CN117014284A - Inspection system, inspection method, electronic equipment and storage medium - Google Patents
Inspection system, inspection method, electronic equipment and storage medium Download PDFInfo
- Publication number
- CN117014284A CN117014284A CN202311288201.1A CN202311288201A CN117014284A CN 117014284 A CN117014284 A CN 117014284A CN 202311288201 A CN202311288201 A CN 202311288201A CN 117014284 A CN117014284 A CN 117014284A
- Authority
- CN
- China
- Prior art keywords
- inspection
- data
- cluster
- patrol
- monitoring
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000007689 inspection Methods 0.000 title claims abstract description 221
- 238000000034 method Methods 0.000 title claims abstract description 30
- 238000012544 monitoring process Methods 0.000 claims abstract description 98
- 238000001514 detection method Methods 0.000 claims abstract description 30
- 238000004891 communication Methods 0.000 claims abstract description 12
- 230000006870 function Effects 0.000 claims description 26
- 238000004590 computer program Methods 0.000 claims description 10
- 230000014759 maintenance of location Effects 0.000 claims 1
- 238000012423 maintenance Methods 0.000 abstract description 7
- 238000012545 processing Methods 0.000 abstract description 4
- 230000009545 invasion Effects 0.000 abstract description 2
- 239000000306 component Substances 0.000 description 52
- 238000007726 management method Methods 0.000 description 9
- 238000010586 diagram Methods 0.000 description 5
- 238000005516 engineering process Methods 0.000 description 4
- 238000013515 script Methods 0.000 description 4
- 239000008358 core component Substances 0.000 description 3
- 230000008878 coupling Effects 0.000 description 3
- 238000010168 coupling process Methods 0.000 description 3
- 238000005859 coupling reaction Methods 0.000 description 3
- 238000011161 development Methods 0.000 description 2
- 230000036541 health Effects 0.000 description 2
- 239000004575 stone Substances 0.000 description 2
- 238000006467 substitution reaction Methods 0.000 description 2
- 230000004931 aggregating effect Effects 0.000 description 1
- 230000002776 aggregation Effects 0.000 description 1
- 238000004220 aggregation Methods 0.000 description 1
- 230000006399 behavior Effects 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 239000000969 carrier Substances 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 238000002955 isolation Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000008569 process Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/04—Network management architectures or arrangements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/06—Management of faults, events, alarms or notifications
- H04L41/069—Management of faults, events, alarms or notifications using logs of notifications; Post-processing of notifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
- H04L43/50—Testing arrangements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Debugging And Monitoring (AREA)
Abstract
The application provides a patrol system, a patrol method, electronic equipment and a storage medium, wherein the patrol system comprises a control cluster and a service cluster, the control cluster is in communication connection with the service cluster, the control cluster acquires target data from the service cluster, and the target data is detected to obtain a detection result; the control cluster comprises a patrol functional component and a storage module; the service cluster includes a container orchestration system and a data monitoring system. The inspection functional component is used for collecting metadata from the container arrangement system, collecting monitoring data from the data monitoring system, detecting the metadata and the monitoring data to obtain detection results, and storing the detection results in the storage module. The method solves the problems of safety problem, maintenance difficulty and difficult expansion of inspection items of common inspection, greatly reduces the invasion of the service clusters by controlling the mode of processing the clusters and the service clusters respectively, and ensures the stability of the system.
Description
Technical Field
The application relates to the technical field of data detection, in particular to a patrol system, a patrol method, electronic equipment and a storage medium.
Background
With the continuous development of cloud computing technology, container technology is more widely applied, kubernetes is gradually established as a fact standard of container management as a main tool of container orchestration, and gradually becomes a core component of platform as a service (PaaS). The stability of the PaaS platform is a basic stone for guaranteeing business operation, and the inspection function can be just an indispensable means for guaranteeing stability. The inspection finds potential risks and problems in the platform in time mainly from the two aspects of health inspection of the platform assembly and the resource consumption of the platform, and provides a proper solution to the risks and faults. After the PaaS platform is online and has the inspection function, operation and maintenance personnel can configure timing inspection tasks or manually trigger inspection aiming at the platform, so that the platform state is rapidly detected, and inspection reports are sent to related personnel in a mail mode.
Most of the existing inspection functions are maintained by using scripts, so that more and more scripts exist along with the expansion of inspection range and the refinement of inspection content, and the maintenance cost is greatly increased; and the permission of the platform is required to be additionally acquired during inspection, so that the risk of permission leakage is increased. The existing inspection function needs to configure inspection items in advance, provide corresponding data sources and has low expandability. The existing inspection results may require manual generation of inspection reports, increasing the burden on the practitioners.
Disclosure of Invention
Accordingly, an objective of the present application is to provide a patrol system, a patrol method, an electronic device and a storage medium, so as to overcome the problems in the prior art.
In a first aspect, an embodiment of the present application provides a patrol system, where the patrol system includes: control clusters and business clusters; the control cluster is in communication connection with the service cluster, acquires target data from the service cluster, and detects the target data to obtain a detection result;
the control cluster comprises a patrol functional component and a storage module; the service cluster comprises a container arranging system and a data monitoring system;
the inspection functional component is used for collecting metadata from the container arrangement system, collecting monitoring data from the data monitoring system, detecting the metadata and the monitoring data to obtain detection results, and storing the detection results in the storage module.
In some embodiments of the present application, the container arrangement system is configured to aggregate hosts in a container to form a target cluster, and manage the target cluster;
the inspection function component is used for collecting metadata from the container arrangement system, and comprises:
the inspection function component is used for collecting inspection items and inspection configuration from the container arrangement system and traversing the inspection items in the target cluster according to the inspection configuration.
In some embodiments of the present application, the data monitoring system is configured to capture monitoring indexes of hosts, containers, and services in a cluster, and includes:
the inspection functional component is used for collecting monitoring data from the data monitoring system and comprises:
the inspection functional component is used for collecting monitoring indexes corresponding to the inspection items from the data monitoring system according to the inspection items, and taking the monitoring indexes as the inspection indexes of the inspection items.
In some embodiments of the present application, the inspection item includes a custom resource;
the inspection functional component is used for collecting monitoring indexes corresponding to the inspection items from the data monitoring system according to the inspection items, and comprises the following components:
the inspection functional component is used for collecting monitoring indexes corresponding to the custom resources from the data monitoring system according to the custom resources.
In some embodiments of the present application, the inspection items include native resources;
the inspection functional component is used for collecting monitoring indexes corresponding to the inspection items from the data monitoring system according to the inspection items, and comprises the following components:
the inspection functional component is used for collecting monitoring indexes corresponding to the original resources from the data monitoring system according to the original resources.
In some technical schemes of the application, the custom resources comprise patrol item resources, patrol resources and patrol detail resources;
the inspection item resources comprise names, descriptions, risk levels, early warning thresholds, detection indexes, influences, suggestions and whether each inspection item is opened or not;
the inspection resource records the starting time and the ending time of inspection, the overview of the risks of the inspection functional component and the data of the consumption of the inspection resource;
and the patrol detail resource records risk detail information of each patrol.
In some technical schemes of the application, the original resources comprise patrol configuration resources, wherein the patrol configuration resources record a patrol timer switch, timer configuration, the number of patrol record reserves, a patrol report name, whether to send a patrol report or not, and a patrol report notifier.
In a second aspect, an embodiment of the present application provides a routing inspection method, which is applied to a routing inspection system, where the routing inspection system includes: control clusters and business clusters; the control cluster is in communication connection with the service cluster; the method comprises the following steps:
the control cluster acquires target data from the service cluster, and detects the target data to obtain a detection result;
the control cluster comprises a patrol functional component and a storage module; the service cluster comprises a container arranging system and a data monitoring system;
the inspection functional component collects metadata from the container arrangement system, collects monitoring data from the data monitoring system, detects the metadata and the monitoring data to obtain detection results, and stores the detection results in the storage module.
In a third aspect, an embodiment of the present application provides an electronic device, including a memory, a processor, and a computer program stored in the memory and capable of running on the processor, where the steps of the above-mentioned inspection method are implemented when the processor executes the computer program.
In a fourth aspect, embodiments of the present application provide a computer readable storage medium having a computer program stored thereon, which when executed by a processor performs the steps of the inspection method described above.
The technical scheme provided by the embodiment of the application can comprise the following beneficial effects:
the inspection system comprises a control cluster and a service cluster, wherein the control cluster is in communication connection with the service cluster, acquires target data from the service cluster, and detects the target data to obtain a detection result; the control cluster comprises a patrol functional component and a storage module; the service cluster includes a container orchestration system and a data monitoring system. The inspection functional component is used for collecting metadata from the container arrangement system, collecting monitoring data from the data monitoring system, detecting the metadata and the monitoring data to obtain detection results, and storing the detection results in the storage module. The method solves the problems of safety problem, maintenance difficulty and difficult expansion of inspection items of common inspection, greatly reduces the invasion of the service clusters by controlling the mode of processing the clusters and the service clusters respectively, and ensures the stability of the system.
The above objects, features and advantages of the present application will be more readily apparent from the following detailed description of the preferred embodiments when taken in conjunction with the accompanying drawings.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings that are needed in the embodiments will be briefly described below, it being understood that the following drawings only illustrate some embodiments of the present application and therefore should not be considered as limiting the scope, and other related drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
Fig. 1 shows a schematic diagram of a patrol system according to an embodiment of the present application;
FIG. 2 shows a schematic diagram of one embodiment of the present application;
fig. 3 is a schematic flow chart of a patrol method according to an embodiment of the present application;
fig. 4 is a schematic structural diagram of an electronic device according to an embodiment of the present application.
Detailed Description
For the purpose of making the objects, technical solutions and advantages of the embodiments of the present application more apparent, the technical solutions of the embodiments of the present application will be clearly and completely described with reference to the accompanying drawings in the embodiments of the present application, and it should be understood that the drawings in the present application are for the purpose of illustration and description only and are not intended to limit the scope of the present application. In addition, it should be understood that the schematic drawings are not drawn to scale. A flowchart, as used in this disclosure, illustrates operations implemented according to some embodiments of the present application. It should be understood that the operations of the flow diagrams may be implemented out of order and that steps without logical context may be performed in reverse order or concurrently. Moreover, one or more other operations may be added to or removed from the flow diagrams by those skilled in the art under the direction of the present disclosure.
In addition, the described embodiments are only some, but not all, embodiments of the application. The components of the embodiments of the present application generally described and illustrated in the figures herein may be arranged and designed in a wide variety of different configurations. Thus, the following detailed description of the embodiments of the application, as presented in the figures, is not intended to limit the scope of the application, as claimed, but is merely representative of selected embodiments of the application. All other embodiments, which can be made by a person skilled in the art without making any inventive effort, are intended to be within the scope of the present application.
It should be noted that the term "comprising" will be used in embodiments of the application to indicate the presence of the features stated hereafter, but not to exclude the addition of other features.
With the continuous development of cloud computing technology, container technology is more widely applied, kubernetes is gradually established as a fact standard of container management as a main tool of container orchestration, and gradually becomes a core component of platform as a service (PaaS). The stability of the PaaS platform is a basic stone for guaranteeing business operation, and the inspection function can be just an indispensable means for guaranteeing stability. The inspection finds potential risks and problems in the platform in time mainly from the two aspects of health inspection of the platform assembly and the resource consumption of the platform, and provides a proper solution to the risks and faults. After the PaaS platform is online and has the inspection function, operation and maintenance personnel can configure timing inspection tasks or manually trigger inspection aiming at the platform, so that the platform state is rapidly detected, and inspection reports are sent to related personnel in a mail mode.
Most of the existing inspection functions are maintained by using scripts, so that more and more scripts exist along with the expansion of inspection range and the refinement of inspection content, and the maintenance cost is greatly increased; and the permission of the platform is required to be additionally acquired during inspection, so that the risk of permission leakage is increased. The existing inspection function needs to configure inspection items in advance, provide corresponding data sources and has low expandability. The existing inspection results may require manual generation of inspection reports, increasing the burden on the practitioners.
Based on this, embodiments of the present application provide a patrol system, a method, an electronic device, and a storage medium, and the following description is made by using embodiments.
Fig. 1 shows a patrol system provided by the embodiment of the application, where the patrol system includes a control cluster and a service cluster, the control cluster is in communication connection with the service cluster, and the control cluster acquires target data from the service cluster and detects the target data to obtain a detection result; the control cluster comprises a patrol functional component and a storage module; the service cluster comprises a container arrangement system and a data monitoring system. The inspection functional component is used for collecting metadata from the container arrangement system, collecting monitoring data from the data monitoring system, detecting the metadata and the monitoring data to obtain detection results, and storing the detection results in the storage module.
The container orchestration system here may select Kubernetes and the data monitoring system may select promethaus. In Kubernetes, multiple containers may be created, one application instance running in each container, and then management, discovery, and access to the set of application instances is implemented through a built-in load balancing policy, where no complex manual configuration and processing by operation and maintenance personnel is required for these details. Prometheus is used to collect and aggregate metrics as time series data.
In Kubernetes clusters, resources (resources) are information carriers of the entire system, typically in YAML format to describe the various objects in Kubernetes and their attributes. Resource objects are actual objects created from resource configurations that are managed and manipulated by Kubernetes ApiServer.
Resources typically comprise two types: one is Native Resources (Native Resources) provided by Kubernetes, including naspace/Node/Pod/Service/ConfigMap, etc., which are core components and functions of Kubernetes for managing and scheduling containerized applications. Another is Custom Resources (CRs) that are user defined and managed, which allows users to extend the Kubernetes API, introducing Custom resource types and behaviors. By customizing the resources, a user can create a new resource type that adapts to his particular needs and manage it using the Kubernetes lifecycle management function.
The embodiment of the application can rapidly feed back the component risk condition and the resource consumption of each cluster of the PaaS platform. The inspection system mainly comprises a control cluster and a service cluster, wherein the control cluster is mainly used for managing a platform, and the service cluster is mainly used for running actual user services. Under the architecture, the isolation of the management service and the user service can be realized, the management function is not interfered by the service, and the stability of the platform is greatly ensured. The patrol function serves as a management function for the PaaS platform and therefore is deployed in the control cluster. As shown in fig. 2, the whole inspection system mainly comprises a Kubernetes container arrangement system, a promethaus monitoring system, an inspection functional component and an Etcd storage system.
The Kubernetes container arranging system is used as a base of the whole PaaS platform and is mainly responsible for aggregating a plurality of groups of hosts running Linux containers together, efficiently managing the clusters by the host, automatically completing deployment, management and expansion of applications, taking the inspection system as a cluster function, and also conforming to the management requirements of the Kubernetes. The inspection functional component collects metadata from the container arranging system, and specifically, the inspection functional component acquires metadata information such as inspection items, inspection configuration and the like from Kubernetes through calling Kubernetes ApiServer.
Prometaus provides monitoring capability for the platform and is responsible for collecting monitoring indexes exposed by each exporter of the cluster. Prometaus is a high-performance time sequence database integrating collection, storage and inquiry, and can actively grasp monitoring indexes of hosts, containers and services in a cluster, and provide various data storage modes and a complete PSQL for users to inquire. In the PaaS system, the running state of the components and the resource consumption condition are stored in a time sequence database of Prometaus in the form of indexes (Metric), and besides, all the contents to be inspected can be generated and stored in the time sequence database of Prometaus by corresponding indexes, and the indexes can be used as main data sources of inspection functions. The inspection functional component collects monitoring data from the data monitoring system, namely collects monitoring indexes corresponding to the inspection items from the data monitoring system according to the inspection items, and takes the monitoring indexes as the inspection indexes of the inspection items.
The inspection function component is the core of the whole inspection function, and is mainly responsible for acquiring inspection configuration and inspection item data from Kubernetes and acquiring corresponding indexes from a Prometheus monitoring system according to the inspection items to generate inspection results. Different resources are abstracted by the embodiment of the application, and the resources comprise custom resources and native resources. Specifically, the method mainly comprises a patrol item resource, a patrol detail resource and a patrol configuration resource:
the patrol item resource is a custom resource (InjectionItem), and recorded are the name, description, risk level, early warning threshold, detection index, influence, suggestion, whether to open or not, and the like of each patrol item. And traversing all the opened inspection items during inspection. With respect to the detection index, it may be currently defined as a monitoring index (any monitoring index may be used to create a patrol item, improve the expansibility of the patrol item) or Kubernetes resource, so that index data and resource status are obtained by accessing promethaus or Kubernetes ApiServer.
The Inspection resource is a self-defined resource (Inspection), the start time and the end time of Inspection are recorded, the Inspection function component risk overview (including the Inspection completion state of each resource type and the statistics of risk classification) and the Inspection resource consumption data (including the statistics of cpu, memory, disk and platform data) are recorded, and specific risk details are recorded in related Inspection details (Inspection details) and are associated.
The inspection detail resource is a custom resource (instraction detail), records risk detail information of each inspection, and is divided into four types: clusters, nodes, container groups, certificates, and risk details of each type include risk descriptions, risk levels, risk influences, and risk suggestions.
The patrol configuration resource is a native resource (ConfigMap), records a patrol timer switch, timer configuration, the number of patrol record reserves, a patrol report name, whether to send a patrol report or not, and a patrol report notifier.
When one "patrol" is started, a new patrol CR is created; the patrol functional component completes patrol by monitoring the creation of the patrol CR, collecting patrol information into the associated patrol detail CR according to the patrol item, and updating the state of the patrol CR. And finally, sending the patrol report according to the name of the patrol report in the patrol configuration, whether to send the patrol report or not and a patrol report notifier.
Etcd storage is the storage back end of the inspection system and is responsible for classifying and storing inspection and inspection detail data generated by inspection. In order to prevent a large amount of data from occupying database resources, and the data time of the inspection details is too long, the inspection details are stored for 1 year, so that the detail data of 7 days are stored.
The specific inspection process comprises the following steps: and deploying the PaaS platform according to actual requirements, wherein the PaaS platform comprises a control cluster and a service cluster, and deploying a monitoring plug-in each cluster.
The inspection functional component automatically acquires system configuration of the cluster, including access modes of the cluster, monitored access modes and the like.
And the inspection functional component judges whether the monitoring is installed or not, if the monitoring is not installed, the inspection of the cluster is skipped, and the monitoring is a component on which the inspection is necessary to depend.
The inspection function component acquires inspection items and inspection configuration from the Kubernetes cluster, is used for the inspection of the time and also comprises the use condition of cluster resources.
The inspection functional component acquires monitoring index information from the monitoring system according to the inspection items.
The inspection functional component traverses the inspection items in the cluster according to the inspection configuration, wherein the inspection items comprise risk conditions of all functional components in the cluster, the risk conditions comprise component threshold early warning and component failure, index information acquired from a monitoring system is compared with a threshold defined in the inspection items, and whether the inspection items reach the risk early warning or the failure is judged.
The resource use condition of the inspection cluster includes, but is not limited to, cpu, memory, hard disk, etc.
And storing the inspection result into an etcd database.
And generating a patrol report from the information and sending the patrol report to related personnel.
On the premise of ensuring safety, the application interferes with the operation of the service cluster as little as possible, ensures the stability of functions, completes information collection by monitoring and collecting index data, and greatly improves the efficiency.
Fig. 3 shows a flow chart of a patrol method according to an embodiment of the present application, where the method is specific: be applied to inspection system, inspection system includes: control clusters and business clusters; the control cluster is in communication connection with the service cluster; the method comprises the following steps:
the control cluster acquires target data from the service cluster, and detects the target data to obtain a detection result;
the control cluster comprises a patrol functional component and a storage module; the service cluster comprises a container arranging system and a data monitoring system;
s101, collecting metadata from the container arranging system and monitoring data from the data monitoring system by the inspection functional component;
s102, detecting the metadata and the monitoring data to obtain a detection result;
s103, storing the detection result in the storage module.
The host in the container arrangement system aggregation container forms a target cluster and manages the target cluster;
the inspection function component collects metadata from the container orchestration system, comprising:
the inspection functional component collects inspection items and inspection configuration from the container arrangement system and traverses the inspection items in the target cluster according to the inspection configuration.
The data monitoring system captures monitoring indexes of hosts, containers and services in a cluster, and comprises:
the inspection functional component collects monitoring data from the data monitoring system and comprises:
and the inspection functional component acquires monitoring indexes corresponding to the inspection items from the data monitoring system according to the inspection items.
The inspection item comprises a custom resource;
the inspection functional component collects monitoring indexes corresponding to the inspection items from the data monitoring system according to the inspection items, and the inspection functional component comprises:
and the inspection functional component acquires monitoring indexes corresponding to the custom resources from the data monitoring system according to the custom resources.
The inspection items comprise native resources;
the inspection functional component collects monitoring indexes corresponding to the inspection items from the data monitoring system according to the inspection items, and the inspection functional component comprises:
and the inspection functional component acquires monitoring indexes corresponding to the original resources from the data monitoring system according to the original resources.
The custom resources comprise patrol item resources, patrol resources and patrol detail resources;
the inspection item resources comprise names, descriptions, risk levels, early warning thresholds, detection indexes, influences, suggestions and whether each inspection item is opened or not;
the inspection resource records the starting time and the ending time of inspection, the overview of the risks of the inspection functional component and the data of the consumption of the inspection resource;
and the patrol detail resource records risk detail information of each patrol.
The original resources comprise patrol configuration resources, wherein the patrol configuration resources record patrol timer switches, timer configuration, patrol record reserved numbers, patrol report names, whether to send patrol reports and patrol report notifiers.
As shown in fig. 4, an embodiment of the present application provides an electronic device for executing the inspection method in the present application, where the device includes a memory, a processor, a bus, and a computer program stored in the memory and capable of running on the processor, where the processor executes the computer program to implement the steps of the inspection method.
In particular, the above memory and processor may be general-purpose memory and processor, which are not limited herein, and the above inspection method can be executed when the processor runs a computer program stored in the memory.
Corresponding to the inspection method in the present application, the embodiment of the present application further provides a computer readable storage medium, where a computer program is stored, and the computer program executes the steps of the inspection method when executed by a processor.
Specifically, the storage medium can be a general-purpose storage medium, such as a removable disk, a hard disk, or the like, and the computer program on the storage medium can execute the inspection method described above when executed.
In the embodiments provided in the present application, it should be understood that the disclosed system and method may be implemented in other manners. The system embodiments described above are merely illustrative, e.g., the division of the elements is merely a logical functional division, and there may be additional divisions in actual implementation, and e.g., multiple elements or components may be combined or integrated into another system, or some features may be omitted, or not performed. Alternatively, the coupling or direct coupling or communication connection shown or discussed with each other may be through some communication interface, system or unit indirect coupling or communication connection, which may be in electrical, mechanical or other form.
The units described as separate units may or may not be physically separate, and units shown as units may or may not be physical units, may be located in one place, or may be distributed over a plurality of network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
In addition, each functional unit in the embodiments provided in the present application may be integrated in one processing unit, or each unit may exist alone physically, or two or more units may be integrated in one unit.
The functions, if implemented in the form of software functional units and sold or used as a stand-alone product, may be stored in a computer-readable storage medium. Based on this understanding, the technical solution of the present application may be embodied essentially or in a part contributing to the prior art or in a part of the technical solution, in the form of a software product stored in a storage medium, comprising several instructions for causing a computer device (which may be a personal computer, a server, a network device, etc.) to perform all or part of the steps of the method according to the embodiments of the present application. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a random access Memory (Random Access Memory, RAM), a magnetic disk, or an optical disk, or other various media capable of storing program codes.
It should be noted that: like reference numerals and letters in the following figures denote like items, and thus once an item is defined in one figure, no further definition or explanation of it is required in the following figures, and furthermore, the terms "first," "second," "third," etc. are used merely to distinguish one description from another and are not to be construed as indicating or implying relative importance.
Finally, it should be noted that: the above examples are only specific embodiments of the present application, and are not intended to limit the scope of the present application, but it should be understood by those skilled in the art that the present application is not limited thereto, and that the present application is described in detail with reference to the foregoing examples: any person skilled in the art may modify or easily conceive of the technical solution described in the foregoing embodiments, or perform equivalent substitution of some of the technical features, while remaining within the technical scope of the present disclosure; such modifications, changes or substitutions do not depart from the spirit and scope of the corresponding technical solutions. Are intended to be encompassed within the scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.
Claims (10)
1. A patrol system, the patrol system comprising: control clusters and business clusters; the control cluster is in communication connection with the service cluster, acquires target data from the service cluster, and detects the target data to obtain a detection result;
the control cluster comprises a patrol functional component and a storage module; the service cluster comprises a container arranging system and a data monitoring system;
the inspection functional component is used for collecting metadata from the container arrangement system, collecting monitoring data from the data monitoring system, detecting the metadata and the monitoring data to obtain detection results, and storing the detection results in the storage module.
2. The inspection system of claim 1, wherein the container orchestration system is configured to aggregate hosts in containers to form a target cluster and manage the target cluster;
the inspection function component is used for collecting metadata from the container arrangement system, and comprises:
the inspection function component is used for collecting inspection items and inspection configuration from the container arrangement system and traversing the inspection items in the target cluster according to the inspection configuration.
3. The inspection system of claim 2, wherein the data monitoring system is configured to capture monitoring metrics of hosts, containers, services within a cluster, comprising:
the inspection functional component is used for collecting monitoring data from the data monitoring system and comprises:
the inspection functional component is used for collecting monitoring indexes corresponding to the inspection items from the data monitoring system according to the inspection items, and taking the monitoring indexes as the inspection indexes of the inspection items.
4. The inspection system of claim 3, wherein the inspection items comprise custom resources;
the inspection functional component is used for collecting monitoring indexes corresponding to the inspection items from the data monitoring system according to the inspection items, and comprises the following components:
the inspection functional component is used for collecting monitoring indexes corresponding to the custom resources from the data monitoring system according to the custom resources.
5. The inspection system of claim 3, wherein the inspection item comprises a native resource;
the inspection functional component is used for collecting monitoring indexes corresponding to the inspection items from the data monitoring system according to the inspection items, and comprises the following components:
the inspection functional component is used for collecting monitoring indexes corresponding to the original resources from the data monitoring system according to the original resources.
6. The inspection system of claim 4, wherein the custom resources include inspection item resources, inspection resources, and inspection detail resources;
the inspection item resources comprise names, descriptions, risk levels, early warning thresholds, detection indexes, influences, suggestions and whether each inspection item is opened or not;
the inspection resource records the starting time and the ending time of inspection, the overview of the risks of the inspection functional component and the data of the consumption of the inspection resource;
and the patrol detail resource records risk detail information of each patrol.
7. The inspection system of claim 5, wherein the native resource comprises an inspection configuration resource, wherein the inspection configuration resource records an inspection timer switch, a timer configuration, an inspection record retention count, an inspection report name, whether to send an inspection report, an inspection report notifier.
8. The inspection method is characterized by being applied to an inspection system, and the inspection system comprises: control clusters and business clusters; the control cluster is in communication connection with the service cluster; the method comprises the following steps:
the control cluster acquires target data from the service cluster, and detects the target data to obtain a detection result;
the control cluster comprises a patrol functional component and a storage module; the service cluster comprises a container arranging system and a data monitoring system;
the inspection functional component collects metadata from the container arrangement system, collects monitoring data from the data monitoring system, detects the metadata and the monitoring data to obtain detection results, and stores the detection results in the storage module.
9. An electronic device, comprising: a processor, a memory and a bus, the memory storing machine-readable instructions executable by the processor, the processor and the memory in communication over the bus when the electronic device is running, the machine-readable instructions when executed by the processor performing the steps of the patrol method of claim 8.
10. A computer-readable storage medium, characterized in that it has stored thereon a computer program which, when executed by a processor, performs the steps of the inspection method according to claim 8.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202311288201.1A CN117014284B (en) | 2023-10-08 | 2023-10-08 | Inspection system, inspection method, electronic equipment and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202311288201.1A CN117014284B (en) | 2023-10-08 | 2023-10-08 | Inspection system, inspection method, electronic equipment and storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN117014284A true CN117014284A (en) | 2023-11-07 |
CN117014284B CN117014284B (en) | 2023-12-19 |
Family
ID=88574759
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202311288201.1A Active CN117014284B (en) | 2023-10-08 | 2023-10-08 | Inspection system, inspection method, electronic equipment and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN117014284B (en) |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112506612A (en) * | 2020-12-10 | 2021-03-16 | 北京浪潮数据技术有限公司 | Cluster inspection method, device and equipment and readable storage medium |
CN112965879A (en) * | 2021-03-17 | 2021-06-15 | 北京奇艺世纪科技有限公司 | Data processing method and device, electronic equipment and readable storage medium |
WO2021129972A1 (en) * | 2019-12-23 | 2021-07-01 | Siemens Aktiengesellschaft | Method for monitoring data traffic in a communication network, and access control system |
CN114756328A (en) * | 2022-04-21 | 2022-07-15 | 光大科技有限公司 | Container cloud platform inspection method and device |
CN115809119A (en) * | 2022-12-26 | 2023-03-17 | 京东科技信息技术有限公司 | Monitoring method, system and device for container arrangement engine |
-
2023
- 2023-10-08 CN CN202311288201.1A patent/CN117014284B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2021129972A1 (en) * | 2019-12-23 | 2021-07-01 | Siemens Aktiengesellschaft | Method for monitoring data traffic in a communication network, and access control system |
CN112506612A (en) * | 2020-12-10 | 2021-03-16 | 北京浪潮数据技术有限公司 | Cluster inspection method, device and equipment and readable storage medium |
CN112965879A (en) * | 2021-03-17 | 2021-06-15 | 北京奇艺世纪科技有限公司 | Data processing method and device, electronic equipment and readable storage medium |
CN114756328A (en) * | 2022-04-21 | 2022-07-15 | 光大科技有限公司 | Container cloud platform inspection method and device |
CN115809119A (en) * | 2022-12-26 | 2023-03-17 | 京东科技信息技术有限公司 | Monitoring method, system and device for container arrangement engine |
Also Published As
Publication number | Publication date |
---|---|
CN117014284B (en) | 2023-12-19 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10649838B2 (en) | Automatic correlation of dynamic system events within computing devices | |
US9471462B2 (en) | Proactive risk analysis and governance of upgrade process | |
CN108628929B (en) | Method and apparatus for intelligent archiving and analysis | |
CN105357038B (en) | Monitor the method and system of cluster virtual machine | |
US9336331B2 (en) | Detecting, using, and sharing it design patterns and anti-patterns | |
JP5479176B2 (en) | Server device, peripheral device management method, and program | |
CN108521339B (en) | Feedback type node fault processing method and system based on cluster log | |
CN111046011B (en) | Log collection method, system, device, electronic equipment and readable storage medium | |
WO2011142042A1 (en) | Method for visualizing server reliability, computer system, and management server | |
CN103490941A (en) | Real-time monitoring on-line configuration method in cloud computing environment | |
KR20160120714A (en) | Systems and methods for collecting, tracking, and storing system performance and event data for computing devices | |
CN102567185B (en) | Monitoring method of application server | |
CN110674231A (en) | Data lake-oriented user ID integration method and system | |
US20220036224A1 (en) | Determination of storage configuration for enterprise distributed environment | |
US11567660B2 (en) | Managing cloud storage for distributed file systems | |
CN111813497A (en) | Container environment anomaly detection method, device, medium and computer equipment | |
CN112085535A (en) | Resource metering charging method, device, cluster and storage medium | |
CN112306802A (en) | Data acquisition method, device, medium and electronic equipment of system | |
CN108647118A (en) | Copy abnormal restoring method, device and computer equipment based on storage cluster | |
CN111884853A (en) | Cloud environment automatic resource management method and system | |
US20160283306A1 (en) | Information processing apparatus, information processing method, and data center system | |
CN110275793A (en) | A kind of detection method and equipment for MongoDB data fragmentation cluster | |
CN117014284B (en) | Inspection system, inspection method, electronic equipment and storage medium | |
CN109818785A (en) | A kind of data processing method, server cluster and storage medium | |
CN117390015A (en) | Method and device for storing battery passport and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |