CN114911515A - Configuration management method, device, equipment and medium - Google Patents

Configuration management method, device, equipment and medium Download PDF

Info

Publication number
CN114911515A
CN114911515A CN202210367731.4A CN202210367731A CN114911515A CN 114911515 A CN114911515 A CN 114911515A CN 202210367731 A CN202210367731 A CN 202210367731A CN 114911515 A CN114911515 A CN 114911515A
Authority
CN
China
Prior art keywords
middleware
target
target data
data
distinguished
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210367731.4A
Other languages
Chinese (zh)
Inventor
王梦翔
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ping An Asset Management Co Ltd
Original Assignee
Ping An Asset Management Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ping An Asset Management Co Ltd filed Critical Ping An Asset Management Co Ltd
Priority to CN202210367731.4A priority Critical patent/CN114911515A/en
Publication of CN114911515A publication Critical patent/CN114911515A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/70Software maintenance or management
    • G06F8/71Version control; Configuration management

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Testing And Monitoring For Control Systems (AREA)
  • General Factory Administration (AREA)

Abstract

The embodiment of the invention relates to the field of monitoring, and provides a configuration management method, which comprises the following steps: acquiring a target process set of a target host, wherein the target process set comprises a middleware process and an application process to be distinguished; acquiring a preset middleware information base, wherein the preset middleware information base comprises information of a plurality of known middleware processes; and comparing the process to be distinguished with the known middleware process, and distinguishing the middleware process and the application process in the target process set according to a comparison result. The configuration management method provided by the embodiment of the invention can effectively and automatically distinguish the middleware process and the application process of the target host, is convenient for the configuration management platform to carry out classification management on the middleware process and the application process of the target host, and improves the efficiency of configuration management.

Description

Configuration management method, device, equipment and medium
Technical Field
The present invention relates to the field of monitoring, and in particular, to a configuration management method, apparatus, device, and medium.
Background
Configuration management is a management process that describes, tracks, controls, and reports all devices or systems in an IT infrastructure, through which effective management, tracking, and control of all configuration items can be achieved, thereby effectively supporting the operation of IT services and infrastructure, wherein the devices and systems in configuration management may be collectively referred to as configuration items.
The configuration items usually include middleware processes and application processes, and in order to implement effective configuration management, the middleware processes and the application processes of the configuration items need to be distinguished, so that the process conditions in the configuration items can be accurately known, and thus, the processes are further subjected to effective classification management.
However, there is currently no effective technical means available to distinguish between middleware processes and application processes.
Disclosure of Invention
The invention aims to provide a configuration management method, a device, equipment and a medium, which are used for solving the following technical problems: currently, no effective technical means exists for distinguishing the middleware process from the application process.
One aspect of the embodiments of the present invention provides a configuration management method, including: acquiring a target process set of a target host, wherein the target process set comprises a middleware process to be distinguished and an application process; acquiring a preset middleware information base, wherein the preset middleware information base comprises information of a plurality of known middleware processes; and comparing the processes to be distinguished with the known middleware processes, and distinguishing the middleware processes and the application processes in the target process set according to the comparison result.
Optionally, comparing the process to be distinguished with a known middleware process, and distinguishing the middleware process and the application process in the target process set according to the comparison result, including: acquiring first target data of a process to be distinguished and second target data of a known middleware process; and under the condition that the deviation of the first target data and the second target data is within a preset range, determining the process to be distinguished as a middleware process of the target host, and under the condition that the deviation of the first target data and the second target data is out of the preset range, determining the process to be distinguished as an application process of the target host.
Optionally, the first target data and the second target data include a plurality of sub-data, each sub-data corresponds to a preset weight, and after the first target data of the process to be distinguished and the second target data of the known middleware process are obtained, the method further includes: acquiring deviation of each subdata in the first target data and the second target data; and determining the deviation of the first target data and the second target data according to the deviation of each sub-data and the preset weight corresponding to each sub-data.
Optionally, before acquiring the preset middleware information base, the method further includes: acquiring N samples of a known middleware process; acquiring third target data of each sample in the N samples; and obtaining second target data of the known middleware process according to the third target data of the N samples.
Optionally, obtaining a target process set of the target host includes: and acquiring a process set of the target host, and removing the operating system process of the target host from the process set of the target host to obtain the target process set.
Optionally, the configuration management method further includes: acquiring the name of a middleware process of a target host; searching the instruction for checking the version according to the name of the middleware process, and forming a checking instruction set according to the instruction for checking the version; the checking instruction set is issued to the environment monitoring program of the target host, so that the environment monitoring program can obtain the version information of the middleware process of the target host according to the checking instruction set; and receiving the version information of the middleware process of the target host reported by the environment monitoring program.
Optionally, searching for the version view instruction according to the name of the middleware process, and forming a view instruction set according to the version view instruction, including: utilizing a crawler program to execute the following steps: crawling a search result of a version viewing method based on the name of the middleware process; selecting a version checking method with the highest occurrence frequency in the search results; and crawling the instruction of the version viewing method with the highest current frequency to form a viewing instruction set.
An aspect of an embodiment of the present invention further provides a configuration management apparatus, including: the first acquisition module is used for acquiring a target process set of a target host, wherein the target process set comprises a middleware process to be distinguished and an application process; the second acquisition module is used for acquiring a preset middleware information base, wherein the preset middleware information base comprises information of a plurality of known middleware processes; and the distinguishing module is used for comparing the process to be distinguished with the known middleware process and distinguishing the middleware process and the application process in the target process set according to the comparison result.
An aspect of the embodiments of the present invention further provides a computer device, which includes a memory, a processor, and a computer program stored in the memory and running on the processor, and when the processor executes the computer program, the computer device is configured to implement the steps of the configuration management method described above.
An aspect of the embodiments of the present invention further provides a computer-readable storage medium, in which a computer program is stored, where the computer program is executable by at least one processor to cause the at least one processor to execute the steps of the configuration management method.
The configuration management method, device, equipment and medium provided by the embodiment of the invention have the following advantages:
the target process set of the target host is compared with the known middleware processes in the preset middleware information base, and the middleware processes and the application processes in the target process set are distinguished according to the comparison result, so that the middleware processes and the application processes of the target host can be effectively and automatically distinguished according to the preset middleware information base, the configuration management platform can conveniently carry out classification management on the middleware processes and the application processes of the target host, and the configuration management efficiency is improved.
Drawings
FIG. 1 schematically illustrates an environmental architecture diagram of an embodiment of the present invention;
fig. 2 is a flow chart schematically illustrating a configuration management method according to a first embodiment of the present invention;
FIG. 3 is a sub-step of step S403 in FIG. 2;
FIG. 4 is a flow chart of the addition step of FIG. 3;
FIG. 5 is a flow chart of the addition step of FIG. 2;
FIG. 6 is another flow chart of the adding step of FIG. 2;
fig. 7 is a block diagram schematically showing a configuration management apparatus according to a second embodiment of the present invention;
fig. 8 is a diagram schematically showing the hardware architecture of a computer apparatus according to a third embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention is further described in detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
It should be noted that the descriptions relating to "first", "second", etc. in the embodiments of the present invention are only for descriptive purposes and are not to be construed as indicating or implying relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defined as "first" or "second" may explicitly or implicitly include at least one such feature. In addition, technical solutions between various embodiments may be combined with each other, but must be realized by a person skilled in the art, and when the technical solutions are contradictory or cannot be realized, such a combination should not be considered to exist, and is not within the protection scope of the present invention.
In the description of the present invention, it should be understood that the numerical references before the steps do not identify the order of performing the steps, but merely serve to facilitate the description of the present invention and to distinguish each step, and thus should not be construed as limiting the present invention.
Referring to fig. 1, an environment architecture diagram of a configuration management method according to an embodiment of the present invention is schematically shown. As shown in fig. 1, the server 100 is connected to a general host 300 through a network 200, where the server 100 may be specifically a configuration management platform, and the number of the general hosts 300 is several. During configuration management, the server 100 may obtain configuration information of the configuration item of the general host 300 through the network 200, or the general host 300 may report the configuration information of the configuration item to the server 100 through the network 200.
In an exemplary embodiment, the server 100 may index a data center, such as a single house, or be distributed over different geographic locations (e.g., over several houses). The server 100 may provide services through one or more networks 200. Network 200 includes various network devices such as routers, switches, multiplexers, hubs, modems, bridges, repeaters, firewalls, proxy devices, and/or the like. Network 200 may include physical links such as coaxial cable links, twisted pair cable links, fiber optic links, combinations thereof, and/or the like. The network 200 may include wireless links, such as cellular links, satellite links, Wi-Fi links, and/or the like. The generic host 300 may include devices such as a mobile device, a tablet, a laptop, a smart device (e.g., smart apparel, smart watch, smart glasses), a virtual reality headset, a gaming device, a set-top box, a digital streaming device, a bot, a vehicle terminal, a smart television, a television box, or an e-book reader.
The configuration management scheme of the embodiments of the present invention will be described below by several embodiments.
Example one
Fig. 2 schematically shows a flowchart of a configuration management method according to a first embodiment of the present invention. It should be noted that the executing body of the configuration management method according to the first embodiment of the present invention may be the server 100 in fig. 1.
As shown in fig. 2, the configuration management method includes:
step S401, a target process set of a target host is obtained, wherein the target process set comprises a middleware process to be distinguished and an application process.
The target host may be one of the general hosts 300 in fig. 1.
When the target process set of the target host is obtained, a preset program is deployed on each target host, and the preset program can obtain the process information of the target host, so that the target process set of the target host is obtained. When the preset program is deployed, the deployment may be uniformly issued by the configuration management platform corresponding to the server 100, or may be manually deployed on each target host by a human. The preset program may be an environment monitoring program, for example, a agent of Zabbix, and a specific preset program is not limited herein, and only needs to acquire a process of a target host, where Zabbix is a network monitoring and management system, and is based on a Server (Server) -Client architecture, and may be used to monitor states of various network services, servers, network machines, and the like. After the preset program is deployed, the preset program can be configured, so that the process of the target host can be acquired according to the configuration. Besides the information of the process of the target host, the operating system information and the hardware information of the target host, such as version information of the operating system, CPU related information, host name information of the target host, and network connection information of the target host, such as network connection information of a source address, a destination address, a port, and the like in network connection of the target host, can be obtained by configuring a preset program, so as to obtain network topology information of the target host, and facilitate the configuration of the management platform for corresponding operation and maintenance.
In an exemplary embodiment, obtaining the target process set of the target host may further include: and acquiring a process set of the target host, and removing the operating system process of the target host from the process set of the target host to obtain the target process set of the target host.
Because the process set of the target host comprises three types of processes, namely an operating system process, a middleware process and an application process, and the operating system process is fixed and known, the operating system process can be removed from the process set of the target host to obtain the target process set which only comprises the undifferentiated middleware process and the application process, namely the target host. When the operating system process is removed from the process set of the target host, a process in the process set can be determined as the operating system process according to information such as the name and the path of the process, and then the operating system process can be removed from the process set.
By removing the operating system process from the process set of the target host, only the middleware process and the application process are left in the removed process set of the target host, so that the middleware process and the application process can be further distinguished conveniently.
Step S402, a preset middleware information base is obtained, wherein the preset middleware information base comprises information of a plurality of known middleware processes.
The preset middleware information base may be pre-constructed, and when the preset middleware information base is constructed, various information of the known middleware process, such as the name, path (directory), start user, open port, and the like of the known middleware process, may be pre-entered, and the specific entered information may be determined according to actual needs, which is not limited herein.
Step S403, comparing the process to be distinguished with the known middleware process, and distinguishing the middleware process and the application process in the target process set according to the comparison result.
When comparing the processes to be distinguished in the target process set with the known middleware processes, the information of the processes to be distinguished may be compared with the information of the known middleware processes, for example, the names of the processes to be distinguished are compared with the names of the known middleware processes, if the names are the same, the processes to be distinguished are determined to be the middleware processes, otherwise, the processes are application processes; for another example, the path of the process to be distinguished is compared with the name of a known middleware process, and if the rest of the paths are the same except for the host name, the process to be distinguished is determined to be the middleware process, otherwise, the process is the application process.
When the information of the process to be distinguished is compared with the information of the known middleware process, if the comparison includes multiple kinds of information, the process to be distinguished is determined to be the middleware process under the condition that all the information is in accordance, or the process to be distinguished is determined to be the middleware process under the condition that part of the information is in accordance, which may be specifically determined according to actual needs, and is not limited here.
According to the configuration management method provided by the embodiment of the invention, the target process set of the target host is compared with the known middleware process in the preset middleware information base, and the middleware process and the application process in the target process set are distinguished according to the comparison result, so that the middleware process and the application process of the target host can be effectively and automatically distinguished according to the preset middleware information base, a configuration management platform can conveniently carry out classification management on the middleware process and the application process of the target host, and the configuration management efficiency is improved.
In an exemplary embodiment, as shown in fig. 3, step S403 may further include:
step S4031, obtain the first target data of the process to be distinguished and the second target data of the known middleware process.
The first target data refers to target data of processes to be distinguished, and the second target data is target data of known middleware processes. The target data may be information of the process, such as the name, path, start user, and open port of the process.
Step S4032, when the deviation of the first target data from the second target data is within the preset range, determine that the process to be distinguished is a middleware process of the target host, and when the deviation of the first target data from the second target data is outside the preset range, determine that the process to be distinguished is an application process of the target host.
It can be understood that, because the first target data and the second target data may not be completely the same due to factors such as a scene, a version, or a naming mode, for example, names of several letters or paths are different from each other, if the processes to be distinguished are determined to be middleware processes according to the completely same criteria, a large error may be caused, and therefore, by comparing the first target data and the second target data within a preset range, the error of the determination may be reduced.
The preset range may be determined according to practical situations, and is not limited herein. When the target data includes a plurality of items of data, a preset range may be independently set for each item of data, that is, the preset ranges corresponding to the items of data may be different from each other.
The preset range may be a preset threshold, that is, whether the process to be distinguished is a middleware process is determined by the preset threshold. For example, when the deviation of the first target data and the second target data is less than or equal to a preset threshold, the process to be distinguished is determined to be a middleware process of the target host, and when the deviation of the first target data and the second target data is greater than the preset threshold, the process to be distinguished is determined to be an application process of the target host. When the deviation of the first target data and the second target data is determined, the deviation degree of the first target data and the second target data may be calculated according to a preset mode, for example, the cosine similarity of the first target data and the second target data is calculated, and then the deviation degree is obtained according to the cosine similarity, and the specific preset mode is not limited herein.
Determining the process to be distinguished as a middleware process of the target host under the condition that the deviation of the first target data and the second target data is within a preset range, and determining the process to be distinguished as an application process of the target host under the condition that the deviation of the first target data and the second target data is outside the preset range; because the first target data and the second target data may be different, whether the process to be distinguished is the middleware process of the target host is judged through the preset range, so that the judgment error can be reduced, and the distinguishing precision of the process to be distinguished is improved.
In an exemplary embodiment, the first target data and the second target data include a plurality of sub-data items, each sub-data item corresponds to a preset weight, as shown in fig. 4, after step S4031, the method may further include:
step S4033, a deviation of each sub data in the first target data and the second target data is obtained.
Namely, the deviation of each sub data in the first target data from the corresponding sub data in the second target data is calculated respectively. For example, if the target data includes several items of sub-data, i.e., a name, a path, and an open port, a deviation between the name in the first target data and the name in the second target data, a deviation between the path in the first target data and the path in the second target data, and a deviation between the open port in the first target data and the port in the second target data are calculated, respectively.
Step S4034, determining a deviation of the first target data from the second target data according to the deviation of each sub-data and the preset weight corresponding to each sub-data.
Because the deviation degrees of each sub-data are different and the influence on the overall judgment is possibly different, the preset weight corresponding to each sub-data can be respectively set according to the actual situation. For example, if the sub-data of the path deviates greatly, and the probability that the process to be distinguished is actually the middleware process is still high, the preset weight corresponding to the sub-data of the path can be appropriately reduced; for another example, if the sub-data of the name has a large deviation and the probability that the process to be distinguished is actually the middleware process is small, the preset weight corresponding to the sub-data of the name can be appropriately increased. It can be understood that, because the deviation degrees of each sub-data are not the same, the preset weight corresponding to each sub-data may also be partially or completely the same, as long as the final calculation result can better reflect the actual situation of the process to be distinguished.
In addition, it should be noted that, due to reasons such as an abnormal obtaining route or obtaining process, the first target data and the second target data may relatively lack some sub data, for example, the first target data does not have a name of the obtained process, and the second target data has a name of the process; or, the first target data has an open port for acquiring the process, and the second target data does not have an open port for logging in the process. In these cases, when calculating the deviation between the first target data and the second target data, the deviation may be calculated using the second target data as a standard, or may be calculated using a principle that the deviation is calculated only with the corresponding sub-data. For example, when the first target data includes four sub-data of a process name, a path, a start user, and an open port, and the second target data includes three sub-data of a process path, a start user, and an open port, since the sub-data of the name does not have corresponding data in the second target data, if the calculation is performed according to the principle that corresponding data exists, only the deviations of the three sub-data of the path, the start user, and the open port can be calculated.
By acquiring the deviation of each subdata in the first target data and the second target data and determining the deviation of the first target data and the second target data according to the preset weight corresponding to each subdata, the deviation of the process to be distinguished and the known middleware process can be more consistent with the actual situation by setting a proper weight, so that the judgment accuracy is improved.
In an exemplary embodiment, as shown in fig. 5, before step S402, that is, before acquiring the preset middleware information base, the method may further include:
in step S404, N samples of known middleware processes are obtained.
Samples of known middleware processes can be manually input in advance, for example, input is performed according to some host of known data, and information such as names, paths, starting users, open ports and the like of the known middleware processes on the known middleware processes is input to a specified position of the configuration management platform, so that the configuration management platform can obtain the samples at the specified position.
It should be understood that, when acquiring N samples of known middleware processes, acquiring N samples of one known middleware process, after performing steps S404 to S406, acquiring N samples of another known middleware process, and repeatedly performing steps S404 to S406 until all known middleware processes have performed steps S404 to S406, thereby obtaining the preset middleware information base. N can be a natural number which is greater than or equal to 1, the larger the numerical value of N is, the more the number of samples is, and the more accurate the obtained preset middleware information base is.
Optionally, if it is determined that the process to be distinguished is the middleware process, the newly determined middleware process may be used as a new sample, and steps S404 to S406 are executed again, so that the second target data of the known middleware process corresponding to the newly determined middleware process in the preset middleware information base may be updated, so that the second target data serving as a criterion for determining deviation is more accurate.
In step S405, third target data of each of the N samples is acquired.
That is, the target data of each of the N samples, such as the name, path, start user, and open port, is obtained as the third target data.
Step S406, obtaining second target data of the known middleware process according to the third target data of the N samples.
When the second target data of the known middleware process is obtained according to the third target data of the N samples, the third target data with the highest repetition frequency among the N samples may be used as the second target data, for example, if the open ports of N-1 samples in the N samples are 1520 and the open port of only one sample is another value, the sample with the open port being another value may be considered as a special sample, and the data of the open port in the second target data may be set to 1520, so that the 1520 is used as a determination criterion to determine a deviation between the data of the open port in the process to be distinguished and the criterion.
Optionally, since each sample is valid data, the third target data in the N samples may also be the second target data of the known middleware process. For example, if the open ports of N-1 samples of the N samples are 1520, and the open port of the remaining one sample is 1510, the third target data 1520 and 1510 may be both used as the second target data.
When a single item of data in the second target data contains more than two numerical values, if deviation of the target data of the process to be distinguished and the known middleware process needs to be calculated, the target data in the first target data of the process to be distinguished can be matched with each numerical value of the target data in the second target data, and if matching is successful, no deviation is judged; and if the matching is unsuccessful, calculating the deviation of the two according to a preset rule. The preset rule is, for example, to deviate the target data with the highest repetition frequency among the N samples as a standard, or to calculate a deviation of each value included in the target data, and the preset rule may be specifically set according to an actual situation, and is not limited herein, on the basis that a deviation result meets the actual situation.
The method comprises the steps of obtaining N samples of the known middleware process, obtaining second target data of the known middleware process according to the third target data of each sample in the N samples, obtaining the second target data of the known middleware process as a standard according to the sample data, obtaining a more accurate preset middleware information base when the sample data is more, and being beneficial to improving the accuracy of distinguishing the processes to be distinguished.
In an exemplary embodiment, as shown in fig. 6, a configuration management method provided in the first embodiment of the present invention may further include:
step S407, the name of the middleware process of the target host is acquired.
Under the condition that the target process set of the target host contains the name, directly acquiring the name of the middleware process from the target process set; in the case where the target process set of the target host does not include a name, the corresponding name may be acquired in the second target data of the known middleware process of the preset middleware information base corresponding to the middleware process of the target host.
Step S408, searching the version checking instruction according to the name of the middleware process, and forming a checking instruction set according to the version checking instruction.
It should be noted that the instruction for version checking may be preset in the configuration management platform, and after determining that the process to be distinguished is the middleware process, the instruction for version checking is obtained to form a checking instruction set, and the instruction for version checking is searched according to the name of the middleware process, and the checking instruction set is formed according to the instruction for version checking, which may be a case where the instruction for version checking in the middleware process does not exist in the configuration management platform. In addition, the instruction for checking the version is obtained through searching and can be stored in the configuration management platform, so that the subsequent operation can be conveniently and directly carried out from the configuration management platform. Step S408 may be executed specifically, whether a corresponding version checking instruction exists is queried on the configuration management platform according to the name of the middleware process, and if so, the checking instruction set is issued to the environment monitoring program of the target host; if the version checking instruction does not exist, searching the version checking instruction according to the name of the middleware process, and forming a checking instruction set according to the version checking instruction.
When searching for a version view instruction according to the name of the middleware process, the name of the middleware process and similar keywords such as "version view instruction" may be searched for in a specified website. After searching, a viewing instruction set can be formed manually, or a version viewing instruction can be automatically determined and obtained according to a certain context rule, and then the viewing instruction set is formed according to the obtained version viewing instruction. Because the automatically acquired version checking instruction may be wrong, if the version information of the automatically acquired version checking instruction is not subsequently received and reported, indicating that the automatically acquired version checking instruction is wrong, a prompt message related to the wrong instruction can be sent out, and a manager configured with the management platform carries out corresponding correction.
Step S409, the viewing instruction set is issued to the environment monitoring program of the target host, so that the environment monitoring program can obtain the version information of the middleware process of the target host according to the viewing instruction set.
That is, the viewing instruction set is an instruction set suitable for the environment monitoring program of the target host, so that after receiving the viewing instruction set, the environment monitoring program of the target host can execute the corresponding viewing instruction set to obtain the version information of the middleware process.
Step S410, receiving the version information of the middleware process of the target host reported by the environment monitoring program.
The version information of the middleware process can be automatically acquired by searching the version checking instruction according to the name of the middleware process, forming a checking instruction set according to the version checking instruction, and sending the checking instruction set to the environment monitoring program of the target host; meanwhile, an instruction set for checking the version can be automatically formed when the configuration management platform has no corresponding instruction for checking the version, and automatic acquisition of the version information is facilitated.
In an exemplary embodiment, in step S408, searching for a version view instruction according to the name of the middleware process, and forming a view instruction set according to the version view instruction may include: utilizing a crawler program to execute the following steps: crawling a search result of the version viewing method based on the name of the middleware process; selecting a version checking method with the highest occurrence frequency in the search results; and crawling the instruction of the version viewing method with the highest current frequency to form a viewing instruction set.
When the crawler program is used for crawling a search result of the version viewing method based on the name of the middleware process, the crawler program can automatically splice similar keywords such as the name of the middleware process, a version viewing instruction and the like, and then crawl a webpage to a specified website; after crawling the web page, analyzing the search result, and acquiring the version checking method with the highest occurrence frequency, for example, if the version checking method A appears 100 times, the version checking method B appears 2 times, and the occurrence frequency of the version checking method A is highest, the version checking method A is selected; after determining the version-viewing method, the instruction for crawling the version-viewing method into one of the search results (e.g., the first search result) according to a certain context rule forms an instruction set.
Searching of a version checking method is carried out through a crawler program, and a checking instruction set is formed by crawling corresponding instructions according to a searching result, so that the checking instruction set can be automatically formed; and the crawler program selects the version checking method with the highest occurrence frequency in the search results, and because the accuracy of the version checking method with the highest occurrence frequency is higher, the instruction of the version checking method with the highest occurrence frequency is crawled to form a checking instruction set, so that the efficiency of the checking instruction set for forming the version can be improved.
Example two
Fig. 7 schematically shows a block diagram of a configuration management apparatus 500 according to a second embodiment of the present invention, where the configuration management apparatus 500 may be divided into one or more program modules, and the one or more program modules are stored in a storage medium and executed by one or more processors to implement the second embodiment of the present invention. The program modules referred to in the embodiments of the present invention refer to a series of computer program instruction segments that can perform specific functions, and the following description will specifically describe the functions of the program modules in the embodiments.
As shown in fig. 7, the configuration management apparatus 500 may include a first obtaining module 501, a second obtaining module 502, and a distinguishing module 503.
A first obtaining module 501, configured to obtain a target process set of a target host, where the target process set includes a middleware process to be distinguished and an application process;
a second obtaining module 502, configured to obtain a preset middleware information base, where the preset middleware information base includes information of a plurality of known middleware processes;
a distinguishing module 503, configured to compare the process to be distinguished with a known middleware process, and distinguish the middleware process and the application process in the target process set according to a comparison result.
In an exemplary embodiment, the distinguishing module 503 is further configured to: acquiring first target data of a process to be distinguished and second target data of a known middleware process; and under the condition that the deviation of the first target data and the second target data is within a preset range, determining the process to be distinguished as a middleware process of the target host, and under the condition that the deviation of the first target data and the second target data is out of the preset range, determining the process to be distinguished as an application process of the target host.
In an exemplary embodiment, the configuration management apparatus 500 provided in the second embodiment of the present invention further includes a determining module (not shown in the figure), and the determining module is configured to: acquiring deviation of each subdata in the first target data and the second target data; and determining the deviation of the first target data and the second target data according to the deviation of each sub-data and the preset weight corresponding to each sub-data.
In an exemplary embodiment, the configuration management apparatus 500 provided in the second embodiment of the present invention further includes a processing module (not shown in the figure), and the processing module is configured to: acquiring N samples of a known middleware process; acquiring third target data of each sample in the N samples; and obtaining second target data of the known middleware process according to the third target data of the N samples.
In an exemplary embodiment, the configuration management apparatus 500 provided in the second embodiment of the present invention further includes a removing module (not shown in the figure), where the removing module is configured to: and acquiring a process set of the target host, and removing the operating system process of the target host from the process set of the target host to obtain the target process set.
In an exemplary embodiment, the configuration management apparatus 500 provided in the second embodiment of the present invention further includes a third obtaining module (not shown in the figure), where the third obtaining module is configured to: acquiring the name of a middleware process of a target host; searching the version checking instruction according to the name of the middleware process, and forming a checking instruction set according to the version checking instruction; the checking instruction set is issued to the environment monitoring program of the target host, so that the environment monitoring program can obtain the version information of the middleware process of the target host according to the checking instruction set; and receiving the version information of the middleware process of the target host reported by the environment monitoring program.
In an exemplary embodiment, the third obtaining module is further configured to: utilizing a crawler program to execute the following steps: crawling a search result of the version viewing method based on the name of the middleware process; selecting a version checking method with the highest occurrence frequency in the search results; and crawling the instruction of the version viewing method with the highest current frequency to form a viewing instruction set.
EXAMPLE III
Fig. 8 schematically shows a hardware architecture diagram of a computer device 600 suitable for the configuration management method according to a third embodiment of the present invention. The computer device 600 may be a device capable of automatically performing numerical calculations and/or data processing according to instructions set or stored in advance. For example, the server may be a rack server, a blade server, a tower server or a rack server (including an independent server or a server cluster composed of a plurality of servers), a gateway, and the like. As shown in fig. 8, the computer device 600 includes at least, but is not limited to: the memory 601, processor 602, network interface 603 may be communicatively linked to each other via a system bus. Wherein:
the memory 601 includes at least one type of computer-readable storage medium including a flash memory, a hard disk, a multimedia card, a card-type memory (e.g., SD or DX memory, etc.), a Random Access Memory (RAM), a Static Random Access Memory (SRAM), a read-only memory (ROM), an electrically erasable programmable read-only memory (EEPROM), a programmable read-only memory (PROM), a magnetic memory, a magnetic disk, an optical disk, and the like. In some embodiments, the storage 601 may be an internal storage module of the computer device 600, such as a hard disk or a memory of the computer device 600. In other embodiments, the memory 601 may also be an external storage device of the computer device 600, such as a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), and the like, provided on the computer device 600. Of course, the memory 601 may also include both internal and external memory modules of the computer device 600. In this embodiment, the memory 601 is generally used for storing an operating system and various application software installed in the computer device 600, such as program codes of a configuration management method. In addition, the memory 601 can also be used to temporarily store various types of data that have been output or are to be output.
Processor 602 may be a Central Processing Unit (CPU), controller, microcontroller, microprocessor, or other data Processing chip in some embodiments. The processor 602 is generally configured to control overall operations of the computer apparatus 600, such as performing control and processing related to data interaction or communication with the computer apparatus 600. In this embodiment, the processor 602 is configured to execute program codes stored in the memory 601 or process data.
The network interface 603 may comprise a wireless network interface or a wired network interface, and the network interface 603 is typically used to establish communication links between the computer device 600 and other computer devices. For example, the network interface 603 is used to connect the computer apparatus 600 to an external terminal via a network, establish a data transmission channel and a communication link between the computer apparatus 600 and the external terminal, and the like. The network may be a wireless or wired network such as an Intranet (Intranet), the Internet (Internet), a Global System of Mobile communication (GSM), Wideband Code Division Multiple Access (WCDMA), a 4G network, a 5G network, Bluetooth (Bluetooth), or Wi-Fi.
It is noted that fig. 8 only shows a computer device with components 601 and 603, but it is to be understood that not all of the shown components are required to be implemented, and that more or fewer components may be implemented instead.
In this embodiment, the configuration management method stored in the memory 601 may be further divided into one or more program modules and executed by one or more processors (in this embodiment, the processor 602) to implement the embodiment of the present invention.
Example four
The present embodiment also provides a computer-readable storage medium, such as a flash memory, a hard disk, a multimedia card, a card-type memory (e.g., SD or DX memory, etc.), a Random Access Memory (RAM), a Static Random Access Memory (SRAM), a read-only memory (ROM), an electrically erasable programmable read-only memory (EEPROM), a programmable read-only memory (PROM), a magnetic memory, a magnetic disk, an optical disk, a server, an App application mall, etc., on which a computer program is stored, which when executed by a processor implements corresponding functions. The computer-readable storage medium of this embodiment, when executed by a processor, implements the configuration management method of the first embodiment.
The above-mentioned serial numbers of the embodiments of the present invention are merely for description and do not represent the merits of the embodiments.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner.
The above description is only a preferred embodiment of the present invention, and is not intended to limit the scope of the present invention, and all equivalent structures or equivalent processes performed by the present invention or directly or indirectly applied to other related technical fields are also included in the scope of the present invention.

Claims (10)

1. A configuration management method, comprising:
acquiring a target process set of a target host, wherein the target process set comprises a middleware process and an application process to be distinguished;
acquiring a preset middleware information base, wherein the preset middleware information base comprises information of a plurality of known middleware processes;
and comparing the processes to be distinguished with the known middleware processes, and distinguishing the middleware processes and the application processes in the target process set according to a comparison result.
2. The method according to claim 1, wherein comparing the process to be distinguished with the known middleware process, and distinguishing the middleware process and the application process in the target process set according to a comparison result comprises:
acquiring first target data of the process to be distinguished and second target data of the known middleware process;
determining that the process to be distinguished is a middleware process of the target host under the condition that the deviation of the first target data and the second target data is within a preset range, and determining that the process to be distinguished is an application process of the target host under the condition that the deviation of the first target data and the second target data is out of the preset range.
3. The configuration management method according to claim 2, wherein the first target data and the second target data include a plurality of sub-data items, each sub-data item corresponds to a preset weight, and after the obtaining of the first target data of the process to be distinguished and the second target data of the known middleware process, the method further includes:
acquiring deviation of each subdata in the first target data and the second target data;
and determining the deviation of the first target data and the second target data according to the deviation of each sub-data and the preset weight corresponding to each sub-data.
4. The configuration management method according to any one of claims 1 to 3, further comprising, before acquiring the preset middleware information base:
obtaining N samples of the known middleware process;
acquiring third target data of each sample in the N samples;
and obtaining the second target data of the known middleware process according to the third target data of the N samples.
5. The method according to any one of claims 1 to 3, wherein the obtaining the target process set of the target host comprises:
and acquiring the process set of the target host, and removing the operating system process of the target host from the process set of the target host to obtain the target process set.
6. The configuration management method according to claim 1, further comprising:
acquiring the name of the middleware process of the target host;
searching a version checking instruction according to the name of the middleware process, and forming a checking instruction set according to the version checking instruction;
the checking instruction set is issued to an environment monitoring program of the target host, so that the environment monitoring program can obtain the version information of the middleware process of the target host according to the checking instruction set;
and receiving the version information of the middleware process of the target host reported by the environment monitoring program.
7. The configuration management method according to claim 6, wherein the searching for the instructions for version viewing according to the name of the middleware process and forming a viewing instruction set according to the instructions for version viewing comprises:
utilizing a crawler program to execute the following steps:
crawling a search result of the version viewing method based on the name of the middleware process;
selecting a version checking method with the highest occurrence frequency in the search results;
and crawling the instruction of the version viewing method with the highest frequency of occurrence to form the viewing instruction set.
8. A configuration management apparatus, comprising:
the system comprises a first acquisition module, a second acquisition module and a third acquisition module, wherein the first acquisition module is used for acquiring a target process set of a target host, and the target process set comprises a middleware process and an application process to be distinguished;
the second acquisition module is used for acquiring a preset middleware information base, wherein the preset middleware information base comprises information of a plurality of known middleware processes;
and the distinguishing module is used for comparing the process to be distinguished with the known middleware process and distinguishing the middleware process and the application process in the target process set according to a comparison result.
9. A computer arrangement comprising a memory, a processor and a computer program stored on the memory and executable on the processor, characterized in that the processor, when executing the computer program, is adapted to carry out the steps of the configuration management method according to any of claims 1 to 7.
10. A computer-readable storage medium, in which a computer program is stored which is executable by at least one processor to cause the at least one processor to perform the steps of the configuration management method according to any one of claims 1 to 7.
CN202210367731.4A 2022-04-08 2022-04-08 Configuration management method, device, equipment and medium Pending CN114911515A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210367731.4A CN114911515A (en) 2022-04-08 2022-04-08 Configuration management method, device, equipment and medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210367731.4A CN114911515A (en) 2022-04-08 2022-04-08 Configuration management method, device, equipment and medium

Publications (1)

Publication Number Publication Date
CN114911515A true CN114911515A (en) 2022-08-16

Family

ID=82762851

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210367731.4A Pending CN114911515A (en) 2022-04-08 2022-04-08 Configuration management method, device, equipment and medium

Country Status (1)

Country Link
CN (1) CN114911515A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117492874A (en) * 2023-10-26 2024-02-02 厦门国际银行股份有限公司 Middleware configuration discovery management method, system, equipment and storage medium

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117492874A (en) * 2023-10-26 2024-02-02 厦门国际银行股份有限公司 Middleware configuration discovery management method, system, equipment and storage medium

Similar Documents

Publication Publication Date Title
US20200272531A1 (en) Automatic correlation of dynamic system events within computing devices
US9641398B1 (en) Bloom filter index for device discovery
US20170264482A1 (en) Method and device for updating client
CN110545219A (en) Passive identification method and device for industrial assets and electronic equipment
CN110413845B (en) Resource storage method and device based on Internet of things operating system
CN108154024B (en) Data retrieval method and device and electronic equipment
CN113132267B (en) Distributed system, data aggregation method and computer readable storage medium
CN110674427B (en) Method, device, equipment and storage medium for responding to webpage access request
CN114911515A (en) Configuration management method, device, equipment and medium
CN105357267A (en) Method, device and system for obtaining server information
CN117240943A (en) Interface data analysis method and device
CN105610596B (en) Resource directory management method and network terminal
CN114422576B (en) Session cleaning method and device, computer equipment and readable storage medium
CN110019321B (en) Question delimitation method, device and equipment
CN113704659B (en) Equipment terminal access marking method and system
CN113449159B (en) Node data processing method, device, equipment and computer readable storage medium
CN107872493B (en) Information processing method, terminal and server
CN114817242A (en) Energy storage equipment warehousing method and system
CN114006955A (en) Data processing method, device and equipment and readable storage medium
CN114281668A (en) Abnormal case generation method, abnormal case generation device, electronic device, and storage medium
CN102377661A (en) Blade server and method for building shortest blade transmission path in blade server
CN113688289A (en) Data packet key field matching method, device, equipment and storage medium
KR101820043B1 (en) Mobile terminal identification, and business model using mobile terminal identification
CN115190110B (en) Geographic position determining method and device
CN113037792B (en) Method, device and gateway for verifying service identification parameters

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination