JPWO2020217157A5 - - Google Patents

Download PDF

Info

Publication number
JPWO2020217157A5
JPWO2020217157A5 JP2021563158A JP2021563158A JPWO2020217157A5 JP WO2020217157 A5 JPWO2020217157 A5 JP WO2020217157A5 JP 2021563158 A JP2021563158 A JP 2021563158A JP 2021563158 A JP2021563158 A JP 2021563158A JP WO2020217157 A5 JPWO2020217157 A5 JP WO2020217157A5
Authority
JP
Japan
Prior art keywords
debug
premises server
server
component
request
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
JP2021563158A
Other languages
Japanese (ja)
Other versions
JP2022530440A (en
Publication date
Priority claimed from GBGB1905835.3A external-priority patent/GB201905835D0/en
Application filed filed Critical
Publication of JP2022530440A publication Critical patent/JP2022530440A/en
Publication of JPWO2020217157A5 publication Critical patent/JPWO2020217157A5/ja
Pending legal-status Critical Current

Links

Claims (18)

オフプレミス・サーバとオンプレミス・サーバとの間のデバッグを管理するように構成された接続コンポーネントであって、
オンプレミス・サーバからデバッグ要求を受信するように構成された第1の通信コンポーネントと、
受信したデバッグ・ポート要求に基づいて、オフプレミス・サーバのデバッグ・ポートを特定するように構成されたルーティング・コンポーネントと、
前記オフプレミス・サーバの前記特定されたデバッグ・ポートに前記デバッグ要求を伝達するように構成された第2の通信コンポーネント含む、接続コンポーネント。
A connectivity component configured to manage debugging between an off-premises server and an on-premises server, comprising:
a first communication component configured to receive a debug request from an on-premises server;
a routing component configured to identify the debug port of the off-premises server based on the received debug port request;
A connectivity component including a second communication component configured to communicate the debug request to the identified debug port of the off-premises server.
前記第1の通信コンポーネントが、前記デバッグ要求を受信するためのセキュア・トンネルを確立するように構成され、前記第2の通信コンポーネントが、前記デバッグ要求を伝達するためのセキュア・トンネルを確立するように構成されている、請求項1に記載の接続コンポーネント。 The first communication component is configured to establish a secure tunnel for receiving the debug request, and the second communication component is configured to establish a secure tunnel for communicating the debug request. 2. The connection component of claim 1, wherein the connection component is configured to: 前記オフプレミス・サーバがクラウド・サーバを含み、前記デバッグ要求が前記オンプレミス・サーバのデバッグ・サービスによって提供される、請求項1に記載の接続コンポーネント。 The connectivity component of claim 1, wherein the off-premises server comprises a cloud server and the debug request is provided by a debug service of the on-premises server. 前記デバッグ要求が、アプリケーション名、サーバID、サーバ・アドレス、アプリケーション・バージョン識別子、許可情報、エントリ・ポイント・データ、およびチェックサム情報のうちの少なくとも1つを含む、請求項1に記載の接続コンポーネント。 The connectivity component of claim 1, wherein the debug request includes at least one of application name, server ID, server address, application version identifier, authorization information, entry point data, and checksum information. . オフプレミス・サーバのアプリケーション、オンプレミス・サーバのアプリケーション、オフプレミス・サーバ・モジュール、およびオンプレミス・サーバ・モジュールのうちの少なくとも1つからデバッグ・ポート・データを受信するように構成された登録モジュール(175)をさらに含み、前記登録モジュールが、受信したデバッグ・ポート・データをデータ・ストアに格納するように構成されている、請求項1に記載の接続コンポーネント。 a registration module (175) configured to receive debug port data from at least one of an off-premises server application, an on-premises server application, an off-premises server module, and an on-premises server module; 2. The connectivity component of claim 1, further comprising: the registration module configured to store received debug port data in a data store. 前記登録モジュールが、アプリケーション、サーバ、およびデバッグ・ポートのうちの少なくとも1つがアクセス不能になることに応答して、前記データ・ストアからデバッグ・ポート・データを除去するように構成されている、請求項5に記載の接続コンポーネント。 wherein the registration module is configured to remove debug port data from the data store in response to at least one of an application, server, and debug port becoming inaccessible. 6. A connection component according to clause 5. 前記第2の通信コンポーネントが、前記オフプレミス・サーバからの前記デバッグ要求に対する応答を受信するように構成され、前記第1の通信コンポーネントが、前記受信した応答を前記オンプレミス・サーバに伝達するように構成されている、請求項1に記載の接続コンポーネント。 The second communication component is configured to receive a response to the debug request from the off-premises server, and the first communication component is configured to communicate the received response to the on-premises server. 2. The connection component of claim 1, wherein the connection component is a. 請求項1に記載の接続コンポーネントを含むスイッチ・モジュール。 A switch module comprising a connection component according to claim 1. 請求項8に記載のスイッチ・モジュールを含むサーバ・デバイス(76)。 A server device (76) comprising the switch module of claim 8. コンピュータの情報処理により、オフプレミス・サーバとオンプレミス・サーバとの間のデバッグを管理する方法であって、
接続コンポーネントの第1の通信コンポーネントを介して、オンプレミス・サーバからデバッグ要求を受信することと、
受信したデバッグ・ポート要求に基づいて、オフプレミス・サーバのデバッグ・ポートを前記接続コンポーネントにおいて特定することと、
前記接続コンポーネントの第2の通信コンポーネントを介して、前記オフプレミス・サーバの前記特定されたデバッグ・ポートに前記デバッグ要求を伝達することを含む方法。
A method of managing debugging between an off-premises server and an on-premises server through computer information processing, comprising:
receiving a debug request from the on-premises server via the first communication component of the connectivity component;
identifying at the connectivity component a debug port of an off-premises server based on the received debug port request;
communicating the debug request to the identified debug port of the off-premises server via a second communication component of the connectivity component.
オンプレミス・サーバからデバッグ要求を受信することが、前記デバッグ要求を受信するためのセキュア・トンネルを確立することを含み、
前記オフプレミス・サーバの前記特定されたデバッグ・ポートに前記デバッグ要求を伝達することが、前記デバッグ要求を伝達するためのセキュア・トンネルを確立することを含む、請求項10に記載の方法。
receiving a debug request from an on-premises server includes establishing a secure tunnel for receiving said debug request;
11. The method of claim 10, wherein communicating the debug request to the identified debug port of the off-premises server comprises establishing a secure tunnel for communicating the debug request.
オフプレミス・サーバのアプリケーション、オンプレミス・サーバのアプリケーション、オフプレミス・サーバ・モジュール、およびオンプレミス・サーバ・モジュールのうちの少なくとも1つからデバッグ・ポート・データを受信することと、
受信したデバッグ・ポート・データをデータ・ストアに格納することをさらに含む、請求項10に記載の方法。
receiving debug port data from at least one of an off-premises server application, an on-premises server application, an off-premises server module, and an on-premises server module;
11. The method of claim 10, further comprising storing received debug port data in a data store.
アプリケーション、サーバ、およびデバッグ・ポートのうちの少なくとも1つがアクセス不能になることに応答して、前記データ・ストアからデバッグ・ポート・データを除去することをさらに含む、請求項12に記載の方法。 13. The method of claim 12, further comprising removing debug port data from the data store in response to at least one of an application, server, and debug port becoming inaccessible. 前記接続コンポーネントの前記第2の通信コンポーネントを介して、前記オフプレミス・サーバからの前記デバッグ要求に対する応答を受信することと、
前記接続コンポーネントの前記第1の通信コンポーネントを介して、前記受信した応答を前記オンプレミス・サーバに伝達することさらに含む、請求項10に記載の方法。
receiving a response to the debug request from the off-premises server via the second communication component of the connectivity component;
11. The method of claim 10 , further comprising communicating the received response to the on-premises server via the first communication component of the connectivity component.
請求項10~14の何れか1項に記載の方法を、コンピュータに実行させる、コンピュータ・プログラム A computer program causing a computer to execute the method according to any one of claims 10-14 . 請求項15に記載の前記コンピュータ・プログラムを、コンピュータ可読記憶媒体に記録した、記憶媒体 16. A storage medium having recorded thereon the computer program according to claim 15 on a computer-readable storage medium . 請求項10~14の何れか1項に記載の方法の各ステップを、コンピュータ・ハードウェアによる手段として構成した、処理システム A processing system, wherein each step of the method according to any one of claims 10 to 14 is arranged as means by means of computer hardware . オンサイト・サーバとオフサイト・サーバとの間のスイッチング・コンポーネントとして機能するように構成されている、請求項17に記載の処理システム 18. The processing system of claim 17, configured to act as a switching component between an onsite server and an offsite server .
JP2021563158A 2019-04-26 2020-04-20 Debugging on-premises and off-premises Pending JP2022530440A (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
GB1905835.3 2019-04-26
GBGB1905835.3A GB201905835D0 (en) 2019-04-26 2019-04-26 On-premise and off-premise debugging
PCT/IB2020/053722 WO2020217157A1 (en) 2019-04-26 2020-04-20 On-premise and off-premise debugging

Publications (2)

Publication Number Publication Date
JP2022530440A JP2022530440A (en) 2022-06-29
JPWO2020217157A5 true JPWO2020217157A5 (en) 2022-08-29

Family

ID=66809224

Family Applications (1)

Application Number Title Priority Date Filing Date
JP2021563158A Pending JP2022530440A (en) 2019-04-26 2020-04-20 Debugging on-premises and off-premises

Country Status (6)

Country Link
US (1) US20200344112A1 (en)
JP (1) JP2022530440A (en)
CN (1) CN113574845A (en)
DE (1) DE112020000535B4 (en)
GB (2) GB201905835D0 (en)
WO (1) WO2020217157A1 (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114205342B (en) * 2021-12-10 2023-05-16 易保网络技术(上海)有限公司 Service debugging routing method, electronic equipment and medium
US20230229816A1 (en) * 2022-01-19 2023-07-20 Dell Products L.P. Enabling Secure Debug Logging
CN114827258B (en) * 2022-03-01 2024-03-22 网易(杭州)网络有限公司 Management control method and device of server and electronic equipment
US11943115B2 (en) * 2022-04-05 2024-03-26 International Business Machines Corporation Locally debugging remote deployment of microservices
CN114884750B (en) * 2022-07-07 2022-10-21 杭州筋斗腾云科技有限公司 Access processing method, access processing system and computer system

Family Cites Families (46)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7200666B1 (en) * 2000-07-07 2007-04-03 International Business Machines Corporation Live connection enhancement for data source interface
AU2001292672A1 (en) * 2000-09-15 2002-03-26 Wind River Systems, Inc. System and method for communicating software debug, diagnostic and maintenance information between devices
US7823131B2 (en) * 2001-06-29 2010-10-26 Mentor Graphics Corporation Debugger for a hardware-implemented operating system
US7099818B1 (en) * 2002-03-29 2006-08-29 Cypress Semiconductor Corporation System and method for automatically matching components in a debugging system
US7748033B2 (en) * 2005-02-25 2010-06-29 Microsoft Corporation Windows remote debugger service
US8146056B1 (en) * 2005-08-04 2012-03-27 American Megatrends, Inc. Debugging a computer program by interrupting program execution in response to access of unused I/O port
US20070055957A1 (en) * 2005-09-07 2007-03-08 Richard Birenheide Remote debugging proxy
US7665002B1 (en) * 2005-12-14 2010-02-16 Advanced Micro Devices, Inc. Multi-core integrated circuit with shared debug port
US7770073B2 (en) * 2007-07-27 2010-08-03 International Business Machines Corporation Apparatus, system, and method for responsive acquisition of remote debug data
US8336029B1 (en) * 2007-11-08 2012-12-18 Google Inc. Debugger connection
US20090254886A1 (en) * 2008-04-03 2009-10-08 Elliot Gibson D Virtual debug port in single-chip computer system
US9246703B2 (en) * 2010-06-08 2016-01-26 Brocade Communications Systems, Inc. Remote port mirroring
US8589885B2 (en) * 2010-09-30 2013-11-19 Microsoft Corporation Debugger launch and attach on compute clusters
JP2012079130A (en) * 2010-10-01 2012-04-19 Fujitsu Ltd Debug support program, debug support device and debug support method
US20120084758A1 (en) * 2010-10-05 2012-04-05 International Business Machines Corporation Collaborative Software Debugging In A Distributed System With Client-Specific Variable Evaluation
JP2013045277A (en) 2011-08-24 2013-03-04 Hitachi Solutions Ltd Program obfuscation method and remote debug system
JP5672199B2 (en) * 2011-09-01 2015-02-18 富士通株式会社 Information processing apparatus, information processing method, and information processing program
US8826079B2 (en) * 2011-12-16 2014-09-02 Arm Limited Data processing apparatus and method for identifying debug events
CN103856361B (en) 2012-11-29 2017-10-10 腾讯科技(深圳)有限公司 Realize the method and system of remote debugging
CN103973741B (en) * 2013-01-31 2018-02-09 国际商业机器公司 Method and apparatus for carrying out remote debugging in cloud system
US9094336B2 (en) * 2013-03-15 2015-07-28 Ixia Methods, systems, and computer readable media for assisting with the debugging of conditions associated with the processing of test packets by a device under test
US9154409B2 (en) * 2013-05-29 2015-10-06 Avaya Inc. Method for debugging private VLAN
US9552279B2 (en) * 2013-08-16 2017-01-24 Nxp Usa, Inc. Data bus network interface module and method therefor
US9384106B2 (en) * 2014-02-21 2016-07-05 Rolf Segger Real time terminal for debugging embedded computing systems
US10476698B2 (en) * 2014-03-20 2019-11-12 Avago Technologies International Sales Pte. Limited Redundent virtual link aggregation group
US9870301B2 (en) * 2014-03-31 2018-01-16 Intel Corporation High-speed debug port using standard platform connectivity
US9384109B2 (en) * 2014-04-17 2016-07-05 Texas Instruments Deutschland Gmbh Processor with debug pipeline
CN105450463B (en) 2014-08-26 2019-10-18 阿里巴巴集团控股有限公司 Adjustment method, the device and system of hardware device
US9606175B2 (en) * 2014-12-26 2017-03-28 Intel Corporation Reprogramming a port controller via its own external port
CA2931906C (en) * 2015-06-03 2023-09-05 Evertz Microsystems Ltd. Systems and methods for determining a destination location in a network system
US10296440B2 (en) * 2015-06-24 2019-05-21 Salesforce.Com, Inc. Multi-tenant aware debugging methods and systems
US9766963B2 (en) * 2015-09-23 2017-09-19 Intel Corporation Secure tunneling access to debug test ports on non-volatile memory storage units
US9998371B2 (en) * 2015-12-16 2018-06-12 Nicira, Inc. Packet communication between container data compute nodes and a managed forwarding element
CN105703947A (en) * 2016-01-18 2016-06-22 深圳创维数字技术有限公司 Method for remotely debugging router, server, and router
US20170262355A1 (en) * 2016-03-08 2017-09-14 International Business Machines Corporation Debugging applications
US10594770B2 (en) * 2016-11-01 2020-03-17 International Business Machines Corporation On-premises and off-premises communication
US10447811B2 (en) * 2017-07-18 2019-10-15 Citrix Systems, Inc. Cloud to on-premises debug service routing
US10511575B2 (en) * 2017-09-18 2019-12-17 Huawei Technologies Co., Ltd. Securing delegated credentials in third-party networks
CN107800791B (en) * 2017-10-24 2021-08-17 海信集团有限公司 Debugging method and device
US10761968B2 (en) * 2018-05-16 2020-09-01 Texas Instruments Incorporated Managing and maintaining multiple debug contexts in a debug execution mode for real-time processors
US10754760B1 (en) * 2018-05-17 2020-08-25 Xilinx, Inc. Detection of runtime failures in a system on chip using debug circuitry
TWI700581B (en) * 2018-08-22 2020-08-01 神雲科技股份有限公司 Server and error detecting method thereof
US10896119B1 (en) * 2018-11-05 2021-01-19 Xilinx, Inc. Common input/output interface for application and debug circuitry
GB2582790B (en) * 2019-04-03 2021-03-31 Graphcore Ltd Debugging mechanism
US11085964B2 (en) * 2019-05-03 2021-08-10 Intel Corporation Systems and methods for intellectual property-secured, remote debugging
US11599675B2 (en) * 2020-09-30 2023-03-07 Mcafee, Llc Detecting data leakage to websites accessed using a remote browsing infrastructure

Similar Documents

Publication Publication Date Title
US9313088B2 (en) Network system and network managing method
US11398966B2 (en) Cluster wide packet tracing
US8549286B2 (en) Method and system for forwarding data between private networks
US11075980B2 (en) Method for operating a node cluster system in a network and node cluster system
WO2021088254A1 (en) Dual-stack access method, apparatus and device for user-mode network file system
US7962564B2 (en) Discovery of a virtual topology in a multi-tasking multi-processor environment
GB2597867A (en) On-premise and off-premise debugging
CN106452873B (en) Control method, control device and processor in software defined network
US10009349B2 (en) License management system
CN106657434B (en) method and device for checking IP address
US20200186447A1 (en) Packet monitoring
CN112187934A (en) Micro-service building method
WO2016095644A1 (en) High availability solution method and device for database
JPWO2020217157A5 (en)
US10402282B1 (en) Assisted device recovery
CN111600833B (en) Network operating system and message forwarding method
WO2020187295A1 (en) Monitoring of abnormal host
CN109618015B (en) Data center-based de-stacking implementation method and device
CN111030914A (en) Data transmission method and data transmission system
CN114157639B (en) Method, device and equipment for collecting information of intelligent network card of server and readable medium
JP7103231B2 (en) Connection management unit and connection management method
CN107483520B (en) Method and device for processing network attached storage instance
US20240137315A1 (en) Metadata enhancement for packet capture using vxlan encapsulation
US12010006B2 (en) Packet capture using VXLAN encapsulation
WO2024045092A1 (en) Method and apparatus for determining unique identifier of device, and electronic device