CN110572442A - Method and system for configuring file path - Google Patents

Method and system for configuring file path Download PDF

Info

Publication number
CN110572442A
CN110572442A CN201910766728.8A CN201910766728A CN110572442A CN 110572442 A CN110572442 A CN 110572442A CN 201910766728 A CN201910766728 A CN 201910766728A CN 110572442 A CN110572442 A CN 110572442A
Authority
CN
China
Prior art keywords
configuration
management
target machine
file
server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN201910766728.8A
Other languages
Chinese (zh)
Inventor
尹传文
吴峰
郭伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Yidianshikong Network Co Ltd
Original Assignee
Shanghai Yidianshikong Network Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Yidianshikong Network Co Ltd filed Critical Shanghai Yidianshikong Network Co Ltd
Priority to CN201910766728.8A priority Critical patent/CN110572442A/en
Publication of CN110572442A publication Critical patent/CN110572442A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0803Configuration setting
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0803Configuration setting
    • H04L41/0813Configuration setting characterised by the conditions triggering a change of settings
    • H04L41/082Configuration setting characterised by the conditions triggering a change of settings the condition being updates or upgrades of network functionality
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/2866Architectures; Arrangements
    • H04L67/30Profiles
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/56Provisioning of proxy services

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Stored Programmes (AREA)

Abstract

the application discloses a method and a system for configuring file paths, wherein the method comprises the following steps: the server side is in long connection communication with the configuration management background through the first application program; the target machine receives the configuration instruction; the target machine feeds back the running state to the server; the configuration management background performs system management, project management, classification management, machine management, agent management or configuration management through RBAC authority; the user creates configuration items and classifications, and creates a plurality of second configuration files under the classifications; selecting data of a specified version, and sending the data to a specified target machine list; specifying an identifier; storing the identification to a specified directory; suffix format. According to the method for configuring the file path, all configuration information can be managed in a centralized mode in a configuration center management background, and can also be managed according to role authority, and operation is very convenient and fast.

Description

Method and system for configuring file path
Technical Field
the present application relates to the field of communications, and in particular, to a method and system for configuring a file path.
Background
the traditional configuration file is hard-coded in a program or written in a certain configuration file of a target machine, and once the modified configuration file is required to be logged in the target machine for modification, the modified configuration file is published through a publishing system. It becomes more cumbersome if batch modification situations (such as server migration) are encountered. Or when a certain configuration before the user needs to be found, the user basically has no ability. In addition, if the configuration file is modified and the resident memory application needs to be restarted to reload the configuration, the conventional practice is difficult to accept.
disclosure of Invention
The present application provides a method for configuring a file path, including:
the server side is in long connection communication with a configuration management background through a first application program, and the configuration management background sends a configuration instruction to the server;
The target machine receives the configuration instruction, and updates a first configuration file in the target machine through a second application program according to the configuration instruction, or starts and stops a third application program in the target machine;
The target machine feeds back the running state to the server;
the configuration management background performs system management, project management, classification management, machine management, agent management or configuration management through RBAC authority; the user creates configuration items and classifications, and creates a plurality of second configuration files under the classifications, wherein the second configuration files are stored by using a json format; after the second configuration file is created or edited successfully, selecting the data of the specified version and sending the data to the specified target machine list;
Specifying an identifier for the second configuration file;
The target machine stores the target machine to a specified directory according to the identification;
unifying a suffix format of the stored second configuration file.
optionally, the identification is a key, a namespace, or a combination of both.
Optionally, the server side maintains long connection communication with the configuration management background through a websocket, and sends the configuration instruction to the target machine through a TCP protocol.
Optionally, updating the first configuration file in the target machine comprises: the method comprises the steps of active updating and automatic updating; the active update comprises the following steps: using a cloud configuration management background, and sending updated configuration information to a configuration agent service program of a target machine through a button of 'configuration issuing'; after the agent service program receives the 'issuing' instruction, the new configuration information is written into the path of the specified configuration file according to the rule; the automatic updating includes: when the configuration information of the cloud configuration center is stored, automatically sending the updated configuration information to a configuration agent service program of a target machine; then the same operation of sending down configuration as the active update is completed.
Optionally, when the second configuration file is stored, the version number of the old data before modification is established and stored, and then the current configuration is updated.
optionally, when the configuration information is issued, a specific version is selected for release or rollback.
According to another aspect of the present application, there is also provided a system for configuring a file path, comprising: the system comprises a server and a target machine, wherein the server is in long connection communication with a configuration management background through a first application program, and the configuration management background sends a configuration instruction to the server; the target machine receives the configuration instruction, and creates, modifies or deletes a first configuration file in the target machine through a second application program according to the configuration instruction, or starts and stops a third application program in the target machine; the target machine feeds back the running state to the server; the configuration management background performs system management, project management, classification management, machine management, agent management or configuration management through RBAC authority; the user creates configuration items and classifications, and creates a plurality of second configuration files under the classifications, wherein the second configuration files are stored by using a json format; after the second configuration file is created or edited successfully, selecting the data of the specified version and sending the data to the specified target machine list; the server terminal appoints an identifier for the second configuration file; the target machine stores the target machine to a specified directory according to the identification; the target machine unifies a suffix format of the stored second configuration file.
According to another aspect of the present application, there is also provided a computer device comprising a memory, a processor and a computer program stored in the memory and executable by the processor, the processor implementing the method of any one of the above when executing the computer program.
according to another aspect of the application, there is also provided a computer-readable storage medium, a non-volatile readable storage medium, having stored therein a computer program, which when executed by a processor, implements the method of any of the above.
according to another aspect of the application, there is also provided a computer program product comprising computer readable code which, when executed by a computer device, causes the computer device to perform the method of any of the above.
According to the cloud configuration scheme based on the proxy service, a proxy service program is installed on all target machines, long-connection communication is established between the proxy service and the service of the cloud configuration center, configuration information is issued to the target machines, and meanwhile, high-availability cloud configuration functions are achieved through the schemes of machine survival detection, configuration information version management, specific configuration application management and the like. The method is mainly used for issuing application configuration in the local area network, configuration information of the target machine is uniformly managed through the configuration agent service and the configuration center, and ultra-high-efficiency network communication is carried out in the range of the local area network, so that a high-performance and high-availability cloud configuration service system is established. Once a certain configuration needs to be changed, program codes do not need to be modified, or a target machine does not need to be logged in to modify configuration information, and all operations are realized in a management background of the cloud configuration center. The scheme only provides network services in the local area network, so that the performance and the safety can be guaranteed.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this application, serve to provide a further understanding of the application and to enable other features, objects, and advantages of the application to be more apparent. The drawings and their description illustrate the embodiments of the invention and do not limit it. In the drawings:
FIG. 1 is a schematic flow chart diagram of a method of configuring a file path according to one embodiment of the present application;
FIG. 2 is a flow diagram of proactive update according to one embodiment of the present application;
FIG. 3 is a schematic flow diagram of automatic update according to one embodiment of the present application;
FIG. 4 is a schematic diagram of a computer device according to one embodiment of the present application; and
FIG. 5 is a schematic diagram of a computer-readable storage medium according to one embodiment of the present application.
Detailed Description
In order to make the technical solutions better understood by those skilled in the art, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only partial embodiments of the present application, but not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
It should be noted that the terms "first," "second," and the like in the description and claims of this application and in the drawings described above are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It should be understood that the data so used may be interchanged under appropriate circumstances such that embodiments of the application described herein may be used. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
it should be noted that the embodiments and features of the embodiments in the present application may be combined with each other without conflict. The present application will be described in detail below with reference to the embodiments with reference to the attached drawings.
Referring to fig. 1, the present application provides a method for configuring a file path, including:
s2: the server side is in long connection communication with a configuration management background through a first application program, and the configuration management background sends a configuration instruction to the server;
S4: the target machine receives the configuration instruction, and updates a first configuration file in the target machine through a second application program according to the configuration instruction, or starts and stops a third application program in the target machine;
s6: the target machine feeds back the running state to the server;
S8: the configuration management background performs system management, project management, classification management, machine management, agent management or configuration management through RBAC authority; the user creates configuration items and classifications, and creates a plurality of second configuration files under the classifications, wherein the second configuration files are stored by using a json format; after the second configuration file is created or edited successfully, selecting the data of the specified version and sending the data to the specified target machine list;
s10: specifying an identifier for the second configuration file;
s12: the target machine stores the target machine to a specified directory according to the identification;
s14: unifying a suffix format of the stored second configuration file.
In this embodiment, the identifier is a key, a namespace, or a combination of the two. But not limited thereto.
in an embodiment of the application, the server side is in long connection communication with the configuration management background through a websocket, and the server side sends the configuration instruction to the target machine through a TCP protocol.
the configuration center service is a server application resident in a memory, can be realized by any language or programming tool (such as a swoole server), and needs to support a communication mode of a TCP (transmission control protocol) and a websocket protocol at the same time, wherein the websocket protocol is mainly used for performing long-connection communication with a cloud configuration management background, receiving a relevant instruction of a console and feeding back an operating state of a target machine; the TCP protocol is mainly used for carrying out network communication with a configuration agent program of a target machine and sending configuration information to a remote target machine.
The configuration agent service is a resident application program and is installed on a target machine needing to use the cloud configuration system. The configuration agent service program needs to have enough system authority, can create, modify and delete configuration files on a specified path of the target machine, and can start and stop some application programs on the target machine. And (c) once the agent program is started, establishing a long connection with the configuration center service in the step a and performing connection authentication operation. After the authentication is successful, the configuration agent program can carry out normal data communication with the configuration center service program.
In an embodiment of the application, the configuration management background performs system management, project management, classification management, machine management, agent management or configuration management through the RBAC right; the user creates configuration items and classifications, and creates a plurality of second configuration files under the classifications, wherein the second configuration files are stored by using a json format; and after the second configuration file is created or edited successfully, selecting the data of the specified version and sending the data to the specified target machine list.
When the configuration is created, a key needs to be specified for the configuration, and a namespace can also be set, but the combination of the namespace and the key needs to be unique. After all target machines acquire the configuration information, the configuration files need to be stored under the specified directory (for example,/data/configurations /), the stored sub-directories can be set according to the name space of the configuration files, and finally the configuration files are stored in a unified file suffix format (for example,. conf). For example, the following steps are carried out: for example, a configuration name is "database configuration", its name space is "chelun", its key is "mysql", and its storage path is: "/data/configs/chelun/mysql. conf". Whether the configuration agent service reads and writes the configuration file or the application reads the configuration file, this agreed path rule needs to be followed.
In an embodiment of the present application, updating the first configuration file in the target machine includes: the method comprises the steps of active updating and automatic updating;
Referring to fig. 2, the active update includes:
s411: using a cloud configuration management background, and sending updated configuration information to a configuration agent service program of a target machine through a button of 'configuration issuing';
S412: after the agent service program receives the 'issuing' instruction, the new configuration information is written into the path of the specified configuration file according to the rule;
referring to fig. 3, the automatic updating includes:
s421: when the configuration information of the cloud configuration center is stored, automatically sending the updated configuration information to a configuration agent service program of a target machine;
s422: then the same operation of sending down configuration as the active update is completed.
In an embodiment of the present application, when the second configuration file is stored, the version number of the old data before modification is established and stored, and then the current configuration is updated.
In an embodiment of the present application, when the configuration information is issued, a specific version is selected to be issued or rolled back.
When the configuration information is stored, the old data before modification is established into a version number and stored, and then the current configuration is updated. By recording each piece of data configuration version number information, version management of the configuration information can be realized, and when the configuration information is issued, a specified version can be selected for release or rollback. The function is very effective especially when emergency rollback is required due to misoperation.
the present application further provides a system for configuring a file path, comprising: a server side and a target machine; the server side is in long connection communication with a configuration management background through a first application program, and the configuration management background sends a configuration instruction to the server; the target machine receives the configuration instruction, and creates, modifies or deletes a first configuration file in the target machine through a second application program according to the configuration instruction, or starts and stops a third application program in the target machine; the target machine feeds back the running state to the server; the configuration management background performs system management, project management, classification management, machine management, agent management or configuration management through RBAC authority; the user creates configuration items and classifications, and creates a plurality of second configuration files under the classifications, wherein the second configuration files are stored by using a json format; after the second configuration file is created or edited successfully, selecting the data of the specified version and sending the data to the specified target machine list; the server terminal appoints an identifier for the second configuration file; the target machine stores the target machine to a specified directory according to the identification; the target machine unifies a suffix format of the stored second configuration file.
referring to fig. 2, the present application further provides a computer device including a memory, a processor, and a computer program stored in the memory and executable by the processor, wherein the processor implements the method of any one of the above methods when executing the computer program.
Referring to fig. 3, the present application also provides a computer-readable storage medium, a non-volatile readable storage medium, having stored therein a computer program, which when executed by a processor implements the method of any of the above.
The present application also provides a computer program product comprising computer readable code which, when executed by a computer device, causes the computer device to perform the method of any of the above.
the cloud configuration method and system based on the proxy server provide a configuration information cloud management scheme, which is a configuration management background and provides functions of permission system management, project management, classification management, machine management, proxy management, configuration management and the like based on RBAC. Each user may create their own configuration items and categories and create multiple configuration files under the categories, the configuration files being stored using the json format. And after the configuration file is created or edited successfully, selecting the data of the specified version and issuing the data to the specified target machine list.
The application also provides a configuration file loading scheme, when an application program of a target machine needs to read a certain configuration from the cloud configuration center, the file is searched according to a specified path from a name space + key of the configuration information to the local, if the configuration file does not exist, the configuration file acquires remote configuration information through an api interface provided by the cloud configuration center, and if the acquisition is successful, the configuration information is stored under the specified path from the local according to the rule of the step d, and the configuration information is used at the same time. The principle of loading the configuration file is to read the configuration file from a local path as much as possible, so that abnormal conditions caused by network IO are reduced, the configuration file can be normally used even if the network is unavailable, and the application program can be ensured to normally run. If the application program of the target machine is resident in the memory, the application program needs to be capable of monitoring the change condition of the configuration file in real time, and automatically reloads once the configuration file is found to be changed (monitoring can be realized by using the inotify system api of the linux system).
The application also provides a machine management scheme, and the machine management functions comprise the functions of increasing, deleting, modifying and checking machine information and the automatic online and offline of the target machine. Each piece of configuration information corresponds to a target machine list, and if part of new machines exist in the specified target machine list, the configuration center can establish connection and normally communicate with the new machines, and the machines are automatically added into the machine list of the system; if some machines in the designated target machine list are offline and the configuration center cannot establish connection with the machines or communication fails, the machines are automatically removed from the machine list of the system.
the application also provides a configuration information version management scheme, and when the configuration information is stored, the version number of the old data before modification is established and stored, and then the current configuration is updated. By recording each piece of data configuration version number information, version management of the configuration information can be realized, and when the configuration information is issued, a specified version can be selected for release or rollback. The function is very effective especially when emergency rollback is required due to misoperation.
The application also provides an application configuration management scheme, and when a configuration file is prepared for a certain application of a target machine, a specific survival detection script, a starting script, a stopping script, a restarting script or other pre-scripts, post-scripts and the like can be configured for the application at the same time. By configuring these scripts, it is possible to determine whether they need to be executed when configuration information is issued. If the target application is a program resident in the memory and the modification of the configuration file usually requires restarting the target application to be effective, the configured script can be used for carrying out operations such as remote start-stop, automatic restart and the like on the target application.
The application also provides a configuration information error-correcting scheme, and when the configuration information is created or edited, the visualized JSON editor is used for content editing, so that the condition that the JSON format is incorrect due to handwriting can be avoided. If the JSON format is not problematic, when editing the configuration and finding that the content of the current configuration is greatly different from the content of the previous version (for example, the content length is different by more than 50%), the box is popped on the operation interface to allow the operator to confirm the change information, and the updating operation is executed only when the confirmation is successful.
The application also provides a disaster tolerance scheme of the configuration service, the http service of the configuration center adopts keepalive + nginx to realize dual-computer hot standby, and high availability of the management background and the interface service of the configuration center is ensured. The configuration center service program and the configuration agent service program are monitored by using a super process management tool, and once the service programs are accidentally exited, the service programs are automatically restarted by the super, so that the high availability of the service programs is ensured.
Compared with the prior art, the cloud configuration method and system based on the proxy server have the following advantages:
a. Centralized management: all configuration information can be managed in a centralized way in a configuration center management background and can also be managed according to role authority, and the operation is very convenient.
b. The configuration is flexible: the configured content can be published according to a specified version or specified to a specific machine, and the whole configuration issuing operation is very flexible.
c. Service high performance: the configuration center and the configuration agent directly carry out TCP communication of an intranet, and the method is much more efficient than the traditional http communication mode.
d. Service high availability: the http service adopts a dual-computer hot standby technology, the tcp service adopts a super for process management, and the whole architecture is highly available.
e. and (4) service security: the service is not directly outward, so that the external attack risk is reduced; the service provides an authentication mechanism to ensure the security of the core service; and the communication protocol is subjected to multiple encryption verification, so that the safety of communication data is ensured.
it will be apparent to those skilled in the art that the modules or steps of the present application described above may be implemented by a general purpose computing device, they may be centralized on a single computing device or distributed across a network of multiple computing devices, and they may alternatively be implemented by program code executable by a computing device, such that they may be stored in a storage device and executed by a computing device, or fabricated separately as individual integrated circuit modules, or fabricated as a single integrated circuit module from multiple modules or steps. Thus, the present application is not limited to any specific combination of hardware and software.
the above description is only a preferred embodiment of the present application and is not intended to limit the present application, and various modifications and changes may be made by those skilled in the art. Any modification, equivalent replacement, improvement and the like made within the spirit and principle of the present application shall be included in the protection scope of the present application.

Claims (10)

1. a method of configuring a file path, comprising:
The server side is in long connection communication with a configuration management background through a first application program, and the configuration management background sends a configuration instruction to the server;
The target machine receives the configuration instruction, and updates a first configuration file in the target machine through a second application program according to the configuration instruction, or starts and stops a third application program in the target machine;
The target machine feeds back the running state to the server;
the configuration management background performs system management, project management, classification management, machine management, agent management or configuration management through RBAC authority; the user creates configuration items and classifications, and creates a plurality of second configuration files under the classifications, wherein the second configuration files are stored by using a json format; after the second configuration file is created or edited successfully, selecting the data of the specified version and sending the data to the specified target machine list;
Specifying an identifier for the second configuration file;
the target machine stores the target machine to a specified directory according to the identification;
Unifying a suffix format of the stored second configuration file.
2. The method of configuring a file path of claim 1, wherein the identification is a key, a namespace, or a combination of both.
3. The method of claim 2, wherein the server maintains long connection communication with the configuration management backend through a websocket, and the server sends the configuration instruction to the target machine through a TCP protocol.
4. the method of claim 3, wherein updating the first profile in the target machine comprises: the method comprises the steps of active updating and automatic updating;
the active update comprises the following steps:
Using a cloud configuration management background, and sending updated configuration information to a configuration agent service program of a target machine through a button of 'configuration issuing';
After the agent service program receives the 'issuing' instruction, the new configuration information is written into the path of the specified configuration file according to the rule; the automatic updating includes:
when the configuration information of the cloud configuration center is stored, automatically sending the updated configuration information to a configuration agent service program of a target machine;
Then the same operation of sending down configuration as the active update is completed.
5. The method of claim 4, wherein when storing the second configuration file, the old data before modification is established into a version number and saved, and then the current configuration is updated.
6. The method of claim 5, wherein a specific version is selected for release or rollback when the configuration information is sent down.
7. a system for configuring a file path, comprising: a server side and a target machine;
The server side is in long connection communication with a configuration management background through a first application program, and the configuration management background sends a configuration instruction to the server; the target machine receives the configuration instruction, and creates, modifies or deletes a first configuration file in the target machine through a second application program according to the configuration instruction, or starts and stops a third application program in the target machine; the target machine feeds back the running state to the server; the configuration management background performs system management, project management, classification management, machine management, agent management or configuration management through RBAC authority; the user creates configuration items and classifications, and creates a plurality of second configuration files under the classifications, wherein the second configuration files are stored by using a json format; after the second configuration file is created or edited successfully, selecting the data of the specified version and sending the data to the specified target machine list; the server terminal appoints an identifier for the second configuration file; the target machine stores the target machine to a specified directory according to the identification; the target machine unifies a suffix format of the stored second configuration file.
8. a computer device comprising a memory, a processor and a computer program stored in the memory and executable by the processor, wherein the processor implements the method of any one of claims 1-6 when executing the computer program.
9. A computer-readable storage medium, a non-transitory readable storage medium, having stored therein a computer program, characterized in that the computer program, when executed by a processor, implements the method according to any one of claims 1-6.
10. A computer program product comprising computer readable code that, when executed by a computer device, causes the computer device to perform the method of any of claims 1-6.
CN201910766728.8A 2019-08-15 2019-08-15 Method and system for configuring file path Withdrawn CN110572442A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910766728.8A CN110572442A (en) 2019-08-15 2019-08-15 Method and system for configuring file path

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910766728.8A CN110572442A (en) 2019-08-15 2019-08-15 Method and system for configuring file path

Publications (1)

Publication Number Publication Date
CN110572442A true CN110572442A (en) 2019-12-13

Family

ID=68774024

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910766728.8A Withdrawn CN110572442A (en) 2019-08-15 2019-08-15 Method and system for configuring file path

Country Status (1)

Country Link
CN (1) CN110572442A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114090105A (en) * 2021-02-02 2022-02-25 京东科技信息技术有限公司 System building method and device

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110145322A1 (en) * 2009-12-16 2011-06-16 Landry John A Remote client management
CN104954482A (en) * 2015-06-29 2015-09-30 上海瀚之友信息技术服务有限公司 Configuration management system and method
CN106603281A (en) * 2016-12-07 2017-04-26 乐视控股(北京)有限公司 Configuration file management method and system
CN108566290A (en) * 2018-02-07 2018-09-21 平安科技(深圳)有限公司 service configuration management method, system, storage medium and server
CN109062601A (en) * 2018-08-15 2018-12-21 张家港康得新光电材料有限公司 MES system client-side program update method, device, equipment and medium
CN109660584A (en) * 2017-10-12 2019-04-19 阿里巴巴集团控股有限公司 A kind of method and communication means and communication system of client and the long connection of server foundation

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110145322A1 (en) * 2009-12-16 2011-06-16 Landry John A Remote client management
CN104954482A (en) * 2015-06-29 2015-09-30 上海瀚之友信息技术服务有限公司 Configuration management system and method
CN106603281A (en) * 2016-12-07 2017-04-26 乐视控股(北京)有限公司 Configuration file management method and system
CN109660584A (en) * 2017-10-12 2019-04-19 阿里巴巴集团控股有限公司 A kind of method and communication means and communication system of client and the long connection of server foundation
CN108566290A (en) * 2018-02-07 2018-09-21 平安科技(深圳)有限公司 service configuration management method, system, storage medium and server
CN109062601A (en) * 2018-08-15 2018-12-21 张家港康得新光电材料有限公司 MES system client-side program update method, device, equipment and medium

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114090105A (en) * 2021-02-02 2022-02-25 京东科技信息技术有限公司 System building method and device

Similar Documents

Publication Publication Date Title
CN110569085A (en) configuration file loading method and system
CN110543335A (en) Application program configuration management method and system
CN109491776B (en) Task arranging method and system
US8719386B2 (en) System and method for providing configuration synchronicity
KR101970839B1 (en) Replaying jobs at a secondary location of a service
US9626177B1 (en) Peer to peer upgrade management
CN111309524A (en) Distributed storage system fault recovery method, device, terminal and storage medium
CN113626286A (en) Multi-cluster instance processing method and device, electronic equipment and storage medium
CN110474983A (en) Cloud configuration method and system based on agency service
US8612799B2 (en) Method and apparatus of backing up subversion repository
CN113590169B (en) Application deployment method, application deployment system, and computer-readable storage medium
CN110633174A (en) Disaster recovery switching method, device and computer readable storage medium
CN114637496A (en) Configuration data processing system, method and electronic equipment
CN110519088A (en) Configure service disaster and system
CN110572442A (en) Method and system for configuring file path
CN112130889A (en) Resource management method and device, storage medium and electronic device
CN109587202B (en) Method, device and system for coprocessing between file verification and data processing
CN110572277A (en) Machine management method and system
US9348849B1 (en) Backup client zero-management
CN115080538A (en) Block chain version verification method and device
CN112055849B (en) Exclusive control system and exclusive control method
CN115248746A (en) Data backup method, system and related equipment
CN111125001A (en) Snap copy method, electronic device, and computer program product
CN111274311A (en) Data synchronization method and device for cross-machine-room database
CN111142921A (en) Software upgrading method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication

Application publication date: 20191213

WW01 Invention patent application withdrawn after publication