CN117313057A - Host operation and maintenance method, device, equipment and medium - Google Patents

Host operation and maintenance method, device, equipment and medium Download PDF

Info

Publication number
CN117313057A
CN117313057A CN202311333395.2A CN202311333395A CN117313057A CN 117313057 A CN117313057 A CN 117313057A CN 202311333395 A CN202311333395 A CN 202311333395A CN 117313057 A CN117313057 A CN 117313057A
Authority
CN
China
Prior art keywords
host
maintenance
operated
maintained
preset
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202311333395.2A
Other languages
Chinese (zh)
Inventor
黄青海
薛海伟
肖志鹏
谭磊
艾华
陈旭
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hunan Changyin May 8th Consumer Finance Co ltd
Original Assignee
Hunan Changyin May 8th Consumer Finance Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hunan Changyin May 8th Consumer Finance Co ltd filed Critical Hunan Changyin May 8th Consumer Finance Co ltd
Priority to CN202311333395.2A priority Critical patent/CN117313057A/en
Publication of CN117313057A publication Critical patent/CN117313057A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/24Querying
    • G06F16/245Query processing
    • G06F16/2455Query execution
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/30Arrangements for executing machine instructions, e.g. instruction decode
    • G06F9/30003Arrangements for executing specific machine instructions
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/20Administration of product repair or maintenance

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Computer Security & Cryptography (AREA)
  • Human Resources & Organizations (AREA)
  • Databases & Information Systems (AREA)
  • Data Mining & Analysis (AREA)
  • Computational Linguistics (AREA)
  • Computer Hardware Design (AREA)
  • Economics (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Marketing (AREA)
  • Operations Research (AREA)
  • Quality & Reliability (AREA)
  • Strategic Management (AREA)
  • Tourism & Hospitality (AREA)
  • General Business, Economics & Management (AREA)
  • Debugging And Monitoring (AREA)

Abstract

The application discloses a host operation and maintenance method, a device, equipment and a medium, relates to the technical field of computers, and is applied to a preset operation and maintenance tool, wherein the method comprises the following steps: receiving a current operation and maintenance instruction fed back by a back end and host information of a host to be operated and maintained; searching a login user name and a target login password corresponding to host information of the host to be operated and maintained from a preset database so as to log in the host to be operated and maintained; controlling the host to be operated and maintained to execute the current operation and maintenance instruction so as to obtain an operation and maintenance execution result; and feeding back the operation and maintenance execution result to the back end so that the back end controls a preset automatic office system and the front end displays the operation and maintenance execution result. Through the scheme, the current operation and maintenance instruction fed back by the back end and the host information of the hosts to be operated and maintained are received, the number of the hosts to be operated and maintained is not limited, login verification is needed to be carried out on the hosts to be operated and maintained, and therefore the operation and maintenance efficiency and reliability of the hosts can be improved.

Description

Host operation and maintenance method, device, equipment and medium
Technical Field
The present invention relates to the field of computer technologies, and in particular, to a method, an apparatus, a device, and a medium for host operation and maintenance.
Background
With more and more company hosts, the operation and maintenance work of the hosts is more and more complicated, and the work of real-time monitoring of host states, issuing of host instructions, management of the hosts and the like consumes a great amount of time. The conventional host operation and maintenance platform can only operate and maintain a single host, can not finish host operation and maintenance in batches, and in the prior art, the host is in a secret-free login state when operated and maintained, so that the security risk exists.
In summary, how to improve the operation and maintenance efficiency and reliability of the host is a problem to be solved in the art.
Disclosure of Invention
Accordingly, the present invention is directed to a method, apparatus, device and medium for host operation and maintenance, which can improve the efficiency and reliability of host operation and maintenance. The specific scheme is as follows:
in a first aspect, the present application discloses a host operation and maintenance method, applied to a preset operation and maintenance tool, including:
receiving a current operation and maintenance instruction fed back by a back end and host information of a host to be operated and maintained;
searching a login user name and a target login password corresponding to host information of the host to be operated and maintained from a preset database so as to log in the host to be operated and maintained;
controlling the host to be operated and maintained to execute the current operation and maintenance instruction so as to obtain an operation and maintenance execution result;
and feeding back the operation and maintenance execution result to the back end so that the back end controls a preset automatic office system and the front end displays the operation and maintenance execution result.
Optionally, the receiving the current operation and maintenance instruction fed back by the back end and the host information of the host to be operated and maintained includes:
reading a current timing identifier through an operation and maintenance tool in preset time, and if the current timing identifier is the preset identifier, sending a current operation and maintenance instruction to the rear end so that the rear end screens host information of a host to be operated and maintained corresponding to the current operation and maintenance instruction from a preset database after receiving the current operation and maintenance instruction;
and receiving the current operation and maintenance instruction fed back by the back end and host information of the host to be operated and maintained.
Optionally, the receiving the current operation and maintenance instruction fed back by the back end and the host information of the host to be operated and maintained includes:
receiving a current operation and maintenance instruction sent by a front end through a rear end, judging whether the current operation and maintenance instruction is a preset high-risk instruction or not by the rear end, and if not, sending the current operation and maintenance instruction and host information of a host to be operated and maintained corresponding to the current operation and maintenance instruction to a preset operation and maintenance tool by the rear end; the preset high-risk instruction comprises a shutdown instruction, a deleting instruction, a restarting instruction and a host name modifying instruction.
Optionally, before searching the login user name and the target login password corresponding to the host information of the host to be operated and maintained from the preset database, the method further includes:
and storing a preset password file into an operation support system object storage through a front end, so that the back end reads a login password stored in the preset password file from the operation support system object storage, encrypts the login password to obtain an encrypted login password, and then stores the encrypted login password into a preset database.
Optionally, the searching the login user name and the target login password corresponding to the host information of the host to be operated and maintained from the preset database to login the host to be operated and maintained includes:
searching a login user name and a target encrypted login password corresponding to host information of the host to be operated and maintained from a preset database, and decrypting the target encrypted login password by using a decryption algorithm to obtain a target login password;
performing login verification on the host to be operated and maintained by using the login user name and the target login password to generate a corresponding verification result;
if the verification result represents that the verification is successful, logging in the host to be operated and maintained;
and if the verification result represents verification failure, feeding back the verification result to the rear end.
Optionally, the back-end controlling and presetting an automatic office system and the front-end displaying the operation and maintenance execution result includes:
the back end monitors the current condition index of the host to be operated and maintained and judges whether the current condition index meets a preset early warning rule or not;
if yes, controlling a preset automatic office system and the front end to display the operation and maintenance execution result.
Optionally, the monitoring, by the backend, the current status indicator of the host to be operated and maintained includes:
and the back end monitors the hardware condition index, the database condition index, the application server condition index and the PING value of the host to be operated and maintained so as to obtain the current condition index of the host to be operated and maintained.
In a second aspect, the present application discloses a host operation and maintenance device, applied to a preset operation and maintenance tool, including:
the instruction information receiving module is used for receiving a current operation and maintenance instruction fed back by the back end and host information of a host to be operated and maintained;
the host login verification module is used for searching a login user name and a target login password corresponding to host information of the host to be operated and maintained from a preset database so as to log in the host to be operated and maintained;
the operation and maintenance result acquisition module is used for controlling the host to be operated and maintained to execute the current operation and maintenance instruction so as to obtain an operation and maintenance execution result;
and the operation and maintenance result display module is used for feeding back the operation and maintenance execution result to the back end so that the back end controls a preset automatic office system and the front end to display the operation and maintenance execution result.
In a third aspect, the present application discloses an electronic device comprising:
a memory for storing a computer program;
and a processor for executing the computer program to implement the steps of the disclosed host operation and maintenance method.
In a fourth aspect, the present application discloses a computer-readable storage medium for storing a computer program; wherein the computer program when executed by a processor implements the steps of the previously disclosed host operation and maintenance method.
The beneficial effects of the application are that: the method and the device are applied to a preset operation tool, and the current operation instruction fed back by the back end and the host information of the host to be operated and maintained are received; searching a login user name and a target login password corresponding to host information of the host to be operated and maintained from a preset database so as to log in the host to be operated and maintained; controlling the host to be operated and maintained to execute the current operation and maintenance instruction so as to obtain an operation and maintenance execution result; and feeding back the operation and maintenance execution result to the back end so that the back end controls a preset automatic office system and the front end displays the operation and maintenance execution result. Therefore, after the preset operation tool receives the current operation instruction fed back by the back end and the host information of the host to be operated, the login user name and the target login password corresponding to the host information of the host to be operated are searched from the preset database, the number of the hosts to be operated is not required to be limited, further, the login verification is carried out on the hosts to be operated, and therefore, the current operation instruction can be controlled to be executed by the hosts to be operated only through the login verification, and therefore the operation efficiency and the reliability of the hosts can be improved.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings that are required to be used in the embodiments or the description of the prior art will be briefly described below, and it is obvious that the drawings in the following description are only embodiments of the present invention, and that other drawings may be obtained according to the provided drawings without inventive effort to a person skilled in the art.
FIG. 1 is a flow chart of a method for host operation and maintenance disclosed in the present application;
FIG. 2 is a schematic diagram of a specific host operation disclosed in the present application;
FIG. 3 is a schematic diagram of a host operation and maintenance device disclosed in the present application;
fig. 4 is a block diagram of an electronic device disclosed in the present application.
Detailed Description
The following description of the technical solutions in the embodiments of the present application will be made clearly and completely with reference to the drawings in the embodiments of the present application, and it is apparent that the described embodiments are only some embodiments of the present invention, not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
With more and more company hosts, the operation and maintenance work of the hosts is more and more complicated, and the work of real-time monitoring of host states, issuing of host instructions, management of the hosts and the like consumes a great amount of time. The conventional host operation and maintenance platform can only operate and maintain a single host, can not finish host operation and maintenance in batches, and in the prior art, the host is in a secret-free login state when operated and maintained, so that the security risk exists.
Therefore, the application correspondingly provides a host operation and maintenance scheme which can improve the operation and maintenance efficiency and reliability of the host.
Referring to fig. 1, an embodiment of the present application discloses a host operation and maintenance method, which is applied to a preset operation and maintenance tool, and includes:
step S11: and receiving a current operation and maintenance instruction fed back by the back end and host information of a host to be operated and maintained.
In this embodiment, the corresponding operation and maintenance command may be executed through the timing task, or the operation and maintenance command may be issued through the front end, that is, the back end may receive the operation and maintenance command triggered by the timing task, or may receive the operation and maintenance command issued by the front end, and then the back end sends the received operation and maintenance command to the preset operation and maintenance tool; the preset operation tool is a custom stable tool (an automatic operation tool).
In a first specific embodiment, the receiving the current operation and maintenance instruction fed back by the back end and the host information of the host to be operated and maintained includes: reading a current timing identifier through an operation and maintenance tool in preset time, and if the current timing identifier is the preset identifier, sending a current operation and maintenance instruction to the rear end so that the rear end screens host information of a host to be operated and maintained corresponding to the current operation and maintenance instruction from a preset database after receiving the current operation and maintenance instruction; and receiving the current operation and maintenance instruction fed back by the back end and host information of the host to be operated and maintained. Configuring a preset time operation and maintenance tool, and configuring a timing task switch through system parameters, for example, configuring a preset mark as true, that is, if the preset time operation and maintenance tool reads that the current timing mark is true, indicating that the current timing task needs to be executed, namely, the preset time operation and maintenance tool sends a current operation and maintenance instruction to the back end; if the preset operation and maintenance tool reads the current timing mark as false, namely the current timing mark is not the preset mark, the operation and maintenance tool does not send the current operation and maintenance instruction to the back end when the preset operation and maintenance tool is not required to execute the timing task at present, and the current timing mark is continuously read.
In a second specific embodiment, the receiving the current operation and maintenance instruction fed back by the back end and the host information of the host to be operated and maintained includes: receiving a current operation and maintenance instruction sent by a front end through a rear end, judging whether the current operation and maintenance instruction is a preset high-risk instruction or not by the rear end, and if not, sending the current operation and maintenance instruction and host information of a host to be operated and maintained corresponding to the current operation and maintenance instruction to a preset operation and maintenance tool by the rear end; the preset high-risk instruction comprises a shutdown instruction, a deleting instruction, a restarting instruction and a host name modifying instruction. The method comprises the steps that a rear end receives a current operation and maintenance instruction issued by a front end, high-risk instruction detection is carried out on the instruction, preset high-risk instructions are a shutdown instruction, an rm-rf deleting instruction, a reboot restarting instruction, a poweroff shutdown instruction, a hostname modifying host name instruction and the like, the front end instruction is compared with the preset high-risk instructions, if the instructions contain relevant fields, the execution is not carried out, and meanwhile, the front end informing reason is returned; because the batch running instruction consumes longer time, in order to avoid front end waiting, a new thread is created to process when the issuing instruction is executed, the new thread is used for issuing the instruction detected by the high-risk instruction and host list information to be executed to a self-defined allowable module, and a return result is processed.
Before receiving the current operation instruction fed back by the back end and the host information of the host to be operated, the management page of the front end can acquire all host list information, that is, host information which needs to be managed by a preset operation tool, by means of excel import or an IP (Internet Protocol Address, i.e., an internet protocol address) scanning mode, where the host information mainly includes a host name, an IP, a host type, a CPU (central processing unit, i.e., central Processing Unit), a memory, a disk, a host type, an area to which the host belongs, operating system information, an environment type, a usage description, an NTP (Network Time Protocol, i.e., a network time protocol) server address, and the like.
Step S12: searching a login user name and a target login password corresponding to host information of the host to be operated and maintained from a preset database so as to log in the host to be operated and maintained.
In this embodiment, before searching the login user name and the target login password corresponding to the host information of the host to be operated and maintained from the preset database, the method further includes: and storing a preset password file into an operation support system object storage through a front end, so that the back end reads a login password stored in the preset password file from the operation support system object storage, encrypts the login password to obtain an encrypted login password, and then stores the encrypted login password into a preset database. The method comprises the steps of configuring a preset password file, wherein a password stored in the preset password file is an unencrypted login password, storing the preset password file in an excel form in an OSS (Object Storage Service, namely an operation support system) file storage by the front end, and then reading the login password in an operation support system object storage by a logic processing module at the rear end.
In this embodiment, the searching, from a preset database, a login user name and a target login password corresponding to host information of the host to be operated and maintained to login the host to be operated and maintained includes: searching a login user name and a target encrypted login password corresponding to host information of the host to be operated and maintained from a preset database, and decrypting the target encrypted login password by using a decryption algorithm to obtain a target login password; performing login verification on the host to be operated and maintained by using the login user name and the target login password to generate a corresponding verification result; if the verification result represents that the verification is successful, logging in the host to be operated and maintained; and if the verification result represents verification failure, feeding back the verification result to the rear end. The preset operation and maintenance tool searches a login user name and a target encrypted login password corresponding to host information of the host to be operated and maintained from a preset database, and decrypts the target encrypted login password by using a decryption algorithm to obtain a target login password, so that the login and verification of the host to be operated and maintained can be performed by using the login user name and the target login password, if the login and verification is not passed, the login and verification result is fed back to the rear end, and if the login and verification is passed, the host to be operated and maintained is logged in, so that the host to be operated and maintained is controlled to execute corresponding operation and maintenance instructions subsequently.
Step S13: and controlling the host to be operated and maintained to execute the current operation and maintenance instruction so as to obtain an operation and maintenance execution result.
After the host to be operated and maintained is successfully logged in, the preset operation and maintenance tool can control the host to be operated and maintained to execute the current operation and maintenance instruction so as to carry out corresponding operation and maintenance on the host to be operated and maintained, and further, a corresponding operation and maintenance execution result is obtained.
Step S14: and feeding back the operation and maintenance execution result to the back end so that the back end controls a preset automatic office system and the front end displays the operation and maintenance execution result.
In this embodiment, the controlling, by the back end, the preset automatic office system and the displaying, by the front end, the operation and maintenance execution result includes: the back end monitors the current condition index of the host to be operated and maintained and judges whether the current condition index meets a preset early warning rule or not; if yes, controlling a preset automatic office system and the front end to display the operation and maintenance execution result. And receiving an operation and maintenance execution result returned after the user-defined allowable module executes the instruction. The timing task module realizes the display and early warning functions of timing task results in an OA system through accessing an OA (Office Automation) system API (Application Programming Interface, namely an application programming interface) of a company. And carrying out corresponding logic processing on the timing task result, and determining whether to feed back the execution result to the OA system according to corresponding standards of the system parameters. And calling an OA system API by using the result needing to be fed back to realize the result display and early warning functions of the timed task result in the OA system host state monitoring group.
In this embodiment, the monitoring, by the backend, the current status indicator of the host to be operated and maintained includes: and the back end monitors the hardware condition index, the database condition index, the application server condition index and the PING value of the host to be operated and maintained so as to obtain the current condition index of the host to be operated and maintained. The back end monitors the current condition index of the host to be operated and maintained, and the method is specifically as follows:
1) Monitoring a hardware condition index: CPU utilization rate, memory utilization rate, disk utilization condition, network load condition;
2) Monitoring a database condition index: database connection number, database space use condition, database large transaction number condition and database master-slave delay condition;
3) Monitoring application server conditions: monitoring application program request response time and response codes;
4) PING values are monitored.
The preset early warning rules are specifically as follows:
the early warning rule is as follows:
1) Hardware condition index:
the CPU utilization rate is greater than 80%, primary early warning is initiated, ten times of continuous warning is converted into medium-level early warning, and the CPU utilization rate is greater than 90%, high-level early warning is directly initiated;
initiating primary early warning when the memory utilization rate is greater than 80%, converting ten continuous alarms into intermediate early warning when the memory utilization rate is greater than 90%, and directly initiating advanced early warning;
initiating primary early warning when the disk utilization rate is greater than 80%, converting ten continuous warning into medium-level early warning when the disk utilization rate is greater than 90%, and directly initiating high-level early warning;
initiating primary early warning when the network load rate is greater than 80%, converting ten continuous alarms into medium-level early warning when the network load rate is greater than 90%, and directly initiating high-level early warning;
2) Database condition index:
the database connection number is determined by configuration parameters of a database management program, is generally not fixed, and is generally used as an early warning standard, medium-level early warning is directly initiated, and ten continuous warning is converted into high-level early warning;
and under the use condition of the database table space, if the database table space is more than 2T or the table data fragment rate is more than 90%, performing medium-level early warning, wherein the early warning content is as follows: database name, table space size, table data line number, table data fragment rate, table character set;
and under the condition of large transaction quantity of the database, inquiring the thread number and thread condition of which the transaction duration is longer than 1min in the database by taking the database transaction longer than 1min as a standard. The early warning content is: database name, thread number, present time, transaction start time, transaction duration;
a database master-slave delay condition, a master-slave delay early warning of a database read-only instance, inquiring whether an I/O thread of a slave library is started and successfully connected to a master server condition, and if the I/O thread is not connected to the master server, initiating an I/O thread abnormality warning; inquiring whether the SQL thread is started or not, and if not, initiating an SQL thread abnormal alarm; inquiring the current time stamp and the time stamp difference value of the event recorded by the master library, and if the difference value exists, initiating master-slave delay alarm;
3) Application server status:
and monitoring response time and response code of the application program, initiating a request to a state monitoring port set by the application system, acquiring the response code and the response time, if the acquired response code is 200, not initiating early warning, and if the acquired response code is not 200, directly initiating advanced early warning. The early warning content is a system name, a response code and response time;
4) PING value:
if the ping is not communicated, the abnormal pre-warning of the ping is initiated.
And carrying out corresponding logic processing on the operation and maintenance execution result according to a specific scene, storing the processing result into a database instruction execution result information table, and modifying the instruction record information state in the instruction execution result information table to be completed, otherwise, the state is in processing.
The embodiment further includes a result display, where returned operation and maintenance execution results are displayed on the OA system and the front page, respectively:
1) The OA system displays and processes the operation and maintenance execution results. And calling an API of the OA system through the result processing module, displaying the result in a host state monitoring group of the OA system, determining whether to initiate a host state alarm according to the state condition of the host in the result, and determining the initiated alarm level.
2) And the host batch operation and maintenance management platform front-end page displays the operation and maintenance execution result of the front-end instruction. Judging the execution status of the instruction according to the execution status of the instruction in the instruction record information, and if the execution status is completed, checking the operation and maintenance execution result of the corresponding instruction in each host in the instruction execution result information record.
The embodiment can operate the hosts in batches, so that the complicated work of manually operating and maintaining the hosts is reduced, and the time is saved; the host can be selected to execute the front-end instruction, the host is flexibly selected, the instruction is diversified, and the instruction result is displayed in real-time interface; a high-risk instruction detection function for detecting a high-risk instruction and executing a safety instruction; the timing task monitors the state of the host computer in real time and accesses an OA system to initiate real-time alarm; the method is characterized in that the hosts are not logged in without secret, the security risk is avoided, the host passwords are stored in an encrypted mode, and each host has a corresponding password.
The beneficial effects of the application are that: the method and the device are applied to a preset operation tool, and the current operation instruction fed back by the back end and the host information of the host to be operated and maintained are received; searching a login user name and a target login password corresponding to host information of the host to be operated and maintained from a preset database so as to log in the host to be operated and maintained; controlling the host to be operated and maintained to execute the current operation and maintenance instruction so as to obtain an operation and maintenance execution result; and feeding back the operation and maintenance execution result to the back end so that the back end controls a preset automatic office system and the front end displays the operation and maintenance execution result. Therefore, after the preset operation tool receives the current operation instruction fed back by the back end and the host information of the host to be operated, the login user name and the target login password corresponding to the host information of the host to be operated are searched from the preset database, the number of the hosts to be operated is not required to be limited, further, the login verification is carried out on the hosts to be operated, and therefore, the current operation instruction can be controlled to be executed by the hosts to be operated only through the login verification, and therefore the operation efficiency and the reliability of the hosts can be improved.
The present application will be described with reference to a specific host operation and maintenance schematic diagram shown in fig. 2.
1) Front end:
1.1 The management page at the front end can obtain the host information of each host through excel import or IP scanning mode, form host list information, and send operation and maintenance instructions to the rear end according to the host list information;
1.2 Importing a password file in an excel form, and storing the password file in an OSS file;
1.3 Displaying the operation and maintenance execution result fed back by the back end.
2) Operation and maintenance tool at preset time:
2.1 A preset identifier is configured, for example, the preset identifier is true;
2.2 Reading the current timing mark, and if the current timing mark is the preset mark, issuing an operation and maintenance instruction to the back end.
3) The rear end:
3.1 Reading a login password which is not encrypted in the OSS file, encrypting the password to obtain an encrypted login password, and storing the encrypted login password into a preset database;
3.2 Receiving an operation and maintenance instruction issued by the front end, and performing high-risk instruction detection on the operation and maintenance instruction, namely judging whether the operation and maintenance instruction is a preset high-risk instruction, if not, sending the operation and maintenance instruction and host information of a host to be operated and maintained corresponding to the operation and maintenance instruction to a preset operation and maintenance tool;
3.3 Receiving an operation and maintenance instruction issued by the operation and maintenance tool in a preset process, screening host information of a host to be operated and maintained corresponding to the operation and maintenance instruction from a preset database, and then sending the operation and maintenance instruction and the host information of the host to be operated and maintained to the preset operation and maintenance tool;
3.4 Receiving an operation and maintenance execution result fed back by a preset operation and maintenance tool, monitoring the current condition index of a host to be operated and maintained, and judging whether the current condition index meets a preset early warning rule or not; if yes, controlling the preset automatic office system and the front end to display the operation and maintenance execution result.
4) Presetting an operation and maintenance tool:
4.1 Receiving an operation and maintenance instruction fed back by the back end and host information of a host to be operated and maintained;
searching a login user name and a target login password corresponding to host information of a host to be operated and maintained from a preset database so as to log in the host to be operated and maintained;
4.2 Controlling the host to be operated and maintained to execute the current operation and maintenance instruction to obtain an operation and maintenance execution result, and then feeding back the operation and maintenance execution result to the back end.
5) Presetting an automatic office system: and receiving the operation and maintenance execution result fed back by the back end, and displaying the operation and maintenance execution result.
Referring to fig. 3, an embodiment of the present application discloses a host operation and maintenance device, which is applied to a preset operation and maintenance tool, and includes:
the instruction information receiving module 11 is configured to receive a current operation and maintenance instruction fed back by the back end and host information of a host to be operated and maintained;
the host login checking module 12 is configured to search a preset database for a login user name and a target login password corresponding to host information of the host to be operated and maintained, so as to log in the host to be operated and maintained;
the operation and maintenance result obtaining module 13 is configured to control the host to be operated and maintained to execute the current operation and maintenance instruction, so as to obtain an operation and maintenance execution result;
and the operation and maintenance result display module 14 is used for feeding back the operation and maintenance execution result to the back end so that the back end controls a preset automatic office system and the front end displays the operation and maintenance execution result.
The beneficial effects of the application are that: the method and the device are applied to a preset operation tool, and the current operation instruction fed back by the back end and the host information of the host to be operated and maintained are received; searching a login user name and a target login password corresponding to host information of the host to be operated and maintained from a preset database so as to log in the host to be operated and maintained; controlling the host to be operated and maintained to execute the current operation and maintenance instruction so as to obtain an operation and maintenance execution result; and feeding back the operation and maintenance execution result to the back end so that the back end controls a preset automatic office system and the front end displays the operation and maintenance execution result. Therefore, after the preset operation tool receives the current operation instruction fed back by the back end and the host information of the host to be operated, the login user name and the target login password corresponding to the host information of the host to be operated are searched from the preset database, the number of the hosts to be operated is not required to be limited, further, the login verification is carried out on the hosts to be operated, and therefore, the current operation instruction can be controlled to be executed by the hosts to be operated only through the login verification, and therefore the operation efficiency and the reliability of the hosts can be improved.
Further, the embodiment of the application also provides electronic equipment. Fig. 4 is a block diagram of an electronic device 20, according to an exemplary embodiment, and the contents of the diagram should not be construed as limiting the scope of use of the present application in any way.
Fig. 4 is a schematic structural diagram of an electronic device according to an embodiment of the present application. Specifically, the method comprises the following steps: at least one processor 21, at least one memory 22, a power supply 23, a communication interface 24, an input output interface 25, and a communication bus 26. Wherein the memory 22 is used for storing a computer program, which is loaded and executed by the processor 21 for realizing the following steps:
receiving a current operation and maintenance instruction fed back by a back end and host information of a host to be operated and maintained;
searching a login user name and a target login password corresponding to host information of the host to be operated and maintained from a preset database so as to log in the host to be operated and maintained;
controlling the host to be operated and maintained to execute the current operation and maintenance instruction so as to obtain an operation and maintenance execution result;
and feeding back the operation and maintenance execution result to the back end so that the back end controls a preset automatic office system and the front end displays the operation and maintenance execution result.
In some embodiments, the processor may specifically implement the following steps by executing the computer program stored in the memory:
reading a current timing identifier through an operation and maintenance tool in preset time, and if the current timing identifier is the preset identifier, sending a current operation and maintenance instruction to the rear end so that the rear end screens host information of a host to be operated and maintained corresponding to the current operation and maintenance instruction from a preset database after receiving the current operation and maintenance instruction;
and receiving the current operation and maintenance instruction fed back by the back end and host information of the host to be operated and maintained.
In some embodiments, the processor may specifically implement the following steps by executing the computer program stored in the memory:
receiving a current operation and maintenance instruction sent by a front end through a rear end, judging whether the current operation and maintenance instruction is a preset high-risk instruction or not by the rear end, and if not, sending the current operation and maintenance instruction and host information of a host to be operated and maintained corresponding to the current operation and maintenance instruction to a preset operation and maintenance tool by the rear end; the preset high-risk instruction comprises a shutdown instruction, a deleting instruction, a restarting instruction and a host name modifying instruction.
In some embodiments, the processor may specifically implement the following steps by executing the computer program stored in the memory:
and storing a preset password file into an operation support system object storage through a front end, so that the back end reads a login password stored in the preset password file from the operation support system object storage, encrypts the login password to obtain an encrypted login password, and then stores the encrypted login password into a preset database.
In some embodiments, the processor may specifically implement the following steps by executing the computer program stored in the memory:
searching a login user name and a target encrypted login password corresponding to host information of the host to be operated and maintained from a preset database, and decrypting the target encrypted login password by using a decryption algorithm to obtain a target login password;
performing login verification on the host to be operated and maintained by using the login user name and the target login password to generate a corresponding verification result;
if the verification result represents that the verification is successful, logging in the host to be operated and maintained;
and if the verification result represents verification failure, feeding back the verification result to the rear end.
In some embodiments, the processor may specifically implement the following steps by executing the computer program stored in the memory:
the back end monitors the current condition index of the host to be operated and maintained and judges whether the current condition index meets a preset early warning rule or not;
if yes, controlling a preset automatic office system and the front end to display the operation and maintenance execution result.
In some embodiments, the processor may further include the following steps by executing the computer program stored in the memory:
and the back end monitors the hardware condition index, the database condition index, the application server condition index and the PING value of the host to be operated and maintained so as to obtain the current condition index of the host to be operated and maintained.
In this embodiment, the power supply 23 is configured to provide an operating voltage for each hardware device on the electronic device; the communication interface 24 can create a data transmission channel between the electronic device and an external device, and the communication protocol to be followed is any communication protocol applicable to the technical solution of the present application, which is not specifically limited herein; the input/output interface 25 is used for acquiring external input data or outputting external output data, and the specific interface type thereof may be selected according to the specific application requirement, which is not limited herein.
Processor 21 may include one or more processing cores, such as a 4-core processor, an 8-core processor, etc. The processor 21 may be implemented in at least one hardware form of DSP (Digital Signal Processing ), FPGA (Field-Programmable Gate Array, field programmable gate array), PLA (Programmable Logic Array ). The processor 21 may also comprise a main processor, which is a processor for processing data in an awake state, also called CPU (Central Processing Unit ); a coprocessor is a low-power processor for processing data in a standby state. In some embodiments, the processor 21 may integrate a GPU (Graphics Processing Unit, image processor) for rendering and drawing of content required to be displayed by the display screen. In some embodiments, the processor 21 may also include an AI (Artificial Intelligence ) processor for processing computing operations related to machine learning.
The memory 22 may be a carrier for storing resources, such as a read-only memory, a random access memory, a magnetic disk, or an optical disk, and the resources stored thereon include an operating system 221, a computer program 222, and data 223, and the storage may be temporary storage or permanent storage.
The operating system 221 is used for managing and controlling various hardware devices on the electronic device and the computer program 222, so as to implement the operation and processing of the processor 21 on the mass data 223 in the memory 22, which may be Windows, unix, linux. The computer program 222 may further include a computer program that can be used to perform other specific tasks in addition to the computer program that can be used to perform the host operation and maintenance method performed by the electronic device as disclosed in any of the previous embodiments. The data 223 may include, in addition to data received by the electronic device and transmitted by the external device, data collected by the input/output interface 25 itself, and so on.
Further, the application also discloses a computer readable storage medium for storing a computer program; wherein the computer program when executed by the processor implements the host operation and maintenance method disclosed above. For specific steps of the method, reference may be made to the corresponding contents disclosed in the foregoing embodiments, and no further description is given here.
In this specification, each embodiment is described in a progressive manner, and each embodiment is mainly described in a different point from other embodiments, so that the same or similar parts between the embodiments are referred to each other. For the device disclosed in the embodiment, since it corresponds to the method disclosed in the embodiment, the description is relatively simple, and the relevant points refer to the description of the method section.
Those of skill would further appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware, computer software, or combinations of both, and that the various illustrative elements and steps are described above generally in terms of functionality in order to clearly illustrate the interchangeability of hardware and software. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application. The steps of a method or algorithm described in connection with the embodiments disclosed herein may be embodied directly in hardware, in a software module executed by a processor, or in a combination of the two. The software modules may be placed in random access Memory (Random Access Memory), memory, read-Only Memory (ROM), electrically programmable EPROM (Erasable Programmable Read Only Memory), electrically erasable programmable EEPROM (Electrically Erasable Programmable Read Only Memory), registers, hard disk, removable disk, CD-ROM (CoMP 23027701act Disc Read-Only Memory), or any other form of storage medium known in the art.
Finally, it is further noted that relational terms such as first and second, and the like are used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Moreover, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
The above detailed description of a method, device, apparatus and medium for host operation and maintenance provided by the present invention applies specific examples to illustrate the principles and embodiments of the present invention, and the above description of the examples is only used to help understand the method and core idea of the present invention; meanwhile, as those skilled in the art will have variations in the specific embodiments and application scope in accordance with the ideas of the present invention, the present description should not be construed as limiting the present invention in view of the above.

Claims (10)

1. The host operation and maintenance method is characterized by being applied to a preset operation and maintenance tool and comprising the following steps of:
receiving a current operation and maintenance instruction fed back by a back end and host information of a host to be operated and maintained;
searching a login user name and a target login password corresponding to host information of the host to be operated and maintained from a preset database so as to log in the host to be operated and maintained;
controlling the host to be operated and maintained to execute the current operation and maintenance instruction so as to obtain an operation and maintenance execution result;
and feeding back the operation and maintenance execution result to the back end so that the back end controls a preset automatic office system and the front end displays the operation and maintenance execution result.
2. The method for operating and maintaining a host according to claim 1, wherein the receiving the current operation and maintenance instruction fed back by the back end and the host information of the host to be operated and maintained includes:
reading a current timing identifier through an operation and maintenance tool in preset time, and if the current timing identifier is the preset identifier, sending a current operation and maintenance instruction to the rear end so that the rear end screens host information of a host to be operated and maintained corresponding to the current operation and maintenance instruction from a preset database after receiving the current operation and maintenance instruction;
and receiving the current operation and maintenance instruction fed back by the back end and host information of the host to be operated and maintained.
3. The method for operating and maintaining a host according to claim 1, wherein the receiving the current operation and maintenance instruction fed back by the back end and the host information of the host to be operated and maintained includes:
receiving a current operation and maintenance instruction sent by a front end through a rear end, judging whether the current operation and maintenance instruction is a preset high-risk instruction or not by the rear end, and if not, sending the current operation and maintenance instruction and host information of a host to be operated and maintained corresponding to the current operation and maintenance instruction to a preset operation and maintenance tool by the rear end; the preset high-risk instruction comprises a shutdown instruction, a deleting instruction, a restarting instruction and a host name modifying instruction.
4. The method for operating and maintaining a host according to claim 1, wherein before searching a login user name and a target login password corresponding to host information of the host to be operated and maintaining from a preset database, the method further comprises:
and storing a preset password file into an operation support system object storage through a front end, so that the back end reads a login password stored in the preset password file from the operation support system object storage, encrypts the login password to obtain an encrypted login password, and then stores the encrypted login password into a preset database.
5. The method for operating and maintaining a host according to claim 4, wherein searching a login user name and a target login password corresponding to host information of the host to be operated and maintaining from a preset database to login the host to be operated and maintaining the host to be operated, comprises:
searching a login user name and a target encrypted login password corresponding to host information of the host to be operated and maintained from a preset database, and decrypting the target encrypted login password by using a decryption algorithm to obtain a target login password;
performing login verification on the host to be operated and maintained by using the login user name and the target login password to generate a corresponding verification result;
if the verification result represents that the verification is successful, logging in the host to be operated and maintained;
and if the verification result represents verification failure, feeding back the verification result to the rear end.
6. The method according to any one of claims 1 to 5, wherein the back-end controlling the preset automatic office system and the front-end displaying the operation and maintenance execution result includes:
the back end monitors the current condition index of the host to be operated and maintained and judges whether the current condition index meets a preset early warning rule or not;
if yes, controlling a preset automatic office system and the front end to display the operation and maintenance execution result.
7. The host operation and maintenance method according to claim 6, wherein the back-end monitoring the current status indicator of the host to be operated and maintained comprises:
and the back end monitors the hardware condition index, the database condition index, the application server condition index and the PING value of the host to be operated and maintained so as to obtain the current condition index of the host to be operated and maintained.
8. A host operation and maintenance device, which is applied to a preset operation and maintenance tool, comprising:
the instruction information receiving module is used for receiving a current operation and maintenance instruction fed back by the back end and host information of a host to be operated and maintained;
the host login verification module is used for searching a login user name and a target login password corresponding to host information of the host to be operated and maintained from a preset database so as to log in the host to be operated and maintained;
the operation and maintenance result acquisition module is used for controlling the host to be operated and maintained to execute the current operation and maintenance instruction so as to obtain an operation and maintenance execution result;
and the operation and maintenance result display module is used for feeding back the operation and maintenance execution result to the back end so that the back end controls a preset automatic office system and the front end to display the operation and maintenance execution result.
9. An electronic device, comprising:
a memory for storing a computer program;
a processor for executing the computer program to implement the steps of the host operation and maintenance method according to any one of claims 1 to 7.
10. A computer-readable storage medium storing a computer program; wherein the computer program when executed by a processor implements the steps of the host operation and maintenance method according to any one of claims 1 to 7.
CN202311333395.2A 2023-10-16 2023-10-16 Host operation and maintenance method, device, equipment and medium Pending CN117313057A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311333395.2A CN117313057A (en) 2023-10-16 2023-10-16 Host operation and maintenance method, device, equipment and medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311333395.2A CN117313057A (en) 2023-10-16 2023-10-16 Host operation and maintenance method, device, equipment and medium

Publications (1)

Publication Number Publication Date
CN117313057A true CN117313057A (en) 2023-12-29

Family

ID=89261905

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311333395.2A Pending CN117313057A (en) 2023-10-16 2023-10-16 Host operation and maintenance method, device, equipment and medium

Country Status (1)

Country Link
CN (1) CN117313057A (en)

Similar Documents

Publication Publication Date Title
CN112367246B (en) Message pushing method and device, electronic equipment and storage medium
CN111061685B (en) Log query method and device, node equipment and storage medium
CN113079164A (en) Remote control method and device for bastion machine resources, storage medium and terminal equipment
CN112926048A (en) Abnormal information detection method and device
CN111787030B (en) Network security inspection method, device, equipment and storage medium
CN113608964A (en) Cluster automation monitoring method and device, electronic equipment and storage medium
CN111371752A (en) Remote monitoring method, device, equipment and medium for server
CN115001967B (en) Data acquisition method and device, electronic equipment and storage medium
CN107918564B (en) Data transmission exception handling method and device, electronic equipment and storage medium
CN111262911B (en) Projector control method, device, equipment and storage medium
CN117313057A (en) Host operation and maintenance method, device, equipment and medium
CN111553668A (en) Big data-based cash withdrawal method and device, electronic equipment and medium
CN111277626A (en) Server upgrading method and device, electronic equipment and medium
CN116401109A (en) Control method, device and medium of chassis management system
CN115344889A (en) Console access method, device, equipment and medium for virtual machine
CN111734221B (en) Well lid unlocking method, device, equipment, storage medium and system
CN113868094A (en) Big data abnormal information monitoring system
CN111722951B (en) Exception handling method and device and storage medium
CN110348984B (en) Automatic credit card data input method and related equipment under different transaction channels
CN113810457A (en) Method and device for reporting service access exception, readable storage medium and electronic equipment
CN113220342A (en) Centralized configuration method and device, electronic equipment and storage medium
CN113765869A (en) Login method, device, server and storage medium
CN111209054A (en) Configuration method of terminal equipment, terminal management equipment and electronic equipment
CN106302031B (en) System for monitoring state of communication line in real time
CN109376525B (en) Prompting method of Linux server, Linux server and computer readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination