CN114444072A - Database cluster patrol method, database cluster patrol device, database cluster patrol equipment and database cluster patrol storage medium - Google Patents

Database cluster patrol method, database cluster patrol device, database cluster patrol equipment and database cluster patrol storage medium Download PDF

Info

Publication number
CN114444072A
CN114444072A CN202210032466.4A CN202210032466A CN114444072A CN 114444072 A CN114444072 A CN 114444072A CN 202210032466 A CN202210032466 A CN 202210032466A CN 114444072 A CN114444072 A CN 114444072A
Authority
CN
China
Prior art keywords
inspection
node
script
polling
server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210032466.4A
Other languages
Chinese (zh)
Inventor
王安宁
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ping An Puhui Enterprise Management Co Ltd
Original Assignee
Ping An Puhui Enterprise Management Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ping An Puhui Enterprise Management Co Ltd filed Critical Ping An Puhui Enterprise Management Co Ltd
Priority to CN202210032466.4A priority Critical patent/CN114444072A/en
Publication of CN114444072A publication Critical patent/CN114444072A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • Databases & Information Systems (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The application relates to the technical field of big data, and discloses a database cluster inspection method, a device, equipment and a storage medium, wherein the method comprises the following steps: according to a preset routing inspection script library and a target cluster operation authority corresponding to the database cluster routing inspection request, performing routing inspection script packet generation on each node in the node address configuration data to obtain a single-node routing inspection script packet; the appointed single node patrol inspection script packet is sent to the target server of the node that the appointed single node patrol inspection script packet corresponds, the single server patrol inspection report that the target server sends according to the appointed single node patrol inspection script packet is obtained, the appointed single node patrol inspection script packet is the single node patrol inspection script packet that any node corresponds, the single server patrol inspection report includes: an operating system polling report and/or a database polling report; and carrying out routing inspection report combination on the routing inspection reports of the single servers to obtain a database cluster routing inspection report. The inspection range is controllable, the data security is improved, and the comprehensiveness of the inspection content is improved.

Description

Database cluster patrol method, database cluster patrol device, database cluster patrol equipment and database cluster patrol storage medium
Technical Field
The present application relates to the field of big data technologies, and in particular, to a method, an apparatus, a device, and a storage medium for database cluster inspection.
Background
The conventional database cluster inspection mainly depends on a plug-in or a third-party integrated tool of a database, so that the real-time monitoring of various performance indexes of the database is realized. Generally, such monitoring is limited to monitoring a performance view, Top SQL (descending order of resources occupied by structured query language) and Top wait events (descending order of wait events) inside a database, and the inspection content is not comprehensive, for example, the operating system of the database server cannot be monitored; and the plug-in of the database or a third-party integrated tool cannot control the inspection range, so that the data security is reduced.
Disclosure of Invention
The application mainly aims to provide a database cluster inspection method, a database cluster inspection device, a database cluster inspection equipment and a database cluster inspection storage medium, and aims to solve the technical problems that in the prior art, database cluster inspection mainly depends on a plug-in or a third-party integrated tool of a database, inspection contents are incomplete, inspection range cannot be controlled, and data security is reduced.
In order to achieve the above object, the present application provides a database cluster inspection method, including:
acquiring a database cluster inspection request;
responding to the database cluster inspection request, and acquiring node address configuration data;
acquiring a target cluster operation authority corresponding to the database cluster inspection request, and generating an inspection script packet for each node in the node address configuration data according to a preset inspection script library and the target cluster operation authority to obtain a single-node inspection script packet;
sending an appointed single-node patrol inspection script packet to a target server of a node corresponding to the appointed single-node patrol inspection script packet, and acquiring a single-server patrol inspection report sent by the target server according to the appointed single-node patrol inspection script packet, wherein the appointed single-node patrol inspection script packet is any one of node address configuration data, the single-node patrol inspection script packet corresponds to the node, and the single-server patrol inspection report comprises: an operating system polling report and/or a database polling report;
and combining the inspection reports of the single servers to obtain an inspection report of the database cluster.
Further, the step of obtaining the target cluster operation authority corresponding to the database cluster inspection request includes:
acquiring a target user identifier corresponding to the database cluster inspection request;
and matching the cluster operation authority with the target user identifier from a preset cluster operation authority list to obtain the target cluster operation authority.
Further, the step of generating a patrol inspection script packet for each node in the node address configuration data according to a preset patrol inspection script library and the target cluster operation authority to obtain a single-node patrol inspection script packet includes:
acquiring the inspection authority from a preset inspection authority list as a first inspection authority of the target cluster operation authority;
acquiring a routing inspection script identifier from a mapping table in the routing inspection script library according to the first routing inspection authority to obtain a first routing inspection script identifier set;
acquiring a routing inspection script from the routing inspection script set in the routing inspection script library according to the first routing inspection script identification set to obtain a first script set;
and generating an inspection script packet according to the first script set to obtain the single-node inspection script packet.
Further, the step of generating a patrol inspection script packet for each node in the node address configuration data according to a preset patrol inspection script library and the target cluster operation authority to obtain a single-node patrol inspection script packet further includes:
taking one node in the node address configuration data as a target node;
acquiring the inspection authority from a preset inspection authority list as a second inspection authority by using the target node and the target cluster operation authority;
acquiring a routing inspection script identifier from a mapping table of the routing inspection script library according to the second routing inspection authority to obtain a second routing inspection script identifier set;
acquiring an inspection script from the inspection script set of the inspection script library according to the second inspection script identification set to obtain a second script set;
generating the inspection script packet according to the second script set to obtain the single-node inspection script packet corresponding to the target node;
and repeating the step of determining one node in the node address configuration data as a target node until the single-node routing inspection script packet corresponding to each node in the node address configuration data is determined.
Further, the step of sending the appointed single-node patrol inspection script packet to the target server of the node corresponding to the appointed single-node patrol inspection script packet, and obtaining the single-server patrol inspection report sent by the target server according to the appointed single-node patrol inspection script packet includes:
sending the appointed single-node inspection script packet to the target server of the node corresponding to the appointed single-node inspection script packet, and acquiring a single-server script sending completion signal sent by the target server according to the appointed single-node inspection script packet;
responding to the single server script sending completion signal, and sending a single server polling execution signal to the target server;
acquiring a single server polling end signal sent by the target server according to the single server polling execution signal;
responding to the single server polling end signal, and sending a polling report uploading signal to the target server;
and acquiring the single-server polling report sent by the target server according to the appointed single-node polling script packet.
Further, the step of obtaining the single server polling end signal sent by the target server according to the single server polling execution signal includes:
acquiring a single server inspection end signal which is sent by the target server according to the single server inspection execution signal and corresponds to the appointed single node inspection script packet, wherein the target server is used for:
executing a main inspection script in the appointed single-node inspection script packet, and judging whether an operating system inspection script exists in the appointed single-node inspection script packet or not;
if the operating system inspection script exists, executing the operating system inspection script to perform operating system inspection to obtain an operating system inspection report;
executing the main inspection script, and judging whether a database inspection script exists in the appointed single-node inspection script packet or not;
if the database inspection script exists, executing the database inspection script to perform database inspection to obtain a database inspection report;
and compressing the operating system inspection report and/or the database inspection report to obtain the single-server inspection report and the single-server inspection end signal corresponding to the appointed single-node inspection script packet.
Further, the step of combining the inspection reports of the single servers to obtain the database cluster inspection report includes:
compressing each single server polling report into a file to obtain the database cluster polling report.
The application also provides a database cluster inspection device, the device includes:
the request acquisition module is used for acquiring a database cluster inspection request;
the node address configuration data acquisition module is used for responding to the database cluster inspection request and acquiring node address configuration data;
the single-node inspection script packet determining module is used for acquiring a target cluster operation authority corresponding to the database cluster inspection request, and generating an inspection script packet for each node in the node address configuration data according to a preset inspection script library and the target cluster operation authority to obtain a single-node inspection script packet;
the single-server patrol inspection report determining module is used for sending an appointed single-node patrol inspection script packet to a target server of the node corresponding to the appointed single-node patrol inspection script packet and acquiring a single-server patrol inspection report sent by the target server according to the appointed single-node patrol inspection script packet, wherein the appointed single-node patrol inspection script packet is the single-node patrol inspection script packet corresponding to any node in the node address configuration data, and the single-server patrol inspection report comprises: an operating system polling report and/or a database polling report;
and the database cluster inspection report determining module is used for combining the inspection reports of the single servers to obtain a database cluster inspection report.
The present application further proposes a computer device comprising a memory and a processor, the memory storing a computer program, the processor implementing the steps of any of the above methods when executing the computer program.
The present application also proposes a computer-readable storage medium having stored thereon a computer program which, when being executed by a processor, carries out the steps of the method of any of the above.
The database cluster polling method, the database cluster polling device, the database cluster polling equipment and the database cluster polling storage medium respond to the database cluster polling request and acquire node address configuration data; acquiring a target cluster operation authority corresponding to the database cluster inspection request, and generating an inspection script packet for each node in the node address configuration data according to a preset inspection script library and the target cluster operation authority to obtain a single-node inspection script packet; sending an appointed single-node patrol inspection script packet to a target server of a node corresponding to the appointed single-node patrol inspection script packet, and acquiring a single-server patrol inspection report sent by the target server according to the appointed single-node patrol inspection script packet, wherein the appointed single-node patrol inspection script packet is any one of node address configuration data, the single-node patrol inspection script packet corresponds to the node, and the single-server patrol inspection report comprises: an operating system polling report and/or a database polling report; and combining the inspection reports of the single servers to obtain an inspection report of the database cluster. The inspection range is controllable through the operation authority of the target cluster corresponding to the database cluster inspection request, and the data security is improved; the single server polling report obtained according to the single-node polling script packet comprises: the operating system inspection report and/or the database inspection report, so that the inspection of the operating system and the database is realized, and the comprehensiveness of the inspection content is improved; the automatic cluster inspection is realized, the inspection efficiency is improved, and inspection errors and/or omission are avoided.
Drawings
Fig. 1 is a schematic flowchart of a database cluster polling method according to an embodiment of the present application;
fig. 2 is a block diagram schematically illustrating a structure of a database cluster inspection device according to an embodiment of the present disclosure;
fig. 3 is a block diagram illustrating a structure of a computer device according to an embodiment of the present application.
The implementation, functional features and advantages of the objectives of the present application will be further explained with reference to the accompanying drawings.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the present application and are not intended to limit the present application.
Referring to fig. 1, an embodiment of the present application provides a database cluster inspection method, where the method includes:
s1: acquiring a database cluster inspection request;
s2: responding to the database cluster inspection request, and acquiring node address configuration data;
s3: acquiring a target cluster operation authority corresponding to the database cluster inspection request, and generating an inspection script packet for each node in the node address configuration data according to a preset inspection script library and the target cluster operation authority to obtain a single-node inspection script packet;
s4: sending an appointed single-node patrol inspection script packet to a target server of a node corresponding to the appointed single-node patrol inspection script packet, and acquiring a single-server patrol inspection report sent by the target server according to the appointed single-node patrol inspection script packet, wherein the appointed single-node patrol inspection script packet is any one of node address configuration data, the single-node patrol inspection script packet corresponds to the node, and the single-server patrol inspection report comprises: an operating system polling report and/or a database polling report;
s5: and combining the inspection reports of the single servers to obtain an inspection report of the database cluster.
In the embodiment, the inspection range is controllable through the operation authority of the target cluster corresponding to the database cluster inspection request, so that the data security is improved; the single server polling report obtained according to the single-node polling script packet comprises: the operating system inspection report and/or the database inspection report, so that inspection of the operating system and the database is realized, and the comprehensiveness of inspection contents is improved; the automatic cluster inspection is realized, the inspection efficiency is improved, and inspection errors and/or omission are avoided.
As for S1, in the server (any server in the database cluster) implementing the present application, the database cluster polling request sent by the user in the server implementing the present application may be acquired, or may be a database cluster polling request sent by a third-party application system, or may be a database cluster polling request triggered by the program implementing the present application according to a preset condition. For example, the preset condition is that the database cluster polling request is triggered 3:00 times a day.
The database cluster comprises a plurality of nodes, and each node corresponds to one server.
The database cluster polling request is a request for polling the database cluster.
Optionally, before the step of obtaining the database cluster patrol request, the method further includes:
s11: acquiring a node address configuration request;
s12: and responding to the node address configuration request, and acquiring the node address configuration data input by a user.
The node address configuration data is a set of IP addresses of nodes needing to be patrolled in the database cluster.
For S2, when the database cluster inspection request is obtained, the node address configuration data may be obtained from a local database, or from a third party application system, or from parameters carried in the database cluster inspection request.
For S3, according to the parameters carried by the database cluster inspection request, obtaining cluster operation permissions from a preset cluster operation permission list as target cluster operation permissions, where the parameters carried by the database cluster inspection request include but are not limited to: and (4) identifying the user. The user identification may be a user name, a user ID, or the like, which uniquely identifies a user.
The cluster operation authority list includes: and querying keywords and cluster operation authority. The cluster operation authority is the operation authority of the database cluster. For example, the query keyword is a user identification.
And acquiring an inspection script from a preset inspection script library according to the operation permission of the target cluster, packaging the acquired inspection script, and taking the packaged data as the single-node inspection script packet. That is to say, the single node patrol script package of each node is the same, therefore, only need pack once can.
The patrol script library comprises: the mapping table and the polling script set. The mapping table includes: and the inspection authority and the inspection script identifier. The patrol script set comprises: the method comprises the following steps of polling script type, polling script identification and polling script. The patrol script identification can be data which uniquely identifies one patrol script, such as a patrol script name, a patrol script ID and the like. The polling script types include: the method comprises the following steps of main script inspection, operating system inspection and database inspection. The script for patrolling the script type as the main script comprises the following steps: the system comprises a single-server main inspection script, an operating system main inspection script and a database main inspection script. The script for patrolling the operating system by the patrol script type comprises the following steps: the method comprises the following steps of operating system polling scripts, operating system resource polling scripts and operating system log polling scripts. The script for patrolling the database by the patrolling script type comprises the following steps: the system comprises a database inspection script, a database related inspection script, a database state inspection script, a database parameter inspection script, a software version inspection script, a database performance and information inspection script, a backup information inspection script, a log inspection script, a database table use condition inspection script, a database high-availability plug-in inspection script, a cluster state inspection script, a log inspection script of a database high-availability plug-in, a state inspection script of a high-availability plug-in and an authority inspection script of the database high-availability plug-in.
The inspection script is a script developed by adopting a SHELL scripting language. The Shell script is similar to batch processing under Windows/Dos, namely, various commands are put into a file in advance, a program file which is convenient to execute at one time is convenient, and the program file is mainly convenient for an administrator to set or manage.
The patrol of the operating system resources is mainly realized by calling an operating system patrol script, and the patrol contents include but are not limited to: (1) memory, CPU, disk usage; (2) operating system kernel parameter configuration; (3) firewall configuration conditions; (4) OSWatch (gadget officially provided gadget that collects operating system performance state information) case.
The inspection of the operating system logs is mainly realized by calling the operating system logs to inspect the script, and the inspection content comprises the following steps: extracting error information in/var/log/messages, writing the error information into a patrol report, and informing the operation and maintenance mail group and the development mail group through mail alarm.
The single-server main inspection script calls the operating system main inspection script to inspect the operating system, the operating system main inspection script calls the operating system inspection script, and the operating system inspection script calls the operating system resource inspection script and the operating system log inspection script.
An operating system resource inspection script, the name of which is expressed as resource _ check.sh, is used for acquiring information of/proc/meminfo,/etc/hosts,/etc/sysctl.conf,/etc/security/limits.conf,/etc/selinux/config, and outputting the result to a $ HOSTNAME _ os _ check.out file; firewall information is obtained through firewall closing and state checking; acquiring the utilization rate information of the disk through df-h; and outputs OSWatch's information into the $ HOSTNAME _ os _ check. So far, all the operating system resource information polling results are all output to a $ HOSTNAME _ os _ check.
An operating system log inspection script, the name of which is expressed as os _ log _ check.sh, is used for acquiring error reporting information of all error keywords of a log file of an operating system of a nearly 7-day/var/log/messages operating system, sequentially matching several common error reports defined in the script in advance, and outputting the error reporting information and a corresponding solution to $ HOSTNAME _ os _ log _ check.out if matching is successful; if the error report does not match the predefined common error report and solution, then output 'unusual error report, please analyze, process' itself into $ HOSTNAME _ os _ log _ check. So far, all the error information inspection results and solution suggestions of the operating systems are all output to a $ HOSTNAME _ os _ log _ check.out file.
The method comprises the steps that a single-server main inspection script calls a database main inspection script to perform database inspection, the database main inspection script calls a database inspection script, the database inspection script calls a database related inspection script, the database related inspection script calls a database state inspection script, a database parameter inspection script, a software version inspection script, a database performance and information inspection script, a backup information inspection script, a log inspection script and a database table use condition inspection script, and all database related information inspection results and solution suggestions are all output to a $ HOSTNAM _ db _ check. The method comprises the steps that a database inspection script calls a database high-availability plug-in inspection script, the database high-availability plug-in inspection script calls a cluster state inspection script, a log inspection script of a database high-availability plug-in, a state inspection script of the high-availability plug-in and a permission inspection script of the database high-availability plug-in, and all inspection results and solving suggestions related to the high-availability plug-in are all output to a $ HOSTNAME _ db _ gi _ check.
The database state inspection script is expressed as service _ check.sh and used for judging whether the database service or the monitoring service of the current machine is alive or not in a mode of ps-ef | grep database background processes (such as mysql, smon, lsnrctl and other processes), and outputting the alive state to an inspection report $ HOSTNAME _ db _ check.out.
And the database parameter inspection script is expressed as parameter _ check.sh, is used for acquiring the parameter configuration condition of the current database through a database view such as gv $ parameter and the like, and outputs the parameter configuration condition to an inspection report $ HOSTNAME _ db _ check.out.
And the software version inspection tour script is expressed as software _ check.sh script, is used for acquiring version information and patch information of the current database in a mode of $ ORACLE _ HOME/OPEtch/open LSINVENTORY, v $ session, select @ @ version and the like, and outputting a tour inspection result to $ HOSTNAME _ db _ check.out.
The database performance and information inspection tour script is expressed as performance _ check.sh and is used for calling sql statements (such as v $ ACTIVE _ SESSION _ HISTORY, dba _ hist _ snapshot, and dbms _ xplan.display _ curer) for inquiring about database top sql, top event, slow sql, lock and the like, and outputting the inquiry result to a tour inspection report $ host _ db _ check.out.
The backup information inspection polling script is expressed as backup _ check.sh and is used for acquiring backup time, backup frequency and the position of a backup file by inspecting the setting condition of a crontab timing task; then, calculating the size of the backup file every day to calculate a growth trend, and predicting the backup growth condition of one month in the future; analyzing the backup script, extracting a script line containing mtime (modification time) key words, and obtaining that the retention period is N days; and outputting the inspection result to an inspection report $ HOSTNAME _ db _ check.
The log inspection tour script name is expressed as log _ check.sh, and is used for extracting information of keywords such as error and ora in a log (such as $ ORACLE _ BASE/diag/rdbms/$ ORACLE _ SID/$ ORACLE _ SID/alert _ $ ORACLE _ SID.log), and outputting the information to a tour inspection report $ HOSTNAME _ db _ check.out (because errors possibly contained in the log inspection tour script name are more, rule matching is not performed, and only a tour inspection result is output).
The method comprises the following steps that a database table use condition inspection script, wherein the name is expressed as space _ check.sh, and is used for inspecting the table space utilization rate of the current database through views such as dba _ tables, v $ datafile, v $ tempfile and the like, and outputting a result to an inspection report of $ HOSTNAME _ db _ check.out; and outputting the non-system tablespace with the tablespace utilization rate of more than 80% to the rectification suggestion of the routing inspection report.
And the cluster state inspection script is named as cluster _ service _ check.sh, is used for inspecting the state of the whole cluster of the database through a crsctl status resource-t command, and outputs an inspection result to an inspection report $ HOSTNAME _ db _ gi _ check.out.
The log of the database high-availability plug-in checks the patrol inspection script, the name of which is expressed as gi _ check.sh, and is used for checking whether the state of the current high-availability plug-in is alive or not in a mode of ps-ef | grow keepalived or mha and the like, and outputting the check result to a patrol inspection report $ HOSTNAME _ db _ gi _ check.out.
And the state checking patrol script of the high-availability plug-in is expressed as gi _ log _ check.sh, is used for capturing error report of an error keyword of nearly 7 days in a log by checking a log file of the high-availability plug-in, and outputting error report information to a patrol report of $ HOSTNAME _ db _ gi _ check.out.
And the authority check routing inspection script of the high-availability plug-in of the database, which is expressed as privilege _ check.sh, is used for checking the authority of the directory where the high-availability plug-in is located and the authority of the used disk, and outputting the check result to a routing inspection report of $ HOSTNAME _ db _ gi _ check.out.
For step S4, the single-node patrol script packet corresponding to any one of the nodes in the node address configuration data is used as the designated single-node patrol script packet; sending a specified single-node inspection script packet to the target server of the node corresponding to the specified single-node inspection script packet through communication connection with the target server; the target server performs operating system inspection and/or database inspection according to the appointed single-node inspection script packet, and generates a single-server inspection report after the inspection is finished; and acquiring a single-server inspection report which is sent by the target server and corresponds to the appointed single-node inspection script packet through communication connection with the target server.
And S5, performing inspection report combination on each single-server inspection report by adopting a preset report combination standard to obtain the database cluster inspection report.
It is understood that steps S1 through S5 may be implemented as a script developed in the SHELL language, the name of which is expressed as master.
The Shell script is similar to batch processing under Windows/Dos, namely, various commands are put into a file in advance, a program file which is convenient to execute at one time is convenient, and the Shell script is mainly convenient for an administrator to set or manage.
Optionally, after the step of combining the inspection reports of the single servers to obtain the database cluster inspection report, the method further includes: and sending the mail to the database cluster inspection report by adopting a preset mail sending rule.
In an embodiment, the step of obtaining the target cluster operation authority corresponding to the database cluster inspection request includes:
s311: acquiring a target user identifier corresponding to the database cluster inspection request;
s312: and matching the cluster operation authority with the target user identifier from a preset cluster operation authority list to obtain the target cluster operation authority.
In this embodiment, the target cluster operation authority is determined from the preset cluster operation authority list according to the target user identifier corresponding to the database cluster inspection request, so that a basis is provided for making the inspection range controllable.
And S311, taking the account identifier used by the user for logging in the operating system corresponding to the database cluster polling request as the target user identifier.
For step S312, the target user identifier is subjected to user identifier matching from a preset cluster operation permission list, and the cluster operation permission corresponding to the matched user identifier in the cluster operation permission list is used as the target cluster operation permission, so that the target cluster operation permission is determined based on the login user of the operating system.
The cluster operation authority list comprises: user identification and cluster operation authority.
In an embodiment, the generating of the inspection script packet for each node in the node address configuration data according to a preset inspection script library and the target cluster operation authority to obtain the single-node inspection script packet includes:
s321: acquiring the inspection authority from a preset inspection authority list as a first inspection authority of the target cluster operation authority;
s322: acquiring a routing inspection script identifier from a mapping table in the routing inspection script library according to the first routing inspection authority to obtain a first routing inspection script identifier set;
s323: acquiring a routing inspection script from the routing inspection script set in the routing inspection script library according to the first routing inspection script identification set to obtain a first script set;
s324: and generating an inspection script packet according to the first script set to obtain the single-node inspection script packet.
According to the embodiment, the routing inspection script required by the node is acquired from the preset routing inspection script library according to the operation authority and routing inspection authority list of the target cluster, the acquired routing inspection script is packaged to form a single-node routing inspection script packet, and the single-node routing inspection script packet is a routing inspection script packet meeting the authority requirement, so that the routing inspection range is controllable, and the data security is improved.
For S321, the patrol authority list includes: cluster operation authority and routing inspection authority.
And inquiring the cluster operation authority from a preset inspection authority list according to the target cluster operation authority, and taking the inspection authority corresponding to the searched cluster operation authority in the inspection authority list as a first inspection authority.
And S322, searching the routing inspection authority in a mapping table in the routing inspection script library according to the first routing inspection authority, and taking each routing inspection script identifier corresponding to the searched routing inspection authority in the mapping table as a first routing inspection script identifier set.
And for S323, aiming at each routing inspection script identifier in the first routing inspection script identifier set, acquiring routing inspection scripts from the routing inspection script set in the routing inspection script library, and taking each acquired routing inspection script as the first script set.
And S324, generating a routing inspection script packet for the first script set by adopting a preset packaging specification, and taking the routing inspection script packet obtained by packaging as the single-node routing inspection script packet.
That is, the single-node patrol script packets of the respective nodes of the node address configuration data are the same.
In an embodiment, the generating a routing inspection script packet for each node in the node address configuration data according to a preset routing inspection script library and the target cluster operation authority to obtain a single-node routing inspection script packet further includes:
s331: taking one node in the node address configuration data as a target node;
s332: acquiring the inspection authority from a preset inspection authority list as a second inspection authority by using the target node and the target cluster operation authority;
s333: acquiring a routing inspection script identifier from a mapping table of the routing inspection script library according to the second routing inspection authority to obtain a second routing inspection script identifier set;
s334: acquiring an inspection script from the inspection script set of the inspection script library according to the second inspection script identification set to obtain a second script set;
s335: generating the inspection script packet according to the second script set to obtain the single-node inspection script packet corresponding to the target node;
s336: and repeating the step of determining one node in the node address configuration data as a target node until the single-node routing inspection script packet corresponding to each node in the node address configuration data is determined.
According to the embodiment, the single-node inspection script packet is carried out on each node in the node address configuration data according to the target cluster operation authority and the inspection authority list, so that the subdivision authority requirement is met, and the data security is further improved.
For S331, a traversal method is adopted, and one node in the node address configuration data is used as a target node.
For S332, associating the target node with the target cluster operation authority to serve as associated data to be queried; and inquiring the associated data in the inspection permission list according to the associated data to be inquired, and taking the inspection permission corresponding to the inquired associated data in the inspection permission list as a second inspection permission.
And S333, searching the second patrol authority in a mapping table in the patrol script library, and taking each patrol script identifier corresponding to the searched patrol authority in the mapping table as a second patrol script identifier set.
And for S334, aiming at each routing inspection script identifier in the second routing inspection script identifier set, acquiring routing inspection scripts from the routing inspection script set in the routing inspection script library, and taking each acquired routing inspection script as a second script set.
And S335, generating the inspection script packet of the second script set by adopting a preset packaging specification, and taking the inspection script packet obtained by packaging as the single-node inspection script packet corresponding to the target node.
For S336, the steps from S331 to S336 are repeatedly executed until the single-node patrol script packet corresponding to each node in the node address configuration data is determined.
In an embodiment, the step of sending the specified single-node patrol inspection script packet to the target server of the node corresponding to the specified single-node patrol inspection script packet and obtaining the single-server patrol inspection report sent by the target server according to the specified single-node patrol inspection script packet includes:
s41: sending the appointed single-node inspection script packet to the target server of the node corresponding to the appointed single-node inspection script packet, and acquiring a single-server script sending completion signal sent by the target server according to the appointed single-node inspection script packet;
s42: responding to the single server script sending completion signal, and sending a single server polling execution signal to the target server;
s43: acquiring a single server polling end signal sent by the target server according to the single server polling execution signal;
s44: responding to the single server polling end signal, and sending a polling report uploading signal to the target server;
s45: and acquiring the single server patrol inspection report sent by the target server according to the appointed single-node patrol inspection script packet.
According to the embodiment, the single server script is used for sending the completion signal, the single server polling execution signal, the single server polling end signal and the polling report uploading signal, so that the automatic control of the polling process of the target server is realized, the polling efficiency is improved, and polling errors and/or omission are avoided.
For S41, sending the appointed single-node patrol script packet to the target server through the communication connection of the target server of the node corresponding to the appointed single-node patrol script packet; when the target server finishes receiving the appointed single-node inspection script packet, generating a single-server script sending finishing signal; and acquiring a single-server script sending completion signal which is sent by the target server and corresponds to the appointed single-node inspection script packet through communication connection with the target server.
And S42, when the single-server script sending completion signal is received, sending a single-server patrol inspection execution signal to the target server which has received the appointed single-node patrol inspection script packet.
For S43, when the target server receives the single server inspection execution signal, the target server executes the appointed single node inspection script packet received in the step S41 to generate a single server inspection end signal after the execution is finished; and acquiring a single server polling end signal which is sent by the target server and corresponds to the single server polling execution signal through communication connection with the target server.
And S44, when the single server inspection end signal is received, sending an inspection report uploading signal to the target server which finishes the inspection.
The polling report uploading signal carries the IP address of the node.
And S45, acquiring the node IP address carried by the target server according to the polling report uploading signal, and sending the single-server polling report corresponding to the appointed single-node polling script packet.
In an embodiment, the step of acquiring the single server patrol inspection end signal sent by the target server according to the single server patrol inspection execution signal includes:
acquiring a single server inspection end signal which is sent by the target server according to the single server inspection execution signal and corresponds to the appointed single node inspection script packet, wherein the target server is used for:
s451: executing a main inspection script in the appointed single-node inspection script packet, and judging whether an operating system inspection script exists in the appointed single-node inspection script packet or not;
s452: if the operating system inspection script exists, executing the operating system inspection script to perform operating system inspection to obtain an operating system inspection report;
s453: executing the main inspection script, and judging whether a database inspection script exists in the appointed single-node inspection script packet or not;
s454: if the database inspection script exists, executing the database inspection script to perform database inspection to obtain a database inspection report;
s455: and compressing the operating system inspection report and/or the database inspection report to obtain the single-server inspection report and the single-server inspection end signal corresponding to the appointed single-node inspection script packet.
In the embodiment, the operating system and/or the database are/is patrolled and examined on the target server by the appointed single-node patrol and examine script packet, so that the patrol and examination of the operating system and the database are realized, and the comprehensiveness of patrol and examination contents is improved.
And S451, executing the main patrol inspection script in the appointed single-node patrol inspection script packet, and judging whether the operating system patrol inspection script exists in the appointed single-node patrol inspection script packet, wherein if the operating system patrol inspection script exists, the operating system patrol inspection is required, and if the operating system patrol inspection script does not exist, the operating system patrol inspection is not required.
For S452, if the operating system polling script exists, which means that the operating system polling is required, the operating system polling script is executed to call a polling script (i.e., one or more of the operating system resource polling script and the operating system log polling script) in the designated single-node polling script packet, which is related to the operating system, to perform the operating system polling, and an operating system polling report is generated according to data obtained by the operating system polling.
And S453, executing the main inspection script, and judging whether a database inspection script exists in the appointed single-node inspection script packet, wherein if the database inspection script exists, the database inspection is required, and if the database inspection script does not exist, the database inspection is not required.
For S454, if the database polling script exists, it means that database polling is required, the database polling script is executed to call database-related polling scripts (i.e., one or more of database-related polling scripts, database state inspection polling scripts, database parameter inspection polling scripts, software version inspection polling scripts, database performance and information inspection polling scripts, backup information inspection polling scripts, log inspection polling scripts, database table usage inspection polling scripts, database high-availability plug-in polling scripts, cluster state inspection polling scripts, log inspection polling scripts of database high-availability plug-ins, state inspection polling scripts of high-availability plug-ins, and authority inspection scripts of database high-availability plug-ins) in the designated single-node polling script packet to perform database polling, and data obtained by the database is generated into a database polling report.
And S455, compressing the operating system inspection report and/or the database inspection report by adopting a preset compression format, and using a compressed packet obtained by compression as the single-server inspection report corresponding to the specified single-node inspection script packet.
In an embodiment, the step of combining the inspection reports of the single servers to obtain the database cluster inspection report includes:
compressing each single server polling report into a file to obtain the database cluster polling report.
In this embodiment, each single server polling report is compressed, so that each single server polling report is stored in the same file package, thereby avoiding file scattering and facilitating transmission of the database cluster polling report.
And compressing each single server polling report by adopting a preset compression format, and packaging the files obtained by compression in the database cluster polling report.
Referring to fig. 2, the present application further provides a database cluster inspection device, the device including:
a request obtaining module 100, configured to obtain a database cluster inspection request;
a node address configuration data obtaining module 200, configured to respond to the database cluster inspection request and obtain node address configuration data;
a single-node patrol script packet determining module 300, configured to obtain a target cluster operation permission corresponding to the database cluster patrol request, and generate a patrol script packet for each node in the node address configuration data according to a preset patrol script library and the target cluster operation permission to obtain a single-node patrol script packet;
the single-server patrol inspection report determining module 400 is configured to send a specified single-node patrol inspection script packet to a target server of a node corresponding to the specified single-node patrol inspection script packet, and obtain a single-server patrol inspection report that is sent by the target server according to the specified single-node patrol inspection script packet, where the specified single-node patrol inspection script packet is corresponding to any one of the nodes in the node address configuration data, and the single-server patrol inspection report includes: an operating system polling report and/or a database polling report;
and the database cluster inspection report determining module 500 is used for combining the inspection reports of the single servers to obtain a database cluster inspection report.
In the embodiment, the inspection range is controllable through the operation authority of the target cluster corresponding to the database cluster inspection request, so that the data security is improved; the single server polling report obtained according to the single-node polling script packet comprises: the operating system inspection report and/or the database inspection report, so that the inspection of the operating system and the database is realized, and the comprehensiveness of the inspection content is improved; the automatic cluster inspection is realized, the inspection efficiency is improved, and inspection errors and/or omission are avoided.
Referring to fig. 3, a computer device, which may be a server and whose internal structure may be as shown in fig. 3, is also provided in the embodiment of the present application. The computer device includes a processor, a memory, a network interface, and a database connected by a system bus. Wherein the computer designed processor is used to provide computational and control capabilities. The memory of the computer device comprises a nonvolatile storage medium and an internal memory. The non-volatile storage medium stores an operating system, a computer program, and a database. The memory provides an environment for the operation of the operating system and the computer program in the non-volatile storage medium. The database of the computer equipment is used for storing data such as database cluster inspection methods and the like. The network interface of the computer device is used for communicating with an external terminal through a network connection. The computer program is executed by a processor to implement a database cluster inspection method. The database cluster polling method comprises the following steps: acquiring a database cluster inspection request; responding to the database cluster inspection request, and acquiring node address configuration data; acquiring a target cluster operation authority corresponding to the database cluster inspection request, and generating an inspection script packet for each node in the node address configuration data according to a preset inspection script library and the target cluster operation authority to obtain a single-node inspection script packet; sending an appointed single-node patrol inspection script packet to a target server of a node corresponding to the appointed single-node patrol inspection script packet, and acquiring a single-server patrol inspection report sent by the target server according to the appointed single-node patrol inspection script packet, wherein the appointed single-node patrol inspection script packet is any one of node address configuration data, the single-node patrol inspection script packet corresponds to the node, and the single-server patrol inspection report comprises: an operating system polling report and/or a database polling report; and combining the inspection reports of the single servers to obtain an inspection report of the database cluster.
In the embodiment, the inspection range is controllable through the operation authority of the target cluster corresponding to the database cluster inspection request, so that the data security is improved; the single server polling report obtained according to the single-node polling script packet comprises: the operating system inspection report and/or the database inspection report, so that the inspection of the operating system and the database is realized, and the comprehensiveness of the inspection content is improved; the automatic cluster inspection is realized, the inspection efficiency is improved, and inspection errors and/or omission are avoided.
An embodiment of the present application further provides a computer-readable storage medium, on which a computer program is stored, where the computer program, when executed by a processor, implements a database cluster inspection method, including: acquiring a database cluster inspection request; responding to the database cluster inspection request, and acquiring node address configuration data; acquiring a target cluster operation authority corresponding to the database cluster inspection request, and generating an inspection script packet for each node in the node address configuration data according to a preset inspection script library and the target cluster operation authority to obtain a single-node inspection script packet; sending an appointed single-node patrol inspection script packet to a target server of a node corresponding to the appointed single-node patrol inspection script packet, and acquiring a single-server patrol inspection report sent by the target server according to the appointed single-node patrol inspection script packet, wherein the appointed single-node patrol inspection script packet is any one of node address configuration data, the single-node patrol inspection script packet corresponds to the node, and the single-server patrol inspection report comprises: an operating system polling report and/or a database polling report; and combining the inspection reports of the single servers to obtain an inspection report of the database cluster.
According to the executed database cluster polling method, the polling range is controllable through the target cluster operation authority corresponding to the database cluster polling request, and the data security is improved; the single server polling report obtained according to the single-node polling script packet comprises: the operating system inspection report and/or the database inspection report, so that the inspection of the operating system and the database is realized, and the comprehensiveness of the inspection content is improved; the automatic cluster inspection is realized, the inspection efficiency is improved, and inspection errors and/or omission are avoided.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by hardware instructions of a computer program, which can be stored in a non-volatile computer-readable storage medium, and when executed, can include the processes of the embodiments of the methods described above. Any reference to memory, storage, database, or other medium provided herein and used in the examples may include non-volatile and/or volatile memory. Non-volatile memory can include read-only memory (ROM), Programmable ROM (PROM), Electrically Programmable ROM (EPROM), Electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM) or external cache memory. By way of illustration and not limitation, RAM is available in a variety of forms such as Static RAM (SRAM), Dynamic RAM (DRAM), Synchronous DRAM (SDRAM), double-rate SDRAM (SSRSDRAM), Enhanced SDRAM (ESDRAM), synchronous link (Synchlink) DRAM (SLDRAM), Rambus Direct RAM (RDRAM), direct bus dynamic RAM (DRDRAM), and bus dynamic RAM (RDRAM).
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, apparatus, article, or method that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, apparatus, article, or method. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, apparatus, article, or method that includes the element.
The above description is only a preferred embodiment of the present application, and not intended to limit the scope of the present application, and all modifications of equivalent structures and equivalent processes, which are made by the contents of the specification and the drawings of the present application, or which are directly or indirectly applied to other related technical fields, are also included in the scope of the present application.

Claims (10)

1. A database cluster inspection method is characterized by comprising the following steps:
acquiring a database cluster inspection request;
responding to the database cluster inspection request, and acquiring node address configuration data;
acquiring a target cluster operation authority corresponding to the database cluster inspection request, and generating an inspection script packet for each node in the node address configuration data according to a preset inspection script library and the target cluster operation authority to obtain a single-node inspection script packet;
sending an appointed single-node patrol inspection script packet to a target server of a node corresponding to the appointed single-node patrol inspection script packet, and acquiring a single-server patrol inspection report sent by the target server according to the appointed single-node patrol inspection script packet, wherein the appointed single-node patrol inspection script packet is any one of node address configuration data, the single-node patrol inspection script packet corresponds to the node, and the single-server patrol inspection report comprises: an operating system polling report and/or a database polling report;
and combining the inspection reports of the single servers to obtain an inspection report of the database cluster.
2. The database cluster polling method according to claim 1, wherein the step of obtaining the target cluster operation authority corresponding to the database cluster polling request comprises:
acquiring a target user identifier corresponding to the database cluster inspection request;
and matching the cluster operation authority with the target user identifier from a preset cluster operation authority list to obtain the target cluster operation authority.
3. The database cluster polling method according to claim 1, wherein the step of generating a polling script packet for each node in the node address configuration data according to a preset polling script library and the target cluster operation authority to obtain a single-node polling script packet includes:
acquiring the inspection authority from a preset inspection authority list as a first inspection authority of the target cluster operation authority;
acquiring a routing inspection script identifier from a mapping table in the routing inspection script library according to the first routing inspection authority to obtain a first routing inspection script identifier set;
acquiring a routing inspection script from the routing inspection script set in the routing inspection script library according to the first routing inspection script identification set to obtain a first script set;
and generating an inspection script packet according to the first script set to obtain the single-node inspection script packet.
4. The database cluster polling method according to claim 1, wherein the step of generating a polling script packet for each node in the node address configuration data according to a preset polling script library and the target cluster operation authority to obtain a single-node polling script packet further comprises:
taking one node in the node address configuration data as a target node;
acquiring the inspection authority from a preset inspection authority list as a second inspection authority by using the target node and the target cluster operation authority;
acquiring a routing inspection script identifier from a mapping table of the routing inspection script library according to the second routing inspection authority to obtain a second routing inspection script identifier set;
acquiring an inspection script from the inspection script set of the inspection script library according to the second inspection script identification set to obtain a second script set;
generating the inspection script packet according to the second script set to obtain the single-node inspection script packet corresponding to the target node;
and repeating the step of determining one node in the node address configuration data as a target node until the single-node routing inspection script packet corresponding to each node in the node address configuration data is determined.
5. The database cluster polling method according to claim 1, wherein the step of sending a specified single-node polling script packet to a target server of the node corresponding to the specified single-node polling script packet and obtaining a single-server polling report sent by the target server according to the specified single-node polling script packet includes:
sending the appointed single-node patrol inspection script packet to the target server of the node corresponding to the appointed single-node patrol inspection script packet, and acquiring a single-server script sending completion signal sent by the target server according to the appointed single-node patrol inspection script packet;
responding to the single server script sending completion signal, and sending a single server polling execution signal to the target server;
acquiring a single server polling end signal sent by the target server according to the single server polling execution signal;
responding to the single server polling end signal, and sending a polling report uploading signal to the target server;
and acquiring the single-server polling report sent by the target server according to the appointed single-node polling script packet.
6. The database cluster polling method according to claim 5, wherein the step of acquiring the single-server polling end signal sent by the target server according to the single-server polling execution signal comprises:
acquiring a single server inspection end signal which is sent by the target server according to the single server inspection execution signal and corresponds to the appointed single node inspection script packet, wherein the target server is used for:
executing a main inspection script in the appointed single-node inspection script packet, and judging whether an operating system inspection script exists in the appointed single-node inspection script packet or not;
if the operating system inspection script exists, executing the operating system inspection script to perform operating system inspection to obtain an operating system inspection report;
executing the main inspection script, and judging whether a database inspection script exists in the appointed single-node inspection script packet or not;
if the database inspection script exists, executing the database inspection script to perform database inspection to obtain a database inspection report;
and compressing the operating system inspection report and/or the database inspection report to obtain the single-server inspection report and the single-server inspection end signal corresponding to the appointed single-node inspection script packet.
7. The database cluster polling method according to claim 1, wherein the step of combining the polling reports of the single-server polling reports to obtain the database cluster polling report comprises:
compressing each single server polling report into a file to obtain the database cluster polling report.
8. A database cluster inspection device, the device comprising:
the request acquisition module is used for acquiring a database cluster inspection request;
the node address configuration data acquisition module is used for responding to the database cluster inspection request and acquiring node address configuration data;
the single-node inspection script packet determining module is used for acquiring a target cluster operation authority corresponding to the database cluster inspection request, and generating an inspection script packet for each node in the node address configuration data according to a preset inspection script library and the target cluster operation authority to obtain a single-node inspection script packet;
the single-server patrol inspection report determining module is used for sending an appointed single-node patrol inspection script packet to a target server of the node corresponding to the appointed single-node patrol inspection script packet and acquiring a single-server patrol inspection report sent by the target server according to the appointed single-node patrol inspection script packet, wherein the appointed single-node patrol inspection script packet is the single-node patrol inspection script packet corresponding to any node in the node address configuration data, and the single-server patrol inspection report comprises: an operating system polling report and/or a database polling report;
and the database cluster inspection report determining module is used for combining the inspection reports of the single servers to obtain a database cluster inspection report.
9. A computer device comprising a memory and a processor, the memory storing a computer program, wherein the processor implements the steps of the method of any one of claims 1 to 7 when executing the computer program.
10. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the steps of the method of any one of claims 1 to 7.
CN202210032466.4A 2022-01-12 2022-01-12 Database cluster patrol method, database cluster patrol device, database cluster patrol equipment and database cluster patrol storage medium Pending CN114444072A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210032466.4A CN114444072A (en) 2022-01-12 2022-01-12 Database cluster patrol method, database cluster patrol device, database cluster patrol equipment and database cluster patrol storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210032466.4A CN114444072A (en) 2022-01-12 2022-01-12 Database cluster patrol method, database cluster patrol device, database cluster patrol equipment and database cluster patrol storage medium

Publications (1)

Publication Number Publication Date
CN114444072A true CN114444072A (en) 2022-05-06

Family

ID=81367331

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210032466.4A Pending CN114444072A (en) 2022-01-12 2022-01-12 Database cluster patrol method, database cluster patrol device, database cluster patrol equipment and database cluster patrol storage medium

Country Status (1)

Country Link
CN (1) CN114444072A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115083030A (en) * 2022-05-18 2022-09-20 中诚信征信有限公司 Service inspection method and device and electronic equipment
CN115480995A (en) * 2022-11-01 2022-12-16 杭州沃趣科技股份有限公司 Database inspection method, device, equipment and medium
CN117708382A (en) * 2023-10-12 2024-03-15 广州信邦智能装备股份有限公司 Inspection data processing method, intelligent factory inspection system and related medium program

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115083030A (en) * 2022-05-18 2022-09-20 中诚信征信有限公司 Service inspection method and device and electronic equipment
CN115480995A (en) * 2022-11-01 2022-12-16 杭州沃趣科技股份有限公司 Database inspection method, device, equipment and medium
CN115480995B (en) * 2022-11-01 2023-02-28 杭州沃趣科技股份有限公司 Database inspection method, device, equipment and medium
CN117708382A (en) * 2023-10-12 2024-03-15 广州信邦智能装备股份有限公司 Inspection data processing method, intelligent factory inspection system and related medium program

Similar Documents

Publication Publication Date Title
CN110647438B (en) Event monitoring method and device, computer equipment and storage medium
CN114444072A (en) Database cluster patrol method, database cluster patrol device, database cluster patrol equipment and database cluster patrol storage medium
CN110069572B (en) HIVE task scheduling method, device, equipment and storage medium based on big data platform
CN108874644B (en) Data monitoring method and device, computer equipment and storage medium
WO2020119434A1 (en) Method and apparatus for interface data processing, method and apparatus for automated testing, device, and medium
CN108197200B (en) Log tracking method and device, computer equipment and storage medium
CN112631913B (en) Method, device, equipment and storage medium for monitoring operation faults of application program
CN112910945A (en) Request link tracking method and service request processing method
US20110191394A1 (en) Method of processing log files in an information system, and log file processing system
CN112181945A (en) Data archiving processing method and device, computer equipment and storage medium
US20200327045A1 (en) Test System and Test Method
CN110162420B (en) Data auxiliary positioning method and device, computer equipment and storage medium
US7913233B2 (en) Performance analyzer
CN112698820B (en) Unified monitoring management method and device for memory and switch and computer equipment
CN110063042B (en) Database fault response method and terminal thereof
WO2022105139A1 (en) Database data object relation graph generation method and apparatus, and device, and medium
CN111611009A (en) Database script management method and device, computer equipment and storage medium
CN114297231A (en) Method for intelligently collecting logs and data and quickly forming relational topology
CN112564980A (en) Service monitoring method and system based on micro-service architecture
CN114697232A (en) Skywalking probe index data acquisition system and method and electronic equipment
CN115794839A (en) Data collection method based on Php + Mysql system, computer equipment and storage medium
CN111694734A (en) Software interface checking method and device and computer equipment
CN113420046A (en) Data operation method, device, equipment and storage medium of non-relational database
CN111752838A (en) Question checking method and device, server and storage medium
CN111654553B (en) Middleware-based management and control operation method and device, computer equipment and medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination