CN115134228B - Method, apparatus, device, medium and program product for environment link provisioning and detection - Google Patents
Method, apparatus, device, medium and program product for environment link provisioning and detection Download PDFInfo
- Publication number
- CN115134228B CN115134228B CN202210749633.7A CN202210749633A CN115134228B CN 115134228 B CN115134228 B CN 115134228B CN 202210749633 A CN202210749633 A CN 202210749633A CN 115134228 B CN115134228 B CN 115134228B
- Authority
- CN
- China
- Prior art keywords
- node
- head
- information
- link
- configuration
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000001514 detection method Methods 0.000 title claims abstract description 120
- 238000000034 method Methods 0.000 title claims abstract description 53
- 230000007613 environmental effect Effects 0.000 claims abstract description 75
- 230000000977 initiatory effect Effects 0.000 claims abstract description 7
- 238000004590 computer program Methods 0.000 claims description 19
- 230000004913 activation Effects 0.000 claims description 13
- 230000003213 activating effect Effects 0.000 claims description 7
- UDQMXYJSNNCRAS-UHFFFAOYSA-N 2,3-dichlorophenylpiperazine Chemical compound ClC1=CC=CC(N2CCNCC2)=C1Cl UDQMXYJSNNCRAS-UHFFFAOYSA-N 0.000 description 15
- 230000008569 process Effects 0.000 description 11
- 238000010586 diagram Methods 0.000 description 10
- 230000015654 memory Effects 0.000 description 10
- 238000004891 communication Methods 0.000 description 8
- 239000003999 initiator Substances 0.000 description 8
- 238000012545 processing Methods 0.000 description 7
- 230000006870 function Effects 0.000 description 6
- 230000002159 abnormal effect Effects 0.000 description 5
- 238000012840 feeding operation Methods 0.000 description 4
- 238000011161 development Methods 0.000 description 3
- 230000003287 optical effect Effects 0.000 description 3
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 230000002093 peripheral effect Effects 0.000 description 2
- 230000008859 change Effects 0.000 description 1
- 238000011981 development test Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 239000000835 fiber Substances 0.000 description 1
- 230000001976 improved effect Effects 0.000 description 1
- 238000011835 investigation Methods 0.000 description 1
- 239000004973 liquid crystal related substance Substances 0.000 description 1
- 230000008520 organization Effects 0.000 description 1
- 238000004806 packaging method and process Methods 0.000 description 1
- 239000004065 semiconductor Substances 0.000 description 1
- 239000000758 substrate Substances 0.000 description 1
- 230000008093 supporting effect Effects 0.000 description 1
- 230000001960 triggered effect Effects 0.000 description 1
Abstract
The present disclosure provides an environmental link provisioning and detection method, which relates to the financial or other arts. The environment link supplying and detecting method comprises the following steps: receiving a user request, wherein the user request comprises a configuration sequence and node information, and the configuration sequence is the sequence of nodes in an environment link from an access target end to an access initiating end; according to the configuration sequence, executing a supply operation on the link nodes through the node information; and performing a detection operation on the environmental link in the configuration order in case the supply operation is successful. The present disclosure also provides an environmental link provision and detection apparatus, device, medium, and program product.
Description
Technical Field
The present disclosure relates to the financial and other arts, and more particularly, to an environmental link provision and detection method, apparatus, device, medium and program product.
Background
In the field of financial science and technology, environmental links of different businesses are complex and various, and especially, the environmental links for internal and external network transactions. To ensure information security, system performance, system stability, etc., the environmental links of the service typically include, but are not limited to, server load balancing, digital certificate processing platforms, platform-as-a-service, and link nodes of the peripheral network. The application platforms and application flows corresponding to different link nodes are different, and on the basis, the supply and detection of the environment links are manually operated.
In this way, the problems of multiple steps, long period, complex investigation, low efficiency and the like exist in the aspects of supplying and detecting the environmental links.
Disclosure of Invention
In view of the foregoing, the present disclosure provides methods, apparatus, devices, media, and program products for feeding and detecting an environmental link that improves feeding efficiency and detection efficiency.
According to a first aspect of the present disclosure, there is provided an environmental link provisioning and detection method, including: receiving a user request, wherein the user request comprises a configuration sequence and node information, and the configuration sequence is the sequence of nodes in an environment link from an access target end to an access initiating end; according to the configuration sequence, executing a supply operation on the link nodes through the node information; and performing a detection operation on the environmental link in the configuration order in case the supply operation is successful.
According to an embodiment of the present disclosure, the performing, by the node information, the provisioning operation on the link node according to the configuration order includes: when the current node is the head-end node of the configuration sequence, acquiring calling information of the head-end node, wherein the calling information of the head-end node is from the node information; calling the head-end node based on the calling information of the head-end node; and under the condition that the calling of the head-end node is successful, executing the activation operation on the node equipment corresponding to the head-end node.
According to an embodiment of the present disclosure, the performing, by the node information, a provisioning operation on a link node according to the configuration order further includes: when the current node is a non-head-end node of the configuration sequence, acquiring calling information of the non-head-end node, wherein the calling information of the non-head-end node is generated under the condition that the last node equipment is successfully activated; calling the non-head-end node based on the calling information of the non-head-end node; and under the condition that the non-head-end node is successfully invoked, executing an activation operation on the node equipment corresponding to the non-head-end node.
According to an embodiment of the present disclosure, the activating operation includes: applying for node equipment; acquiring node configuration information under the condition that the node equipment is applied successfully, wherein the node configuration information is from the node information; and configuring the node device based on the node configuration information.
According to an embodiment of the present disclosure, after the end node of the configuration sequence completes the supplying operation, the method further includes: acquiring domain name calling information, wherein the domain name calling information is from the node information; calling domain name service based on the domain name calling information; acquiring domain name configuration information under the condition that the calling of the domain name service is successful, wherein the domain name configuration information is from the node information; and configuring a domain name of the end link node based on the domain name configuration information.
According to an embodiment of the disclosure, the performing the detection operation on the environmental link according to the configuration sequence includes: setting a fixed detection point and a variable detection point, wherein the fixed detection point corresponds to the access target end, and the variable detection point corresponds to other non-access target end nodes; and sequentially changing the variable detection points according to the configuration sequence; and sequentially detecting whether the variable detection point to the fixed detection point are normal or not.
According to an embodiment of the present disclosure, the method further comprises: recording an execution point when a provisioning operation is performed on a link node by the node information in the configuration order and/or when a detection is performed on the environmental link in the configuration order.
In a second aspect of the present disclosure, there is provided an environmental link supply and detection apparatus, the apparatus comprising: the system comprises a receiving module, a supplying module and a detecting module, wherein the receiving module is used for receiving a user request, the user request comprises a configuration sequence and node information, and the configuration sequence is the sequence of an environment link from an access target end to an access initiating end; the supply module is used for executing supply operation on the link nodes according to the configuration sequence through the node information; and the detection module is used for executing detection operation on the environment link according to the configuration sequence under the condition that the supply operation is successful.
According to an embodiment of the present disclosure, the supplying module is further configured to obtain call information of a head end node when the current node is the head end node in the configuration sequence, where the call information of the head end node is from the node information; calling the head-end node based on the calling information of the head-end node; and under the condition that the calling of the head-end node is successful, executing the activation operation on the node equipment corresponding to the head-end node.
According to an embodiment of the present disclosure, the supplying module is further configured to obtain, when the current node is a non-head-end node in the configuration sequence, call information of the non-head-end node, where the call information of the non-head-end node is generated when activation of the previous node device is successful; calling the non-head-end node based on the calling information of the non-head-end node; and under the condition that the non-head-end node is successfully invoked, executing an activation operation on the node equipment corresponding to the non-head-end node.
According to an embodiment of the present disclosure, the activating operation includes: applying for node equipment; acquiring node configuration information under the condition that the node equipment is applied successfully, wherein the node configuration information is from the node information; and configuring the node device based on the node configuration information.
According to the embodiment of the disclosure, the device further comprises a domain name configuration module, wherein the domain name configuration module is used for acquiring domain name calling information, and the domain name calling information is from the node information; calling domain name service based on the domain name calling information; acquiring domain name configuration information under the condition that the calling of the domain name service is successful, wherein the domain name configuration information is from the node information; and configuring a domain name of the end link node based on the domain name configuration information.
According to an embodiment of the disclosure, the detection module is further configured to set a fixed detection point and a variable detection point, where the fixed detection point corresponds to the access target end, and the variable detection point corresponds to other non-access target end nodes; and sequentially changing the variable detection points according to the configuration sequence; and sequentially detecting whether the variable detection point to the fixed detection point are normal or not.
According to an embodiment of the disclosure, the apparatus further includes an execution point recording module configured to record an execution point when the provisioning operation is performed on the link node according to the configuration order by the node information and/or when the detection is performed on the environmental link according to the configuration order.
In a third aspect of the present disclosure, there is provided an electronic device, comprising: one or more processors; and a memory for storing one or more programs, wherein the one or more programs, when executed by the one or more processors, cause the one or more processors to perform the environmental link provisioning and detection method described above.
In a fourth aspect of the present disclosure, there is also provided a computer-readable storage medium having stored thereon executable instructions that, when executed by a processor, cause the processor to perform the above-described ambient link provisioning and detection method.
In a fifth aspect of the present disclosure, there is also provided a computer program product comprising a computer program which, when executed by a processor, implements the above described ambient link provisioning and detection method.
In the embodiment of the disclosure, a method for supplying and detecting an environmental link is provided, and a multi-node serial supply operation is performed by adopting a sequence from a target end to an access end, so that quick supply of the environmental link is realized, and the time for readying the environmental link is shortened. Meanwhile, serial detection operation is carried out on each node in the environment link by adopting the sequence from the target end to the access end, so that a fault point can be rapidly positioned under the condition of abnormal access, and unnecessary time expenditure is avoided.
Drawings
The foregoing and other objects, features and advantages of the disclosure will be more apparent from the following description of embodiments of the disclosure with reference to the accompanying drawings, in which:
Fig. 1 schematically illustrates an application scenario diagram of an environmental link provisioning and detection method according to an embodiment of the present disclosure.
Fig. 2 schematically illustrates a flow chart of an ambient link provisioning and detection method according to an embodiment of the present disclosure.
Fig. 3 schematically illustrates a flow chart of a method of feeding operation according to an embodiment of the present disclosure.
Fig. 4 schematically illustrates a flow chart of another method of feeding operation according to an embodiment of the present disclosure.
Fig. 5 schematically illustrates a flow of another feed operation method according to an embodiment of the present disclosure.
Fig. 6 schematically illustrates a block diagram of an environmental link supply and detection apparatus according to an embodiment of the present disclosure.
Fig. 7 schematically illustrates a block diagram of an electronic device adapted to implement an ambient link provisioning and detection method according to an embodiment of the disclosure.
Detailed Description
Hereinafter, embodiments of the present disclosure will be described with reference to the accompanying drawings. It should be understood that the description is only exemplary and is not intended to limit the scope of the present disclosure. In the following detailed description, for purposes of explanation, numerous specific details are set forth in order to provide a thorough understanding of the embodiments of the present disclosure. It may be evident, however, that one or more embodiments may be practiced without these specific details. In addition, in the following description, descriptions of well-known structures and techniques are omitted so as not to unnecessarily obscure the concepts of the present disclosure.
The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the disclosure. The terms "comprises," "comprising," and/or the like, as used herein, specify the presence of stated features, steps, operations, and/or components, but do not preclude the presence or addition of one or more other features, steps, operations, or components.
All terms (including technical and scientific terms) used herein have the same meaning as commonly understood by one of ordinary skill in the art unless otherwise defined. It should be noted that the terms used herein should be construed to have meanings consistent with the context of the present specification and should not be construed in an idealized or overly formal manner.
Where a convention analogous to "at least one of A, B and C, etc." is used, in general such a convention should be interpreted in accordance with the meaning of one of skill in the art having generally understood the convention (e.g., "a system having at least one of A, B and C" would include, but not be limited to, systems having a alone, B alone, C alone, a and B together, a and C together, B and C together, and/or A, B, C together, etc.).
Before the embodiments of the present disclosure are disclosed in detail, technical terms related to the embodiments of the present disclosure are described in one-to-one:
Server load balancing: (Server Load Balancing, abbreviated SLB) for implementing load balancing among multiple servers. The SLB virtualizes a server, which is presented to the user. The virtual server represents a cluster of multiple real servers, and when a client initiates a connection to a virtual server, the SLB forwards the connection to a real server through some equalization algorithm.
And F5: a load balancing scheme balances and distributes loads to a plurality of operation units for execution.
Digital certificate processing platform: (DIGITAL CERTIFICATE Processing Platform, abbreviated as DCPP) can be used for e-commerce authentication to ensure account fund security.
The platform serves: (Platformas AS A SERVICE, abbreviated as PaaS) refers to a business model that provides a server platform as a service, with the PaaS layer interposed between software as a service and infrastructure as a service in a typical hierarchy of cloud computing.
Peripheral network: (Demilitarized Zone, abbreviated as DMZ), or demilitarized zone, is a physical or logical subnetwork that contains and exposes externally facing services of an organization to untrusted networks.
And (3) environment identification: identification of the application environment. For example, there are 5 sets of application environments, each with different logos.
Context root: the last string of characters in the domain name is accessed, relying on the "/" split.
In the prior art, to accelerate version iteration, multiple sets of environments are generally required to complete multi-version parallel development. Thus, such environmental provisioning and detection involving complex links requires more manpower to accomplish. In this context, each time a new set of environments is built, the applications need to be filed separately on the respective platforms. If an SLB is applied, the application form is filled in according to the actual situation, the application is submitted on the corresponding platform, the application flow comprises a plurality of different post roles for approval, the period may comprise 3-4 approval flows, and finally the SLB is allocated. And there may be a dependency relationship between link nodes, for example, the application of F5 depends on the application result of SLB, so that the environment link supply period for completing a set of environments becomes longer. After all involved link nodes have completed the provisioning operation, the links need to be tested. If the link is normal, the link can be delivered to the development test for use. If the link is abnormal, the problem needs to be checked layer by layer, and the corresponding professional personnel are found to process and solve the problem after the problem is positioned. This makes the process of provisioning and detection of the entire environmental link inefficient and redundant.
In the process of supplying and detecting the execution environment link, the problems of long flow, complicated process, low efficiency, extremely large dependence on personnel and insufficient timely treatment exist. In the context of rapid development iterations, environmental link provisioning and detection become bottlenecks that shorten the development cycle, how to solve this difficulty, and power-assisted project completion is a very urgent matter.
To solve the above technical problems, an embodiment of the present disclosure provides an environmental link supplying and detecting method, including: receiving a user request, wherein the user request comprises a configuration sequence and node information, and the configuration sequence is the sequence of nodes in an environment link from an access target end to an access initiating end; according to the configuration sequence, executing a supply operation on the link nodes through the node information; and performing a detection operation on the environmental link in the configuration order in case the supply operation is successful.
In the embodiment of the disclosure, a method for supplying and detecting an environmental link is provided, and a multi-node serial supply operation is performed by adopting a sequence from a target end to an access end, so that quick supply of the environmental link is realized, and the time for readying the environmental link is shortened. Meanwhile, serial detection operation is carried out on each node in the environment link by adopting the sequence from the target end to the access end, so that a fault point can be rapidly positioned under the condition of abnormal access, and unnecessary time expenditure is avoided.
Fig. 1 schematically illustrates an application scenario diagram of an environmental link provisioning and detection method according to an embodiment of the present disclosure.
As shown in fig. 1, an application scenario 100 according to this embodiment may include terminal devices 101, 102, 103, a network 104, and a server 105. The network 104 is used as a medium to provide communication links between the terminal devices 101, 102, 103 and the server 105. The network 104 may include various connection types, such as wired, wireless communication links, or fiber optic cables, among others.
The user may interact with the server 105 via the network 104 using the terminal devices 101, 102, 103 to receive or send messages or the like. Various communication client applications, such as shopping class applications, web browser applications, search class applications, instant messaging tools, mailbox clients, social platform software, etc. (by way of example only) may be installed on the terminal devices 101, 102, 103.
The terminal devices 101, 102, 103 may be a variety of electronic devices having a display screen and supporting web browsing, including but not limited to smartphones, tablets, laptop and desktop computers, and the like.
The server 105 may be a server providing various services, such as a background management server (by way of example only) providing support for websites browsed by users using the terminal devices 101, 102, 103. The background management server may analyze and process the received data such as the user request, and feed back the processing result (e.g., the web page, information, or data obtained or generated according to the user request) to the terminal device.
It should be noted that the method for providing and detecting an environmental link provided by the embodiments of the present disclosure may be generally performed by the server 105. Accordingly, the environmental link provisioning and detection means provided by embodiments of the present disclosure may be generally disposed in the server 105. The environmental link provisioning and detection methods provided by embodiments of the present disclosure may be performed by a server or cluster of servers other than server 105 and capable of communicating with terminal devices 101, 102, 103 and/or server 105. Accordingly, the environmental link provision and detection apparatus provided by the embodiments of the present disclosure may also be provided in a server or server cluster that is different from the server 105 and is capable of communicating with the terminal devices 101, 102, 103 and/or the server 105.
It should be understood that the number of terminal devices, networks and servers in fig. 1 is merely illustrative. There may be any number of terminal devices, networks, and servers, as desired for implementation.
The environment link provisioning and detection method of the disclosed embodiment will be described in detail below with reference to the scenario described in fig. 1 through fig. 2 to 5.
Fig. 2 schematically illustrates a flow chart of an ambient link provisioning and detection method according to an embodiment of the present disclosure.
As shown in fig. 2, the environmental link provision and detection method of this embodiment includes operations S210 to S230, which can be performed by the server 105.
In operation S210, a user request including a configuration order and node information is received, wherein the configuration order is an order of nodes in an environmental link from an access target to an access initiator.
Under the condition that the environment link completes corresponding configuration, the access initiator can access the target through the domain name, wherein one access is from the access initiator to the access target finally through a plurality of nodes in the environment link. Specifically, in the embodiment of the present disclosure, the access initiator is a client, and the access target is an application service.
Under the condition that the environment link executes supply and detection, the server receives a user request sent from the front end of the WEB page. The user request includes configuration order and node information. Wherein, the configuration sequence is the sequence of nodes in the environment link from the access target end to the access initiating end, in other words, the configuration sequence is the reverse sequence of the sequence of accessing the application server end from the user end.
For example, a set of environments (i.e., environments including network links) including complex environment links needs to be prepared, and the relationship from the access initiator to the access target network part is: "Domain name- > one layer F5 System- > DCPP System- > two layer F5 System- > SLB System- > application service. That is, the user wants to access the application service, and after inputting the domain name, the jump sequence of the environmental link in the network is from the first layer F5 system- > DCPP system- > second layer F5 system- > SLB system, and finally reaches the application service. The configuration sequence for the nodes in the environmental link is as follows: "SLB System" - > two-tier F5 System "- > DCPP System" - > one-tier F5 System ". The above-mentioned "one-tier F5 system", "DCPP system", "two-tier F5 system", "SLB system", and "application service" are referred to as nodes in the environmental link. The above-mentioned "first layer F5 system", "DCPP system", "second layer F5 system", "SLB system" and "application service" are mainly responsible for receiving call instructions and completing the corresponding operations according to the instructions. Here, the "domain name" is a domain name of the "one-layer F5 system", and thus, the "domain name" is considered as a part of the "one-layer F5" and is not considered as a node in the environmental link. Meanwhile, although the above-described "application service" exists as a node in the environmental link, it is not necessary to participate in the provisioning operation, but only in the detection operation.
For simplicity of description, the description of "one-tier F5 system" - > DCPP system "- > two-tier F5 system" - > SLB system "- > application service" will be replaced in the following with the node order of the environmental links "a" - > B "- > C" - > D "- > E". Wherein "a" corresponds to "a one-tier F5 system", "B" corresponds to "DCPP system", "C" corresponds to "a two-tier F5 system", "D" corresponds to "SLB system", and "E" corresponds to "application service".
According to an embodiment of the disclosure, the node information includes at least a node name, a port of the node, an environment identifier, domain name information, and the like. Wherein the domain name information includes: domain name and context root.
In operation S220, a provisioning operation is performed on the link nodes through the node information in the configuration order.
Specifically, the above-mentioned environment link relationship from the access initiator to the access target is also taken as an example. The order in which the provisioning operations for the nodes in the environmental link are performed is: "D- > C- > B- > A", i.e., the supply operation is performed on "D" first, and then the supply operation is performed on "C", "B" and "A" in order of the arrows.
It should be noted that, in the embodiment of the present disclosure, the above-described supplying operation for the nodes in the environmental link is a serial process. Therefore, there is no case where a plurality of nodes execute the supply operation in parallel at the same time.
In operation S230, in case the supplying operation is successful, a detecting operation is performed on the environmental link in the configuration order.
According to an embodiment of the disclosure, the performing the detection operation on the environmental link according to the configuration sequence includes: setting a fixed detection point and a variable detection point, wherein the fixed detection point corresponds to the query target end, and the variable detection point corresponds to other non-access target end nodes; and sequentially changing the variable detection points according to the configuration sequence; and sequentially detecting whether the variable detection point to the fixed detection point are normal or not.
Specifically, taking the above-mentioned relationship (or called network relationship) from the access initiator to the access target as an example, the detection operation of the nodes in the environmental link is performed according to the following sequence: "D- > E", "C- > E", "B- > E" and "A- > E". The point "E" is an application service, that is, the access target, and the fixed detection point is set on the point "E", and the variable detection points are set on the points "a", "B", "C" and "D". The variable detection points are changed in order from "D" to "a" in order to detect the patency of different nodes to "application service", i.e., to detect whether "application service is accessible.
Of course, the above operation S230 may be performed after the successful completion of the provisioning operation of all nodes in the environmental link. That is, after the supply operation is completed by "a", "B", "C" and "D", the following are sequentially performed in the above detection order: "D- > E", "C- > E", "B- > E" and "A- > E". The operation S230 may be performed after two adjacent nodes in the environmental link complete the provisioning operation. That is, after the supply operation is completed for "D", the detection operation is performed for "D" - > E ", and then, after the supply operation is completed for" C ", the detection operation is performed for" C "- > E", thereby reciprocating.
It should be noted that there are many different schemes for performing the above detection operation.
According to an embodiment of the present disclosure, the execution order of the detection operation may also be to execute the detection operation on the neighboring node in the above configuration order.
Specifically, the detection operation for the nodes in the environmental link is performed according to the following sequence: "D- > E", "C- > D", "B- > C" and "A- > B". But this solution requires two variable detection points to be provided on different nodes.
According to an embodiment of the present disclosure, the execution order of the detection operations may be performed in reverse order of the above-described configuration order.
Specifically, when performed in reverse order of the above configuration order, two cases are divided: setting a variable detection point and a fixed detection point; and setting two variable detection points. For the first case, the detection operation on the nodes in the environmental link is performed according to the following sequence: "A- > E", "B- > E", "C- > E" and "D- > E". For the second case, the detection operation on the nodes in the environmental link is performed according to the following sequence: "A- > B", "B- > C", "C- > D" and "D- > E". Of course, the above-described reverse order execution detection operation in the configuration order can only be executed after the successful completion of the provisioning operation for all nodes in the environmental link. Therefore, the execution bar of the scheme of the execution sequence of such detection operation is severe, and the adaptability is poor. In the first case, if access failure occurs in the middle, fault location is complicated, and time overhead is increased.
In the embodiment of the disclosure, one variable detection point and one fixed detection point are adopted, and only the change is needed when the detection is performed, so that the configuration flow of the detection point is saved. Meanwhile, the adopted configuration sequence carries out environment link detection, so that the scheme can adapt to a large number of scenes.
According to an embodiment of the present disclosure, the method further comprises: recording an execution point when a provisioning operation is performed on a link node by the node information in the configuration order and/or when a detection is performed on the environmental link in the configuration order.
Of course, the record of the execution point can also be an operation with different granularity. For one supply operation or one detection operation, there are also many sub-operations, and two cases, that is, execution success and execution failure, occur when individual sub-operations are executed in the supply operation or when individual sub-operations are executed in the detection operation. Of course, the above record of execution points does not limit the granularity of execution. Thus, the rollback operation can be performed by the already recorded execution point, and the efficiency of the supply operation and the detection operation of the environmental link can be improved as a whole. The rollback operation may be triggered by timing detection of a fault, and may be performed if the problem is not resolved.
In the embodiment of the disclosure, a method for supplying and detecting an environmental link is provided, and a multi-node serial supply operation is performed by adopting a sequence from a target end to an access end, so that quick supply of the environmental link is realized, and the time for readying the environmental link is shortened. Meanwhile, serial detection operation is carried out on each node in the environment link by adopting the sequence from the target end to the access end, so that a fault point can be rapidly positioned under the condition of abnormal access, and unnecessary time expenditure is avoided.
Fig. 3 schematically illustrates a flow chart of a method of feeding operation according to an embodiment of the present disclosure.
As shown in fig. 3, a supply operation method of this embodiment includes operations S310 to S330, and at least a part of the above operations S220 may be performed by operations S310 to S330.
In operation S310, when the current node is the head end node of the configuration sequence, call information of the head end node is obtained, where the call information of the head end node is from the node information.
In operation S320, the head-end node is invoked based on the invocation information of the head-end node.
In operation S330, in the case that the invocation of the head-end node is successful, an activation operation is performed on the node device corresponding to the head-end node.
According to an embodiment of the present disclosure, the activating operation includes: applying for node equipment; acquiring node configuration information under the condition that the node equipment is applied successfully, wherein the node configuration information is from the node information; and configuring the node device based on the node configuration information.
Specifically, in performing the supply operation, the "application service" is not necessarily configured, and thus. In the embodiment of the present disclosure, taking the configuration sequence in the above-described environmental link as an example, when the head-end node is "D", that is, when the head-end node is "SLB system". Analyzing the node information and obtaining the call information of the SLB system. And generating a calling instruction based on the calling information, and calling the SLB system through the calling instruction. And recording the current execution node S0 at this time, wherein the execution point S0 is used for performing problem checking and solving in case of failure of the SLB system call, and returning to the execution point S0 after the next time without restarting the whole flow from the initial step.
And under the condition that the system call is successful, applying for equipment corresponding to the SLB system. And under the condition that the equipment application is successful, acquiring node configuration information (namely, configuration information aiming at equipment corresponding to an SLB system) in the node information, and performing node configuration. The application flow of the SLB device is an encapsulated automation flow, which is not described herein.
It should be noted that, in the case that the configuration of the node "SLB system" is successful, the "SLB system" down-hook IP and the down-hook port are returned.
In the embodiment of the present disclosure, for call information in the provisioning operation of the head-end node, the call information needs to be obtained from node information input by a user, so as to start the provisioning operation flow of the head-end node.
Fig. 4 schematically illustrates a flow chart of another method of feeding operation according to an embodiment of the present disclosure.
As shown in fig. 4, a supply operation method of this embodiment includes operations S410 to S430, and at least a part of the above-described operation S220 may be performed by operations S410 to S430.
In operation S410, when the current node is a non-head-end node in the configuration order, call information of the non-head-end node is obtained, where the call information of the non-head-end node is generated when the last node device is successfully activated.
In operation S420, the non-head-end node is invoked based on the invocation information of the non-head-end node.
In operation S430, in the case that the call to the non-head-end node is successful, an activation operation is performed on the node device corresponding to the non-head-end node.
Specifically, in the embodiment of the present disclosure, taking the above environmental link as an example, the above non-head-end node includes a "two-tier F5 system", a "DCPP system", and a "one-tier F5 system". When the "one-tier F5 system" supply operation is performed, the under-hook IP and the under-hook port of the above-described "SLB system" are acquired. And generating a call instruction for the 'two-layer F5 system' based on the hanging IP and the hanging port so as to execute node call. And at this point records the current executing node S1.
And under the condition that the system call is successful, performing two-layer F5 equipment application. And under the condition that the application of the two-layer F5 equipment is successful, acquiring node configuration information in the node information, and carrying out node configuration. The application process of the two-layer F5 device is an encapsulated automation process, and will not be described herein.
And under the condition that the configuration of the node 'two-layer F5 system' is successful, returning the under-hanging IP and the under-hanging port of the 'two-layer F5 system'. The "two-layer F5 system" down-hang IP and down-hang port are used to generate call instructions for the "DCPP system" to execute node calls. And at this point the current executing node S2 is recorded.
And under the condition that the system call is successful, performing DCPP equipment application. And under the condition that the DCPP equipment is successfully applied, acquiring node configuration information in the node information, and carrying out node configuration. The application flow of the F5 device is an encapsulated automation flow, which is not described herein.
And under the condition that the node DCPP system is successfully configured, returning the down IP and the down ports of the DCPP system. The "DCPP system" down-hang IP and down-hang port are used to generate the call instruction of "one layer F5 system" to execute the node call. And at this point records the current executing node S3.
And under the condition that the system call is successful, performing a layer of F5 equipment application. And under the condition that one layer of F5 equipment is applied successfully, acquiring node configuration information in the node information, and carrying out node configuration. The application process of one layer of F5 equipment is an encapsulated automation process, and will not be described herein.
In the embodiment of the present disclosure, for the call information in the supply operation of the non-head-end node, when the previous node needs to be applied successfully, the obtaining is completed, and then the supply operation flow of a certain node is opened.
Fig. 5 schematically illustrates a flow of another feed operation method according to an embodiment of the present disclosure.
As shown in fig. 5, a supply operation method of this embodiment includes operations S510 to S540, and operations S510 to S540 are performed after operation S430 described above.
In operation S510, domain name invocation information is obtained, where the domain name invocation information is from the node information.
In operation S520, a domain name service is invoked based on the domain name invocation information.
In operation S530, in case that the invocation of the domain name service is successful, domain name configuration information is acquired, wherein the domain name configuration information is from the node information.
In operation S540, a domain name of the end link node is configured based on the domain name configuration information.
Specifically, the domain name calling information is obtained, and a domain name calling instruction is generated to call a domain name system. And records the current execution point as S5.
And under the condition that the system call is successful, applying for the domain name. And under the condition that the domain name application is successful, obtaining domain name configuration information in the node information, and completing domain name configuration. The domain name of the application is the domain name of the "one-layer F5 system".
Based on the above method for providing and detecting an environmental link, the disclosure also provides an apparatus for providing and detecting an environmental link. The device will be described in detail below in connection with fig. 6.
Fig. 6 schematically illustrates a block diagram of an environmental link supply and detection apparatus according to an embodiment of the present disclosure.
As shown in fig. 6, the environmental link supplying and detecting apparatus 600 of this embodiment includes a receiving module 610, a supplying module 620, and a detecting module 630.
The receiving module 610 is configured to receive a user request, where the user request includes a configuration order and node information, and the configuration order is an order of an environmental link from an access target to an access initiator. In an embodiment, the receiving module 810 may be configured to perform the operation S210 described above, which is not described herein.
The provisioning module 620 is configured to perform provisioning operations on the link nodes according to the configuration order through the node information. In an embodiment, the supplying module 820 may be used to perform the operation S220 described above, which is not described herein.
The detection module 630 is configured to perform a detection operation on the environmental link according to the configuration order if the provisioning operation is successful. In an embodiment, the detection module 830 may be configured to perform the operation S230 described above, which is not described herein.
In the embodiment of the disclosure, a method for supplying and detecting an environmental link is provided, and a multi-node serial supply operation is performed by adopting a sequence from a target end to an access end, so that quick supply of the environmental link is realized, and the time for readying the environmental link is shortened. Meanwhile, serial detection operation is carried out on each node in the environment link by adopting the sequence from the target end to the access end, so that a fault point can be rapidly positioned under the condition of abnormal access, and unnecessary time expenditure is avoided.
According to an embodiment of the present disclosure, the supplying module 620 is further configured to obtain call information of a head end node when the current node is the head end node in the configuration sequence, where the call information of the head end node is from the node information; calling the head-end node based on the calling information of the head-end node; and under the condition that the calling of the head-end node is successful, executing the activation operation on the node equipment corresponding to the head-end node.
According to an embodiment of the present disclosure, the supplying module 620 is further configured to obtain, when the current node is a non-head-end node in the configuration order, call information of the non-head-end node, where the call information of the non-head-end node is generated when activation of the previous node device is successful; calling the non-head-end node based on the calling information of the non-head-end node; and under the condition that the non-head-end node is successfully invoked, executing an activation operation on the node equipment corresponding to the non-head-end node.
According to an embodiment of the present disclosure, the activating operation includes: applying for node equipment; acquiring node configuration information under the condition that the node equipment is applied successfully, wherein the node configuration information is from the node information; and configuring the node device based on the node configuration information.
According to the embodiment of the disclosure, the device further comprises a domain name configuration module, wherein the domain name configuration module is used for acquiring domain name calling information, and the domain name calling information is from the node information; calling domain name service based on the domain name calling information; acquiring domain name configuration information under the condition that the calling of the domain name service is successful, wherein the domain name configuration information is from the node information; and configuring a domain name of the end link node based on the domain name configuration information.
According to an embodiment of the present disclosure, the detection module 630 is further configured to set a fixed detection point and a variable detection point, where the fixed detection point corresponds to the access target end, and the variable detection point corresponds to other non-access target end nodes; and sequentially changing the variable detection points according to the configuration sequence; and sequentially detecting whether the variable detection point to the fixed detection point are normal or not.
According to an embodiment of the disclosure, the apparatus further includes an execution point recording module configured to record an execution point when the provisioning operation is performed on the link node according to the configuration order by the node information and/or when the detection is performed on the environmental link according to the configuration order.
Any of the receiving module 610, the supplying module 620, and the detecting module 630 may be combined in one module to be implemented, or any of the modules may be split into a plurality of modules according to an embodiment of the present disclosure. Or at least some of the functionality of one or more of the modules may be combined with, and implemented in, at least some of the functionality of other modules. According to embodiments of the present disclosure, at least one of the receiving module 610, the supplying module 620, and the detecting module 630 may be implemented at least in part as a hardware circuit, such as a Field Programmable Gate Array (FPGA), a Programmable Logic Array (PLA), a system on a chip, a system on a substrate, a system on a package, an Application Specific Integrated Circuit (ASIC), or may be implemented in hardware or firmware in any other reasonable way of integrating or packaging circuits, or in any one of or a suitable combination of three of software, hardware, and firmware. Or at least one of the receiving module 610, the supplying module 620 and the detecting module 630 may be at least partially implemented as a computer program module, which when run may perform the corresponding functions.
Fig. 7 schematically illustrates a block diagram of an electronic device adapted to implement an ambient link provisioning and detection method according to an embodiment of the disclosure.
As shown in fig. 7, an electronic device 700 according to an embodiment of the present disclosure includes a processor 701 that can perform various appropriate actions and processes according to a program stored in a Read Only Memory (ROM) 702 or a program loaded from a storage section 708 into a Random Access Memory (RAM) 703. The processor 701 may include, for example, a general purpose microprocessor (e.g., a CPU), an instruction set processor and/or an associated chipset and/or a special purpose microprocessor (e.g., an Application Specific Integrated Circuit (ASIC)), or the like. The processor 701 may also include on-board memory for caching purposes. The processor 701 may comprise a single processing unit or a plurality of processing units for performing different actions of the method flows according to embodiments of the disclosure.
In the RAM 703, various programs and data necessary for the operation of the electronic apparatus 700 are stored. The processor 701, the ROM 702, and the RAM 703 are connected to each other through a bus 704. The processor 701 performs various operations of the method flow according to the embodiments of the present disclosure by executing programs in the ROM 702 and/or the RAM 703. Note that the program may be stored in one or more memories other than the ROM 702 and the RAM 703. The processor 701 may also perform various operations of the method flow according to embodiments of the present disclosure by executing programs stored in the one or more memories.
According to an embodiment of the present disclosure, the electronic device 700 may further include an input/output (I/O) interface 705, the input/output (I/O) interface 705 also being connected to the bus 704. The electronic device 700 may also include one or more of the following components connected to the I/O interface 705: an input section 706 including a keyboard, a mouse, and the like; an output portion 707 including a Cathode Ray Tube (CRT), a Liquid Crystal Display (LCD), and the like, a speaker, and the like; a storage section 708 including a hard disk or the like; and a communication section 709 including a network interface card such as a LAN card, a modem, or the like. The communication section 709 performs communication processing via a network such as the internet. The drive 710 is also connected to the I/O interface 705 as needed. A removable medium 711 such as a magnetic disk, an optical disk, a magneto-optical disk, a semiconductor memory, or the like is mounted on the drive 710 as necessary, so that a computer program read therefrom is mounted into the storage section 708 as necessary.
The present disclosure also provides a computer-readable storage medium that may be embodied in the apparatus/device/system described in the above embodiments; or may exist alone without being assembled into the apparatus/device/system. The computer-readable storage medium carries one or more programs which, when executed, implement methods in accordance with embodiments of the present disclosure.
According to embodiments of the present disclosure, the computer-readable storage medium may be a non-volatile computer-readable storage medium, which may include, for example, but is not limited to: a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the context of this disclosure, a computer-readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. For example, according to embodiments of the present disclosure, the computer-readable storage medium may include ROM 702 and/or RAM 703 and/or one or more memories other than ROM 702 and RAM 703 described above.
Embodiments of the present disclosure also include a computer program product comprising a computer program containing program code for performing the methods shown in the flowcharts. The program code, when executed in a computer system, causes the computer system to implement the item recommendation method provided by embodiments of the present disclosure.
The above-described functions defined in the system/apparatus of the embodiments of the present disclosure are performed when the computer program is executed by the processor 701. The systems, apparatus, modules, units, etc. described above may be implemented by computer program modules according to embodiments of the disclosure.
In one embodiment, the computer program may be based on a tangible storage medium such as an optical storage device, a magnetic storage device, or the like. In another embodiment, the computer program may also be transmitted, distributed over a network medium in the form of signals, downloaded and installed via the communication section 709, and/or installed from the removable medium 711. The computer program may include program code that may be transmitted using any appropriate network medium, including but not limited to: wireless, wired, etc., or any suitable combination of the foregoing.
In such an embodiment, the computer program may be downloaded and installed from a network via the communication portion 709, and/or installed from the removable medium 711. The above-described functions defined in the system of the embodiments of the present disclosure are performed when the computer program is executed by the processor 701. The systems, devices, apparatus, modules, units, etc. described above may be implemented by computer program modules according to embodiments of the disclosure.
According to embodiments of the present disclosure, program code for carrying out computer programs provided by embodiments of the present disclosure may be written in any combination of one or more programming languages, and in particular, such computer programs may be implemented in high-level procedural and/or object-oriented programming languages, and/or assembly/machine languages. Programming languages include, but are not limited to, such as Java, c++, python, "C" or similar programming languages. The program code may execute entirely on the user's computing device, partly on the user's device, partly on a remote computing device, or entirely on the remote computing device or server. In the case of remote computing devices, the remote computing device may be connected to the user computing device through any kind of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or may be connected to an external computing device (e.g., connected via the Internet using an Internet service provider).
The flowcharts and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present disclosure. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams or flowchart illustration, and combinations of blocks in the block diagrams or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
Those skilled in the art will appreciate that the features recited in the various embodiments of the disclosure and/or in the claims may be provided in a variety of combinations and/or combinations, even if such combinations or combinations are not explicitly recited in the disclosure. In particular, the features recited in the various embodiments of the present disclosure and/or the claims may be variously combined and/or combined without departing from the spirit and teachings of the present disclosure. All such combinations and/or combinations fall within the scope of the present disclosure.
The embodiments of the present disclosure are described above. These examples are for illustrative purposes only and are not intended to limit the scope of the present disclosure. Although the embodiments are described above separately, this does not mean that the measures in the embodiments cannot be used advantageously in combination. The scope of the disclosure is defined by the appended claims and equivalents thereof. Various alternatives and modifications can be made by those skilled in the art without departing from the scope of the disclosure, and such alternatives and modifications are intended to fall within the scope of the disclosure.
Claims (9)
1. An environmental link provisioning and detection method, comprising:
receiving a user request, wherein the user request comprises a configuration sequence and node information, and the configuration sequence is the sequence of nodes in an environment link from an access target end to an access initiating end;
according to the configuration sequence, executing a supply operation on the link nodes through the node information; and
In case that the supplying operation is successful, performing a detecting operation on the environmental link according to the configuration order;
Wherein said performing a provisioning operation on a link node by said node information according to said configuration order comprises: when the current node is the head-end node of the configuration sequence, acquiring calling information of the head-end node, wherein the calling information of the head-end node is from the node information; calling the head-end node based on the calling information of the head-end node; and under the condition that the calling of the head-end node is successful, executing an activating operation on the node equipment corresponding to the head-end node;
Wherein, according to the configuration sequence, the supplying operation is executed to the link node through the node information, and the method further comprises: when the current node is a non-head-end node of the configuration sequence, acquiring calling information of the non-head-end node, wherein the calling information of the non-head-end node is generated under the condition that the last node equipment is successfully activated; calling the non-head-end node based on the calling information of the non-head-end node; and under the condition that the non-head-end node is successfully invoked, executing an activation operation on the node equipment corresponding to the non-head-end node.
2. The method of claim 1, wherein the activating operation comprises:
Applying for node equipment;
acquiring node configuration information under the condition that the node equipment is applied successfully, wherein the node configuration information is from the node information; and
And configuring the node equipment based on the node configuration information.
3. The method of claim 1, wherein after the performing an activation operation on the node device corresponding to the non-head-end node, the method further comprises:
acquiring domain name calling information, wherein the domain name calling information is from the node information;
calling domain name service based on the domain name calling information;
acquiring domain name configuration information under the condition that the calling of the domain name service is successful, wherein the domain name configuration information is from the node information; and
And configuring the domain name of the non-head-end node based on the domain name configuration information.
4. The method of claim 1, wherein the performing detection operations on the environmental links in the configuration order comprises:
setting a fixed detection point and a variable detection point, wherein the fixed detection point corresponds to the access target end, and the variable detection point corresponds to other non-access target end nodes; and
Sequentially changing the variable detection points according to the configuration sequence; and
And sequentially detecting whether the variable detection point to the fixed detection point are normal or not.
5. The method of claim 1, wherein the method further comprises:
Recording an execution point when a provisioning operation is performed on a link node by the node information in the configuration order and/or when a detection is performed on the environmental link in the configuration order.
6. An environmental link provision and detection apparatus, the apparatus comprising: a receiving module, a supplying module and a detecting module,
Wherein,
The receiving module is used for receiving a user request, wherein the user request comprises a configuration sequence and node information, and the configuration sequence is the sequence of an environment link from an access target end to an access initiating end;
the supply module is used for executing supply operation on the link nodes according to the configuration sequence through the node information; and
The detection module is used for executing detection operation on the environment link according to the configuration sequence under the condition that the supply operation is successful;
Wherein said performing a provisioning operation on a link node by said node information according to said configuration order comprises: when the current node is the head-end node of the configuration sequence, acquiring calling information of the head-end node, wherein the calling information of the head-end node is from the node information; calling the head-end node based on the calling information of the head-end node; and under the condition that the calling of the head-end node is successful, executing an activating operation on the node equipment corresponding to the head-end node;
Wherein, according to the configuration sequence, the supplying operation is executed to the link node through the node information, and the method further comprises: when the current node is a non-head-end node of the configuration sequence, acquiring calling information of the non-head-end node, wherein the calling information of the non-head-end node is generated under the condition that the last node equipment is successfully activated; calling the non-head-end node based on the calling information of the non-head-end node; and under the condition that the non-head-end node is successfully invoked, executing an activation operation on the node equipment corresponding to the non-head-end node.
7. An electronic device, comprising:
One or more processors;
Storage means for storing one or more programs,
Wherein the one or more programs, when executed by the one or more processors, cause the one or more processors to perform the method of any of claims 1-5.
8. A computer readable storage medium having stored thereon executable instructions which, when executed by a processor, cause the processor to perform the method according to any of claims 1-5.
9. A computer program product comprising a computer program which, when executed by a processor, implements the method according to any one of claims 1 to 5.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210749633.7A CN115134228B (en) | 2022-06-28 | Method, apparatus, device, medium and program product for environment link provisioning and detection |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210749633.7A CN115134228B (en) | 2022-06-28 | Method, apparatus, device, medium and program product for environment link provisioning and detection |
Publications (2)
Publication Number | Publication Date |
---|---|
CN115134228A CN115134228A (en) | 2022-09-30 |
CN115134228B true CN115134228B (en) | 2024-11-15 |
Family
ID=
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1815970A (en) * | 2005-02-01 | 2006-08-09 | 华为技术有限公司 | Method for detecting network chain fault and positioning said fault |
CN113778545A (en) * | 2020-11-09 | 2021-12-10 | 北京沃东天骏信息技术有限公司 | Data processing method, device, equipment and storage medium |
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1815970A (en) * | 2005-02-01 | 2006-08-09 | 华为技术有限公司 | Method for detecting network chain fault and positioning said fault |
CN113778545A (en) * | 2020-11-09 | 2021-12-10 | 北京沃东天骏信息技术有限公司 | Data processing method, device, equipment and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10642725B2 (en) | Automated test generation for multi-interface enterprise virtualization management environment | |
US11055192B2 (en) | Logging implementation in micro-service applications | |
US10264059B2 (en) | Determining server level availability and resource allocations based on workload level availability requirements | |
CN107870845A (en) | Towards the management method and system of micro services framework applications | |
US20190317888A1 (en) | Application testing for security vulnerabilities | |
US10572373B2 (en) | Automated test generation for multi-interface and multi-platform enterprise virtualization management environment | |
CN112463729B (en) | Data file warehousing method and device, electronic equipment and medium | |
CA3059719C (en) | Payment processing method, device, medium and electronic device | |
CN111598575A (en) | Business process control method and device, electronic equipment and readable storage medium | |
CA3159291A1 (en) | Virtual workspace experience visualization and optimization | |
CN114237821B (en) | Method and device for finding out Kubernetes container cluster, electronic equipment and storage medium | |
CN113392002B (en) | Test system construction method, device, equipment and storage medium | |
CN113032256B (en) | Automated testing method, apparatus, computer system, and readable storage medium | |
US11330068B2 (en) | Methods and systems for recording user operations on a cloud management platform | |
CN115134228B (en) | Method, apparatus, device, medium and program product for environment link provisioning and detection | |
CN113190812A (en) | Login method, system, electronic equipment and storage medium | |
US9934019B1 (en) | Application function conversion to a service | |
CN113535568B (en) | Verification method, device, equipment and medium for application deployment version | |
CN112506781B (en) | Test monitoring method, device, electronic equipment, storage medium and program product | |
CN116302561A (en) | State control method, device, equipment and storage medium for application instance | |
CN115134228A (en) | Environment link supply and detection method, device, equipment, medium and program product | |
CN113535590A (en) | Program testing method and device | |
CN113392311A (en) | Field searching method, field searching device, electronic equipment and storage medium | |
CN115484149B (en) | Network switching method, network switching device, electronic equipment and storage medium | |
US20230318925A1 (en) | Local arrangement of remote deployment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant |