CN110780891B - Deployment method and deployment device of monitoring system - Google Patents

Deployment method and deployment device of monitoring system Download PDF

Info

Publication number
CN110780891B
CN110780891B CN201911058203.5A CN201911058203A CN110780891B CN 110780891 B CN110780891 B CN 110780891B CN 201911058203 A CN201911058203 A CN 201911058203A CN 110780891 B CN110780891 B CN 110780891B
Authority
CN
China
Prior art keywords
sub
monitoring
program
available area
monitoring program
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201911058203.5A
Other languages
Chinese (zh)
Other versions
CN110780891A (en
Inventor
张永新
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing CHJ Automobile Technology Co Ltd
Original Assignee
Beijing CHJ Automobile Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing CHJ Automobile Technology Co Ltd filed Critical Beijing CHJ Automobile Technology Co Ltd
Priority to CN201911058203.5A priority Critical patent/CN110780891B/en
Publication of CN110780891A publication Critical patent/CN110780891A/en
Application granted granted Critical
Publication of CN110780891B publication Critical patent/CN110780891B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/60Software deployment
    • G06F8/61Installation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/3003Monitoring arrangements specially adapted to the computing system or computing system component being monitored
    • G06F11/302Monitoring arrangements specially adapted to the computing system or computing system component being monitored where the computing system component is a software system
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/3065Monitoring arrangements determined by the means or processing involved in reporting the monitored data

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Computing Systems (AREA)
  • Quality & Reliability (AREA)
  • Mathematical Physics (AREA)
  • Debugging And Monitoring (AREA)

Abstract

The embodiment of the disclosure discloses a deployment method and a deployment device of a monitoring system, relates to the technical field of data monitoring, and can solve the problem that a software engineer cannot know timely when the monitoring system fails in the prior art, so that an application software fault event is easy to occur for a long time. The method of the embodiment of the disclosure mainly comprises the following steps: deploying a first monitoring program in a first available area, wherein the first monitoring program is used for monitoring the application program to be monitored; and deploying a second monitoring program in a second available area, wherein the second monitoring program is used for monitoring the first monitoring program, and the first available area and the second available area are used for deploying the application program to be monitored. Compared with the prior art, in the state that the first monitoring program of the first available area fails, the first monitoring program of the first available area can be obtained through the second monitoring program in time, so that the first monitoring program of the first available area can be maintained in time, and the survivability of the application program to be monitored is higher.

Description

Deployment method and deployment device of monitoring system
Technical Field
The embodiment of the disclosure relates to the technical field of data monitoring, in particular to a deployment method and a deployment device of a monitoring system.
Background
The development of application software tends to be complicated, the dependency relationship in the running device is complex, and the operation and management of the software needs to be monitored.
Typically, the application software is deployed in an available area (Availability Zone, abbreviated AZ) in which a monitoring system for monitoring the application software is deployed at the same time. After the monitoring system monitors that the running of the application software is abnormal, the monitoring system can timely inform a software engineer through social software or mobile phone short messages so as to facilitate quick processing and recovery of software service and improve the service quality of the application software.
However, the monitoring system is also at risk of failure due to various reasons, and the existing deployment method cannot enable a software engineer to know when the monitoring system fails in time, so that an application software failure event is easy to occur for a long time.
Disclosure of Invention
The invention provides a deployment method and a deployment device for a monitoring system, which are used for solving the technical problem of high failure risk of the monitoring system in the prior art so as to reduce the failure risk of the monitoring system.
The embodiment of the disclosure mainly provides the following technical scheme:
in a first aspect, embodiments of the present disclosure provide a method for deploying a monitoring system, the method comprising:
deploying a first monitoring program in a first available area, wherein the first monitoring program is used for monitoring the application program to be monitored, and the first available area is used for deploying the application program to be monitored;
and deploying a second monitoring program in a second available area, wherein the second monitoring program is used for monitoring the first monitoring program, and the second available area is used for deploying the application program to be monitored.
In some embodiments, deploying a first monitor to a first availability zone for deploying an application to be monitored includes:
and deploying a first sub-monitor program in the first monitor program in a first sub-available area in the first available area, and deploying a second sub-monitor program in the first monitor program in a second sub-available area in the first available area.
In some embodiments, the first sub-monitor and the second sub-monitor each other.
In some embodiments, the second monitor monitors the second sub-monitor;
the first sub-monitoring program and the second monitoring program monitor each other.
In some embodiments, the second monitor monitors the first sub-monitor; the second sub-monitoring program and the second monitoring program monitor each other.
In some embodiments, the second sub-monitor is backed up in a first sub-availability zone;
and backing up the first sub-monitoring program in a second sub-available area.
In some embodiments, if the first sub-monitor monitors that the second sub-monitor fails, the monitor backed up by the first sub-monitor is started to execute the application to be monitored for monitoring the second sub-available area;
and if the second sub-monitoring program monitors that the first sub-monitoring program fails, starting the monitoring program backed up by the second sub-monitoring program to execute the application program to be monitored for monitoring the first sub-available area.
In a second aspect, embodiments of the present disclosure provide a deployment apparatus of a monitoring system, the deployment apparatus mainly including:
the first deployment unit is used for deploying a first monitoring program in a first available area, wherein the first monitoring program is used for monitoring the application program to be monitored, and the first available area is used for deploying the application program to be monitored;
the second deployment unit is used for deploying a second monitoring program in a second available area, the second monitoring program is used for monitoring the first monitoring program, and the second available area is used for deploying an application program to be monitored.
In some embodiments, the first deployment unit comprises:
the first sub-deployment module is used for deploying a first sub-monitoring program in the first monitoring program in a first sub-available area in the first available area;
and the second sub-deployment module is used for deploying a second sub-monitoring program in the first monitoring program in a second sub-available area in the first available area.
In some embodiments, the first sub-monitor and the second sub-monitor each other.
In some embodiments, the first sub-monitor and the second monitor each other; or (b)
The second sub-monitoring program and the second monitoring program monitor each other.
In some embodiments, a first sub-backup unit is configured to backup the second sub-monitor in a first sub-available area;
and the second sub-backup unit is used for backing up the first sub-monitoring program in a second sub-available area.
In some embodiments, the first starting unit is configured to, if the first sub-monitor monitors that the second sub-monitor fails, start the monitor backed up by the first sub-monitor to execute an application to be monitored that monitors the second sub-available area;
and the second starting unit is used for starting the monitoring program backed up by the second sub-monitoring program to execute the application program to be monitored for monitoring the first sub-available area if the second sub-monitoring program monitors that the first sub-monitoring program fails.
In a third aspect, an embodiment of the present disclosure provides a storage medium, where the storage medium includes a stored program, and when the program runs, the device where the storage medium is controlled to execute the deployment method of the monitoring system in the first aspect.
In a fourth aspect, embodiments of the present disclosure provide a deployment apparatus of a monitoring system, the deployment apparatus of the monitoring system including a storage medium; and one or more processors coupled to the storage medium, the processors configured to execute the program instructions stored in the storage medium; and executing the deployment method of the monitoring system in the first aspect when the program instructions run.
By means of the technical scheme, the deployment method and the deployment device of the monitoring system provided by the technical scheme of the invention have at least the following advantages:
in the technical scheme provided by the embodiment of the disclosure, a first monitoring program for monitoring an application program to be monitored is deployed in a first available area, a second monitoring program is deployed in a second available area, and the second monitoring program monitors the first monitoring program. If the first monitoring program of the first available area fails, the first monitoring program can be acquired through the second monitoring program deployed in the second available area. Compared with the prior art, in the state that the first monitoring program of the first available area fails, the first monitoring program of the first available area can be obtained through the second monitoring program in time, so that the first monitoring program of the first available area can be maintained in time, and the survivability of the application program to be monitored is higher.
The foregoing description is merely an overview of the technical solutions of the embodiments of the present disclosure, and may be implemented according to the content of the specification in order to make the technical means of the embodiments of the present disclosure more clearly understood, and in order to make the foregoing and other objects, features and advantages of the embodiments of the present disclosure more comprehensible, the following detailed description of the embodiments of the present disclosure.
Drawings
Various other advantages and benefits will become apparent to those of ordinary skill in the art upon reading the following detailed description of the preferred embodiments. The drawings are only for purposes of illustrating the preferred embodiments and are not to be construed as limiting the embodiments of the disclosure. Also, like reference numerals are used to designate like parts throughout the figures. In the drawings:
FIG. 1 illustrates a flow chart of a method of deploying a monitoring system provided by an embodiment of the present disclosure;
FIG. 2 illustrates an exemplary diagram of a deployment method for a monitoring system provided by embodiments of the present disclosure;
FIG. 3 illustrates a schematic structural diagram of a deployment device of a monitoring system provided by an embodiment of the present disclosure;
fig. 4 shows a schematic structural diagram of a deployment device of a specific monitoring system according to an embodiment of the present disclosure.
Detailed Description
Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. While exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the disclosure to those skilled in the art.
In a first aspect, as shown in fig. 1, an embodiment of the present disclosure provides a deployment method of a monitoring system, the method including:
101. deploying a first monitoring program in a first available area, wherein the first monitoring program is used for monitoring the application program to be monitored, and the first available area is used for deploying the application program to be monitored;
wherein, an available area can be composed of a plurality of data centers, and different available areas are mutually independent on power supply and network, and when one available area has a problem, the other available area is not affected. In one area, the available area and the available area are connected through a high-speed network, so that low delay is ensured.
The available area (such as the first available area) in the application may be an internet data center (Internet Data Center, abbreviated IDC), where IDC refers to a service platform with perfect equipment (including high-speed internet access bandwidth, high-performance local area network, safe and reliable machine room environment, etc.), specialized management, and perfect application. On the basis of the platform, IDC service providers provide clients with internet base platform services (server hosting, virtual hosts, mail caching, virtual mail, etc.) and various value added services (e.g., leasing services of sites, domain name system services, load balancing systems, database systems, data backup services, etc.). Alternatively, the available area (e.g., the first available area) in the present application may be an available area of a cloud platform (public cloud or private cloud).
After the monitoring index of the application program to be monitored exceeds the threshold value, the first monitoring program generates a first warning instruction, and the first warning instruction can be sent to the software engineer through a network, wherein the network sent to the software engineer is not limited to the internet, and can also be a mobile communication network, such as a 2G second generation mobile communication technology, a 3G third generation mobile communication technology, a 4G fourth generation mobile communication technology, a 5G fifth generation mobile communication technology and the like.
102. And deploying a second monitoring program in a second available area, wherein the second monitoring program is used for monitoring the first monitoring program, and the second available area is used for deploying the application program to be monitored.
The second usable area is a different usable area from the first usable area, and the second usable area and the first usable area can be connected through a high-speed network.
The second monitoring program can monitor the monitoring function abnormality of the first monitoring program, and after the monitoring function of the first monitoring program is abnormal, the second monitoring program can generate a second warning instruction, and the second warning instruction can be sent to a software engineer through a network.
In the technical scheme provided by the embodiment of the disclosure, a first monitoring program for monitoring an application program to be monitored is deployed in a first available area, a second monitoring program is deployed in a second available area, and the second monitoring program monitors the first monitoring program. If the first monitoring program of the first available area fails, the first monitoring program can be acquired through the second monitoring program deployed in the second available area. Compared with the prior art, in the state that the first monitoring program of the first available area fails, the first monitoring program of the first available area can be obtained through the second monitoring program in time, so that the first monitoring program of the first available area can be maintained in time, and the survivability of the application program to be monitored is higher.
In order to further improve the reliability of monitoring the software to be monitored, the first monitoring program monitors the second monitoring program in the second available area in addition to the application program to be monitored in the first available area, and after the monitoring function of the second monitoring program is abnormal, the first monitoring program generates a third warning instruction which can be sent to a software engineer through a network. Under the condition that the first monitoring program of the first available area and the second monitoring program of the second available area are abnormal at different time, reliable uninterrupted real-time monitoring of the monitoring application program can be ensured.
Corresponding to the situation that the size of the application program is more and more complex, the application program to be monitored generally spans multiple IDC, multiple areas, multiple available areas, and in the application environment corresponding to the multiple available areas, as shown in fig. 2, the first available area includes a first sub-available area and a second sub-available area for deploying the application program to be monitored, and the first monitor program includes a first sub-monitor program and a second sub-monitor program, and step 101 includes:
and deploying a first sub-monitor program in the first monitor program in a first sub-available area in the first available area, and deploying a second sub-monitor program in the first monitor program in a second sub-available area in the first available area.
After the monitoring index of the application program to be monitored in the first sub-available area exceeds the threshold value, the first sub-monitoring program generates a first sub-warning instruction, and the first sub-warning instruction can be sent to a software engineer through a network. After the monitoring index of the application program to be monitored in the second sub-available area exceeds the threshold value, the second sub-monitoring program generates a second sub-warning instruction, and the second sub-warning instruction can be sent to the software engineer through the network.
It is easy to understand that the number of sub-available areas for deploying the application to be monitored is not limited in practical application, and may be three or more. The following embodiments of the present application take two sub-available regions as examples, but are not limited thereto. Among the two sub-available areas, one of the available areas, for example, an application to be monitored of a first sub-available area, may run a primary service, and the other one of the available areas, for example, a second sub-available area, may run a secondary service. The first sub-availability zone and the second sub-availability zone may be arranged in the same city, interconnected by a high-speed network within the city, e.g. an optical fiber, e.g. both may constitute a local area network. The second available area is respectively located in different cities with the first sub-available area and the second sub-available area, and is respectively interconnected with the first sub-available area and the second sub-available area through a metropolitan area network. When the network of one city fails, the monitoring programs of the three available areas (the first sub-available area, the second sub-available area and the second available area) are not simultaneously caused to be down, so that warning instructions cannot be sent to a software engineer.
For the first monitor program to monitor the second monitor program, in a specific implementation, the second monitor program may be used to monitor the second sub-monitor program, where the first sub-monitor program and the second monitor program monitor each other, or the second monitor program is used to monitor the first sub-monitor program, and the second sub-monitor program and the second monitor program monitor each other. Taking the case of adopting the second sub-monitoring program and the second monitoring program to monitor each other independently, if the first sub-monitoring program is abnormal, the second monitoring program can monitor the first sub-monitoring program for abnormality and send a warning to a software engineer. If the second sub-monitor is abnormal, the second monitor can monitor the second sub-monitor for the abnormality and send a warning to the software engineer. If the second monitoring program is abnormal, the second sub-monitoring program can monitor the second monitoring program for abnormality and send a warning to the software engineer. The first available area may be located in one region, the second available area may be located in another region, and the first sub-available area, the second sub-available area and the second available area form a two-to-three center.
For a traditional data center, two places refer to two regions far away, a first sub-available region and a second sub-available region are located in one region, the second available region is located in another region, for example, a metropolitan area network in different regions, and three centers are three IDCs.
For public cloud or private cloud, two refer to two Region regions of the same cloud (public cloud or private cloud) or different clouds (public cloud or private cloud), a first sub-available Region and a second sub-available Region are located in one Region, a second available Region is located in another Region, taking the existing amazon AWS cloud service as an example, 9 regions are provided for global AWS cloud service before a release meeting of 12 months 18 days, and the method comprises the following steps: eastern (norveginia), mexi (oregon), mexi (norcali florida), european (irish), asia (singapore), asia (tokyo), asia (sydney), south america (saprolol), and the govcoud area in the mexiliary government. The AWS chinese (beijing) area will be the 4 th area of amazon AWS in the asia-tai area, and also the 10 th area worldwide. The first sub-available area and the second sub-available area may be located in an AWS china (beijing) area, and the second available area may be located in an asia-tai (tokyo) area. The three centers refer to three available areas, two places and three centers, so that the monitoring system can detect the unavailable event in a short time (such as within 5 seconds) as long as the unavailable event is not generated in two regions and two public clouds, and timely send a warning instruction to inform operation and maintenance personnel that a software engineer is timely aware of the unavailable event, and the monitoring system is repaired at the first time, so that the monitoring transparency and the system usability of the whole software system are improved.
In order to further improve the reliability of monitoring the software to be monitored, the first sub-monitoring program and the second sub-monitoring program can also monitor each other. If the first sub-monitor is abnormal, the second sub-monitor can monitor the first sub-monitor for abnormality and send a warning to the software engineer. If the second sub-monitor is abnormal, the first sub-monitor can monitor the second sub-monitor for the abnormality and send a warning to the software engineer.
For this reason, in some embodiments of the present application, the second sub-monitor program is backed up in the first sub-available area, and after the second sub-monitor program in the second word available area fails, the software engineer can quickly retrieve the backed-up second sub-monitor program from the first sub-available area, and quick monitoring of the application program to be monitored in the second word available area is implemented through the backed-up second sub-monitor program. And in the same way, the first sub-monitoring program is backed up in the second sub-available area, and after the first sub-monitoring program of the first word available area fails, a software engineer can quickly call the backed-up first sub-monitoring program from the second sub-available area, and the application program to be monitored in the first word available area is quickly monitored through the backed-up first sub-monitoring program. In implementation, the method can also be realized automatically by a program, the first sub-monitoring program monitors whether the second sub-monitoring program fails, and if the first sub-monitoring program monitors that the second sub-monitoring program fails, the first sub-monitoring program is started to backup the monitoring program to execute the application program to be monitored for monitoring the second sub-available area; and the second sub-monitoring program monitors whether the first sub-monitoring program fails, and if the second sub-monitoring program monitors that the first sub-monitoring program fails, the second sub-monitoring program is started to backup the monitoring program to execute the application program to be monitored for monitoring the first sub-available area. That is, if an abnormal event such as unavailability occurs in the monitoring program of one available area, the monitoring program of the backup of the other available area can take over quickly or pull up another monitoring instance to monitor.
In an application environment corresponding to a plurality of available areas, the embodiments of the present application take three sub-available areas as examples (not shown), based on the above embodiments, the first available area includes a third sub-available area for deploying an application to be monitored, in addition to the first sub-available area and the second sub-available area, the first sub-available area, the second sub-available area and the third sub-available area may be disposed in the same city, and any two of them are interconnected through a high-speed network inside the city, such as an optical fiber, for example, the three may form a local area network. The second available area is respectively located in different cities with the first sub-available area, the second sub-available area and the third sub-available area, and is respectively interconnected with the first sub-available area, the second sub-available area and the third sub-available area through a metropolitan area network. When the network of one city fails, the monitoring programs of the four available areas (the first sub-available area, the second sub-available area, the third sub-available area and the second available area) are not simultaneously caused to be down, so that warning instructions cannot be sent to a software engineer.
Wherein a third sub-monitor may monitor each other with the first sub-monitor. In the implementation, the third sub-monitoring program is backed up in the first sub-available area; and backing up the first sub-monitoring program in a third sub-available area. And if the first sub-monitoring program monitors that the third sub-monitoring program fails, starting the monitoring program backed up by the first sub-monitoring program to execute the application program to be monitored for monitoring the third sub-available area.
Of course, in implementation, the third sub-monitor program may also monitor with the second sub-monitor program, and in implementation, the third sub-monitor program is backed up in the second sub-available area; and backing up the second sub-monitor in a third sub-available area. And if the first sub-monitoring program monitors that the second sub-monitoring program and the third sub-monitoring program are invalid, starting the monitoring program backed up by the first sub-monitoring program to execute the application program to be monitored of the second sub-available area and the application program to be monitored of the third sub-available area. And if the second sub-monitoring program monitors that the first sub-monitoring program and the third sub-monitoring program are invalid, starting the monitoring program backed up by the second sub-monitoring program to execute the application program to be monitored of the first sub-available area and the application program to be monitored of the third sub-available area. And if the third sub-monitoring program monitors that the first sub-monitoring program and the second sub-monitoring program are invalid, starting the monitoring program backed up by the third sub-monitoring program to execute the application program to be monitored of the first sub-available area and the application program to be monitored of the second sub-available area.
In some embodiments, the third sub-monitor may also monitor with the third monitor.
In a second aspect, according to another embodiment of the present disclosure, as shown in fig. 3, there is further provided a deployment apparatus of a monitoring system, as shown in fig. 3, the apparatus mainly including:
a first deployment unit 10, configured to deploy a first monitoring program in a first available area, where the first monitoring program is used to monitor the application to be monitored, and the first available area is used to deploy the application to be monitored;
the second deployment unit 20 is configured to deploy a second monitor program in a second available area, where the second monitor program is used to monitor the first monitor program, and the second available area is used to deploy an application program to be monitored.
In some embodiments, as shown in fig. 4, the first deployment unit 10 comprises:
a first sub-deployment module 11, configured to deploy a first sub-monitor in the first monitor in a first sub-available area in the first available area;
and a second sub-deployment module 12, configured to deploy a second sub-monitor in the first monitor in a second sub-available area in the first available area.
In some embodiments, the first sub-monitor and the second sub-monitor each other.
In some embodiments, the second monitor monitors the second sub-monitor;
the first sub-monitoring program and the second monitoring program monitor each other.
In some embodiments, the second monitor monitors the first sub-monitor; the second sub-monitoring program and the second monitoring program monitor each other.
In some embodiments, a first sub-backup unit 30 is configured to backup the second sub-monitor in a first sub-available area;
and a second sub-backup unit 40 for backing up the first sub-monitor in a second sub-available area.
In some embodiments, the first starting unit 50 is configured to, if the first sub-monitor monitors that the second sub-monitor fails, start the monitor backed up by the first sub-monitor to execute the application to be monitored that monitors the second sub-available area;
and the second starting unit 60 is configured to, if the second sub-monitor monitors that the first sub-monitor fails, start the monitor backed up by the second sub-monitor to execute the application to be monitored in the first sub-available area.
The device comprises a processor and a storage medium, wherein the first deployment unit, the second deployment unit and the like are stored in the storage medium as program units, and the processor executes the program units stored in the storage medium to realize corresponding functions.
The processor comprises a kernel, and the kernel retrieves corresponding program units from the storage medium. The kernel may be provided with one or more.
In the technical scheme provided by the embodiment of the disclosure, a first deployment unit deploys a first monitoring program for monitoring an application program to be monitored in a first available area, and a second deployment unit deploys a second monitoring program for monitoring the first monitoring program in a second available area. If the first monitoring program of the first available area fails, the first monitoring program can be acquired through the second monitoring program deployed in the second available area. Compared with the prior art, in the state that the first monitoring program of the first available area fails, the first monitoring program of the first available area can be obtained through the second monitoring program in time, so that the first monitoring program of the first available area can be maintained in time, and the survivability of the application program to be monitored is higher.
The deployment device of the monitoring system provided by the embodiment of the second aspect may be used to perform the deployment method of the monitoring system provided by the embodiment of the first aspect, and the related meaning and specific implementation manner used in the related description in the embodiment of the first aspect may be referred to in the related description in the embodiment of the first aspect, which is not described in detail herein.
In a third aspect, an embodiment of the present disclosure provides a storage medium, where the storage medium includes a stored program, and when the program runs, the device where the storage medium is controlled to execute the deployment method of the monitoring system in the first aspect.
The storage medium may include volatile memory, random Access Memory (RAM) and/or nonvolatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM), among other forms in computer readable media, the memory including at least one memory chip.
In a fourth aspect, embodiments of the present disclosure provide a deployment apparatus of a monitoring system, the deployment apparatus of the monitoring system including a storage medium; and one or more processors coupled to the storage medium, the processors configured to execute the program instructions stored in the storage medium; and executing the deployment method of the monitoring system in the first aspect when the program instructions run.
It will be apparent to those skilled in the art that embodiments of the present disclosure may be provided as a method, system, or computer program product. Accordingly, embodiments of the present disclosure may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Moreover, embodiments of the present disclosure may take the form of a computer program product on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, etc.) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the disclosure. It will be understood that each flow and/or block of the flowchart illustrations and/or block diagrams, and combinations of flows and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
In one typical configuration, a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The memory may include volatile memory in a computer-readable medium, random Access Memory (RAM) and/or nonvolatile memory, etc., such as Read Only Memory (ROM) or flash RAM. Memory is an example of a computer-readable medium.
Computer readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of storage media for a computer include, but are not limited to, phase change memory (PRAM), static Random Access Memory (SRAM), dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), read Only Memory (ROM), electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium, which can be used to store information that can be accessed by a computing device. Computer-readable media, as defined herein, does not include transitory computer-readable media (transmission media), such as modulated data signals and carrier waves.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article or apparatus that comprises an element.
It will be appreciated by those skilled in the art that embodiments of the present disclosure may be provided as a method, system, or computer program product. Accordingly, embodiments of the present disclosure may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Moreover, embodiments of the present disclosure may take the form of a computer program product on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, etc.) having computer-usable program code embodied therein.
The foregoing is merely exemplary of the present application and is not intended to limit the present application. Various modifications and changes may be made to the present application by those skilled in the art. Any modifications, equivalent substitutions, improvements, etc. which are within the spirit and principles of the present application are intended to be included within the scope of the claims of the present application.

Claims (8)

1. A method of deploying a monitoring system, the method comprising:
deploying a first monitoring program in a first available area, wherein the first monitoring program is used for monitoring an application program to be monitored, and the first available area is used for deploying the application program to be monitored;
deploying a second monitoring program in a second available area, wherein the second monitoring program is used for monitoring the first monitoring program, and the second available area is used for deploying an application program to be monitored;
deploying a first monitor in a first availability zone, comprising:
deploying a first sub-monitoring program in the first monitoring program in a first sub-available area in the first available area, deploying a second sub-monitoring program in the first monitoring program in a second sub-available area in the first available area, wherein the first sub-available area and the second sub-available area are located in a metropolitan area network of the same region, and the second available area, the first sub-available area and the second sub-available area are located in metropolitan area networks of different regions;
the first sub-monitoring program and the second sub-monitoring program monitor each other;
the method further comprises the steps of:
backing up the second sub-monitor in the first sub-available area;
backing up the first sub-monitor in a second sub-available area;
if the first sub-monitoring program monitors that the second sub-monitoring program fails, starting the monitoring program backed up by the first sub-monitoring program to execute the application program to be monitored for monitoring the second sub-available area;
and if the second sub-monitoring program monitors that the first sub-monitoring program fails, starting the monitoring program backed up by the second sub-monitoring program to execute the application program to be monitored for monitoring the first sub-available area.
2. The method for deploying a monitoring system of claim 1 wherein,
the second monitoring program monitors the second sub-monitoring program;
the first sub-monitoring program and the second monitoring program monitor each other.
3. The method for deploying a monitoring system of claim 1 wherein,
the second monitoring program monitors the first sub-monitoring program; the second sub-monitoring program and the second monitoring program monitor each other.
4. A deployment device for a monitoring system, the deployment device comprising:
the first deployment unit is used for deploying a first monitoring program in a first available area, wherein the first monitoring program is used for monitoring the application program to be monitored, and the first available area is used for deploying the application program to be monitored;
the second deployment unit is used for deploying a second monitoring program in a second available area, the second monitoring program is used for monitoring the first monitoring program, and the second available area is used for deploying an application program to be monitored;
a first deployment unit comprising:
the first sub-deployment module is used for deploying a first sub-monitoring program in the first monitoring program in a first sub-available area in the first available area;
the second sub-deployment module is used for deploying a second sub-monitoring program in the first monitoring program in a second sub-available area in the first available area, wherein the first sub-available area and the second sub-available area are located in a metropolitan area network of the same region, and the second available area, the first sub-available area and the second sub-available area are located in metropolitan area networks of different regions;
the first sub-monitoring program and the second sub-monitoring program monitor each other;
the apparatus further comprises:
a first sub-backup unit for backing up the second sub-monitor in a first sub-available area;
a second sub-backup unit, configured to backup the first sub-monitor in a second sub-available area;
the first starting unit is used for starting the monitoring program backed up by the first sub-monitoring program to execute the application program to be monitored for monitoring the second sub-available area if the first sub-monitoring program monitors that the second sub-monitoring program fails;
and the second starting unit is used for starting the monitoring program backed up by the second sub-monitoring program to execute the application program to be monitored for monitoring the first sub-available area if the second sub-monitoring program monitors that the first sub-monitoring program fails.
5. The deployment apparatus of a monitoring system of claim 4 wherein,
the second monitoring program monitors the second sub-monitoring program;
the first sub-monitoring program and the second monitoring program monitor each other.
6. The deployment apparatus of a monitoring system of claim 4 wherein,
the second monitoring program monitors the first sub-monitoring program; the second sub-monitoring program and the second monitoring program monitor each other.
7. A storage medium comprising a stored program, wherein the program, when run, controls a device in which the storage medium is located to perform the deployment method of the monitoring system of any one of claims 1 to 3.
8. A deployment apparatus for a monitoring system, the apparatus comprising a storage medium; and one or more processors coupled to the storage medium, the processors configured to execute the program instructions stored in the storage medium; the program instructions, when executed, perform the method of deploying a monitoring system of any one of claims 1 to 3.
CN201911058203.5A 2019-11-01 2019-11-01 Deployment method and deployment device of monitoring system Active CN110780891B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911058203.5A CN110780891B (en) 2019-11-01 2019-11-01 Deployment method and deployment device of monitoring system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911058203.5A CN110780891B (en) 2019-11-01 2019-11-01 Deployment method and deployment device of monitoring system

Publications (2)

Publication Number Publication Date
CN110780891A CN110780891A (en) 2020-02-11
CN110780891B true CN110780891B (en) 2023-12-22

Family

ID=69388574

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911058203.5A Active CN110780891B (en) 2019-11-01 2019-11-01 Deployment method and deployment device of monitoring system

Country Status (1)

Country Link
CN (1) CN110780891B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115277795B (en) * 2022-09-28 2022-12-09 四川川西数据产业有限公司 Data processing system and method based on urban digitization

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104539479A (en) * 2014-12-16 2015-04-22 北京中交兴路车联网科技有限公司 Distributed service monitoring system and method
CN105607583A (en) * 2014-10-29 2016-05-25 中兴通讯股份有限公司 Monitoring unit, monitoring device and first monitoring unit in power system
CN107070753A (en) * 2017-06-15 2017-08-18 郑州云海信息技术有限公司 A kind of data monitoring method of distributed cluster system, apparatus and system
CN107943649A (en) * 2017-11-21 2018-04-20 郑州云海信息技术有限公司 A kind of distributed type assemblies performance monitoring system and method
CN110198230A (en) * 2018-04-20 2019-09-03 腾讯科技(深圳)有限公司 Monitoring method, device, storage medium and the electronic device of application

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102782655B (en) * 2010-03-18 2015-03-04 丰田自动车株式会社 Microcomputer cross-monitoring system and microcomputer cross-monitoring method

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105607583A (en) * 2014-10-29 2016-05-25 中兴通讯股份有限公司 Monitoring unit, monitoring device and first monitoring unit in power system
CN104539479A (en) * 2014-12-16 2015-04-22 北京中交兴路车联网科技有限公司 Distributed service monitoring system and method
CN107070753A (en) * 2017-06-15 2017-08-18 郑州云海信息技术有限公司 A kind of data monitoring method of distributed cluster system, apparatus and system
CN107943649A (en) * 2017-11-21 2018-04-20 郑州云海信息技术有限公司 A kind of distributed type assemblies performance monitoring system and method
CN110198230A (en) * 2018-04-20 2019-09-03 腾讯科技(深圳)有限公司 Monitoring method, device, storage medium and the electronic device of application

Also Published As

Publication number Publication date
CN110780891A (en) 2020-02-11

Similar Documents

Publication Publication Date Title
US11301342B2 (en) Methods, systems, and computer readable storage devices for managing faults in a virtual machine network
CN109684420B (en) Method and device for deploying hardor mirror image warehouse with high availability based on kubernets
AU2017282817B2 (en) Data processing method and device
US10798218B2 (en) Environment isolation method and device
WO2016183967A1 (en) Failure alarm method and apparatus for key component, and big data management system
CN106878363B (en) Information processing method, device and system
Alshammari et al. Disaster recovery in single-cloud and multi-cloud environments: Issues and challenges
CN111708560A (en) Automatic deployment method and device of database high-availability management system
CN112732491B (en) Data processing system and business data processing method based on data processing system
CN109697078B (en) Repairing method of non-high-availability component, big data cluster and container service platform
CN106021070A (en) Method and device for server cluster monitoring
CN110780891B (en) Deployment method and deployment device of monitoring system
CN111078468A (en) Service rollback method and device under micro-service architecture
CN114363334A (en) Network configuration method, device and equipment for cloud system and cloud desktop virtual machine
CN114691445A (en) Cluster fault processing method and device, electronic equipment and readable storage medium
WO2017118129A1 (en) Spectrum resource sharing method and apparatus
CN116302716A (en) Cluster deployment method and device, electronic equipment and computer readable medium
CN111490961A (en) Communication connection blocking system, method, device and equipment
CN107786352B (en) Method and device for managing network function virtualization management arrangement entity
CN112260398B (en) Power grid monitoring system supporting dynamic expansion
CN115174364A (en) Data recovery method, device and medium in disaster tolerance scene
CN112612652A (en) Distributed storage system abnormal node restarting method and system
CN107783855B (en) Fault self-healing control device and method for virtual network element
Yu et al. Design and Implementation of a Software Disaster Recovery Service for Cloud Computing-Based Aerospace Ground Systems
CN106487561A (en) The method and system that a kind of server service updates

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant