CN117075916A - Application deployment method, device, equipment and storage medium - Google Patents

Application deployment method, device, equipment and storage medium Download PDF

Info

Publication number
CN117075916A
CN117075916A CN202311034384.4A CN202311034384A CN117075916A CN 117075916 A CN117075916 A CN 117075916A CN 202311034384 A CN202311034384 A CN 202311034384A CN 117075916 A CN117075916 A CN 117075916A
Authority
CN
China
Prior art keywords
deployment
server
time
determining
servers
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202311034384.4A
Other languages
Chinese (zh)
Inventor
张舒惠
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Bank of China Ltd
Original Assignee
Bank of China Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Bank of China Ltd filed Critical Bank of China Ltd
Priority to CN202311034384.4A priority Critical patent/CN117075916A/en
Publication of CN117075916A publication Critical patent/CN117075916A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/60Software deployment
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/108Network architectures or network communication protocols for network security for controlling access to devices or network resources when the policy decisions are valid for a limited amount of time
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network

Landscapes

  • Engineering & Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Stored Programmes (AREA)

Abstract

The application provides an application deployment method, an application deployment device and a storage medium, which can be used in the field of distributed technology. The method comprises the following steps: acquiring an application deployment request, wherein the application deployment request is used for requesting to deploy a target application program in a plurality of servers; server information of each server is obtained from a preset database, wherein the server information comprises login password information and the residual storage resource amount; according to the server information of each server, determining a deployment detection result of the target application program, wherein the deployment detection result is passed or failed; and when the deployment detection result is that the deployment detection is passed, the target application program is controlled to be deployed in a plurality of servers. The failure rate of the target application program deployment is reduced.

Description

Application deployment method, device, equipment and storage medium
Technical Field
The present application relates to the field of distributed technologies, and in particular, to an application deployment method, apparatus, device, and storage medium.
Background
Distributed applications refer to applications that are distributed across different computers, i.e., related applications need to be deployed across multiple servers.
In the related art, it is necessary to upload a deployment package corresponding to each server to the corresponding server so that all servers deploy related applications together. In the process of deploying the application program, if any one of the servers reports errors, the whole application program deployment fails.
Disclosure of Invention
The application provides an application deployment method, an application deployment device and a storage medium, which are used for solving the problem that the whole application deployment fails due to the fact that any one server reports errors.
In a first aspect, the present application provides an application deployment method, including:
acquiring an application deployment request, wherein the application deployment request is used for requesting to deploy a target application program in a plurality of servers;
server information of each server is obtained from a preset database, wherein the server information comprises login password information and residual storage resource quantity;
according to the server information of each server, determining a deployment detection result of the target application program, wherein the deployment detection result is passed or failed;
and controlling the deployment of the target application program in the plurality of servers when the deployment detection result is that the deployment detection is passed.
In one possible implementation manner, determining a deployment detection result of the target application according to server information of each server includes:
determining a login password state of any one server according to the login password information of the server, wherein the login password state is an expired state or an unexpired state;
if the login password state of the server in the plurality of servers is the expiration state, determining that the deployment detection result is that the deployment detection is not passed;
and if the login password states of the servers are respectively the unexpired states, determining the deployment detection result according to the residual storage resource quantity of each server.
In one possible implementation manner, the login password information includes a password setting time and a preset duration; determining the login password state of the server according to the login password information of the server comprises the following steps:
determining a password expiration time according to the password setting time and the preset time, wherein the password expiration time is positioned after the password setting time, and the time between the password expiration time and the password setting time is the preset time;
Determining a deployment time length, wherein the deployment time length is a time length required by deploying the target application program in the plurality of servers;
and determining the login password state according to the deployment time, the password expiration time and the current time.
In one possible implementation manner, determining the login password state according to the deployment duration, the password expiration time and the current time includes:
determining a target time according to the deployment time and the password expiration time, wherein the target time is positioned before the password expiration time, and the time between the target time and the password expiration time is the deployment time;
if the target time is located before the current time or the target time is the same as the current time, determining that the login password state is the unexpired state;
and if the target time is positioned after the current time, determining the login password state as the expiration state.
In one possible implementation, determining the deployment detection result according to the remaining amount of storage resources of each server includes:
determining a target amount of storage resources required by the target application;
If the residual resource storage amounts of the plurality of servers are respectively larger than the target storage resource amounts, determining that the deployment detection result is that the deployment detection is passed;
and if the residual resource storage amount of the servers in the plurality of servers is smaller than or equal to the target storage resource amount, determining that the deployment detection result is that the deployment detection is not passed.
In one possible implementation, controlling deployment of the target application in the plurality of servers includes:
and sending a deployment instruction to the plurality of servers, wherein the deployment instruction comprises an identification of the target application program, and the deployment instruction is used for indicating the deployment of the target application program in the plurality of servers.
In a possible implementation manner, the server is provided with a preset process, wherein,
the preset process is used for acquiring the login password information from the system file of the server and storing the login password information into the preset database;
the preset process is further used for obtaining the residual storage resource amount from the program file of the server, and storing the residual storage resource amount into the preset database.
In one possible embodiment, the method further comprises:
displaying the login password state and the residual storage resource amount of each server; or,
and sending the login password state and the residual storage resource amount of each server to preset equipment.
In a second aspect, the present application provides an application deployment apparatus, comprising:
the system comprises a first acquisition module, a second acquisition module and a third acquisition module, wherein the first acquisition module is used for acquiring an application deployment request, and the application deployment request is used for requesting to deploy a target application program in a plurality of servers;
the second acquisition module is used for acquiring server information of each server in a preset database, wherein the server information comprises login password information and the residual storage resource amount;
the determining module is used for determining a deployment detection result of the target application program according to the server information of each server, wherein the deployment detection result is passed or failed;
and the control module is used for controlling the deployment of the target application program in the servers when the deployment detection result is that the deployment detection is passed.
In a third aspect, the present application provides an electronic device comprising: a processor, and a memory communicatively coupled to the processor;
The memory stores computer-executable instructions;
the processor executes computer-executable instructions stored in the memory to implement the method of any one of the first aspects.
In a fourth aspect, the present application provides a computer-readable storage medium having stored therein computer-executable instructions for performing the method of any of the first aspects when executed by a processor.
In a fifth aspect, the application provides a computer program product comprising a computer program which, when executed by a processor, implements the method of any of the first aspects.
The application provides an application deployment method, an application deployment device, application deployment equipment and a storage medium, wherein an application deployment request is acquired and is used for requesting to deploy target application programs in a plurality of servers; server information of each server is obtained from a preset database, wherein the server information comprises login password information and the residual storage resource amount; according to the server information of each server, determining a deployment detection result of the target application program, wherein the deployment detection result is passed or failed; and when the deployment detection result is that the deployment detection is passed, the target application program is controlled to be deployed in a plurality of servers. Server information is obtained from a preset database, so that the coupling between servers is reduced; and the target application program is deployed according to the server information, so that the failure rate of the target application program deployment is reduced, the deployment time is shortened, and the deployment efficiency is improved.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the application and together with the description, serve to explain the principles of the application.
Fig. 1 is a schematic view of an application scenario provided in an embodiment of the present application;
fig. 2 is a schematic flow chart of an application deployment method according to an embodiment of the present application;
FIG. 3 is a flowchart of another method for deploying an application according to an embodiment of the present application;
FIG. 4 is a schematic view of various time positions according to an embodiment of the present application;
FIG. 5 is a flowchart of another method for deploying an application according to an embodiment of the present application;
fig. 6 is a schematic structural diagram of an application deployment device according to an embodiment of the present application;
fig. 7 is a schematic structural diagram of an electronic device according to an embodiment of the present application.
Specific embodiments of the present application have been shown by way of the above drawings and will be described in more detail below. The drawings and the written description are not intended to limit the scope of the inventive concepts in any way, but rather to illustrate the inventive concepts to those skilled in the art by reference to the specific embodiments.
Detailed Description
Reference will now be made in detail to exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numbers in different drawings refer to the same or similar elements, unless otherwise indicated. The implementations described in the following exemplary examples do not represent all implementations consistent with the application. Rather, they are merely examples of apparatus and methods consistent with aspects of the application as detailed in the accompanying claims.
It should be noted that, the user information (including but not limited to user equipment information, user personal information, etc.) and the data (including but not limited to data for analysis, stored data, presented data, etc.) related to the present application are information and data authorized by the user or fully authorized by each party, and the collection, use and processing of the related data need to comply with related laws and regulations and standards, and provide corresponding operation entries for the user to select authorization or rejection.
In the present application, "and/or" is merely an association relationship describing an association object, and indicates that three relationships may exist, for example, a and/or B may indicate: a exists alone, A and B exist together, and B exists alone. In this context, the character "/" indicates that the front and rear associated objects are an "or" relationship.
In the present disclosure, "exemplary," "in some embodiments," "for example," "in other embodiments," etc. are used to indicate an example, instance, or illustration. Any embodiment or design described herein as "example" or "such as" is not necessarily to be construed as preferred or advantageous over other embodiments or designs. Rather, the term use of an example is intended to present concepts in a concrete fashion.
It should be noted that, the application deployment method, apparatus, device and storage medium of the present application may be used in a distributed field, and may also be used in any field other than the distributed field, and the application field of the application deployment method, apparatus, device and storage medium of the present application is not limited.
In order to more clearly describe the present application, an application scenario to which the embodiment of the present application is applied is described below with reference to fig. 1.
Fig. 1 is a schematic diagram of an application scenario provided in an embodiment of the present application. Referring to fig. 1, a monitoring device 101, a database 102, and a plurality of application deployment servers 103 are included. The monitoring device 101 may acquire server information of each application deployment server 103 from the database 102 in real time, and may control the plurality of application deployment servers to deploy the target application program through the server information; database 102 may be used to store server information for a plurality of application deployment servers 103; multiple application deployment servers 103 may write respective server information into database 102 at regular intervals, and multiple application servers 103 may be used to deploy the same target application.
Fig. 1 is only a schematic view of an application scenario, and the application deployment method provided by the present application can be applied not only to the above scenario, but also to other scenarios, and the application deployment method provided by the present application includes, but is not limited to, the above application scenario.
In the related art, if any one of the servers fails in the process of deploying the target application program, for example, the login password of the server expires, the storage space of the server is full, and the like, the deployment of the whole target application program fails. If the server fails to verify, the deployment time is wasted, and the manual error detection is needed, so that the efficiency is low.
Many application servers are now deployed with monitoring tools, such as zabbix, nagios, which are powerful and can monitor all running states of the server, but running a huge piece of monitoring software on the application server is also a expense, and most of the current monitoring tools focus on monitoring network connections, server hardware performance, etc., and there is no monitoring tool that only meets the requirements of monitoring login password states and server storage states.
In order to solve the technical problems, the embodiment of the application provides an application deployment method, wherein a monitoring device can acquire server information of each application deployment server from a preset database in real time, and can control to deploy target application programs in a plurality of application deployment servers according to the server information of each application deployment server, so that the failure rate of target application program deployment is reduced, the deployment time is shortened, and the deployment efficiency is improved.
The application provides an application deployment method, which aims to solve the technical problems in the prior art.
The following describes the technical scheme of the present application and how the technical scheme of the present application solves the above technical problems in detail with specific embodiments. The following embodiments may be combined with each other, and the same or similar concepts or processes may not be described in detail in some embodiments. Embodiments of the present application will be described below with reference to the accompanying drawings.
Fig. 2 is a flow chart of an application deployment method according to an embodiment of the present application. Referring to fig. 2, the method includes:
s201, acquiring an application deployment request, wherein the application deployment request is used for requesting to deploy target application programs in a plurality of servers.
The execution main body of the embodiment of the application can be monitoring equipment such as terminal equipment or a server, and also can be an application deployment device arranged in the monitoring equipment, wherein the application deployment device can be realized by software, and can also be realized by combination of software and hardware.
If the monitoring device is a client device, the client device may be a device that needs to use the target application program, and the monitoring device may obtain the application deployment request in response to an operation of the user, for example, a click operation or the like.
If the monitoring device is not a client device, the monitoring device may obtain an application deployment request from the client device.
The plurality of servers may refer to application deployment servers.
The target application may be referred to as a distributed application.
S202, server information of each server is obtained from a preset database.
The server information may include login password information and the amount of remaining storage resources.
The login password information may include specific content of the login password, a setting time of the login password, and a use time of the login password (or a expiration time of the login password).
The amount of remaining storage resources may be represented by disk utilization, memory utilization, or the like.
The preset database may store server information of each application deployment server in real time.
In one possible implementation manner, the preset database may be an unstructured database mongo db, may be used for storing data of each application deployment server in real time, the format of the stored data may be the format of data required to be displayed at the front end, the data may be truncated according to a time period (for example, date), and multiple data in the same time period may be arranged according to a time stamp sequence.
In one possible implementation, the preset database may be MySQL, which may be used to store offline data of each application deployment server, where the offline data is mainly used for data analysis and/or disaster recovery backup, etc.
The server information may also include information such as internet protocol (Internet Protocol) addresses of the respective servers, server identification, etc.
And S203, determining a deployment detection result of the target application program according to the server information of each server, wherein the deployment detection result is passed or failed.
The deployment detection result of the target application may be verified to the corresponding server according to the server information of each server.
The deployment detection indicates that the target application can be deployed on the corresponding server.
If the deployment detection is not passed, the target application program cannot be deployed on the corresponding server, and the target application program can be deployed after some processing is carried out on the server.
And S204, when the deployment detection result is that the deployment detection is passed, controlling the deployment of the target application program in a plurality of servers.
And if the deployment detection results of the plurality of servers required for deploying the target application program are all deployment detection passing, controlling to deploy the target application program in the plurality of servers.
The monitoring device may directly control the deployment of the target application in the plurality of servers, or may indirectly control the deployment of the target application in the plurality of servers.
If the deployment detection result of a certain server is that the deployment detection fails, the monitoring equipment can directly display alarm information; the alert information may also be sent to a preset device (e.g., a client device).
The alert information may be used to indicate that the deployment detection of the server fails, and may also indicate the reason for the failure of the deployment detection.
The reason that the deployment detection result fails may be that the state of the login password is incorrect, i.e., the login password expires; the remaining storage resources of the server may be insufficient.
After knowing the alert information, the professional operator can process the relevant servers to deploy the target application.
In the embodiment shown in fig. 2, an application deployment request is obtained, the application deployment request being used to request that a target application be deployed in a plurality of servers; server information of each server is obtained from a preset database, wherein the server information comprises login password information and the residual storage resource amount; according to the server information of each server, determining a deployment detection result of the target application program, wherein the deployment detection result is passed or failed; and when the deployment detection result is that the deployment detection is passed, the target application program is controlled to be deployed in a plurality of servers. Server information is obtained from a preset database, so that the coupling between servers is reduced; and the target application program is deployed according to the server information, so that the failure rate of the target application program deployment is reduced, the deployment time is shortened, and the deployment efficiency is improved.
Based on the embodiment shown in fig. 2, how the deployment detection result of the target application is determined is described in detail below in conjunction with fig. 3.
Fig. 3 is a flowchart of another application deployment method according to an embodiment of the present application. Referring to fig. 3, the method includes:
s301, acquiring an application deployment request, wherein the application deployment request is used for requesting to deploy target application programs in a plurality of servers.
It should be noted that, the execution process of S301 may refer to the execution process of S201, which is not described herein.
S302, server information of each server is obtained from a preset database, and the server information comprises login password information and the amount of residual storage resources.
In one possible implementation manner, each server is provided with a preset process, wherein the preset process is used for acquiring login password information from a system file of the server and storing the login password information into a preset database; the preset process is further used for obtaining the residual storage resource amount from the program file of the server, and storing the residual storage resource amount into a preset database.
In one possible implementation manner, the configuration file in the server may be read by a preset process to obtain the login password information, where the login password information may include specific content of the login password, a setting time of the login password, and a use time of the login password (or a failure time of the login password).
In one possible implementation manner, the proc file under linux may be read by a preset process to obtain the remaining storage resource amount, where the remaining storage resource amount may be represented by a disk utilization rate or a memory utilization rate, or the like.
The preset process may be a daemon process.
In one possible implementation manner, the server may write the server information into the preset database every time interval by means of a timing task, and configure retry, where the time interval may be customized according to the service requirement. The timed task may be triggered by a writer, for example by a quaterz in java, or by directly writing to a daemon running all the time.
The writing database is used for replacing information sending to the monitoring equipment, so that the coupling between servers can be reduced, and data analysis, data reading and the like can be performed by other tenants.
S303, determining whether the login password state of the plurality of servers is an expiration state according to the login password information of the plurality of servers.
If yes, S306 is executed.
If not, S304 is performed.
If the login password state is an expiration state, the login password state indicates that the server cannot be logged in, and further the target application program cannot be deployed on the server.
And if the login password state is an unexpired state, the login password state indicates that the target application program can be deployed by the login server.
In one possible implementation manner, if the login password information includes a password setting time and a preset duration, for any one server, the login password state of the server may be determined according to the login password information of the server by:
determining a password expiration time according to the password setting time and the preset time, wherein the password expiration time is positioned after the password setting time, and the time between the password expiration time and the password setting time is the preset time; determining a deployment time length, wherein the deployment time length is a time length required for deploying a target application program in a plurality of servers; and determining the login password state according to the deployment time, the password expiration time and the current time.
The preset time length is the using time length of the login password.
The deployment duration may be a total duration of deployment of the entire target application.
The duration of deployment of the target application at each server may be less than or equal to the duration of deployment.
As shown in fig. 4, the login password setting time of the server is t1, the password expiration time of the server is t5, and the interval between t3 and t4 is a preset duration; in the process of deploying the target application program, a login password corresponding to a server is firstly used for logging in each server, the time of logging in is t2, after logging in, a third party device or a cloud end can upload a corresponding application program file package (for example, jar package) to each server, the time of starting uploading the application program file package is t3, after uploading is completed, the corresponding target application program can be installed in each server, the time of completing the installation of the target application program is t4, the single deployment duration of the interval server between the t3 time and the t4 time is smaller than the total deployment duration.
In one possible implementation, the login password states of multiple servers may be determined simultaneously, or the login password states of multiple servers may be determined sequentially.
In one possible implementation, the login password status and the remaining amount of storage resources of each server may be displayed, or the login password status and the remaining amount of storage resources of each server may be sent to a preset device.
The login password state and the remaining storage resource amount of each server may be displayed on the monitoring device, or the login password state and the remaining storage resource amount of each server may be transmitted to the preset device, and the login password state and the remaining storage resource amount of each server may be displayed on the preset device.
The preset device may be a predetermined device for aggregating server information.
S304, determining a deployment detection result according to the residual storage resource quantity of each server, wherein the deployment detection result is passed or failed.
And if the login password states of the servers are unexpired, determining a deployment detection result according to the residual storage resource amount of each server.
In one possible implementation, the deployment detection may be determined from the amount of remaining storage resources for each server by:
Determining a target storage resource amount required by a target application program; if the residual resource storage amounts of the plurality of servers are respectively larger than the target storage resource amounts, determining that the deployment detection result is that the deployment detection is passed; and if the residual resource storage amount of the existing servers in the plurality of servers is smaller than or equal to the target storage resource amount, determining that the deployment detection result is that the deployment detection is not passed.
The target amount of storage resources may refer to the amount of storage resources required to deploy the target application in each server.
The target amount of storage resources required by the target application in each server may be the same or different.
For any one server, if the residual resource storage capacity of the server is larger than the target storage resource capacity required by the target application program in the server, determining that the server can deploy the target application program, wherein a deployment detection result is that deployment detection is passed; only when the residual resource storage amounts of the plurality of servers are larger than the corresponding target storage resource amounts, it is determined that the whole target application program can be deployed, that is, the deployment detection results of all the servers are deployment detection passing.
And S305, when the deployment detection result is that the deployment detection is passed, controlling the deployment of the target application program in a plurality of servers.
In one possible implementation, the deployment of the target application in multiple servers may be controlled by:
and sending a deployment instruction to the plurality of servers, wherein the deployment instruction comprises the identification of the target application program, and the deployment instruction is used for indicating the deployment of the target application program in the plurality of servers.
S306, determining that the deployment detection result is that the deployment detection fails.
If the login password state of any one of the plurality of servers is an expiration state, determining that the deployment detection result is that the deployment detection is failed.
In the embodiment shown in fig. 3, an application deployment request is obtained, the application deployment request being used to request that a target application be deployed in a plurality of servers; server information of each server is obtained from a preset database, wherein the server information comprises login password information and the residual storage resource amount; judging whether the login password state of the plurality of servers is an expiration state according to the login password information of the plurality of servers; if not, determining a deployment detection result according to the residual storage resource quantity of each server, wherein the deployment detection result is passed or failed; and if the deployment detection result is that the deployment detection is passed, controlling the deployment of the target application program in a plurality of servers, and if the deployment detection result is that the deployment detection is not passed, determining that the deployment detection result is that the deployment detection is not passed. The deployment detection result is determined through the login password information and the residual storage resource quantity, and the target application program is deployed according to the detection result, so that the failure rate of the target application program deployment is reduced, the deployment time is shortened, and the deployment efficiency is improved.
On the basis of any of the above embodiments, how to determine the deployment detection result of the target application will be described below with reference to fig. 5.
Fig. 5 is a flowchart of another application deployment method according to an embodiment of the present application. Referring to fig. 4, the method includes:
s501, acquiring an application deployment request, wherein the application deployment request is used for requesting to deploy a target application program in a plurality of servers.
It should be noted that, the execution process of S501 may refer to the execution process of S201, which is not described herein.
S502, server information of each server is obtained from a preset database, wherein the server information comprises login password information and the amount of residual storage resources.
It should be noted that, the execution process of S502 may refer to the execution processes of S202 and S302, which are not described herein.
S503, determining the password expiration time according to the password setting time and the preset time aiming at any one server.
As shown in fig. 6, the password expiration time is located after the password setting time, and the duration between the password expiration time and the password setting time is a preset duration.
S504, determining the deployment time length.
The deployment time may be the total time required to deploy the target application in multiple servers.
S505, determining a login password state according to the deployment time, the password expiration time and the current time, wherein the login password state is an expiration state or an unexpired state.
In one possible implementation, the login password status may be determined from the deployment duration, password expiration time, and current time by:
determining a target time according to the deployment time and the password expiration time, wherein the target time is positioned before the password expiration time, and the time between the target time and the password expiration time is the deployment time; if the target time is positioned before the current time or the target time is the same as the current time, determining that the login password state is an unexpired state; and if the target time is after the current time, determining that the login password state is an expiration state.
The target time may be a time at which the target application begins to be deployed.
The target application may be deployed at the current time or may be deployed before the current time. If the target time is before the current time or the target time is the same as the current time, the deployment of the target application program can be completed before the password expiration time. If the target time is after the current time, the method indicates that the deployment of the target application program cannot be completed before the password expiration time.
S506, if the login password states of the servers are respectively unexpired states, determining the target storage resource amount required by the target application program.
The target amount of storage resources may refer to the amount of storage resources required to deploy the target application in each server.
The target amount of storage resources required by the target application in each server may be the same or different.
S507, judging whether the residual resource storage amounts of the plurality of servers are respectively larger than the target storage resource amounts.
If yes, then S508 is performed.
If not, determining that the deployment detection result is that the deployment detection fails.
S508, determining that the deployment detection result is that the deployment detection passes.
S509, sending a deployment instruction to the plurality of servers, wherein the deployment instruction comprises an identification of the target application program, and the deployment instruction is used for indicating the deployment of the target application program in the plurality of servers.
In the embodiment shown in fig. 5, an application deployment request is acquired, the application deployment request being used to request deployment of a target application program in a plurality of servers; server information of each server is obtained from a preset database, wherein the server information comprises login password information and the residual storage resource amount; aiming at any one server, determining the password expiration time according to the password setting time and the preset time; determining deployment time length; determining a login password state according to the deployment time, the password expiration time and the current time, wherein the login password state is an expiration state or an unexpired state; if the login password states of the servers are respectively unexpired states, determining the target storage resource amount required by the target application program; judging whether the residual resource storage amounts of the plurality of servers are respectively larger than the target storage resource amounts; if yes, determining that the deployment detection result is that the deployment detection is passed; and sending a deployment instruction to the plurality of servers, wherein the deployment instruction comprises the identification of the target application program, and the deployment instruction is used for indicating the deployment of the target application program in the plurality of servers. The deployment detection result is determined through the login password information and the residual storage resource quantity, and the target application program is deployed according to the detection result, so that the failure rate of the target application program deployment is reduced, the deployment time is shortened, and the deployment efficiency is improved.
Fig. 6 is a schematic structural diagram of an application deployment device according to an embodiment of the present application. Referring to fig. 6, the application deployment device 10 includes a first acquisition module 11, a second acquisition module 12, a determination module 13 and a control module 14,
a first obtaining module 11, configured to obtain an application deployment request, where the application deployment request is used to request for deploying a target application program in a plurality of servers;
a second obtaining module 12, configured to obtain server information of each server in a preset database, where the server information includes login password information and a remaining storage resource amount;
a determining module 13, configured to determine, according to server information of each server, a deployment detection result of the target application program, where the deployment detection result deployment detection is passed or the deployment detection is failed;
the control module 14 is configured to control the deployment of the target application in the plurality of servers when the deployment detection result is that the deployment detection passes.
In one possible implementation, the determining module 13 is specifically configured to:
determining the login password state of the server according to the login password information of the server aiming at any one server, wherein the login password state is an expired state or an unexpired state;
If the login password state of the existence server in the plurality of servers is an expiration state, determining that the deployment detection result is that the deployment detection is failed;
and if the login password states of the servers are respectively unexpired states, determining a deployment detection result according to the residual storage resource quantity of each server.
In one possible implementation, the login password information includes a password setting time and a preset duration; the determining module 13 is specifically configured to:
determining a password expiration time according to the password setting time and the preset time, wherein the password expiration time is positioned after the password setting time, and the time between the password expiration time and the password setting time is the preset time;
determining a deployment time length, wherein the deployment time length is a time length required for deploying a target application program in a plurality of servers;
and determining the login password state according to the deployment time, the password expiration time and the current time.
In one possible implementation, the determining module 13 is specifically configured to:
determining a target time according to the deployment time and the password expiration time, wherein the target time is positioned before the password expiration time, and the time between the target time and the password expiration time is the deployment time;
if the target time is positioned before the current time or the target time is the same as the current time, determining that the login password state is an unexpired state;
And if the target time is after the current time, determining that the login password state is an expiration state.
In one possible implementation, the determining module 13 is specifically configured to:
determining a target storage resource amount required by a target application program;
if the residual resource storage amounts of the plurality of servers are respectively larger than the target storage resource amounts, determining that the deployment detection result is that the deployment detection is passed;
and if the residual resource storage amount of the existing servers in the plurality of servers is smaller than or equal to the target storage resource amount, determining that the deployment detection result is that the deployment detection is not passed.
In one possible implementation, the control module 14 is specifically configured to:
and sending a deployment instruction to the plurality of servers, wherein the deployment instruction comprises the identification of the target application program, and the deployment instruction is used for indicating the deployment of the target application program in the plurality of servers.
In one possible implementation, a preset process is provided in the server, wherein,
the preset process is used for acquiring login password information from a system file of the server and storing the login password information into a preset database;
the preset process is further used for obtaining the residual storage resource amount from the program file of the server, and storing the residual storage resource amount into a preset database.
In one possible embodiment, the apparatus further comprises:
the display module is used for displaying the login password state and the residual storage resource amount of each server; or,
and the sending module is used for sending the login password state and the residual storage resource quantity of each server to the preset equipment.
It should be noted that, in the embodiment of the present application, the division of the modules is schematic, which is merely a logic function division, and other division manners may be implemented in actual implementation. In addition, each functional module in each embodiment of the present application may be integrated into one processing module, or each module may exist alone physically, or two or more modules may be integrated into one module. The integrated modules may be implemented in hardware or in software functional units.
The integrated modules, if implemented in the form of software functional modules and sold or used as a stand-alone product, may be stored in a processor-readable storage medium. Based on such understanding, the technical solution of the present application may be embodied in essence or a part contributing to the prior art or all or part of the technical solution in the form of a software product stored in a storage medium, including several instructions to cause a computer device (which may be a personal computer, a server, or a network device, etc.) or a processor (processor) to execute all or part of the steps of the various method embodiments of the present application. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a random access Memory (Random Access Memory, RAM), a magnetic disk, or an optical disk, or other various media capable of storing program codes.
The application deployment device 10 provided in the embodiment of the present application may execute the technical solution shown in the foregoing method embodiment, and its implementation principle and beneficial effects are similar, and will not be described in detail.
Fig. 7 is a schematic structural diagram of an electronic device according to an embodiment of the present application. Referring to fig. 7, the electronic device 20 may include: a transceiver 21, a memory 22, a processor 23. The transceiver 21 may include: a transmitter and/or a receiver. The transmitter may also be referred to as a transmitter, transmit port, transmit interface, or the like, and the receiver may also be referred to as a receiver, receive port, receive interface, or the like. The transceiver 21, the memory 22, and the processor 23 are illustratively interconnected by a bus 24.
The memory 22 is used for storing program instructions;
the processor 23 is configured to execute the program instructions stored in the memory, so as to cause the electronic device 20 to execute any of the above-described application deployment methods.
The transceiver 21 is used to perform the transceiving functions of the electronic device 20.
The electronic device shown in the embodiment of fig. 7 may execute the technical solution shown in the embodiment of the method, and its implementation principle and beneficial effects are similar, and will not be described herein again.
An embodiment of the present application provides a computer-readable storage medium in which computer-executable instructions are stored, which when executed by a processor, are configured to implement the application deployment method of any one of the above.
Embodiments of the present application provide a computer program product comprising a computer program which, when executed by a processor, implements the application deployment method of any of the above.
The computer readable storage medium and the computer program product according to the embodiments of the present application can execute the technical solution shown in the above application deployment method embodiments, and the implementation principle and the beneficial effects are similar, and are not described herein again.
Other embodiments of the application will be apparent to those skilled in the art from consideration of the specification and practice of the application disclosed herein. This application is intended to cover any variations, uses, or adaptations of the application following, in general, the principles of the application and including such departures from the present disclosure as come within known or customary practice within the art to which the application pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the application being indicated by the following claims.
It is to be understood that the application is not limited to the precise arrangements and instrumentalities shown in the drawings, which have been described above, and that various modifications and changes may be effected without departing from the scope thereof. The scope of the application is limited only by the appended claims.

Claims (10)

1. An application deployment method, comprising:
acquiring an application deployment request, wherein the application deployment request is used for requesting to deploy a target application program in a plurality of servers;
server information of each server is obtained from a preset database, wherein the server information comprises login password information and residual storage resource quantity;
according to the server information of each server, determining a deployment detection result of the target application program, wherein the deployment detection result is passed or failed;
and controlling the deployment of the target application program in the plurality of servers when the deployment detection result is that the deployment detection is passed.
2. The method of claim 1, wherein determining deployment detection results for the target application based on server information for each server comprises:
determining a login password state of any one server according to the login password information of the server, wherein the login password state is an expired state or an unexpired state;
If the login password state of the server in the plurality of servers is the expiration state, determining that the deployment detection result is that the deployment detection is not passed;
and if the login password states of the servers are respectively the unexpired states, determining the deployment detection result according to the residual storage resource quantity of each server.
3. The method of claim 2, wherein the login password information includes a password setup time and a preset duration; determining the login password state of the server according to the login password information of the server comprises the following steps:
determining a password expiration time according to the password setting time and the preset time, wherein the password expiration time is positioned after the password setting time, and the time between the password expiration time and the password setting time is the preset time;
determining a deployment time length, wherein the deployment time length is a time length required by deploying the target application program in the plurality of servers;
and determining the login password state according to the deployment time, the password expiration time and the current time.
4. The method of claim 3, wherein determining the login password status based on the deployment time period, the password expiration time, and a current time comprises:
Determining a target time according to the deployment time and the password expiration time, wherein the target time is positioned before the password expiration time, and the time between the target time and the password expiration time is the deployment time;
if the target time is located before the current time or the target time is the same as the current time, determining that the login password state is the unexpired state;
and if the target time is positioned after the current time, determining the login password state as the expiration state.
5. The method of any of claims 2-4, wherein determining the deployment detection result based on the amount of remaining storage resources for each server comprises:
determining a target amount of storage resources required by the target application;
if the residual resource storage amounts of the plurality of servers are respectively larger than the target storage resource amounts, determining that the deployment detection result is that the deployment detection is passed;
and if the residual resource storage amount of the servers in the plurality of servers is smaller than or equal to the target storage resource amount, determining that the deployment detection result is that the deployment detection is not passed.
6. The method of any of claims 1-5, wherein controlling deployment of the target application in the plurality of servers comprises:
and sending a deployment instruction to the plurality of servers, wherein the deployment instruction comprises an identification of the target application program, and the deployment instruction is used for indicating the deployment of the target application program in the plurality of servers.
7. Method according to any of the claims 1-6, characterized in that a preset process is provided in the server, wherein,
the preset process is used for acquiring the login password information from the system file of the server and storing the login password information into the preset database;
the preset process is further used for obtaining the residual storage resource amount from the program file of the server, and storing the residual storage resource amount into the preset database.
8. An application deployment apparatus, comprising:
the system comprises a first acquisition module, a second acquisition module and a third acquisition module, wherein the first acquisition module is used for acquiring an application deployment request, and the application deployment request is used for requesting to deploy a target application program in a plurality of servers;
the second acquisition module is used for acquiring server information of each server in a preset database, wherein the server information comprises login password information and the residual storage resource amount;
The determining module is used for determining a deployment detection result of the target application program according to the server information of each server, wherein the deployment detection result is passed or failed;
and the control module is used for controlling the deployment of the target application program in the servers when the deployment detection result is that the deployment detection is passed.
9. An electronic device, comprising: a processor, and a memory communicatively coupled to the processor;
the memory stores computer-executable instructions;
the processor executes computer-executable instructions stored in the memory to implement the method of any one of claims 1 to 7.
10. A computer readable storage medium having stored therein computer executable instructions which when executed by a processor are adapted to carry out the method of any one of claims 1 to 7.
CN202311034384.4A 2023-08-16 2023-08-16 Application deployment method, device, equipment and storage medium Pending CN117075916A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311034384.4A CN117075916A (en) 2023-08-16 2023-08-16 Application deployment method, device, equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311034384.4A CN117075916A (en) 2023-08-16 2023-08-16 Application deployment method, device, equipment and storage medium

Publications (1)

Publication Number Publication Date
CN117075916A true CN117075916A (en) 2023-11-17

Family

ID=88705516

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311034384.4A Pending CN117075916A (en) 2023-08-16 2023-08-16 Application deployment method, device, equipment and storage medium

Country Status (1)

Country Link
CN (1) CN117075916A (en)

Similar Documents

Publication Publication Date Title
CN108540533B (en) Request answering method and device
CN109361525B (en) Method, device, control terminal and medium for restarting distributed deployment of multiple services
CN110704872B (en) Data query method and device, electronic equipment and computer readable storage medium
CN110958161B (en) Block chain link point monitoring method and device and storage medium
CN104202201A (en) Log processing method and device and terminal
CN112272243B (en) Address allocation method
CN112822260B (en) File transmission method and device, electronic equipment and storage medium
CN111104139A (en) Firmware upgrading method, device, equipment and storage medium
CN109324959B (en) Method for automatically transferring data, server and computer readable storage medium
CN103905441A (en) Data acquisition method and device
CN110070444A (en) A kind of block chain transaction flow management method and relevant apparatus
CN108280024A (en) Traffic distribution strategy test method, device and electronic equipment
CN102986151A (en) Monitoring system and data transfer device and method thereof
CN116842298A (en) Data read-write management method and device, storage medium and electronic equipment
CN117075916A (en) Application deployment method, device, equipment and storage medium
CN113852610B (en) Message processing method, device, computer equipment and storage medium
CN104270431A (en) Method and device for concurrency control
CN107203915B (en) Data storage method and device
CN115065510A (en) Login method, device, system, electronic equipment and readable storage medium
CN110365627B (en) Application program synchronization method and device, computing equipment and storage medium
CN109039770B (en) Server CMC refreshing method and device and related equipment
CN109034768B (en) Financial reconciliation method, apparatus, computer device and storage medium
CN108880994B (en) Method and device for retransmitting mails
CN113965447A (en) Online cloud diagnosis method, device, system, equipment and storage medium
CN112988689A (en) State checking method and device, electronic equipment and computer readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination