CN117033132A - Version incompatibility item detection method, device, equipment, medium and program product - Google Patents

Version incompatibility item detection method, device, equipment, medium and program product Download PDF

Info

Publication number
CN117033132A
CN117033132A CN202311025207.XA CN202311025207A CN117033132A CN 117033132 A CN117033132 A CN 117033132A CN 202311025207 A CN202311025207 A CN 202311025207A CN 117033132 A CN117033132 A CN 117033132A
Authority
CN
China
Prior art keywords
host database
transaction
incompatible
database
application
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202311025207.XA
Other languages
Chinese (zh)
Inventor
黄凤春
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Industrial and Commercial Bank of China Ltd ICBC
Original Assignee
Industrial and Commercial Bank of China Ltd ICBC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Industrial and Commercial Bank of China Ltd ICBC filed Critical Industrial and Commercial Bank of China Ltd ICBC
Priority to CN202311025207.XA priority Critical patent/CN117033132A/en
Publication of CN117033132A publication Critical patent/CN117033132A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/3051Monitoring arrangements for monitoring the configuration of the computing system or of the computing system component, e.g. monitoring the presence of processing resources, peripherals, I/O links, software programs
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/3003Monitoring arrangements specially adapted to the computing system or computing system component being monitored
    • G06F11/302Monitoring arrangements specially adapted to the computing system or computing system component being monitored where the computing system component is a software system
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/3065Monitoring arrangements determined by the means or processing involved in reporting the monitored data

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • Quality & Reliability (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Mathematical Physics (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The invention provides a version incompatibility item detection method which can be applied to the technical field of information security. The method for detecting the incompatible item of the version is applied to a system side, wherein the system side comprises an analog application and a host database and comprises the following steps: receiving a transaction instruction; accessing, by the simulation application, the host database based on the transaction instructions; monitoring the state of the host database under the condition that a preset monitoring switch is turned on; acquiring log information of the host database under the condition that the state of the host database is in error reporting; and analyzing the log information and outputting incompatible items. The present disclosure also provides a version incompatibility detecting apparatus, device, medium and program product.

Description

Version incompatibility item detection method, device, equipment, medium and program product
Technical Field
The present disclosure relates to the field of information security technologies, and in particular, to a method, an apparatus, a device, a medium, and a program product for detecting version incompatibility items.
Background
When the version of the host database changes, SQL grammar, keywords, functions and other differences can be introduced, so that incompatibility of application versions is caused. When the version of the host database is upgraded, the incompatible situation of the application version can be found as early and comprehensively as possible, the timely planning of the countermeasure is facilitated, the production risk is effectively avoided, and the stable production is ensured. Aiming at the possibly introduced application incompatibility situation of the version upgrade of the host database, the traditional method is to manually monitor the application error reporting situation from the application side by running a large amount of application transactions under the new version of the host database in the test environment, and then feed back the application error reporting situation to the system side personnel for analysis and processing, and the system side personnel further screen the correlation between the error reporting situation and the incompatibility situation according to expert experience, so that a final application incompatibility list is filtered.
The scheme of implementing state monitoring by the application side can intuitively find the situation of incompatible application versions, but still has the technical problems of error reporting reasons/incompatible version items, error positioning, error reporting reasons omission and the like.
Disclosure of Invention
In view of the foregoing, the present disclosure provides a version-incompatible item detection method, apparatus, device, medium, and program product that improve the accuracy and efficiency of locating incompatible items.
According to a first aspect of the present disclosure, there is provided a version incompatibility item detection method, the method being applied to a system side including an analog application and a host database, the method comprising: receiving a transaction instruction; accessing, by the simulation application, the host database based on the transaction instructions; monitoring the state of the host database under the condition that a preset monitoring switch is turned on; acquiring log information of the host database under the condition that the state of the host database is in error reporting; and analyzing the log information and outputting incompatible items.
According to an embodiment of the disclosure, the accessing, by the simulation application, the host database based on the transaction instructions includes: encapsulating, by the simulation application, the transaction instructions into transaction data, the transaction data including a transaction name; accessing middleware based on the transaction name; and invoking the host database by the middleware through a preset program and the transaction data.
According to an embodiment of the disclosure, the accessing, by the simulation application, the host database based on the transaction instruction further includes: encapsulating, by the simulation application, the transaction instructions into a transaction; and invoking, by the simulation application, the host database via the pre-set program and the transaction.
According to an embodiment of the present disclosure, the monitoring the state of the host database under the condition that a preset monitoring switch is turned on includes: monitoring whether an incompatible error report occurs in the log information of the host database; the obtaining log information of the host database includes: under the condition that an incompatible error report occurs in log information of the host database, acquiring key information in the log information, wherein the key information comprises the following components: environment name, incompatible item category, and program listing.
According to an embodiment of the present disclosure, before the monitoring the state of the host database under the condition that the preset monitoring switch is turned on, the method further includes: and responding to the starting operation of the host database, and starting the monitoring switch.
According to an embodiment of the disclosure, after the calling of the host database by the middleware through a preset program and the transaction data, or after the calling of the host database by the simulation application through the preset program and the transaction, the method further includes: and returning the host database to a state before being called.
According to an embodiment of the disclosure, after the parsing the log information and outputting the incompatible item, the method further includes: receiving a correction instruction, the correction instruction being for the incompatible item; and executing the correction instruction at the system side.
A second aspect of the present disclosure provides a version-incompatible item detection apparatus applied to a system side including an analog application and a host database, the apparatus comprising: the transaction instruction receiving module is used for receiving a transaction instruction; a database access module for accessing the host database through the simulation application based on the transaction instructions; the database monitoring module is used for monitoring the state of the host database under the condition that a preset monitoring switch is turned on; the log acquisition module is used for acquiring log information of the host database under the condition that the state of the host database is in error report; and the incompatible item output module is used for analyzing the log information and outputting incompatible items.
According to an embodiment of the disclosure, the database access module includes a transaction encapsulation unit, a middleware access unit, and a host database call unit: the transaction packaging unit is used for packaging the transaction instruction into transaction data by the simulation application, wherein the transaction data comprises transaction names; the middleware access unit is used for accessing the middleware based on the transaction name; and the host database calling unit is used for calling the host database by the middleware through a preset program and the transaction data.
According to an embodiment of the disclosure, the transaction packaging unit is further configured to package the transaction instruction into a transaction by the simulation application; and the host database calling unit is also used for calling the host database by the simulation application through the preset program and the transaction.
According to an embodiment of the disclosure, the database monitoring module includes a database monitoring unit, where the database monitoring unit is configured to monitor whether an incompatible error occurs in log information of the host database; the log obtaining module comprises a key message obtaining unit, wherein the key message obtaining unit is used for obtaining key messages in log information of the host database under the condition that incompatible errors occur in the log information, and the key messages comprise: environment name, incompatible item category, and program listing.
According to an embodiment of the disclosure, the device further includes a monitoring switch opening module, configured to open the monitoring switch in response to a start operation of the host database.
The embodiment of the disclosure further comprises a rollback unit, configured to rollback the host database to a state before being called.
According to an embodiment of the disclosure, the apparatus further includes a correction instruction receiving module and a correction instruction executing module, the correction instruction receiving module configured to receive a correction instruction, the correction instruction being for the incompatible item; and the correction instruction execution module is used for executing the correction instruction on the system side.
A third aspect of the present disclosure provides an electronic device, comprising: one or more processors; and a memory for storing one or more programs, wherein the one or more programs, when executed by the one or more processors, cause the one or more processors to perform the version incompatibility item detection method described above.
A fourth aspect of the present disclosure also provides a computer-readable storage medium having stored thereon executable instructions that, when executed by a processor, cause the processor to perform the above-described version-incompatibility item detection method.
A fifth aspect of the present disclosure also provides a computer program product comprising a computer program which, when executed by a processor, implements the version incompatibility term detection method described above.
In the embodiment of the disclosure, the technical problems of low positioning efficiency and inaccurate positioning of incompatible items between an application and a system under version change are solved. By arranging the simulation application on the original system side, the simulation application can directly access the database on the system side through the transaction instruction, so that the interference of the link problem caused by different sides between the application and the system in the original production scene is avoided, and the high efficiency and accuracy of incompatible item positioning are ensured.
Drawings
The foregoing and other objects, features and advantages of the disclosure will be more apparent from the following description of embodiments of the disclosure with reference to the accompanying drawings, in which:
FIG. 1 schematically illustrates an application scenario diagram of a version incompatibility detection method according to an embodiment of the present disclosure;
FIG. 2 schematically illustrates a flow chart of a version-incompatible item detection method according to an embodiment of the present disclosure;
FIG. 3 schematically illustrates a flow chart of another version of a method of incompatible item detection according to an embodiment of the present disclosure;
FIG. 4 schematically illustrates a block diagram of a version-incompatible item detection apparatus according to an embodiment of the present disclosure; and
fig. 5 schematically illustrates a block diagram of an electronic device adapted to implement a version-incompatible item detection method according to an embodiment of the present disclosure.
Detailed Description
Hereinafter, embodiments of the present disclosure will be described with reference to the accompanying drawings. It should be understood that the description is only exemplary and is not intended to limit the scope of the present disclosure. In the following detailed description, for purposes of explanation, numerous specific details are set forth in order to provide a thorough understanding of the embodiments of the present disclosure. It may be evident, however, that one or more embodiments may be practiced without these specific details. In addition, in the following description, descriptions of well-known structures and techniques are omitted so as not to unnecessarily obscure the concepts of the present disclosure.
The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the disclosure. The terms "comprises," "comprising," and/or the like, as used herein, specify the presence of stated features, steps, operations, and/or components, but do not preclude the presence or addition of one or more other features, steps, operations, or components.
All terms (including technical and scientific terms) used herein have the same meaning as commonly understood by one of ordinary skill in the art unless otherwise defined. It should be noted that the terms used herein should be construed to have meanings consistent with the context of the present specification and should not be construed in an idealized or overly formal manner.
Where expressions like at least one of "A, B and C, etc. are used, the expressions should generally be interpreted in accordance with the meaning as commonly understood by those skilled in the art (e.g.," a system having at least one of A, B and C "shall include, but not be limited to, a system having a alone, B alone, C alone, a and B together, a and C together, B and C together, and/or A, B, C together, etc.).
In the prior art, after the version is modified, a scheme of manually monitoring the error reporting condition of the application at the application side is generally adopted, although the incompatible condition of the application version corresponding to the version of the host database, namely the change of the version of the database, can be intuitively reflected, so that new error reporting occurs to the original normally operated application.
However, the following disadvantages still exist in the prior art:
1. the primary investigation is carried out from the error angle of the application side, and more false alarms can be caused due to the interference of factors such as environmental problems, application version problems and the like, and system side personnel are required to further analyze and work to accurately position system side factors.
2. Because the application has the nested calling condition, the same system class error may cause the application side explosive error, and the application side and the system side are matched and positioned to key applications by layer-by-layer filtration, thereby locking the truly triggered system side factors.
3. The comprehensiveness of monitoring depends on the coverage of the application running, with the risk of omission.
To solve the technical problems existing in the prior art, embodiments of the present disclosure provide a version incompatibility item detection method, where the method is applied to a system side, the system side includes an analog application and a host database, and the method includes: receiving a transaction instruction; accessing, by the simulation application, the host database based on the transaction instructions; monitoring the state of the host database under the condition that a preset monitoring switch is turned on; acquiring log information of the host database under the condition that the state of the host database is in error reporting; and analyzing the log information and outputting incompatible items.
In the embodiment of the disclosure, the technical problems of low positioning efficiency and inaccurate positioning of incompatible items between an application and a system under version change are solved. By arranging the simulation application on the original system side, the simulation application can directly access the database on the system side through the transaction instruction, so that the interference of the link problem caused by different sides between the application and the system in the original production scene is avoided, and the high efficiency and accuracy of incompatible item positioning are ensured.
Fig. 1 schematically illustrates an application scenario diagram of a version incompatibility detection method according to an embodiment of the present disclosure.
As shown in fig. 1, an application scenario 100 according to this embodiment may include terminal devices 101, 102, 103, a network 104, and a server 105. The network 104 is used as a medium to provide communication links between the terminal devices 101, 102, 103 and the server 105. The network 104 may include various connection types, such as wired, wireless communication links, or fiber optic cables, among others.
The user may interact with the server 105 via the network 104 using the terminal devices 101, 102, 103 to receive or send messages or the like. Various communication client applications, such as shopping class applications, web browser applications, search class applications, instant messaging tools, mailbox clients, social platform software, etc. (by way of example only) may be installed on the terminal devices 101, 102, 103.
The terminal devices 101, 102, 103 may be a variety of electronic devices having a display screen and supporting web browsing, including but not limited to smartphones, tablets, laptop and desktop computers, and the like.
The server 105 may be a server providing various services, such as a background management server (by way of example only) providing support for websites browsed by users using the terminal devices 101, 102, 103. The background management server may analyze and process the received data such as the user request, and feed back the processing result (e.g., the web page, information, or data obtained or generated according to the user request) to the terminal device.
It should be noted that the version incompatibility detection method provided by the embodiments of the present disclosure may be generally performed by the server 105. Accordingly, the version incompatibility detecting means provided by the embodiments of the present disclosure may be generally provided in the server 105. The version incompatibility detection method provided by the embodiments of the present disclosure may also be performed by a server or a server cluster that is different from the server 105 and is capable of communicating with the terminal devices 101, 102, 103 and/or the server 105. Accordingly, the version incompatibility detecting means provided by the embodiments of the present disclosure may also be provided in a server or a server cluster different from the server 105 and capable of communicating with the terminal devices 101, 102, 103 and/or the server 105.
It should be understood that the number of terminal devices, networks and servers in fig. 1 is merely illustrative. There may be any number of terminal devices, networks, and servers, as desired for implementation.
The version incompatibility detection method of the disclosed embodiment will be described in detail below with reference to fig. 2 to 3 based on the scenario described in fig. 1.
Fig. 2 schematically illustrates a flowchart of a version-incompatible item detection method according to an embodiment of the present disclosure.
As shown in fig. 2, the version incompatibility item detecting method of this embodiment includes operations S210 to S250, which can be performed by the server 105.
According to an embodiment of the present disclosure, the method is applied to a system side comprising an analog application and a host database.
Specifically, in a typical production environment, a user may access the system side through the application side during execution of one transaction, so as to implement data calling in a host database in the system side, and perform database operations (such as adding, deleting, and checking) on the data in the host database during the process. In the actual production environment, as shown in fig. 1, the system is configured in the server 105 (of course, the server cluster 105 may be used), the application may be configured in the server 105 (of course, the server cluster 105 may be used), or the application may be configured in the terminals 101, 102, 103. In the embodiment of the disclosure, the application is configured in the system, so that the host database can be directly accessed, a link from the system side to the application side in the production environment is omitted, the host application state is directly positioned from the system side, and the interference of the multi-factor state of the application side is avoided.
In operation S210, a transaction instruction is received.
In operation S220, the host database is accessed through the simulation application based on the transaction instruction.
In particular, the application may be divided into a plurality of applications based on different transaction services, for example, applications including a withdrawal application, a query application, and a transfer application, etc., which relate to the actual services of the bank. Thus, for a transaction instruction, the data triggering the application to make an instruction to access the host database, where the instruction generally includes necessary service information, such as a user ID, a password, an operation instruction, and the like, in a typical scenario, the withdrawal application receives the transaction instruction, and the withdrawal application encapsulates the transaction instruction into a form of a transaction, transmits the transaction instruction through a specific interface, transmits the transaction instruction through a link to a program calling the host database, instructs to query and modify corresponding data in the host database (e.g., a balance 200 element, a balance 100 element is left after taking 100), and modifies corresponding data in the host database, and returns the corresponding data to the withdrawal application.
According to an embodiment of the disclosure, the accessing, by the simulation application, the host database based on the transaction instructions includes: encapsulating, by the simulation application, the transaction instructions into transaction data, the transaction data including a transaction name; accessing middleware based on the transaction name; and invoking the host database by the middleware through a preset program and the transaction data.
Under the scene of setting simulation application in the system, compiling simulation is required to be carried out on the operation of the transaction, specifically: the application packages the received transaction instruction into a transaction and generates a transaction name, and the application accesses the middleware through a transaction interface based on the transaction name, wherein the transaction interface is an interface of the application accessing the middleware; the middleware further calls the host database through the program, wherein the program is an interface for the middleware to access the host database, and the program can generate SQL sentences including add sentences, delete sentences, modify sentences and query sentences.
According to an embodiment of the disclosure, the accessing, by the simulation application, the host database based on the transaction instruction further includes: encapsulating, by the simulation application, the transaction instructions into a transaction; and invoking, by the simulation application, the host database via the pre-set program and the transaction.
Alternatively, unlike the above embodiment, in the scenario where the simulation application is set in the system, the middleware calling program is not required, which specifically includes: the application packages the received transaction instruction into a transaction and generates a transaction name; and the application invokes the host database through the program.
It can be understood that in the process of calling the host database through the program, the designed calling grammar should cover the content of version modification in all aspects, and simulate the running behavior of the application through the compiling operation of the system side, so as to avoid the dependence on the running coverage rate of the application.
According to an embodiment of the disclosure, after the calling of the host database by the middleware through a preset program and the transaction data, or after the calling of the host database by the simulation application through the preset program and the transaction, the method further includes: and returning the host database to a state before being called.
Specifically, if the current test requires a modification policy for data in the host database, for example, in the withdrawal service, the current balance is 200, the withdrawal is 100, and the remaining balance is 100, then the data for the corresponding account is modified in the host database. In embodiments of the present disclosure, after the simulation compilation, modifications to the host database need to be rolled back to the state prior to access.
In operation S230, the state of the host database is monitored with a preset monitoring switch turned on.
It should be noted that, because the simulation application is related to the host database through the program, under the condition that the version of the host database changes to cause the error reporting of the application, the error reporting of the accessed program can be directly reflected, so that the abnormal condition of the application accessing the database can be monitored through the operation error reporting condition of the monitoring program. For example, in the case of a bank card balance query, the account number used for the query is 18 bits, and after the version of the host database is modified, when the table originally used for writing the 18-bit format of the account number is modified into the table of 20-bit format (for example, 00+18-bit account number), the queried data cannot be written into the data table from the host database, and then the database may issue an incompatible error report.
In operation S240, in case that a status of the host database is in error, log information of the host database is acquired.
According to an embodiment of the present disclosure, the monitoring the state of the host database under the condition that a preset monitoring switch is turned on includes: monitoring whether an incompatible error report occurs in the log information of the host database; the obtaining log information of the host database includes: under the condition that an incompatible error report occurs in log information of the host database, acquiring key information in the log information, wherein the key information comprises the following components: environment name, incompatible item category, and program listing.
Specifically, when accessing the host database, if an error occurs in the application due to version incompatibility, a key message is recorded in the database log. By monitoring the database log, the key information is extracted and written into the state record file, and after long-time starting, monitoring and recording, the state record file can comprehensively record the host application incompatibility condition. And analyzing and summarizing the record files, firstly classifying the incompatible conditions according to the environment names of the database, and summarizing the incompatible conditions of the same class to obtain a daily environment name, an incompatible item category and a program list.
In operation S250, the log information is parsed, and incompatible items are output.
Wherein incompatible items relate to keywords, time formats, decimal formats, functions, etc., wherein for keywords means: default keywords in the system, generally cannot be the names of the columns of the application table; the time format is as follows: time format conversion, for example, the original is "year, month, day, time, minute, second", and the version is "time, second, year, month, day", and second; the decimal format refers to: version modification of the fractional count mode, such as a truncated or zero-filled mode; the functions are as follows: 1. the format conversion of the numbers is different; 2. and (5) judging the function logic.
Specifically, the output incompatible item facilitates the related technician to quickly and accurately locate the version incompatible item, and further, the related technician can analyze the reason of the location and plan the countermeasure. And corresponding instructions are sent to guide the modification of the incompatible version items.
In the embodiment of the disclosure, the technical problems of low positioning efficiency and inaccurate positioning of incompatible items between an application and a system under version change are solved. By arranging the simulation application on the original system side, the simulation application can directly access the database on the system side through the transaction instruction, so that the interference of the link problem caused by different sides between the application and the system in the original production scene is avoided, and the high efficiency and accuracy of incompatible item positioning are ensured.
Fig. 3 schematically illustrates a flow chart of another version of an incompatible item detection method according to an embodiment of the present disclosure.
As shown in fig. 3, the method for detecting incompatible items in another version of this embodiment includes, in addition to operations S210 to S250, operations S310 and operations S320 to S330, where the operations S310 are performed before the operations S230, and the operations S320 to S330 are performed after the operations S250.
In operation S310, the monitoring switch is turned on in response to a start-up operation of the host database.
Specifically, the opening of the monitoring scheme generally has additional overhead on system performance, and in order to avoid interference on application performance in a special period, in the embodiment of the disclosure, a monitoring switch is firstly designed from a host database system side, so as to provide a function of opening and closing application state monitoring as required. After the switch is started, the subsequent functions of extracting the log of the host database and writing the state file are started; after the switch is closed, the subsequent host database log extraction and status file writing functions are closed. Since this switch is a host database system side function, it will close by default after the host database is restarted. In order to avoid the failure of the monitoring function caused by the restarting of the database, the automatic starting monitoring strategy along with the restarting of the database of the host is deployed, namely, the command of starting the monitoring switch is automatically triggered after the starting message of the database is monitored by the automation tool of the host, so that the automatic starting function of the monitoring switch along with the restarting of the database is realized.
In operation S320, a correction instruction is received, the correction instruction being for the incompatible item.
In operation S330, the correction instruction is executed at the system side.
According to an embodiment of the present disclosure, further comprising: the correction instruction is executed at an application side in the production environment.
In particular, if uniformly evasive from the system-side parameter settings, the observation term can be incorporated in the case of incompatible terms. If the method cannot be avoided from the system side, an application personnel analysis is required to be sent to the environment name, the incompatible item and the program list, and application version optimization is carried out from the application transformation perspective so as to adapt to the new version of the database.
In the embodiment of the disclosure, because there may be a difference between applications in processing logic for acquired data, if one-to-one correction is performed for each application side, the workload is excessive, and in the embodiment of the disclosure, correction of incompatible items is preferably performed on the system, so that correction efficiency is greatly improved.
Based on the version incompatibility item detection method, the disclosure also provides a version incompatibility item detection device. The device will be described in detail below in connection with fig. 4.
Fig. 4 schematically illustrates a block diagram of a version-incompatible item detection apparatus according to an embodiment of the present disclosure.
As shown in fig. 4, the version-incompatible item detecting apparatus 400 of this embodiment includes a transaction instruction receiving module 410, a database accessing module 420, a database monitoring module 430, a log obtaining module 440, and an incompatible item outputting module 450.
According to an embodiment of the present disclosure, the apparatus is applied to a system side comprising an analog application and a host database.
The transaction instruction receiving module 410 is configured to receive a transaction instruction. In an embodiment, the transaction instruction receiving module 410 may be configured to perform the operation S210 described above, which is not described herein.
The database access module 420 is configured to access the host database through the simulation application based on the transaction instructions. In an embodiment, the database access module 420 may be used to perform the operation S220 described above, which is not described herein.
The database monitoring module 430 is configured to monitor a state of the host database when a preset monitoring switch is turned on. In an embodiment, the database monitoring module 430 may be used to perform the operation S230 described above, which is not described herein.
The log obtaining module 440 is configured to obtain log information of the host database when a status of the host database is in error. In an embodiment, the log obtaining module 440 may be configured to perform the operation S250 described above, which is not described herein.
The incompatible item output module 450 is configured to parse the log information and output an incompatible item. In an embodiment, the incompatible item output module 450 may be used to perform the operation S250 described above, which is not described herein.
In the embodiment of the disclosure, the technical problems of low positioning efficiency and inaccurate positioning of incompatible items between an application and a system under version change are solved. By arranging the simulation application on the original system side, the simulation application can directly access the database on the system side through the transaction instruction, so that the interference of the link problem caused by different sides between the application and the system in the original production scene is avoided, and the high efficiency and accuracy of incompatible item positioning are ensured.
According to an embodiment of the disclosure, the database access module includes a transaction encapsulation unit, a middleware access unit, and a host database call unit: the transaction packaging unit is used for packaging the transaction instruction into transaction data by the simulation application, wherein the transaction data comprises transaction names; the middleware access unit is used for accessing the middleware based on the transaction name; and the host database calling unit is used for calling the host database by the middleware through a preset program and the transaction data.
According to an embodiment of the disclosure, the transaction packaging unit is further configured to package the transaction instruction into a transaction by the simulation application; and the host database calling unit is also used for calling the host database by the simulation application through the preset program and the transaction.
According to an embodiment of the disclosure, the database monitoring module includes a database monitoring unit, where the database monitoring unit is configured to monitor whether an incompatible error occurs in log information of the host database; the log obtaining module comprises a key message obtaining unit, wherein the key message obtaining unit is used for obtaining key messages in log information of the host database under the condition that incompatible errors occur in the log information, and the key messages comprise: environment name, incompatible item category, and program listing.
According to an embodiment of the disclosure, the device further includes a monitoring switch opening module, configured to open the monitoring switch in response to a start operation of the host database.
The embodiment of the disclosure further comprises a rollback unit, configured to rollback the host database to a state before being called.
According to an embodiment of the disclosure, the apparatus further includes a correction instruction receiving module and a correction instruction executing module, the correction instruction receiving module configured to receive a correction instruction, the correction instruction being for the incompatible item; and the correction instruction execution module is used for executing the correction instruction on the system side.
Any of the transaction instruction receiving module 410, the database access module 420, the database monitoring module 430, the log obtaining module 440, and the incompatible item output module 450 may be combined in one module or any of the modules may be split into multiple modules according to embodiments of the present disclosure. Alternatively, at least some of the functionality of one or more of the modules may be combined with at least some of the functionality of other modules and implemented in one module. According to embodiments of the present disclosure, at least one of the transaction instruction receiving module 410, the database access module 420, the database monitoring module 430, the log obtaining module 440, and the incompatible item output module 450 may be implemented, at least in part, as hardware circuitry, such as a Field Programmable Gate Array (FPGA), a Programmable Logic Array (PLA), a system-on-chip, a system-on-substrate, a system-on-package, an Application Specific Integrated Circuit (ASIC), or as hardware or firmware in any other reasonable manner of integrating or packaging the circuitry, or as any one of or a suitable combination of three of software, hardware, and firmware. Alternatively, at least one of the transaction instruction receiving module 410, the database access module 420, the database monitoring module 430, the log obtaining module 440, and the incompatible item output module 450 may be at least partially implemented as a computer program module that, when executed, performs the corresponding functions.
Fig. 5 schematically illustrates a block diagram of an electronic device adapted to implement a version-incompatible item detection method according to an embodiment of the present disclosure.
As shown in fig. 5, an electronic device 500 according to an embodiment of the present disclosure includes a processor 501 that can perform various appropriate actions and processes according to a program stored in a Read Only Memory (ROM) 502 or a program loaded from a storage section 508 into a Random Access Memory (RAM) 503. The processor 501 may include, for example, a general purpose microprocessor (e.g., a CPU), an instruction set processor and/or an associated chipset and/or a special purpose microprocessor (e.g., an Application Specific Integrated Circuit (ASIC)), or the like. The processor 501 may also include on-board memory for caching purposes. The processor 501 may comprise a single processing unit or a plurality of processing units for performing different actions of the method flows according to embodiments of the disclosure.
In the RAM 503, various programs and data required for the operation of the electronic apparatus 500 are stored. The processor 501, ROM 502, and RAM 503 are connected to each other by a bus 504. The processor 501 performs various operations of the method flow according to the embodiments of the present disclosure by executing programs in the ROM 502 and/or the RAM 503. Note that the program may be stored in one or more memories other than the ROM 502 and the RAM 503. The processor 501 may also perform various operations of the method flow according to embodiments of the present disclosure by executing programs stored in the one or more memories.
According to an embodiment of the present disclosure, the electronic device 500 may also include an input/output (I/O) interface 505, the input/output (I/O) interface 505 also being connected to the bus 504. The electronic device 500 may also include one or more of the following components connected to the I/O interface 505: an input section 506 including a keyboard, a mouse, and the like; an output portion 507 including a Cathode Ray Tube (CRT), a Liquid Crystal Display (LCD), and the like, and a speaker, and the like; a storage portion 508 including a hard disk and the like; and a communication section 509 including a network interface card such as a LAN card, a modem, or the like. The communication section 509 performs communication processing via a network such as the internet. The drive 510 is also connected to the I/O interface 505 as needed. A removable medium 511 such as a magnetic disk, an optical disk, a magneto-optical disk, a semiconductor memory, or the like is mounted on the drive 510 as needed so that a computer program read therefrom is mounted into the storage section 508 as needed.
The present disclosure also provides a computer-readable storage medium that may be embodied in the apparatus/device/system described in the above embodiments; or may exist alone without being assembled into the apparatus/device/system. The computer-readable storage medium carries one or more programs which, when executed, implement methods in accordance with embodiments of the present disclosure.
According to embodiments of the present disclosure, the computer-readable storage medium may be a non-volatile computer-readable storage medium, which may include, for example, but is not limited to: a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the context of this disclosure, a computer-readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. For example, according to embodiments of the present disclosure, the computer-readable storage medium may include ROM 502 and/or RAM 503 and/or one or more memories other than ROM 502 and RAM 503 described above.
Embodiments of the present disclosure also include a computer program product comprising a computer program containing program code for performing the methods shown in the flowcharts. The program code, when executed in a computer system, causes the computer system to implement the item recommendation method provided by embodiments of the present disclosure.
The above-described functions defined in the system/apparatus of the embodiments of the present disclosure are performed when the computer program is executed by the processor 501. The systems, apparatus, modules, units, etc. described above may be implemented by computer program modules according to embodiments of the disclosure.
In one embodiment, the computer program may be based on a tangible storage medium such as an optical storage device, a magnetic storage device, or the like. In another embodiment, the computer program may also be transmitted, distributed, and downloaded and installed in the form of a signal on a network medium, and/or installed from a removable medium 511 via the communication portion 509. The computer program may include program code that may be transmitted using any appropriate network medium, including but not limited to: wireless, wired, etc., or any suitable combination of the foregoing.
In such an embodiment, the computer program may be downloaded and installed from a network via the communication portion 509, and/or installed from the removable media 511. The above-described functions defined in the system of the embodiments of the present disclosure are performed when the computer program is executed by the processor 501. The systems, devices, apparatus, modules, units, etc. described above may be implemented by computer program modules according to embodiments of the disclosure.
According to embodiments of the present disclosure, program code for performing computer programs provided by embodiments of the present disclosure may be written in any combination of one or more programming languages, and in particular, such computer programs may be implemented in high-level procedural and/or object-oriented programming languages, and/or assembly/machine languages. Programming languages include, but are not limited to, such as Java, c++, python, "C" or similar programming languages. The program code may execute entirely on the user's computing device, partly on the user's device, partly on a remote computing device, or entirely on the remote computing device or server. In the case of remote computing devices, the remote computing device may be connected to the user computing device through any kind of network, including a Local Area Network (LAN) or a wide area network (WA), or may be connected to an external computing device (e.g., connected via the Internet using an Internet service provider).
The flowcharts and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present disclosure. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams or flowchart illustration, and combinations of blocks in the block diagrams or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
Those skilled in the art will appreciate that the features recited in the various embodiments of the disclosure and/or in the claims may be provided in a variety of combinations and/or combinations, even if such combinations or combinations are not explicitly recited in the disclosure. In particular, the features recited in the various embodiments of the present disclosure and/or the claims may be variously combined and/or combined without departing from the spirit and teachings of the present disclosure. All such combinations and/or combinations fall within the scope of the present disclosure.
The embodiments of the present disclosure are described above. However, these examples are for illustrative purposes only and are not intended to limit the scope of the present disclosure. Although the embodiments are described above separately, this does not mean that the measures in the embodiments cannot be used advantageously in combination. The scope of the disclosure is defined by the appended claims and equivalents thereof. Various alternatives and modifications can be made by those skilled in the art without departing from the scope of the disclosure, and such alternatives and modifications are intended to fall within the scope of the disclosure.

Claims (11)

1. A version incompatibility detection method, the method being applied to a system side, the system side comprising an analog application and a host database, the method comprising:
receiving a transaction instruction;
accessing, by the simulation application, the host database based on the transaction instructions;
monitoring the state of the host database under the condition that a preset monitoring switch is turned on;
acquiring log information of the host database under the condition that the state of the host database is in error reporting; and
and analyzing the log information and outputting incompatible items.
2. The method of claim 1, wherein the accessing, by the simulation application, the host database based on the transaction instructions comprises:
encapsulating, by the simulation application, the transaction instructions into transaction data, the transaction data including a transaction name;
accessing middleware based on the transaction name; and
and calling the host database by the middleware through a preset program and the transaction data.
3. The method of claim 2, wherein the accessing the host database by the simulation application based on the transaction instructions further comprises:
encapsulating, by the simulation application, the transaction instructions into a transaction; and
and calling the host database by the simulation application through the preset program and the transaction.
4. The method of claim 3, wherein,
and under the condition that a preset monitoring switch is started, monitoring the state of the host database, wherein the monitoring comprises the following steps:
monitoring whether an incompatible error report occurs in the log information of the host database;
the obtaining log information of the host database includes:
under the condition that an incompatible error report occurs in log information of the host database, acquiring key information in the log information, wherein the key information comprises the following components: environment name, incompatible item category, and program listing.
5. The method of claim 1, wherein before monitoring the state of the host database with the preset monitor switch on, the method further comprises:
and responding to the starting operation of the host database, and starting the monitoring switch.
6. The method of claim 3, wherein,
after the host database is called by the middleware through a preset program and the transaction data, or after the host database is called by the simulation application through the preset program and the transaction, the method further comprises:
and returning the host database to a state before being called.
7. The method of any of claims 1-5, wherein after said parsing the log information to output incompatible items, the method further comprises:
receiving a correction instruction, the correction instruction being for the incompatible item; and
and executing the correction instruction at the system side.
8. A version-incompatible item detection apparatus, the apparatus being applied to a system side, the system side comprising an analog application and a host database, the apparatus comprising:
the transaction instruction receiving module is used for receiving a transaction instruction;
a database access module for accessing the host database through the simulation application based on the transaction instructions;
the database monitoring module is used for monitoring the state of the host database under the condition that a preset monitoring switch is turned on;
the log acquisition module is used for acquiring log information of the host database under the condition that the state of the host database is in error report; and
and the incompatible item output module is used for analyzing the log information and outputting incompatible items.
9. An electronic device, comprising:
one or more processors;
storage means for storing one or more programs,
wherein the one or more programs, when executed by the one or more processors, cause the one or more processors to perform the method of any of claims 1-7.
10. A computer readable storage medium having stored thereon executable instructions which, when executed by a processor, cause the processor to perform the method according to any of claims 1-7.
11. A computer program product comprising a computer program which, when executed by a processor, implements the method according to any one of claims 1 to 7.
CN202311025207.XA 2023-08-15 2023-08-15 Version incompatibility item detection method, device, equipment, medium and program product Pending CN117033132A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311025207.XA CN117033132A (en) 2023-08-15 2023-08-15 Version incompatibility item detection method, device, equipment, medium and program product

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311025207.XA CN117033132A (en) 2023-08-15 2023-08-15 Version incompatibility item detection method, device, equipment, medium and program product

Publications (1)

Publication Number Publication Date
CN117033132A true CN117033132A (en) 2023-11-10

Family

ID=88644449

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311025207.XA Pending CN117033132A (en) 2023-08-15 2023-08-15 Version incompatibility item detection method, device, equipment, medium and program product

Country Status (1)

Country Link
CN (1) CN117033132A (en)

Similar Documents

Publication Publication Date Title
CN109284269B (en) Abnormal log analysis method and device, storage medium and server
US9529662B1 (en) Dynamic rule-based automatic crash dump analyzer
CA2852760A1 (en) Migration assessment for cloud computing platforms
CN110489310B (en) Method and device for recording user operation, storage medium and computer equipment
CN114153703A (en) Micro-service exception positioning method and device, electronic equipment and program product
CN113918864A (en) Website page testing method, testing system, testing device, electronic equipment and medium
CN109492144B (en) Association relation analysis method, device and storage medium for software system
CN116302561A (en) State control method, device, equipment and storage medium for application instance
CN115686904A (en) Webpage diagnosis method, equipment and system
CN117033132A (en) Version incompatibility item detection method, device, equipment, medium and program product
CN114462030A (en) Privacy policy processing and evidence obtaining method, device, equipment and storage medium
CN112162954B (en) User operation log generation and path positioning method, device, equipment and medium
CN117009397A (en) Data query method, data query device, electronic equipment and storage medium
CN114090514A (en) Log retrieval method and device for distributed system
CN113342619A (en) Log monitoring method and system, electronic device and readable medium
KR20220071173A (en) Computerized systems and methods for processing high-volume log files from virtual servers
CN111488230A (en) Method and device for modifying log output level, electronic equipment and storage medium
CN112347510B (en) Desensitizing method and desensitizing device
CN115190008B (en) Fault processing method, fault processing device, electronic equipment and storage medium
CN114826894A (en) Method for displaying page popup windows of monitoring system and rapidly positioning faults
CN113590425A (en) Data processing method, apparatus, device, medium, and program product
CN116737464A (en) Backup failure handling method, apparatus, device, medium and program product
CN118277204A (en) Data acquisition method, data acquisition device, electronic equipment, storage medium and program product
CN117131018A (en) Data processing method and device, electronic equipment and storage medium
CN117472716A (en) Non-invasive application log acquisition method, device, equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination