CN112579413A - Server operation record changing method and device, computer equipment and storage medium - Google Patents
Server operation record changing method and device, computer equipment and storage medium Download PDFInfo
- Publication number
- CN112579413A CN112579413A CN202011440167.1A CN202011440167A CN112579413A CN 112579413 A CN112579413 A CN 112579413A CN 202011440167 A CN202011440167 A CN 202011440167A CN 112579413 A CN112579413 A CN 112579413A
- Authority
- CN
- China
- Prior art keywords
- server
- data
- hidden danger
- danger information
- target
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 57
- 238000012545 processing Methods 0.000 claims description 28
- 230000008859 change Effects 0.000 claims description 25
- 238000004590 computer program Methods 0.000 claims description 17
- 238000004140 cleaning Methods 0.000 claims description 6
- 238000007726 management method Methods 0.000 description 65
- 238000010586 diagram Methods 0.000 description 9
- 230000008569 process Effects 0.000 description 7
- 238000012544 monitoring process Methods 0.000 description 6
- 230000006978 adaptation Effects 0.000 description 3
- 238000004458 analytical method Methods 0.000 description 3
- 238000004364 calculation method Methods 0.000 description 3
- 238000004891 communication Methods 0.000 description 3
- 230000009471 action Effects 0.000 description 2
- 238000012550 audit Methods 0.000 description 2
- 238000004422 calculation algorithm Methods 0.000 description 2
- 238000007405 data analysis Methods 0.000 description 2
- 238000013480 data collection Methods 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 230000006870 function Effects 0.000 description 2
- 238000012423 maintenance Methods 0.000 description 2
- 239000011159 matrix material Substances 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 238000013473 artificial intelligence Methods 0.000 description 1
- 238000013475 authorization Methods 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 230000003862 health status Effects 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 238000012954 risk control Methods 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
- 238000012384 transportation and delivery Methods 0.000 description 1
- 230000000007 visual effect Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/30—Monitoring
- G06F11/34—Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment
- G06F11/3466—Performance evaluation by tracing or monitoring
- G06F11/3476—Data logging
Landscapes
- Engineering & Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Quality & Reliability (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Debugging And Monitoring (AREA)
Abstract
The application relates to a method and a device for changing a server operation record, computer equipment and a storage medium. The method comprises the following steps: collecting server operation data of a target server at regular time; if the current hidden danger information of the target server is identified in the server operation data, reading a server operation record which is stored in a server management platform and aims at the target server; the server operation record comprises historical hidden danger information of the target server; comparing the historical hidden danger information with the current hidden danger information, and recording difference data between the historical hidden danger information and the current hidden danger information; and changing the server operation record in the server management platform according to the difference data. By adopting the method, the server management platform can timely monitor the actual hidden danger of the server.
Description
Technical Field
The present application relates to the field of computer technologies, and in particular, to a method and an apparatus for changing a server operation record, a computer device, and a storage medium.
Background
A server is a kind of computer that provides computation or application services for other clients (e.g., terminals such as PCs, smart phones, ATMs, etc., and even large-scale devices such as train systems, etc.) in a network. In order to discover the hidden danger of the server device as early as possible so as to process the hidden danger before the server device fails, a user often uses a server management platform to monitor and process the hidden danger possibly existing in the server.
However, in the related art, the server hidden danger is often identified by performing offline calculation by using an offline calculation platform, and hidden danger information obtained by offline calculation is completely exported to a server management platform according to preset time, so that the hidden danger information recorded by the server management platform and the actual hidden danger information of the server have difference and time delay, and the server management platform cannot timely monitor the actual hidden danger information of the server.
Disclosure of Invention
In view of the foregoing, it is desirable to provide a method, an apparatus, a computer device, and a storage medium for changing a server operation record, which enable a server management platform to timely monitor actual hidden dangers of a server.
A method for changing a server operation record, the method comprising:
collecting server operation data of a target server at regular time;
if the current hidden danger information of the target server is identified in the server operation data, reading a server operation record which is stored in a server management platform and aims at the target server; the server operation record comprises historical hidden danger information of the target server;
comparing the historical hidden danger information with the current hidden danger information, and recording difference data between the historical hidden danger information and the current hidden danger information;
and changing the server operation record in the server management platform according to the difference data.
A server operation record changing apparatus, the apparatus comprising:
the acquisition module is used for acquiring server operation data of the target server at regular time;
the reading module is used for reading a server operation record which is stored in a server management platform and aims at the target server if the current hidden danger information of the target server is identified in the server operation data; the server operation record comprises historical hidden danger information of the target server;
the comparison module is used for comparing the historical hidden danger information with the current hidden danger information and recording to obtain difference data between the historical hidden danger information and the current hidden danger information;
and the updating module is used for changing the server operation record in the server management platform according to the difference data.
A computer device comprising a memory and a processor, the memory storing a computer program, the processor implementing the following steps when executing the computer program:
collecting server operation data of a target server at regular time;
if the current hidden danger information of the target server is identified in the server operation data, reading a server operation record which is stored in a server management platform and aims at the target server; the server operation record comprises historical hidden danger information of the target server;
comparing the historical hidden danger information with the current hidden danger information, and recording difference data between the historical hidden danger information and the current hidden danger information;
and changing the server operation record in the server management platform according to the difference data.
A computer-readable storage medium, on which a computer program is stored which, when executed by a processor, carries out the steps of:
collecting server operation data of a target server at regular time;
if the current hidden danger information of the target server is identified in the server operation data, reading a server operation record which is stored in a server management platform and aims at the target server; the server operation record comprises historical hidden danger information of the target server;
comparing the historical hidden danger information with the current hidden danger information, and recording difference data between the historical hidden danger information and the current hidden danger information;
and changing the server operation record in the server management platform according to the difference data.
A computer-readable storage medium, on which a computer program is stored which, when executed by a processor, carries out the steps of:
collecting server operation data of a target server at regular time;
if the current hidden danger information of the target server is identified in the server operation data, reading a server operation record which is stored in a server management platform and aims at the target server; the server operation record comprises historical hidden danger information of the target server;
comparing the historical hidden danger information with the current hidden danger information, and recording difference data between the historical hidden danger information and the current hidden danger information;
and changing the server operation record in the server management platform according to the difference data.
A computer program product comprising a computer program stored in a readable storage medium, from which at least one processor of an apparatus reads and executes the computer program, causing the apparatus to perform the steps of:
collecting server operation data of a target server at regular time;
if the current hidden danger information of the target server is identified in the server operation data, reading a server operation record which is stored in a server management platform and aims at the target server; the server operation record comprises historical hidden danger information of the target server;
comparing the historical hidden danger information with the current hidden danger information, and recording difference data between the historical hidden danger information and the current hidden danger information;
and changing the server operation record in the server management platform according to the difference data.
The server operation record changing method, the device, the computer equipment and the storage medium collect the server operation data of the target server at regular time; if the current hidden danger information of the target server is identified in the server operation data, reading a server operation record which is stored in a server management platform and comprises the historical hidden danger information of the target server and aims at the target server; comparing the historical hidden danger information with the current hidden danger information, and recording difference data between the historical hidden danger information and the current hidden danger information; finally, changing the server operation record in the server management platform according to the difference data; therefore, the difference data between the historical hidden danger information in the server management platform and the current hidden danger information actually existing in the server can be determined in time, and the operation record of the server in the server management platform is updated in time based on the difference data, so that the server management platform can monitor the actual hidden danger existing in the server in time.
Drawings
FIG. 1 is a diagram of an application environment of a method for changing a server operation record according to an embodiment;
FIG. 2 is a flowchart illustrating a method for changing a server operation record according to an embodiment;
FIG. 3 is a flowchart illustrating a method for changing a server operation record according to another embodiment;
FIG. 4 is a flowchart illustrating another method for changing a server operation record according to an embodiment;
FIG. 5 is a flow diagram illustrating a firmware information change according to an embodiment;
FIG. 6 is a flowchart illustrating another method for changing a server operation record according to another embodiment;
FIG. 7 is a diagram illustrating the technical architecture of a method for recording server operations, according to an embodiment;
FIG. 8 is a block diagram of an embodiment of a server operation record changing apparatus;
FIG. 9 is a diagram illustrating an internal structure of a computer device according to an embodiment.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the present application and are not intended to limit the present application.
The server operation record changing method provided by the application can be applied to the application environment shown in fig. 1. Wherein the computer device 102 communicates with the offline computing platform 104 over a network. The computer device 102 regularly acquires server operation data of a target server; and send server operational data to the offline computing platform 104; if the computer device 102 determines that the offline computing platform 104 identifies the current hidden danger information of the target server in the server operation data, the computer device 102 reads a server operation record stored in the server management platform for the target server; the server operation record comprises historical hidden danger information of the target server; then, the computer device 102 compares the historical hidden danger information with the current hidden danger information, and records difference data between the historical hidden danger information and the current hidden danger information; finally, the computer device 102 changes the server operation record in the server management platform according to the difference data. In practical applications, the computer device 102 may be a server management platform or a stand-alone data processing platform. The computer device 102 may be, but is not limited to, various personal computers, notebook computers, smart phones, tablet computers, and portable wearable devices, and the offline computing platform 104 may be implemented by an independent server or a server cluster composed of a plurality of servers.
The target server may be an independent physical server, or may be a server cluster or a distributed system formed by a plurality of physical servers. In practical applications, the target server may be used to provide blockchain storage services.
The blockchain is a novel application mode of computer technologies such as distributed data storage, point-to-point transmission, a consensus mechanism and an encryption algorithm. A block chain (Blockchain), which is essentially a decentralized database, is a series of data blocks associated by using a cryptographic method, and each data block contains information of a batch of network transactions, so as to verify the validity (anti-counterfeiting) of the information and generate a next block. The blockchain may include a blockchain underlying platform, a platform product services layer, and an application services layer.
The block chain underlying platform can comprise processing modules such as user management, basic service, intelligent contract and operation monitoring. The user management module is responsible for identity information management of all blockchain participants, and comprises public and private key generation maintenance (account management), key management, user real identity and blockchain address corresponding relation maintenance (authority management) and the like, and under the authorization condition, the user management module supervises and audits the transaction condition of certain real identities and provides rule configuration (wind control audit) of risk control; the basic service module is deployed on all block chain node equipment and used for verifying the validity of the service request, recording the service request to storage after consensus on the valid request is completed, for a new service request, the basic service firstly performs interface adaptation analysis and authentication processing (interface adaptation), then encrypts service information (consensus management) through a consensus algorithm, transmits the service information to a shared account (network communication) completely and consistently after encryption, and performs recording and storage; the intelligent contract module is responsible for registering and issuing contracts, triggering the contracts and executing the contracts, developers can define contract logics through a certain programming language, issue the contract logics to a block chain (contract registration), call keys or other event triggering and executing according to the logics of contract clauses, complete the contract logics and simultaneously provide the function of upgrading and canceling the contracts; the operation monitoring module is mainly responsible for deployment, configuration modification, contract setting, cloud adaptation in the product release process and visual output of real-time states in product operation, such as: alarm, monitoring network conditions, monitoring node equipment health status, and the like.
The platform product service layer provides basic capability and an implementation framework of typical application, and developers can complete block chain implementation of business logic based on the basic capability and the characteristics of the superposed business. The application service layer provides the application service based on the block chain scheme for the business participants to use.
In addition, the cloud server can also be used for providing basic cloud computing services such as cloud services, cloud databases, cloud computing, cloud functions, cloud storage, network services, cloud communication, middleware services, domain name services, security services, CDN (content delivery network) and big data and artificial intelligence platforms. The terminal may be, but is not limited to, a smart phone, a tablet computer, a laptop computer, a desktop computer, a smart speaker, a smart watch, and the like. The terminal and the server may be directly or indirectly connected through wired or wireless communication, and the application is not limited herein.
In one embodiment, as shown in fig. 2, a server operation record changing method is provided, which is described by taking the method as an example applied to the computer device in fig. 1, and includes the following steps:
and step S210, collecting server operation data of the target server at regular time.
The server operation data may refer to data related to the operation of the server. In practical applications, the server operation data may include server component data and server overall machine data.
In specific implementation, the computer device may periodically perform data analysis in various data sources according to a preset time interval, and further collect the obtained server operation data after the data analysis; and writing the collected server operation Data into a Data Warehouse (DW).
Step S220, if the current hidden danger information of the target server is identified in the server operation data, reading a server operation record stored in the server management platform for the target server.
The server operation record may refer to a record in which an operation state of the target server is recorded.
The server operation record comprises historical hidden danger information of the target server.
The server management platform may refer to a service platform for managing server operations. Therefore, a user can inquire the hidden danger of the machine equipment in the server through the server management platform. In practical application, the server management platform may also be named as a batch hidden danger processing platform (BPM).
The current hidden danger information may refer to hidden danger information currently existing in the target server.
In the specific implementation, after the computer equipment collects the server operation data, the computer equipment can adopt a batch hidden danger identification engine to perform hidden danger identification processing operation on the server operation data to identify whether the target server has server hidden dangers; and if the target server has server hidden danger, the batch hidden danger identification engine outputs batch hidden danger data, namely current hidden danger information of the target server. The current hidden danger information may include hidden danger identification data. For example, whether the target server is hidden, the type of hidden fault, the solution, etc. Meanwhile, the computer equipment can write the calculated current hidden danger information into a data warehouse.
In practical application, the current hidden danger information can also be named as hidden danger result data.
Then, the computer device ex-warehouse the current hidden danger information to a local storage database, such as MySQL, by a data ex-warehouse scheduling task. And when the current hidden danger information is discharged from the warehouse, triggering the computer equipment to execute a data reconciliation action. Specifically, the computer device may read a server operation record stored in the server management platform for the target server. The server operation record records history hidden danger information of the target server. In practical application, the historical hidden danger information can also be named as the hidden danger information of the server to be updated.
The data reconciliation is to ensure the consistency, accuracy and the like of system data and fact data by comparing, accounting and updating one data source with other reference data sources.
And step S230, comparing the historical hidden danger information with the current hidden danger information, and recording difference data between the historical hidden danger information and the current hidden danger information.
In one embodiment, comparing the historical hidden danger information with the current hidden danger information, and recording difference data between the historical hidden danger information and the current hidden danger information includes: carrying out data reconciliation on the historical hidden danger information and the current hidden danger information to obtain a data reconciliation result; the data reconciliation result comprises difference data between the historical hidden danger information and the current hidden danger information.
In the specific implementation, after the computer device obtains the historical hidden danger information in the server operation record, the computer device compares the historical hidden danger information with the current hidden danger information, and records difference data between the historical hidden danger information and the current hidden danger information. In practical application, the computer device may adjust a data reconciliation period, for example, 1 minute, or 1 second, to start a plurality of parallel data reconciliation services, thereby ensuring real-time consistency of system data and current network data.
Specifically, the computer device can perform data reconciliation on the historical hidden danger information and the current hidden danger information to obtain a data reconciliation result; the data reconciliation result comprises difference data between the historical hidden danger information and the current hidden danger information.
In practical application, the computer device can write the data reconciliation result into a database reconciliation result table for storing real-time batch hidden danger data.
And step S240, changing the server operation record in the server management platform according to the difference data.
In one embodiment, the changing the server operation record in the server management platform according to the difference data includes: changing the historical hidden danger information according to the difference data to obtain changed hidden danger information; the changed hidden danger information is consistent with the current hidden danger information.
In the specific implementation, when difference data exists between the historical hidden danger information and the current hidden danger information, the historical hidden danger information is inconsistent with the current hidden danger information, and the hidden danger information recorded by the server management platform is different from the actual hidden danger information of the server; thus, the computer device can change the server operation record in the server management platform according to the difference data. Specifically, the computer device may change the historical hidden danger information according to the difference data to obtain changed hidden danger information that is consistent with the current hidden danger information. Therefore, the hidden danger information recorded by the server management platform is consistent with the actual hidden danger information of the server.
Therefore, the server management platform can display the changed hidden danger information through the front end of the server management platform after background processing is carried out on the changed hidden danger information.
In the server operation record changing method, the server operation data of the target server is collected at regular time; if the current hidden danger information of the target server is identified in the server operation data, reading a server operation record which is stored in a server management platform and comprises the historical hidden danger information of the target server and aims at the target server; comparing the historical hidden danger information with the current hidden danger information, and recording difference data between the historical hidden danger information and the current hidden danger information; finally, changing the server operation record in the server management platform according to the difference data; therefore, the difference data between the historical hidden danger information in the server management platform and the current hidden danger information actually existing in the server can be determined in time, the running records of the server in the server management platform are updated in time based on the difference data, the hidden danger information of the server recorded in the server management platform is consistent with the actual hidden danger information of the server, and the actual hidden danger of the server can be monitored in time by the server management platform.
In another embodiment, as shown in fig. 3, a server operation record changing method is provided, which is described by taking the method as an example applied to the computer device in fig. 1, and includes the following steps: and step S310, collecting server operation data of the target server at regular time. Step S320, if the current hidden danger information of the target server is identified in the server operation data, reading a server operation record which is stored in a server management platform and aims at the target server; the server operation record comprises historical hidden danger information of the target server. Step S330, performing data reconciliation processing on the historical hidden danger information and the current hidden danger information to obtain a data reconciliation result; and the data reconciliation result comprises difference data between the historical hidden danger information and the current hidden danger information. Step S340, changing the historical hidden danger information according to the difference data to obtain changed hidden danger information; the changed hidden danger information is consistent with the current hidden danger information. For the specific limitations of the above steps, reference may be made to the above specific limitations of a method for changing a server operation record.
In one embodiment, the periodically collecting the server operation data of the target server comprises: acquiring original operation data of a target server; performing data cleaning processing on the original operation data to obtain cleaned data; the cleaned data comprises server component data and server complete machine data; and taking the server component data and the server complete machine data as server operation data.
The server component data may refer to data such as a server CPU (central processing unit), a server memory, and a server hard disk.
The server complete machine data may refer to a park, a machine room, and a rack to which the server belongs, and data such as a server fixed resource ID, a server IP, a server Serial Number (Serial Number, machine code), and a server Part Number (Part Number).
In a specific implementation, the computer device specifically includes, in a process of regularly acquiring server operation data of a target server: the computer equipment can acquire the original operation data of the target server; then, the computer device can perform data cleaning processing on the original operation data, including checking data consistency, processing invalid values and missing values, and the like, so as to obtain cleaned data. The cleaned data comprises server component data and server complete machine data.
And finally, the computer equipment takes the server component data and the server complete machine data as server operation data.
In the embodiment, in the process of regularly acquiring the server operation data of the target server, the original operation data of the target server is acquired; performing data cleaning processing on the original operation data to obtain cleaned data comprising server component data and server complete machine data, and using the cleaned data as server operation data; therefore, the data processing amount during the subsequent server hidden danger identification of the server operation data can be reduced, and the efficiency of the server hidden danger identification is improved.
In one embodiment, after the step of periodically collecting the server operation data of the target server, the method further comprises: sending server operation data to an offline computing platform; the off-line computing platform is used for inputting server component data and server complete machine data into a pre-trained server hidden danger identification model to obtain a hidden danger identification result aiming at a target server; acquiring a hidden danger identification result aiming at a target server returned by an offline computing platform; the hidden danger identification result comprises current hidden danger information of the target server.
The offline computing platform may refer to a service platform for performing offline computing. In practice, the offline computing platform may be a public offline computing platform.
In practical applications, the offline computing platform may adopt a Hadoop (a distributed system infrastructure) offline computing architecture.
In specific implementation, after the step of collecting the server operation data of the target server at regular time by the computer device, the computer device may adopt a batch hidden danger identification engine to perform hidden danger identification processing operation on the server operation data, and identify whether the target server has server hidden dangers.
In particular, the computer device may send the server operational data to an offline computing platform. After the offline computing platform receives server operation data sent by computer equipment, the offline computing platform can input server component data and server complete machine data to a pre-trained server hidden danger identification model; specifically, the offline computing platform can convert server component data and server complete machine data into corresponding data feature matrices; then, the off-line computing platform inputs the data characteristic matrix into the pre-trained server hidden danger identification model; and carrying out characteristic identification and classification processing on the data characteristic matrix through the pre-trained server hidden danger identification model to obtain a hidden danger identification result corresponding to the target server. The hidden danger identification result comprises current hidden danger information of the target server. And finally, the off-line computing platform returns the hidden danger identification result to the computer equipment, and the computer equipment executes data reconciliation operation based on the hidden danger identification result.
In this embodiment, the server operation data is sent to the offline computing platform; the off-line computing platform is used for inputting server component data and server complete machine data into a pre-trained server hidden danger identification model to obtain a hidden danger identification result aiming at a target server; acquiring a hidden danger identification result aiming at the target server returned by the offline computing platform; therefore, the data processing operation with large processing capacity of the server hidden danger identification operation data is executed by adopting the offline computing platform, and the data processing load of the server management platform can be effectively reduced.
In one embodiment, as shown in fig. 4, another method for changing a server operation record is provided, which is described by taking the method as an example applied to the computer device in fig. 1, and includes the following steps: and step S410, collecting original operation data of the target server at regular time. Step S420, performing data cleaning processing on the original operation data to obtain cleaned data; the cleaned data comprises server component data and server complete machine data. And step S430, taking the server component data and the server complete machine data as the server operation data. Step S440, sending the server operation data to an offline computing platform; and the offline computing platform is used for inputting the server component data and the server complete machine data into a pre-trained server hidden danger identification model to obtain a hidden danger identification result aiming at the target server. Step S450, acquiring a hidden danger identification result aiming at the target server returned by the offline computing platform; and the hidden danger identification result comprises the current hidden danger information of the target server. Step S460, reading a server operation record stored in a server management platform aiming at the target server; the server operation record comprises historical hidden danger information of the target server. Step 470, comparing the historical hidden danger information with the current hidden danger information, and recording difference data between the historical hidden danger information and the current hidden danger information. And step S480, changing the server operation record in the server management platform according to the difference data. For the specific limitations of the above steps, reference may be made to the above specific limitations of a method for changing a server operation record.
In one embodiment, as shown in fig. 5, a schematic flow chart of firmware information change is provided, where the server operation record further includes firmware version information of the target server, and the method includes the following steps: step S510, collecting firmware change operation data aiming at a target server according to a preset time interval; step S520, determining the changed firmware version of the target server according to the firmware change operation data; in step S530, if the modified firmware version is not consistent with the firmware version in the firmware version information, the firmware version in the firmware version information is modified to the modified firmware version.
The server operation record also comprises firmware version information of the target server.
In a specific implementation, the computer device may collect firmware change operation data for the target server according to a preset time interval. And then, the computer equipment determines the changed firmware version of the target server according to the firmware change operation data and updates the firmware version information of the target server in the server operation record. Specifically, the computer device may determine whether the firmware version after the change is consistent with the firmware version in the firmware version information; and if the firmware version after the change is inconsistent with the firmware version in the firmware version information, the computer equipment changes the firmware version in the firmware version information into the firmware version after the change.
For example, the computer device may periodically query the self-service firmware upgrade APP for data that has been subject to a upgrade operation for the last n minutes (where n may be equal to 5 minutes), i.e., firmware change operation data; the Firmware change operation data comprises data such as fixed resources, component types, current Fw (Firmware) versions and the like; the computer device then uses this data to update the Fw version information in the data of the batch hazard processing platform (BPM).
In the embodiment, the firmware change operation data for the target server is collected according to the preset time interval, and the changed firmware version of the target server is determined according to the firmware change operation data; when the firmware version in the firmware version information is inconsistent with the firmware version in the firmware version information after being changed, changing the firmware version in the firmware version information into the changed firmware version; in this way, the firmware version information recorded in the server management platform can be consistent with the actual firmware version information of the server, so that a user can timely obtain the actual running information of the target server through the server management platform.
In one embodiment, after the step of identifying the current hidden danger information of the target server in the server operation data, the method further comprises the following steps; determining server fault data of a target server according to the current hidden danger information; determining a data acquisition range corresponding to the server fault data; and acquiring target data generated when the target server operates according to the data acquisition range.
The target data is used for changing the server operation record in the server management platform.
In a specific implementation, after the step of identifying the current hidden danger information of the target server in the server operation data, the computer device may further determine server fault data of the target server according to the current hidden danger information. Then, the computer equipment determines a data acquisition range corresponding to the server fault data; finally, the computer equipment collects target data generated when the target server operates according to the data collection range; the target data is used for changing the server operation record in the server management platform.
For example, after the computer device determines server failure data of the target server, the computer device may call a failure data query interface at regular time, and query, from the failure data query interface, data that has failed in the last n hours (n may be equal to 3 hours), that is, server failure data. The server failure data may include, among other things, capital, component type, etc. data. And then, the computer equipment determines a data acquisition range corresponding to the server fault data and acquires target data generated when the target server operates according to the data acquisition range. Specifically, the computer device can use the server fault data to define target data corresponding to the latest n-hour latest acquisition time, and the computer device uses the target data to update Fw version information in data of a batch hidden danger processing platform (BPM), so as to realize self-service firmware upgrade.
In the embodiment, after the step of identifying the current hidden danger information of the target server in the server operation data, the server fault data of the target server is determined according to the current hidden danger information; determining a data acquisition range corresponding to the server fault data; and acquiring target data generated when the target server operates according to the data acquisition range, so that the data acquisition amount of computer equipment during fault monitoring on the target server can be reduced, and the updating efficiency of the server operation record in the server management platform is improved.
In another embodiment, as shown in fig. 6, another server operation record changing method is provided, which is described by taking the example that the method is applied to the computer device in fig. 1, and includes the following steps: and step S610, collecting server operation data of the target server at regular time. Step S620, if the current hidden danger information of the target server is identified in the server operation data, determining server fault data of the target server according to the current hidden danger information. Step S630, determining a data acquisition range corresponding to the server failure data. Step S640, collecting target data generated when the target server operates according to the data collection range; the target data is used for changing the server operation record in the server management platform. For the specific limitations of the above steps, reference may be made to the above specific limitations of a method for changing a server operation record.
It should be understood that, although the individual steps in the flowcharts of fig. 2, 3, 4, 5 and 6 are shown in order as indicated by the arrows, these steps are not necessarily performed in order as indicated by the arrows. The steps are not performed in the exact order shown and described, and may be performed in other orders, unless explicitly stated otherwise. Moreover, at least some of the steps in fig. 2, 3, 4, 5, and 6 may include multiple steps or multiple stages, which are not necessarily performed at the same time, but may be performed at different times, which are not necessarily performed in sequence, but may be performed alternately or alternately with other steps or at least some of the other steps.
To facilitate understanding by those skilled in the art, fig. 7 provides a technical architecture diagram of a server operation recording method; wherein the technical architecture diagram is an architecture based on offline computation and data reconciliation; in practical applications, the computer device performs Data acquisition and analysis from a target server machine in the existing network, and writes server component Data into a Data Warehouse (DW) after the server component Data is obtained through analysis. Wherein, the data warehouse can adopt a Tencent Data Warehouse (TDW). Meanwhile, the computer device may collect server complete machine data from a Configuration Management Database (CMDB), and write the server complete machine data into the data warehouse.
Then, the computer device may use the batch hidden danger identification engine to perform hidden danger identification processing operation on the server operation data, identify whether the target server has server hidden danger, and obtain current hidden danger information. And the computer equipment ex-warehouse the current hidden danger information to a local storage database, such as MySQL, through a data ex-warehouse scheduling task. When the current hidden danger information is exported, triggering the computer equipment to execute a Data Reconciliation Service (Data Reconciliation Service) action, and writing a Data Reconciliation result into a database Reconciliation result table for storing real-time batch hidden danger Data, so as to obtain the real-time batch hidden danger Data, namely the changed hidden danger information. The batch hidden danger processing platform (BPM) can display the changed hidden danger information in a Web front-end mode after performing background processing on the changed hidden danger information; of course, the batch hidden danger processing platform (BPM) may also provide an API interface for calling the server operation record, so that the user may make a call query.
In one embodiment, as shown in fig. 8, there is provided a server operation record changing apparatus, which may be a part of a computer device using a software module or a hardware module, or a combination of the two, and the apparatus specifically includes: an acquisition module 810, a reading module 820, a comparison module 830 and an update module 840, wherein:
the acquisition module 810 is used for acquiring server operation data of a target server at regular time;
a reading module 820, configured to read a server operation record stored in a server management platform for the target server if the current hidden danger information of the target server is identified in the server operation data; the server operation record comprises historical hidden danger information of the target server;
a comparison module 830, configured to compare the historical hidden danger information with the current hidden danger information, and record difference data between the historical hidden danger information and the current hidden danger information;
an updating module 840, configured to change the server operation record in the server management platform according to the difference data.
In an embodiment, the comparing module 830 is specifically configured to perform data reconciliation on the historical hidden danger information and the current hidden danger information to obtain a data reconciliation result; and the data reconciliation result comprises difference data between the historical hidden danger information and the current hidden danger information.
In an embodiment, the updating module 840 is specifically configured to change the historical hidden danger information according to the difference data to obtain changed hidden danger information; the changed hidden danger information is consistent with the current hidden danger information.
In an embodiment, the collecting module 810 is specifically configured to collect original operating data of the target server; performing data cleaning processing on the original operation data to obtain cleaned data; the cleaned data comprises server component data and server complete machine data; and taking the server component data and the server complete machine data as the server operation data.
In one embodiment, the server operation record changing device further includes: the sending module is used for sending the server operation data to an offline computing platform; the off-line computing platform is used for inputting the server component data and the server complete machine data into a pre-trained server hidden danger identification model to obtain a hidden danger identification result aiming at the target server;
the acquisition module is used for acquiring a hidden danger identification result which is returned by the offline computing platform and aims at the target server; and the hidden danger identification result comprises the current hidden danger information of the target server.
In one embodiment, the server operation record further includes firmware version information of the target server, and the server operation record changing means further includes: the firmware information updating module is used for collecting firmware change operation data aiming at the target server according to a preset time interval; determining a changed firmware version of the target server according to the firmware change operation data; and if the firmware version after the change is inconsistent with the firmware version in the firmware version information, changing the firmware version in the firmware version information into the firmware version after the change.
In one embodiment, the server operation record changing device further includes: the fault data monitoring module is used for determining server fault data of the target server according to the current hidden danger information; determining a data acquisition range corresponding to the server fault data; acquiring target data generated when the target server operates according to the data acquisition range; the target data is used for changing the server operation record in the server management platform.
For specific limitations of the server operation record changing device, reference may be made to the above limitations of the server operation record changing method, which are not described herein again. All or part of the modules in the server operation record changing device can be realized by software, hardware and a combination thereof. The modules can be embedded in a hardware form or independent from a processor in the computer device, and can also be stored in a memory in the computer device in a software form, so that the processor can call and execute operations corresponding to the modules.
In one embodiment, a computer device is provided, which may be a server, and its internal structure diagram may be as shown in fig. 9. The computer device includes a processor, a memory, and a network interface connected by a system bus. Wherein the processor of the computer device is configured to provide computing and control capabilities. The memory of the computer device comprises a nonvolatile storage medium and an internal memory. The non-volatile storage medium stores an operating system, a computer program, and a database. The internal memory provides an environment for the operation of an operating system and computer programs in the non-volatile storage medium. The database of the computer device is used for storing server operation record data. The network interface of the computer device is used for communicating with an external terminal through a network connection. The computer program is executed by a processor to implement a server operation record changing method.
Those skilled in the art will appreciate that the architecture shown in fig. 9 is merely a block diagram of some of the structures associated with the disclosed aspects and is not intended to limit the computing devices to which the disclosed aspects apply, as particular computing devices may include more or less components than those shown, or may combine certain components, or have a different arrangement of components.
In one embodiment, a computer device is further provided, which includes a memory and a processor, the memory stores a computer program, and the processor implements the steps of the above method embodiments when executing the computer program.
In an embodiment, a computer-readable storage medium is provided, in which a computer program is stored which, when being executed by a processor, carries out the steps of the above-mentioned method embodiments.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by hardware instructions of a computer program, which can be stored in a non-volatile computer-readable storage medium, and when executed, can include the processes of the embodiments of the methods described above. Any reference to memory, storage, database or other medium used in the embodiments provided herein can include at least one of non-volatile and volatile memory. Non-volatile Memory may include Read-Only Memory (ROM), magnetic tape, floppy disk, flash Memory, optical storage, or the like. Volatile Memory can include Random Access Memory (RAM) or external cache Memory. By way of illustration and not limitation, RAM can take many forms, such as Static Random Access Memory (SRAM) or Dynamic Random Access Memory (DRAM), among others.
The technical features of the above embodiments can be arbitrarily combined, and for the sake of brevity, all possible combinations of the technical features in the above embodiments are not described, but should be considered as the scope of the present specification as long as there is no contradiction between the combinations of the technical features.
The above-mentioned embodiments only express several embodiments of the present application, and the description thereof is more specific and detailed, but not construed as limiting the scope of the invention. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the concept of the present application, which falls within the scope of protection of the present application. Therefore, the protection scope of the present patent shall be subject to the appended claims.
Claims (10)
1. A method for changing a server operation record is characterized by comprising the following steps:
collecting server operation data of a target server at regular time;
if the current hidden danger information of the target server is identified in the server operation data, reading a server operation record which is stored in a server management platform and aims at the target server; the server operation record comprises historical hidden danger information of the target server;
comparing the historical hidden danger information with the current hidden danger information, and recording difference data between the historical hidden danger information and the current hidden danger information;
and changing the server operation record in the server management platform according to the difference data.
2. The method of claim 1, wherein comparing the historical hidden danger information with the current hidden danger information and recording difference data between the historical hidden danger information and the current hidden danger information comprises:
carrying out data reconciliation processing on the historical hidden danger information and the current hidden danger information to obtain a data reconciliation result; and the data reconciliation result comprises difference data between the historical hidden danger information and the current hidden danger information.
3. The method of claim 1, wherein said changing the server operation record in the server management platform according to the difference data comprises:
changing the historical hidden danger information according to the difference data to obtain changed hidden danger information; the changed hidden danger information is consistent with the current hidden danger information.
4. The method of claim 1, wherein the periodically collecting server operational data of the target server comprises:
collecting original operation data of the target server;
performing data cleaning processing on the original operation data to obtain cleaned data; the cleaned data comprises server component data and server complete machine data;
and taking the server component data and the server complete machine data as the server operation data.
5. The method of claim 4, further comprising:
sending the server operation data to an offline computing platform; the off-line computing platform is used for inputting the server component data and the server complete machine data into a pre-trained server hidden danger identification model to obtain a hidden danger identification result aiming at the target server;
acquiring a hidden danger identification result aiming at the target server returned by the offline computing platform; and the hidden danger identification result comprises the current hidden danger information of the target server.
6. The method of claim 1, wherein the server operation record further includes firmware version information of the target server, the method further comprising;
acquiring firmware change operation data aiming at the target server according to a preset time interval;
determining a changed firmware version of the target server according to the firmware change operation data;
and if the firmware version after the change is inconsistent with the firmware version in the firmware version information, changing the firmware version in the firmware version information into the firmware version after the change.
7. The method of claim 1, further comprising;
determining server fault data of the target server according to the current hidden danger information;
determining a data acquisition range corresponding to the server fault data;
acquiring target data generated when the target server operates according to the data acquisition range; the target data is used for changing the server operation record in the server management platform.
8. A server operation record updating apparatus, comprising:
the acquisition module is used for acquiring server operation data of the target server at regular time;
the reading module is used for reading a server operation record which is stored in a server management platform and aims at the target server if the current hidden danger information of the target server is identified in the server operation data; the server operation record comprises historical hidden danger information of the target server;
the comparison module is used for comparing the historical hidden danger information with the current hidden danger information and recording difference data between the historical hidden danger information and the current hidden danger information;
and the updating module is used for changing the server operation record in the server management platform according to the difference data.
9. A computer device comprising a memory and a processor, the memory storing a computer program, wherein the processor implements the steps of the method of any one of claims 1 to 7 when executing the computer program.
10. A computer-readable storage medium, in which a computer program is stored which, when being executed by a processor, carries out the steps of the method according to any one of claims 1 to 7.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011440167.1A CN112579413B (en) | 2020-12-11 | 2020-12-11 | Method, device, computer equipment and storage medium for changing server operation record |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011440167.1A CN112579413B (en) | 2020-12-11 | 2020-12-11 | Method, device, computer equipment and storage medium for changing server operation record |
Publications (2)
Publication Number | Publication Date |
---|---|
CN112579413A true CN112579413A (en) | 2021-03-30 |
CN112579413B CN112579413B (en) | 2024-07-02 |
Family
ID=75130596
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202011440167.1A Active CN112579413B (en) | 2020-12-11 | 2020-12-11 | Method, device, computer equipment and storage medium for changing server operation record |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112579413B (en) |
Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2001356929A (en) * | 2000-06-12 | 2001-12-26 | Nec Fielding Ltd | Automatic fault notifying device and maintenance base system |
JP2006079485A (en) * | 2004-09-13 | 2006-03-23 | Nec Commun Syst Ltd | Method for information collection for fault analysis in electronic computer |
WO2007096977A1 (en) * | 2006-02-24 | 2007-08-30 | Fujitsu Limited | Information processor maintenance/management program |
CN108170476A (en) * | 2018-01-26 | 2018-06-15 | 郑州云海信息技术有限公司 | A kind of method and system for recording server B ios release information |
CN109218114A (en) * | 2018-11-12 | 2019-01-15 | 西安微电子技术研究所 | A kind of server failure automatic checkout system and detection method based on decision tree |
US20190129894A1 (en) * | 2016-06-30 | 2019-05-02 | Huawei Technologies Co., Ltd. | Database Transaction Processing Method, Client, and Server |
CN109831323A (en) * | 2019-01-15 | 2019-05-31 | 网宿科技股份有限公司 | Management method, management system and the server of server info |
CN110442478A (en) * | 2019-07-04 | 2019-11-12 | 深圳壹账通智能科技有限公司 | Product failure processing method, device, computer equipment and storage medium |
CN110457332A (en) * | 2019-07-23 | 2019-11-15 | 中国平安财产保险股份有限公司 | A kind of information processing method and relevant device |
CN110659297A (en) * | 2019-08-13 | 2020-01-07 | 上海陆家嘴国际金融资产交易市场股份有限公司 | Data processing method, data processing device, computer equipment and storage medium |
KR20200056357A (en) * | 2020-03-17 | 2020-05-22 | 주식회사 실크로드소프트 | Technique for implementing change data capture in database management system |
-
2020
- 2020-12-11 CN CN202011440167.1A patent/CN112579413B/en active Active
Patent Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2001356929A (en) * | 2000-06-12 | 2001-12-26 | Nec Fielding Ltd | Automatic fault notifying device and maintenance base system |
JP2006079485A (en) * | 2004-09-13 | 2006-03-23 | Nec Commun Syst Ltd | Method for information collection for fault analysis in electronic computer |
WO2007096977A1 (en) * | 2006-02-24 | 2007-08-30 | Fujitsu Limited | Information processor maintenance/management program |
US20190129894A1 (en) * | 2016-06-30 | 2019-05-02 | Huawei Technologies Co., Ltd. | Database Transaction Processing Method, Client, and Server |
CN108170476A (en) * | 2018-01-26 | 2018-06-15 | 郑州云海信息技术有限公司 | A kind of method and system for recording server B ios release information |
CN109218114A (en) * | 2018-11-12 | 2019-01-15 | 西安微电子技术研究所 | A kind of server failure automatic checkout system and detection method based on decision tree |
CN109831323A (en) * | 2019-01-15 | 2019-05-31 | 网宿科技股份有限公司 | Management method, management system and the server of server info |
CN110442478A (en) * | 2019-07-04 | 2019-11-12 | 深圳壹账通智能科技有限公司 | Product failure processing method, device, computer equipment and storage medium |
CN110457332A (en) * | 2019-07-23 | 2019-11-15 | 中国平安财产保险股份有限公司 | A kind of information processing method and relevant device |
CN110659297A (en) * | 2019-08-13 | 2020-01-07 | 上海陆家嘴国际金融资产交易市场股份有限公司 | Data processing method, data processing device, computer equipment and storage medium |
KR20200056357A (en) * | 2020-03-17 | 2020-05-22 | 주식회사 실크로드소프트 | Technique for implementing change data capture in database management system |
Also Published As
Publication number | Publication date |
---|---|
CN112579413B (en) | 2024-07-02 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP7199775B2 (en) | Data processing method, data processing device, node device, and computer program based on smart contract | |
CN110602217B (en) | Block chain-based alliance management method, device, equipment and storage medium | |
CN110633323A (en) | Business data storage method, device, storage medium and computer equipment | |
WO2020073301A1 (en) | Systems and methods for monitoring a blockchain-based energy grid | |
CN112527912B (en) | Data processing method and device based on block chain network and computer equipment | |
CN110990183B (en) | Database cluster anomaly detection method and device and computer-readable storage medium | |
BR112020019153A2 (en) | SYSTEM AND METHOD FOR PROCESSING THE PROCESS STATE | |
CN110838065A (en) | Transaction data processing method and device | |
CN110995781A (en) | Praise information processing method, device and system | |
CN112291372B (en) | Asynchronous posting method, device, medium and electronic equipment for block chain | |
CN114595127B (en) | Log exception processing method, device, equipment and storage medium | |
CN113315828A (en) | Traffic recording method and device, traffic recording equipment and storage medium | |
JPWO2021192191A5 (en) | Abnormal Access Prediction System, Abnormal Access Prediction Method and Abnormal Access Prediction Program | |
CN110930254A (en) | Data processing method, device, terminal and medium based on block chain | |
CN112200680B (en) | Block link point management method, device, computer and readable storage medium | |
CN113946491A (en) | Microservice data processing method, microservice data processing device, computer equipment and storage medium | |
CN115812298A (en) | Block chain management of supply failure | |
CN114338684A (en) | Energy management system and method | |
CN112579413B (en) | Method, device, computer equipment and storage medium for changing server operation record | |
CN114722025B (en) | Data prediction method, device, equipment and storage medium based on prediction model | |
CN116455782A (en) | Block chain network testing method and related device | |
CN113810475A (en) | Wifi probe equipment management and control system based on big data architecture | |
CN113221151A (en) | Data processing method and device based on block chain and storage medium | |
CN112860444B (en) | Memory calling information determining method and device, storage medium and electronic equipment | |
CN109684158A (en) | Method for monitoring state, device, equipment and the storage medium of distributed coordination system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
REG | Reference to a national code |
Ref country code: HK Ref legal event code: DE Ref document number: 40041032 Country of ref document: HK |
|
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant |