CN113778535B - Cloud host operation verification method, system, equipment and storage medium - Google Patents
Cloud host operation verification method, system, equipment and storage medium Download PDFInfo
- Publication number
- CN113778535B CN113778535B CN202110912842.4A CN202110912842A CN113778535B CN 113778535 B CN113778535 B CN 113778535B CN 202110912842 A CN202110912842 A CN 202110912842A CN 113778535 B CN113778535 B CN 113778535B
- Authority
- CN
- China
- Prior art keywords
- cloud host
- verification
- checker
- check
- configuration file
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000012795 verification Methods 0.000 title claims abstract description 72
- 238000000034 method Methods 0.000 title claims abstract description 60
- 230000014509 gene expression Effects 0.000 claims abstract description 47
- 238000004806 packaging method and process Methods 0.000 claims abstract description 16
- 230000008859 change Effects 0.000 claims description 16
- 238000004590 computer program Methods 0.000 claims description 13
- 238000012546 transfer Methods 0.000 claims description 6
- 230000007246 mechanism Effects 0.000 claims description 5
- 238000012217 deletion Methods 0.000 claims description 4
- 230000037430 deletion Effects 0.000 claims description 4
- 230000006870 function Effects 0.000 description 8
- 230000001360 synchronised effect Effects 0.000 description 8
- 230000008569 process Effects 0.000 description 5
- 238000012545 processing Methods 0.000 description 4
- 230000003068 static effect Effects 0.000 description 4
- 230000009471 action Effects 0.000 description 3
- 238000004891 communication Methods 0.000 description 3
- 238000013461 design Methods 0.000 description 3
- 230000000694 effects Effects 0.000 description 3
- 230000005291 magnetic effect Effects 0.000 description 3
- 239000000725 suspension Substances 0.000 description 3
- 230000008901 benefit Effects 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 230000003993 interaction Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000011084 recovery Methods 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000005294 ferromagnetic effect Effects 0.000 description 1
- 238000012423 maintenance Methods 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 238000012552 review Methods 0.000 description 1
- 238000012800 visualization Methods 0.000 description 1
- 239000002699 waste material Substances 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/4401—Bootstrapping
- G06F9/4406—Loading of operating system
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/4401—Bootstrapping
- G06F9/442—Shutdown
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/445—Program loading or initiating
- G06F9/44505—Configuring for program initiating, e.g. using registry, configuration files
Landscapes
- Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- Storage Device Security (AREA)
- Stored Programmes (AREA)
Abstract
The invention provides a method, a system, equipment and a storage medium for operation verification of a cloud host, wherein the method comprises the steps of packaging parameters to be verified in the cloud host into verifiers one by one, and distributing codes for each verifier; writing all operations in the cloud host into a configuration file, and configuring a verification expression for each operation; analyzing a user-defined operator in the check expression, and calling corresponding check logic according to the checker code; and searching corresponding check configuration in the configuration file according to the current operation type of the cloud host, analyzing a check expression corresponding to the current check configuration, and checking each parameter of the current operation type through a checker. Based on the method, a cloud host operation verification system, equipment and storage media are also provided. According to the invention, the maintainability of the cloud host is increased, when the cloud host is added to operate or special attributes need to be checked, the original codes are not required to be changed, and the configuration file is modified only by adding the check device, so that the robustness of the system is improved.
Description
Technical Field
The invention belongs to the technical field of a main platform cloud host, and particularly relates to a method, a system, equipment and a storage medium for operation verification of a cloud host.
Background
With the advent of cloud computing and big data age, many services are not deployed in a server of a machine room of the cloud computing and big data age, but the server is virtualized into many virtual resources, and the evolution ensures that the resources are not allocated as required, so that the resource waste is reduced, and the operation and maintenance visualization is realized. As more and more service systems are deployed on the cloud platform, the service of the cloud platform is not limited to creating a cloud host for the service systems, and richer functions are required. Such as application programming, service directory, disaster recovery, GPU cloud host, pass-through disk cloud host, etc., and further derive many cloud hosts with special properties that are different from common cloud hosts when performing some operations. Such as the application orchestration cloud host cannot be deleted at will, the GPU cloud host cannot change configuration, the disaster recovery cloud host cannot be turned on or off at will, etc.
As a developer of the cloud platform, when the cloud hosts are limited, the original practice is to limit each operation, for example, delete the cloud hosts, firstly determine whether the cloud hosts are the cloud hosts with application arrangement, then determine whether the cloud hosts are cloud hosts with service directories, then determine whether GPUs are available, then determine whether the GPUs are available or not, and also determine whether the GPUs are available or not, and other operations are also the same, as in fig. 1, a flow chart for checking operation of the cloud hosts under the cloud platform in the prior art is given. This has the disadvantage that if a requirement is changed or a constraint is newly added, the requirement needs to be changed at every operation, for example: a cloud host with a special CPU instruction set is newly developed, but the cloud host can only be started and shut down, other advanced operations are not supported, the limitation on the cloud host is increased in other operations, and the operation of the cloud host is dozens of times at present, so that the cloud host is difficult to be completely examined. The workload is very high and other problems are easily caused.
Disclosure of Invention
In order to solve the technical problems, the invention provides a cloud host operation verification method, a cloud host operation verification system, cloud host operation verification equipment and a storage medium. According to the invention, the maintainability of the cloud host is increased, when the cloud host is newly added with an operation or a special attribute needs to be checked, the original code is not changed, and the checking function can be realized by only adding the checker and modifying the configuration file. The influence caused by modifying the original codes is reduced, and the robustness of the system is improved.
In order to achieve the above purpose, the present invention adopts the following technical scheme:
a method for cloud host operation verification, comprising the steps of:
packaging parameters to be verified in the cloud host into verifiers one by one, and distributing unique codes for each verifier; the calibrator is used for calibrating parameters of the package;
writing all operations in the cloud host into a configuration file, and configuring a verification expression for each operation; analyzing a user-defined operator in the check expression, and calling corresponding check logic according to the checker code;
searching corresponding check configuration in a configuration file according to the current operation type of the cloud host, analyzing a check expression corresponding to the current check configuration, and checking each parameter of the current operation type through a checker
Further, the method for calling the corresponding check logic according to the checker code is as follows: and calling corresponding check logic through a java reflection mechanism according to the checker code.
Further, the current operation type of the cloud host comprises deletion, business logic addition, operation addition and requirement change.
Further, when the cloud host performs the deletion operation: firstly, deleting corresponding check configuration checkType then checkGpu in a configuration file according to the operation type; secondly, analyzing the verification expression content of the verification configuration; and finally executing the checksums of the checktypes and executing the checkGpu, and if any one of the two checksums fails by executing the deleting operation, the checkGpu fails.
Further, when the cloud host executes the operation of adding the business logic, a CPU character set is set; the CPU character set is used for operating when the cloud host is started and shut down, and operations except the starting and shutting down need to be checked;
setting a character checker for checking the CPU character set, wherein the character checker is used for checking logic of the CPU character set, and then configuring character check in a configuration file to other operations except for on-off operation.
Further, when the cloud host executes the adding operation, a verifier of the added operation, a verifier of the orchestrated cloud host, and a verifier of the service instance are configured in the configuration file, and then the public verifier is called to transfer the added operation in.
Further, when the cloud host executes the demand changing operation, the orchestration cloud host checker is deleted.
The invention also provides a cloud host operation verification system, which comprises a packaging module, a writing module and a verification module;
the packaging module is used for packaging parameters to be verified in the cloud host into verifiers one by one, and distributing unique codes for each verifier; the calibrator is used for calibrating parameters of the package;
the writing module is used for writing all operations in the cloud host into the configuration file, and configuring a verification expression for each operation; analyzing a user-defined operator in the check expression, and calling corresponding check logic according to the checker code;
the verification module is used for searching corresponding verification configuration in the configuration file according to the current operation type of the cloud host, analyzing a verification expression corresponding to the current verification configuration, and then verifying each parameter of the current operation type through the verifier.
The invention also proposes a device comprising:
a memory for storing a computer program;
and a processor for implementing the method steps when executing the computer program.
The invention also proposes a readable storage medium having stored thereon a computer program which, when executed by a processor, implements the method steps.
The effects provided in the summary of the invention are merely effects of embodiments, not all effects of the invention, and one of the above technical solutions has the following advantages or beneficial effects:
the invention provides a method, a system, equipment and a storage medium for operation verification of a cloud host, wherein the method comprises the steps of packaging parameters to be verified in the cloud host into verifiers one by one, and distributing unique codes for each verifier; the calibrator is used for calibrating parameters of the package; writing all operations in the cloud host into a configuration file, and configuring a verification expression for each operation; analyzing a user-defined operator in the check expression, and calling corresponding check logic according to a checker code; and searching corresponding check configuration in the configuration file according to the current operation type of the cloud host, analyzing a check expression corresponding to the current check configuration, and checking each parameter of the current operation type through a checker. Operations of the cloud host in the present invention include, but are not limited to, deletion, addition of business logic, addition of operations, and demand change. According to the method, the logic of checking the cloud host during various operations of the cloud host is optimized, the checking logic is separated from the business logic of the cloud host operation, each check is designed into one check device, and various check devices are called during the cloud host operation in a configuration file mode and a unified check device. The development process is simplified without writing check logic in each operation. The method has the greatest benefit of maintainability, and when the cloud host is newly added with an operation or a special attribute needs to be checked, the original code is not required to be changed, and the checking function can be realized by only adding a checker and modifying a configuration file. The influence caused by modifying the original codes is reduced, and the robustness of the system is improved.
Based on a cloud host operation verification method, the invention also provides a cloud host operation verification system, equipment and storage medium, which also have the functions of the method and are not described herein.
Drawings
FIG. 1 is a flow chart of operation verification of a cloud host under a cloud platform in the prior art;
FIG. 2 is a flowchart of a method for operation verification of a cloud host according to embodiment 1 of the present invention;
fig. 3 is a schematic diagram of a system for cloud host operation verification according to embodiment 2 of the present invention.
Detailed Description
In order to clearly illustrate the technical features of the present solution, the present invention will be described in detail below with reference to the following detailed description and the accompanying drawings. The following disclosure provides many different embodiments, or examples, for implementing different structures of the invention. In order to simplify the present disclosure, components and arrangements of specific examples are described below. Furthermore, the present invention may repeat reference numerals and/or letters in the various examples. This repetition is for the purpose of simplicity and clarity and does not in itself dictate a relationship between the various embodiments and/or configurations discussed. It should be noted that the components illustrated in the figures are not necessarily drawn to scale. Descriptions of well-known components and processing techniques and processes are omitted so as to not unnecessarily obscure the present invention.
Example 1
The embodiment 1 of the invention provides a method for operation verification of a cloud host, which is characterized in that the operation verification of the cloud host is improved, each operation of the cloud host is configured with an expression of a verifier by designing each verification into a single verifier, and verification logic in the verifier is called by analyzing the expression when each operation is carried out. Decoupling each operation of checksum, adding a new check logic, adding a checker, and configuring the checker into the expression of each operation, so that the new check logic can be put into any operation without changing the original service code.
FIG. 2 is a flowchart of a method for operation verification of a cloud host according to embodiment 1 of the present invention; the concept of the present invention is illustrated in fig. 2 by the operations of starting up, deleting, reconfiguring, suspending, and the same applies to other operations.
Packaging parameters to be verified in the cloud host into verifiers one by one, and distributing unique codes for each verifier; the calibrator is used for calibrating parameters of the package; in the step, the parameters to be checked are packaged into one checker, the granularity is as small as possible, the call is convenient, and each checker is allocated with a unique CODE. Such as: the GPU checker (checkGpu) checks whether the GPU is on the cloud host, if so, throws the error and does not allow operation, and if not, passes. Since granularity is required to be as small as possible, one parameter can be encapsulated into one verifier.
Writing all operations in the cloud host into a configuration file, and configuring a verification expression for each operation; analyzing a user-defined operator in the check expression, and calling corresponding check logic according to the checker code; such as: starting: checkStatus then checkGpu. Some operators are customized here, such as the sequence that the next represents checking, if represents that the next checker will not terminate if it does not pass, call the next checker, etc.
Delete checkType then checkGpu; change configuration checkDisk and checkGpu;
suspension checkType then checkCpu; pause checkType ifcheckGpu
Writing a check expression parser, similar to the interpreter mode in the design mode, parsing the customized operators in the expression, and then calling the corresponding check logic through a java reflection mechanism according to the CODE of the checker.
And searching corresponding check configuration in the configuration file according to the current operation type of the cloud host, analyzing a check expression corresponding to the current check configuration, and checking each parameter of the current operation type through a checker.
When the cloud host performs a delete operation: firstly, deleting corresponding check configuration checkType then checkGpu in a configuration file according to the operation type; secondly, analyzing the verification expression content of the verification configuration; and finally executing the checksums of the checktypes and executing the checkGpu, and if any one of the two checksums fails by executing the deleting operation, the checkGpu fails.
When the cloud host executes the operation of adding the business logic, setting a CPU character set; the CPU character set is used for operating when the cloud host is started and shut down, and the operations except the starting and shutting down need to be checked; setting a character checker for checking the CPU character set, wherein the character checker is used for checking logic of the CPU character set, and then configuring character check in a configuration file to other operations except for on-off operation.
When a service logic is newly added, a special CPU character set is introduced, and a cloud host with the character set can only be started and shut down, and the other character sets are checked. At this time, a checker is added, logic for checking the secondary character set is written in the checker, and then the checker is priced in a configuration file to be configured to other operations except for on-off operation, so that the function is realized without changing the original service code, and the method accords with the on-off principle
When the cloud host executes the adding operation, configuring a verifier of the added operation, a verifier of the arranged cloud host and a verifier of the service instance in the configuration file, and then calling a public verifier to transfer the added operation in.
When a cloud host is newly added with an operation, such as setting a blue screen strategy, the operation can only be performed in a cloud host on-off state, and the cloud host is not arranged, or a service instance cloud host is not arranged, at this time, an operation checking logic is used for configuring a verifier for on-off corresponding to the blue screen strategy, a verifier for arranging the cloud host and a verifier for a service instance in a configuration file, then a public verifier is called, and the blue screen strategy is transmitted. The workload and the repeated code amount are reduced.
When the cloud host executes the demand change operation, the arranging cloud host checker is deleted, if the demand change exists, the arranging cloud host is not limited, all the operations can be executed, if the method is not used, the cloud host is crashed, and the code limiting the arranging cloud host is removed in the code of each operation. By using the method, the configuration file is only needed to be changed, and the cloud host arranging checker is removed without changing codes.
According to the invention, each check logic is packaged into one check device, then all operations of the cloud host are configured into the configuration file, and expressions of the check devices are configured for each operation, and when the cloud host performs certain operation, a unified analyzer is called to analyze the expressions, and the corresponding check device is called.
Example 2
Based on the method for cloud host operation verification provided in embodiment 1 of the present invention, embodiment 2 of the present invention further provides a system for cloud host operation verification, as shown in fig. 3, which is a schematic diagram of a system for cloud host operation verification in embodiment 2 of the present invention, where the system includes a packaging module, a writing module and a verification module;
the packaging module is used for packaging parameters to be verified in the cloud host into verifiers one by one, and distributing unique codes for each verifier; the calibrator is used for calibrating parameters of the package;
the writing module is used for writing all operations in the cloud host into the configuration file, and configuring a verification expression for each operation; analyzing a user-defined operator in the check expression, and calling corresponding check logic according to the checker code;
the verification module is used for searching corresponding verification configuration in the configuration file according to the current operation type of the cloud host, analyzing a verification expression corresponding to the current verification configuration, and then verifying each parameter of the current operation type through the verifier.
The process executed by the verification module comprises the following steps: when the cloud host performs a delete operation: firstly, deleting corresponding check configuration checkType then checkGpu in a configuration file according to the operation type; secondly, analyzing the verification expression content of the verification configuration; and finally executing the checksums of the checktypes and executing the checkGpu, and if any one of the two checksums fails by executing the deleting operation, the checkGpu fails.
When the cloud host executes the operation of adding the business logic, setting a CPU character set; the CPU character set is used for operating when the cloud host is started and shut down, and the operations except the starting and shutting down need to be checked; setting a character checker for checking the CPU character set, wherein the character checker is used for checking logic of the CPU character set, and then configuring character check in a configuration file to other operations except for on-off operation.
When a service logic is newly added, a special CPU character set is introduced, and a cloud host with the character set can only be started and shut down, and the other character sets are checked. At this time, a checker is added, logic for checking the secondary character set is written in the checker, and then the checker is priced in a configuration file to be configured to other operations except for on-off operation, so that the function is realized without changing the original service code, and the method accords with the on-off principle
When the cloud host executes the adding operation, configuring a verifier of the added operation, a verifier of the arranged cloud host and a verifier of the service instance in the configuration file, and then calling a public verifier to transfer the added operation in.
When a cloud host is newly added with an operation, such as setting a blue screen strategy, the operation can only be performed in a cloud host on-off state, and the cloud host is not arranged, or a service instance cloud host is not arranged, at this time, an operation checking logic is used for configuring a verifier for on-off corresponding to the blue screen strategy, a verifier for arranging the cloud host and a verifier for a service instance in a configuration file, then a public verifier is called, and the blue screen strategy is transmitted. The workload and the repeated code amount are reduced.
When the cloud host executes the demand change operation, the arranging cloud host checker is deleted, if the demand change exists, the arranging cloud host is not limited, all the operations can be executed, if the method is not used, the cloud host is crashed, and the code limiting the arranging cloud host is removed in the code of each operation. By using the method, the configuration file is only needed to be changed, and the cloud host arranging checker is removed without changing codes.
Example 3
The invention also proposes a device comprising:
a memory for storing a computer program;
the processor is used for realizing the following steps when executing the computer program:
packaging parameters to be verified in the cloud host into verifiers one by one, and distributing unique codes for each verifier; the calibrator is used for calibrating parameters of the package; in the step, the parameters to be checked are packaged into one checker, the granularity is as small as possible, the call is convenient, and each checker is allocated with a unique CODE. Such as: the GPU checker (checkGpu) checks whether the GPU is on the cloud host, if so, throws the error and does not allow operation, and if not, passes. Since granularity is required to be as small as possible, one parameter can be encapsulated into one verifier.
Writing all operations in the cloud host into a configuration file, and configuring a verification expression for each operation; analyzing a user-defined operator in the check expression, and calling corresponding check logic according to the checker code; such as: starting: checkStatus then checkGpu. Some operators are customized here, such as the sequence that the next represents checking, if represents that the next checker will not terminate if it does not pass, call the next checker, etc.
Delete checkType then checkGpu; change configuration checkDisk and checkGpu;
suspension checkType then checkCpu; pause checkType ifcheckGpu
Writing a check expression parser, similar to the interpreter mode in the design mode, parsing the customized operators in the expression, and then calling the corresponding check logic through a java reflection mechanism according to the CODE of the checker.
And searching corresponding check configuration in the configuration file according to the current operation type of the cloud host, analyzing a check expression corresponding to the current check configuration, and checking each parameter of the current operation type through a checker.
When the cloud host performs a delete operation: firstly, deleting corresponding check configuration checkType then checkGpu in a configuration file according to the operation type; secondly, analyzing the verification expression content of the verification configuration; and finally executing the checksums of the checktypes and executing the checkGpu, and if any one of the two checksums fails by executing the deleting operation, the checkGpu fails.
When the cloud host executes the operation of adding the business logic, setting a CPU character set; the CPU character set is used for operating when the cloud host is started and shut down, and the operations except the starting and shutting down need to be checked; setting a character checker for checking the CPU character set, wherein the character checker is used for checking logic of the CPU character set, and then configuring character check in a configuration file to other operations except for on-off operation.
When a service logic is newly added, a special CPU character set is introduced, and a cloud host with the character set can only be started and shut down, and the other character sets are checked. At this time, a checker is added, logic for checking the secondary character set is written in the checker, and then the checker is priced in a configuration file to be configured to other operations except for on-off operation, so that the function is realized without changing the original service code, and the method accords with the on-off principle
When the cloud host executes the adding operation, configuring a verifier of the added operation, a verifier of the arranged cloud host and a verifier of the service instance in the configuration file, and then calling a public verifier to transfer the added operation in.
When a cloud host is newly added with an operation, such as setting a blue screen strategy, the operation can only be performed in a cloud host on-off state, and the cloud host is not arranged, or a service instance cloud host is not arranged, at this time, an operation checking logic is used for configuring a verifier for on-off corresponding to the blue screen strategy, a verifier for arranging the cloud host and a verifier for a service instance in a configuration file, then a public verifier is called, and the blue screen strategy is transmitted. The workload and the repeated code amount are reduced.
When the cloud host executes the demand change operation, the arranging cloud host checker is deleted, if the demand change exists, the arranging cloud host is not limited, all the operations can be executed, if the method is not used, the cloud host is crashed, and the code limiting the arranging cloud host is removed in the code of each operation. By using the method, the configuration file is only needed to be changed, and the cloud host arranging checker is removed without changing codes.
It is necessary to explain that: the technical scheme of the invention also provides electronic equipment, which comprises: a communication interface capable of information interaction with other devices such as a network device and the like; and the processor is connected with the communication interface to realize information interaction with other equipment, and is used for executing the cloud host operation verification method provided by one or more of the technical schemes when running the computer program, and the computer program is stored in the memory. Of course, in practice, the various components in the electronic device are coupled together by a bus system. It will be appreciated that a bus system is used to enable connected communications between these components. The bus system includes a power bus, a control bus, and a status signal bus in addition to the data bus. The memory in the embodiments of the present application is used to store various types of data to support the operation of the electronic device. Examples of such data include: any computer program for operating on an electronic device. It will be appreciated that the memory can be either volatile memory or nonvolatile memory, and can include both volatile and nonvolatile memory. Wherein the nonvolatile Memory may be Read Only Memory (ROM), programmable Read Only Memory (PROM, programmable Read-Only Memory), erasable programmable Read Only Memory (EPROM, erasable Programmable Read-Only Memory), electrically erasable programmable Read Only Memory (EEPROM, electrically Erasable Programmable Read-Only Memory), magnetic random access Memory (FRAM, ferromagnetic random access Memory), flash Memory (Flash Memory), magnetic surface Memory, optical disk, or compact disk Read Only Memory (CD-ROM, compact Disc Read-Only Memory); the magnetic surface memory may be a disk memory or a tape memory. The volatile memory may be random access memory (RAM, random AccessMemory), which acts as external cache memory. By way of example, and not limitation, many forms of RAM are available, such as static random access memory (SRAM, static Random Access Memory), synchronous static random access memory (SSRAM, synchronous Static Random Access Memory), dynamic random access memory (DRAM, dynamic Random Access Memory), synchronous dynamic random access memory (SDRAM, synchronousDynamic Random Access Memory), double data rate synchronous dynamic random access memory (ddr sdram, double Data Rate Synchronous Dynamic Random Access Memory), enhanced synchronous dynamic random access memory (ESDRAM, enhanced Synchronous Dynamic Random Access Memory), synchronous link dynamic random access memory (SLDRAM, syncLink Dynamic Random Access Memory), direct memory bus random access memory (DRRAM, direct Rambus Random Access Memory). The memory described in the embodiments of the present application is intended to comprise, without being limited to, these and any other suitable types of memory. The method disclosed in the embodiments of the present application may be applied to a processor or implemented by a processor. The processor may be an integrated circuit chip having signal processing capabilities. In implementation, the steps of the above method may be performed by integrated logic circuits of hardware in a processor or by instructions in the form of software. The processor may be a general purpose processor, a DSP (Digital Signal Processing, meaning a chip capable of implementing digital signal processing techniques), or other programmable logic device, discrete gate or transistor logic device, discrete hardware components, or the like. The processor may implement or perform the methods, steps, and logic blocks disclosed in embodiments of the present application. The general purpose processor may be a microprocessor or any conventional processor or the like. The steps of the method disclosed in the embodiments of the present application may be directly embodied in a hardware decoding processor or implemented by a combination of hardware and software modules in the decoding processor. The software modules may be located in a storage medium having a memory, and the processor reads the program in the memory and performs the steps of the method in combination with its hardware. The processor executes the program to implement the corresponding flow in each method of the embodiments of the present application, and for brevity, will not be described in detail herein.
Example 4
The invention also provides a readable storage medium, the readable storage medium stores a computer program, and the computer program when executed by a processor realizes the following steps:
packaging parameters to be verified in the cloud host into verifiers one by one, and distributing unique codes for each verifier; the calibrator is used for calibrating parameters of the package; in the step, the parameters to be checked are packaged into one checker, the granularity is as small as possible, the call is convenient, and each checker is allocated with a unique CODE. Such as: the GPU checker (checkGpu) checks whether the GPU is on the cloud host, if so, throws the error and does not allow operation, and if not, passes. Since granularity is required to be as small as possible, one parameter can be encapsulated into one verifier.
Writing all operations in the cloud host into a configuration file, and configuring a verification expression for each operation; analyzing a user-defined operator in the check expression, and calling corresponding check logic according to the checker code; such as: starting: checkStatus then checkGpu. Some operators are customized here, such as the sequence that the next represents checking, if represents that the next checker will not terminate if it does not pass, call the next checker, etc.
Delete checkType then checkGpu; change configuration checkDisk and checkGpu;
suspension checkType then checkCpu; pause checkType ifcheckGpu
Writing a check expression parser, similar to the interpreter mode in the design mode, parsing the customized operators in the expression, and then calling the corresponding check logic through a java reflection mechanism according to the CODE of the checker.
And searching corresponding check configuration in the configuration file according to the current operation type of the cloud host, analyzing a check expression corresponding to the current check configuration, and checking each parameter of the current operation type through a checker.
When the cloud host performs a delete operation: firstly, deleting corresponding check configuration checkType then checkGpu in a configuration file according to the operation type; secondly, analyzing the verification expression content of the verification configuration; and finally executing the checksums of the checktypes and executing the checkGpu, and if any one of the two checksums fails by executing the deleting operation, the checkGpu fails.
When the cloud host executes the operation of adding the business logic, setting a CPU character set; the CPU character set is used for operating when the cloud host is started and shut down, and the operations except the starting and shutting down need to be checked; setting a character checker for checking the CPU character set, wherein the character checker is used for checking logic of the CPU character set, and then configuring character check in a configuration file to other operations except for on-off operation.
When a service logic is newly added, a special CPU character set is introduced, and a cloud host with the character set can only be started and shut down, and the other character sets are checked. At this time, a checker is added, logic for checking the secondary character set is written in the checker, and then the checker is priced in a configuration file to be configured to other operations except for on-off operation, so that the function is realized without changing the original service code, and the method accords with the on-off principle
When the cloud host executes the adding operation, configuring a verifier of the added operation, a verifier of the arranged cloud host and a verifier of the service instance in the configuration file, and then calling a public verifier to transfer the added operation in.
When a cloud host is newly added with an operation, such as setting a blue screen strategy, the operation can only be performed in a cloud host on-off state, and the cloud host is not arranged, or a service instance cloud host is not arranged, at this time, an operation checking logic is used for configuring a verifier for on-off corresponding to the blue screen strategy, a verifier for arranging the cloud host and a verifier for a service instance in a configuration file, then a public verifier is called, and the blue screen strategy is transmitted. The workload and the repeated code amount are reduced.
When the cloud host executes the demand change operation, the arranging cloud host checker is deleted, if the demand change exists, the arranging cloud host is not limited, all the operations can be executed, if the method is not used, the cloud host is crashed, and the code limiting the arranging cloud host is removed in the code of each operation. By using the method, the configuration file is only needed to be changed, and the cloud host arranging checker is removed without changing codes.
The description of the relevant parts in the cloud host operation verification device and the storage medium provided in the embodiments of the present application may refer to the detailed description of the corresponding parts in the cloud host operation verification method provided in embodiment 1 of the present application, which is not repeated herein.
It is noted that relational terms such as first and second, and the like are used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Moreover, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements is inherent to. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element. In addition, the parts of the above technical solutions provided in the embodiments of the present application, which are consistent with the implementation principles of the corresponding technical solutions in the prior art, are not described in detail, so that redundant descriptions are avoided.
While the specific embodiments of the present invention have been described above with reference to the drawings, the scope of the present invention is not limited thereto. Other modifications and variations to the present invention will be apparent to those of skill in the art upon review of the foregoing description. It is not necessary here nor is it exhaustive of all embodiments. On the basis of the technical scheme of the invention, various modifications or variations which can be made by the person skilled in the art without the need of creative efforts are still within the protection scope of the invention.
Claims (10)
1. The cloud host operation verification method is characterized by comprising the following steps of:
packaging parameters to be verified in the cloud host into verifiers one by one, and distributing unique codes for each verifier; the calibrator is used for calibrating parameters of the package;
writing all operations in the cloud host into a configuration file, and configuring a verification expression for each operation; analyzing a user-defined operator in the check expression, and calling corresponding check logic according to the checker code;
and searching corresponding check configuration in the configuration file according to the current operation type of the cloud host, analyzing a check expression corresponding to the current check configuration, and checking each parameter of the current operation type through a checker.
2. The method for cloud host operation verification according to claim 1, wherein the method for calling the corresponding verification logic according to the verifier code is as follows: and calling corresponding check logic through a java reflection mechanism according to the checker code.
3. The method of claim 1, wherein the current operation type of the cloud host includes deletion, addition of business logic, addition of operations, and change of requirements.
4. A method for operation verification of a cloud host according to claim 3, wherein, when the cloud host performs the delete operation: firstly, deleting corresponding check configuration checkType then checkGpu in a configuration file according to the operation type; secondly, analyzing the verification expression content of the verification configuration; and finally executing the checksums of the checktypes and executing the checkGpu, and if any one of the two checksums fails by executing the deleting operation, the checkGpu fails.
5. A method for operation verification of a cloud host according to claim 3, wherein the CPU character set is set when the cloud host performs the operation of adding business logic; the CPU character set is used for operating when the cloud host is started and shut down, and operations except the starting and shutting down need to be checked;
setting a character checker for checking the CPU character set, wherein the character checker is used for checking logic of the CPU character set, and then configuring character check in a configuration file to other operations except for on-off operation.
6. A method for checking operation of a cloud host according to claim 3, wherein when the cloud host executes the increment operation, a checker for the orchestration cloud host, and a checker for the service instance are configured in the configuration file, and then a common checker is called to transfer the increment operation.
7. A method of cloud host operation verification according to claim 3, wherein the orchestration cloud host verifier is deleted when the cloud host performs a demand change operation.
8. The cloud host operation verification system is characterized by comprising a packaging module, a writing module and a verification module;
the packaging module is used for packaging parameters to be verified in the cloud host into verifiers one by one, and distributing unique codes for each verifier; the calibrator is used for calibrating parameters of the package;
the writing module is used for writing all operations in the cloud host into the configuration file, and configuring a verification expression for each operation; analyzing a user-defined operator in the check expression, and calling corresponding check logic according to the checker code;
the verification module is used for searching corresponding verification configuration in the configuration file according to the current operation type of the cloud host, analyzing a verification expression corresponding to the current verification configuration, and then verifying each parameter of the current operation type through the verifier.
9. An apparatus, comprising:
a memory for storing a computer program;
a processor for implementing the steps of the method according to any one of claims 1 to 7 when said computer program is executed.
10. A readable storage medium, characterized in that it has stored thereon a computer program which, when executed by a processor, implements the steps of the method according to any of claims 1 to 7.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110912842.4A CN113778535B (en) | 2021-08-10 | 2021-08-10 | Cloud host operation verification method, system, equipment and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110912842.4A CN113778535B (en) | 2021-08-10 | 2021-08-10 | Cloud host operation verification method, system, equipment and storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN113778535A CN113778535A (en) | 2021-12-10 |
CN113778535B true CN113778535B (en) | 2024-02-23 |
Family
ID=78837200
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110912842.4A Active CN113778535B (en) | 2021-08-10 | 2021-08-10 | Cloud host operation verification method, system, equipment and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113778535B (en) |
Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106612204A (en) * | 2015-10-27 | 2017-05-03 | 阿里巴巴集团控股有限公司 | Service verification method and apparatus |
CN109062870A (en) * | 2018-06-29 | 2018-12-21 | 平安科技(深圳)有限公司 | The method and storage medium that server, business datum verify |
CN109284198A (en) * | 2017-07-21 | 2019-01-29 | 北京京东尚科信息技术有限公司 | A kind of method and apparatus verifying data |
CN110309125A (en) * | 2019-06-24 | 2019-10-08 | 招商局金融科技有限公司 | Data verification method, electronic device and storage medium |
CN110502363A (en) * | 2019-08-05 | 2019-11-26 | 苏州浪潮智能科技有限公司 | A kind of method of calibration of business rule, equipment and readable medium |
CN111563075A (en) * | 2020-05-06 | 2020-08-21 | 政采云有限公司 | Service checking system, method and equipment and storage medium |
WO2021008122A1 (en) * | 2019-07-15 | 2021-01-21 | 创新先进技术有限公司 | Virtual resource allocation method and device employing blockchain, and electronic apparatus |
CN112272218A (en) * | 2020-10-16 | 2021-01-26 | 苏州浪潮智能科技有限公司 | Cloud platform instance resource operation method and device, computer equipment and storage medium |
CN112543109A (en) * | 2019-09-20 | 2021-03-23 | 上海数荃数据科技有限公司 | Cloud host creation method, system, server and storage medium |
WO2021072861A1 (en) * | 2019-10-17 | 2021-04-22 | 平安科技(深圳)有限公司 | Application service processing method and apparatus, and terminal and storage medium |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9553887B2 (en) * | 2014-10-13 | 2017-01-24 | Vmware, Inc. | Virtual machine compliance checking in cloud environments |
US10171315B2 (en) * | 2016-06-29 | 2019-01-01 | International Business Machines Corporation | Orchestration process template for generation of orchestration process to tolerate errors |
US20210149763A1 (en) * | 2019-11-15 | 2021-05-20 | Intel Corporation | Systems and methods for error detection and control for embedded memory and compute elements |
-
2021
- 2021-08-10 CN CN202110912842.4A patent/CN113778535B/en active Active
Patent Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106612204A (en) * | 2015-10-27 | 2017-05-03 | 阿里巴巴集团控股有限公司 | Service verification method and apparatus |
CN109284198A (en) * | 2017-07-21 | 2019-01-29 | 北京京东尚科信息技术有限公司 | A kind of method and apparatus verifying data |
CN109062870A (en) * | 2018-06-29 | 2018-12-21 | 平安科技(深圳)有限公司 | The method and storage medium that server, business datum verify |
CN110309125A (en) * | 2019-06-24 | 2019-10-08 | 招商局金融科技有限公司 | Data verification method, electronic device and storage medium |
WO2021008122A1 (en) * | 2019-07-15 | 2021-01-21 | 创新先进技术有限公司 | Virtual resource allocation method and device employing blockchain, and electronic apparatus |
CN110502363A (en) * | 2019-08-05 | 2019-11-26 | 苏州浪潮智能科技有限公司 | A kind of method of calibration of business rule, equipment and readable medium |
CN112543109A (en) * | 2019-09-20 | 2021-03-23 | 上海数荃数据科技有限公司 | Cloud host creation method, system, server and storage medium |
WO2021072861A1 (en) * | 2019-10-17 | 2021-04-22 | 平安科技(深圳)有限公司 | Application service processing method and apparatus, and terminal and storage medium |
CN111563075A (en) * | 2020-05-06 | 2020-08-21 | 政采云有限公司 | Service checking system, method and equipment and storage medium |
CN112272218A (en) * | 2020-10-16 | 2021-01-26 | 苏州浪潮智能科技有限公司 | Cloud platform instance resource operation method and device, computer equipment and storage medium |
Non-Patent Citations (3)
Title |
---|
LDVAS: Lattice-Based Designated Verifier Auditing Scheme for Electronic Medical Data in Cloud-Assisted WBANs;Xiaojun Zhang ET AL;《IEEE ACCESS》;第第8卷卷;全文 * |
基于FPGA的安全启动与配置文件安全存储方案;范晋文;周云松;黄维雄;;电子与封装(08);全文 * |
王伟等.基于物联网技术的医用气体供应监视系统.2016,第第6卷卷(第第7期期),全文. * |
Also Published As
Publication number | Publication date |
---|---|
CN113778535A (en) | 2021-12-10 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8621419B2 (en) | Automating the life cycle of a distributed computing application | |
US7774435B2 (en) | System and method for batch tuning intelligent devices | |
US6269442B1 (en) | Apparatus and method for on-line replacement of a running program code and data using checkpoints | |
CN108509215B (en) | System software replacing method and device, terminal equipment and storage medium | |
CN111414391A (en) | Method and system for accessing multiple data sources | |
CN112667246B (en) | Application function expansion method and device and electronic equipment | |
CN112948024B (en) | Loading method and device of dynamic link library, storage medium and electronic equipment | |
US20190340057A1 (en) | Methods and systems to compound alerts in a distributed computing system | |
CN111651219A (en) | Method and equipment for managing multi-module project configuration file | |
CN108614702A (en) | Bytecode-optimized method and device | |
CN114371914A (en) | Container IP address configuration method and device, storage medium and electronic equipment | |
CN110580174A (en) | application component generation method, server and terminal | |
CN112925583B (en) | Host application capability extension method, device, equipment and storage medium | |
CN112764836A (en) | Method and device for running fast application and electronic equipment | |
CN113778535B (en) | Cloud host operation verification method, system, equipment and storage medium | |
CN116107623A (en) | Software development method and device and electronic equipment | |
CN116450165A (en) | Method, system, terminal and storage medium for quickly building environment and deploying program | |
CN114979303B (en) | Method, device, equipment and readable medium for processing service quality of network data packet | |
CN110806891A (en) | Method and device for generating software version of embedded equipment | |
CN113312003B (en) | Go language-based physical bare computer disk storage management method | |
CN115237631A (en) | Easily-extensible data sharing system and method based on data sharing plug-in | |
CN114489674A (en) | Data verification method and device of dynamic data model | |
CN114064218A (en) | Mirror image generation method, system, medium and application for machine learning component | |
CN114328210A (en) | Test method, test device and computer readable storage medium | |
CN115113972A (en) | Application transformation method, system, cluster, medium and program product |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |