WO2021072847A1 - Procédé et appareil permettant de surveiller la condition d'un réseau informatique, dispositif informatique, et support de stockage - Google Patents

Procédé et appareil permettant de surveiller la condition d'un réseau informatique, dispositif informatique, et support de stockage Download PDF

Info

Publication number
WO2021072847A1
WO2021072847A1 PCT/CN2019/117228 CN2019117228W WO2021072847A1 WO 2021072847 A1 WO2021072847 A1 WO 2021072847A1 CN 2019117228 W CN2019117228 W CN 2019117228W WO 2021072847 A1 WO2021072847 A1 WO 2021072847A1
Authority
WO
WIPO (PCT)
Prior art keywords
node
internet packet
instances
computer
packet explorer
Prior art date
Application number
PCT/CN2019/117228
Other languages
English (en)
Chinese (zh)
Inventor
朱诗鑫
Original Assignee
平安科技(深圳)有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 平安科技(深圳)有限公司 filed Critical 平安科技(深圳)有限公司
Publication of WO2021072847A1 publication Critical patent/WO2021072847A1/fr

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/12Network monitoring probes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/08Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/10Active monitoring, e.g. heartbeat, ping or trace-route
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements, protocols or services for addressing or naming
    • H04L61/50Address allocation
    • H04L61/5007Internet protocol [IP] addresses

Definitions

  • This application relates to the field of network monitoring technology, and in particular to a computer network condition monitoring method, device, computer equipment and storage medium.
  • monitoring is mainly carried out through the argus monitoring system.
  • the IPs of all computers in the area are first obtained, and then the fPING command is called to obtain the packet loss rate and delay and other data information of each IP, and is regularly pushed to the argus monitoring system , To monitor the computer's network status based on data information such as packet loss rate and delay.
  • the argus monitoring system has better monitoring performance when the number of IPs in the area is small.
  • the processing capacity of the existing single PING instance is insufficient, resulting in packet loss for the acquisition computer
  • the time-consuming of data information such as rate and delay is very serious, and the real-time performance becomes lower and lower.
  • the first aspect of the present application provides a computer network condition monitoring method, the method including:
  • the network status of the computer corresponding to the IP address is output according to the monitoring data.
  • the example of allocating multiple IP addresses in the IP list to the multiple Internet packet explorers includes:
  • the IP address corresponding to the first node is allocated to the Internet packet explorer instance corresponding to the target second node.
  • the filtering out the target second node corresponding to the first node from the second node includes:
  • the initialization of multiple Internet packet explorer instances includes:
  • the method further includes:
  • the preset value is determined according to the number of computers.
  • the registering the state data of the multiple Internet packet explorer instances to the ETCD registration center includes:
  • the outputting the network status of the computer corresponding to the IP address according to the monitoring data includes:
  • a second aspect of the present application provides a computer network condition monitoring device, the device including:
  • Initialization module used to initialize multiple Internet packet explorer instances
  • the status acquisition module is used to start the multiple Internet packet explorer instances and acquire the status data of each Internet packet explorer instance;
  • the status registration module is used to register the status data of the multiple Internet packet explorer instances to the ETCD registration center;
  • the IP obtaining module is used to obtain the pre-cached IP list in the heartbeat service
  • An IP allocation module configured to allocate multiple IP addresses in the IP list to the multiple Internet packet explorer instances
  • the IP processing module is configured to use the service of the Internet packet explorer instance to process the IP address corresponding to the Internet packet explorer instance to obtain monitoring data;
  • the status output module is used to output the network status of the computer corresponding to the IP address according to the monitoring data.
  • a third aspect of the present application provides a computer device that includes a processor, and the processor is configured to implement the computer network status monitoring method when executing at least one computer-readable instruction stored in a memory.
  • the fourth aspect of the present application provides a non-volatile computer-readable storage medium having at least one computer-readable instruction stored on the non-volatile computer-readable storage medium, and the computer-readable instruction is executed by a processor
  • the computer network condition monitoring method is realized at the time.
  • the computer network condition monitoring method, device, computer equipment, and storage medium described in this application realize the horizontal expansion of the PING service by initializing multiple Internet packet explorer instances, and solve the lack of processing capacity of a single PING service.
  • the problem when the multiple Internet packet explorer instances are started, the status data of each Internet packet explorer instance is obtained, and the status data is registered to the ETCD registry, and then the pre-cached IP list in the heartbeat service is obtained, By assigning multiple IP addresses in the IP list to the multiple Internet packet explorer instances, the problem of uniform distribution of multiple IP addresses is solved, and each PING instance can handle IP addresses.
  • the service processing of the Internet Packet Explorer instance obtains monitoring data from the IP address corresponding to the Internet Packet Explorer instance, and outputs the network status of the computer corresponding to the IP address according to the monitoring data, which improves the PING service in the ETCD cluster Processing capabilities enhance the timeliness of obtaining monitoring data.
  • Fig. 1 is a flowchart of a computer network condition monitoring method provided in Embodiment 1 of the present application.
  • Fig. 2 is a structural diagram of a computer network condition monitoring device provided in the second embodiment of the present application.
  • FIG. 3 is a schematic structural diagram of a computer device provided in Embodiment 3 of the present application.
  • Fig. 1 is a flowchart of a computer network condition monitoring method provided in Embodiment 1 of the present application.
  • the computer network condition monitoring method can be applied to computer equipment.
  • the computer network condition monitoring method provided by the method of this application can be directly integrated on the computer equipment. Function, or run in computer equipment in the form of Software Development Kit (SKD).
  • SSD Software Development Kit
  • the computer network condition monitoring method specifically includes the following steps. According to different requirements, the order of the steps in the flowchart can be changed, and some of the steps can be omitted.
  • the ETCD A highly-available key value store for shared configuration and service discovery, used to configure the key-value storage system for sharing and service discovery
  • the ETCD distributed service system can use the Internet packet explorer service to monitor the number of computers in a certain area And the network status of the target computer.
  • the ETCD distributed service system is deployed in the area.
  • the Internet packet explorer (Packet Internet Groper, PING) is an executable command, and the PING command can be used to check whether the network can be connected. Specifically, it is used to determine whether the local computer can loop (send and receive) datagrams with another computer. PING can display the amount of time between sending an ICMP (Internet Control Message Protocol) echo request and returning an echo response in milliseconds. If the response time is short, it means that the datagram does not have to go through too many routers or the network connection speed is relatively fast.
  • ICMP Internet Control Message Protocol
  • the initialization of multiple instances of Internet packet explorer includes:
  • the automated container (Kubernetes, K8S) is an open source system that automatically deploys, expands, and manages containerized applications, and the replica controller ensures that a specific number of PING instances run at any time.
  • the preset value is controlled by the K8S cluster service, and the normal operation of the K8S cluster service depends on the etcd service system.
  • the value of the replica parameter defaults to 1.
  • the default value is modified to a preset value, for example, 50. Save the modified copy parameter value, and run the copy controller to get 50 PING instances.
  • the preset value can be stored in the system in the form of text (for example, TXT or EXCEL).
  • the value of the copy parameter can be replaced with the read value by reading the value in the stored text The value obtained.
  • the method further includes:
  • the preset value is determined according to the number of computers.
  • the computer does not need to be connected to the K8S cluster, only the number of computers in the monitoring area is required to determine the preset value, and the replica parameters of the replica controller are modified according to the determined preset value. Then determine the number of initialization PING instances.
  • the number of computers in the target area is large, more PING instances can be initialized.
  • the number of computers in the target area is small, fewer PING instances can be initialized to ensure the rationality of the initialized PING instances so that each PING instance can Deal with the IP address, make full use of network resources, avoid the waste of resources caused by the initialization of too many PING instances and the number of computers, and avoid the performance degradation and low real-time performance caused by the initialization of too few PING instances and the number of computers.
  • the operation of starting the PING instances can be performed.
  • the PING instance When the PING instance is started, it will automatically report its own status data to the ETCD registration center. If PING instances increase or decrease, the corresponding state data in the ETCD cluster will increase or decrease.
  • the state data of the PING instance exists in the form of a key-value pair ⁇ key, value>, where key is the state in the PING instance, and value is the timestamp when the PING instance reports the state.
  • the state of the PING instance is divided into a normal state and an abnormal state.
  • the state data is reported to the ETCD registration center every preset time (5s).
  • the time stamp when the PING instance reports the status is accurate to the nanometer level.
  • the probability that the two timestamps are the same is almost zero, so it can ensure that the status data of each PING instance is unique, that is, to ensure that the status data of different PING instances is unique.
  • the status data is different. PING instances of different status data can avoid data conflicts.
  • the state of a certain PING instance is represented by p1
  • the timestamp when the state p1 is reported is represented by v1
  • v1 1545900788303975784
  • the ETCD registration center is a distributed key-value database used to store the state data of the multiple PING instances. After receiving the status data reported by the PING instance, the status data of the PING instance is stored in the distributed key-value database, that is, the process of registering the status data of the multiple PING instances to the ETCD registration center is completed.
  • the registering the state data of the multiple Internet packet explorer instances to the ETCD registration center includes:
  • the network interface includes an IP address port and an application program interface (Application Programming Interface, API interface).
  • API interface is some pre-defined functions, or an agreement for the connection of different components of the software system, which is to provide applications and development The ability of a person to access a set of routines based on a piece of software or hardware.
  • S104 Acquire a pre-cached IP list in the heartbeat service.
  • the Heart Beat Service is a service that caches all configuration data. It is used to receive heartbeat requests from all servers, register the agent on the server, update the agent status, and connect to the ETCD registration center to ensure that the HBS service and The ETCD registration center is connected normally, and the heartbeat service sends a heartbeat request every minute.
  • PING instance service, HBS service and other services are all controlled by the K8S cluster.
  • the heartbeat service and the ETCD registration center adopt a two-way monitoring mechanism, and any party in the two-way monitoring can initiate a request for data acquisition.
  • the heartbeat service can initiate a request to the ETCD registry to obtain data; the ETCD registry can also initiate a request to the heartbeat service to obtain data.
  • the ETCD registry can also initiate a request to the heartbeat service to obtain data.
  • an IP list is cached in the HBS service in advance, and the IP address, computer name, area where the computer is located, etc. of multiple computers are recorded in the IP list.
  • the allocating multiple IP addresses in the IP list to the multiple Internet packet explorers includes:
  • the IP address corresponding to the first node is allocated to the Internet packet explorer instance corresponding to the target second node.
  • the introduction disperses data into the hash ring as evenly as possible, and each PING instance is evenly distributed as a node on the virtual hash ring to solve the problem of data skew.
  • the hash value of each PING instance is calculated and mapped to the virtual hash ring through the consistent hash algorithm, and then the hash value of each IP address is calculated and mapped to the virtual hash ring Then, the IP address closest to the PING instance on the virtual hash ring is assigned to the PING instance.
  • multiple PING instances are mapped to the nodes on the virtual hash ring as p1, p2,..., pn, and multiple IP addresses are assigned to these nodes on the virtual hash ring, and each node is assigned an IP address.
  • the difference is that the data processed by nodes p1, p2,..., pn are r1, r2,..., rn, respectively.
  • the filtering out the target second node corresponding to the first node from the second node includes:
  • 3 IP addresses are mapped to the virtual hash ring as the first node
  • 3 PING instances are mapped to the virtual hash ring as the second node.
  • the first hash value of the first IP address (the first node R1) Is H11
  • the first hash value of the second IP address (first node R2) is H12
  • the first hash value of the third IP address (first node R3) is H13
  • the first PING instance (first node R3) is H13.
  • the second hash value of the second node P1) is H21
  • the second hash value of the second PING instance is H22
  • the second hash value of the third PING instance is H23
  • the first difference between the first hash value H11 and the second hash value H21 is calculated as D1
  • the second difference between the first hash value H11 and the second hash value H23 is calculated as D2.
  • the second hash value H23 is used as the target second hash value, which is similar to the second hash value H23.
  • the second node P3 corresponding to the desired value H23 serves as the target second node, and the first IP address corresponding to the first hash value H11 is allocated to the third PING instance corresponding to the target second node P3.
  • the first difference D1 between the first hash value H13 and the second hash value H22 is calculated Calculate the second difference D2 between the first hash value H13 and the second hash value H23. If the first difference D1 is less than the second difference D2, it indicates that the difference between the first hash value H13 and the second hash value H22 is The greater the similarity, the smaller the distance, the smaller the similarity between the first hash value H13 and the second hash value H23, and the greater the distance.
  • the second hash value H22 is used as the target second hash value, which is consistent with
  • the second node P2 corresponding to the second hash value H22 serves as the target second node, and the third IP address corresponding to the first hash value H13 is assigned to the second node corresponding to the target second node P2. PING instance.
  • S106 Use the service of the Internet packet explorer instance to process the IP address corresponding to the Internet packet explorer instance to obtain monitoring data.
  • the monitoring data may include: packet loss rate, delay, maximum delay and minimum delay, etc.
  • the service of the Internet packet explorer instance is a PING command
  • using the service of the Internet packet explorer instance to process the monitoring data of the IP address corresponding to the Internet packet explorer instance is to run the PING command to process the IP
  • the address gets the monitoring data.
  • the format of the PING command is: PING space IP address.
  • S107 Output the network status of the computer corresponding to the IP address according to the monitoring data.
  • the monitoring data can be used to determine whether the computer's network operation status is good or bad.
  • the packet loss rate when the monitored data is the packet loss rate, and the packet loss rate reaches 90%, it indicates that the network packet loss is very serious and the network operation is unstable; when the packet loss rate reaches 0.1%, it indicates that the network has almost no packet loss and the network is running Very stable.
  • the outputting the network status of the computer corresponding to the IP address according to the monitoring data includes:
  • the packet loss rate is small (less than or equal to the preset packet loss rate threshold) and the delay is small (less than or equal to the preset delay threshold), it indicates that the computer's network is in good condition ,Operating normally.
  • a large packet loss rate or a large delay indicates that the computer's network status is poor and its operation is abnormal.
  • the first alarm can be issued; when the packet loss rate is small but the delay is large, the second alarm can be issued; for the packet loss rate is large, and the delay is also When it is very large, the third alarm is issued.
  • Different alarm methods can distinguish the cause of the abnormality of the computer's network status, so that the operation and maintenance personnel can directly give corrective measures when receiving the alarm signal, without the need to troubleshoot the cause of the abnormality.
  • the computer network status monitoring method realizes the horizontal expansion of the PING service by initializing multiple instances of Internet packet explorer, and solves the problem of insufficient processing capacity of a single PING service;
  • the Internet Packet Explorer instance When the Internet Packet Explorer instance is started, it obtains the status data of each Internet Packet Explorer instance, and registers the status data to the ETCD registration center, and then obtains the pre-cached IP list in the heartbeat service.
  • IP addresses are assigned to the multiple Internet packet explorer instances, which solves the problem of uniform distribution of multiple IP addresses, ensures that each PING instance can handle IP addresses, and finally uses the service processing of the Internet packet explorer instance
  • the IP address corresponding to the instance of the Internet packet explorer obtains monitoring data, and the network status of the computer corresponding to the IP address is output according to the monitoring data.
  • the processing capacity of the PING service in the ETCD cluster is improved, and the timeliness of obtaining monitoring data is enhanced.
  • Fig. 2 is a structural diagram of a computer network condition monitoring device provided in the second embodiment of the present application.
  • the computer network condition monitoring device 20 may include multiple functional modules composed of program code segments.
  • the program code of each program segment in the computer network status monitoring device 20 can be stored in the memory of the computer device and executed by the at least one processor to perform (see Figure 1 for details) the computer network status monitoring Features.
  • the computer network condition monitoring device 20 can be divided into multiple functional modules according to the functions it performs.
  • the functional modules may include: an initialization module 201, a real-time monitoring module 202, a status acquisition module 203, a status registration module 204, an IP acquisition module 205, an IP allocation module 206, an IP processing module 207, and a status output module 208.
  • the module referred to in this application refers to a series of computer-readable instruction segments that can be executed by at least one processor and can complete fixed functions, and are stored in a memory. In this embodiment, the functions of each module will be described in detail in subsequent embodiments.
  • the initialization module 201 is used to initialize multiple Internet packet explorer instances.
  • the ETCD A highly-available key value store for shared configuration and service discovery, used to configure the key-value storage system for sharing and service discovery
  • the ETCD distributed service system can use the Internet packet explorer service to monitor the number of computers in a certain area And the network status of the target computer.
  • the ETCD distributed service system is deployed in the area.
  • the Internet packet explorer (Packet Internet Groper, PING) is an executable command, and the PING command can be used to check whether the network can be connected. Specifically, it is used to determine whether the local computer can loop (send and receive) datagrams with another computer. PING can display the amount of time between sending an ICMP (Internet Control Message Protocol) echo request and returning an echo response in milliseconds. If the response time is short, it means that the datagram does not have to go through too many routers or the network connection speed is relatively fast.
  • ICMP Internet Control Message Protocol
  • the initialization module 201 to initialize multiple Internet packet explorer instances includes:
  • the automated container (Kubernetes, K8S) is an open source system that automatically deploys, expands, and manages containerized applications, and the replica controller ensures that a specific number of PING instances run at any time.
  • the preset value is controlled by the K8S cluster service, and the normal operation of the K8S cluster service depends on the etcd service system.
  • the value of the replica parameter defaults to 1.
  • the default value is modified to a preset value, for example, 50. Save the modified copy parameter value, and run the copy controller to get 50 PING instances.
  • the preset value can be stored in the system in the form of text (for example, TXT or EXCEL).
  • the value of the copy parameter can be replaced with the read value by reading the value in the stored text The value obtained.
  • the real-time monitoring module 202 is configured to monitor the number of computers in the area in real time; and determine the preset value according to the number of computers.
  • the computer does not need to be connected to the K8S cluster, only the number of computers in the monitoring area is required to determine the preset value, and the replica parameters of the replica controller are modified according to the determined preset value. Then determine the number of initialization PING instances.
  • the number of computers in the target area is large, more PING instances can be initialized.
  • the number of computers in the target area is small, fewer PING instances can be initialized to ensure the rationality of the initialized PING instances so that each PING instance can Deal with the IP address, make full use of network resources, avoid the waste of resources caused by the initialization of too many PING instances and the number of computers, and avoid the performance degradation and low real-time performance caused by the initialization of too few PING instances and the number of computers.
  • the status acquisition module 203 is configured to start the multiple Internet packet explorer instances and acquire the status data of each Internet packet explorer instance.
  • the operation of starting the PING instances can be performed.
  • the PING instance When the PING instance is started, it will automatically report its own status data to the ETCD registration center. If PING instances increase or decrease, the corresponding state data in the ETCD cluster will increase or decrease.
  • the state data of the PING instance exists in the form of a key-value pair ⁇ key, value>, where key is the state in the PING instance, and value is the timestamp when the PING instance reports the state.
  • the state of the PING instance is divided into a normal state and an abnormal state.
  • the state data is reported to the ETCD registration center every preset time (5s).
  • the time stamp when the PING instance reports the status is accurate to the nanometer level.
  • the probability that the two timestamps are the same is almost zero, so it can ensure that the status data of each PING instance is unique, that is, to ensure that the status data of different PING instances is unique.
  • the status data is different. PING instances of different status data can avoid data conflicts.
  • the state of a certain PING instance is represented by p1
  • the timestamp when the state p1 is reported is represented by v1
  • v1 1545900788303975784
  • the status registration module 204 is used to register the status data of the multiple Internet packet explorer instances to the ETCD registration center.
  • the ETCD registration center is a distributed key-value database used to store the state data of the multiple PING instances. After receiving the status data reported by the PING instance, the status data of the PING instance is stored in the distributed key-value database, that is, the process of registering the status data of the multiple PING instances to the ETCD registration center is completed.
  • the status registration module 204 registering the status data of the multiple Internet packet explorer instances to the ETCD registration center includes:
  • the network interface includes an IP address port and an application program interface (Application Programming Interface, API interface).
  • API interface is some pre-defined functions, or an agreement for the connection of different components of the software system, which is to provide applications and development The ability of a person to access a set of routines based on a piece of software or hardware.
  • the IP obtaining module 205 is configured to obtain a pre-cached IP list in the heartbeat service.
  • the Heart Beat Service is a service that caches all configuration data. It is used to receive heartbeat requests from all servers, register the agent on the server, update the agent status, and connect to the ETCD registration center to ensure that the HBS service and The ETCD registration center is connected normally, and the heartbeat service sends a heartbeat request every minute.
  • PING instance service, HBS service and other services are all controlled by the K8S cluster.
  • the heartbeat service and the ETCD registration center adopt a two-way monitoring mechanism, and any party in the two-way monitoring can initiate a request for data acquisition.
  • the heartbeat service can initiate a request to the ETCD registry to obtain data; the ETCD registry can also initiate a request to the heartbeat service to obtain data.
  • the ETCD registry can also initiate a request to the heartbeat service to obtain data.
  • an IP list is cached in the HBS service in advance, and the IP address, computer name, area where the computer is located, etc. of multiple computers are recorded in the IP list.
  • the IP allocation module 206 is configured to allocate multiple IP addresses in the IP list to the multiple Internet packet explorer instances.
  • the IP allocation module 206 allocating multiple IP addresses in the IP list to the multiple Internet packet explorer instances includes:
  • the IP address corresponding to the first node is allocated to the Internet packet explorer instance corresponding to the target second node.
  • the introduction disperses data into the hash ring as evenly as possible, and each PING instance is evenly distributed as a node on the virtual hash ring to solve the problem of data skew.
  • the hash value of each PING instance is calculated and mapped to the virtual hash ring through the consistent hash algorithm, and then the hash value of each IP address is calculated and mapped to the virtual hash ring Then, the IP address closest to the PING instance on the virtual hash ring is assigned to the PING instance.
  • multiple PING instances are mapped to the nodes on the virtual hash ring as p1, p2,..., pn, and multiple IP addresses are assigned to these nodes on the virtual hash ring, and each node is assigned an IP address.
  • the difference is that the data processed by nodes p1, p2,..., pn are r1, r2,..., rn, respectively.
  • the filtering out the target second node corresponding to the first node from the second node includes:
  • 3 IP addresses are mapped to the virtual hash ring as the first node
  • 3 PING instances are mapped to the virtual hash ring as the second node.
  • the first hash value of the first IP address (the first node R1) Is H11
  • the first hash value of the second IP address (first node R2) is H12
  • the first hash value of the third IP address (first node R3) is H13
  • the first PING instance (first node R3) is H13.
  • the second hash value of the second node P1) is H21
  • the second hash value of the second PING instance is H22
  • the second hash value of the third PING instance is H23
  • the first difference between the first hash value H11 and the second hash value H21 is calculated as D1
  • the second difference between the first hash value H11 and the second hash value H23 is calculated as D2.
  • the second hash value H23 is used as the target second hash value, which is similar to the second hash value H23.
  • the second node P3 corresponding to the desired value H23 serves as the target second node, and the first IP address corresponding to the first hash value H11 is allocated to the third PING instance corresponding to the target second node P3.
  • the first difference D1 between the first hash value H13 and the second hash value H22 is calculated Calculate the second difference D2 between the first hash value H13 and the second hash value H23. If the first difference D1 is less than the second difference D2, it indicates that the difference between the first hash value H13 and the second hash value H22 is The greater the similarity, the smaller the distance, the smaller the similarity between the first hash value H13 and the second hash value H23, and the greater the distance.
  • the second hash value H22 is used as the target second hash value, which is consistent with
  • the second node P2 corresponding to the second hash value H22 serves as the target second node, and the third IP address corresponding to the first hash value H13 is assigned to the second node corresponding to the target second node P2. PING instance.
  • the IP processing module 207 is configured to use the service of the Internet packet explorer instance to process the IP address corresponding to the Internet packet explorer instance to obtain monitoring data.
  • the monitoring data may include: packet loss rate, delay, maximum delay and minimum delay, etc.
  • the service of the Internet packet explorer instance is a PING command
  • using the service of the Internet packet explorer instance to process the monitoring data of the IP address corresponding to the Internet packet explorer instance is to run the PING command to process the IP
  • the address gets the monitoring data.
  • the format of the PING command is: PING space IP address.
  • the status output module 208 is configured to output the network status of the computer corresponding to the IP address according to the monitoring data.
  • the monitoring data can be used to determine whether the computer's network operation status is good or bad.
  • the packet loss rate when the monitored data is the packet loss rate, and the packet loss rate reaches 90%, it indicates that the network packet loss is very serious and the network operation is unstable; when the packet loss rate reaches 0.1%, it indicates that the network has almost no packet loss and the network is running Very stable.
  • outputting the network status of the computer corresponding to the IP address by the status output module 208 according to the monitoring data includes:
  • the packet loss rate is small (less than or equal to the preset packet loss rate threshold) and the delay is small (less than or equal to the preset delay threshold), it indicates that the computer's network is in good condition ,Operating normally.
  • a large packet loss rate or a large delay indicates that the computer's network status is poor and its operation is abnormal.
  • the first alarm can be issued; when the packet loss rate is small but the delay is large, the second alarm can be issued; for the packet loss rate is large, and the delay is also When it is very large, the third alarm is issued.
  • Different alarm methods can distinguish the cause of the abnormality of the computer's network status, so that the operation and maintenance personnel can directly give corrective measures when receiving the alarm signal, without the need to troubleshoot the cause of the abnormality.
  • the computer network condition monitoring device realizes the horizontal expansion of PING services by initializing multiple instances of Internet packet explorers, and solves the problem of insufficient processing capacity of a single PING service;
  • the Internet Packet Explorer instance When the Internet Packet Explorer instance is started, it obtains the status data of each Internet Packet Explorer instance, and registers the status data to the ETCD registration center, and then obtains the pre-cached IP list in the heartbeat service.
  • IP addresses are assigned to the multiple Internet packet explorer instances, which solves the problem of uniform distribution of multiple IP addresses, ensures that each PING instance can handle IP addresses, and finally uses the service processing of the Internet packet explorer instance
  • the IP address corresponding to the instance of the Internet packet explorer obtains monitoring data, and the network status of the computer corresponding to the IP address is output according to the monitoring data.
  • the processing capacity of the PING service in the ETCD cluster is improved, and the timeliness of obtaining monitoring data is enhanced.
  • the computer device 3 includes a memory 31, at least one processor 32, at least one communication bus 33, and a transceiver 34.
  • FIG. 3 does not constitute a limitation of the embodiment of the present application. It may be a bus-type structure or a star structure.
  • the computer device 3 may also include a graph Show more or less other hardware or software, or different component arrangements.
  • the computer device 3 is a device that can automatically perform numerical calculation and/or information processing in accordance with pre-set or stored instructions. Its hardware includes, but is not limited to, a microprocessor, an application specific integrated circuit, Programmable gate arrays, digital processors and embedded devices, etc.
  • the computer device 3 may also include a client device, and the client device includes but is not limited to any electronic product that can interact with a client through a keyboard, a mouse, a remote control, a touch panel, or a voice control device, etc., for example, Personal computers, tablet computers, smart phones, digital cameras, etc.
  • the computer device 3 is only an example. If other existing or future electronic products can be adapted to this application, they should also be included in the scope of protection of this application and included here by reference. .
  • the memory 31 is used to store program codes and various data, such as a device installed in the computer equipment 3, and realize high-speed and automatic completion of programs or data during the operation of the computer equipment 3 Access.
  • the memory 31 includes Read-Only Memory (ROM), Programmable Read-Only Memory (PROM), Erasable Programmable Read-Only Memory (EPROM) , One-time Programmable Read-Only Memory (OTPROM), Electronically-Erasable Programmable Read-Only Memory (EEPROM), Compact Disc Read- Only Memory, CD-ROM) or other optical disk storage, magnetic disk storage, tape storage, or any other non-volatile computer-readable medium that can be used to carry or store data.
  • ROM Read-Only Memory
  • PROM Programmable Read-Only Memory
  • EPROM Erasable Programmable Read-Only Memory
  • OTPROM One-time Programmable Read-Only Memory
  • EEPROM Electronically-Erasable Programmable Read-Only Memory
  • CD-ROM Compact Disc Read- Only Memory
  • CD-ROM
  • the at least one processor 32 may be composed of integrated circuits, for example, may be composed of a single packaged integrated circuit, or may be composed of multiple integrated circuits with the same function or different functions, including one Or a combination of multiple central processing units (CPU), microprocessors, digital processing chips, graphics processors, and various control chips.
  • the at least one processor 32 is the control core (Control Unit) of the computer device 3, which uses various interfaces and lines to connect the various components of the entire computer device 3, and runs or executes programs stored in the memory 31 or Modules, and call data stored in the memory 31 to perform various functions of the computer device 3 and process data.
  • Control Unit Control Unit
  • the at least one communication bus 33 is configured to implement connection and communication between the memory 31 and the at least one processor 32 and the like.
  • the computer device 3 may also include a power source (such as a battery) for supplying power to various components.
  • the power source may be logically connected to the at least one processor 32 through a power management device, so as to be realized by the power management device.
  • Manage functions such as charging, discharging, and power management.
  • the power supply may also include any components such as one or more DC or AC power supplies, recharging devices, power failure detection circuits, power converters or inverters, and power status indicators.
  • the computer device 3 may also include various sensors, Bluetooth modules, Wi-Fi modules, etc., which will not be repeated here.
  • the above-mentioned integrated unit implemented in the form of a software function module may be stored in a non-volatile computer-readable storage medium.
  • the above-mentioned software function module includes several instructions to enable a computer device (which may be a personal computer, a computer device, or a network device, etc.) or a processor to execute part of the method described in each embodiment of the present application.
  • the at least one processor 32 can execute the operating device of the computer device 3 and various installed application programs, program codes, etc., such as the above-mentioned modules.
  • the memory 31 stores program codes, and the at least one processor 32 can call the program codes stored in the memory 31 to perform related functions.
  • the various modules described in FIG. 2 are program codes stored in the memory 31 and executed by the at least one processor 32, so as to realize the functions of the various modules.
  • the memory 31 stores multiple instructions, and the multiple instructions are executed by the at least one processor 32 to implement all or part of the steps in the method described in the present application.
  • the disclosed device and method can be implemented in other ways.
  • the device embodiments described above are only illustrative.
  • the division of the modules is only a logical function division, and there may be other division methods in actual implementation.
  • modules described as separate components may or may not be physically separated, and the components displayed as modules may or may not be physical units, that is, they may be located in one place, or they may be distributed on multiple network units. Some or all of the modules can be selected according to actual needs to achieve the objectives of the solutions of the embodiments.
  • the functional modules in the various embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units may be integrated into one unit.
  • the above-mentioned integrated unit may be implemented in the form of hardware, or may be implemented in the form of hardware plus software functional modules.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Health & Medical Sciences (AREA)
  • Cardiology (AREA)
  • General Health & Medical Sciences (AREA)
  • Environmental & Geological Engineering (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

Un procédé permettant de surveiller la condition d'un réseau informatique est fourni dans la présente application, faisant appel aux étapes suivantes : l'initialisation d'une pluralité d'instances d'explorateur de paquets Internet ; le démarrage de la pluralité d'instances d'explorateur de paquets Internet et l'acquisition de données d'état de chaque instance d'explorateur de paquets Internet ; l'enregistrement des données d'état de la pluralité d'instances d'explorateur de paquets Internet dans un centre d'enregistrement ETCD ; l'acquisition d'une liste d'adresses IP pré-mises en mémoire cache dans un service de battement de cœur ; l'attribution d'une pluralité d'adresses IP dans la liste IP à la pluralité d'instances d'explorateur de paquets Internet ; l'utilisation d'un service des instances d'explorateur de paquets Internet afin de traiter les adresses IP correspondant aux instances d'explorateur de paquets Internet de façon à obtenir des données de surveillance ; et selon les données de surveillance, délivrer en sortie la condition de réseau de l'ordinateur correspondant aux adresses IP. Un appareil permettant de surveiller une condition d'un réseau informatique, un dispositif informatique, et un support de stockage sont également fournis dans la présente application. La présente application peut améliorer la capacité de traitement d'un service PING dans un groupe ETCD, améliorant ainsi l'opportunité d'acquérir des données de surveillance.
PCT/CN2019/117228 2019-10-18 2019-11-11 Procédé et appareil permettant de surveiller la condition d'un réseau informatique, dispositif informatique, et support de stockage WO2021072847A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201910996070.XA CN110971480B (zh) 2019-10-18 2019-10-18 计算机网络状况监控方法、装置、计算机设备及存储介质
CN201910996070.X 2019-10-18

Publications (1)

Publication Number Publication Date
WO2021072847A1 true WO2021072847A1 (fr) 2021-04-22

Family

ID=70029826

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2019/117228 WO2021072847A1 (fr) 2019-10-18 2019-11-11 Procédé et appareil permettant de surveiller la condition d'un réseau informatique, dispositif informatique, et support de stockage

Country Status (2)

Country Link
CN (1) CN110971480B (fr)
WO (1) WO2021072847A1 (fr)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113672665A (zh) * 2021-08-18 2021-11-19 Oppo广东移动通信有限公司 数据处理方法、数据采集系统、电子设备和存储介质
CN114629824A (zh) * 2022-03-24 2022-06-14 阿里巴巴(中国)有限公司 丢包定位方法、装置、计算设备及介质
CN114726806A (zh) * 2022-03-29 2022-07-08 驭势(上海)汽车科技有限公司 智能设备影子管理方法、系统、装置、设备和介质

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112929424B (zh) * 2021-01-26 2022-11-15 成都佳发安泰教育科技股份有限公司 网关负载均衡的方法、装置、设备及存储介质

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170118247A1 (en) * 2015-10-26 2017-04-27 Amazon Technologies, Inc. Providing fine-grained access remote command execution for virtual machine instances in a distributed computing environment
CN106850746A (zh) * 2016-12-23 2017-06-13 微梦创科网络科技(中国)有限公司 服务平滑升级的方法及装置
CN107171900A (zh) * 2017-07-25 2017-09-15 郑州云海信息技术有限公司 一种节点运行状态的获取方法及系统
CN109040212A (zh) * 2018-07-24 2018-12-18 苏州科达科技股份有限公司 设备接入服务器集群方法、系统、设备及存储介质
CN110071978A (zh) * 2019-04-28 2019-07-30 新华三信息安全技术有限公司 一种集群管理的方法及装置

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101114994B (zh) * 2006-07-28 2010-05-12 中兴通讯股份有限公司 一种多协议标签交换虚拟专用网连通性检测方法
US8676753B2 (en) * 2009-10-26 2014-03-18 Amazon Technologies, Inc. Monitoring of replicated data instances
US8751691B1 (en) * 2011-03-23 2014-06-10 Amazon Technologies, Inc. Methods and apparatus for remapping public network addresses on a network to an external network via an intermediate network
CN106790660B (zh) * 2017-01-18 2018-05-22 咪咕视讯科技有限公司 一种实现分布式存储系统的部署方法及装置
GB201704931D0 (en) * 2017-03-28 2017-05-10 Indigovision Ltd Monitoring devices and methods for IP surveillance networks

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170118247A1 (en) * 2015-10-26 2017-04-27 Amazon Technologies, Inc. Providing fine-grained access remote command execution for virtual machine instances in a distributed computing environment
CN106850746A (zh) * 2016-12-23 2017-06-13 微梦创科网络科技(中国)有限公司 服务平滑升级的方法及装置
CN107171900A (zh) * 2017-07-25 2017-09-15 郑州云海信息技术有限公司 一种节点运行状态的获取方法及系统
CN109040212A (zh) * 2018-07-24 2018-12-18 苏州科达科技股份有限公司 设备接入服务器集群方法、系统、设备及存储介质
CN110071978A (zh) * 2019-04-28 2019-07-30 新华三信息安全技术有限公司 一种集群管理的方法及装置

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113672665A (zh) * 2021-08-18 2021-11-19 Oppo广东移动通信有限公司 数据处理方法、数据采集系统、电子设备和存储介质
CN114629824A (zh) * 2022-03-24 2022-06-14 阿里巴巴(中国)有限公司 丢包定位方法、装置、计算设备及介质
CN114629824B (zh) * 2022-03-24 2024-03-19 阿里巴巴(中国)有限公司 丢包定位方法、装置、计算设备及介质
CN114726806A (zh) * 2022-03-29 2022-07-08 驭势(上海)汽车科技有限公司 智能设备影子管理方法、系统、装置、设备和介质

Also Published As

Publication number Publication date
CN110971480A (zh) 2020-04-07
CN110971480B (zh) 2022-08-19

Similar Documents

Publication Publication Date Title
WO2021072847A1 (fr) Procédé et appareil permettant de surveiller la condition d'un réseau informatique, dispositif informatique, et support de stockage
US10635558B2 (en) Container monitoring method and apparatus
EP3382543B1 (fr) Surveillance de micro-niveau, visibilité et commande de ressources partagées internes à un processeur d'une machine hôte pour un environnement virtuel
CN106489251B (zh) 应用拓扑关系发现的方法、装置和系统
CN105703940B (zh) 一种面向多级调度分布式并行计算的监控系统及监控方法
JP5458308B2 (ja) 仮想計算機システム、仮想計算機システムの監視方法及びネットワーク装置
EP3281360B1 (fr) Surveillance de fonction de réseau virtualisée
US10848366B2 (en) Network function management method, management unit, and system
CN110661647A (zh) 一种生命周期管理方法及装置
US20240097985A1 (en) Information processing method based on internet of things device, related device and storage medium
CN103458036A (zh) 一种集群文件系统的访问装置和方法
EP3806395B1 (fr) Procédé et appareil de déploiement de fonctions de réseau virtuel (vnf)
CN111258851A (zh) 一种集群的告警方法、装置、设置及存储介质
US11228490B1 (en) Storage management for configuration discovery data
WO2018171728A1 (fr) Serveur, système d'informations et procédé associé
CN114531373A (zh) 节点状态检测方法、节点状态检测装置、设备及介质
EP3679465A1 (fr) Architecture de stockage en réseau
CN115470303B (zh) 一种数据库访问方法、装置、系统、设备及可读存储介质
WO2020096845A1 (fr) Réalisation d'actions de manière opportuniste en conjonction avec des événement de réamorçage dans un système informatique en nuage
EP3306471B1 (fr) Découverte automatique de grappe de serveurs
US20150244780A1 (en) System, method and computing apparatus to manage process in cloud infrastructure
CN110928679A (zh) 一种资源分配方法及装置
US20230388205A1 (en) Cluster availability monitoring and alerting
WO2019011180A1 (fr) Procédé et dispositif d'envoi de licence
US11005746B1 (en) Stack group merging system

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 19949269

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS (EPO FORM 1205A DATED 10.06.2022)

122 Ep: pct application non-entry in european phase

Ref document number: 19949269

Country of ref document: EP

Kind code of ref document: A1