CN114338687A - Middleware management method and server - Google Patents

Middleware management method and server Download PDF

Info

Publication number
CN114338687A
CN114338687A CN202111588659.XA CN202111588659A CN114338687A CN 114338687 A CN114338687 A CN 114338687A CN 202111588659 A CN202111588659 A CN 202111588659A CN 114338687 A CN114338687 A CN 114338687A
Authority
CN
China
Prior art keywords
target load
access
alarm
information
monitoring
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111588659.XA
Other languages
Chinese (zh)
Inventor
徐云涛
周玺
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Agricultural Bank of China
Original Assignee
Agricultural Bank of China
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Agricultural Bank of China filed Critical Agricultural Bank of China
Priority to CN202111588659.XA priority Critical patent/CN114338687A/en
Publication of CN114338687A publication Critical patent/CN114338687A/en
Pending legal-status Critical Current

Links

Images

Abstract

According to the middleware management method and the server, the deployment control server configures the container corresponding to the application mirror image and the container corresponding to the monitoring mirror image for the target load when the target load is created, collects the traffic information of the target load, uses the information for processing the access alarm of the target load, and adds access configuration, APM traffic monitoring and operation monitoring for the target load so as to generate the target load. And the deployment control server controls APM flow monitoring and operation monitoring to respectively monitor the access state and the operation state of the target load. When the target load generates operation alarm, the operation and maintenance server generates an alarm processing command according to the operation alarm information and sends the command to the deployment control server, and the deployment control server processes the alarm according to the command. The monitoring mode can realize safe and reliable monitoring without adding an additional monitoring module on the load function code, and the performance of the target load cannot be influenced.

Description

Middleware management method and server
Technical Field
The present application relates to computer software technologies, and in particular, to a middleware management method and a server.
Background
Computer software refers to programs and documents in a computer system, the programs are descriptions of processing objects and processing rules of computing tasks, and the documents are descriptive of illustrative data required for understanding the programs, and users can communicate with the computer through the software. An application is composed of a number of functional modules, which may be referred to as middleware or workload of the application software.
Currently, when an application program is developed, each function module is generally deployed in a respective container, and each function module is isolated, so that one module interrupt is prevented from possibly affecting other modules or the whole application program. When the middleware is deployed, an administrator manually configures necessary parameters and submits a deployment request, and needs to deploy a basic environment in advance, for example, install and open a configuration tool SaltStack for managing the cluster, and the like. When the application program is put into use, each function module of the application program needs to be monitored, in the prior art, a probe is implanted into each function script of the application program, and when a user accesses a webpage, the probe automatically acquires data and transmits the data back to the database for analysis.
In the above monitoring method, the probe is implanted into the code, which may cause intrusion, security and privacy concerns, and the probe is a part of the code, which may cause a certain performance loss during operation.
Disclosure of Invention
The application provides a middleware management method and a server, which are used for solving the problems of potential safety hazards and application program performance loss caused by implanting a probe into a functional module code of an application program.
In a first aspect, the present application provides a middleware management method applied to a deployment control server, including:
configuring basic parameters for a target load of an application program, wherein the application program comprises a plurality of loads, and each load corresponds to one functional module of the application program;
configuring container information for the target load, wherein the container information includes a basic mirror image, a name of a container corresponding to the basic mirror image, and quota information corresponding to the container, the basic mirror image includes an application mirror image and a monitoring mirror image, the container corresponding to the basic mirror image includes a container corresponding to the application mirror image and a container corresponding to the monitoring mirror image, the quota information includes information of processing resources and storage resources configured for the container, the container corresponding to the application mirror image is used for storing the target load, and the container corresponding to the monitoring mirror image is used for collecting traffic information of the target load in the container corresponding to the application mirror image;
adding an access configuration for the target load, wherein the access configuration comprises a name of the target load, an access mode and an access port;
configuring Application Performance Management (APM) flow monitoring and operation monitoring for the target load;
and controlling the APM flow monitoring to monitor the access state of the target load, and controlling the operation monitoring to monitor the operation state of the target load.
Optionally, the controlling the operation monitoring to monitor the operation state of the target load includes:
when the target load is detected to be abnormal in operation, sending operation alarm information to an operation and maintenance server;
receiving an operation alarm processing command sent by the operation and maintenance server, wherein the operation alarm processing command comprises a preset processing mode corresponding to a processable alarm;
and automatically processing the operation alarm according to the operation alarm processing command.
Optionally, the controlling the APM traffic monitoring to monitor the access state of the target load includes:
sending access warning information of the target load to the operation and maintenance server, wherein the access warning information is generated when the target load is abnormally accessed, and the access warning information comprises the name, the access time and the access number of the target load;
and receiving access alarm processing feedback sent by the operation and maintenance server, wherein the access alarm processing feedback comprises a target load normal message or an alarm processing instruction, the alarm processing instruction is used for instructing a user to access the target load again, and the alarm processing instruction is used for instructing the deployment control server to process the target load.
Optionally, the deployment control server further configures log path collection for the target load, and the method further includes:
directionally collecting a container corresponding to the application mirror image to obtain flow information of the target load, wherein the flow information comprises the access times of the target load in unit time and whether the access is successful;
and sending the flow information to an APM server, wherein the flow information is stored in the APM server and is used for processing an access alarm by an operation and maintenance server.
In a second aspect, the present application provides a middleware management method applied to an operation and maintenance server, including:
receiving operation alarm information of a target load sent by a deployment control server, and matching the operation alarm information with preset processable alarm information;
when the matching is successful, generating an operation alarm processing command, wherein the operation alarm processing command comprises a preset processing mode corresponding to the processable alarm;
and sending the operation alarm processing command to the deployment control server.
Optionally, when the matching is unsuccessful, an alarm processing reminder is sent to the terminal device, where the alarm processing reminder is used for the operation and maintenance staff to intervene in the alarm processing of the target load operation.
Optionally, the method further includes:
receiving access warning information of the target load, which is sent by the deployment control server, wherein the access warning information comprises the name, the access time and the access number of the target load;
inquiring whether the corresponding request content in the traffic information of the target load is normal or not from an APM server according to the access warning information;
when the request content is normal, generating the target load normal message, wherein the normal message is used for indicating the user to re-access the target load;
when the request content is abnormal, generating an alarm processing instruction, wherein the alarm processing instruction is used for instructing the deployment control server to process the target load;
and sending access alarm processing feedback to the deployment control server, wherein the access alarm processing feedback comprises the target load normal message or the alarm processing instruction.
In a third aspect, the present application provides a deployment control server, comprising:
the system comprises a first configuration module, a second configuration module and a third configuration module, wherein the first configuration module is used for configuring basic parameters for a target load of an application program, the application program comprises a plurality of loads, and each load corresponds to a functional module of the application program;
a second configuration module, configured to configure container information for the target load, where the container information includes a base mirror, a name of a container corresponding to the base mirror, and quota information corresponding to the container, where the base mirror includes an application mirror and a monitoring mirror, the container corresponding to the base mirror includes a container corresponding to the application mirror and a container corresponding to the monitoring mirror, the quota information includes information on processing resources and storage resources configured for the container, the container corresponding to the application mirror is used to store the target load, and the container corresponding to the monitoring mirror is used to collect traffic information of the target load in the container corresponding to the application mirror;
the adding module is used for adding access configuration for the target load, and the access configuration comprises a target load name, an access mode and an access port;
a third configuration module, configured to configure Application Performance Management (APM) traffic monitoring and operation monitoring for the target load;
and the control module is used for controlling the APM flow monitoring to monitor the access state of the target load and controlling the operation monitoring to monitor the operation state of the target load.
In a fourth aspect, the present application provides an operation and maintenance server, including:
the system comprises a receiving module, a processing module and a processing module, wherein the receiving module is used for receiving operation alarm information of a target load sent by a deployment control server and matching the operation alarm information with preset processable alarm information;
the generating module is used for generating an operation alarm processing command when the matching is successful, wherein the operation alarm processing command comprises a preset processing mode corresponding to a processable alarm;
and the sending module is used for sending the operation alarm processing command to the deployment control server.
In a fifth aspect, the present application provides a deployment control server, comprising: a processor, and a memory communicatively coupled to the processor;
the memory stores computer-executable instructions;
the processor executes computer-executable instructions stored by the memory to implement the method of the first aspect.
In a sixth aspect, the present application provides an operation and maintenance server, including: a processor, and a memory communicatively coupled to the processor;
the memory stores computer-executable instructions;
the processor executes computer-executable instructions stored by the memory to implement the method of the second aspect.
In a seventh aspect, the present application provides a computer-readable storage medium having stored thereon computer-executable instructions that, when executed by a processor, implement the method of any one of the first or second aspects.
In an eighth aspect, the present application provides a computer program product comprising a computer program that, when executed by a processor, performs the method of any one of the first or second aspects.
According to the middleware management method and the server, the deployment control server configures the container corresponding to the application mirror image and the container corresponding to the monitoring mirror image for the target load when the target load is created, the container corresponding to the monitoring mirror image collects flow information of the target load in the container corresponding to the application mirror image, the flow information is used for processing access alarm of the target load, and access configuration, APM flow monitoring and operation monitoring are added to the target load, so that the target load is generated. After the target load is generated, the deployment control server controls APM flow monitoring and operation monitoring to monitor the access state and the operation state of the target load respectively. When the target load generates an operation alarm, the operation and maintenance server may generate an alarm processing command according to the received operation alarm information sent by the deployment control server, and send the command to the deployment control server, and the deployment control server may process the alarm according to the alarm processing command. The monitoring mode can realize safe and reliable monitoring without adding an additional monitoring module on the load function code, and the performance of the target load cannot be influenced.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the present application and together with the description, serve to explain the principles of the application.
Fig. 1 is a schematic diagram of an application scenario in which the present application is applicable;
fig. 2 is a schematic flowchart of a middleware management method according to an embodiment of the present application;
fig. 3 is a schematic flowchart of a middleware management method according to a second embodiment of the present application;
fig. 4 is a signaling flowchart of a middleware management method according to a third embodiment of the present application;
fig. 5 is a schematic structural diagram of a deployment control server according to a fourth embodiment of the present application;
fig. 6 is a schematic structural diagram of an operation and maintenance server according to a fifth embodiment of the present application;
fig. 7 is a schematic structural diagram of a deployment control server according to a sixth embodiment of the present application;
fig. 8 is a schematic structural diagram of an operation and maintenance server according to a seventh embodiment of the present application.
With the above figures, there are shown specific embodiments of the present application, which will be described in more detail below. These drawings and written description are not intended to limit the scope of the inventive concepts in any manner, but rather to illustrate the inventive concepts to those skilled in the art by reference to specific embodiments.
Detailed Description
Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The embodiments described in the following exemplary embodiments do not represent all embodiments consistent with the present application. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the present application, as detailed in the appended claims.
Currently, when an application program is developed, each function module is generally deployed in a respective container, and each function module is isolated, so that one module interrupt is prevented from possibly affecting other modules or the whole application program. When the middleware is deployed, an administrator manually configures necessary parameters and submits a deployment request, and needs to deploy a basic environment in advance, for example, install and open a configuration tool SaltStack for managing the cluster, and the like. When the application program is put into use, each function module of the application program needs to be monitored, in the prior art, a probe is implanted into each function script of the application program, and when a user accesses a webpage, the probe automatically acquires data and transmits the data back to the database for analysis. In the above monitoring method, the probe is implanted into the code, which may cause intrusion, security and privacy concerns, and the probe is a part of the code, which may cause a certain performance loss during operation.
Therefore, according to the middleware management method and the middleware management server provided by the application, the deployment control server configures the container corresponding to the application mirror image and the container corresponding to the monitoring mirror image for the target load when the target load is created, the container corresponding to the monitoring mirror image collects traffic information of the container target load corresponding to the application mirror image, and the traffic information is used for processing an access alarm of the target load. And APM flow monitoring and operation monitoring are configured for the target load, so that the access state and the operation state of the target load are monitored. According to the monitoring mode, safe and reliable monitoring can be realized without adding an additional monitoring module on the load function code, the performance of the target load cannot be influenced, and the operation and maintenance efficiency can be improved.
Fig. 1 is a schematic diagram of an application scenario to which the present application is applied. As shown in fig. 1, the deployment control server 101 is a server for controlling a deployment application, the processor type of the deployment control server 101 may be ARM (Advanced RISC Machine), and the operating system may be Kylin V10. The deployment control server 101 includes a Cloud Container Engine (CCE) platform, and the CCE platform may configure a Container of the load of the application according to a base image generated by a Container engine (e.g., an application Container engine Docker) to complete load creation of the application.
The deployment control server 101 may deploy multiple applications for multiple servers, only three of which are shown in the figure, and the operation and maintenance server 102 may monitor the applications of the multiple servers. The deployment control server 101 and the operation and maintenance server 102 may interact through a transmission channel, for example, the transmission channel may be an interface provided by a kafka or CCE platform, the deployment control server 101 may send operation alarm information of a target load detected by the CCE platform to the operation and maintenance server 102 through the transmission channel, an operation and maintenance platform in the operation and maintenance server 102 issues an alarm processing command to the deployment control server 101 according to the operation alarm information, and the deployment control server 101 processes an alarm.
It is understood that the deployment control server 101 and the operation and maintenance server 102 may be multiple in number, and are not shown in the figure, and respectively control and monitor multiple servers which can be managed by the deployment control server 101 and the operation and maintenance server 102.
The following describes the technical solutions of the present application and how to solve the above technical problems with specific embodiments. The following embodiments may exist independently or in combination, and the same or similar concepts or processes may not be described in detail in some embodiments. Embodiments of the present application will be described below with reference to the accompanying drawings.
Referring to fig. 2, fig. 2 is a flowchart illustrating a middleware management method according to an embodiment of the present application, where the method may be executed by a deployment control server, and the method includes the following steps.
S201, basic parameters are configured for the target load of the application program.
The application program comprises a plurality of loads, each load corresponds to one functional module of the application program, and the CCE platform of the deployment control server configures basic parameters for the target load of the application program, wherein the basic parameters comprise a target load name, a cluster of target load work, the application program to which the target load belongs and the number of instances. The number of instances is the number of instances created for the target load, one or more instances may be created for the target load, when multiple instances are created for the target load, the multiple instances are the same, and the creating of the multiple instances is used for enabling other instances to continue to provide corresponding services for the user when one of the instances fails. An instance may be a carrier of multiple containers, which are packaged into one instance to facilitate management of a target load.
In the application, one example includes a container corresponding to an application image and a container corresponding to a monitoring image, and the two containers share a virtual network card provided by a CCE platform to implement network communication. The target load is a function module of the target application, for example, when the function module of the target application is a login module, the name of the target load may be named login.
Optionally, the deployment control server displays a load configuration interface, where the interface includes an input box of a target load name, an option of a cluster where the target load works, an option of an application to which the target load belongs, and an input box of an instance number, and the deployment control server may receive basic parameters input by a user on the load configuration interface and then configure the basic parameters for the target load. It should be noted that, when there is no corresponding target application program in the application program options to which the target load belongs, the user may go to the target application program creation interface to create the target application program, and the CCE platform in the present application may also be another platform having similar functions, which is not limited in the present application.
S202, configuring container information for the target load.
After the deployment control server configures the basic parameters for the created target load, container information may be configured for the target load, specifically, the deployment control server configures container information for an instance of the target load to complete creation of the container, where the container information includes the base image, a name of the container, and quota information corresponding to the container. The base mirror image comprises an application mirror image and a monitoring mirror image, the mirror image can be understood as a file, the container corresponding to the base mirror image comprises a container corresponding to the application mirror image and a container corresponding to the monitoring mirror image, such as an application container and a flow analysis container, the container corresponding to the application mirror image is used for storing a target load, and the container corresponding to the monitoring mirror image is used for collecting flow information of the target load in the container corresponding to the application mirror image. The quota information includes information of processing resources and storage resources configured for the container, the information of the processing resources is, for example, the number of CPUs applying for, the number of cores of the CPUs, and the like, and the information of the storage resources may include the number of memories, the size of the memories, and the like.
Optionally, the deployment control server may display a container configuration interface, where the container configuration interface includes options of a basic mirror image, an input box of a name of a container, and a quota option corresponding to the container, where the options of the basic mirror image include an application mirror image and a monitoring mirror image, and may name the container corresponding to the application mirror image and the monitoring mirror image, and the quota option corresponding to the container includes processing resource and storage resource options configured for the container, for example, information of a CPU and a memory. The deployment control server may receive container information entered by a user at the container configuration interface and then configure the corresponding container information for the instance of the target load.
Specifically, the deployment control server obtains an image of an operating system installed by the deployment control server, copies the image into a necessary middleware image before deploying the application program, where the middleware image may be an eastern communis tongweb, and then modifies a Docker configuration file in the tongweb image according to a current requirement, where the requirement may be a requirement on security such as an access right and an execution right of a target load.
Optionally, after configuring the container information for the target load, the configuration file obtained after configuring the container information may also be mounted, that is, the configuration file is stored for direct use when the load is created again, specifically, the configuration file directly replaces the initial configuration file when the load is created again, that is, the information does not need to be re-modified according to the current requirement, for example, the requirement in the security aspect.
And S203, adding access configuration for the target load.
After the deployment control server configures the container information for the instance, an access configuration including a target load name, an access mode, a port configuration, and the like may be added to the target load.
The access modes can be divided into an internal mutual access mode and an Internet access mode, the internal mutual access mode comprises a cluster virtual IP (Internet Protocol) mode and a node private IP mode, and the cluster virtual IP mode is used for mutual access between loads, for example, when a certain back-end load needs to be mutually accessed with a front-end load, the type needs to be selected to realize the internal mutual access. For node private IP, an internal inter-access method, the load is accessible to the foreign network. The access mode of the internet comprises an elastic IP mode and a load balancing mode, the elastic IP mode can be accessed by a public network, and the load balancing mode expands the external service capability of the load by automatically distributing access flow to a plurality of nodes (all hosts in a cluster) and realizes higher-level fault tolerance of a load program. The access mode of the load determines the network properties of the load, and loads of different access modes can provide different network capabilities.
The port configuration is divided into a container port and an access port, the container port is a port for starting monitoring by loads in the container, and the access port needs to be filled according to different access modes.
And S204, configuring APM flow monitoring and operation monitoring for the target load.
After the deployment control server configures the container information for the instance of the target load, it may also configure apm (application Performance management) traffic monitoring and operation monitoring for the target load, thereby completing target load generation. The APM flow monitoring is used for monitoring the access state of a target load, the operation monitoring comprises a load operation monitoring mode and port information corresponding to the operation monitoring mode, and the port corresponding to the operation monitoring mode is used for sending operation warning information of the target load to the operation and maintenance server. The deployment control server can also configure a log collection path for the target load, wherein the log collection path is a path for storing a running log of the target load.
For example, when configuring the APM traffic monitoring, an APM tool may be selected to monitor an access state of a target load, for example, distributed tracing tools zipkin and skywalk, or a distributed link tracing tool cat, and then a corresponding monitoring port is configured according to the selected tool, and the running monitoring may use a monitoring function prometheus provided by the CCE platform and set a corresponding port number thereof.
After the deployment control server configures APM flow monitoring and operation monitoring for the target load, the deployment control server can perform directional acquisition on a container corresponding to an application mirror image, specifically, the container corresponding to the monitoring mirror image of the target load in the deployment control server performs directional acquisition work to obtain flow information, wherein the flow information comprises access times, access success or failure and the like of the target load in unit time, then the deployment operation and maintenance server sends the acquired flow information to an APM server, the APM server stores the received flow information, and the stored flow information can be used for inquiring whether the flow information generated by the access in the flow information is normal or not when a user fails to access the target load, so that the alarm can be processed by positioning the reason of access failure. The stored traffic information may also be used for data analysis, that is, when the traffic data of the target load needs to be analyzed, the traffic may be analyzed by using a big data analysis tool, for example, the traffic information is queried according to the requirement, or the large data modeling analysis is performed on the traffic data, or the performance result of the application obtained by the analysis may be displayed on a large screen.
S205, APM flow monitoring is controlled to monitor the access state of the target load, and operation monitoring is controlled to monitor the operation state of the target load.
After the deployment control server generates the target load, whether the state of the target load is normal or not can be checked, and if the state is normal, the target load can provide services normally. The deployment control server may control the APM traffic monitoring to monitor the access state of the target load, which is specifically as follows:
when the user accesses the target load, for example, the user fails to access, the access alarm information is generated, the deployment control server may send the access alarm information of the target load to the operation and maintenance server through a transmission channel, for example, Kafka, and the operation and maintenance server may perform corresponding processing on the access alarm according to the alarm information, which may specifically refer to the second embodiment.
After the operation and maintenance server completes processing of the access alarm message, the deployment control server may receive an access alarm processing feedback sent by the operation and maintenance server, where the access alarm processing feedback is a target load normal message or an alarm processing instruction, and the target load normal message is used to instruct the user to re-access the target load, that is, the target load is not abnormal, and multiple accesses may be attempted. The alarm processing instruction is used for instructing the deployment control server to process the alarm processing instruction, and illustratively, when the alarm processing instruction is a cluster for switching the target load to work, the deployment control server switches the cluster for the target load to work, so that the target load provides a normal service.
The deployment control server may control the operation monitoring to monitor the operation state of the target load, specifically as follows:
when a monitoring function corresponding to a load operation monitoring mode of a CCE platform of a deployment control server, such as prometheus, detects that operation of a target load is abnormal, the deployment control server may send operation alarm information to an operation and maintenance server, for example, when it detects that a quota of the target load is insufficient (a usage rate of a CPU or a memory exceeds 80%), an alarm may be triggered, the deployment control server sends the operation alarm information to the operation and maintenance server through a transmission channel Kafka by using a monitoring port corresponding to the prometheus, a maintenance platform in the operation and maintenance server may send an alarm processing command to the deployment control server according to the operation alarm information, the alarm processing command includes a processing mode corresponding to a preset processable alarm, and the deployment control server performs corresponding alarm processing according to the command. For example, the preset processing mode corresponding to the processable alarm included in the alarm processing command is to increase a memory, the deployment control server may increase the memory on the original memory corresponding to the target load, and the processing mode may further include an indication of the size of the increase, for example, an increase of 100MB (megabyte).
The deployment control server may also upgrade the target load of the application program after discovering the application program bug, for example, the application program has a log bug, which indicates that the program has a security risk.
In this embodiment, the deployment control server configures basic parameters for a target load, then configures a container corresponding to the application mirror and a container corresponding to the monitoring mirror for the target load, and the container corresponding to the monitoring mirror collects traffic information of the target load in the container corresponding to the application mirror, where the traffic information is used to process an access alarm of the target load, and adds access configuration, APM traffic monitoring, and operation monitoring to the target load to generate the target load. After the target load is generated, the deployment control server controls APM flow monitoring to monitor the access state of the target load, and controls operation monitoring to monitor the operation state of the target load. The monitoring mode can realize safe and reliable monitoring without adding an additional monitoring module on the load function code, and the performance of the target load cannot be influenced.
After the deployment control server generates the target load, the access state and the operation state of the target load are monitored, and when an alarm occurs, the deployment control server needs to perform cooperative processing with the operation and maintenance server.
Referring to fig. 3, fig. 3 is a flowchart illustrating a middleware management method according to a second embodiment of the present application, where the method may be executed by an operation and maintenance server, and the method includes the following steps.
S301, receiving operation alarm information of the target load sent by the deployment control server, and matching the operation alarm information with preset processable alarm information.
When the CCE platform of the deployment control server detects that the operation of the target load is abnormal, the operation and maintenance server may receive operation alarm information of the target load sent by the deployment control server, where the alarm information includes an alarm type, an alarm name, and the like, for example, the alarm type is a quota insufficient alarm, and the alarm name is a memory insufficient. The operation and maintenance platform in the operation and maintenance server matches the operation alarm information with the pre-set processable alarms, and may, for example, match the alarm name with the alarm name in the processable alarm information,
and S302, when the matching is successful, generating an operation alarm processing command.
And when the matching is successful, the operation and maintenance server generates an alarm processing command, wherein the alarm processing command comprises a preset processing mode corresponding to the processable alarm. The alarm processing command is used for indicating the deployment control server to automatically complete alarm processing according to the processing mode in the command, and the alarm processing efficiency is improved.
S303, sending the alarm processing command to a deployment control server.
After generating the alarm processing command, the operation and maintenance server may send the alarm processing command to the deployment control server, and specifically, the operation and maintenance server may send the alarm processing command to the deployment control server through an interface provided by the deployment control server.
Optionally, when the operation and maintenance platform in the operation and maintenance server unsuccessfully matches the operation alarm information with the preset processable alarm, it indicates that the alarm cannot be processed automatically by the set processing mode, and the alarm can be resolved only by intervention of operation and maintenance personnel. The operation and maintenance server can send an alarm processing prompt to the terminal equipment, and the alarm processing prompt is used for prompting operation and maintenance personnel to intervene in alarm processing of target load operation.
The operation and maintenance server can also receive access warning information of the target load sent by the deployment control server, wherein the access warning information comprises the name, the access time and the access number of the target load.
And the operation and maintenance server inquires whether the corresponding request content in the flow information of the target load is normal or not from the APM server according to the access warning information. Specifically, the operation and maintenance server may send a request for querying request content corresponding to the traffic information of the target load to the APM server, where the request includes the access warning information, and the APM server queries the request content corresponding to the locally stored traffic information of the target load according to the query request, and then sends the request content to the operation and maintenance server. When the request content is normal, for example, the request content shows that the request access is successful, the operation and maintenance server generates a target load normal message, where the normal message is used to indicate that the target load is not abnormal, and the user accesses the target load again.
When the request content is abnormal, for example, the request content shows that the access of the request fails, the operation and maintenance server generates an alarm processing instruction, and the alarm processing instruction is used for instructing the deployment control server to process the target load.
The operation and maintenance server may send access alarm processing feedback to the deployment control server, where the access alarm processing feedback includes a target load normal message or an alarm processing indication. The deployment control server can perform corresponding processing according to the access alarm processing feedback.
In this embodiment, the operation and maintenance server matches the operation alarm information of the target load sent by the deployment control server with the preset processable alarm information, and when the matching is successful, the operation and maintenance server generates an alarm processing command, where the alarm processing command includes a processing mode corresponding to the preset processable alarm, and sends the alarm processing command to the deployment control server, and the deployment control server may process the alarm according to the alarm processing command. The monitoring mode can realize safe and reliable monitoring without adding an additional monitoring module on the load function code, and the performance of the target load cannot be influenced.
Next, the interaction between the deployment control server and the operation and maintenance server is described through the third embodiment.
Referring to fig. 4, fig. 4 is a signaling flow chart of a middleware management method provided in the third embodiment of the present application, and this embodiment describes an interaction process between devices in detail on the basis of the first embodiment and the second embodiment, and this embodiment takes an example where both an access alarm and an operation alarm occur in a target load, as shown in fig. 4, the method of this embodiment includes the following steps.
S401, the deployment control server generates a target load and monitors the access state and the running state of the target load.
Specifically, the deployment control server controls the APM traffic monitoring to monitor the access state of the target load, and the deployment control server controls the operation monitoring to monitor the operation state of the target load.
S402, the deployment control server sends the traffic information of the target load to the APM server.
The traffic information includes the number of accesses per unit time of the target load, whether the access is requested successfully, and the like. The deployment control server performs directional acquisition on the container corresponding to the application mirror image, specifically, performs directional acquisition on the container corresponding to the monitoring mirror image of the target load in the deployment control server to obtain the flow information.
And S403, the APM server stores the traffic information of the target load.
S404, the deployment control server sends operation alarm information to the operation and maintenance server.
The operation alarm information is generated by detecting that the operation of the target load is abnormal by a monitoring function, such as prometheus, corresponding to a load operation monitoring mode of a CCE platform of the deployment control server.
S405, matching the operation and maintenance server operation alarm information with preset processable alarm information.
And when the matching is successful, generating an operation alarm processing command, and executing the step S406, and when the matching is unsuccessful, the operation and maintenance server can send an alarm processing prompt to the terminal equipment, wherein the alarm processing prompt is used for prompting operation and maintenance personnel to intervene in the alarm processing of the target load operation.
S406, when the matching is successful, the operation and maintenance server sends an operation alarm processing command to the deployment control server.
The operation alarm processing command comprises a preset processing mode corresponding to the processable alarm, and the alarm processing command is used for indicating the deployment control server to automatically complete alarm processing according to the processing mode in the command.
And S407, the deployment control server processes the operation alarm according to the operation alarm processing command.
Illustratively, the preset processing mode corresponding to the processable alarm included in the alarm processing command is to add a memory, and the deployment control server may add a memory to the original memory corresponding to the target load.
S408, the deployment control server sends access warning information to the operation and maintenance server.
And when the user accesses the target load, generating access alarm information, wherein the user has an exception, such as user access failure. The access alarm information comprises the name, access time and access number of the target load.
S408, the operation and maintenance server sends a request for inquiring the request content corresponding to the traffic information of the target load to the APM server.
The request includes access alert information.
And S409, the APM server sends the request content corresponding to the traffic information of the target load to the operation and maintenance server.
And the APM server side inquires the request content corresponding to the locally stored flow information of the target load according to the inquiry request and then sends the request content to the operation and maintenance server.
And S410, the operation and maintenance server sends access alarm processing feedback to the deployment control server according to the request content.
The access alarm processing feedback comprises a target load normal message or an alarm processing instruction.
Specifically, when the request content is normal, the operation and maintenance server generates a target load normal message, where the normal message is used to indicate that the target load is not abnormal, and the user may revisit the target load.
And when the request content is abnormal, the operation and maintenance server generates an alarm processing instruction, wherein the alarm processing instruction is used for instructing the deployment control server to process the target load.
And S411, the deployment control server processes the access alarm according to the access alarm processing feedback.
When the access alert processing feedback includes a target load normal message, the deployment control server may indicate that the user may revisit the target load.
When the access alarm handling feedback includes an alarm handling indication, the deployment control server may handle the alarm according to the alarm handling indication, such as switching a cluster of target load jobs.
In this embodiment, after the deployment control server completes creation of the container, the deployment control server controls the APM traffic monitoring to monitor the access state of the target load, and controls the operation monitoring to monitor the operation state of the target load. The operation and maintenance server matches the operation alarm information of the target load sent by the receiving deployment control server with the preset processable alarm information, when the matching is successful, the operation and maintenance server generates an alarm processing command and sends the alarm processing command to the deployment control server, and the deployment control server can process the alarm according to the alarm processing command. The operation and maintenance server requests the flow information of the load to the APM server side according to the received access alarm information sent by the deployment control server, and determines whether the flow information is normal or not, so that corresponding indication is sent to the deployment control server, and the deployment server processes the access alarm according to the indication. According to the method and the device, safe and reliable monitoring can be achieved without adding an additional monitoring module on the load function code, and the performance of the target load cannot be influenced.
Referring to fig. 5, fig. 5 is a schematic structural diagram of a deployment control server according to a fourth embodiment of the present application. As shown in fig. 5, the server 50 includes: a first configuration module 501, a second configuration module 502, an add module 503, a third configuration module 504, and a control module 505.
The first configuration module 501 is configured to configure basic parameters for a target load of an application program, where the application program includes a plurality of loads, and each load corresponds to a function module of the application program.
A second configuration module 502, configured to configure container information for the target load, where the container information includes a base mirror, a name of a container corresponding to the base mirror, and quota information corresponding to the container, where the base mirror includes an application mirror and a monitoring mirror, the container corresponding to the base mirror includes a container corresponding to the application mirror and a container corresponding to the monitoring mirror, the quota information includes information of processing resources and storage resources configured for the container, the container corresponding to the application mirror is used for storing the target load, and the container corresponding to the monitoring mirror is used for collecting traffic information of the target load in the container corresponding to the application mirror.
An adding module 503, configured to add an access configuration to the target load, where the access configuration includes a target load name, an access manner, and an access port.
A third configuration module 504, configured to configure APM traffic monitoring and operation monitoring for the target load.
And the control module 505 is configured to control the APM flow monitoring to monitor an access state of the target load, and control the operation monitoring to monitor an operation state of the target load.
Optionally, the control module 505 is specifically configured to:
and when the abnormal operation of the target load is detected, sending operation alarm information to the operation and maintenance server.
And receiving an operation alarm processing command sent by the operation and maintenance server, wherein the operation alarm processing command comprises a preset processing mode corresponding to the processable alarm.
And automatically processing the operation alarm according to the operation alarm processing command.
Optionally, the control module 505 is further configured to:
and sending access warning information of the target load to the operation and maintenance server, wherein the access warning information is generated when the target load is abnormally accessed, and the access warning information comprises the name, the access time and the access number of the target load.
And receiving access alarm processing feedback sent by the operation and maintenance server, wherein the access alarm processing feedback comprises a target load normal message or an alarm processing instruction, the target load normal message is used for indicating a user to access the target load again, and the alarm processing instruction is used for indicating the deployment control server to process the target load.
Optionally, the deployment control server further configures log path collection for the target load, and the method further includes:
and directionally collecting the container corresponding to the application mirror image to obtain the flow information of the target load, wherein the flow information comprises the access times and access success or failure of the target load in unit time.
And sending the flow information to an APM server, wherein the flow information is stored in the APM server and is used for processing an access alarm by the operation and maintenance server.
The server of this embodiment may be configured to execute the middleware management method of the first embodiment, and a specific implementation manner and a technical effect are similar to each other, which are not described herein again.
Referring to fig. 6, fig. 6 is a schematic structural diagram of an operation and maintenance server according to a fifth embodiment of the present application. As shown in fig. 6, the server 60 includes: a receiving module 601, a generating module 602 and a sending module 603.
The receiving module 601 is configured to receive operation alarm information of a target load sent by a deployment control server, and match the operation alarm information with preset processable alarm information.
The generating module 602 is configured to generate an alarm processing operation command when matching is successful, where the alarm processing operation command includes a preset processing mode corresponding to a processable alarm.
A sending module 603, configured to send the operation alarm processing command to the deployment control server.
Optionally, when the matching is unsuccessful, an alarm processing reminder is sent to the terminal device, and the alarm processing reminder is used for reminding operation and maintenance personnel to intervene in alarm processing of target load operation.
Optionally, the access warning information of the target load sent by the deployment control server is received, where the access warning information includes a name, an access time, and an access number of the target load.
And inquiring whether the corresponding request content in the traffic information of the target load is normal or not from the APM server according to the access warning information.
And when the request content is normal, generating a target load normal message, wherein the normal message is used for indicating that the target load is not abnormal, and the user accesses the target load again.
When the request content is abnormal, an alarm processing instruction is generated, and the alarm processing instruction is used for instructing the deployment control server to process the target load.
And sending access alarm processing feedback to the deployment control server, wherein the access alarm processing feedback comprises a target load normal message or an alarm processing instruction.
The server of this embodiment may be configured to execute the middleware management method of the second embodiment, and the specific implementation manner and the technical effect are similar, which are not described herein again.
Referring to fig. 7, fig. 7 is a schematic structural diagram of a deployment control server according to a sixth embodiment of the present application. The server 70 includes: the processor 701 executes a computer execution instruction stored in the memory 702, and controls a receiving action and a sending action of the transceiver 703, so that at least one processor executes a middleware management method step according to the first embodiment, and the specific implementation manner and technical effect are similar, and are not described herein again.
Referring to fig. 8, fig. 8 is a schematic structural diagram of an operation and maintenance server according to a seventh embodiment of the present application, where the server includes 80: the processor 801 executes computer execution instructions stored in the memory 802, and controls the receiving action and the sending action of the transceiver 803, so that at least one processor executes the steps of the middleware management method according to the second embodiment.
An eighth embodiment of the present application provides a computer-readable storage medium, where a computer-executable instruction is stored in the computer-readable storage medium, and the computer-executable instruction, when executed by a processor, is used to implement the steps of the middleware management method according to any one of the first to third embodiments, where specific implementation manners and technical effects are similar, and are not described herein again.
A ninth embodiment of the present invention provides a computer program product, including a computer program, where the computer program, when executed by a processor, implements the steps of the middleware management method according to any one of the first to third embodiments, and the specific implementation manner and the technical effect are similar, and are not described herein again.
Other embodiments of the present application will be apparent to those skilled in the art from consideration of the specification and practice of the invention disclosed herein. This application is intended to cover any variations, uses, or adaptations of the invention following, in general, the principles of the application and including such departures from the present disclosure as come within known or customary practice within the art to which the invention pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the application being indicated by the following claims.
It will be understood that the present application is not limited to the precise arrangements described above and shown in the drawings and that various modifications and changes may be made without departing from the scope thereof. The scope of the application is limited only by the appended claims.

Claims (10)

1. A middleware management method applied to a deployment control server includes:
configuring basic parameters for a target load of an application program, wherein the application program comprises a plurality of loads, and each load corresponds to one functional module of the application program;
configuring container information for the target load, wherein the container information includes a basic mirror image, a name of a container corresponding to the basic mirror image, and quota information corresponding to the container, the basic mirror image includes an application mirror image and a monitoring mirror image, the container corresponding to the basic mirror image includes a container corresponding to the application mirror image and a container corresponding to the monitoring mirror image, the quota information includes information of processing resources and storage resources configured for the container, the container corresponding to the application mirror image is used for storing the target load, and the container corresponding to the monitoring mirror image is used for collecting traffic information of the target load in the container corresponding to the application mirror image;
adding an access configuration for the target load, wherein the access configuration comprises a name of the target load, an access mode and an access port;
configuring Application Performance Management (APM) flow monitoring and operation monitoring for the target load;
and controlling the APM flow monitoring to monitor the access state of the target load, and controlling the operation monitoring to monitor the operation state of the target load.
2. The method of claim 1, wherein said controlling said operational monitoring monitors an operational state of said target load, comprising:
when the target load is detected to be abnormal in operation, sending operation alarm information to an operation and maintenance server;
receiving an operation alarm processing command sent by the operation and maintenance server, wherein the operation alarm processing command comprises a preset processing mode corresponding to a processable alarm;
and automatically processing the operation alarm according to the operation alarm processing command.
3. The method of claim 2, wherein the controlling the APM traffic monitoring monitors the access status of the target load, comprising:
sending access warning information of the target load to the operation and maintenance server, wherein the access warning information is generated when the target load is abnormally accessed, and the access warning information comprises the name, the access time and the access number of the target load;
and receiving access alarm processing feedback sent by the operation and maintenance server, wherein the access alarm processing feedback comprises a target load normal message or an alarm processing instruction, the target load normal message is used for instructing a user to access the target load again, and the alarm processing instruction is used for instructing the deployment control server to process the target load.
4. The method according to any of claims 1-3, wherein the deployment control server further configures log path collection for the target load, the method further comprising:
directionally collecting a container corresponding to the application mirror image to obtain flow information of the target load, wherein the flow information comprises the access times of the target load in unit time and whether the access is successful;
and sending the flow information to an APM server, wherein the flow information is stored in the APM server and is used for processing an access alarm by an operation and maintenance server.
5. A middleware management method is applied to an operation and maintenance server and comprises the following steps:
receiving operation alarm information of a target load sent by a deployment control server, and matching the operation alarm information with preset processable alarm information, wherein the target load is a load of an application program, the application program comprises a plurality of loads, and each load corresponds to a functional module of the application program;
when the matching is successful, generating an operation alarm processing command, wherein the operation alarm processing command comprises a preset processing mode corresponding to the processable alarm;
and sending the operation alarm processing command to the deployment control server.
6. The method of claim 5, further comprising:
and when the matching is unsuccessful, sending an alarm processing prompt to the terminal equipment, wherein the alarm processing prompt is used for prompting operation and maintenance personnel to intervene in the alarm processing of the target load operation.
7. The method of claim 5 or 6, further comprising:
receiving access warning information of the target load, which is sent by the deployment control server, wherein the access warning information comprises the name, the access time and the access number of the target load;
inquiring whether the corresponding request content in the traffic information of the target load is normal or not from an APM server according to the access warning information;
when the request content is normal, generating the target load normal message, wherein the normal message is used for indicating the user to re-access the target load;
when the request content is abnormal, generating an alarm processing instruction, wherein the alarm processing instruction is used for instructing the deployment control server to process the target load;
and sending access alarm processing feedback to the deployment control server, wherein the access alarm processing feedback comprises the target load normal message or the alarm processing instruction.
8. A deployment control server, comprising:
the system comprises a first configuration module, a second configuration module and a third configuration module, wherein the first configuration module is used for configuring basic parameters for a target load of an application program, the application program comprises a plurality of loads, and each load corresponds to a functional module of the application program;
a second configuration module, configured to configure container information for the target load, where the container information includes a base mirror, a name of a container corresponding to the base mirror, and quota information corresponding to the container, where the base mirror includes an application mirror and a monitoring mirror, the container corresponding to the base mirror includes a container corresponding to the application mirror and a container corresponding to the monitoring mirror, the quota information includes information on processing resources and storage resources configured for the container, the container corresponding to the application mirror is used to store the target load, and the container corresponding to the monitoring mirror is used to collect traffic information of the target load in the container corresponding to the application mirror;
the adding module is used for adding access configuration for the target load, and the access configuration comprises a target load name, an access mode and an access port;
a third configuration module, configured to configure Application Performance Management (APM) traffic monitoring and operation monitoring for the target load;
and the control module is used for controlling the APM flow monitoring to monitor the access state of the target load and controlling the operation monitoring to monitor the operation state of the target load.
9. A deployment control server, comprising: a processor, and a memory communicatively coupled to the processor;
the memory stores computer-executable instructions;
the processor executes computer-executable instructions stored by the memory to implement the method of any of claims 1-4.
10. An operation and maintenance server, comprising: a processor, and a memory communicatively coupled to the processor;
the memory stores computer-executable instructions;
the processor executes computer-executable instructions stored by the memory to implement the method of any of claims 5-7.
CN202111588659.XA 2021-12-23 2021-12-23 Middleware management method and server Pending CN114338687A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111588659.XA CN114338687A (en) 2021-12-23 2021-12-23 Middleware management method and server

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111588659.XA CN114338687A (en) 2021-12-23 2021-12-23 Middleware management method and server

Publications (1)

Publication Number Publication Date
CN114338687A true CN114338687A (en) 2022-04-12

Family

ID=81054850

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111588659.XA Pending CN114338687A (en) 2021-12-23 2021-12-23 Middleware management method and server

Country Status (1)

Country Link
CN (1) CN114338687A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115967619A (en) * 2022-11-14 2023-04-14 广西壮族自治区信息中心(广西壮族自治区大数据研究院) Monitoring technology adaptive to multi-CPU (Central processing Unit) architecture multi-cloud platform
CN116455679A (en) * 2023-06-16 2023-07-18 杭州美创科技股份有限公司 Abnormal database operation and maintenance flow monitoring method and device and computer equipment

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106371974A (en) * 2016-08-30 2017-02-01 中国民生银行股份有限公司 Monitoring method of application program in Docker container and publishing platform
CN107463410A (en) * 2017-08-11 2017-12-12 四川长虹电器股份有限公司 A kind of method disposed with monitoring online platform application
CN110262941A (en) * 2019-05-28 2019-09-20 深圳市汇川技术股份有限公司 Application Container cluster alarm implementation method, system, equipment and storage medium
CN110851241A (en) * 2019-11-20 2020-02-28 杭州安恒信息技术股份有限公司 Safety protection method, device and system for Docker container environment
CN112564994A (en) * 2019-09-25 2021-03-26 北大方正集团有限公司 Flow monitoring method and device, cloud server and storage medium

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106371974A (en) * 2016-08-30 2017-02-01 中国民生银行股份有限公司 Monitoring method of application program in Docker container and publishing platform
CN107463410A (en) * 2017-08-11 2017-12-12 四川长虹电器股份有限公司 A kind of method disposed with monitoring online platform application
CN110262941A (en) * 2019-05-28 2019-09-20 深圳市汇川技术股份有限公司 Application Container cluster alarm implementation method, system, equipment and storage medium
CN112564994A (en) * 2019-09-25 2021-03-26 北大方正集团有限公司 Flow monitoring method and device, cloud server and storage medium
CN110851241A (en) * 2019-11-20 2020-02-28 杭州安恒信息技术股份有限公司 Safety protection method, device and system for Docker container environment

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
周向军;吴挺;: "校园网基于Docker容器化的微信告警服务平台研究", 电脑知识与技术, no. 21, 25 July 2020 (2020-07-25), pages 1 - 4 *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115967619A (en) * 2022-11-14 2023-04-14 广西壮族自治区信息中心(广西壮族自治区大数据研究院) Monitoring technology adaptive to multi-CPU (Central processing Unit) architecture multi-cloud platform
CN116455679A (en) * 2023-06-16 2023-07-18 杭州美创科技股份有限公司 Abnormal database operation and maintenance flow monitoring method and device and computer equipment
CN116455679B (en) * 2023-06-16 2023-09-08 杭州美创科技股份有限公司 Abnormal database operation and maintenance flow monitoring method and device and computer equipment

Similar Documents

Publication Publication Date Title
EP3979592A1 (en) Decentralization processing method, communication proxy, host and storage medium
CN100417081C (en) Method, system for checking and repairing a network configuration
KR102001898B1 (en) Method of processing alarm information, related devices and systems
US10798218B2 (en) Environment isolation method and device
CN114338687A (en) Middleware management method and server
US20200327045A1 (en) Test System and Test Method
US20190056975A1 (en) Virtualized network function manager determining method and network functions virtualization orchestrator
KR20170118165A (en) Method and apparatus for updating a network service technician
CN105847237A (en) Safety management method and device based on NFV (Network Function Virtualization)
CN115248826A (en) Method and system for large-scale distributed graph database cluster operation and maintenance management
CN106304136A (en) Obtain the method for network state information, system, controller and simulation mobile device
CN103810420A (en) Application uninstall preventing method and system
CN107453888B (en) High-availability virtual machine cluster management method and device
US20240118935A1 (en) Pod deployment method and apparatus
CN112202879B (en) Middleware management method and device, electronic equipment and storage medium
CN113672336A (en) K8S container cluster deployment method, device, equipment and readable storage medium
CN105354128A (en) Computer resource monitoring method, device and system
CN114726789A (en) Method, device, equipment and medium for traffic management and traffic management policy configuration
KR101596325B1 (en) System for managing server/storge system
US20110307904A1 (en) Method and apparatus for automation language extension
CN106375281A (en) Message control method and device
CN113824801B (en) Intelligent integration terminal unified access management component system
CN113746676B (en) Network card management method, device, equipment, medium and product based on container cluster
CN111158872B (en) Method and device for submitting and guarding spark task
CN113535402A (en) Load balancing processing method and device based on 5G MEC and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination