CN117014284A - Inspection system, inspection method, electronic equipment and storage medium - Google Patents

Inspection system, inspection method, electronic equipment and storage medium Download PDF

Info

Publication number
CN117014284A
CN117014284A CN202311288201.1A CN202311288201A CN117014284A CN 117014284 A CN117014284 A CN 117014284A CN 202311288201 A CN202311288201 A CN 202311288201A CN 117014284 A CN117014284 A CN 117014284A
Authority
CN
China
Prior art keywords
inspection
data
cluster
patrol
monitoring
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202311288201.1A
Other languages
Chinese (zh)
Other versions
CN117014284B (en
Inventor
王嘉豪
史建华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Ling Skylark Technology Co ltd
Original Assignee
Beijing Ling Skylark Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Ling Skylark Technology Co ltd filed Critical Beijing Ling Skylark Technology Co ltd
Priority to CN202311288201.1A priority Critical patent/CN117014284B/en
Publication of CN117014284A publication Critical patent/CN117014284A/en
Application granted granted Critical
Publication of CN117014284B publication Critical patent/CN117014284B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/04Network management architectures or arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/06Management of faults, events, alarms or notifications
    • H04L41/069Management of faults, events, alarms or notifications using logs of notifications; Post-processing of notifications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/50Testing arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Debugging And Monitoring (AREA)

Abstract

The application provides a patrol system, a patrol method, electronic equipment and a storage medium, wherein the patrol system comprises a control cluster and a service cluster, the control cluster is in communication connection with the service cluster, the control cluster acquires target data from the service cluster, and the target data is detected to obtain a detection result; the control cluster comprises a patrol functional component and a storage module; the service cluster includes a container orchestration system and a data monitoring system. The inspection functional component is used for collecting metadata from the container arrangement system, collecting monitoring data from the data monitoring system, detecting the metadata and the monitoring data to obtain detection results, and storing the detection results in the storage module. The method solves the problems of safety problem, maintenance difficulty and difficult expansion of inspection items of common inspection, greatly reduces the invasion of the service clusters by controlling the mode of processing the clusters and the service clusters respectively, and ensures the stability of the system.

Description

Inspection system, inspection method, electronic equipment and storage medium
Technical Field
The application relates to the technical field of data detection, in particular to a patrol system, a patrol method, electronic equipment and a storage medium.
Background
With the continuous development of cloud computing technology, container technology is more widely applied, kubernetes is gradually established as a fact standard of container management as a main tool of container orchestration, and gradually becomes a core component of platform as a service (PaaS). The stability of the PaaS platform is a basic stone for guaranteeing business operation, and the inspection function can be just an indispensable means for guaranteeing stability. The inspection finds potential risks and problems in the platform in time mainly from the two aspects of health inspection of the platform assembly and the resource consumption of the platform, and provides a proper solution to the risks and faults. After the PaaS platform is online and has the inspection function, operation and maintenance personnel can configure timing inspection tasks or manually trigger inspection aiming at the platform, so that the platform state is rapidly detected, and inspection reports are sent to related personnel in a mail mode.
Most of the existing inspection functions are maintained by using scripts, so that more and more scripts exist along with the expansion of inspection range and the refinement of inspection content, and the maintenance cost is greatly increased; and the permission of the platform is required to be additionally acquired during inspection, so that the risk of permission leakage is increased. The existing inspection function needs to configure inspection items in advance, provide corresponding data sources and has low expandability. The existing inspection results may require manual generation of inspection reports, increasing the burden on the practitioners.
Disclosure of Invention
Accordingly, an objective of the present application is to provide a patrol system, a patrol method, an electronic device and a storage medium, so as to overcome the problems in the prior art.
In a first aspect, an embodiment of the present application provides a patrol system, where the patrol system includes: control clusters and business clusters; the control cluster is in communication connection with the service cluster, acquires target data from the service cluster, and detects the target data to obtain a detection result;
the control cluster comprises a patrol functional component and a storage module; the service cluster comprises a container arranging system and a data monitoring system;
the inspection functional component is used for collecting metadata from the container arrangement system, collecting monitoring data from the data monitoring system, detecting the metadata and the monitoring data to obtain detection results, and storing the detection results in the storage module.
In some embodiments of the present application, the container arrangement system is configured to aggregate hosts in a container to form a target cluster, and manage the target cluster;
the inspection function component is used for collecting metadata from the container arrangement system, and comprises:
the inspection function component is used for collecting inspection items and inspection configuration from the container arrangement system and traversing the inspection items in the target cluster according to the inspection configuration.
In some embodiments of the present application, the data monitoring system is configured to capture monitoring indexes of hosts, containers, and services in a cluster, and includes:
the inspection functional component is used for collecting monitoring data from the data monitoring system and comprises:
the inspection functional component is used for collecting monitoring indexes corresponding to the inspection items from the data monitoring system according to the inspection items, and taking the monitoring indexes as the inspection indexes of the inspection items.
In some embodiments of the present application, the inspection item includes a custom resource;
the inspection functional component is used for collecting monitoring indexes corresponding to the inspection items from the data monitoring system according to the inspection items, and comprises the following components:
the inspection functional component is used for collecting monitoring indexes corresponding to the custom resources from the data monitoring system according to the custom resources.
In some embodiments of the present application, the inspection items include native resources;
the inspection functional component is used for collecting monitoring indexes corresponding to the inspection items from the data monitoring system according to the inspection items, and comprises the following components:
the inspection functional component is used for collecting monitoring indexes corresponding to the original resources from the data monitoring system according to the original resources.
In some technical schemes of the application, the custom resources comprise patrol item resources, patrol resources and patrol detail resources;
the inspection item resources comprise names, descriptions, risk levels, early warning thresholds, detection indexes, influences, suggestions and whether each inspection item is opened or not;
the inspection resource records the starting time and the ending time of inspection, the overview of the risks of the inspection functional component and the data of the consumption of the inspection resource;
and the patrol detail resource records risk detail information of each patrol.
In some technical schemes of the application, the original resources comprise patrol configuration resources, wherein the patrol configuration resources record a patrol timer switch, timer configuration, the number of patrol record reserves, a patrol report name, whether to send a patrol report or not, and a patrol report notifier.
In a second aspect, an embodiment of the present application provides a routing inspection method, which is applied to a routing inspection system, where the routing inspection system includes: control clusters and business clusters; the control cluster is in communication connection with the service cluster; the method comprises the following steps:
the control cluster acquires target data from the service cluster, and detects the target data to obtain a detection result;
the control cluster comprises a patrol functional component and a storage module; the service cluster comprises a container arranging system and a data monitoring system;
the inspection functional component collects metadata from the container arrangement system, collects monitoring data from the data monitoring system, detects the metadata and the monitoring data to obtain detection results, and stores the detection results in the storage module.
In a third aspect, an embodiment of the present application provides an electronic device, including a memory, a processor, and a computer program stored in the memory and capable of running on the processor, where the steps of the above-mentioned inspection method are implemented when the processor executes the computer program.
In a fourth aspect, embodiments of the present application provide a computer readable storage medium having a computer program stored thereon, which when executed by a processor performs the steps of the inspection method described above.
The technical scheme provided by the embodiment of the application can comprise the following beneficial effects:
the inspection system comprises a control cluster and a service cluster, wherein the control cluster is in communication connection with the service cluster, acquires target data from the service cluster, and detects the target data to obtain a detection result; the control cluster comprises a patrol functional component and a storage module; the service cluster includes a container orchestration system and a data monitoring system. The inspection functional component is used for collecting metadata from the container arrangement system, collecting monitoring data from the data monitoring system, detecting the metadata and the monitoring data to obtain detection results, and storing the detection results in the storage module. The method solves the problems of safety problem, maintenance difficulty and difficult expansion of inspection items of common inspection, greatly reduces the invasion of the service clusters by controlling the mode of processing the clusters and the service clusters respectively, and ensures the stability of the system.
The above objects, features and advantages of the present application will be more readily apparent from the following detailed description of the preferred embodiments when taken in conjunction with the accompanying drawings.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings that are needed in the embodiments will be briefly described below, it being understood that the following drawings only illustrate some embodiments of the present application and therefore should not be considered as limiting the scope, and other related drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
Fig. 1 shows a schematic diagram of a patrol system according to an embodiment of the present application;
FIG. 2 shows a schematic diagram of one embodiment of the present application;
fig. 3 is a schematic flow chart of a patrol method according to an embodiment of the present application;
fig. 4 is a schematic structural diagram of an electronic device according to an embodiment of the present application.
Detailed Description
For the purpose of making the objects, technical solutions and advantages of the embodiments of the present application more apparent, the technical solutions of the embodiments of the present application will be clearly and completely described with reference to the accompanying drawings in the embodiments of the present application, and it should be understood that the drawings in the present application are for the purpose of illustration and description only and are not intended to limit the scope of the present application. In addition, it should be understood that the schematic drawings are not drawn to scale. A flowchart, as used in this disclosure, illustrates operations implemented according to some embodiments of the present application. It should be understood that the operations of the flow diagrams may be implemented out of order and that steps without logical context may be performed in reverse order or concurrently. Moreover, one or more other operations may be added to or removed from the flow diagrams by those skilled in the art under the direction of the present disclosure.
In addition, the described embodiments are only some, but not all, embodiments of the application. The components of the embodiments of the present application generally described and illustrated in the figures herein may be arranged and designed in a wide variety of different configurations. Thus, the following detailed description of the embodiments of the application, as presented in the figures, is not intended to limit the scope of the application, as claimed, but is merely representative of selected embodiments of the application. All other embodiments, which can be made by a person skilled in the art without making any inventive effort, are intended to be within the scope of the present application.
It should be noted that the term "comprising" will be used in embodiments of the application to indicate the presence of the features stated hereafter, but not to exclude the addition of other features.
With the continuous development of cloud computing technology, container technology is more widely applied, kubernetes is gradually established as a fact standard of container management as a main tool of container orchestration, and gradually becomes a core component of platform as a service (PaaS). The stability of the PaaS platform is a basic stone for guaranteeing business operation, and the inspection function can be just an indispensable means for guaranteeing stability. The inspection finds potential risks and problems in the platform in time mainly from the two aspects of health inspection of the platform assembly and the resource consumption of the platform, and provides a proper solution to the risks and faults. After the PaaS platform is online and has the inspection function, operation and maintenance personnel can configure timing inspection tasks or manually trigger inspection aiming at the platform, so that the platform state is rapidly detected, and inspection reports are sent to related personnel in a mail mode.
Most of the existing inspection functions are maintained by using scripts, so that more and more scripts exist along with the expansion of inspection range and the refinement of inspection content, and the maintenance cost is greatly increased; and the permission of the platform is required to be additionally acquired during inspection, so that the risk of permission leakage is increased. The existing inspection function needs to configure inspection items in advance, provide corresponding data sources and has low expandability. The existing inspection results may require manual generation of inspection reports, increasing the burden on the practitioners.
Based on this, embodiments of the present application provide a patrol system, a method, an electronic device, and a storage medium, and the following description is made by using embodiments.
Fig. 1 shows a patrol system provided by the embodiment of the application, where the patrol system includes a control cluster and a service cluster, the control cluster is in communication connection with the service cluster, and the control cluster acquires target data from the service cluster and detects the target data to obtain a detection result; the control cluster comprises a patrol functional component and a storage module; the service cluster comprises a container arrangement system and a data monitoring system. The inspection functional component is used for collecting metadata from the container arrangement system, collecting monitoring data from the data monitoring system, detecting the metadata and the monitoring data to obtain detection results, and storing the detection results in the storage module.
The container orchestration system here may select Kubernetes and the data monitoring system may select promethaus. In Kubernetes, multiple containers may be created, one application instance running in each container, and then management, discovery, and access to the set of application instances is implemented through a built-in load balancing policy, where no complex manual configuration and processing by operation and maintenance personnel is required for these details. Prometheus is used to collect and aggregate metrics as time series data.
In Kubernetes clusters, resources (resources) are information carriers of the entire system, typically in YAML format to describe the various objects in Kubernetes and their attributes. Resource objects are actual objects created from resource configurations that are managed and manipulated by Kubernetes ApiServer.
Resources typically comprise two types: one is Native Resources (Native Resources) provided by Kubernetes, including naspace/Node/Pod/Service/ConfigMap, etc., which are core components and functions of Kubernetes for managing and scheduling containerized applications. Another is Custom Resources (CRs) that are user defined and managed, which allows users to extend the Kubernetes API, introducing Custom resource types and behaviors. By customizing the resources, a user can create a new resource type that adapts to his particular needs and manage it using the Kubernetes lifecycle management function.
The embodiment of the application can rapidly feed back the component risk condition and the resource consumption of each cluster of the PaaS platform. The inspection system mainly comprises a control cluster and a service cluster, wherein the control cluster is mainly used for managing a platform, and the service cluster is mainly used for running actual user services. Under the architecture, the isolation of the management service and the user service can be realized, the management function is not interfered by the service, and the stability of the platform is greatly ensured. The patrol function serves as a management function for the PaaS platform and therefore is deployed in the control cluster. As shown in fig. 2, the whole inspection system mainly comprises a Kubernetes container arrangement system, a promethaus monitoring system, an inspection functional component and an Etcd storage system.
The Kubernetes container arranging system is used as a base of the whole PaaS platform and is mainly responsible for aggregating a plurality of groups of hosts running Linux containers together, efficiently managing the clusters by the host, automatically completing deployment, management and expansion of applications, taking the inspection system as a cluster function, and also conforming to the management requirements of the Kubernetes. The inspection functional component collects metadata from the container arranging system, and specifically, the inspection functional component acquires metadata information such as inspection items, inspection configuration and the like from Kubernetes through calling Kubernetes ApiServer.
Prometaus provides monitoring capability for the platform and is responsible for collecting monitoring indexes exposed by each exporter of the cluster. Prometaus is a high-performance time sequence database integrating collection, storage and inquiry, and can actively grasp monitoring indexes of hosts, containers and services in a cluster, and provide various data storage modes and a complete PSQL for users to inquire. In the PaaS system, the running state of the components and the resource consumption condition are stored in a time sequence database of Prometaus in the form of indexes (Metric), and besides, all the contents to be inspected can be generated and stored in the time sequence database of Prometaus by corresponding indexes, and the indexes can be used as main data sources of inspection functions. The inspection functional component collects monitoring data from the data monitoring system, namely collects monitoring indexes corresponding to the inspection items from the data monitoring system according to the inspection items, and takes the monitoring indexes as the inspection indexes of the inspection items.
The inspection function component is the core of the whole inspection function, and is mainly responsible for acquiring inspection configuration and inspection item data from Kubernetes and acquiring corresponding indexes from a Prometheus monitoring system according to the inspection items to generate inspection results. Different resources are abstracted by the embodiment of the application, and the resources comprise custom resources and native resources. Specifically, the method mainly comprises a patrol item resource, a patrol detail resource and a patrol configuration resource:
the patrol item resource is a custom resource (InjectionItem), and recorded are the name, description, risk level, early warning threshold, detection index, influence, suggestion, whether to open or not, and the like of each patrol item. And traversing all the opened inspection items during inspection. With respect to the detection index, it may be currently defined as a monitoring index (any monitoring index may be used to create a patrol item, improve the expansibility of the patrol item) or Kubernetes resource, so that index data and resource status are obtained by accessing promethaus or Kubernetes ApiServer.
The Inspection resource is a self-defined resource (Inspection), the start time and the end time of Inspection are recorded, the Inspection function component risk overview (including the Inspection completion state of each resource type and the statistics of risk classification) and the Inspection resource consumption data (including the statistics of cpu, memory, disk and platform data) are recorded, and specific risk details are recorded in related Inspection details (Inspection details) and are associated.
The inspection detail resource is a custom resource (instraction detail), records risk detail information of each inspection, and is divided into four types: clusters, nodes, container groups, certificates, and risk details of each type include risk descriptions, risk levels, risk influences, and risk suggestions.
The patrol configuration resource is a native resource (ConfigMap), records a patrol timer switch, timer configuration, the number of patrol record reserves, a patrol report name, whether to send a patrol report or not, and a patrol report notifier.
When one "patrol" is started, a new patrol CR is created; the patrol functional component completes patrol by monitoring the creation of the patrol CR, collecting patrol information into the associated patrol detail CR according to the patrol item, and updating the state of the patrol CR. And finally, sending the patrol report according to the name of the patrol report in the patrol configuration, whether to send the patrol report or not and a patrol report notifier.
Etcd storage is the storage back end of the inspection system and is responsible for classifying and storing inspection and inspection detail data generated by inspection. In order to prevent a large amount of data from occupying database resources, and the data time of the inspection details is too long, the inspection details are stored for 1 year, so that the detail data of 7 days are stored.
The specific inspection process comprises the following steps: and deploying the PaaS platform according to actual requirements, wherein the PaaS platform comprises a control cluster and a service cluster, and deploying a monitoring plug-in each cluster.
The inspection functional component automatically acquires system configuration of the cluster, including access modes of the cluster, monitored access modes and the like.
And the inspection functional component judges whether the monitoring is installed or not, if the monitoring is not installed, the inspection of the cluster is skipped, and the monitoring is a component on which the inspection is necessary to depend.
The inspection function component acquires inspection items and inspection configuration from the Kubernetes cluster, is used for the inspection of the time and also comprises the use condition of cluster resources.
The inspection functional component acquires monitoring index information from the monitoring system according to the inspection items.
The inspection functional component traverses the inspection items in the cluster according to the inspection configuration, wherein the inspection items comprise risk conditions of all functional components in the cluster, the risk conditions comprise component threshold early warning and component failure, index information acquired from a monitoring system is compared with a threshold defined in the inspection items, and whether the inspection items reach the risk early warning or the failure is judged.
The resource use condition of the inspection cluster includes, but is not limited to, cpu, memory, hard disk, etc.
And storing the inspection result into an etcd database.
And generating a patrol report from the information and sending the patrol report to related personnel.
On the premise of ensuring safety, the application interferes with the operation of the service cluster as little as possible, ensures the stability of functions, completes information collection by monitoring and collecting index data, and greatly improves the efficiency.
Fig. 3 shows a flow chart of a patrol method according to an embodiment of the present application, where the method is specific: be applied to inspection system, inspection system includes: control clusters and business clusters; the control cluster is in communication connection with the service cluster; the method comprises the following steps:
the control cluster acquires target data from the service cluster, and detects the target data to obtain a detection result;
the control cluster comprises a patrol functional component and a storage module; the service cluster comprises a container arranging system and a data monitoring system;
s101, collecting metadata from the container arranging system and monitoring data from the data monitoring system by the inspection functional component;
s102, detecting the metadata and the monitoring data to obtain a detection result;
s103, storing the detection result in the storage module.
The host in the container arrangement system aggregation container forms a target cluster and manages the target cluster;
the inspection function component collects metadata from the container orchestration system, comprising:
the inspection functional component collects inspection items and inspection configuration from the container arrangement system and traverses the inspection items in the target cluster according to the inspection configuration.
The data monitoring system captures monitoring indexes of hosts, containers and services in a cluster, and comprises:
the inspection functional component collects monitoring data from the data monitoring system and comprises:
and the inspection functional component acquires monitoring indexes corresponding to the inspection items from the data monitoring system according to the inspection items.
The inspection item comprises a custom resource;
the inspection functional component collects monitoring indexes corresponding to the inspection items from the data monitoring system according to the inspection items, and the inspection functional component comprises:
and the inspection functional component acquires monitoring indexes corresponding to the custom resources from the data monitoring system according to the custom resources.
The inspection items comprise native resources;
the inspection functional component collects monitoring indexes corresponding to the inspection items from the data monitoring system according to the inspection items, and the inspection functional component comprises:
and the inspection functional component acquires monitoring indexes corresponding to the original resources from the data monitoring system according to the original resources.
The custom resources comprise patrol item resources, patrol resources and patrol detail resources;
the inspection item resources comprise names, descriptions, risk levels, early warning thresholds, detection indexes, influences, suggestions and whether each inspection item is opened or not;
the inspection resource records the starting time and the ending time of inspection, the overview of the risks of the inspection functional component and the data of the consumption of the inspection resource;
and the patrol detail resource records risk detail information of each patrol.
The original resources comprise patrol configuration resources, wherein the patrol configuration resources record patrol timer switches, timer configuration, patrol record reserved numbers, patrol report names, whether to send patrol reports and patrol report notifiers.
As shown in fig. 4, an embodiment of the present application provides an electronic device for executing the inspection method in the present application, where the device includes a memory, a processor, a bus, and a computer program stored in the memory and capable of running on the processor, where the processor executes the computer program to implement the steps of the inspection method.
In particular, the above memory and processor may be general-purpose memory and processor, which are not limited herein, and the above inspection method can be executed when the processor runs a computer program stored in the memory.
Corresponding to the inspection method in the present application, the embodiment of the present application further provides a computer readable storage medium, where a computer program is stored, and the computer program executes the steps of the inspection method when executed by a processor.
Specifically, the storage medium can be a general-purpose storage medium, such as a removable disk, a hard disk, or the like, and the computer program on the storage medium can execute the inspection method described above when executed.
In the embodiments provided in the present application, it should be understood that the disclosed system and method may be implemented in other manners. The system embodiments described above are merely illustrative, e.g., the division of the elements is merely a logical functional division, and there may be additional divisions in actual implementation, and e.g., multiple elements or components may be combined or integrated into another system, or some features may be omitted, or not performed. Alternatively, the coupling or direct coupling or communication connection shown or discussed with each other may be through some communication interface, system or unit indirect coupling or communication connection, which may be in electrical, mechanical or other form.
The units described as separate units may or may not be physically separate, and units shown as units may or may not be physical units, may be located in one place, or may be distributed over a plurality of network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
In addition, each functional unit in the embodiments provided in the present application may be integrated in one processing unit, or each unit may exist alone physically, or two or more units may be integrated in one unit.
The functions, if implemented in the form of software functional units and sold or used as a stand-alone product, may be stored in a computer-readable storage medium. Based on this understanding, the technical solution of the present application may be embodied essentially or in a part contributing to the prior art or in a part of the technical solution, in the form of a software product stored in a storage medium, comprising several instructions for causing a computer device (which may be a personal computer, a server, a network device, etc.) to perform all or part of the steps of the method according to the embodiments of the present application. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a random access Memory (Random Access Memory, RAM), a magnetic disk, or an optical disk, or other various media capable of storing program codes.
It should be noted that: like reference numerals and letters in the following figures denote like items, and thus once an item is defined in one figure, no further definition or explanation of it is required in the following figures, and furthermore, the terms "first," "second," "third," etc. are used merely to distinguish one description from another and are not to be construed as indicating or implying relative importance.
Finally, it should be noted that: the above examples are only specific embodiments of the present application, and are not intended to limit the scope of the present application, but it should be understood by those skilled in the art that the present application is not limited thereto, and that the present application is described in detail with reference to the foregoing examples: any person skilled in the art may modify or easily conceive of the technical solution described in the foregoing embodiments, or perform equivalent substitution of some of the technical features, while remaining within the technical scope of the present disclosure; such modifications, changes or substitutions do not depart from the spirit and scope of the corresponding technical solutions. Are intended to be encompassed within the scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.

Claims (10)

1. A patrol system, the patrol system comprising: control clusters and business clusters; the control cluster is in communication connection with the service cluster, acquires target data from the service cluster, and detects the target data to obtain a detection result;
the control cluster comprises a patrol functional component and a storage module; the service cluster comprises a container arranging system and a data monitoring system;
the inspection functional component is used for collecting metadata from the container arrangement system, collecting monitoring data from the data monitoring system, detecting the metadata and the monitoring data to obtain detection results, and storing the detection results in the storage module.
2. The inspection system of claim 1, wherein the container orchestration system is configured to aggregate hosts in containers to form a target cluster and manage the target cluster;
the inspection function component is used for collecting metadata from the container arrangement system, and comprises:
the inspection function component is used for collecting inspection items and inspection configuration from the container arrangement system and traversing the inspection items in the target cluster according to the inspection configuration.
3. The inspection system of claim 2, wherein the data monitoring system is configured to capture monitoring metrics of hosts, containers, services within a cluster, comprising:
the inspection functional component is used for collecting monitoring data from the data monitoring system and comprises:
the inspection functional component is used for collecting monitoring indexes corresponding to the inspection items from the data monitoring system according to the inspection items, and taking the monitoring indexes as the inspection indexes of the inspection items.
4. The inspection system of claim 3, wherein the inspection items comprise custom resources;
the inspection functional component is used for collecting monitoring indexes corresponding to the inspection items from the data monitoring system according to the inspection items, and comprises the following components:
the inspection functional component is used for collecting monitoring indexes corresponding to the custom resources from the data monitoring system according to the custom resources.
5. The inspection system of claim 3, wherein the inspection item comprises a native resource;
the inspection functional component is used for collecting monitoring indexes corresponding to the inspection items from the data monitoring system according to the inspection items, and comprises the following components:
the inspection functional component is used for collecting monitoring indexes corresponding to the original resources from the data monitoring system according to the original resources.
6. The inspection system of claim 4, wherein the custom resources include inspection item resources, inspection resources, and inspection detail resources;
the inspection item resources comprise names, descriptions, risk levels, early warning thresholds, detection indexes, influences, suggestions and whether each inspection item is opened or not;
the inspection resource records the starting time and the ending time of inspection, the overview of the risks of the inspection functional component and the data of the consumption of the inspection resource;
and the patrol detail resource records risk detail information of each patrol.
7. The inspection system of claim 5, wherein the native resource comprises an inspection configuration resource, wherein the inspection configuration resource records an inspection timer switch, a timer configuration, an inspection record retention count, an inspection report name, whether to send an inspection report, an inspection report notifier.
8. The inspection method is characterized by being applied to an inspection system, and the inspection system comprises: control clusters and business clusters; the control cluster is in communication connection with the service cluster; the method comprises the following steps:
the control cluster acquires target data from the service cluster, and detects the target data to obtain a detection result;
the control cluster comprises a patrol functional component and a storage module; the service cluster comprises a container arranging system and a data monitoring system;
the inspection functional component collects metadata from the container arrangement system, collects monitoring data from the data monitoring system, detects the metadata and the monitoring data to obtain detection results, and stores the detection results in the storage module.
9. An electronic device, comprising: a processor, a memory and a bus, the memory storing machine-readable instructions executable by the processor, the processor and the memory in communication over the bus when the electronic device is running, the machine-readable instructions when executed by the processor performing the steps of the patrol method of claim 8.
10. A computer-readable storage medium, characterized in that it has stored thereon a computer program which, when executed by a processor, performs the steps of the inspection method according to claim 8.
CN202311288201.1A 2023-10-08 2023-10-08 Inspection system, inspection method, electronic equipment and storage medium Active CN117014284B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311288201.1A CN117014284B (en) 2023-10-08 2023-10-08 Inspection system, inspection method, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311288201.1A CN117014284B (en) 2023-10-08 2023-10-08 Inspection system, inspection method, electronic equipment and storage medium

Publications (2)

Publication Number Publication Date
CN117014284A true CN117014284A (en) 2023-11-07
CN117014284B CN117014284B (en) 2023-12-19

Family

ID=88574759

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311288201.1A Active CN117014284B (en) 2023-10-08 2023-10-08 Inspection system, inspection method, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN117014284B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112506612A (en) * 2020-12-10 2021-03-16 北京浪潮数据技术有限公司 Cluster inspection method, device and equipment and readable storage medium
CN112965879A (en) * 2021-03-17 2021-06-15 北京奇艺世纪科技有限公司 Data processing method and device, electronic equipment and readable storage medium
WO2021129972A1 (en) * 2019-12-23 2021-07-01 Siemens Aktiengesellschaft Method for monitoring data traffic in a communication network, and access control system
CN114756328A (en) * 2022-04-21 2022-07-15 光大科技有限公司 Container cloud platform inspection method and device
CN115809119A (en) * 2022-12-26 2023-03-17 京东科技信息技术有限公司 Monitoring method, system and device for container arrangement engine

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2021129972A1 (en) * 2019-12-23 2021-07-01 Siemens Aktiengesellschaft Method for monitoring data traffic in a communication network, and access control system
CN112506612A (en) * 2020-12-10 2021-03-16 北京浪潮数据技术有限公司 Cluster inspection method, device and equipment and readable storage medium
CN112965879A (en) * 2021-03-17 2021-06-15 北京奇艺世纪科技有限公司 Data processing method and device, electronic equipment and readable storage medium
CN114756328A (en) * 2022-04-21 2022-07-15 光大科技有限公司 Container cloud platform inspection method and device
CN115809119A (en) * 2022-12-26 2023-03-17 京东科技信息技术有限公司 Monitoring method, system and device for container arrangement engine

Also Published As

Publication number Publication date
CN117014284B (en) 2023-12-19

Similar Documents

Publication Publication Date Title
US10649838B2 (en) Automatic correlation of dynamic system events within computing devices
US9471462B2 (en) Proactive risk analysis and governance of upgrade process
CN108628929B (en) Method and apparatus for intelligent archiving and analysis
CN105357038B (en) Monitor the method and system of cluster virtual machine
US9336331B2 (en) Detecting, using, and sharing it design patterns and anti-patterns
JP5479176B2 (en) Server device, peripheral device management method, and program
CN108521339B (en) Feedback type node fault processing method and system based on cluster log
CN111046011B (en) Log collection method, system, device, electronic equipment and readable storage medium
WO2011142042A1 (en) Method for visualizing server reliability, computer system, and management server
CN103490941A (en) Real-time monitoring on-line configuration method in cloud computing environment
KR20160120714A (en) Systems and methods for collecting, tracking, and storing system performance and event data for computing devices
CN102567185B (en) Monitoring method of application server
CN110674231A (en) Data lake-oriented user ID integration method and system
US20220036224A1 (en) Determination of storage configuration for enterprise distributed environment
US11567660B2 (en) Managing cloud storage for distributed file systems
CN111813497A (en) Container environment anomaly detection method, device, medium and computer equipment
CN112085535A (en) Resource metering charging method, device, cluster and storage medium
CN112306802A (en) Data acquisition method, device, medium and electronic equipment of system
CN108647118A (en) Copy abnormal restoring method, device and computer equipment based on storage cluster
CN111884853A (en) Cloud environment automatic resource management method and system
US20160283306A1 (en) Information processing apparatus, information processing method, and data center system
CN110275793A (en) A kind of detection method and equipment for MongoDB data fragmentation cluster
CN117014284B (en) Inspection system, inspection method, electronic equipment and storage medium
CN109818785A (en) A kind of data processing method, server cluster and storage medium
CN117390015A (en) Method and device for storing battery passport and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant