy of alarm shielding.
The dependency relationship may be a "coupling" (or close association) relationship between two applications, and due to the inherent complexity of the business system, there must be a dependency between the applications, which is basically embodied in the code, for example, as shown in fig. 1, a dashed arrow indicates that the Application 4 depends on the Application 1, and the dependency of the Application 4 on the Application 1 may mean that the Application 4 may call an API (Application Program Interface) exposed by the Application 1, and the Application 1 cannot call the API of the Application 4. In other words, the dependency relationship between application 1 and application 4 may be such that changing application 1 may result in changing application 4, application 1 being independent, and application 4 being dependent on application 1 for proper operation.
It should be noted that the dependency relationship may be a unidirectional dependency or a bidirectional dependency, which are considered in the scope of the embodiments of the present specification.
Specifically, embodiments of the present disclosure provide an application system monitoring and management method, which can improve efficiency of application system monitoring and management. Fig. 2 is a schematic diagram of steps of a monitoring and management method for an application system provided in an embodiment of the present disclosure, and the present disclosure provides the method operation steps described in the embodiment or the flowchart, but more or less operation steps may be included based on conventional or non-inventive labor. The order of steps recited in the embodiments is merely one manner of performing the steps in a multitude of orders and does not represent the only order of execution. When an actual system or apparatus product executes, it can execute sequentially or in parallel according to the method shown in the embodiment or the figures. Specifically, as shown in fig. 2, the method may include:
s101: acquiring policy task information to be executed in an application system, wherein the policy task information comprises an application program to be updated and program updating time;
s102: determining a target application program set according to the application program to be updated and a preset dependency relationship, wherein the preset dependency relationship represents an operation relationship among the application programs;
s103: determining a target application node corresponding to each target application program according to the target application program set, wherein the target application node comprises at least one target application program meeting specified conditions;
s104: and monitoring and shielding management is carried out on all target application nodes according to the program updating time.
It can be understood that, in the embodiments of the present specification, the application to be updated and other applications that are in the preset dependency relationship with the application to be updated are determined as the target application set, which are both used as the monitoring target, thereby monitoring the accuracy and comprehensiveness of the object, avoiding false alarm, and monitoring with the server as the dimension by using the form of the application node as the minimum granularity for monitoring, which greatly improves the accuracy of the alarm of the monitoring system.
The application program may be a program instance for implementing a certain service or technical function in an application system. The application system is a function set of services or technologies realized through programs, most of the functions are accessed to users through browsers, and a few of the functions are provided with service clients or mobile phone APPs. The application system for banking industry is operated on servers in bank, and one application system may be composed of dozens of servers to thousands of servers, and one application system contains a plurality of application programs.
When an application system needs to be updated or optimized, generally, in an application program automatic installation system, an installation policy task of an application program is loaded and stored in a server, and automatic update installation is performed until update time, so that the application program to be updated and the corresponding program update time can be updated through the policy task, and the program update time can be understood as stop task time and start task time of the application program to be updated. As shown in Table 1, a task configuration table is updated for an application:
table 1 application update task configuration table
Figure BDA0003028732030000071
Figure BDA0003028732030000081
In this embodiment of the present specification, the preset dependency relationship may be configured in advance in an application system, and optionally, the establishing of the preset dependency relationship includes the following steps:
acquiring all application programs in an application system;
for any application program, acquiring the associated application program running in dependence on the application program to form a preset dependence relationship between the application program and the associated application program.
For example, for any application a, the preset dependency relationship corresponding to the application a may be a dependency chain in which the application a is an upstream application, so that it can be ensured that other applications depending on the application a can be covered on the dependency relationship. With the increase of the complexity of the application system, one application may have a plurality of other applications directly in a dependency relationship, and the plurality of other applications may also have a dependency relationship with itself as an upstream dependency relationship, and by analogy, a corresponding dependency chain may be obtained.
Therefore, the associated application may be a single application, or may be multiple independent applications, or may be a set of applications with some (or all) dependencies, and therefore, the associated application includes at least one set of applications with dependencies, and the upstream application in each set of dependencies depends on any one of the applications. Where the upstream application may be a dependent application and the downstream application may be an application that depends on the upstream application.
Illustratively, the associated application of application a includes two independent dependency chains of b → c and d → e → f, where application b and application d both depend on application a, and the set of b, c, d, e and f is the associated application.
In an application system, for each application program, a corresponding dependency relationship may be determined in advance, and the determined dependency relationship may be stored, for example, in a corresponding dependency relationship database, and may be extracted directly by the application program when necessary.
Further, as application systems are continuously developed and maintained, the dependency database needs to be maintained regularly to ensure that the dependencies therein are kept in the latest state.
In an embodiment of this specification, as shown in fig. 3, the determining a target application set according to the application to be updated and a preset dependency relationship includes:
s201: determining a preset dependency corresponding to the application program to be updated;
s202: determining an associated application program according to the application program to be updated and a preset dependency relationship;
s203: and acquiring a union of the application program to be updated and the associated application program to serve as a target application program set.
Since one or more applications are running on the server, each application contains one or more monitored objects (i.e., applications to be updated), each monitored object has at least one monitoring target, which may need to be masked or unmasked with monitoring alarms. The monitoring alarm is divided into two types, one type is spontaneous alarm, the monitoring alarm is generated when an application program stops or fails, and a monitoring target of the spontaneous alarm is the same as a monitoring object; the other type is the associated alarm, which is generated when the application program depended on by the application program stops or fails, and the monitoring target and the monitoring object of the associated alarm are different.
It can be understood that, in actual work, each application program is configured with a monitoring module to determine whether it is working normally, and specific feedback information is received by an application node, that is, the monitoring system determines the state of each application program by obtaining information of the application node, and because of the relevance between the programs, the monitoring of the application node may also be different, so that when an autonomous alarm is addressed, a monitoring target is consistent with the monitoring target, that is, the monitoring target application node is consistent with the monitoring target application node, and when an associated alarm is addressed, the monitoring target is inconsistent with the monitoring target, that is, the monitoring target application node is inconsistent with the monitoring target application node, as shown in table 2 below, a table is configured for the association of the monitoring target, and the application node information:
table 2 associated configuration table of monitoring object, monitoring target and application node information
Figure BDA0003028732030000091
Figure BDA0003028732030000101
The monitoring module in the above table may be a monitoring module corresponding to an application program in an application node, and it should be emphasized that the above table is only an association diagram of a monitoring object, a monitoring target, and an application node, and the specific configuration may be inconsistent with the sequence in table 2, and in actual work, there will generally be an associated alarm, so that a set of the monitoring object and the monitoring module corresponding to the application program associated therewith may be directly used as the monitoring object, so that the efficiency of monitoring the application node may be improved, and the application node is prevented from being configured one by one.
In a specific work, the monitoring system may extract the corresponding preset dependency relationship from the database through the application to be updated, and an available extraction manner is not limited in this specification. And further determining the associated application program, thereby determining an application program set having direct and indirect dependency relationship with the application program to be updated, wherein the application program set and the application program to be updated should be in a fault state in the update task time, because in order to avoid false alarm, the application program set and the application program to be updated are required to be used as target application programs, thereby forming a target application program set.
In practical operation, the detection method of the monitored object can be obtained by the following formula:
Figure BDA0003028732030000102
f → B, i.e. f (a) { y | y ═ f (x), x ∈ a, y ∈ B }.
F(X)={X∪F(f(X))}
A represents a monitoring object set (i.e., an application program set), B represents a monitoring object set (a monitoring object corresponding to each application program), and f (a) represents an association relationship between a monitoring object and a monitoring object, where the monitoring object may have one or more monitoring objects. And F (X) traversing all the monitoring objects in the X for the monitoring object set needing shielding, taking the obtained monitoring object result as a monitoring object merging set, and circularly obtaining all the monitoring objects.
After determining the target application program set, it is further required to determine an application node that needs to be monitored, and optionally, determining a target application node corresponding to each target application program according to the target application program set includes:
acquiring information of an application node which is configured in advance in an application system, wherein the application node comprises at least one application program meeting specified conditions;
and traversing each target application program in the target application program set, and determining a target application node corresponding to each target application program by combining the pre-configured application node information.
Each target application program determines a target application node, and in general, repetition of the target application nodes occurs, so that the set of the target application nodes is used as an object for monitoring and management of a subsequent monitoring system.
The preconfigured application node information can be configured by operation and maintenance personnel or developers according to certain conditions, so that the application program meeting the conditions is monitored as an application node, optionally, the application program with the specified conditions can be the application program of the same type, and thus, when the application program is updated, all the application programs in the application node are generally updated, so that accurate determination of a monitored object can be realized, and the occurrence of false shielding of other normal application programs is avoided.
In some other embodiments, the configuration condition of the application node may also have other forms, which are not limited in this specification.
Therefore, after all target application nodes to which the application program to be updated is associated have been determined, it is necessary to perform shielding processing on the target application nodes during the update, and as an alternative, as shown in fig. 4, the monitoring shielding management on all target application nodes according to the program update time includes:
s301: judging whether the updating start time is reached;
s302: if the update starting time is reached, monitoring shielding processing is carried out on the target application node so as to disconnect monitoring on the target application node;
s303: continuously judging whether the updating ending time is reached;
s304: and if the update ending time is reached, starting monitoring on the target application node so as to recover monitoring on the target application node.
The method is characterized in that only one strategy task is monitored, shielded and managed, when a plurality of different strategy tasks exist, the planned starting time and the planned ending time of all the strategy tasks in the application program automatic installation system are obtained, different monitoring measures are automatically configured according to the different strategy tasks, when the planned starting time of the strategy tasks is reached, the relevant strategy tasks are detected, whether the step executed in the strategy tasks is the step of stopping the application program or the step of starting the application program is judged, and the step is sent to the monitoring system for processing.
In the monitoring management method for the application system provided in the embodiment of the present specification, the application program to be updated and the program update time are determined according to the policy task information to be executed in the application system, then the target application program set to be monitored is determined according to the application program to be updated, then all target application nodes in the target application program set are determined according to the application node information configured in advance, and then the monitoring shielding processing is performed with the target application nodes as the minimum granularity, so that the shielding object can be automatically detected, the shielding time period can be accurately controlled, the accuracy of the alarm shielding is improved, false alarms and missed alarms are avoided, and the monitoring efficiency of the application system is improved.
Based on the same inventive concept, an embodiment of the present specification further provides an application system monitoring and management apparatus, as shown in fig. 5, the apparatus includes:
a policy task information obtaining module 100, configured to obtain policy task information to be executed in an application system, where the policy task information includes an application program to be updated and program update time;
a target application program set determining module 200, configured to determine a target application program set according to the application program to be updated and a preset dependency relationship, where the preset dependency relationship represents an operation relationship between the application programs;
a target application node determining module 300, configured to determine, according to the target application program set, a target application node corresponding to each target application program, where the target application node includes at least one target application program meeting a specified condition;
and the monitoring management module 400 is configured to perform monitoring shielding management on all target application nodes according to the program update time.
The advantages obtained by the device provided by the embodiment of the specification are consistent with those obtained by the method, and the detailed description is omitted.
As shown in fig. 6, for a computer device provided for embodiments herein, the computer device 602 may include one or more processors 604, such as one or more Central Processing Units (CPUs), each of which may implement one or more hardware threads. The computer device 602 may also include any memory 606 for storing any kind of information, such as code, settings, data, etc. For example, and without limitation, memory 606 may include any one or more of the following in combination: any type of RAM, any type of ROM, flash memory devices, hard disks, optical disks, etc. More generally, any memory may use any technology to store information. Further, any memory may provide volatile or non-volatile retention of information. Further, any memory may represent fixed or removable components of computer device 602. In one case, when the processor 604 executes the associated instructions, which are stored in any memory or combination of memories, the computer device 602 may perform any of the operations of the associated instructions. The computer device 602 also includes one or more drive mechanisms 608, such as a hard disk drive mechanism, an optical disk drive mechanism, etc., for interacting with any memory.
The computer device 602 may also include an input/output module 610(I/O) for receiving various inputs (via input device 612) and for providing various outputs (via output device 614)). One particular output mechanism may include a presentation device 616 and an associated Graphical User Interface (GUI) 618. In other embodiments, input/output module 610(I/O), input device 612, and output device 614 may also be excluded, as just one computer device in a network. Computer device 602 may also include one or more network interfaces 620 for exchanging data with other devices via one or more communication links 622. One or more communication buses 624 couple the above-described components together.
Communication link 622 may be implemented in any manner, such as through a local area network, a wide area network (e.g., the Internet), a point-to-point connection, etc., or any combination thereof. Communication link 622 may include any combination of hardwired links, wireless links, routers, gateway functions, name servers, etc., governed by any protocol or combination of protocols.
Corresponding to the methods in fig. 2-4, the embodiments herein also provide a computer-readable storage medium having stored thereon a computer program, which, when executed by a processor, performs the steps of the above-described method.
Embodiments herein also provide computer readable instructions, wherein when executed by a processor, a program thereof causes the processor to perform the method as shown in fig. 2-4.
It should be understood that, in various embodiments herein, the sequence numbers of the above-mentioned processes do not mean the execution sequence, and the execution sequence of each process should be determined by its function and inherent logic, and should not constitute any limitation to the implementation process of the embodiments herein.
It should also be understood that, in the embodiments herein, the term "and/or" is only one kind of association relation describing an associated object, meaning that three kinds of relations may exist. For example, a and/or B, may represent: a exists alone, A and B exist simultaneously, and B exists alone. In addition, the character "/" herein generally indicates that the former and latter related objects are in an "or" relationship.
Those of ordinary skill in the art will appreciate that the elements and algorithm steps of the examples described in connection with the embodiments disclosed herein may be embodied in electronic hardware, computer software, or combinations of both, and that the components and steps of the examples have been described in a functional general in the foregoing description for the purpose of illustrating clearly the interchangeability of hardware and software. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present disclosure.
It is clear to those skilled in the art that, for convenience and brevity of description, the specific working processes of the above-described systems, apparatuses and units may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
In the several embodiments provided herein, it should be understood that the disclosed system, apparatus, and method may be implemented in other ways. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the units is only one logical division, and other divisions may be realized in practice, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may also be an electric, mechanical or other form of connection.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purposes of the embodiments herein.
In addition, functional units in the embodiments herein may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The integrated unit, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solutions of the present invention may be implemented in a form of a software product, which is stored in a storage medium and includes several instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the methods described in the embodiments of the present invention. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
The principles and embodiments of this document are explained herein using specific examples, which are presented only to aid in understanding the methods and their core concepts; meanwhile, for the general technical personnel in the field, according to the idea of this document, there may be changes in the concrete implementation and the application scope, in summary, this description should not be understood as the limitation of this document.

Claims (10)

1. An application system monitoring management method is characterized by comprising the following steps:
acquiring policy task information to be executed in an application system, wherein the policy task information comprises an application program to be updated and program updating time;
determining a target application program set according to the application program to be updated and a preset dependency relationship, wherein the preset dependency relationship represents an operation relationship among the application programs;
determining a target application node corresponding to each target application program according to the target application program set, wherein the target application node comprises at least one target application program meeting specified conditions;
and monitoring and shielding management is carried out on all target application nodes according to the program updating time.
2. The method according to claim 1, wherein the establishing of the preset dependency relationship comprises:
acquiring all application programs in an application system;
for any application program, acquiring the associated application program running in dependence on the application program to form a preset dependence relationship between the application program and the associated application program.
3. The method of claim 2, wherein the associated application includes at least one set of dependent applications, and the upstream application in each set of dependent relationships depends on any of the applications.
4. The method according to claim 2, wherein the determining a target application set according to the application to be updated and a preset dependency relationship comprises:
determining a preset dependency corresponding to the application program to be updated;
determining an associated application program according to the application program to be updated and a preset dependency relationship;
and acquiring a union of the application program to be updated and the associated application program to serve as a target application program set.
5. The method according to claim 1, wherein determining a target application node corresponding to each target application according to the set of target applications comprises:
acquiring information of an application node which is configured in advance in an application system, wherein the application node comprises at least one application program meeting specified conditions;
and traversing each target application program in the target application program set, and determining a target application node corresponding to each target application program by combining the pre-configured application node information.
6. The method of claim 5, wherein the condition-specific applications are the same type of application.
7. The method of claim 1, wherein the program update time comprises an update start time and an update end time;
correspondingly, according to the program update time, monitoring shielding management is performed on all target application nodes, and the monitoring shielding management comprises the following steps:
judging whether the updating start time is reached;
if the update starting time is reached, monitoring shielding processing is carried out on the target application node so as to disconnect monitoring on the target application node;
continuously judging whether the updating ending time is reached;
and if the update ending time is reached, starting monitoring on the target application node so as to recover monitoring on the target application node.
8. An application system monitoring management apparatus, comprising:
the system comprises a policy task information acquisition module, a policy task information processing module and a policy task processing module, wherein the policy task information acquisition module is used for acquiring policy task information to be executed in an application system, and the policy task information comprises an application program to be updated and program updating time;
the target application program set determining module is used for determining a target application program set according to the application program to be updated and a preset dependency relationship, wherein the preset dependency relationship represents the operation relationship among the application programs;
the target application node determining module is used for determining a target application node corresponding to each target application program according to the target application program set, wherein the target application node comprises at least one target application program meeting specified conditions;
and the monitoring management module is used for monitoring and shielding management on all target application nodes according to the program updating time.
9. A computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, characterized in that the processor implements the method according to any of claims 1 to 7 when executing the computer program.
10. A computer-readable storage medium, characterized in that the computer-readable storage medium stores a computer program which, when executed by a processor, implements the method of any one of claims 1 to 7.
CN202110423432.3A 2021-04-20 2021-04-20 Application system monitoring management method, device, equipment and storage medium Active CN113051134B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110423432.3A CN113051134B (en) 2021-04-20 2021-04-20 Application system monitoring management method, device, equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110423432.3A CN113051134B (en) 2021-04-20 2021-04-20 Application system monitoring management method, device, equipment and storage medium

Publications (2)

Publication Number Publication Date
CN113051134A true CN113051134A (en) 2021-06-29
CN113051134B CN113051134B (en) 2024-06-25

Family

ID=76519587

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110423432.3A Active CN113051134B (en) 2021-04-20 2021-04-20 Application system monitoring management method, device, equipment and storage medium

Country Status (1)

Country Link
CN (1) CN113051134B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113868436A (en) * 2021-09-30 2021-12-31 平安养老保险股份有限公司 Version information release processing method, version information release processing device, version information release processing equipment and storage medium
CN114510282A (en) * 2021-12-15 2022-05-17 北京达佳互联信息技术有限公司 Operation method, device, equipment and storage medium of automation application
CN115328529A (en) * 2022-06-30 2022-11-11 北京亚控科技发展有限公司 Application management method and related equipment

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109039740A (en) * 2018-08-01 2018-12-18 平安科技(深圳)有限公司 A kind of method and apparatus handling O&M monitoring alarm
CN109871305A (en) * 2019-01-18 2019-06-11 深圳壹账通智能科技有限公司 Processing method, device, computer equipment and the storage medium of warning information
CN111127804A (en) * 2019-12-24 2020-05-08 武汉理工光科股份有限公司 Fire-fighting fire grading pushing method and system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109039740A (en) * 2018-08-01 2018-12-18 平安科技(深圳)有限公司 A kind of method and apparatus handling O&M monitoring alarm
CN109871305A (en) * 2019-01-18 2019-06-11 深圳壹账通智能科技有限公司 Processing method, device, computer equipment and the storage medium of warning information
CN111127804A (en) * 2019-12-24 2020-05-08 武汉理工光科股份有限公司 Fire-fighting fire grading pushing method and system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
施健;巢玉坚;刘军;: "电力通信网管系统告警标准化研究", 电力信息与通信技术, vol. 11, no. 10, 15 October 2013 (2013-10-15), pages 77 - 81 *

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113868436A (en) * 2021-09-30 2021-12-31 平安养老保险股份有限公司 Version information release processing method, version information release processing device, version information release processing equipment and storage medium
CN114510282A (en) * 2021-12-15 2022-05-17 北京达佳互联信息技术有限公司 Operation method, device, equipment and storage medium of automation application
CN114510282B (en) * 2021-12-15 2024-02-13 北京达佳互联信息技术有限公司 Method, device, equipment and storage medium for running automation application
CN115328529A (en) * 2022-06-30 2022-11-11 北京亚控科技发展有限公司 Application management method and related equipment
CN115328529B (en) * 2022-06-30 2023-08-18 北京亚控科技发展有限公司 Application management method and related equipment
WO2024002229A1 (en) * 2022-06-30 2024-01-04 北京亚控科技发展有限公司 Application management method and related device

Also Published As

Publication number Publication date
CN113051134B (en) 2024-06-25

Similar Documents

Publication Publication Date Title
CN113051134A (en) Application system monitoring management method, device, equipment and storage medium
US20210294716A1 (en) Continuous software deployment
US11108859B2 (en) Intelligent backup and recovery of cloud computing environment
US10061578B2 (en) System and method of configuring a data store for tracking and auditing real-time events across different software development tools in agile development environments
CN111538634B (en) Computing system, method, and storage medium
US9342426B2 (en) Distributed system, server computer, distributed management server, and failure prevention method
CN108427616B (en) Background program monitoring method and monitoring device
US8990372B2 (en) Operation managing device and operation management method
US8171348B2 (en) Data consistency in long-running processes
JP2009288836A (en) System failure recovery method of virtual server, and its system
US20220284019A1 (en) Programmable framework for distributed computation of statistical functions over time-based data
CN110971464A (en) Operation and maintenance automatic system suitable for disaster recovery center
WO2019195482A9 (en) Database lock
EP3591530B1 (en) Intelligent backup and recovery of cloud computing environment
CN111078418B (en) Operation synchronization method, device, electronic equipment and computer readable storage medium
CN112714022A (en) Control processing method and device for multiple clusters and computer equipment
EP3473035B1 (en) Application resilience system and method thereof for applications deployed on a cloud platform
CN105787359A (en) Course guarding method and device
CN115309457A (en) Application instance restarting method and device, electronic equipment and readable storage medium
CN113419921A (en) Task monitoring method, device, equipment and storage medium
EP3786750B1 (en) Data collection system, data collection method, and program
US10735246B2 (en) Monitoring an object to prevent an occurrence of an issue
CN112765188A (en) Configuration information processing method, configuration management system, electronic device, and storage medium
CN112579247A (en) Method and device for determining task state
EP4163790A1 (en) Method and system for predicting batch processes

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant