WO2021057855A1 - 程序进程监控的方法、装置、计算机设备及可读存储介质 - Google Patents
程序进程监控的方法、装置、计算机设备及可读存储介质 Download PDFInfo
- Publication number
- WO2021057855A1 WO2021057855A1 PCT/CN2020/117490 CN2020117490W WO2021057855A1 WO 2021057855 A1 WO2021057855 A1 WO 2021057855A1 CN 2020117490 W CN2020117490 W CN 2020117490W WO 2021057855 A1 WO2021057855 A1 WO 2021057855A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- file
- monitored process
- monitored
- log
- name
- Prior art date
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/0703—Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation
- G06F11/0766—Error or fault reporting or storing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/0703—Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation
- G06F11/079—Root cause analysis, i.e. error or fault diagnosis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/14—Error detection or correction of the data by redundancy in operation
- G06F11/1402—Saving, restoring, recovering or retrying
- G06F11/1446—Point-in-time backing up or restoration of persistent data
- G06F11/1458—Management of the backup or restore process
- G06F11/1469—Backup restoration techniques
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/30—Monitoring
- G06F11/3003—Monitoring arrangements specially adapted to the computing system or computing system component being monitored
- G06F11/302—Monitoring arrangements specially adapted to the computing system or computing system component being monitored where the computing system component is a software system
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/30—Monitoring
- G06F11/3051—Monitoring arrangements for monitoring the configuration of the computing system or of the computing system component, e.g. monitoring the presence of processing resources, peripherals, I/O links, software programs
Definitions
- This application relates to the field of communication technology, and in particular to a method, device, computer equipment, and readable storage medium for program process monitoring.
- a process is a running activity of a program on a certain data set in a computer. It is the basic unit of the system for resource allocation and scheduling, and is the foundation of the operating system structure.
- application programs are processes stored in the operating system.
- some monitoring and management methods need to be added.
- how to effectively and timely monitor the process of application programs in the operating system So as to prevent the abnormal exit of the application program and prevent the application program from entering an endless loop, it needs to be solved urgently.
- a method for program progress monitoring includes:
- the monitored process According to the name and parameter information of the monitored process, start the monitored process, and create a log file to save the log information output by the monitored process according to the name and current time of the monitored process;
- the method includes:
- the modification status is that the first file is modified normally, re-check the first file in the configuration file, and back up the re-verified first file to the backup partition;
- the modification status is that the first file is abnormally modified
- the first file is overwritten with the first backup file of the backup partition.
- the recovery operation of the application or device of the monitored process according to the log file includes:
- the verification of the first file in the configuration file corresponding to the monitored process according to the name of the monitored process includes:
- a message digest algorithm 5 (Message-Digest Algorithm, referred to as MD5) verification check is performed on the first file in the configuration file corresponding to the monitored process.
- the initiating the monitored process includes:
- a device for program progress monitoring includes:
- the verification module is used to read the configuration file monitored by the program, obtain the name and parameter information of the monitored process, and compare the first in the configuration file corresponding to the monitored process according to the name of the monitored process. The file is checked to determine whether the first file has been illegally modified;
- a data backup and recovery module configured to overwrite the first file with the first backup file of the backup partition when it is determined that the first file is illegally modified
- the creation module is configured to start the monitored process according to the name and parameter information of the monitored process, and create a log file to save the log information output by the monitored process according to the name and current time of the monitored process;
- the recovery module is used to obtain the log file of the exit of the monitored process, and perform a recovery operation on the application or device of the monitored process according to the log file of the exit of the monitored process, wherein the error of the monitored process Or abnormal information causes the monitored process to exit.
- the device further includes:
- the data backup module is used to monitor the modification status of the first file in the configuration file corresponding to the monitored process after the creation of the log file saves the log information output by the monitored process, and in the modification status When the first file is modified normally, the first file in the configuration file is re-checked, and the re-verified first file is backed up to the backup partition; in the modification status When the first file is modified abnormally, the first file is overwritten with the first backup file of the backup partition.
- the recovery module includes:
- the shutdown restart unit is configured to shut down the application program corresponding to the monitored process, and restart the device corresponding to the monitored process according to the log file.
- a computer device including a memory, a processor, and a computer program stored in the memory and capable of running on the processor.
- the processor implements the above program when the computer program is executed. The steps of the process monitoring method.
- a computer-readable storage medium on which a computer program is stored, and when the computer program is executed by a processor, the steps of the above-mentioned program process monitoring method are realized.
- Fig. 1 is a schematic diagram of an application environment of a method for program progress monitoring according to an embodiment of the present application.
- Fig. 2 is a flowchart of a method for program progress monitoring according to an embodiment of the present application.
- Fig. 3 is a first structural block diagram of a device for monitoring program progress according to an embodiment of the present application.
- Fig. 4 is a second structural block diagram of a device for program progress monitoring according to an embodiment of the present application.
- Fig. 5 is a third structural block diagram of a device for program progress monitoring according to an embodiment of the present application.
- Fig. 6 is a flowchart of a method for monitoring program progress based on an embedded Linux system according to an embodiment of the present application.
- first and second are only used for descriptive purposes, and cannot be understood as indicating or implying relative importance or implicitly indicating the number of indicated technical features. Therefore, the features defined with “first” and “second” may explicitly or implicitly include at least one of the features.
- a plurality of means at least two, such as two, three, etc., unless specifically defined otherwise.
- everal means at least one, such as one, two, etc., unless otherwise specifically defined.
- FIG. 1 is a schematic diagram of an application environment of a method for program process monitoring in an embodiment of the present application. As shown in FIG. 1, it can be applied to the method for program process monitoring.
- the terminal 101 communicates with the server 102 through the network.
- the terminal 101 can be, but is not limited to, various personal computers, notebook computers, smart phones, tablet computers, and portable wearable devices.
- the server 102 can be embedded It can be realized by a device server, an independent server, or a server cluster composed of multiple servers.
- the operating systems installed on the terminal 101 and the server 102 include: embedded Linux system, Unix system, Windows system, Android system and Ios system, etc.
- the operating systems of the terminal 101 and server 102 can read the configuration file of the monitoring program, according to the receiving The name of the monitoring process, the first file in the configuration file corresponding to the monitored process is checked, and if the first file is determined to be illegally modified, the first backup file of the backup partition is used to overwrite the first file.
- a file; according to the name of the monitored process and the current time, create a log file to save the log information output by the monitored process; restore the application or device of the monitored process according to the log file, and solve the problem of the application The question of how to effectively and timely monitor the processes in the operating system ensures the stable and orderly operation of the application program.
- FIG. 2 is a flowchart of a method for monitoring program progress according to an embodiment of the present application. As shown in FIG. 2, the method includes the following steps:
- Step S201 Read the configuration file monitored by the program, obtain the name and parameter information of the monitored process, and verify the first file in the configuration file corresponding to the monitored process according to the name of the monitored process. Determine whether the first file has been illegally modified;
- Step S202 In the case where it is determined that the first file is illegally modified, overwrite the first file with the first backup file of the backup partition;
- the embedded device causes important file damage or artificially modify the file illegally in the case of a sudden power failure, the first file can be illegally modified;
- Step S203 Start the monitored process according to the name and parameter information of the monitored process, and create a log file to save the log information output by the monitored process according to the name and current time of the monitored process;
- Step S204 Obtain the log file of the monitored process exit, and perform a recovery operation on the application or device of the monitored process according to the log file of the monitored process exit, wherein the error or abnormal information of the monitored process causes The monitored process exits.
- the monitored process is verified according to the configuration file, and the startup of the monitored process is determined.
- the log information of the monitored process is saved by creating a log file.
- the monitored application or device is restored through the log file, which solves the problem of how to effectively monitor the process of the application in the operating system in a timely manner, and ensures the stable and orderly operation of the application.
- the monitoring program has checked the configuration file before starting the monitored process.
- the first file has been overwritten with the first backup file.
- no illegal modification after starting the monitored process, it is necessary to monitor whether the first file in the monitored process has been modified in real time. After receiving the modification command or modification notification, the first file has been modified normally.
- the monitoring program re-checks the first file in the configuration file, and backs up the re-verified first file to the backup partition.
- the monitoring program before starting the monitored process, the monitoring program The configuration file has been verified. In the case of illegal modification, the first file has been overwritten with the first backup file.
- the first backup file in the monitored process After starting the monitored process, it is necessary to monitor in real time whether the first backup file in the monitored process has been Modification: After not receiving a modification command or modification notice, it is determined that the first backup file has been illegally modified, and the first backup file in the backup partition is used to overwrite the illegally modified first backup file. Before the monitoring process runs and during the monitoring process, it monitors whether the configuration file is modified, and monitors whether the configuration file of the application program has been illegally tampered with in real time.
- the way of restoring the application or device of the monitored process will be different, for example, the monitored process exits
- the reason is only related to the application.
- the recovery operation only needs to restart the application according to the log file records to solve the program failure.
- the reason for the exit of the monitored process may be caused by the hardware information of the device, for example, the memory Cache error conditions, or it is impossible to determine whether it is an application problem or a device hardware problem, or an application or device is in an infinite loop.
- the record of the above log file can also be provided to maintenance personnel.
- the above implementation method can automatically start the application or device when the monitored process exits during the monitoring process, ensuring that The stability of the application program, in addition, through the analysis of the exit reason of the monitored process recorded in the log file, it provides a reference for subsequent application program modification.
- the first file in the configuration file corresponding to the monitored process can be verified according to the name of the monitored process in multiple ways, for example, according to the monitored process Name, the information digest algorithm 5 (MD5) check is performed on the first file in the configuration file corresponding to the monitored process, and the MD5 operation is performed on the first file of the configuration file, and the calculated result is the same as the pre-stored first file.
- the check codes of the files are compared. If they are the same, the first file has not been modified. Otherwise, it is considered that the first file has been modified and the first file needs to be overwritten with the first backup file.
- the verification method can also include information digest algorithm 2 (Message-Digest Algorithm 2, abbreviated as MD2) and Message-Digest Algorithm 4 (Message-Digest Algorithm 4, abbreviated as MD4), etc.
- MD2 Message-Digest Algorithm 2, abbreviated as MD2
- MD4 Message-Digest Algorithm 4, abbreviated as MD4
- the way to start the monitored process can be to start the monitored process by means of pipes, and can also use named pipes (First Input First Output, FIFO for short) and signal pipes ( Signal) and other methods to start the monitored process.
- pipes First Input First Output, FIFO for short
- signal pipes Signal
- a device for monitoring program progress is also provided, which is used to implement the above-mentioned embodiments and preferred implementations, and what has been described will not be repeated.
- the term "module” can implement a combination of software and/or hardware with predetermined functions.
- the devices described in the following embodiments are preferably implemented by software, implementation by hardware or a combination of software and hardware is also possible and conceived.
- FIG. 3 is a structural block diagram 1 of a device for monitoring program progress according to an embodiment of the present application. As shown in FIG. 3, the device includes:
- the verification module 31 is used to read the configuration file monitored by the program, obtain the name and parameter information of the monitored process, and perform processing on the first file in the configuration file corresponding to the monitored process according to the name of the monitored process Check to determine whether the first file has been illegally modified;
- the data backup and recovery module 32 is configured to overwrite the first file with the first backup file of the backup partition when it is determined that the first file is illegally modified;
- the creation module 33 is used to start the monitored process according to the name and parameter information of the monitored process, and create a log file to save the log information output by the monitored process according to the name and current time of the monitored process;
- the recovery module 34 is used to obtain the log file of the exit of the monitored process, and perform a recovery operation on the application or device of the monitored process according to the log file of the exit of the monitored process.
- the abnormal information caused the monitored process to exit.
- the verification module 31 and the data backup and recovery module 32 verify the monitored process according to the configuration file, and the creation module 33 determines the startup of the monitored process. After startup, it saves the monitored process by creating a log file. Log information.
- the recovery module 34 restores the monitored application or device through the log file, which solves how to effectively monitor the process of the application in the operating system in a timely manner The problem, to ensure the stable and orderly operation of the application.
- FIG. 4 is a second structural block diagram of a device for monitoring program progress according to an embodiment of the present application. As shown in FIG. 4, the device includes:
- the data backup module 42 is configured to monitor the modification status of the first file in the configuration file corresponding to the monitored process after the creation of the log file and save the log information output by the monitored process, where the modification status is the first When the file is modified normally, re-check the first file in the configuration file, and back up the re-verified first file to the backup partition; in the modification status, the first file is not In the case of normal modification, the first file is overwritten with the first backup file of the backup partition, and the first backup file is copied to the configuration file partition to ensure that the monitored program obtains the correct configuration information.
- FIG. 5 is a structural block diagram 3 of a device for monitoring program progress according to an embodiment of the present application. As shown in FIG. 5, the device includes:
- the recovery module 38 includes a shutdown and restart unit 52 configured to shut down the application program corresponding to the monitored process, and restart the device corresponding to the monitored process according to the log file.
- the method of monitoring the program process based on the embedded Linux system includes: process monitoring, configuration file modification monitoring, backup and device restart, etc.
- Figure 6 is based on the embodiment of the present application Based on the flow chart of the method for monitoring the program process based on the embedded Linux system, as shown in Figure 6, the method steps include:
- Step S601 Read the configuration file of the monitoring program, and obtain the name of the process to be monitored and related parameters;
- Step S602 After obtaining the name of the monitored process, MD5 check is performed on the related files of the configuration folder of the corresponding process to determine whether the file has been illegally modified;
- Step S603 If there are files in the configuration folder of the monitored process that are illegally modified, which may cause the process to fail to start normally, the latest backup from the backup partition will overwrite the current related files;
- Step S604 According to the acquisition of the required monitored process name and related parameters, start the corresponding monitored process through the pipe method;
- Step S605 According to the requirement of whether the monitored process outputs log information (log file information), create a log file with the current system time and process name in the corresponding log folder to save the output log information of the monitored process;
- Step S606 Whether the configuration file corresponding to the monitored process is modified by the monitoring program in real time. If the file is modified, the file needs to be re-verified and the new file is backed up to the backup partition;
- Step S607 During the running process of the monitored process, an error or abnormality of one or several processes causes the process to exit, the system will send an exit message to the monitoring program, so that the monitoring program records the status of the relevant process to the local log file and closes After the relevant application, restart the device.
- the monitoring program of the Linux system completes the functions of program process monitoring, configuration file modification monitoring backup and device restart, which solves the problem of how to effectively and timely monitor the process of the application in the Linux system, and ensures the application Stable and orderly operation.
- a software is also provided, and the software is used to execute the technical solutions described in the above-mentioned embodiments and preferred embodiments.
- a storage medium stores the above-mentioned software.
- the storage medium includes, but is not limited to, an optical disk, a floppy disk, a hard disk, and a rewritable memory.
- Non-volatile memory may include read only memory (ROM), programmable ROM (PROM), electrically programmable ROM (EPROM), electrically erasable programmable ROM (EEPROM), or flash memory.
- Volatile memory may include random access memory (RAM) or external cache memory.
- RAM is available in many forms, such as static RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), double data rate SDRAM (DDRSDRAM), enhanced SDRAM (ESDRAM), synchronous chain Channel (Synchlink) DRAM (SLDRAM), memory bus (Rambus) direct RAM (RDRAM), direct memory bus dynamic RAM (DRDRAM), and memory bus dynamic RAM (RDRAM), etc.
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- Quality & Reliability (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Computing Systems (AREA)
- Health & Medical Sciences (AREA)
- Biomedical Technology (AREA)
- Mathematical Physics (AREA)
- Debugging And Monitoring (AREA)
Abstract
Description
本申请要求2019年9月26日申请的,申请号为201910918237.0,发明名称为“程序进程监控的方法、装置、计算机设备及可读存储介质”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
Claims (10)
- 一种程序进程监控的方法,其特征在于,所述方法包括:读取程序监控的配置文件,获取受监控进程的名称和参数信息,依据所述受监控进程的名称,对与所述受监控进程对应的所述配置文件中的第一文件进行校验核对,判断所述第一文件是否被非法修改;在确定所述第一文件被非法修改的情况下,用备份分区的第一备份文件覆盖所述第一文件;根据所述受监控进程的名称和参数信息,启动所述受监控进程,依据所述受监控进程的名称和当前时间,创建日志文件保存所述受监控进程输出的日志信息;获取所述受监控进程退出的日志文件,依据所述受监控进程退出的日志文件对所述受监控进程的应用程序或者设备进行恢复操作,其中,所述受监控进程的错误或异常信息引起所述受监控进程退出。
- 根据权利要求1所述方法,其特征在于,所述创建日志文件保存所述受监控进程输出的日志信息之后,所述方法包括:监控与所述受监控进程对应的所述配置文件中的第一文件的修改状况;在所述修改状况为所述第一文件被正常修改的情况下,重新对所述配置文件中的第一文件进行校验核对,将重新校验后的第一文件备份到所述备份分区;在所述修改状况为所述第一文件被非正常修改的情况下,用备份分区的第一备份文件覆盖所述第一文件。
- 根据权利要求1所述方法,其特征在于,所述依据所述日志文件对所述受监控进程的应用程序或者设备进行恢复操作包括:关闭与所述受监控进程对应的应用程序,根据所述日志文件重启与所述受监控进程对应的设备。
- 根据权利要求1至3任一项所述方法,其特征在于,所述依据所述受监控进程的名称,对与所述受监控进程对应的所述配置文件中的第一文件进行校验核对包括:依据所述受监控进程的名称,对与所述受监控进程对应的所述配置文件中的第一文件进行信息摘要算法5校验核对。
- 根据权利要求1至3任一项所述方法,其特征在于,所述启动所述受监控进程包括:通过pipe管道的方式启动所述受监控进程。
- 一种程序进程监控的装置,其特征在于,所述装置包括:校验模块,用于读取程序监控的配置文件,获取受监控进程的名称和参数信息,依据所 述受监控进程的名称,对与受所述受监控进程对应的所述配置文件中的第一文件进行校验核对,判断所述第一文件是否被非法修改;数据备份恢复模块,用于在确定所述第一文件被非法修改的情况下,用备份分区的第一备份文件覆盖所述第一文件;创建模块,用于根据所述受监控进程的名称和参数信息,启动所述受监控进程,依据所述受监控进程的名称和当前时间,创建日志文件保存所述受监控进程输出的日志信息;恢复模块,用于获取所述受监控进程退出的日志文件,依据所述受监控进程退出的日志文件对所述受监控进程的应用程序或者设备进行恢复操作,其中,所述受监控进程的错误或异常信息引起所述受监控进程退出。
- 根据权利要求6所述装置,其特征在于,所述装置还包括:数据备份模块,还用于所述创建日志文件保存所述受监控进程输出的日志信息之后,监控与所述受监控进程对应的所述配置文件中的第一文件的修改状况,在所述修改状况为所述第一文件被正常修改的情况下,重新对所述配置文件中的第一文件进行校验核对,将重新校验后的第一文件备份到所述备份分区;在所述修改状况为所述第一文件被非正常修改的情况下,用备份分区的第一备份文件覆盖所述第一文件。
- 根据权利要求6所述装置,其特征在于,所述恢复模块包括:关闭重启单元,用于关闭与所述受监控进程对应的应用程序,根据所述日志文件重启与所述受监控进程对应的设备。
- 一种计算机设备,包括存储器、处理器及存储在存储器上并可在处理器上运行的计算机程序,其特征在于,所述处理器执行所述计算机程序时实现权利要求1至5中任一项所述方法的步骤。
- 一种计算机可读存储介质,其上存储有计算机程序,其特征在于,所述计算机程序被处理器执行时实现权利要求1至5中任一项所述的方法的步骤。
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910918237.0 | 2019-09-26 | ||
CN201910918237.0A CN110851300A (zh) | 2019-09-26 | 2019-09-26 | 程序进程监控的方法、装置、计算机设备及可读存储介质 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2021057855A1 true WO2021057855A1 (zh) | 2021-04-01 |
Family
ID=69596005
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2020/117490 WO2021057855A1 (zh) | 2019-09-26 | 2020-09-24 | 程序进程监控的方法、装置、计算机设备及可读存储介质 |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN110851300A (zh) |
WO (1) | WO2021057855A1 (zh) |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110851300A (zh) * | 2019-09-26 | 2020-02-28 | 三维通信股份有限公司 | 程序进程监控的方法、装置、计算机设备及可读存储介质 |
CN114356855A (zh) * | 2021-12-06 | 2022-04-15 | 深圳市亚略特科技股份有限公司 | 文件管理方法、装置、电子装置及可读存储介质 |
CN117194110A (zh) * | 2023-09-20 | 2023-12-08 | 通号通信信息集团上海有限公司 | 一种数据异构存储系统及异常数据自恢复方法 |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102622290A (zh) * | 2012-03-07 | 2012-08-01 | 苏州阔地网络科技有限公司 | 一种进程监控的方法及系统 |
US20120210198A1 (en) * | 2011-02-16 | 2012-08-16 | Invensys Systems Inc. | System and Method for Fault Tolerant Computing Using Generic Hardware |
CN104932965A (zh) * | 2014-03-18 | 2015-09-23 | 北京奇虎科技有限公司 | 对象实时监控方法和装置 |
CN105045708A (zh) * | 2015-09-02 | 2015-11-11 | 上海斐讯数据通信技术有限公司 | 软件运行错误处理方法及系统 |
CN107423620A (zh) * | 2017-03-12 | 2017-12-01 | 郑州云海信息技术有限公司 | 存储服务器服务进程的管理方法及装置 |
CN110851300A (zh) * | 2019-09-26 | 2020-02-28 | 三维通信股份有限公司 | 程序进程监控的方法、装置、计算机设备及可读存储介质 |
Family Cites Families (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7114097B2 (en) * | 2003-12-19 | 2006-09-26 | Lenovo (Singapore) Pte. Ltd. | Autonomic method to resume multi-threaded preload imaging process |
US20070256082A1 (en) * | 2006-05-01 | 2007-11-01 | International Business Machines Corporation | Monitoring and controlling applications executing in a computing node |
CN101231682B (zh) * | 2007-01-26 | 2011-01-26 | 李贵林 | 计算机信息安全的方法 |
CN101227630A (zh) * | 2008-01-29 | 2008-07-23 | 中兴通讯股份有限公司 | 一种基于窗口平台的应用程序监控方法 |
CN104239095A (zh) * | 2014-09-01 | 2014-12-24 | 小米科技有限责任公司 | 操作系统启动方法、装置及终端设备 |
CN106775981B (zh) * | 2016-12-15 | 2020-03-03 | 北京奇虎科技有限公司 | 一种进程处理方法、装置及计算机可读介质 |
CN107678878A (zh) * | 2017-10-12 | 2018-02-09 | 郑州云海信息技术有限公司 | 一种异常进程的处理方法及装置 |
CN110187996A (zh) * | 2019-05-30 | 2019-08-30 | 苏州浪潮智能科技有限公司 | Bmc主进程故障诊断方法、装置、设备及可读存储介质 |
-
2019
- 2019-09-26 CN CN201910918237.0A patent/CN110851300A/zh active Pending
-
2020
- 2020-09-24 WO PCT/CN2020/117490 patent/WO2021057855A1/zh active Application Filing
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20120210198A1 (en) * | 2011-02-16 | 2012-08-16 | Invensys Systems Inc. | System and Method for Fault Tolerant Computing Using Generic Hardware |
CN102622290A (zh) * | 2012-03-07 | 2012-08-01 | 苏州阔地网络科技有限公司 | 一种进程监控的方法及系统 |
CN104932965A (zh) * | 2014-03-18 | 2015-09-23 | 北京奇虎科技有限公司 | 对象实时监控方法和装置 |
CN105045708A (zh) * | 2015-09-02 | 2015-11-11 | 上海斐讯数据通信技术有限公司 | 软件运行错误处理方法及系统 |
CN107423620A (zh) * | 2017-03-12 | 2017-12-01 | 郑州云海信息技术有限公司 | 存储服务器服务进程的管理方法及装置 |
CN110851300A (zh) * | 2019-09-26 | 2020-02-28 | 三维通信股份有限公司 | 程序进程监控的方法、装置、计算机设备及可读存储介质 |
Also Published As
Publication number | Publication date |
---|---|
CN110851300A (zh) | 2020-02-28 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2021057855A1 (zh) | 程序进程监控的方法、装置、计算机设备及可读存储介质 | |
CN106716972B (zh) | 半自动故障转移 | |
US20170116084A1 (en) | Method and System for Monitoring Virtual Machine Cluster | |
US7356744B2 (en) | Method and system for optimizing testing of memory stores | |
CN112035472B (zh) | 数据处理方法、装置、计算机设备和存储介质 | |
US10853180B2 (en) | Automatically setting a dynamic restore policy in a native cloud environment | |
US9164857B2 (en) | Scalable structured data store operations | |
CN107453932B (zh) | 一种分布式存储系统管理方法及其装置 | |
CN111104238B (zh) | 一种基于ce的内存诊断的方法、设备及介质 | |
CN108932249B (zh) | 一种管理文件系统的方法及装置 | |
RU2646309C1 (ru) | Способ резервного копирования | |
CN111901176B (zh) | 故障确定方法、装置、设备及存储介质 | |
CN110990124A (zh) | 云主机恢复方法和装置 | |
CN105550071A (zh) | 系统文件升级及检测方法、通信设备 | |
CN115080340A (zh) | 软磁盘阵列监控方法、系统、计算机设备和存储介质 | |
TW201510995A (zh) | 維護電腦系統之檔案系統的方法 | |
CN113691395A (zh) | 网络运维方法、装置、计算机设备和存储介质 | |
CN116010199A (zh) | 应用服务自调节方法、装置、计算机设备及存储介质 | |
CN114490196A (zh) | 数据库切换方法、系统、设备及介质 | |
CN110968456A (zh) | 分布式存储系统中故障磁盘的处理方法及装置 | |
CN113721746A (zh) | 一种日志的存储方法及装置 | |
CN111985010A (zh) | 笔记本硬盘的拦截校验方法、装置、计算机设备及存储介质 | |
CN111460035A (zh) | 一种数据库系统及其容灾方法 | |
CN109933351A (zh) | 一种修复和升级Linux系统的方法与装置 | |
CN117033086B (zh) | 操作系统的恢复方法、装置、存储介质和服务器管理芯片 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 20868367 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 20868367 Country of ref document: EP Kind code of ref document: A1 |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 20868367 Country of ref document: EP Kind code of ref document: A1 |
|
32PN | Ep: public notification in the ep bulletin as address of the adressee cannot be established |
Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 20.10.2022) |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 20868367 Country of ref document: EP Kind code of ref document: A1 |