Service chain operation monitoring method and device thereof, equipment, medium and product
A technology of operation monitoring and business, applied in the direction of transmission system, electrical components, etc., can solve problems such as difficulties
Pending Publication Date: 2022-05-13
GUANGZHOU HUADUO NETWORK TECH
0 Cites 0 Cited by
AI-Extracted Technical Summary
Problems solved by technology
[0003] The search and recommendation service provided by the background corresponds. In the service cluster of the e-commerce platform, the server nodes and service middleware corresponding to each business execution link passed by the business chain are usually deployed in a distributed ma...
Method used
Described probing period, can be flexibly set by those skilled in the art according to experience data or experimental data, and described monitoring duration then generally can be set to be slightly greater than described probing period, both cooperate and can define business chain to carry out A reasonable delay range is required to make the monitoring process of the offline monitoring system more robust.
In summary, the application can realize standardized fault diagnosis and analysis to the operating status of the business chain in the offline synchronization system of the electric business platform, realize the safety monitoring of the system operating state, an...
Abstract
The invention discloses a service chain operation monitoring method, a service chain operation monitoring device, service chain operation monitoring equipment, a medium and a product. The first access interface comprises a first access interface provided by a first server where source data called during execution of a service chain is located, a second access interface of a second server where result data obtained after the service chain calls the source data is located, and a detection period indicating an interval for monitoring execution of the service chain; periodically calling a first access interface to send a monitoring instruction according to a detection period so as to drive and execute the service chain, wherein the monitoring instruction carries a monitoring timestamp; monitoring report information returned through the second access interface; and determining the connectivity and transmission delay of the service chain according to the storage timestamp in the report information and the monitoring timestamp. According to the invention, standardized fault diagnosis analysis can be carried out on the operation condition of the service chain of the e-commerce platform.
Application Domain
Transmission
Technology Topic
Outcome dataSource data +6
Image
Examples
- Experimental program(1)
Example Embodiment
[0035]The following describes in detail the embodiments of the present application, examples of which are illustrated in the accompanying drawings, wherein the same or similar reference numerals refer to the same or similar elements or elements having the same or similar functions throughout. The embodiments described below with reference to the accompanying drawings are exemplary and are only used to explain the present application, but not to be construed as a limitation on the present application.
[0036] It will be understood by those skilled in the art that the singular forms "a", "an", "the" and "the" as used herein can include the plural forms as well, unless expressly stated otherwise. It should be further understood that the word "comprising" used in the specification of this application refers to the presence of stated features, integers, steps, operations, elements and/or components, but does not preclude the presence or addition of one or more other features, Integers, steps, operations, elements, components and/or groups thereof. It will be understood that when we refer to an element as being "connected" or "coupled" to another element, it can be directly connected or coupled to the other element or intervening elements may also be present. Furthermore, "connected" or "coupled" as used herein may include wirelessly connected or wirelessly coupled. As used herein, the term "and/or" includes all or any element and all combination of one or more of the associated listed items.
[0037] It will be understood by those skilled in the art that, unless otherwise defined, all terms (including technical and scientific terms) used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this application belongs. It should also be understood that terms, such as those defined in a general dictionary, should be understood to have meanings consistent with their meanings in the context of the prior art and, unless specifically defined as herein, should not be interpreted in idealistic or overly formal meaning to explain.
[0038] Those skilled in the art can understand that the "client", "terminal" and "terminal device" used herein include both a wireless signal receiver device that only has a wireless signal receiver without transmission capability, and a wireless signal receiver device. A device with receive and transmit hardware that has receive and transmit hardware capable of two-way communication over a two-way communication link. Such devices may include: cellular or other communication devices such as personal computers, tablet computers, which have a single-line display or a multi-line display or a cellular or other communication device without a multi-line display; PCS (Personal Communications Service, Personal Communications System) ), which can combine voice, data processing, fax and/or data communication capabilities; PDA (Personal Digital Assistant), which can include radio frequency receivers, pagers, Internet/Intranet access, web browsers, notepads , calendar and/or GPS (Global Positioning System) receivers; conventional laptop and/or palmtop computers or other devices that have and/or include conventional laptop and/or palmtop radio frequency receivers computer or other device. "Client", "terminal", "terminal device" as used herein may be portable, transportable, mounted in a vehicle (air, marine and/or land), or adapted and/or configured to be locally operate, and/or in distributed form, operate at any other location on Earth and/or space. The "client", "terminal" and "terminal device" used here can also be a communication terminal, an Internet terminal, and a music/video playing terminal, such as a PDA, a MID (Mobile Internet Device) and/or A mobile phone with music/video playback function, or a smart TV, set-top box, etc.
[0039] The hardware referred to by the names such as "server", "client" and "service node" in this application is essentially an electronic device with the equivalent capability of a personal computer, which is a central processing unit (including an arithmetic unit and a controller). ), memory, input device and output device and other necessary components disclosed by the Von Neumann principle, the computer program is stored in its memory, and the central processing unit transfers the program stored in the external memory into the memory to run, and executes the program. The instructions in the interface interact with input and output devices to complete specific functions.
[0040] It should be pointed out that the concept of "server" referred to in this application can also be extended to the case of server clusters in the same way. According to the principles of network deployment understood by those skilled in the art, the servers should be logically divided. In physical space, these servers can be independent from each other but can be called through interfaces, or can be integrated into a physical server. A computer or a group of computers. Those skilled in the art should understand this modification, but should not limit the implementation of the network deployment manner of the present application.
[0041] One or more technical features of the present application, unless specified in plain text, can be deployed on the server and remotely invoked by the client to obtain the online service interface provided by the server to implement access, or can be directly deployed and run on the client to implement access.
[0042] The neural network model cited or possibly cited in this application, unless specified in plain text, can either be deployed on a remote server and invoked remotely on the client, or deployed on a client with competent device capabilities to directly invoke, in some embodiments , when it runs on the client, its corresponding intelligence can be obtained through transfer learning, so as to reduce the requirements on the client hardware running resources and avoid excessively occupying the client hardware running resources.
[0043] All kinds of data involved in this application, unless specified in plain text, can be stored in a server remotely or in a local terminal device, as long as it is suitable for being called by the technical solution of this application.
[0044] Those skilled in the art should know that: although the various methods of the present application are described based on the same concept to show commonality with each other, unless otherwise specified, these methods can be independently executed. Similarly, for the various embodiments disclosed in this application, they are all proposed based on the same inventive concept. Therefore, the concepts expressed in the same way, and the concepts that are appropriately transformed for convenience even though the concept expressions are different, should be regarded as equivalent. understand.
[0045] In the various embodiments to be disclosed in this application, unless the mutually exclusive relationship between each other is clearly indicated, the related technical features involved in the various embodiments can be cross-combined to flexibly construct new embodiments, as long as the combination does not deviate from the present invention. The creative spirit of the application can meet the needs in the prior art or solve a certain aspect of the deficiencies in the prior art. Variations on this will be known to those skilled in the art.
[0046] A business chain operation monitoring method of the present application can be programmed as a computer program product and implemented by being deployed in a server, whereby by accessing an interface opened after the computer program product runs, the computer program can communicate with the computer program through a graphical user interface. The process of the product performs human-computer interaction to execute the method.
[0047] see figure 1 , the business chain operation monitoring method of the present application, in its typical embodiment, includes the following steps:
[0048] Step S1100, obtaining monitoring configuration information preset for the business chain, the monitoring configuration information including the first access interface provided by the first server where the source data called when the business chain is executed, and the business chain calling the source data The second access interface provided by the second server where the result data obtained after executing the corresponding service is located, and the detection period indicating the interval for monitoring the execution of the service chain:
[0049] see figure 2 , figure 2 The deployment environment of the business chain operation monitoring method of the present application is illustrated, which shows a first server, an intermediate service cluster, a second server, and a monitoring server for deploying computer services implemented by the business chain operation monitoring method of the present application. . Wherein, both the first server and the second server may be a service cluster. The intermediate service cluster may include multiple servers required to implement the execution of the business chain.
[0050] Taking the e-commerce platform as an example, the first server is used for deploying one or more database engines, providing database services for the e-commerce platform, and storing the commodity information of the commodity objects listed on the online stores of the e-commerce platform, so as to provide database services for the e-commerce platform. As the originating node of the business chain, it provides source data for the operation of the business chain.
[0051] The intermediate service cluster is used to support the operation of the intermediate business execution links of the business chain in the e-commerce platform. Each business execution link can be realized through the cooperation of one or more service middleware. With the cooperation of the business execution link, the source data is first obtained from the first server, the source data is processed according to the business logic implemented by the business chain, and the result data is finally obtained, and then output to the second server. It can be seen that the intermediate service cluster is actually an offline synchronization system, which is used to support the operation of multiple business chains in the e-commerce platform.
[0052] The second server is used to deploy one or more database engines, and similarly provides database services for the e-commerce platform, and is used to store the result data generated after each of the described business chains is completed. The business chain generates a corresponding product recommendation list after searching and sorting the product objects in the database of the first server.
[0053] It can be seen from this that the business chain takes the source data of the first server as input, processes the source data through different business execution links connected in series according to the business logic corresponding to the business chain, and finally obtains the corresponding result data. and store the result data to the second server. A large number of business chains are allowed in the offline synchronization system. In order to facilitate identification, each business chain can be set with a corresponding identification. Among the technical features of the method that need to act on the business chain, the corresponding business chain can be identified according to the identification.
[0054] In order to realize the monitoring of massive business chains, such as figure 2 As shown, access the monitoring server of the present application, the monitoring server can interact with the first server through the first access interface provided by the first server, and can also interact with the second server through the second access interface provided by the second server. Interaction, but no direct interface access is required with the service cluster of the offline synchronization system. The first access interface and the second access interface can be either unified interfaces or corresponding interfaces corresponding to independent devices of each service chain, which can be flexibly implemented during programming.
[0055] As mentioned above, the monitoring server runs the computer service implemented by the business chain operation monitoring method of the present application, so an offline monitoring system is constructed, and the offline monitoring system can be opened to the management user responsible for the maintenance of the business chain. The user edits and configures the monitoring configuration information corresponding to each business chain by accessing the maintenance page provided by the offline monitoring system, which is used to instruct the offline monitoring system to perform corresponding monitoring on the corresponding business chain.
[0056] The monitoring configuration information, in one embodiment, mainly includes the designation of the first access interface and the second access interface, and also requires the management user to set a detection period to instruct the monitoring server to trigger the monitoring of the business chain. time interval. When necessary, the monitoring configuration information can also be required to indicate the identification of the business chain that needs to be monitored, so that the monitoring server can pass the identification when interacting with the first access interface and the second access interface implemented in a unified interface. Corresponding to the specific business chain.
[0057]For monitoring configuration information, the specified first access interface refers to the interface through which the first server where the business chain corresponding to the identifier obtains the source data can obtain the detection period; the specified second access interface , refers to the interface provided by the second server that stores the result data of the business chain corresponding to the identifier, through which the report information generated after the operation of the business chain can be obtained; the detection period is used to instruct the monitoring server to periodically trigger The cyclic time slot for the monitoring command of the service chain specified by this identifier. Accordingly, a piece of monitoring configuration information can be used to indicate that for a service chain, a monitoring command is periodically sent to the first access interface at the cyclic time slot specified by the detection period, and the service chain can be received from the second access interface Report information submitted after the run.
[0058] The monitoring configuration information is pre-configured by the management user and stored in the monitoring server of the present application. The monitoring server can automatically or manually start to monitor the business chain, so the monitoring configuration information of the corresponding business chain can be obtained by calling to start Monitor the business chain.
[0059] Step S1200, periodically calling the first access interface according to the detection period in the monitoring configuration information of the business chain to send a monitoring instruction to the first server to drive the execution of the business chain, the monitoring instruction carrying the monitoring time corresponding to the current moment stamp, so that the monitoring timestamp is passed along the business chain:
[0060] When the monitoring server starts monitoring, it obtains the detection period according to the monitoring configuration information, and uses the detection period as a cyclic time slot to continuously and regularly trigger the monitoring instructions of the business chain corresponding to the monitoring configuration information. In order to facilitate subsequent verification, when the monitoring instruction is triggered, a monitoring time stamp corresponding to the monitoring instruction is generated at the current moment corresponding to the triggering monitoring instruction, and is carried by the monitoring instruction. When necessary, the monitoring instruction also carries the identifier of the business chain for identification. Then, the monitoring server invokes the first access interface of the first server, and transmits the monitoring instruction to the first server, so as to drive the first server to start the operation of the corresponding business chain and provide source data to the business chain.
[0061] After receiving the monitoring instruction, the first server starts to drive and execute the business chain corresponding to the monitoring instruction in response to the monitoring instruction. According to its preset business logic, the business chain first calls the corresponding source data from the first server, such as the commodity information of the commodity object, and then, with the support of the offline synchronization system, is The business execution link sequentially processes the source data with preset rules, and finally generates corresponding result data, such as the product recommendation list. Among them, in order to facilitate subsequent verification, the monitoring time stamps carried by the monitoring instructions are transmitted in different business execution links of the entire business chain. Therefore, each business execution link can identify itself and whether it is successful or not. The status information corresponding to the execution, as well as the running information including its own execution time, etc., are included in the result data and passed down step by step.
[0062] It is not difficult to understand that if a business execution link in a business chain cannot be reached, it will lead to an open circuit. Therefore, the monitoring time stamp may not be transmitted smoothly. This phenomenon can be judged by the monitoring server after the preset monitoring duration. Afterwards, it can be identified whether the report information containing the monitoring timestamp can be successfully received. When the report information corresponding to a monitoring timestamp cannot be received after the monitoring time period, the monitoring server can determine that the monitoring timestamp is received. There is a disconnection in the business chain.
[0063] The detection period can be flexibly set by those skilled in the art based on empirical data or experimental data, and the monitoring duration can generally be set to be slightly larger than the detection period. A reasonable delay range makes the monitoring process of the offline monitoring system more robust.
[0064] Step S1300, monitor the report information corresponding to the monitoring instruction returned by the second server through the second access interface, the report information includes the storage time stamp of the result data generated by the business chain and the described data sent through the business chain. Monitoring Timestamp:
[0065] After the operation of the business chain is driven by the monitoring instruction, the offline monitoring server of the present application can monitor the report information generated after the operation of the business chain through the second access interface provided by the second server.
[0066] The report information can be correspondingly generated by the second server, which is the end node of the business chain, after it receives the result data generated by the business chain and completes the storage. The structure of the report information can be flexibly set by those skilled in the art, and as a requirement, it needs to include the storage time stamp of the result data for comparison with the monitoring time stamp. In the improved embodiment, since obtaining the result data of the business chain means that there is no open circuit fault in the business chain, the monitoring time stamp carried by the monitoring instruction on which the business chain starts and executes will also reach the second server smoothly, accordingly, Encapsulating the monitoring time stamp and the storage time stamp together in the report information can facilitate the monitoring server to directly determine the transmission delay of the entire business chain according to the monitoring time stamp and the storage time stamp. Of course, ideally in the absence of an open circuit fault, if the second server does not include the monitoring time stamp in the report information, the monitoring server can theoretically determine the corresponding relationship of each piece of report information by triggering the monitoring commands in sequence.
[0067] The report information may further include the result data generated by the corresponding business chain, and even include various identifiers and status information corresponding to each business execution link of the business chain.
[0068] When monitoring the second access interface of the second server, the monitoring server may set the monitoring duration, and the monitoring duration is counted from the monitoring timestamp carried by the monitoring instruction. If the report information corresponding to the monitoring instruction is not received, it can be determined that there is an open circuit fault in the corresponding business chain.
[0069] After the monitoring server receives the report information corresponding to the monitoring instruction that it has sent within the monitoring duration, it can parse it to obtain various information encapsulated therein, such as the storage timestamp and monitoring time. stamp.
[0070] Step S1400: Determine the connectivity and transmission delay of the service chain according to the storage time stamp and the monitoring time stamp in the report information, and obtain a first verification result:
[0071] In order to implement the diagnostic analysis of the executed service link, after the monitoring server obtains the report information, in one embodiment, the difference between the storage time stamp in the report information and the monitoring time stamp is used as the The transmission delay of the service link is determined, and it is determined that the service chain is in the connected state according to the successful receipt of the report information, and the transmission delay and the connection state are encapsulated as the first verification result corresponding to the current diagnostic analysis.
[0072] On the contrary, if the report information corresponding to the monitoring instruction cannot be received after the monitoring time, it can be determined that the corresponding business chain cannot be connected, and the corresponding transmission delay is infinite, so that the first school can also be encapsulated. test results.
[0073] It is not difficult to understand that since the monitoring detection for a business chain is continuously triggered according to the detection period, the monitoring server can continuously obtain the first verification result, and the data generated in different time series can be used for Perform a more in-depth diagnostic analysis.
[0074] From the disclosure of the above typical embodiments of the present application, it can be seen that the present application monitors the operation of the business chain independently of the operation of the business chain. The source is that the first server sends monitoring instructions, and provides monitoring timestamps along with the monitoring instructions, so that the monitoring timestamps flow with the operation of each business execution link of the business chain. At the same time, for the end of the business chain, the storage The second server of the result data generated by the business chain monitors the corresponding report information, and the report information includes the storage time stamp of the result data correspondingly generated after the second server receives the monitoring instruction to drive the business chain to run, and the data sent with the business chain. According to the monitoring timestamp, the connectivity and transmission delay of the business chain can be diagnosed, and the standardized fault diagnosis and analysis of the operation stability of the complex business chain in the offline synchronization system of the e-commerce platform can be realized. And it does not interfere with the existing business logic of the offline synchronization system.
[0075] In an extended embodiment, in the step S1400, after the step of obtaining the first verification result, the following steps are included:
[0076] Step S1500, in response to the delivery event corresponding to the report information, call the verification rule preconfigured in the monitoring configuration information, read the result data corresponding to the report information through the second access interface, and according to the The verification rule performs verification on the result data to obtain a second verification result:
[0077] The monitoring server may further acquire a second verification result according to the verification rule according to whether the monitoring configuration information is associated with a preconfigured verification rule, and when the verification rule exists. Specifically, in response to a delivery event corresponding to the report information, the monitoring server detects whether the monitoring configuration information is preconfigured with the verification rule, and the verification rule can be used to verify the report information in advance. The verification logic, when there is the verification rule, directly read the result data corresponding to the report information stored by the second server through the second access interface, and then according to the verification rule The result data is verified at the data level, and finally the corresponding second verification result is obtained.
[0078] For example, the verification rules can be used to verify whether the result data meets expectations, and set relevant judgment rules that match the expectations. For example, if more than 100 search results are expected to be generated, then The verification rule can be pre-configured with a rule ">100", and the monitoring server parses the rule for verification subsequently.
[0079] In a preferred embodiment, the business chain includes a plurality of business execution links, and the result data generated by the business chain includes at least part of the corresponding identifiers of the business execution links and status information indicating the success or failure of the business execution links. , the second verification result includes the identifier corresponding to the service execution link and its state information. Therefore, it is convenient to carry out refined diagnosis and analysis on the operation process of the business chain through the corresponding identifiers and status information of each business execution link.
[0080] This embodiment opens the custom function of the verification rules, so that the management user can configure the relevant verification rules by themselves through the monitoring server, realize the in-depth monitoring of the result data generated by the business chain, and enrich the offline monitoring system of the present application function to achieve in-depth diagnosis and analysis of the business chain.
[0081] In a further embodiment, in the step S1500, after the step of obtaining the second verification result, the following steps are included:
[0082] Step S1600: Construct the first verification result and the second verification result as alarm information, and call a preset alarm interface to submit the alarm information:
[0083] In order to realize in-depth diagnosis of the verification results obtained by the offline monitoring system, the first verification results and the second verification results in the foregoing embodiments can be encapsulated in a unified format, and the data can be encapsulated to be available for standardized analysis. alarm information, and then call the preset alarm interface to submit the alarm information. The alarm information can be stored in a database, for example, it can be stored in the database opened by the first server or the second server by calling the first access interface or the second access interface, and can be called accordingly in the subsequent The overhead of system storage resources of the monitoring server itself of the present application is saved.
[0084] In this embodiment, alarm information can be obtained by standardizing the first verification result and the second verification result, so that the subsequent in-depth diagnosis and analysis based on the result is more efficient.
[0085] In a further embodiment, the step S1600, after the step of constructing the first verification result and the second verification result as alarm information, and calling a preset alarm interface to submit the alarm information, includes the following steps:
[0086] Step S1700, in response to the alarm information viewing instruction, push a monitoring report page, on the monitoring report page, visually display the identification and status information of each business link of the corresponding business chain generated according to the alarm information, and the transmission time. Extended readable information:
[0087] The offline monitoring system of the present application can respond to an alarm information viewing instruction triggered by its corresponding management user, and generate and push a monitoring report page for it, where the monitoring report page is used to display information on one or more of the services The results obtained by visual analysis of the alarm information of the chain.
[0088] For example, in response to the viewing instruction, the viewing instruction specifies an identifier corresponding to a business chain, and accordingly, the offline monitoring system calls the alarm information of the business chain corresponding to the identifier from the database to analyze it accordingly, The identifiers corresponding to each business execution link of the business chain and the status information thereof are classified and packaged in a display area of the report page, and the corresponding identification and status information related to the continuous generation of the entire business chain are corresponding to the first verification results. The transmission delay is linearly fitted and a corresponding trend chart is generated and encapsulated in another display area of the report page. After the configuration of the typesetting code of the report page is completed, the monitoring report page can be pushed to the corresponding management user. The browser of the terminal device performs analysis and display. After the browser is parsed and displayed, the management user can obtain the corresponding readable information from the page, so that the management user can understand the diagnosis and analysis results of the business chain more quickly and efficiently.
[0089] In a preferred embodiment, the business performed by the business chain is a business corresponding to the search and sorting of commodity objects in an e-commerce platform, wherein the first server is used to store commodity information of commodity objects, and the first server is used to store commodity information of commodity objects. The second server is used for storing the commodity recommendation list generated after completing the business chain. Accordingly, the maintenance personnel of the e-commerce platform can quickly understand the health status of each business chain without any manual single-point testing.
[0090] In this embodiment, the alarm information is visualized, which makes the alarm information more readable, and it is more convenient for management users to conduct in-depth analysis of the operation status of the business chain. It can greatly improve the maintenance efficiency of the business chain, thereby saving background maintenance costs.
[0091] see image 3 , a business chain operation monitoring device provided to meet one of the purposes of the present application is a functional embodiment of the business chain operation monitoring method of the present application. The device includes: a configuration acquisition module 1100, a detection trigger module 1200, and a report receiving module 1300, and the diagnosis and analysis module 1400, wherein the configuration acquisition module 1100 is used to acquire the monitoring configuration information preset for the business chain, and the monitoring configuration information includes the first server where the source data called when the business chain is executed is located The first access interface provided, the second access interface provided by the second server where the result data obtained after the business chain invokes the source data to execute the corresponding business, and the second access interface that indicates the interval for monitoring the execution of the business chain. detection cycle; the detection trigger module 1200 is used to periodically call the first access interface to send a monitoring instruction to the first server according to the detection cycle in the monitoring configuration information of the business chain to drive the execution of the business chain, and the monitoring The instruction carries the monitoring timestamp corresponding to the current moment, so that the monitoring timestamp is transmitted along the business chain; the report receiving module 1300 is used to monitor the monitoring instruction returned by the second server through the second access interface Corresponding report information, the report information includes the storage time stamp of the result data generated by the business chain and the monitoring time stamp sent through the business chain; the diagnostic analysis module 1400 is used for according to the report information The storage time stamp in and the monitoring time stamp determine the connectivity and transmission delay of the service chain, and obtain the first verification result.
[0092] In an extended embodiment, the business chain operation monitoring device of the present application further includes: a deep diagnosis module, configured to call the verification rule preconfigured in the monitoring configuration information in response to the delivery event corresponding to the report information, The result data corresponding to the report information is read through the second access interface, and the result data is verified according to the verification rule to obtain a second verification result.
[0093] In a preferred embodiment, the business chain includes a plurality of business execution links, and the result data generated by the business chain includes at least part of the corresponding identifiers of the business execution links and status information indicating the success or failure of the business execution links. , the second verification result includes the identifier corresponding to the service execution link and its state information.
[0094] In a further embodiment, the business chain operation monitoring device of the present application further includes: an alarm submission module, configured to construct the first verification result and the second verification result as alarm information, and call a preset alarm interface to submit the alarm information. Warning information.
[0095] In a further embodiment, the business chain operation monitoring device of the present application further includes: an alarm viewing module, configured to respond to an alarm information viewing instruction, push a monitoring report page, and visually display the corresponding information generated according to the alarm information on the monitoring report page. The identification of each business link of the business chain and its status information, as well as the readable information of the transmission delay.
[0096] In a preferred embodiment, the business performed by the business chain is a business corresponding to the search and sorting of commodity objects in an e-commerce platform, wherein the first server is used to store commodity information of commodity objects, and the first server is used to store commodity information of commodity objects. The second server is used for storing the commodity recommendation list generated after completing the business chain.
[0097] To solve the above technical problems, the embodiments of the present application also provide computer equipment. like Figure 4 Schematic diagram of the internal structure of the computer equipment. The computer device includes a processor, a computer-readable storage medium, a memory, and a network interface connected by a system bus. Wherein, the computer-readable storage medium of the computer device stores an operating system, a database and computer-readable instructions, the database may store a control information sequence, and when the computer-readable instructions are executed by the processor, the processor can be made to implement a Business chain operation monitoring method. The processor of the computer equipment is used to provide computing and control capabilities and support the operation of the entire computer equipment. Computer-readable instructions may be stored in the memory of the computer device, and when the computer-readable instructions are executed by the processor, the processor may execute the business chain operation monitoring method of the present application. The network interface of the computer equipment is used for communication with the terminal connection. Those skilled in the art can understand that, Figure 4 The structure shown in the figure is only a block diagram of a part of the structure related to the solution of the present application, and does not constitute a limitation on the computer equipment to which the solution of the present application is applied. Fewer components, or some components are combined, or have a different arrangement of components.
[0098] In this embodiment, the processor is used to execute image 3 The specific functions of each module and its sub-modules in the memory are stored with program codes and various types of data required to execute the above-mentioned modules or sub-modules. The network interface is used for data transmission between user terminals or servers. The memory in this embodiment stores the program codes and data required to execute all modules/sub-modules in the business chain operation monitoring device of the present application, and the server can call the server's program codes and data to execute the functions of all sub-modules.
[0099] The present application further provides a storage medium storing computer-readable instructions. When the computer-readable instructions are executed by one or more processors, the one or more processors execute the business chain operation monitoring method according to any embodiment of the present application. A step of.
[0100] The present application also provides a computer program product, comprising computer programs/instructions, when the computer program/instructions are executed by one or more processors, the steps of the method described in any embodiment of the present application are implemented.
[0101] Those of ordinary skill in the art can understand that all or part of the processes in the methods of the above-mentioned embodiments of the present application can be implemented by instructing relevant hardware through a computer program, and the computer program can be stored in a computer-readable storage medium. When the program is executed, it may include the flow of the embodiments of the above-mentioned methods. The aforementioned storage medium may be a computer-readable storage medium such as a magnetic disk, an optical disk, a read-only memory (Read-Only Memory, ROM), or a random access memory (Random Access Memory, RAM).
[0102] To sum up, this application can realize the standardized fault diagnosis and analysis of the operation status of the business chain in the offline synchronization system of the e-commerce platform, realize the safety monitoring of the operation status of the system, and realize the fault diagnosis logic based on the business chain. The analysis is more specific and reliable; the offline synchronization system is guaranteed to operate undisturbed by performing diagnostic analysis independently of the offline synchronization system.
[0103] Those skilled in the art can understand that various operations, methods, steps, measures, and solutions in the process discussed in this application may be alternated, modified, combined or deleted. Further, other steps, measures, and solutions in various operations, methods, and processes that have been discussed in this application may also be alternated, modified, rearranged, decomposed, combined, or deleted. Further, steps, measures and solutions in the prior art with various operations, methods, and processes disclosed in this application may also be alternated, modified, rearranged, decomposed, combined or deleted.
[0104] The above are only part of the embodiments of the present application. It should be pointed out that for those skilled in the art, without departing from the principles of the present application, several improvements and modifications can also be made. It should be regarded as the protection scope of this application.
PUM


Description & Claims & Application Information
We can also present the details of the Description, Claims and Application information to help users get a comprehensive understanding of the technical details of the patent, such as background art, summary of invention, brief description of drawings, description of embodiments, and other original content. On the other hand, users can also determine the specific scope of protection of the technology through the list of claims; as well as understand the changes in the life cycle of the technology with the presentation of the patent timeline. Login to view more.