CN110780891A - Deployment method and deployment device of monitoring system - Google Patents

Deployment method and deployment device of monitoring system Download PDF

Info

Publication number
CN110780891A
CN110780891A CN201911058203.5A CN201911058203A CN110780891A CN 110780891 A CN110780891 A CN 110780891A CN 201911058203 A CN201911058203 A CN 201911058203A CN 110780891 A CN110780891 A CN 110780891A
Authority
CN
China
Prior art keywords
sub
monitoring
program
monitoring program
available area
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201911058203.5A
Other languages
Chinese (zh)
Other versions
CN110780891B (en
Inventor
张永新
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing CHJ Information Technology Co Ltd
Original Assignee
Beijing CHJ Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing CHJ Information Technology Co Ltd filed Critical Beijing CHJ Information Technology Co Ltd
Priority to CN201911058203.5A priority Critical patent/CN110780891B/en
Publication of CN110780891A publication Critical patent/CN110780891A/en
Application granted granted Critical
Publication of CN110780891B publication Critical patent/CN110780891B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/60Software deployment
    • G06F8/61Installation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/3003Monitoring arrangements specially adapted to the computing system or computing system component being monitored
    • G06F11/302Monitoring arrangements specially adapted to the computing system or computing system component being monitored where the computing system component is a software system
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/3065Monitoring arrangements determined by the means or processing involved in reporting the monitored data

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Quality & Reliability (AREA)
  • Software Systems (AREA)
  • Computing Systems (AREA)
  • Mathematical Physics (AREA)
  • Debugging And Monitoring (AREA)

Abstract

The embodiment of the disclosure discloses a deployment method and a deployment device of a monitoring system, relates to the technical field of data monitoring, and can solve the problem that a software engineer cannot know when the monitoring system fails in time in the prior art, so that an application software fault event is easy to occur for a long time. The method of the embodiment of the disclosure mainly comprises: deploying a first monitoring program to a first available area, wherein the first monitoring program is used for monitoring the application program to be monitored; and deploying a second monitoring program in a second available area, wherein the second monitoring program is used for monitoring the first monitoring program, and the first available area and the second available area are used for deploying the application program to be monitored. Compared with the prior art, under the condition that the first monitoring program of the first available area fails, the first monitoring program can still be timely obtained through the second monitoring program, so that the first monitoring program of the first available area can be timely maintained, and the survivability of the application program to be monitored is high.

Description

Deployment method and deployment device of monitoring system
Technical Field
The embodiment of the disclosure relates to the technical field of data monitoring, in particular to a deployment method and a deployment device of a monitoring system.
Background
The development of application software tends to be complicated, the dependency relationship inside the running device is complex, and the operation, maintenance and management of the software need to be monitored.
Generally, application software is deployed in an available Area (AZ), and a monitoring system for monitoring the application software is deployed in the AZ at the same time. After monitoring that the application software is abnormal in operation, the monitoring system can timely notify a software engineer through social software or a mobile phone short message so as to rapidly process and recover software service, and the service quality of the application software can be improved.
However, the monitoring system is at risk of failure for various reasons, and the existing deployment method cannot make the software engineer know when the monitoring system fails in time, so that the application software failure event is easy to occur for a long time.
Disclosure of Invention
The disclosure provides a deployment method and a deployment device of a monitoring system to solve the technical problem of large failure risk of the monitoring system in the prior art, so as to reduce the failure risk of the monitoring system.
The embodiment of the disclosure mainly provides the following technical scheme:
in a first aspect, an embodiment of the present disclosure provides a deployment method of a monitoring system, where the method includes:
deploying a first monitoring program in a first available area, wherein the first monitoring program is used for monitoring the application program to be monitored, and the first available area is used for deploying the application program to be monitored;
and deploying a second monitoring program in a second available area, wherein the second monitoring program is used for monitoring the first monitoring program, and the second available area is used for deploying the application program to be monitored.
In some embodiments, deploying the first monitor in the first available area for deploying the application to be monitored comprises:
and deploying a first sub-monitoring program in the first monitoring program to a first sub-available area in the first available area, and deploying a second sub-monitoring program in the first monitoring program to a second sub-available area in the first available area.
In some embodiments, the first sub-monitoring program and the second sub-monitoring program monitor each other.
In some embodiments, the second monitoring program monitors the second sub-monitoring program;
and the first sub monitoring program and the second monitoring program monitor each other.
In some embodiments, the second monitor program monitors the first sub-monitor program; and the second sub monitoring program and the second monitoring program monitor each other.
In some embodiments, the second sub monitor is backed up in the first sub usable area;
and backing up the first sub monitoring program in the second sub available area.
In some embodiments, if the first sub monitoring program monitors that the second sub monitoring program fails, the monitoring program backed up by the first sub monitoring program is started to execute the application program to be monitored for monitoring the second sub available area;
and if the second sub-monitoring program monitors that the first sub-monitoring program fails, starting the monitoring program backed up by the second sub-monitoring program to execute the application program to be monitored for monitoring the first sub-available area.
In a second aspect, an embodiment of the present disclosure provides a deployment apparatus for a monitoring system, where the deployment apparatus mainly includes:
the system comprises a first deployment unit, a second deployment unit and a monitoring unit, wherein the first deployment unit is used for deploying a first monitoring program in a first available area, the first monitoring program is used for monitoring the application program to be monitored, and the first available area is used for deploying the application program to be monitored;
and the second deployment unit is used for deploying a second monitoring program in a second available area, wherein the second monitoring program is used for monitoring the first monitoring program, and the second available area is used for deploying the application program to be monitored.
In some embodiments, a first deployment unit comprises:
a first sub-deployment module, configured to deploy a first sub-monitor in the first monitor to a first sub-available area in the first available area;
the second sub-deployment module is used for deploying a second sub-monitoring program in the first monitoring program to a second sub-available area in the first available area.
In some embodiments, the first sub-monitoring program and the second sub-monitoring program monitor each other.
In some embodiments, the first sub-monitoring program and the second monitoring program monitor each other; or
And the second sub monitoring program and the second monitoring program monitor each other.
In some embodiments, the first sub-backup unit is configured to backup the second sub-monitoring program in the first sub-available area;
and the second sub-backup unit is used for backing up the first sub-monitoring program in a second sub-available area.
In some embodiments, the first starting unit is configured to start the monitor backed up by the first sub-monitor to execute the application to be monitored for monitoring the second sub-available area if the first sub-monitor monitors that the second sub-monitor is failed;
and the second starting unit is used for starting the monitoring program backed up by the second sub-monitoring program to execute the application program to be monitored for monitoring the first sub-available area if the second sub-monitoring program monitors that the first sub-monitoring program fails.
In a third aspect, an embodiment of the present disclosure provides a storage medium, where the storage medium includes a stored program, and when the program runs, a device in which the storage medium is located is controlled to execute the deployment method of the monitoring system according to the first aspect.
In a fourth aspect, an embodiment of the present disclosure provides a deployment apparatus of a monitoring system, where the deployment apparatus of the monitoring system includes a storage medium; and one or more processors, the storage medium coupled with the processors, the processors configured to execute program instructions stored in the storage medium; the program instructions, when executed, perform the method for deploying a monitoring system of the first aspect.
By the technical scheme, the deployment method and the deployment device of the monitoring system provided by the technical scheme of the invention at least have the following advantages:
in the technical solution provided by the embodiment of the present disclosure, a first monitoring program for monitoring an application program to be monitored is deployed in a first available area, a second monitoring program is deployed in a second available area, and the second monitoring program monitors the first monitoring program. If the first monitoring program of the first available area fails, the second monitoring program deployed in the second available area can be used for acquiring. Compared with the prior art, under the condition that the first monitoring program of the first available area fails, the first monitoring program can still be timely obtained through the second monitoring program, so that the first monitoring program of the first available area can be timely maintained, and the survivability of the application program to be monitored is high.
The foregoing description is only an overview of the embodiments of the present disclosure, and in order to make the technical means of the embodiments of the present disclosure more clearly understood, the embodiments of the present disclosure may be implemented in accordance with the content of the description, and in order to make the foregoing and other objects, features, and advantages of the embodiments of the present disclosure more clearly understood, the following detailed description of the embodiments of the present disclosure is given.
Drawings
Various other advantages and benefits will become apparent to those of ordinary skill in the art upon reading the following detailed description of the preferred embodiments. The drawings are only for purposes of illustrating the preferred embodiments and are not to be construed as limiting the embodiments of the present disclosure. Also, like reference numerals are used to refer to like parts throughout the drawings. In the drawings:
fig. 1 shows a flowchart of a deployment method of a monitoring system provided by an embodiment of the present disclosure;
fig. 2 is a diagram illustrating an example of a deployment method of a monitoring system according to an embodiment of the present disclosure;
fig. 3 is a schematic structural diagram illustrating a deployment apparatus of a monitoring system according to an embodiment of the present disclosure;
fig. 4 shows a schematic structural diagram of a deployment apparatus of a specific monitoring system provided in an embodiment of the present disclosure.
Detailed Description
Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. While exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the disclosure to those skilled in the art.
In a first aspect, as shown in fig. 1, an embodiment of the present disclosure provides a deployment method of a monitoring system, where the method includes:
101. deploying a first monitoring program in a first available area, wherein the first monitoring program is used for monitoring the application program to be monitored, and the first available area is used for deploying the application program to be monitored;
one usable area can be composed of a plurality of data centers, different usable areas are independent on power supply and network, and when one usable area has a problem, other usable areas cannot be influenced. In one area, the usable area is connected with the usable area through a high-speed network, so that low delay is guaranteed.
The available area (e.g., the first available area) in the present application may be an internet data Center (IDC in short), and the IDC refers to a service platform that has perfect devices (including a high-speed internet access bandwidth, a high-performance local area network, a safe and reliable computer room environment, and the like), specialized management, and perfect applications. On the basis of the platform, the IDC service provider provides Internet basic platform services (server hosting, virtual host, mail caching, virtual mail and the like) and various value-added services (such as site renting services, domain name system services, load balancing systems, database systems, data backup services and the like) for the client. Alternatively, the usable area (e.g., the first usable area) in the present application may be a usable area of a cloud platform (public cloud or private cloud).
After the monitoring index of the application program to be monitored exceeds the threshold value, the first monitoring program generates a first warning instruction, and the first warning instruction can be sent to the software engineer through a network, wherein the network sent to the software engineer is not limited to the internet, and can also be a mobile communication network, such as a 2G second generation mobile communication technology, a 3G third generation mobile communication technology, a 4G fourth generation mobile communication technology, a 5G fifth generation mobile communication technology, and the like.
102. And deploying a second monitoring program in a second available area, wherein the second monitoring program is used for monitoring the first monitoring program, and the second available area is used for deploying the application program to be monitored.
The second usable area is a different usable area from the first usable area, and the second usable area and the first usable area may be connected via a high-speed network.
The second monitoring program can monitor the monitoring function abnormality of the first monitoring program, and after the monitoring function of the first monitoring program is abnormal, the second monitoring program can generate a second warning instruction which can be sent to a software engineer through a network.
In the technical solution provided by the embodiment of the present disclosure, a first monitoring program for monitoring an application program to be monitored is deployed in a first available area, a second monitoring program is deployed in a second available area, and the second monitoring program monitors the first monitoring program. If the first monitoring program of the first available area fails, the second monitoring program deployed in the second available area can be used for acquiring. Compared with the prior art, under the condition that the first monitoring program of the first available area fails, the first monitoring program can still be timely obtained through the second monitoring program, so that the first monitoring program of the first available area can be timely maintained, and the survivability of the application program to be monitored is high.
In order to further improve the monitoring reliability of the software to be monitored, the first monitoring program monitors the application program to be monitored in the first available area, and also monitors the second monitoring program in the second available area, after the monitoring function of the second monitoring program is abnormal, the first monitoring program can generate a third warning instruction, and the third warning instruction can be sent to a software engineer through a network. Under the condition that the first monitoring program in the first available area and the second monitoring program in the second available area are not abnormal simultaneously, the reliable and uninterrupted real-time monitoring of the monitoring application program can be ensured.
In response to the situation that the size of the application program is more and more complex, the application program to be monitored generally spans multiple IDCs, multiple regions, multiple available areas, and an application environment corresponding to the multiple available areas, as shown in fig. 2, the first available area includes a first sub available area and a second sub available area for deploying the application program to be monitored, the first monitoring program includes a first sub monitoring program and a second sub monitoring program, step 101 includes:
and deploying a first sub-monitoring program in the first monitoring program to a first sub-available area in the first available area, and deploying a second sub-monitoring program in the first monitoring program to a second sub-available area in the first available area.
After the monitoring index of the application program to be monitored in the first sub available area exceeds the threshold value, the first sub monitoring program generates a first sub warning instruction, and the first sub warning instruction can be sent to a software engineer through a network. And after the monitoring index of the application program to be monitored in the second sub available area exceeds the threshold value, the second sub monitoring program generates a second sub warning instruction, and the second sub warning instruction can be sent to a software engineer through a network.
It is easy to understand that the number of the sub-available areas for deploying the application to be monitored is not limited in practical application, i.e. three or more sub-available areas may be used. The following embodiments of the present application take two sub-available regions as examples, but are not limited thereto. In the two sub-available areas, one of the applications to be monitored in one of the available areas, for example, the first sub-available area, can run the primary service, and the other application to be monitored in the second sub-available area can run the secondary service. The first sub-available area and the second sub-available area can be arranged in the same city, and the first sub-available area and the second sub-available area are interconnected through a high-speed network inside the city, such as an optical fiber, and can form a local area network. The second usable area is respectively located in different cities with the first sub usable area and the second sub usable area, the second usable area is respectively interconnected with the first sub usable area and the second sub usable area through a metropolitan area network, and in some embodiments, the second usable area is respectively interconnected with the first sub usable area and the second sub usable area through a Virtual Private Network (VPN) or a private line. When the network of one city fails, the monitoring programs of the three available areas (the first sub available area, the second sub available area and the second available area) cannot be down at the same time, and a warning instruction cannot be sent to a software engineer.
For a first monitoring program to monitor a second monitoring program, in a specific implementation, the second monitoring program may be used to monitor the second sub-monitoring program, and the first sub-monitoring program and the second monitoring program are implemented by monitoring each other, or the second monitoring program is used to monitor the first sub-monitoring program, and the second sub-monitoring program and the second monitoring program are implemented by monitoring each other. Taking the independent mutual monitoring of the second sub-monitoring program and the second monitoring program as an example, if the first sub-monitoring program is abnormal, the second monitoring program can monitor the abnormality of the first sub-monitoring program and send a warning to a software engineer. If the second sub-monitoring program is abnormal, the second monitoring program can monitor the abnormality of the second sub-monitoring program and send a warning to a software engineer. If the second monitoring program is abnormal, the second sub-monitoring program can monitor the second monitoring program and send a warning to the software engineer. The first available area may be located in one region, the second available area may be located in another region, and the first sub available area, the second sub available area, and the second available area form a center of two places and three places.
For a more traditional data center, two places refer to two regions with a longer distance, the first sub-available region and the second sub-available region are located in one region, the second available region is located in another region, for example, a metropolitan area network in a different region, and three IDCs are located in the three centers.
For a public cloud or a private cloud, two regions of the same cloud (public cloud or private cloud) or two regions of different clouds (public cloud or private cloud), a first sub-available Region and a second sub-available Region are located in one Region, and the second available Region is located in another Region, taking the existing amazon AWS cloud service as an example, there are 9 regions of global AWS cloud service before release meeting in 12 months and 18 days, including: eastern America (North Virginia), Western America (Oregon), Western America (North Carifonia), Europe (Ireland), Asia Tai (Singapore), Asia Tai (Tokyo), Asia Tai (Sydney), south America (St Paul), and the GovCloud area at the Western services government. The AWS chinese (beijing) region would be amazon AWS at the 4 th region in asia-pacific region and also the 10 th region globally. The first sub-usable area and the second sub-usable area may be located in AWS chinese (beijing) area, and the second usable area may be located in asia-pacific (tokyo) area. The three centers refer to three available areas, two places and three centers, so that the monitoring system can detect the unavailable events and send warning instructions in time to inform operation and maintenance personnel that software engineers know the events in time as long as the two public clouds are not two regions and the two public clouds are simultaneously in a short time (such as within 5 seconds), and the monitoring system is repaired in the first time, so that the monitoring transparency and the system availability of the whole software system are improved.
In order to further improve the monitoring reliability of the software to be monitored, the first sub-monitoring program and the second sub-monitoring program can monitor each other. If the first sub-monitoring program is abnormal, the second sub-monitoring program can monitor the abnormality of the first sub-monitoring program and send a warning to a software engineer. If the second sub-monitoring program is abnormal, the first sub-monitoring program can monitor the second sub-monitoring program and send a warning to a software engineer.
In some embodiments of the present application, the second sub monitoring program is backed up in the first sub available area, and after the second sub monitoring program in the second word available area fails, the software engineer may quickly retrieve the backed-up second sub monitoring program from the first sub available area, and quickly monitor the application to be monitored in the second word available area through the backed-up second sub monitoring program. Similarly, the first sub-monitoring program is backed up in the second sub-available area, after the first sub-monitoring program in the first word available area fails, a software engineer can quickly call the backed-up first sub-monitoring program from the second sub-available area, and the application program to be monitored in the first word available area is quickly monitored through the backed-up first sub-monitoring program. In the implementation, the monitoring method can also be automatically implemented by a program, the first sub-monitoring program monitors whether the second sub-monitoring program fails, and if the first sub-monitoring program monitors that the second sub-monitoring program fails, the monitoring program backed up by the first sub-monitoring program is started to execute the application program to be monitored for monitoring the second sub-available area; and the second sub-monitoring program monitors whether the first sub-monitoring program fails or not, and if the second sub-monitoring program monitors that the first sub-monitoring program fails, the monitoring program backed up by the second sub-monitoring program is started to execute the application program to be monitored for monitoring the first sub-available area. That is, if an abnormal event such as unavailability occurs in the monitor of one available area, the monitor backed up by another available area can quickly take over or pull up another monitor instance for monitoring.
In an application environment corresponding to multiple available areas, the following embodiments of the present application take three sub-available areas as an example (not shown), based on the above embodiments, in addition to the first sub-available area and the second sub-available area, the first available area includes a third sub-available area for deploying an application to be monitored, the first sub-available area, the second sub-available area, and the third sub-available area may be arranged in the same city, any two of them are interconnected through a high-speed network inside the city, such as an optical fiber, for example, the three may form a local area network. The second usable area is in different cities with the first, second and third sub usable areas, respectively, and the second usable area is interconnected with the first, second and third sub usable areas through a metropolitan area network, respectively, and in some embodiments, the second usable area is interconnected with the first, second and third sub usable areas through a virtual private network VPN or a private line, respectively. When the network of one city fails, the monitoring programs of the four available areas (the first sub available area, the second sub available area, the third sub available area and the second available area) cannot be simultaneously down, so that the warning instruction cannot be sent to the software engineer.
And the third sub-monitoring program and the first sub-monitoring program can monitor each other. In implementation, the third sub-monitoring program is backed up in the first sub-available area; and backing up the first sub monitoring program in a third sub available area. And if the first sub-monitoring program monitors that the third sub-monitoring program fails, starting the monitoring program backed up by the first sub-monitoring program to execute the application program to be monitored for monitoring the third sub-available area.
Of course, in implementation, the third sub-monitoring program may also monitor the second sub-monitoring program, and in implementation, the third sub-monitoring program is backed up in the second sub-available area; and backing up the second sub monitoring program in a third sub available area. And if the first sub-monitoring program monitors that the second sub-monitoring program and the third sub-monitoring program fail, starting the monitoring program backed up by the first sub-monitoring program to execute the application program to be monitored for monitoring the second sub-available area and the application program to be monitored for monitoring the third sub-available area. If the second sub-monitoring program monitors that the first sub-monitoring program and the third sub-monitoring program fail, starting the monitoring program backed up by the second sub-monitoring program to execute the application program to be monitored for monitoring the first sub-available area and the application program to be monitored for monitoring the third sub-available area. If the third sub-monitoring program monitors that the first sub-monitoring program and the second sub-monitoring program fail, starting the monitoring program backed up by the third sub-monitoring program to execute the application program to be monitored for monitoring the first sub-available area and the application program to be monitored for monitoring the second sub-available area.
In some embodiments, the third sub-monitoring program may also monitor each other with the third monitoring program.
In a second aspect, as shown in fig. 3, another embodiment of the present disclosure further provides a deployment apparatus of a monitoring system, as shown in fig. 3, the deployment apparatus mainly includes:
a first deployment unit 10, configured to deploy a first monitoring program in a first available area, where the first monitoring program is used to monitor the application program to be monitored, and the first available area is used to deploy the application program to be monitored;
the second deployment unit 20 is configured to deploy a second monitoring program in a second available area, where the second monitoring program is used to monitor the first monitoring program, and the second available area is used to deploy an application program to be monitored.
In some embodiments, as shown in FIG. 4, a first deployment unit 10, comprises:
a first sub-deployment module 11, configured to deploy a first sub-monitor in the first monitor to a first sub-available area in the first available area;
a second sub-deployment module 12, configured to deploy a second sub-monitor in the first monitor to a second sub-available area in the first available area.
In some embodiments, the first sub-monitoring program and the second sub-monitoring program monitor each other.
In some embodiments, the second monitoring program monitors the second sub-monitoring program;
and the first sub monitoring program and the second monitoring program monitor each other.
In some embodiments, the second monitor program monitors the first sub-monitor program; and the second sub monitoring program and the second monitoring program monitor each other.
In some embodiments, the first sub-backup unit 30 is configured to backup the second sub-monitoring program in the first sub-available area;
and the second sub-backup unit 40 is used for backing up the first sub-monitoring program in a second sub-available area.
In some embodiments, the first starting unit 50 is configured to start the monitor backed up by the first sub-monitor to execute the application to be monitored for monitoring the second sub-available area if the first sub-monitor monitors that the second sub-monitor is failed;
a second starting unit 60, configured to start the monitoring program backed up by the second sub-monitoring program to execute the application to be monitored for monitoring the first sub-available area if the second sub-monitoring program monitors that the first sub-monitoring program fails.
The device comprises a processor and a storage medium, wherein the first deployment unit, the second deployment unit and the like are stored in the storage medium as program units, and the processor executes the program units stored in the storage medium to realize corresponding functions.
The processor comprises a kernel, and the kernel calls a corresponding program unit from a storage medium. One or more cores may be provided.
In the technical solution provided by the embodiment of the present disclosure, the first deployment unit deploys a first monitoring program for monitoring an application program to be monitored in the first available area, the second deployment unit deploys a second monitoring program in the second available area, and the second monitoring program monitors the first monitoring program. If the first monitoring program of the first available area fails, the second monitoring program deployed in the second available area can be used for acquiring. Compared with the prior art, under the condition that the first monitoring program of the first available area fails, the first monitoring program can still be timely obtained through the second monitoring program, so that the first monitoring program of the first available area can be timely maintained, and the survivability of the application program to be monitored is high.
The deployment apparatus of the monitoring system provided by the embodiment of the second aspect may be configured to execute the deployment method of the monitoring system provided by the embodiment of the first aspect, and the meanings and specific implementations of the related applications may refer to the related descriptions in the embodiment of the first aspect, and are not described in detail herein.
In a third aspect, an embodiment of the present disclosure provides a storage medium, where the storage medium includes a stored program, and when the program runs, a device in which the storage medium is located is controlled to execute the deployment method of the monitoring system according to the first aspect.
The storage medium may include volatile memory in a computer readable medium, Random Access Memory (RAM) and/or nonvolatile memory such as Read Only Memory (ROM) or flash memory (flash RAM), and the memory includes at least one memory chip.
In a fourth aspect, an embodiment of the present disclosure provides a deployment apparatus of a monitoring system, where the deployment apparatus of the monitoring system includes a storage medium; and one or more processors, the storage medium coupled with the processors, the processors configured to execute program instructions stored in the storage medium; the program instructions, when executed, perform the method for deploying a monitoring system of the first aspect.
As will be appreciated by one skilled in the art, embodiments of the present disclosure may be provided as a method, system, or computer program product. Accordingly, embodiments of the present disclosure may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, embodiments of the present disclosure may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and so forth) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the disclosure. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
In a typical configuration, a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The memory may include forms of volatile memory in a computer readable medium, Random Access Memory (RAM) and/or non-volatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM). The memory is an example of a computer-readable medium.
Computer-readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), Digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device. As defined herein, a computer readable medium does not include a transitory computer readable medium such as a modulated data signal and a carrier wave.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in the process, method, article, or apparatus that comprises the element.
As will be appreciated by one skilled in the art, embodiments of the present disclosure may be provided as a method, system, or computer program product. Accordingly, embodiments of the present disclosure may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, embodiments of the present disclosure may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and so forth) having computer-usable program code embodied therein.
The above are merely examples of the present application and are not intended to limit the present application. Various modifications and changes may occur to those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present application should be included in the scope of the claims of the present application.

Claims (16)

1. A method for deploying a monitoring system, the method comprising:
deploying a first monitoring program in a first available area, wherein the first monitoring program is used for monitoring the application program to be monitored, and the first available area is used for deploying the application program to be monitored;
and deploying a second monitoring program in a second available area, wherein the second monitoring program is used for monitoring the first monitoring program, and the second available area is used for deploying the application program to be monitored.
2. The deployment method of the monitoring system according to claim 1, wherein deploying the first monitoring program in the first available area comprises:
and deploying a first sub-monitoring program in the first monitoring program to a first sub-available area in the first available area, and deploying a second sub-monitoring program in the first monitoring program to a second sub-available area in the first available area.
3. The deployment method of a monitoring system according to claim 2,
and the first sub-monitoring program and the second sub-monitoring program monitor each other.
4. The deployment method of a monitoring system according to claim 2,
the second monitoring program monitors the second sub-monitoring program;
and the first sub monitoring program and the second monitoring program monitor each other.
5. The deployment method of a monitoring system according to claim 2,
the second monitoring program monitors the first sub-monitoring program; and the second sub monitoring program and the second monitoring program monitor each other.
6. The deployment method of a monitoring system according to claim 2,
backing up the second sub monitoring program in the first sub available area;
and backing up the first sub monitoring program in the second sub available area.
7. The method of deploying a monitoring system according to claim 6,
if the first sub-monitoring program monitors that the second sub-monitoring program fails, starting a monitoring program backed up by the first sub-monitoring program to execute an application program to be monitored for monitoring the second sub-available area;
and if the second sub-monitoring program monitors that the first sub-monitoring program fails, starting the monitoring program backed up by the second sub-monitoring program to execute the application program to be monitored for monitoring the first sub-available area.
8. A deployment apparatus for a monitoring system, the deployment apparatus comprising:
the system comprises a first deployment unit, a second deployment unit and a monitoring unit, wherein the first deployment unit is used for deploying a first monitoring program in a first available area, the first monitoring program is used for monitoring the application program to be monitored, and the first available area is used for deploying the application program to be monitored;
and the second deployment unit is used for deploying a second monitoring program in a second available area, wherein the second monitoring program is used for monitoring the first monitoring program, and the second available area is used for deploying the application program to be monitored.
9. The deployment apparatus of a monitoring system according to claim 8, wherein the first deployment unit comprises:
a first sub-deployment module, configured to deploy a first sub-monitor in the first monitor to a first sub-available area in the first available area;
the second sub-deployment module is used for deploying a second sub-monitoring program in the first monitoring program to a second sub-available area in the first available area.
10. Deployment device of a monitoring system according to claim 9,
and the first sub-monitoring program and the second sub-monitoring program monitor each other.
11. Deployment device of a monitoring system according to claim 9,
the second monitoring program monitors the second sub-monitoring program;
and the first sub monitoring program and the second monitoring program monitor each other.
12. Deployment device of a monitoring system according to claim 9,
the second monitoring program monitors the first sub-monitoring program; and the second sub monitoring program and the second monitoring program monitor each other.
13. The deployment apparatus of a monitoring system according to claim 9, further comprising:
the first sub-backup unit is used for backing up the second sub-monitoring program in a first sub-available area;
and the second sub-backup unit is used for backing up the first sub-monitoring program in a second sub-available area.
14. The deployment apparatus of a monitoring system according to claim 13, further comprising:
the first starting unit is used for starting the monitoring program backed up by the first sub-monitoring program to execute the application program to be monitored for monitoring the second sub-available area if the first sub-monitoring program monitors that the second sub-monitoring program fails;
and the second starting unit is used for starting the monitoring program backed up by the second sub-monitoring program to execute the application program to be monitored for monitoring the first sub-available area if the second sub-monitoring program monitors that the first sub-monitoring program fails.
15. A storage medium, characterized in that the storage medium comprises a stored program, wherein when the program runs, a device in which the storage medium is located is controlled to execute the deployment method of the monitoring system according to any one of claims 1 to 7.
16. A deployment apparatus of a monitoring system, characterized in that the apparatus comprises a storage medium; and one or more processors, the storage medium coupled with the processors, the processors configured to execute program instructions stored in the storage medium; the program instructions when executed perform a method of deploying a monitoring system as claimed in any one of claims 1 to 7.
CN201911058203.5A 2019-11-01 2019-11-01 Deployment method and deployment device of monitoring system Active CN110780891B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911058203.5A CN110780891B (en) 2019-11-01 2019-11-01 Deployment method and deployment device of monitoring system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911058203.5A CN110780891B (en) 2019-11-01 2019-11-01 Deployment method and deployment device of monitoring system

Publications (2)

Publication Number Publication Date
CN110780891A true CN110780891A (en) 2020-02-11
CN110780891B CN110780891B (en) 2023-12-22

Family

ID=69388574

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911058203.5A Active CN110780891B (en) 2019-11-01 2019-11-01 Deployment method and deployment device of monitoring system

Country Status (1)

Country Link
CN (1) CN110780891B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115277795A (en) * 2022-09-28 2022-11-01 四川川西数据产业有限公司 Data processing system and method based on urban digitization

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110246820A1 (en) * 2010-03-18 2011-10-06 Toyota Jidosha Kabushiki Kaisha Microcomputer mutual monitoring system and a microcomputer mutual monitoring method
CN104539479A (en) * 2014-12-16 2015-04-22 北京中交兴路车联网科技有限公司 Distributed service monitoring system and method
CN105607583A (en) * 2014-10-29 2016-05-25 中兴通讯股份有限公司 Monitoring unit, monitoring device and first monitoring unit in power system
CN107070753A (en) * 2017-06-15 2017-08-18 郑州云海信息技术有限公司 A kind of data monitoring method of distributed cluster system, apparatus and system
CN107943649A (en) * 2017-11-21 2018-04-20 郑州云海信息技术有限公司 A kind of distributed type assemblies performance monitoring system and method
CN110198230A (en) * 2018-04-20 2019-09-03 腾讯科技(深圳)有限公司 Monitoring method, device, storage medium and the electronic device of application

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110246820A1 (en) * 2010-03-18 2011-10-06 Toyota Jidosha Kabushiki Kaisha Microcomputer mutual monitoring system and a microcomputer mutual monitoring method
CN105607583A (en) * 2014-10-29 2016-05-25 中兴通讯股份有限公司 Monitoring unit, monitoring device and first monitoring unit in power system
CN104539479A (en) * 2014-12-16 2015-04-22 北京中交兴路车联网科技有限公司 Distributed service monitoring system and method
CN107070753A (en) * 2017-06-15 2017-08-18 郑州云海信息技术有限公司 A kind of data monitoring method of distributed cluster system, apparatus and system
CN107943649A (en) * 2017-11-21 2018-04-20 郑州云海信息技术有限公司 A kind of distributed type assemblies performance monitoring system and method
CN110198230A (en) * 2018-04-20 2019-09-03 腾讯科技(深圳)有限公司 Monitoring method, device, storage medium and the electronic device of application

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115277795A (en) * 2022-09-28 2022-11-01 四川川西数据产业有限公司 Data processing system and method based on urban digitization

Also Published As

Publication number Publication date
CN110780891B (en) 2023-12-22

Similar Documents

Publication Publication Date Title
CN109684420B (en) Method and device for deploying hardor mirror image warehouse with high availability based on kubernets
US10581674B2 (en) Method and apparatus for expanding high-availability server cluster
AU2017282817B2 (en) Data processing method and device
CN106878363B (en) Information processing method, device and system
CN106301823B (en) Fault warning method and device for key component and big data management system
US10129373B2 (en) Recovery of a network infrastructure to facilitate business continuity
WO2021208184A1 (en) Method and system for calling-in and recovery of node traffic and central server
CN107491371B (en) Deployment monitoring method and device
CN110245031B (en) AI service opening middle platform and method
CN111708560A (en) Automatic deployment method and device of database high-availability management system
CN110780891B (en) Deployment method and deployment device of monitoring system
CN111741135B (en) Hybrid cloud disaster recovery system and control method thereof
CN112698979A (en) Method and device for processing zookeeper double nodes, storage medium and processor
CN112839052A (en) Virtual network security protection system, method, server and readable storage medium
CN114691445A (en) Cluster fault processing method and device, electronic equipment and readable storage medium
CN111866210A (en) Virtual IP balance distribution method, system, terminal and storage medium
CN113746676B (en) Network card management method, device, equipment, medium and product based on container cluster
CN112260398B (en) Power grid monitoring system supporting dynamic expansion
CN116192616A (en) Micro-service-based power standby and regulation system processing method and device and computer equipment
CN114625611A (en) Monitoring method and device for quantum computing environment and storage medium
CN114880150A (en) Fault isolation and field protection method and system
CN112990867A (en) Method, system and equipment for realizing high availability of document platform service
CN114691395A (en) Fault processing method and device, electronic equipment and storage medium
CN111488306A (en) Attack and defense architecture system and construction method thereof
Yu et al. Design and Implementation of a Software Disaster Recovery Service for Cloud Computing-Based Aerospace Ground Systems

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant