CN117290185A - Database check point monitoring method, storage medium and equipment - Google Patents

Database check point monitoring method, storage medium and equipment Download PDF

Info

Publication number
CN117290185A
CN117290185A CN202311270670.0A CN202311270670A CN117290185A CN 117290185 A CN117290185 A CN 117290185A CN 202311270670 A CN202311270670 A CN 202311270670A CN 117290185 A CN117290185 A CN 117290185A
Authority
CN
China
Prior art keywords
execution
check point
execution information
query
database
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202311270670.0A
Other languages
Chinese (zh)
Inventor
何树培
李翔
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Kingbase Information Technologies Co Ltd
Original Assignee
Beijing Kingbase Information Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Kingbase Information Technologies Co Ltd filed Critical Beijing Kingbase Information Technologies Co Ltd
Priority to CN202311270670.0A priority Critical patent/CN117290185A/en
Publication of CN117290185A publication Critical patent/CN117290185A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/3003Monitoring arrangements specially adapted to the computing system or computing system component being monitored
    • G06F11/302Monitoring arrangements specially adapted to the computing system or computing system component being monitored where the computing system component is a software system
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/3051Monitoring arrangements for monitoring the configuration of the computing system or of the computing system component, e.g. monitoring the presence of processing resources, peripherals, I/O links, software programs
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/21Design, administration or maintenance of databases
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/24Querying
    • G06F16/245Query processing
    • G06F16/2453Query optimisation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/24Querying
    • G06F16/245Query processing
    • G06F16/2458Special types of queries, e.g. statistical queries, fuzzy queries or distributed queries
    • G06F16/2462Approximate or statistical queries
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/25Integrating or interfacing systems involving database management systems
    • G06F16/252Integrating or interfacing systems involving database management systems between a Database Management System and a front-end application

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Data Mining & Analysis (AREA)
  • Computing Systems (AREA)
  • Quality & Reliability (AREA)
  • Mathematical Physics (AREA)
  • Probability & Statistics with Applications (AREA)
  • Computational Linguistics (AREA)
  • Fuzzy Systems (AREA)
  • Software Systems (AREA)
  • Debugging And Monitoring (AREA)

Abstract

The invention provides a monitoring method, a storage medium and equipment for a database check point. Wherein the method comprises the following steps: calling a query interface to receive a first query instruction; inquiring execution information of the check point in a preset state collector according to the first inquiry instruction; and returning the execution information to the query interface. The method can monitor the execution process of the check point of the database through the query interface, thereby acquiring information such as view, function and the like of the execution process of the check point, facilitating the positioning of the problem in the execution process, further adopting a corresponding tuning mode aiming at the problem, optimizing the database parameters, and further improving the operation efficiency of the database system, namely improving the performance of the database.

Description

Database check point monitoring method, storage medium and equipment
Technical Field
The present invention relates to database technologies, and in particular, to a method, a storage medium, and an apparatus for monitoring a database checkpoint.
Background
In the database, a check point event is responsible for writing dirty pages in a cache into a disk so as to ensure the durability and consistency of data, if the dirty data are too much in the process of executing the check point, the check point event can be executed for a long time and occupies a large amount of system resources, and no method can monitor the execution progress of the check point in real time so as to know the execution progress of the check point.
Disclosure of Invention
It is an object of the present invention to monitor checkpoint execution in real time.
It is a further object of the present invention to improve the efficiency of database system operation.
In particular, the present invention provides a method for monitoring a database checkpoint, comprising:
calling a query interface to receive a first query instruction;
inquiring execution information of the check point in a preset state collector according to the first inquiry instruction;
and returning the execution information to the query interface.
Optionally, after the step of querying the execution information of the checkpoint in the preset state collector according to the first query instruction, the method further includes:
generating corresponding views and functions according to the execution information;
the views and functions are returned to the query interface.
Optionally, before the step of returning the view and function to the query interface, further comprises:
judging the type of target execution information queried by the first query instruction;
and inquiring the view and the function corresponding to the target execution information type in the preset state collector.
Optionally, the step of querying the execution information of the checkpoint in the preset state collector according to the first query instruction includes:
acquiring execution information of a check point;
storing the execution information into a preset state collector;
and acquiring corresponding execution information according to the first query instruction.
Optionally, the step of obtaining the execution information of the checkpoint further includes:
dividing the execution process of the check point into a plurality of execution phases;
the step of acquiring the execution information of the checkpoints is performed in each execution phase.
Optionally, the step of returning the execution information to the query interface further includes:
acquiring a second query instruction;
invoking a preset state collector to calculate the computer resources consumed by each execution stage of the check point according to the second query instruction;
sequencing the execution stages according to the consumption degree of the computer resources to generate a first sequencing result;
and returning the first sequencing result to the query interface.
Optionally, before the step of returning the first ranking result to the query interface, the method further includes:
generating corresponding tuning suggestions according to the consumption conditions of the corresponding computer resources of each execution stage;
and recording the tuning advice into the first sequencing result.
Optionally, the step of returning the execution information to the query interface further includes:
acquiring a third query instruction;
calling a preset state collector to record the time consumed by each execution stage of the check point according to the third query instruction;
sequencing the execution stages according to time to generate a second sequencing result;
and returning the second sorting result to the query interface.
According to another aspect of the present invention, there is also provided a machine-readable storage medium having stored thereon a machine-executable program which, when executed by a processor, implements a method of monitoring a database checkpoint of any of the above.
According to yet another aspect of the present invention, there is also provided a computer device comprising a memory, a processor and a machine executable program stored on the memory and running on the processor, and the processor implementing a method of monitoring a database checkpoint of any of the above when executing the machine executable program.
According to the monitoring method of the database check point, the state collector is newly added in the database to collect the execution information of each stage of the check point in the execution process, and the execution information is statistically arranged; the query may then be performed by instructions at the query interface. By the method, the execution process of the check point of the database can be monitored through the query interface, and the problem in the execution process can be conveniently positioned.
Further, according to the monitoring method of the database check point, when the query interface is called to perform query operation on the query point execution process, the query interface can return corresponding results according to different instructions, so that the execution process of the check point is clearly displayed, corresponding tuning suggestions are generated for time-consuming operation, and therefore the running efficiency of the database system is improved.
The above, as well as additional objectives, advantages, and features of the present invention will become apparent to those skilled in the art from the following detailed description of a specific embodiment of the present invention when read in conjunction with the accompanying drawings.
Drawings
Some specific embodiments of the invention will be described in detail hereinafter by way of example and not by way of limitation with reference to the accompanying drawings. The same reference numbers will be used throughout the drawings to refer to the same or like parts or portions. It will be appreciated by those skilled in the art that the drawings are not necessarily drawn to scale. In the accompanying drawings:
FIG. 1 is a data flow diagram of a method of monitoring database checkpoints according to one embodiment of the present invention;
FIG. 2 is a flow diagram of a method of monitoring database checkpoints according to one embodiment of the present invention;
FIG. 3 is a schematic diagram of a machine-readable storage medium in a method of monitoring a database checkpoint in accordance with one embodiment of the present invention; and
FIG. 4 is a schematic diagram of a computer device in a method of monitoring database checkpoints according to one embodiment of the present invention.
Detailed Description
It should be understood by those skilled in the art that the embodiments described below are only some embodiments of the present invention, but not all embodiments of the present invention, and the some embodiments are intended to explain the technical principles of the present invention and are not intended to limit the scope of the present invention. All other embodiments, which can be obtained by a person skilled in the art without any inventive effort, based on the embodiments provided by the present invention, shall still fall within the scope of protection of the present invention.
FIG. 1 is a data flow diagram of a method for monitoring database checkpoints according to one embodiment of the present invention. The schematic may include: checkpoint process 100, state collector 110, and query interface 120. In some embodiments, the state collector 110 is capable of dividing the checkpoint event 100 into a plurality of different execution phases, such as a checkpoint event trigger phase 101, a first execution phase 102, a second execution phase 103, and a subsequent plurality of execution phases and a checkpoint event end of execution phase 104. The partitioning rules of the execution phase can be set by those skilled in the art according to the actual situation.
Wherein a checkpoint (checkpoint) is a database event, also a point on a redo file or wal (Write Ahead load pre-Write Log) file, before which all data files have been updated to disk. Checkpoint process (checkpointer): is responsible for executing the checkpointed process.
After the state collector 110 divides the checkpoint event 100 into a plurality of phases, execution information generated during execution of the respective phases may be collected, wherein the execution information may include: the trigger type of the check point, the stage of the check point, the total quantity of dirty blocks to be dropped, the dirty block brushing dirty percentage, the disk IO (Input/Output) and other information.
When receiving the query instruction, the query interface 120 invokes the state collector 110 to query the execution information of the checkpoint event 100 according to the query instruction, generates a corresponding view and function 111 according to the execution information after the query instruction is obtained, and returns the view and function 111 to the query interface 120 for display, so that a user can clearly see the execution process of the checkpoint process in each execution stage, and further, the person skilled in the art can find a place which can be optimized in the execution process of the checkpoint conveniently, thereby improving the execution efficiency of the database.
FIG. 2 is a flow diagram of a method of monitoring database checkpoints according to one embodiment of the present invention. The process may include:
step S101, a query interface is called to receive a first query instruction. In some embodiments, the first query instruction may be an instruction input from the outside, or may be an instruction generated from a preset program in the database, where the preset program may be a program of a type such as a timing query update.
Step S102, inquiring execution information of the check point in a preset collector according to the first inquiry instruction. The method comprises the following steps: dividing the execution process of the check point into a plurality of execution phases; respectively acquiring execution information of the check point in each execution stage; storing the execution information into a preset collector; and acquiring corresponding execution information according to the first query instruction. In some embodiments, the preset collector may be a program module designed by a person skilled in the art, or may be a function of collecting checkpoint execution information by improving an extended function in an existing state collector. Meanwhile, a person skilled in the art can determine rules for dividing the execution process according to actual situations.
The method further comprises the following steps: generating corresponding views and functions according to the execution information; judging the type of target execution information queried by the first query instruction; inquiring views and functions corresponding to the target execution information types in a preset collector; the views and functions are returned to the query interface. The specific presentation form and call mode of the view and the function can be set by the person skilled in the art according to the actual situation. In some embodiments, when the execution information of the query is a checkpoint trigger type, a corresponding checkpoint trigger type view may be generated, and a person skilled in the art may know that the checkpoint is triggered more, so as to know the key type in the actual service, and further improve the key type in a targeted manner; when the execution information of the query is the total amount of dirty blocks to be dropped, a person skilled in the art can check and obtain the dirty data amount generated in the actual running process of the database, so that the database is optimized in a targeted manner.
Step S103, the execution information is returned to the query interface. In some embodiments, the execution information may be an encrypted data packet, and a person skilled in the art may parse the data packet to view specific content through a agreed decryption method, where the agreed decryption method may be encryption and decryption through the same key or a public key and a private key. In other embodiments, the execution information may also be directly presented in the return content presentation interface of the query interface.
In some embodiments, this step further comprises, after: acquiring a second query instruction; invoking a preset collector to calculate the computer resources consumed by each execution stage of the check point according to the second query instruction; sequencing the execution stages according to the consumption degree of the computer resources to generate a first sequencing result; generating corresponding tuning suggestions according to the consumption conditions of the corresponding computer resources of each execution stage; recording the tuning advice into a first sequencing result; and returning the first sequencing result to the query interface. The specific rule for generating the tuning advice and the display form of the first sequencing result can be set by a person skilled in the art according to the actual situation, for example, more space is allocated for the execution stage with larger consumption of computer resources in the execution process of the check point. Through the first sequencing result, a person skilled in the art can know the amount of resources consumed by the checkpoints in each stage in the execution process, and improve the execution logic of the checkpoints by combining actual conditions and tuning suggestions, so that the execution efficiency of the database is improved.
In other embodiments, after this step, further comprising: acquiring a third query instruction; calling a preset collector to record the time consumed by each execution stage of the check point according to the third query instruction; sequencing the execution stages according to time to generate a second sequencing result; and returning the second sorting result to the query interface. Through the second sorting result, a person skilled in the art can know the time consumption of each stage in the execution process of the check point according to the second sorting result, so that improvement is performed on the execution stage of the check point with larger time consumption, and further the execution efficiency of the database is improved.
The method can monitor the execution process of the check point of the database through the query interface, thereby acquiring information such as view, function and the like of the execution process of the check point, facilitating the positioning of the problem in the execution process, and further, adopting a corresponding tuning mode aiming at the problem, thereby optimizing the database parameters and further improving the operation efficiency of the database system, namely improving the performance of the database.
The present implementation also provides a machine-readable storage medium and a computer device. Fig. 3 is a schematic diagram of a machine-readable storage medium 301 according to one embodiment of the invention, and fig. 4 is a schematic diagram of a computer device 403 according to one embodiment of the invention.
The machine-readable storage medium 301 has stored thereon a machine-executable program 302, which when executed by a processor, implements the database checkpoint monitoring method of any of the embodiments described above.
The computer device 403 may include a memory 401, a processor 402, and a machine executable program 302 stored on the memory 401 and running on the processor 402, and the processor 402 implements the database checkpoint monitoring method of any of the embodiments described above when executing the machine executable program 302.
It should be noted that the logic and/or steps represented in the flow diagrams or otherwise described herein, e.g., generating the views and functions, may be embodied in any machine-readable storage medium for use by or in connection with an instruction execution system, apparatus, or device, such as a computer-based system, processor-containing system, or other system that can fetch the instructions from the instruction execution system, apparatus, or device and execute the instructions.
For the purposes of this description of embodiments, a machine-readable storage medium 301 can be any means that can contain, store, communicate, propagate, or transport the program for use by or in connection with the instruction execution system, apparatus, or device. More specific examples (a non-exhaustive list) of the machine-readable storage medium 301 include the following: an electrical connection (electronic device) having one or more wires, a portable computer diskette (magnetic device), a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber device, and a portable compact disc read-only memory (CDROM). Additionally, the machine-readable storage medium 301 may even be paper or other suitable medium upon which the program is printed, as the program may be electronically captured, via, for instance, optical scanning of the paper or other medium, then compiled, interpreted, or otherwise processed in a suitable manner if necessary, and then stored in a computer memory.
It is to be understood that portions of the present invention may be implemented in hardware, software, firmware, or a combination thereof. In the above-described embodiments, the various steps or methods may be implemented in software or firmware stored in a memory and executed by a suitable instruction execution system.
The computer device 403 may be, for example, a server, a desktop computer, a notebook computer, a tablet computer, or a smartphone. In some examples, computer device 403 may be a cloud computing node. Computer device 403 may be described in the general context of computer system-executable instructions, such as program modules, being executed by a computer system. Generally, program modules may include routines, programs, objects, components, logic, data structures, etc. that perform particular tasks or implement particular abstract data types. Computer device 403 may be implemented in a distributed cloud computing environment in which remote processing devices that are linked through a communications network perform tasks. In a distributed cloud computing environment, program modules may be located in both local and remote computing system storage media including memory storage devices.
Computer device 403 may include a processor 402 adapted to execute stored instructions, a memory 401 providing temporary storage space for the operation of the instructions during operation. Processor 402 may be a single-core processor, a multi-core processor, a computing cluster, or any number of other configurations. Memory 401 may include Random Access Memory (RAM), read only memory, flash memory, or any other suitable storage system.
The processor 402 may be connected via a system interconnect (e.g., PCI-Express, etc.) to an I/O interface (input/output interface) adapted to connect the computer device 403 to one or more I/O devices (input/output devices). The I/O devices may include, for example, a keyboard and a pointing device, which may include a touch pad or touch screen, among others. The I/O device may be a built-in component of the computer device 403 or may be a device externally connected to the computing device.
The processor 402 may also be linked through a system interconnect to a display interface adapted to connect the computer device 403 to a display device. The display device may include a display screen as a built-in component of the computer device 403. The display device may also include a computer monitor, television, projector, or the like, which is externally connected to the computer device 403. Further, a network interface controller (network interface controller, NIC) may be adapted to connect the computer device 403 to a network through a system interconnect. In some embodiments, the NIC may use any suitable interface or protocol (such as an internet small computer system interface, etc.) to transfer data. The network may be a cellular network, a radio network, a Wide Area Network (WAN), a Local Area Network (LAN), or the internet, among others. The remote device may be connected to the computing device through a network.
The flowcharts provided by this embodiment are not intended to indicate that the operations of the method are to be performed in any particular order, or that all of the operations of the method are included in all of each case. Furthermore, the method may include additional operations. Additional variations may be made to the above-described methods within the scope of the technical ideas provided by the methods of the present embodiments.
By now it should be appreciated by those skilled in the art that while a number of exemplary embodiments of the invention have been shown and described herein in detail, many other variations or modifications of the invention consistent with the principles of the invention may be directly ascertained or inferred from the present disclosure without departing from the spirit and scope of the invention. Accordingly, the scope of the present invention should be understood and deemed to cover all such other variations or modifications.

Claims (10)

1. A method of monitoring a database checkpoint comprising:
calling a query interface to receive a first query instruction;
inquiring the execution information of the check point in a preset state collector according to the first inquiry instruction;
and returning the execution information to the query interface.
2. The method for monitoring a database checkpoint as claimed in claim 1 wherein,
the step of querying the execution information of the check point in a preset state collector according to the first query instruction further comprises:
generating corresponding views and functions according to the execution information;
and returning the view and the function to the query interface.
3. The method for monitoring a database checkpoint as claimed in claim 2 wherein,
the step of returning the view and function to the query interface further comprises, prior to:
judging the type of target execution information queried by the first query instruction;
and inquiring the view and the function corresponding to the target execution information type in the preset state collector.
4. The method for monitoring a database checkpoint as claimed in claim 1 wherein,
the step of querying the execution information of the check point in a preset state collector according to the first query instruction comprises the following steps:
acquiring the execution information of the check point;
storing the execution information into the preset state collector;
and acquiring the corresponding execution information according to the first query instruction.
5. The method for monitoring a database checkpoint as claimed in claim 2 wherein,
the step of obtaining the execution information of the checkpoint further includes, prior to:
dividing the execution process of the check point into a plurality of execution phases;
and respectively executing the steps of acquiring the execution information of the check point in each execution stage.
6. The method for monitoring a database checkpoint as in claim 5 wherein,
the step of returning the execution information to the query interface further comprises:
acquiring a second query instruction;
invoking the preset state collector to calculate the computer resources consumed by each execution stage of the check point according to the second query instruction;
sequencing the execution stages according to the consumption degree of the computer resources to generate a first sequencing result;
and returning the first sorting result to the query interface.
7. The method for monitoring a database checkpoint as in claim 6 wherein,
the step of returning the first ranking result to the query interface further comprises:
generating corresponding tuning suggestions according to the consumption conditions of the corresponding computer resources of each execution stage;
and recording the tuning advice into the first sequencing result.
8. The method for monitoring a database checkpoint as in claim 5 wherein,
the step of returning the execution information to the query interface further comprises:
acquiring a third query instruction;
calling the preset state collector to record the time consumed by each execution stage of the check point according to the third query instruction;
sequencing the execution stages according to the time to generate a second sequencing result;
and returning the second sorting result to the query interface.
9. A machine readable storage medium having stored thereon a machine executable program which when executed by a processor implements a method of monitoring a database checkpoint as claimed in any one of claims 1 to 8.
10. A computer device comprising a memory, a processor and a machine executable program stored on the memory and running on the processor, and the processor implementing a method of monitoring a database checkpoint according to any one of claims 1 to 8 when executing the machine executable program.
CN202311270670.0A 2023-09-27 2023-09-27 Database check point monitoring method, storage medium and equipment Pending CN117290185A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311270670.0A CN117290185A (en) 2023-09-27 2023-09-27 Database check point monitoring method, storage medium and equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311270670.0A CN117290185A (en) 2023-09-27 2023-09-27 Database check point monitoring method, storage medium and equipment

Publications (1)

Publication Number Publication Date
CN117290185A true CN117290185A (en) 2023-12-26

Family

ID=89258277

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311270670.0A Pending CN117290185A (en) 2023-09-27 2023-09-27 Database check point monitoring method, storage medium and equipment

Country Status (1)

Country Link
CN (1) CN117290185A (en)

Similar Documents

Publication Publication Date Title
US10846137B2 (en) Dynamic adjustment of application resources in a distributed computing system
US10684832B2 (en) Code placement using a dynamic call graph
US9612873B2 (en) Dynamically scalable data collection and analysis for target device
US7627662B2 (en) Transaction request processing system and method
US20090300267A1 (en) Systems and methods for facilitating profiling of applications for efficient loading
CN104750536A (en) Virtual machine introspection (VMI) implementation method and device
CN113467823B (en) Configuration information acquisition method, device, system and storage medium
CN112148712A (en) Data processing method, device, equipment and medium
US20160253591A1 (en) Method and apparatus for managing performance of database
WO2023056793A1 (en) Optimizing a just-in-time compilation process
CN117290185A (en) Database check point monitoring method, storage medium and equipment
US11870706B2 (en) Method and system for allocating and managing cloud resources
CN111221817B (en) Service information data storage method, device, computer equipment and storage medium
CN104317820A (en) Statistical method and device of report
CN114371969A (en) Page performance testing method and device, electronic equipment and storage medium
KR20210120963A (en) Systems and methods for centralization and diagnostics for live virtual server performance data
CN114116030A (en) Operating system running method and device, electronic equipment and storage medium
US9483560B2 (en) Data analysis control
CN113835953A (en) Statistical method and device of job information, computer equipment and storage medium
CN112668285A (en) Method and device for generating fund daily report by combining RPA and AI and electronic equipment
WO2021096346A1 (en) A computer-implemented system for management of container logs and its method thereof
WO2019100655A1 (en) Method and apparatus for constructing invoice requisition anomalies, computer device and storage medium
US20130275693A1 (en) Preferential block recycling in a redirect-on-write filesystem
JP2014109975A (en) Performance analysis device, performance analysis method and performance analysis program
CN111737149B (en) Real machine platform, test method and test script processing method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Country or region after: China

Address after: 100102 201, 2 / F, 101, No. 5 building, No. 7 Rongda Road, Chaoyang District, Beijing

Applicant after: China Electronics Technology Group Jincang (Beijing) Technology Co.,Ltd.

Address before: 100102 201, 2 / F, 101, No. 5 building, No. 7 Rongda Road, Chaoyang District, Beijing

Applicant before: BEIJING KINGBASE INFORMATION TECHNOLOGIES Inc.

Country or region before: China