[go: up one dir, main page]

CN106301983A - A kind of website based on fictitious host computer detection method and device - Google Patents

A kind of website based on fictitious host computer detection method and device Download PDF

Info

Publication number
CN106301983A
CN106301983A CN201510291107.0A CN201510291107A CN106301983A CN 106301983 A CN106301983 A CN 106301983A CN 201510291107 A CN201510291107 A CN 201510291107A CN 106301983 A CN106301983 A CN 106301983A
Authority
CN
China
Prior art keywords
host computer
fictitious host
detection
website
domain name
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510291107.0A
Other languages
Chinese (zh)
Inventor
杨艳宏
庞海政
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Alibaba Group Holding Ltd
Original Assignee
Alibaba Group Holding Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alibaba Group Holding Ltd filed Critical Alibaba Group Holding Ltd
Priority to CN201510291107.0A priority Critical patent/CN106301983A/en
Priority to PCT/CN2016/080443 priority patent/WO2016192492A1/en
Publication of CN106301983A publication Critical patent/CN106301983A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L1/00Arrangements for detecting or preventing errors in the information received
    • H04L1/24Testing correct operation

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer And Data Communications (AREA)
  • Debugging And Monitoring (AREA)

Abstract

The embodiment of the present application provides a kind of website based on fictitious host computer detection method and device, and the method includes: receive the detection request of website;Described detection request includes the fictitious host computer mark carrying the fictitious host computer of described website;Described website is detected, to obtain testing result according to described fictitious host computer mark;Wherein, one or more during described detection at least includes fictitious host computer detection, the detection of website domain name, website status detection, network state detection, website applying detection.The embodiment of the present application achieves detection the most automatically, substantially increases the simplicity of detection, improves the efficiency of detection.

Description

A kind of website based on fictitious host computer detection method and device
Technical field
The application relates to detection technique field, particularly relates to a kind of website based on fictitious host computer detection side Method and a kind of website based on fictitious host computer detection device.
Background technology
Along with the fast development of the network technology, a lot of enterprises, unit even individual sets up website on network, Carry out informatization.
Owing to a lot of medium-sized and small enterprises do not possess enough website professionals, and, along with network is in enterprise Effect in informatization is more obvious, and the demand of network application is also become increasingly complex by enterprise, In this case, web hosting service provides a kind of effective way for setting up website.
In the running of website, more or less can encounter problems.And the use that empty machine host is built a station For family, user website technical background is the weakest, when usual user website breaks down, all can only lead to Cross professional technique support staff website is investigated.
And, professional and technical personnel typically requires and investigates the most one by one, then provides suggestion solution party Case, detection process is the most loaded down with trivial details, time-consuming, and efficiency is the lowest.
Summary of the invention
In view of the above problems, it is proposed that the embodiment of the present application is to provide one to overcome the problems referred to above or extremely Partially solve a kind of based on fictitious host computer the website detection method of the problems referred to above and corresponding one Website based on fictitious host computer detection device.
In order to solve the problems referred to above, this application discloses a kind of website based on fictitious host computer detection method, Including:
Receive the detection request of website;Described detection request includes carrying the fictitious host computer of described website Fictitious host computer identifies;
Described website is detected, to obtain testing result according to described fictitious host computer mark;
Wherein, described detection at least include fictitious host computer detection, website domain name detection, website status detection, One or more in network state detection, website applying detection.
Preferably, also include:
When described testing result meets default property value, generate website for described testing result and improve Suggestion.
Preferably, described fictitious host computer mark includes the second level domain of described fictitious host computer.
Preferably, the detection of described fictitious host computer detection at least includes Expiration Date of fictitious host computer, virtual The space of main frame, fictitious host computer data base in one or more;
Described website is detected, to obtain the step of testing result by described mark according to described fictitious host computer Suddenly include:
Inquire about the information of fictitious host computer corresponding to described fictitious host computer mark;
Wherein, the information of described fictitious host computer at least includes following one or more:
The Expiration Date of fictitious host computer, the space of fictitious host computer, the data base of fictitious host computer.
Preferably, described website domain name detection detection at least include domain name binding, the domain name Expiration Date, One or more in domain name mapping;
Described website is detected, to obtain the step of testing result by described mark according to described fictitious host computer Suddenly include:
Judge that described fictitious host computer identifies whether the domain name binding with described website;
The most then inquire about the Expiration Date of domain name;
Whether detection domain name is resolved to the server belonging to described fictitious host computer.
Preferably, described website status detection detection at least include fictitious host computer close down, close down reason, Fictitious host computer migrate, put on record in website, fictitious host computer back up, fictitious host computer recovery in one or more;
Described website is detected, to obtain the step of testing result by described mark according to described fictitious host computer Suddenly include:
Inquire about whether fictitious host computer corresponding to described virtual identifying is closed down;The most then inquire about and to be closed down Reason;
Inquire about whether fictitious host computer corresponding to described virtual identifying is in Data Migration state, data backup shape State, data recover state;
Inquire about whether domain name corresponding to described virtual identifying puts on record successfully;The most then inquire about the access business that puts on record.
Preferably, described website is detected, to obtain detection by described mark according to described fictitious host computer The step of result includes:
Inquire about the fictitious host computer that described fictitious host computer mark is corresponding;
Detect network information service state and/or the application pool state of described fictitious host computer, to obtain net Network status information.
Preferably, during the detection of described website applying detection at least includes that homepage setting, data base connect One or more;
Described website is detected, to obtain the step of testing result by described mark according to described fictitious host computer Suddenly include:
Whether the fictitious host computer inquiring about described fictitious host computer mark corresponding arranges homepage;
Whether the data base inquiring about fictitious host computer corresponding to described fictitious host computer mark connects normally.
The embodiment of the present application also discloses a kind of website based on fictitious host computer detection device, including:
Detection request receives submodule, for receiving the detection request of website;Described detection request includes Carry the fictitious host computer mark of the fictitious host computer of described website;
Website detection module, for detecting described website according to described fictitious host computer mark, to obtain Obtain testing result;
Wherein, described detection at least include fictitious host computer detection, website domain name detection, website status detection, One or more in network state detection, website applying detection.
Preferably, also include:
Suggestion generation module, for when described testing result meets default property value, for described inspection Survey result and generate website recommendation on improvement.
Preferably, described fictitious host computer mark includes the second level domain of described fictitious host computer.
Preferably, the detection of described fictitious host computer detection at least includes Expiration Date of fictitious host computer, virtual The space of main frame, fictitious host computer data base in one or more;
Described website detection module includes:
First inquiry submodule, for inquiring about the information of fictitious host computer corresponding to described fictitious host computer mark;
Wherein, the information of described fictitious host computer at least includes following one or more:
The Expiration Date of fictitious host computer, the space of fictitious host computer, the data base of fictitious host computer.
Preferably, described website domain name detection detection at least include domain name binding, the domain name Expiration Date, One or more in domain name mapping;
Described website detection module includes:
First judges submodule, ties up for judging described fictitious host computer to identify whether with the domain name of described website Fixed;The most then call the second inquiry submodule;
Second inquiry submodule, for inquiring about the Expiration Date of domain name;
First detection sub-module, for detecting whether domain name is resolved to the clothes belonging to described fictitious host computer Business device.
Preferably, described website status detection detection at least include fictitious host computer close down, close down reason, Fictitious host computer migrate, put on record in website, fictitious host computer back up, fictitious host computer recovery in one or more;
Described website detection module includes:
3rd inquiry submodule, for inquiring about whether fictitious host computer corresponding to described virtual identifying is closed down; The most then call the 4th inquiry submodule;
4th inquiry submodule, the reason closed down for inquiry;
5th inquiry submodule, for inquiring about whether fictitious host computer corresponding to described virtual identifying is in data Transition state, data backup status, data recover state;
6th inquiry submodule, for inquiring about whether domain name corresponding to described virtual identifying puts on record successfully;If It is then to inquire about the access business that puts on record.
Preferably, described website detection module includes:
7th inquiry submodule, for inquiring about the fictitious host computer that described fictitious host computer mark is corresponding;
Second detection sub-module, for detecting network information service state and/or the application of described fictitious host computer Program pond state, to obtain network state information.
Preferably, during the detection of described website applying detection at least includes that homepage setting, data base connect One or more;
Described website detection module includes:
Whether the 8th inquiry submodule, arranged for the fictitious host computer inquiring about described fictitious host computer mark corresponding Homepage;
9th inquiry submodule, for inquiring about the data base of fictitious host computer corresponding to described fictitious host computer mark Whether connect normal.
The embodiment of the present application includes advantages below:
The embodiment of the present application provides fictitious host computer detection, website domain name for the website that fictitious host computer is carried The multiple detection methods such as detection, website status detection, network state detection, website applying detection, it is achieved The most automatically detection, substantially increases the simplicity of detection, improves the efficiency of detection.
The embodiment of the present application is for the result of detection, in conjunction with property value, it is provided that website recommendation on improvement, with auxiliary Help user optimization website, thus reduce the generation frequency of website fault, when breaking down in website, it is achieved The autonomous investigation of naive user, reduces the technical threshold of detection, further increases the efficiency of detection.
Accompanying drawing explanation
Fig. 1 is the steps flow chart of a kind of based on fictitious host computer the website detection method embodiment of the application Figure;
Fig. 2 is the examples of interfaces figure before a kind of detection of the application;
Fig. 3 is a kind of examples of interfaces figure detecting process of the application;
Fig. 4 is a kind of examples of interfaces figure detecting end of the application;
Fig. 5 is the structured flowchart of a kind of based on fictitious host computer the website detection device embodiment of the application.
Detailed description of the invention
Understandable, below in conjunction with the accompanying drawings for enabling the above-mentioned purpose of the application, feature and advantage to become apparent from With detailed description of the invention, the application is described in further detail.
With reference to Fig. 1, it is shown that a kind of based on fictitious host computer the website detection method embodiment of the application Flow chart of steps, specifically may include steps of:
Step 101, receives the detection request of website;
It should be noted that fictitious host computer (Virtual Host/Virtual Server) be use special soft Hardware technology, is divided into multiple logic storage units, Mei Gedan a real physics host computer Unit does not all have physical entity, but each physical location can be at network as real physical host Upper work, has single IP address (or the IP address shared) and complete server capability.
Even if in same hardware, same operating system, running the difference opened for multiple users Server formula, it is also possible to do not interfere with each other.And each user have oneself a part of system resource (as IP address, document memory space, internal memory, CPU time etc.).
It is completely independent between fictitious host computer, in the external world, each fictitious host computer and a single master The performance of machine is identical.
So this Logical HEA being virtualized is referred to as " fictitious host computer " visually.
In the embodiment of the present application, can set up website on fictitious host computer, user can pass through client Send the detection request of this website to the server belonging to fictitious host computer, with request, this website is examined Survey.
Such as, user can be by clicking on " detection immediately " control of user interface as shown in Figure 2 Part sends detection request.
Wherein, described detection request can include the fictitious host computer mark carrying the fictitious host computer of described website Know;Fictitious host computer mark can be the information that can represent a well-determined fictitious host computer.
In implementing, described fictitious host computer mark can include the second level domain of described fictitious host computer, This second level domain can be web hosting service provider for convenience in the user of fictitious host computer to website A kind of temporary domain name carrying out debugging and provide.
Such as, former domain name is " www.xxx.com ", then its second level domain can be " mail.xxx.com ".
Step 102, detects described website according to described fictitious host computer mark, to obtain detection knot Really;
Wherein, described detection at least can include fictitious host computer detection, the detection of website domain name, website status One or more in detection, network state detection, website applying detection.
Fictitious host computer detection can be the detection that the essential information to fictitious host computer is carried out;
Website domain name detection can be the detection that the information to website domain name is carried out;
Website status detection can be the detection that the running status to website is carried out;
Network state detection can be for the detection carrying out the network state of the server belonging to fictitious host computer;
Website applying detection can be the detection that the application to website is carried out.
Application the embodiment of the present application, as it is shown on figure 3, fictitious host computer detection, website domain can be carried out successively Name detection, website status detection, network state detection, website applying detection.
It is, of course, also possible to use other orders to detect, this is not any limitation as by the embodiment of the present application.
In a preferred embodiment of the present application, the detection of described fictitious host computer detection at least can wrap Include one or more in the data base of the Expiration Date of fictitious host computer, the space of fictitious host computer, fictitious host computer; The most in the embodiment of the present application, step 102 can include following sub-step:
Sub-step S11, inquires about the information of fictitious host computer corresponding to described fictitious host computer mark;
Wherein, the information of described fictitious host computer at least includes following one or more:
The Expiration Date of fictitious host computer, the space of fictitious host computer, the data base of fictitious host computer.
In the embodiment of the present application, it is provided that an independent Host Management Console is (as independent of clothes Program outside business device), the management for the fictitious host computer of user's offer of fictitious host computer controls.
By the Host Management Console independent at this, Expiration Date of fictitious host computer, virtual can be inquired The space of main frame, the database testing result of fictitious host computer.
Wherein, user generally buys fictitious host computer, and to obtain useful life, this Expiration Date can be to use The expiration time in time limit.
The space of fictitious host computer can include size and the service condition (such as usage amount, utilization rate) in space Deng.
The data base of fictitious host computer can include that the size of data base and service condition are (such as usage amount, use Rate) etc..
In a preferred embodiment of the present application, the detection of described website domain name detection at least can wrap Include one or more in domain name binding, domain name Expiration Date, domain name mapping;The most in the embodiment of the present application, Step 102 can include following sub-step:
Sub-step S21, it is judged that described fictitious host computer identifies whether the domain name binding with described website;If so, Then perform sub-step S22;
In the embodiment of the present application, it is provided that an independent Host Management Console, for fictitious host computer User provide fictitious host computer management control.
By the Host Management Console independent at this, fictitious host computer can be inquired about and identify whether and website Domain name binding (testing result).
Sub-step S22, the Expiration Date of inquiry domain name;
In implementing, the Expiration Date of this domain name can be inquired about by calling the interface of Virtual network operator (testing result).
Sub-step S23, whether detection domain name is resolved to the server belonging to described fictitious host computer.
Generally, each fictitious host computer does not has independent IP address, on each station server An IP address shared by fictitious host computer.
In implementing, DNS (Domain Name System, domain name analysis system) can be passed through Resolve the IP address of domain name association, then may determine that whether domain name is resolved to the service belonging to fictitious host computer Device (testing result).
If this IP address is identical with the server belonging to fictitious host computer, then confirm that this domain name can be resolved to Server belonging to fictitious host computer.
In a preferred embodiment of the present application, the detection of described website status detection at least can wrap Include fictitious host computer close down, close down reason, fictitious host computer migrate, put on record in website, fictitious host computer back up, void Intend one or more during main frame recovers;The most in the embodiment of the present application, step 102 can include as follows Sub-step:
Sub-step S31, inquires about whether fictitious host computer corresponding to described virtual identifying is closed down;The most then Perform sub-step S32;
Sub-step S32, the reason that inquiry is closed down;
In the embodiment of the present application, monitoring attributes alarming threshold value, statistics can be preset in Surveillance center Cycle and the number of times upper limit, be monitored the service condition of fictitious host computer.
When the situation of monitoring meets default condition, fictitious host computer is closed down at punishment center.Then by punishment Center can inquire about the reason (testing result) whether fictitious host computer is closed down and closed down.
The example of the preset attribute value that monitoring illustrates and closes down reason can be as shown in the table:
Sub-step S33, inquire about fictitious host computer corresponding to described virtual identifying whether be in Data Migration state, Data backup status, data recover state;
In the embodiment of the present application, fictitious host computer data can be stored in state pool (memory headroom) Transition state, data backup status, data recover state, then can be in state pool (memory headroom) The storage Data Migration state of fictitious host computer, data backup status, data recover state (testing result).
Data Migration, can refer to that the data of fictitious host computer move to other positions from original position.
Data backup, can refer to back up the data of fictitious host computer.
Data are recovered, and can refer to that the data backed up from fictitious host computer carry out recovery operation.
Sub-step S34, inquires about whether domain name corresponding to described virtual identifying puts on record successfully;The most then hold Row sub-step S35;
Sub-step S35, inquiry is put on record and is accessed business.
Application the embodiment of the present application, can call the inquiry service that relevant unit provides in advance, inquire about virtual Whether the domain name of mark correspondence is put on record successfully and is put on record and access business.
Then directly can directly search from this locality whether domain name corresponding to virtual identifying puts on record successfully and put on record Access business's (testing result).
In a preferred embodiment of the present application, step 102 can include following sub-step:
Sub-step S41, inquires about the fictitious host computer that described fictitious host computer mark is corresponding;
Sub-step S42, detects network information service state and/or the application pool shape of described fictitious host computer State, to obtain network state information.
In the embodiment of the present application, can be by the detection fictitious host computer network information service (Internet Information Services, IIS) state and application pool state, obtain network state information (inspection Survey result).
When user attempts by HTTP (Hypertext transfer protocol, HTTP) Or file transfer protocol (FTP) (File Transfer Protocol, FTP) accesses one and is currently running the network information When servicing the content on the server (fictitious host computer) of (IIS), IIS returns one and represents this request The digital code of state.This code may indicate that concrete request is the most successful, it is also possible to the request of announcement is lost The exact cause lost.
Such as, digital code 500 can represent internal server error.
Under the progress of work isolation mode of the network information service (IIS), application program can be at shading ring Running in border, specifically can create multiple application pool, each application pool can have different One or more application programs can be linked to one or more progress of work set by configuration, and then will Application program in application pool and other application programs are by progress of work boundary separates.
When application program in application pool makes a mistake, application error code can be returned.
Such as, event id is the application error code of 1001, can represent World Wide Web The Inetinfo.exe process of Publishing service encounters a mistake, and is closed.This feelings Condition makes World Wide Web Publishing service the accident of Inetinfo.exe process can not be detected Terminate, therefore the change to configuration database will can not be detected as anticipated.
In a preferred embodiment of the present application, the detection of described website applying detection at least can wrap Include one or more in homepage setting, data base's connection;The most in the embodiment of the present application, step 102 Can include following sub-step:
Sub-step S51, whether the fictitious host computer inquiring about described fictitious host computer mark corresponding arranges homepage;
Sub-step S52, whether the data base inquiring about fictitious host computer corresponding to described fictitious host computer mark connects Normally.
In the embodiment of the present application, can detect whether to connect normal (detection knot by data base's off line Really), whether detection fictitious host computer arranges homepage.
Wherein, off line, be for the current state of data base for, when a data base can not perform During effective database manipulation, then it it is off-line state.
Certainly, above-mentioned detection method is intended only as example, when implementing the embodiment of the present application, and can basis Practical situation arranges other detection methods, and this is not any limitation as by the embodiment of the present application.It addition, except upper Stating outside detection method, those skilled in the art can also use other detection method according to actual needs, this This is not any limitation as by application embodiment.
The embodiment of the present application provides fictitious host computer detection, website domain name for the website that fictitious host computer is carried The multiple detection methods such as detection, website status detection, network state detection, website applying detection, it is achieved The most automatically detection, substantially increases the simplicity of detection, improves the efficiency of detection.
In a preferred embodiment of the present application, the method can also comprise the steps:
Step 103, when described testing result meets default property value, raw for described testing result Become website recommendation on improvement.
In the embodiment of the present application, property value can be pre-set for some testing result, this property value May be used for characterizing detection go wrong, the situation such as fault, can improve.
In one embodiment, for the testing result of the Expiration Date of fictitious host computer, if the current date with Date gap between the Expiration Date of fictitious host computer within the first default date gap scope (property value), Such as 30 days, then can generate the prompting that expires of fictitious host computer, it is possible to offer continues to pay dues, and (website changes in link Enter suggestion).
Such as, expiring of fictitious host computer prompts for " main frame will expire, the Expiration Date: * * ", or, " main Machine has expired, the Expiration Date: * * ".
For the testing result in the space of fictitious host computer, if the utilization rate for the space of fictitious host computer exceedes Preset the first utilization rate (property value), such as 95%, then can generate fictitious host computer cleaning space or Upgrading website prompting, and upgrade link (website recommendation on improvement) is provided.
Such as, the cleaning space of fictitious host computer or upgrading website prompt for " main frame remaining space less than 5%, Clear up space or upgrading website the most in time ".
For, the testing result of the data base of fictitious host computer, if the use of the data base for fictitious host computer Rate exceedes default the second utilization rate (property value), such as 95%, then can generate the cleaning of fictitious host computer Space or upgrading website prompting, it is possible to upgrade link (website recommendation on improvement) is provided.
Such as, cleaning space or the upgrading website of fictitious host computer prompts for " data base's remaining space deficiency 5%, clear up space or upgrading website the most in time ".
In another embodiment, the testing result of binding domain name for whether, if unbound domain name (belongs to Property value), then can generate domain name binding information, it is possible to provide binding link (website changes Enter suggestion).
Such as, the information of the domain name binding of fictitious host computer is " unbound website domain name, it is proposed that you are i.e. Shi Jinhang domain name is bound ".
For the testing result of the Expiration Date of domain name, if the day between current date and the Expiration Date of domain name Phase gap, within the second default date gap scope (property value), such as 30 days, then can generate territory The prompting that expires of name, it is possible to the link (website recommendation on improvement) that continues to pay dues is provided.
Such as, expiring of domain name prompts for " website domain name will expire, the Expiration Date: * * ", or, " net Domain name of standing has expired, the Expiration Date: * * ".
The testing result of server belonging to fictitious host computer whether it is resolved to for domain name, if the void of not being resolved to Intend the server (property value) belonging to main frame, then can generate the incorrect information of parsing, and can To provide the link (website recommendation on improvement) of domain name mapping.
Such as, resolving incorrect information is that " your domain name mapping is incorrect, please translate domain names into To host ip: * * * .***.**.** ".
In another embodiment, whether closed down and closed down the testing result of reason for fictitious host computer, If fictitious host computer is closed down (property value), then generate and close down and the information of reason, it is possible to Offer processes the link (website recommendation on improvement) closed down.
Such as, close down and the information of reason is that " this main frame is closed down, and closes down reason: at display Center is penalized to close down reason.”
For whether being in the testing result of Data Migration state, if fictitious host computer is in Data Migration state (property value), then can generate host migration information (website recommendation on improvement).
Such as, host migration information is that " this main frame just in (in migration, in recovery), (moves Move, recover) period, website cannot access ".
For whether being in the testing result of data backup status, if fictitious host computer is in data backup status (property value), then can generate host backup information (website recommendation on improvement).
Such as, host backup information is " this main frame the most in the backup, during backup, it is proposed that you are not Website is carried out write operation ".
For whether being in data and recover the testing result of state, if fictitious host computer is in data and recovers state (property value), then can generate main frame and recover information (website recommendation on improvement).
Such as, main frame recovers information for " this main frame is recovering, during recovery, it is proposed that you are not Website is carried out write operation ".
Whether putting on record successful testing result for domain name, if putting unsuccessfully (property value) on record, then can give birth to Become failure information of putting on record, it is possible to provide the link (website recommendation on improvement) put on record.
Such as, failure information of putting on record is that " your domain name is not put on record, puts on record the most immediately, otherwise can lead Cause your website cannot access ".
For the testing result accessing business of putting on record, if the access business that puts on record is non-designated access business's (attribute Value), then can generate the access business specified and put on record information, it is possible to provide the access business specified standby The link (website recommendation on improvement) of case.
Such as, it is intended that access business put on record information for " your main frame is not put on record at * *, the most first puts on record, The website that otherwise can cause you cannot access ".
In another embodiment, for the testing result of network state information, if server connects abnormal (property value), then can generate and connect abnormal information (website recommendation on improvement).
Such as, connecting abnormal information is " http connects abnormal, please contact ten thousand net contact staff ".
In another embodiment, for whether arranging the testing result of homepage, (belong to if homepage cannot be obtained Property value), then can generate the prompting of homepage setup failed, it is possible to provide and the link (net of homepage study course is set Stand recommendation on improvement).
Such as, homepage setup failed prompts for that " you are not provided with homepage temporarily, or homepage arranges wrong, please examine The homepage files passe address looking into you is the most correct, and homepage file designation is the most correct.”
Normal testing result whether is connected for data base, if data base connects exception (property value), Then can generate data base and connect abnormal prompt information, it is possible to the link of database problem answer is provided (website recommendation on improvement).
Such as, data base connects abnormal prompt information is that " your database link exists abnormal, please check Your database link string arranges the most correct ".
Certainly, above-mentioned website recommendation on improvement is intended only as example, when implementing the embodiment of the present application, permissible Arranging other website recommendation on improvements according to practical situation, this is not any limitation as by the embodiment of the present application.It addition, In addition to the recommendation on improvement of above-mentioned website, those skilled in the art can also use other net according to actual needs Standing recommendation on improvement, this is not any limitation as by the embodiment of the present application.
As shown in Figure 4, when the tests are completed, testing result and website recommendation on improvement can be shown.
The embodiment of the present application is for the result of detection, in conjunction with property value, it is provided that website recommendation on improvement, with auxiliary Help user optimization website, thus reduce the generation frequency of website fault, when breaking down in website, it is achieved The autonomous investigation of naive user, reduces the technical threshold of detection, further increases the efficiency of detection.
It should be noted that for embodiment of the method, in order to be briefly described, therefore it is all expressed as one it be The combination of actions of row, but those skilled in the art should know, and the embodiment of the present application is not by described The restriction of sequence of movement because according to the embodiment of the present application, some step can use other orders or Person is carried out simultaneously.Secondly, those skilled in the art also should know, embodiment described in this description Belong to preferred embodiment, necessary to involved action not necessarily the embodiment of the present application.
With reference to Fig. 5, it is shown that a kind of based on fictitious host computer the website detection device embodiment of the application Structured flowchart, specifically can include such as lower module:
Detection request receives submodule 501, for receiving the detection request of website;In described detection request Fictitious host computer mark including the fictitious host computer carrying described website;
Website detection module 502, for described website being detected according to described fictitious host computer mark, To obtain testing result;
Wherein, described detection at least include fictitious host computer detection, website domain name detection, website status detection, One or more in network state detection, website applying detection.
In a preferred embodiment of the present application, this device can also include such as lower module:
Suggestion generation module, for when described testing result meets default property value, for described inspection Survey result and generate website recommendation on improvement.
In implementing, described fictitious host computer mark can include the second level domain of described fictitious host computer.
In a preferred embodiment of the present application, the detection of described fictitious host computer detection at least can wrap Include one or more in the data base of the Expiration Date of fictitious host computer, the space of fictitious host computer, fictitious host computer;
Described website detection module 502 can include following submodule:
First inquiry submodule, for inquiring about the information of fictitious host computer corresponding to described fictitious host computer mark;
Wherein, the information of described fictitious host computer at least includes following one or more:
The Expiration Date of fictitious host computer, the space of fictitious host computer, the data base of fictitious host computer.
In a preferred embodiment of the present application, the detection of described website domain name detection at least can wrap Include one or more in domain name binding, domain name Expiration Date, domain name mapping;
Described website detection module 502 can include following submodule:
First judges submodule, ties up for judging described fictitious host computer to identify whether with the domain name of described website Fixed;The most then call the second inquiry submodule;
Second inquiry submodule, for inquiring about the Expiration Date of domain name;
First detection sub-module, for detecting whether domain name is resolved to the clothes belonging to described fictitious host computer Business device.
In a preferred embodiment of the present application, the detection of described website status detection at least can wrap Include fictitious host computer close down, close down reason, fictitious host computer migrate, put on record in website, fictitious host computer back up, void Intend one or more during main frame recovers;
Described website detection module 502 can include following submodule:
3rd inquiry submodule, for inquiring about whether fictitious host computer corresponding to described virtual identifying is closed down; The most then call the 4th inquiry submodule;
4th inquiry submodule, the reason closed down for inquiry;
5th inquiry submodule, for inquiring about whether fictitious host computer corresponding to described virtual identifying is in data Transition state, data backup status, data recover state;
6th inquiry submodule, for inquiring about whether domain name corresponding to described virtual identifying puts on record successfully;If It is then to inquire about the access business that puts on record.
In a preferred embodiment of the present application, described website detection module 502 can include following son Module:
7th inquiry submodule, for inquiring about the fictitious host computer that described fictitious host computer mark is corresponding;
Second detection sub-module, for detecting network information service state and/or the application of described fictitious host computer Program pond state, to obtain network state information.
In a preferred embodiment of the present application, the detection of described website applying detection at least can wrap Include one or more in homepage setting, data base's connection;
Described website detection module 502 can include following submodule:
Whether the 8th inquiry submodule, arranged for the fictitious host computer inquiring about described fictitious host computer mark corresponding Homepage;
9th inquiry submodule, for inquiring about the data base of fictitious host computer corresponding to described fictitious host computer mark Whether connect normal.
For device embodiment, due to itself and embodiment of the method basic simlarity, so the comparison described Simply, relevant part sees the part of embodiment of the method and illustrates.
Each embodiment in this specification all uses the mode gone forward one by one to describe, and each embodiment stresses Be all the difference with other embodiments, between each embodiment, identical similar part sees mutually ?.
Those skilled in the art are it should be appreciated that the embodiment of the embodiment of the present application can be provided as method, dress Put or computer program.Therefore, the embodiment of the present application can use complete hardware embodiment, completely Software implementation or the form of the embodiment in terms of combining software and hardware.And, the embodiment of the present application Can use and can be situated between with storage at one or more computers wherein including computer usable program code The upper computer journey implemented of matter (including but not limited to disk memory, CD-ROM, optical memory etc.) The form of sequence product.
In a typical configuration, described computer equipment includes one or more processor (CPU), input/output interface, network interface and internal memory.Internal memory potentially includes computer-readable medium In volatile memory, the shape such as random access memory (RAM) and/or Nonvolatile memory Formula, such as read only memory (ROM) or flash memory (flash RAM).Internal memory is computer-readable medium Example.Computer-readable medium includes removable media permanent and non-permanent, removable and non- Information storage can be realized by any method or technology.Information can be computer-readable instruction, Data structure, the module of program or other data.The example of the storage medium of computer includes, but Be not limited to phase transition internal memory (PRAM), static RAM (SRAM), dynamic random are deposited Access to memory (DRAM), other kinds of random access memory (RAM), read only memory (ROM), Electrically Erasable Read Only Memory (EEPROM), fast flash memory bank or other in Deposit technology, read-only optical disc read only memory (CD-ROM), digital versatile disc (DVD) or other Optical storage, magnetic cassette tape, tape magnetic rigid disk storage other magnetic storage apparatus or any its His non-transmission medium, can be used for the information that storage can be accessed by a computing device.According to herein Defining, computer-readable medium does not include the computer readable media (transitory media) of non-standing, Data signal and carrier wave such as modulation.
The embodiment of the present application is with reference to the method according to the embodiment of the present application, terminal unit (system) and meter The flow chart of calculation machine program product and/or block diagram describe.It should be understood that can be by computer program instructions Each flow process in flowchart and/or block diagram and/or square frame and flow chart and/or square frame Flow process in figure and/or the combination of square frame.Can provide these computer program instructions to general purpose computer, The processor of special-purpose computer, Embedded Processor or other programmable data processing terminal equipment is to produce One machine so that performed by the processor of computer or other programmable data processing terminal equipment Instruction produce for realizing at one flow process of flow chart or multiple flow process and/or one square frame of block diagram or The device of the function specified in multiple square frames.
These computer program instructions may be alternatively stored in and computer or other programmable datas can be guided to process In the computer-readable memory that terminal unit works in a specific way so that be stored in this computer-readable Instruction in memorizer produces the manufacture including command device, and this command device realizes flow chart one The function specified in flow process or multiple flow process and/or one square frame of block diagram or multiple square frame.
These computer program instructions also can be loaded into computer or other programmable data processing terminals set Standby upper so that on computer or other programmable terminal equipment, to perform sequence of operations step in terms of producing The process that calculation machine realizes, thus the instruction performed on computer or other programmable terminal equipment provides and uses In realizing in one flow process of flow chart or multiple flow process and/or one square frame of block diagram or multiple square frame The step of the function specified.
Although having been described for the preferred embodiment of the embodiment of the present application, but those skilled in the art being once Know basic creative concept, then these embodiments can be made other change and amendment.So, Claims are intended to be construed to include preferred embodiment and fall into the institute of the embodiment of the present application scope There are change and amendment.
Finally, in addition it is also necessary to explanation, in this article, the relational terms of such as first and second or the like It is used merely to separate an entity or operation with another entity or operating space, and not necessarily requires Or imply relation or the order that there is any this reality between these entities or operation.And, art Language " includes ", " comprising " or its any other variant are intended to comprising of nonexcludability, so that Process, method, article or terminal unit including a series of key elements not only include those key elements, and Also include other key elements being not expressly set out, or also include for this process, method, article or The key element that person's terminal unit is intrinsic.In the case of there is no more restriction, statement " include one It is individual ... " key element that limits, it is not excluded that including the process of described key element, method, article or end End equipment there is also other identical element.
Above to a kind of based on fictitious host computer website detection method provided herein and a kind of based on The website detection device of fictitious host computer, is described in detail, and specific case used herein is to this Shen Principle and embodiment please are set forth, and the explanation of above example is only intended to help and understands this Shen Method please and core concept thereof;Simultaneously for one of ordinary skill in the art, according to the application's Thought, the most all will change, in sum, and this specification Content should not be construed as the restriction to the application.

Claims (16)

1. website based on a fictitious host computer detection method, it is characterised in that including:
Receive the detection request of website;Described detection request includes carrying the fictitious host computer of described website Fictitious host computer identifies;
Described website is detected, to obtain testing result according to described fictitious host computer mark;
Wherein, described detection at least include fictitious host computer detection, website domain name detection, website status detection, One or more in network state detection, website applying detection.
Method the most according to claim 1, it is characterised in that also include:
When described testing result meets default property value, generate website for described testing result and improve Suggestion.
Method the most according to claim 1, it is characterised in that described fictitious host computer mark includes The second level domain of described fictitious host computer.
4. according to the method described in claim 1 or 2 or 3, it is characterised in that described fictitious host computer The detection of detection at least includes the Expiration Date of fictitious host computer, the space of fictitious host computer, the number of fictitious host computer According to one or more in storehouse;
Described website is detected, to obtain the step of testing result by described mark according to described fictitious host computer Suddenly include:
Inquire about the information of fictitious host computer corresponding to described fictitious host computer mark;
Wherein, the information of described fictitious host computer at least includes following one or more:
The Expiration Date of fictitious host computer, the space of fictitious host computer, the data base of fictitious host computer.
5. according to the method described in claim 1 or 2 or 3, it is characterised in that described website domain name The detection of detection at least includes one or more in domain name binding, domain name Expiration Date, domain name mapping;
Described website is detected, to obtain the step of testing result by described mark according to described fictitious host computer Suddenly include:
Judge that described fictitious host computer identifies whether the domain name binding with described website;
The most then inquire about the Expiration Date of domain name;
Whether detection domain name is resolved to the server belonging to described fictitious host computer.
6. according to the method described in claim 1 or 2 or 3, it is characterised in that described website status Detection detection at least include fictitious host computer close down, close down reason, fictitious host computer migrate, website put on record, One or more in fictitious host computer backup, fictitious host computer recovery;
Described website is detected, to obtain the step of testing result by described mark according to described fictitious host computer Suddenly include:
Inquire about whether fictitious host computer corresponding to described virtual identifying is closed down;The most then inquire about and to be closed down Reason;
Inquire about whether fictitious host computer corresponding to described virtual identifying is in Data Migration state, data backup shape State, data recover state;
Inquire about whether domain name corresponding to described virtual identifying puts on record successfully;The most then inquire about the access business that puts on record.
7. according to the method described in claim 1 or 2 or 3, it is characterised in that described in described basis Described website is detected by fictitious host computer mark, includes obtaining the step of testing result:
Inquire about the fictitious host computer that described fictitious host computer mark is corresponding;
Detect network information service state and/or the application pool state of described fictitious host computer, to obtain net Network status information.
8. according to the method described in claim 1 or 2 or 3, it is characterised in that described website is applied The detection of detection at least includes one or more in homepage setting, data base's connection;
Described website is detected, to obtain the step of testing result by described mark according to described fictitious host computer Suddenly include:
Whether the fictitious host computer inquiring about described fictitious host computer mark corresponding arranges homepage;
Whether the data base inquiring about fictitious host computer corresponding to described fictitious host computer mark connects normally.
9. website based on a fictitious host computer detection device, it is characterised in that including:
Detection request receives submodule, for receiving the detection request of website;Described detection request includes Carry the fictitious host computer mark of the fictitious host computer of described website;
Website detection module, for detecting described website according to described fictitious host computer mark, to obtain Obtain testing result;
Wherein, described detection at least include fictitious host computer detection, website domain name detection, website status detection, One or more in network state detection, website applying detection.
Device the most according to claim 9, it is characterised in that also include:
Suggestion generation module, for when described testing result meets default property value, for described inspection Survey result and generate website recommendation on improvement.
11. devices according to claim 9, it is characterised in that described fictitious host computer mark includes The second level domain of described fictitious host computer.
12. according to the device described in claim 9 or 10 or 11, it is characterised in that described virtual master The detection of machine testing at least includes the Expiration Date of fictitious host computer, the space of fictitious host computer, fictitious host computer One or more in data base;
Described website detection module includes:
First inquiry submodule, for inquiring about the information of fictitious host computer corresponding to described fictitious host computer mark;
Wherein, the information of described fictitious host computer at least includes following one or more:
The Expiration Date of fictitious host computer, the space of fictitious host computer, the data base of fictitious host computer.
13. according to the device described in claim 9 or 10 or 11, it is characterised in that described website domain The detection of name detection at least includes one or more in domain name binding, domain name Expiration Date, domain name mapping;
Described website detection module includes:
First judges submodule, ties up for judging described fictitious host computer to identify whether with the domain name of described website Fixed;The most then call the second inquiry submodule;
Second inquiry submodule, for inquiring about the Expiration Date of domain name;
First detection sub-module, for detecting whether domain name is resolved to the clothes belonging to described fictitious host computer Business device.
14. according to the device described in claim 9 or 10 or 11, it is characterised in that described website shape State detection detection at least include fictitious host computer close down, close down reason, fictitious host computer migrate, website standby One or more in the backup of case, fictitious host computer, fictitious host computer recovery;
Described website detection module includes:
3rd inquiry submodule, for inquiring about whether fictitious host computer corresponding to described virtual identifying is closed down; The most then call the 4th inquiry submodule;
4th inquiry submodule, the reason closed down for inquiry;
5th inquiry submodule, for inquiring about whether fictitious host computer corresponding to described virtual identifying is in data Transition state, data backup status, data recover state;
6th inquiry submodule, for inquiring about whether domain name corresponding to described virtual identifying puts on record successfully;If It is then to inquire about the access business that puts on record.
15. according to the device described in claim 9 or 10 or 11, it is characterised in that described website is examined Survey module includes:
7th inquiry submodule, for inquiring about the fictitious host computer that described fictitious host computer mark is corresponding;
Second detection sub-module, for detecting network information service state and/or the application of described fictitious host computer Program pond state, to obtain network state information.
16. according to the device described in claim 9 or 10 or 11, it is characterised in that described website should One or more in homepage setting, data base's connection are at least included with the detection of detection;
Described website detection module includes:
Whether the 8th inquiry submodule, arranged for the fictitious host computer inquiring about described fictitious host computer mark corresponding Homepage;
9th inquiry submodule, for inquiring about the data base of fictitious host computer corresponding to described fictitious host computer mark Whether connect normal.
CN201510291107.0A 2015-05-29 2015-05-29 A kind of website based on fictitious host computer detection method and device Pending CN106301983A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201510291107.0A CN106301983A (en) 2015-05-29 2015-05-29 A kind of website based on fictitious host computer detection method and device
PCT/CN2016/080443 WO2016192492A1 (en) 2015-05-29 2016-04-28 Website detection method and device based on virtual host

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510291107.0A CN106301983A (en) 2015-05-29 2015-05-29 A kind of website based on fictitious host computer detection method and device

Publications (1)

Publication Number Publication Date
CN106301983A true CN106301983A (en) 2017-01-04

Family

ID=57440139

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510291107.0A Pending CN106301983A (en) 2015-05-29 2015-05-29 A kind of website based on fictitious host computer detection method and device

Country Status (2)

Country Link
CN (1) CN106301983A (en)
WO (1) WO2016192492A1 (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107819890A (en) * 2017-09-28 2018-03-20 安徽乐游网络科技有限公司 A kind of domain name term of validity monitoring and alarm method
CN113572826A (en) * 2021-07-12 2021-10-29 绿盟科技集团股份有限公司 Equipment information binding method and system and electronic equipment
CN115412309A (en) * 2022-08-09 2022-11-29 中国电信股份有限公司 Detection method and device for unregistered website, electronic equipment and storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101605056A (en) * 2009-06-16 2009-12-16 中兴通讯股份有限公司 A J2EE server monitoring device and monitoring method using the device
CN103023726A (en) * 2012-12-24 2013-04-03 云海创想信息技术(北京)有限公司 Method and system for testing maximum mainframe connection number of network storage device
CN103186450A (en) * 2011-12-28 2013-07-03 英业达集团(天津)电子技术有限公司 Method and system for monitoring virtual resource consumption
CN103220298A (en) * 2013-04-27 2013-07-24 西北工业大学 Windows Virtual machine remote detecting method
CN103812715A (en) * 2012-11-07 2014-05-21 江苏仕德伟网络科技股份有限公司 Method for judging running state of website

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP4910542B2 (en) * 2006-07-27 2012-04-04 富士通株式会社 SIP message delivery program
CN102984214B (en) * 2012-11-08 2016-03-02 华为技术有限公司 A kind of method and device realizing business migration in telecom cloud
CN103873447A (en) * 2012-12-17 2014-06-18 华为技术有限公司 Method, device and equipment for starting of virtual host
CN104915263B (en) * 2015-06-30 2019-04-19 北京奇虎科技有限公司 Process fault handling method and device based on container technology

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101605056A (en) * 2009-06-16 2009-12-16 中兴通讯股份有限公司 A J2EE server monitoring device and monitoring method using the device
CN103186450A (en) * 2011-12-28 2013-07-03 英业达集团(天津)电子技术有限公司 Method and system for monitoring virtual resource consumption
CN103812715A (en) * 2012-11-07 2014-05-21 江苏仕德伟网络科技股份有限公司 Method for judging running state of website
CN103023726A (en) * 2012-12-24 2013-04-03 云海创想信息技术(北京)有限公司 Method and system for testing maximum mainframe connection number of network storage device
CN103220298A (en) * 2013-04-27 2013-07-24 西北工业大学 Windows Virtual machine remote detecting method

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107819890A (en) * 2017-09-28 2018-03-20 安徽乐游网络科技有限公司 A kind of domain name term of validity monitoring and alarm method
CN113572826A (en) * 2021-07-12 2021-10-29 绿盟科技集团股份有限公司 Equipment information binding method and system and electronic equipment
CN113572826B (en) * 2021-07-12 2023-09-26 绿盟科技集团股份有限公司 Device information binding method and system and electronic device
CN115412309A (en) * 2022-08-09 2022-11-29 中国电信股份有限公司 Detection method and device for unregistered website, electronic equipment and storage medium

Also Published As

Publication number Publication date
WO2016192492A1 (en) 2016-12-08

Similar Documents

Publication Publication Date Title
US11269718B1 (en) Root cause detection and corrective action diagnosis system
US8813039B2 (en) Method and system for software defect reporting
US8898637B2 (en) Bug clearing house
CN103023710B (en) A kind of safety test system and method
US10210190B1 (en) Roll back of scaled-out data
CN111258832B (en) Interface parameter verification method, device, equipment and medium
US20220229657A1 (en) Extensible resource compliance management
US20210336838A1 (en) Multi-tenant event sourcing and audit logging in a cloud-based computing infrastructure
CN107704360A (en) Processing method, equipment, server and the storage medium of monitoring data
CN114650187A (en) Abnormal access detection method and device, electronic equipment and storage medium
CN104899016A (en) Call stack relationship obtaining method and call stack relationship obtaining device
CN107392028A (en) The detection method and its detection means of sensitive information, storage medium, electronic equipment
CN112187933A (en) Method and system for monitoring services in multi-architecture cloud platform
CN106301983A (en) A kind of website based on fictitious host computer detection method and device
CN117331804A (en) Front-end page monitoring method and device, computer equipment and storage medium
CN120762597A (en) Automatic mounting method, device, equipment and medium based on cloud hard disk
CN120560886A (en) Front-end monitoring method, device, computer equipment, computer-readable storage medium, and computer program product
CN116132250B (en) Operation and maintenance system, method, storage medium, and electronic device
US12282768B2 (en) Automated developer configuration tool
CN112579383A (en) Method and device for simulating system fault
CN117834265A (en) Abnormal network request testing method and system
CN117235107B (en) Data access processing method and device, electronic equipment and storage medium
CN113377633B (en) External network data mapping method and related equipment based on user behavior backtracking
CN112149106B (en) Login method, device, equipment and medium of enterprise private applet
CN119718293A (en) Business process generation method, device, computer equipment and storage medium

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20170104

WD01 Invention patent application deemed withdrawn after publication