CN110569085A - configuration file loading method and system - Google Patents
- ️Fri Dec 13 2019
CN110569085A - configuration file loading method and system - Google Patents
configuration file loading method and system Download PDFInfo
-
Publication number
- CN110569085A CN110569085A CN201910756822.5A CN201910756822A CN110569085A CN 110569085 A CN110569085 A CN 110569085A CN 201910756822 A CN201910756822 A CN 201910756822A CN 110569085 A CN110569085 A CN 110569085A Authority
- CN
- China Prior art keywords
- configuration
- target machine
- configuration file
- management background
- application program Prior art date
- 2019-08-15 Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
- 238000011068 loading method Methods 0.000 title claims abstract description 18
- 238000000034 method Methods 0.000 claims abstract description 27
- 238000004891 communication Methods 0.000 claims abstract description 22
- 238000004590 computer program Methods 0.000 claims description 13
- 230000004048 modification Effects 0.000 claims description 10
- 238000012986 modification Methods 0.000 claims description 10
- 238000013515 script Methods 0.000 description 8
- 230000006870 function Effects 0.000 description 7
- 230000008569 process Effects 0.000 description 4
- 238000010586 diagram Methods 0.000 description 3
- 230000008859 change Effects 0.000 description 2
- 238000001514 detection method Methods 0.000 description 2
- 238000012544 monitoring process Methods 0.000 description 2
- 230000004083 survival effect Effects 0.000 description 2
- 230000002159 abnormal effect Effects 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 238000012790 confirmation Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 230000005012 migration Effects 0.000 description 1
- 238000013508 migration Methods 0.000 description 1
- 238000012795 verification Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/445—Program loading or initiating
- G06F9/44505—Configuring for program initiating, e.g. using registry, configuration files
- G06F9/4451—User profiles; Roaming
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/14—Session management
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/2866—Architectures; Arrangements
- H04L67/30—Profiles
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
- H04L69/16—Implementation or adaptation of Internet protocol [IP], of transmission control protocol [TCP] or of user datagram protocol [UDP]
- H04L69/161—Implementation details of TCP/IP or UDP/IP stack architecture; Specification of modified or new header fields
- H04L69/162—Implementation details of TCP/IP or UDP/IP stack architecture; Specification of modified or new header fields involving adaptations of sockets based mechanisms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
- H04L69/16—Implementation or adaptation of Internet protocol [IP], of transmission control protocol [TCP] or of user datagram protocol [UDP]
- H04L69/163—In-band adaptation of TCP data exchange; In-band control procedures
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Stored Programmes (AREA)
Abstract
the application discloses a configuration file loading method and a configuration file loading system, wherein the method comprises the following steps: the server side is in long connection communication with a configuration management background through a first application program, and the configuration management background sends a configuration instruction to the server; the target machine receives the configuration instruction, and creates, modifies or deletes a first configuration file in the target machine through a second application program according to the configuration instruction, or starts and stops a third application program in the target machine; the target machine feeds back the running state to the server; the configuration management background creates a plurality of second configuration files; specifying an identifier for the second configuration file; the target machine stores the target machine to a specified directory according to the identification; according to the configuration file loading method, all configuration information can be managed in a centralized mode in the configuration center management background, management can be conducted according to role authority, and operation is very convenient and fast.
Description
Technical Field
The present application relates to the field of communications, and in particular, to a method and a system for loading a configuration file.
Background
The traditional configuration file is hard-coded in a program or written in a certain configuration file of a target machine, and once the modified configuration file is required to be logged in the target machine for modification, the modified configuration file is published through a publishing system. It becomes more cumbersome if batch modification situations (such as server migration) are encountered. Or when a certain configuration before the user needs to be found, the user basically has no ability. In addition, if the configuration file is modified and the resident memory application needs to be restarted to reload the configuration, the conventional practice is difficult to accept.
disclosure of Invention
The main objective of the present application is to provide a configuration file loading method, including:
The server side is in long connection communication with a configuration management background through a first application program, and the configuration management background sends a configuration instruction to the server;
The target machine receives the configuration instruction, and creates, modifies or deletes a first configuration file in the target machine through a second application program according to the configuration instruction, or starts and stops a third application program in the target machine;
The target machine feeds back the running state to the server;
The configuration management background creates a plurality of second configuration files;
Specifying an identifier for the second configuration file;
The target machine stores the target machine to a specified directory according to the identification;
when a second application program in the target machine reads the second configuration file from the configuration management background, searching a local designated path according to the identifier;
And when the second configuration file does not exist, the second application program acquires remote configuration information in the configuration management background.
optionally, the second application program obtains remote configuration information in the configuration management background through an api interface of the configuration management background.
Optionally, the server side maintains long connection communication with the configuration management background through a websocket.
Optionally, the server sends the configuration instruction to the target machine through a TCP protocol
optionally, the configuration management background performs system management, project management, classification management, machine management, agent management or configuration management through the RBAC authority; the user creates configuration items and classifications, and creates a plurality of second configuration files under the classifications, wherein the second configuration files are stored by using a json format; and after the second configuration file is created or edited successfully, selecting the data of the specified version and sending the data to the specified target machine list.
optionally, when the second configuration file is stored, the version number of the old data before modification is established and stored, and then the current configuration is updated.
optionally, when the configuration information is issued, a specific version is selected for release or rollback.
According to another aspect of the present application, there is also provided a configuration file loading system, including: the system comprises a server and a target machine, wherein the server is in long connection communication with a configuration management background through a first application program, and the configuration management background sends a configuration instruction to the server; the target machine receives the configuration instruction, and creates, modifies or deletes a first configuration file in the target machine through a second application program according to the configuration instruction, or starts and stops a third application program in the target machine; the target machine feeds back the running state to the server; the configuration management background creates a plurality of second configuration files; the configuration management background appoints an identifier for the second configuration file; the target machine stores the target machine to a specified directory according to the identification; when a second application program in the target machine reads the second configuration file from the configuration management background, searching a local designated path according to the identifier; and when the second configuration file does not exist, the second application program acquires remote configuration information in the configuration management background.
according to another aspect of the present application, there is also provided a computer device comprising a memory, a processor and a computer program stored in the memory and executable by the processor, the processor implementing the method of any one of the above when executing the computer program.
According to another aspect of the application, there is also provided a computer-readable storage medium, a non-volatile readable storage medium, having stored therein a computer program, which when executed by a processor, implements the method of any of the above.
According to another aspect of the application, there is also provided a computer program product comprising computer readable code which, when executed by a computer device, causes the computer device to perform the method of any of the above.
According to the cloud configuration scheme based on the proxy service, a proxy service program is installed on all target machines, long-connection communication is established between the proxy service and the service of the cloud configuration center, configuration information is issued to the target machines, and meanwhile, high-availability cloud configuration functions are achieved through the schemes of machine survival detection, configuration information version management, specific configuration application management and the like. The method is mainly used for issuing application configuration in the local area network, configuration information of the target machine is uniformly managed through the configuration agent service and the configuration center, and ultra-high-efficiency network communication is carried out in the range of the local area network, so that a high-performance and high-availability cloud configuration service system is established. Once a certain configuration needs to be changed, program codes do not need to be modified, or a target machine does not need to be logged in to modify configuration information, and all operations are realized in a management background of the cloud configuration center. The scheme only provides network services in the local area network, so that the performance and the safety can be guaranteed.
drawings
The accompanying drawings, which are incorporated in and constitute a part of this application, serve to provide a further understanding of the application and to enable other features, objects, and advantages of the application to be more apparent. The drawings and their description illustrate the embodiments of the invention and do not limit it. In the drawings:
FIG. 1 is a schematic flow chart diagram of a configuration file loading method according to an embodiment of the present application;
FIG. 2 is a schematic diagram of a computer device according to one embodiment of the present application; and
FIG. 3 is a schematic diagram of a computer-readable storage medium according to one embodiment of the present application.
Detailed Description
In order to make the technical solutions better understood by those skilled in the art, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only partial embodiments of the present application, but not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
It should be noted that the terms "first," "second," and the like in the description and claims of this application and in the drawings described above are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It should be understood that the data so used may be interchanged under appropriate circumstances such that embodiments of the application described herein may be used. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
it should be noted that the embodiments and features of the embodiments in the present application may be combined with each other without conflict. The present application will be described in detail below with reference to the embodiments with reference to the attached drawings.
Referring to fig. 1, the present application provides a configuration file loading method, including:
S2: the server side is in long connection communication with a configuration management background through a first application program, and the configuration management background sends a configuration instruction to the server;
S4: the target machine receives the configuration instruction, and creates, modifies or deletes a first configuration file in the target machine through a second application program according to the configuration instruction, or starts and stops a third application program in the target machine;
S6: the target machine feeds back the running state to the server;
S8: the configuration management background creates a plurality of second configuration files;
S10: specifying an identifier for the second configuration file;
s12: the target machine stores the target machine to a specified directory according to the identification;
S14: when a second application program in the target machine reads the second configuration file from the configuration management background, searching a local designated path according to the identifier;
s16: and when the second configuration file does not exist, the second application program acquires remote configuration information in the configuration management background.
In an embodiment of the present application, the second application obtains remote configuration information in the configuration management background through an api interface of the configuration management background.
in an embodiment of the application, the server side is in long connection communication with the configuration management background through a websocket, and the server side sends the configuration instruction to the target machine through a TCP protocol.
The configuration center service is a server application resident in a memory, can be realized by any language or programming tool (such as a swoole server), and needs to support a communication mode of a TCP (transmission control protocol) and a websocket protocol at the same time, wherein the websocket protocol is mainly used for performing long-connection communication with a cloud configuration management background, receiving a relevant instruction of a console and feeding back an operating state of a target machine; the TCP protocol is mainly used for carrying out network communication with a configuration agent program of a target machine and sending configuration information to a remote target machine.
The configuration agent service is a resident application program and is installed on a target machine needing to use the cloud configuration system. The configuration agent service program needs to have enough system authority, can create, modify and delete configuration files on a specified path of the target machine, and can start and stop some application programs on the target machine. And (c) once the agent program is started, establishing a long connection with the configuration center service in the step a and performing connection authentication operation. After the authentication is successful, the configuration agent program can carry out normal data communication with the configuration center service program.
When the configuration is created, a key needs to be specified for the configuration, and a namespace can also be set, but the combination of the namespace and the key needs to be unique. After all target machines acquire the configuration information, the configuration files need to be stored under the specified directory (for example,/data/configurations /), the stored sub-directories can be set according to the name space of the configuration files, and finally the configuration files are stored in a unified file suffix format (for example,. conf). For example, the following steps are carried out: for example, a configuration name is "database configuration", its name space is "chelun", its key is "mysql", and its storage path is: "/data/configs/chelun/mysql. conf". Whether the configuration agent service reads and writes the configuration file or the application reads the configuration file, this agreed path rule needs to be followed.
When an application program of a target machine needs to read a certain configuration from the cloud configuration center, the file is searched for according to a specified path of the 'namespace + key' of the configuration information to the local, if the configuration file does not exist, the remote configuration information is acquired through an api interface provided by the cloud configuration center, and if the acquisition is successful, the configuration information is stored under the specified path of the local according to the rule of the step d, and meanwhile, the configuration information is used. The principle of loading the configuration file is to read the configuration file from a local path as much as possible, so that abnormal conditions caused by network IO are reduced, the configuration file can be normally used even if the network is unavailable, and the application program can be ensured to normally run. If the application program of the target machine is resident in the memory, the application program needs to be capable of monitoring the change condition of the configuration file in real time, and automatically reloads once the configuration file is found to be changed (monitoring can be realized by using the inotify system api of the linux system).
In an embodiment of the application, the configuration management background performs system management, project management, classification management, machine management, agent management or configuration management through the RBAC right; the user creates configuration items and classifications, and creates a plurality of second configuration files under the classifications, wherein the second configuration files are stored by using a json format; and after the second configuration file is created or edited successfully, selecting the data of the specified version and sending the data to the specified target machine list.
In an embodiment of the present application, when the second configuration file is stored, the version number of the old data before modification is established and stored, and then the current configuration is updated.
in an embodiment of the present application, when the configuration information is issued, a specific version is selected to be issued or rolled back.
When the configuration information is stored, the old data before modification is established into a version number and stored, and then the current configuration is updated. By recording each piece of data configuration version number information, version management of the configuration information can be realized, and when the configuration information is issued, a specified version can be selected for release or rollback. The function is very effective especially when emergency rollback is required due to misoperation.
The present application further provides a configuration file loading system, including: the system comprises a server and a target machine, wherein the server is in long connection communication with a configuration management background through a first application program, and the configuration management background sends a configuration instruction to the server; the target machine receives the configuration instruction, and creates, modifies or deletes a first configuration file in the target machine through a second application program according to the configuration instruction, or starts and stops a third application program in the target machine; the target machine feeds back the running state to the server; the configuration management background creates a plurality of second configuration files; the configuration management background appoints an identifier for the second configuration file; the target machine stores the target machine to a specified directory according to the identification; when a second application program in the target machine reads the second configuration file from the configuration management background, searching a local designated path according to the identifier; and when the second configuration file does not exist, the second application program acquires remote configuration information in the configuration management background.
referring to fig. 2, the present application further provides a computer device including a memory, a processor, and a computer program stored in the memory and executable by the processor, wherein the processor implements the method of any one of the above methods when executing the computer program.
referring to fig. 3, the present application also provides a computer-readable storage medium, a non-volatile readable storage medium, having stored therein a computer program, which when executed by a processor implements the method of any of the above.
The present application also provides a computer program product comprising computer readable code which, when executed by a computer device, causes the computer device to perform the method of any of the above.
The cloud configuration method and system based on the proxy server provide a configuration information cloud management scheme, which is a configuration management background and provides functions of permission system management, project management, classification management, machine management, proxy management, configuration management and the like based on RBAC. Each user may create their own configuration items and categories and create multiple configuration files under the categories, the configuration files being stored using the json format. And after the configuration file is created or edited successfully, selecting the data of the specified version and issuing the data to the specified target machine list.
The application also provides a configuration information updating scheme, and the configuration information updating is divided into an active updating mode and an automatic updating mode. And the active updating mode is that a cloud configuration management background is used, the updated configuration information is sent to a configuration proxy service program of the target machine through a button of 'configuration issuing', and after the proxy service program receives an 'configuration issuing' instruction, the new configuration information is written into a specified configuration file path according to the rule, so that the configuration file is updated. The automatic updating means that when the configuration information of the cloud configuration center is stored, the updated configuration information is automatically sent to the configuration agent service program of the target machine, and then the configuration issuing operation which is the same as the active updating is completed. Since the automatic update may have a risk of misoperation, whether the automatic update function is started or not can be automatically evaluated by a user.
the application also provides a machine management scheme, and the machine management functions comprise the functions of increasing, deleting, modifying and checking machine information and the automatic online and offline of the target machine. Each piece of configuration information corresponds to a target machine list, and if part of new machines exist in the specified target machine list, the configuration center can establish connection and normally communicate with the new machines, and the machines are automatically added into the machine list of the system; if some machines in the designated target machine list are offline and the configuration center cannot establish connection with the machines or communication fails, the machines are automatically removed from the machine list of the system.
the application also provides a configuration information version management scheme, and when the configuration information is stored, the version number of the old data before modification is established and stored, and then the current configuration is updated. By recording each piece of data configuration version number information, version management of the configuration information can be realized, and when the configuration information is issued, a specified version can be selected for release or rollback. The function is very effective especially when emergency rollback is required due to misoperation.
the application also provides an application configuration management scheme, and when a configuration file is prepared for a certain application of a target machine, a specific survival detection script, a starting script, a stopping script, a restarting script or other pre-scripts, post-scripts and the like can be configured for the application at the same time. By configuring these scripts, it is possible to determine whether they need to be executed when configuration information is issued. If the target application is a program resident in the memory and the modification of the configuration file usually requires restarting the target application to be effective, the configured script can be used for carrying out operations such as remote start-stop, automatic restart and the like on the target application.
The application also provides a configuration information error-correcting scheme, and when the configuration information is created or edited, the visualized JSON editor is used for content editing, so that the condition that the JSON format is incorrect due to handwriting can be avoided. If the JSON format is not problematic, when editing the configuration and finding that the content of the current configuration is greatly different from the content of the previous version (for example, the content length is different by more than 50%), the box is popped on the operation interface to allow the operator to confirm the change information, and the updating operation is executed only when the confirmation is successful.
The application also provides a disaster tolerance scheme of the configuration service, the http service of the configuration center adopts keepalive + nginx to realize dual-computer hot standby, and high availability of the management background and the interface service of the configuration center is ensured. The configuration center service program and the configuration agent service program are monitored by using a super process management tool, and once the service programs are accidentally exited, the service programs are automatically restarted by the super, so that the high availability of the service programs is ensured.
Compared with the prior art, the cloud configuration method and system based on the proxy server have the following advantages:
a. Centralized management: all configuration information can be managed in a centralized way in a configuration center management background and can also be managed according to role authority, and the operation is very convenient.
b. the configuration is flexible: the configured content can be published according to a specified version or specified to a specific machine, and the whole configuration issuing operation is very flexible.
c. service high performance: the configuration center and the configuration agent directly carry out TCP communication of an intranet, and the method is much more efficient than the traditional http communication mode.
d. Service high availability: the http service adopts a dual-computer hot standby technology, the tcp service adopts a super for process management, and the whole architecture is highly available.
e. And (4) service security: the service is not directly outward, so that the external attack risk is reduced; the service provides an authentication mechanism to ensure the security of the core service; and the communication protocol is subjected to multiple encryption verification, so that the safety of communication data is ensured.
It will be apparent to those skilled in the art that the modules or steps of the present application described above may be implemented by a general purpose computing device, they may be centralized on a single computing device or distributed across a network of multiple computing devices, and they may alternatively be implemented by program code executable by a computing device, such that they may be stored in a storage device and executed by a computing device, or fabricated separately as individual integrated circuit modules, or fabricated as a single integrated circuit module from multiple modules or steps. Thus, the present application is not limited to any specific combination of hardware and software.
The above description is only a preferred embodiment of the present application and is not intended to limit the present application, and various modifications and changes may be made by those skilled in the art. Any modification, equivalent replacement, improvement and the like made within the spirit and principle of the present application shall be included in the protection scope of the present application.
Claims (10)
1. A method for loading a configuration file is characterized by comprising the following steps:
The server side is in long connection communication with a configuration management background through a first application program, and the configuration management background sends a configuration instruction to the server;
The target machine receives the configuration instruction, and creates, modifies or deletes a first configuration file in the target machine through a second application program according to the configuration instruction, or starts and stops a third application program in the target machine;
The target machine feeds back the running state to the server;
The configuration management background creates a plurality of second configuration files;
Specifying an identifier for the second configuration file;
The target machine stores the target machine to a specified directory according to the identification;
when a second application program in the target machine reads the second configuration file from the configuration management background, searching a local designated path according to the identifier;
and when the second configuration file does not exist, the second application program acquires remote configuration information in the configuration management background.
2. The method for loading the configuration file according to claim 1, wherein the second application program obtains the remote configuration information in the configuration management background through an api interface of the configuration management background.
3. The configuration file loading method according to claim 2, wherein the server side maintains long connection communication with the configuration management background through a websocket, and the server side sends the configuration instruction to the target machine through a TCP protocol.
4. the method for loading the configuration file according to claim 3, wherein the configuration management background performs system management, project management, classification management, machine management, agent management or configuration management through RBAC authority; the user creates configuration items and classifications, and creates a plurality of second configuration files under the classifications, wherein the second configuration files are stored by using a json format; and after the second configuration file is created or edited successfully, selecting the data of the specified version and sending the data to the specified target machine list.
5. The method for loading configuration files according to claim 4, wherein when the second configuration file is stored, the old data before modification is established into a version number and stored, and then the current configuration is updated.
6. The method of claim 5, wherein when the configuration information is issued, a specific version is selected for release or rollback.
7. A configuration file loading system, comprising: the system comprises a server and a target machine, wherein the server is in long connection communication with a configuration management background through a first application program, and the configuration management background sends a configuration instruction to the server; the target machine receives the configuration instruction, and creates, modifies or deletes a first configuration file in the target machine through a second application program according to the configuration instruction, or starts and stops a third application program in the target machine; the target machine feeds back the running state to the server; the configuration management background creates a plurality of second configuration files; the configuration management background appoints an identifier for the second configuration file; the target machine stores the target machine to a specified directory according to the identification; when a second application program in the target machine reads the second configuration file from the configuration management background, searching a local designated path according to the identifier; and when the second configuration file does not exist, the second application program acquires remote configuration information in the configuration management background.
8. a computer device comprising a memory, a processor and a computer program stored in the memory and executable by the processor, wherein the processor implements the method of any one of claims 1-6 when executing the computer program.
9. a computer-readable storage medium, a non-transitory readable storage medium, having stored therein a computer program, characterized in that the computer program, when executed by a processor, implements the method according to any one of claims 1-6.
10. A computer program product comprising computer readable code that, when executed by a computer device, causes the computer device to perform the method of any of claims 1-6.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910756822.5A CN110569085A (en) | 2019-08-15 | 2019-08-15 | configuration file loading method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910756822.5A CN110569085A (en) | 2019-08-15 | 2019-08-15 | configuration file loading method and system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110569085A true CN110569085A (en) | 2019-12-13 |
Family
ID=68775526
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910756822.5A Withdrawn CN110569085A (en) | 2019-08-15 | 2019-08-15 | configuration file loading method and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110569085A (en) |
Cited By (8)
* Cited by examiner, † Cited by third partyPublication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111767089A (en) * | 2020-06-28 | 2020-10-13 | 北京百度网讯科技有限公司 | Method, apparatus, device and storage medium for loading files |
CN112351104A (en) * | 2020-11-11 | 2021-02-09 | 光大兴陇信托有限责任公司 | Proxy server function extension method and system based on script engine |
CN113220271A (en) * | 2021-04-07 | 2021-08-06 | 深圳震有科技股份有限公司 | Service configuration modification method, terminal and computer readable storage medium |
CN113282349A (en) * | 2021-05-26 | 2021-08-20 | 广州市百果园网络科技有限公司 | Configuration object processing method and device, electronic equipment and readable storage medium |
CN114090105A (en) * | 2021-02-02 | 2022-02-25 | 京东科技信息技术有限公司 | A system construction method and device |
CN114090127A (en) * | 2021-11-24 | 2022-02-25 | 中国建设银行股份有限公司 | Electronic device, loading method and medium of configuration file of electronic device |
CN114691238A (en) * | 2022-03-30 | 2022-07-01 | 阿波罗智联(北京)科技有限公司 | Script file execution method, device, equipment, storage medium and program product |
WO2024041035A1 (en) * | 2022-08-23 | 2024-02-29 | 网络通信与安全紫金山实验室 | Machine learning model management method and device, model management platform, and storage medium |
Citations (6)
* Cited by examiner, † Cited by third partyPublication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101483555A (en) * | 2009-02-12 | 2009-07-15 | 浙江工商大学 | Method for redundant backup implemented by dual ForCES control piece |
WO2010148714A1 (en) * | 2009-11-10 | 2010-12-29 | 中兴通讯股份有限公司 | Control method and system for remote configuration |
WO2016124013A1 (en) * | 2015-02-03 | 2016-08-11 | 百度在线网络技术(北京)有限公司 | Method and apparatus for dynamically implementing application function |
CN106603281A (en) * | 2016-12-07 | 2017-04-26 | 乐视控股(北京)有限公司 | Configuration file management method and system |
CN108037961A (en) * | 2017-12-07 | 2018-05-15 | 北京锐安科技有限公司 | A kind of application program collocation method, device, server and storage medium |
CN108566290A (en) * | 2018-02-07 | 2018-09-21 | 平安科技(深圳)有限公司 | service configuration management method, system, storage medium and server |
-
2019
- 2019-08-15 CN CN201910756822.5A patent/CN110569085A/en not_active Withdrawn
Patent Citations (6)
* Cited by examiner, † Cited by third partyPublication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101483555A (en) * | 2009-02-12 | 2009-07-15 | 浙江工商大学 | Method for redundant backup implemented by dual ForCES control piece |
WO2010148714A1 (en) * | 2009-11-10 | 2010-12-29 | 中兴通讯股份有限公司 | Control method and system for remote configuration |
WO2016124013A1 (en) * | 2015-02-03 | 2016-08-11 | 百度在线网络技术(北京)有限公司 | Method and apparatus for dynamically implementing application function |
CN106603281A (en) * | 2016-12-07 | 2017-04-26 | 乐视控股(北京)有限公司 | Configuration file management method and system |
CN108037961A (en) * | 2017-12-07 | 2018-05-15 | 北京锐安科技有限公司 | A kind of application program collocation method, device, server and storage medium |
CN108566290A (en) * | 2018-02-07 | 2018-09-21 | 平安科技(深圳)有限公司 | service configuration management method, system, storage medium and server |
Cited By (8)
* Cited by examiner, † Cited by third partyPublication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111767089A (en) * | 2020-06-28 | 2020-10-13 | 北京百度网讯科技有限公司 | Method, apparatus, device and storage medium for loading files |
CN112351104A (en) * | 2020-11-11 | 2021-02-09 | 光大兴陇信托有限责任公司 | Proxy server function extension method and system based on script engine |
CN114090105A (en) * | 2021-02-02 | 2022-02-25 | 京东科技信息技术有限公司 | A system construction method and device |
CN113220271A (en) * | 2021-04-07 | 2021-08-06 | 深圳震有科技股份有限公司 | Service configuration modification method, terminal and computer readable storage medium |
CN113282349A (en) * | 2021-05-26 | 2021-08-20 | 广州市百果园网络科技有限公司 | Configuration object processing method and device, electronic equipment and readable storage medium |
CN114090127A (en) * | 2021-11-24 | 2022-02-25 | 中国建设银行股份有限公司 | Electronic device, loading method and medium of configuration file of electronic device |
CN114691238A (en) * | 2022-03-30 | 2022-07-01 | 阿波罗智联(北京)科技有限公司 | Script file execution method, device, equipment, storage medium and program product |
WO2024041035A1 (en) * | 2022-08-23 | 2024-02-29 | 网络通信与安全紫金山实验室 | Machine learning model management method and device, model management platform, and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110569085A (en) | 2019-12-13 | configuration file loading method and system |
CN110543335A (en) | 2019-12-06 | Application program configuration management method and system |
CN109639794B (en) | 2021-07-13 | State cluster recovery method, device, equipment and readable storage medium |
KR101970839B1 (en) | 2019-04-19 | Replaying jobs at a secondary location of a service |
US9626177B1 (en) | 2017-04-18 | Peer to peer upgrade management |
US20140214782A1 (en) | 2014-07-31 | Distributed Storage Object Delete |
CN110519088A (en) | 2019-11-29 | Configure service disaster and system |
CN110474983A (en) | 2019-11-19 | Cloud configuration method and system based on agency service |
JP2015060285A (en) | 2015-03-30 | Global transaction processing method in cloud computing |
CN110572442A (en) | 2019-12-13 | Method and system for configuring file path |
CN113590169A (en) | 2021-11-02 | Application deployment method, application deployment system, and computer-readable storage medium |
CN111581285B (en) | 2023-06-06 | Data information synchronization method, device, electronic equipment and medium |
CN112732412A (en) | 2021-04-30 | Service configuration file processing method and device, storage medium and electronic equipment |
CN113094211B (en) | 2024-04-23 | Backup data processing method and device |
CN110572277A (en) | 2019-12-13 | Machine management method and system |
CN114637496A (en) | 2022-06-17 | Configuration data processing system, method and electronic equipment |
JP5943753B2 (en) | 2016-07-05 | Virtual machine management system, virtual machine management method and program |
CN115248746A (en) | 2022-10-28 | Data backup method, system and related equipment |
FR3003365A1 (en) | 2014-09-19 | METHOD AND DEVICE FOR MANAGING SOFTWARE UPDATES OF A SET OF EQUIPMENT OF A SYSTEM SUCH AS A SYSTEM OF AN AIRCRAFT |
CN109587202B (en) | 2021-08-13 | Method, device and system for coprocessing between file verification and data processing |
CN106708541A (en) | 2017-05-24 | Version upgrading processing method and apparatus |
CN104462353A (en) | 2015-03-25 | Batch synchronous processing method and device for databases |
JP2006507551A (en) | 2006-03-02 | Method and apparatus for two-phase commit in data distribution to a web farm |
CN117215635B (en) | 2024-08-27 | Task processing method, device and storage medium |
CN114968276A (en) | 2022-08-30 | Application program deployment method and device, computer equipment and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
2019-12-13 | PB01 | Publication | |
2019-12-13 | PB01 | Publication | |
2020-01-07 | SE01 | Entry into force of request for substantive examination | |
2020-01-07 | SE01 | Entry into force of request for substantive examination | |
2022-09-13 | WW01 | Invention patent application withdrawn after publication |
Application publication date: 20191213 |
2022-09-13 | WW01 | Invention patent application withdrawn after publication |