CN109032655B - Configuration method of monitoring instance, server and computer readable storage medium - Google Patents

Configuration method of monitoring instance, server and computer readable storage medium Download PDF

Info

Publication number
CN109032655B
CN109032655B CN201810592825.5A CN201810592825A CN109032655B CN 109032655 B CN109032655 B CN 109032655B CN 201810592825 A CN201810592825 A CN 201810592825A CN 109032655 B CN109032655 B CN 109032655B
Authority
CN
China
Prior art keywords
item
configuration content
monitoring instance
terminal
identity
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810592825.5A
Other languages
Chinese (zh)
Other versions
CN109032655A (en
Inventor
林水明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ping An Technology Shenzhen Co Ltd
Original Assignee
Ping An Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ping An Technology Shenzhen Co Ltd filed Critical Ping An Technology Shenzhen Co Ltd
Priority to CN201810592825.5A priority Critical patent/CN109032655B/en
Priority to PCT/CN2018/105528 priority patent/WO2019237538A1/en
Publication of CN109032655A publication Critical patent/CN109032655A/en
Application granted granted Critical
Publication of CN109032655B publication Critical patent/CN109032655B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/70Software maintenance or management
    • G06F8/71Version control; Configuration management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/34Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment
    • G06F11/3438Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment monitoring of user actions

Landscapes

  • Engineering & Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Quality & Reliability (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer And Data Communications (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The invention is suitable for the technical field of computers, and provides a configuration method of a monitoring example, a server and a computer readable storage medium, wherein the configuration method comprises the following steps: if a monitoring instance creating request sent by a terminal is received, extracting a monitoring instance type identifier carried by the monitoring instance creating request; determining the unique identity of the user to which the terminal belongs; creating a monitoring instance based on a monitoring instance template corresponding to the monitoring instance type identifier, and sending an item to be configured in the monitoring instance to the terminal; receiving the original configuration content of the item to be configured returned by the terminal; and carrying out identity marking on the original configuration content of the item to be configured based on the unique identity, and determining the original configuration content after identity marking as the final configuration content of the item to be configured. The invention can avoid the restriction of different users on the setting of the configuration content of the same item to be configured, and enlarges the setting range of the configuration content of the item to be configured.

Description

Configuration method of monitoring instance, server and computer readable storage medium
Technical Field
The invention belongs to the technical field of computers, and particularly relates to a configuration method of a monitoring instance, a server and a computer readable storage medium.
Background
The monitoring system is the most important link in the whole operation and maintenance link and even the whole product life cycle, can comprehensively monitor objects such as a server, a database, an application program and the like, can early warn in time in advance to find faults, and provides detailed monitoring data to track and locate problems afterwards.
Generally, when a monitoring object needs to be monitored, a monitoring instance corresponding to the monitoring object needs to be created and configured in a monitoring system, and the monitoring system requires that configuration contents of some items to be configured of the monitoring instance are required to be globally unique, such as a monitoring instance name, an alarm contact name, and the like. The existing monitoring system cannot distinguish the configuration contents set by different users for the items to be configured, so that when a plurality of users share the monitoring system, the plurality of users can cause constraints on the settings of the items to be configured, for example, if a certain user sets the name of an alarm contact person of a certain monitoring example to Zhang III, other users cannot use the name of Zhang III as the name of the alarm contact person, thus the setting range of the configuration contents of the items to be configured can be narrowed, and great inconvenience is brought to the users.
Disclosure of Invention
In view of this, embodiments of the present invention provide a configuration method for a monitoring instance, a server, and a computer-readable storage medium, so as to solve the problem that an existing monitoring system causes different users to constrain each other on the setting of the same to-be-configured item, reduces the setting range of the configuration content of the to-be-configured item, and brings great inconvenience to the users.
A first aspect of an embodiment of the present invention provides a method for configuring a monitoring instance, including:
if a monitoring instance creating request sent by a terminal is received, extracting a monitoring instance type identifier carried by the monitoring instance creating request;
determining the unique identity of the user to which the terminal belongs;
creating a monitoring instance based on a monitoring instance template corresponding to the monitoring instance type identifier, and sending an item to be configured in the monitoring instance to the terminal, so that the terminal acquires and returns original configuration content set by a user for the item to be configured;
receiving the original configuration content of the item to be configured returned by the terminal;
and carrying out identity marking on the original configuration content of the item to be configured based on the unique identity, and determining the original configuration content after identity marking as the final configuration content of the item to be configured.
A second aspect of an embodiment of the present invention provides a server, including a memory, a processor, and a computer program stored in the memory and executable on the processor, where the processor implements the following steps when executing the computer program:
if a monitoring instance creating request sent by a terminal is received, extracting a monitoring instance type identifier carried by the monitoring instance creating request;
determining the unique identity of the user to which the terminal belongs;
creating a monitoring instance based on a monitoring instance template corresponding to the monitoring instance type identifier, and sending an item to be configured in the monitoring instance to the terminal, so that the terminal acquires and returns original configuration content set by a user for the item to be configured;
receiving the original configuration content of the item to be configured returned by the terminal;
and carrying out identity marking on the original configuration content of the item to be configured based on the unique identity, and determining the original configuration content after identity marking as the final configuration content of the item to be configured.
A third aspect of embodiments of the present invention provides a computer-readable storage medium storing a computer program, which when executed by a processor, performs the steps of:
if a monitoring instance creating request sent by a terminal is received, extracting a monitoring instance type identifier carried by the monitoring instance creating request;
determining the unique identity of the user to which the terminal belongs;
creating a monitoring instance based on a monitoring instance template corresponding to the monitoring instance type identifier, and sending an item to be configured in the monitoring instance to the terminal, so that the terminal acquires and returns original configuration content set by a user for the item to be configured;
receiving the original configuration content of the item to be configured returned by the terminal;
and carrying out identity marking on the original configuration content of the item to be configured based on the unique identity, and determining the original configuration content after identity marking as the final configuration content of the item to be configured.
The implementation of the configuration method, the server and the computer-readable storage medium of the monitoring example provided by the embodiment of the invention has the following beneficial effects:
in the embodiment of the invention, the unique identity of the user to which the terminal sending the monitoring instance creation request belongs is determined, and the configuration content set by the user for the item to be configured of the monitoring instance is subjected to identity marking based on the unique identity of the user, so that the configuration content set by different users for the same item to be configured can be distinguished based on the unique identity of the user, and the different users can not cause restriction on the configuration content set by the same item to be configured, namely the configuration content set by the different users for the same item to be configured can be the same, and the setting range of the configuration content of the item to be configured is expanded.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present invention, the drawings needed to be used in the embodiments or the prior art descriptions will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without inventive exercise.
Fig. 1 is a flowchart illustrating an implementation of a configuration method of a monitoring instance according to an embodiment of the present invention;
fig. 2 is a flowchart illustrating an implementation of S12 in a configuration method of a monitoring instance according to an embodiment of the present invention;
fig. 3 is a flowchart of an implementation of S15 in a configuration method of a monitoring instance according to an embodiment of the present invention;
fig. 4 is a block diagram of a server according to an embodiment of the present invention;
fig. 5 is a block diagram of a server according to another embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
Referring to fig. 1, fig. 1 is a flowchart illustrating an implementation of a configuration method of a monitoring example according to an embodiment of the present invention. In this embodiment, the execution subject of the configuration method of the monitoring instance is a server in the monitoring system. It should be noted that, the monitoring system includes, in addition to the server, a monitoring program (i.e., a client) deployed on the user terminal. The monitoring program is used for monitoring the monitored object and feeding back the monitoring data to the server. The monitoring object is an objectively existing entity object, including but not limited to a terminal, a database, an application program, and the like. The terminal includes but is not limited to a computer, a mobile phone, etc.
The configuration method of the monitoring example shown in fig. 1 includes the following steps:
s11: and if a monitoring instance creating request sent by a terminal is received, extracting a monitoring instance type identifier carried by the monitoring instance creating request.
In this embodiment, the terminal may be any terminal of any user authorized to use the monitoring system. In practical application, when a user uses a monitoring system, the user needs to apply for registering a user account to a server in the monitoring system. Specifically, a user can enter an account registration interface of the monitoring system through the terminal to perform account registration, and when the user account is registered, the server can perform identity verification on the user according to basic information filled by the user so as to check whether the user can use the monitoring system in an authorized mode. For example, the server may check whether the user is a paid user based on the company name filled by the user, and if so, determine that the user is authorized to use the monitoring system. It should be noted that, after the account registration is successful, the server may also assign a unique identity to the user, where the unique identity is globally unique in the entire monitoring system, that is, the unique identities assigned by the server to different users are different.
When a user wants to monitor a certain monitoring object, a monitoring instance corresponding to the monitoring object needs to be created in a monitoring system. The monitoring instance refers to a virtual instance which is created in the monitoring system and used for identifying the monitored object. It is understood that a developer may pre-define a plurality of different types of monitoring instances in the server and configure a monitoring instance type identifier for each type of monitoring instance. As an embodiment of the present invention, the monitoring instance type identifier may be a type name of the monitoring instance. For example, for a monitoring instance of the database type, the server may identify its name "database" as its monitoring instance type. As another embodiment of the present invention, the server may number the type of the monitoring instance defined by the server, and use the type number of the monitoring instance as the monitoring instance type identifier.
The user can log in the registered user account on the terminal where the monitoring object is located, further enter the monitoring system, and select the type of the monitoring instance which the user wants to create on the monitoring instance creation request interface of the monitoring system. The terminal generates a monitoring instance creating request based on the type of the monitoring instance selected by the user and sends the monitoring instance creating request to the server. And the monitoring instance creating request carries the monitoring instance type identifier.
And when the server receives a monitoring instance creating request sent by the terminal, extracting the type identification of the monitoring instance from the monitoring instance creating request.
S12: and determining the unique identity of the user to which the terminal belongs.
In this embodiment, when receiving a monitoring instance creation request sent by a certain terminal, the server further determines the unique identity of the user to which the terminal sending the monitoring instance creation request belongs.
In practical application, when a user wants to monitor a terminal or a monitoring object such as a database or an application program deployed on the terminal, a monitoring instance creation request can be sent to a server through the terminal. It can be understood that, when the monitoring object is deployed on a plurality of different terminals, the user can log in the registered account to enter the monitoring system through the plurality of different terminals, and then send the monitoring instance creation request to the server through the different terminals.
As an embodiment of the present invention, after the user selects the type of the monitoring instance that the user wants to create in the monitoring instance creation request interface, the user also needs to input the unique identity assigned to the user by the server, and the terminal identifies the unique identity input by the user as the unique identity of the user to which the terminal belongs. And the terminal generates a monitoring instance creating request based on the type of the monitoring instance selected by the user and the unique identity of the user to which the terminal belongs. The monitoring instance creating request carries a monitoring instance type identifier and a unique identity identifier of a user to which a terminal sending the monitoring instance creating request belongs. Based on this, S12 may specifically include the following steps:
and extracting the unique identity of the user carried by the monitoring instance creation request, and determining the extracted unique identity as the unique identity of the user to which the terminal belongs.
In this embodiment, when the server receives a monitoring instance creation request sent by a certain terminal, the server further extracts a unique identity of a user from the monitoring instance creation request, and determines the extracted unique identity as the unique identity of the user to which the terminal belongs, which is carried by the monitoring instance creation request.
As another embodiment of the present invention, when a user logs in a user account registered by the user for the first time on a certain terminal and enters a monitoring system, a server determines the terminal as a terminal belonging to the user, allocates a terminal identifier to the terminal, and sends the terminal identifier to the terminal, so that the terminal stores the terminal identifier allocated to the terminal. Meanwhile, the server establishes a corresponding relation between the terminal identification of the terminal and the unique identity identification of the user to which the terminal belongs. It should be noted that the server allocates different terminal identifiers to different terminals of different users, that is, the terminal identifier of each terminal is globally unique in the entire monitoring system. In practical applications, the terminal Identifier may be a Universal Unique Identifier (UUID). It can be understood that, since a user logs in the user account registered by the user on at least one terminal, the unique id of each user corresponds to at least one terminal id.
In this embodiment, after the user selects the type of the monitoring instance that the user wants to create in the monitoring instance creation request interface, the terminal generates a monitoring instance creation request based on the type of the monitoring instance selected by the user and the terminal identifier. Wherein, the monitoring instance creating request carries the monitoring instance type identification and the terminal identification. Based on this, S12 can be specifically realized by S121 to S123 shown in fig. 2, which are detailed as follows:
s121: and extracting the terminal identification carried by the monitoring instance establishing request.
S122: and determining the unique identity of the user corresponding to the terminal identifier based on a preset corresponding relation between the terminal identifier and the unique identity of the user.
S123: and determining the unique identity of the user corresponding to the terminal identifier as the unique identity of the user to which the terminal belongs.
In this embodiment, when the server receives a monitoring instance creation request sent by the terminal, the server further extracts a terminal identifier from the monitoring instance creation request, determines the unique identity of the user corresponding to the extracted terminal identifier based on a preset correspondence between the terminal identifier and the unique identity of the user, and determines the unique identity of the user corresponding to the extracted terminal identifier as the unique identity of the user to which the terminal carried by the monitoring instance creation request is sent belongs.
S13: and creating a monitoring instance based on the monitoring instance template corresponding to the monitoring instance type identifier, and sending the item to be configured in the monitoring instance to the terminal, so that the terminal acquires and returns the original configuration content set by the user for the item to be configured.
In this embodiment, after defining a plurality of different types of monitoring instances, a developer also configures a monitoring instance template for each type of monitoring instance, where the monitoring instance template defines some items to be configured of the monitoring instance. The items to be configured of the monitoring instance refer to some basic information items which need to be configured after the monitoring instance is created. For example, the items to be configured of the monitoring instances may include, but are not limited to, monitoring instance names, alarm contact group names, alarm templates, and the like, and the monitoring instance templates of different types of monitoring instances may be the same or different, and are specifically set according to actual requirements, and are not limited here. The server establishes a corresponding relation between the monitoring instance type identification of each type of monitoring instance and the monitoring instance template.
After the server extracts the monitoring instance type identification from the monitoring instance creating request, the server determines a monitoring instance template corresponding to the extracted monitoring instance type identification based on the preset corresponding relation between the monitoring instance type identification and the monitoring instance template, and creates a monitoring instance based on the monitoring instance template. For example, if the monitoring instance type identifier extracted from the monitoring instance creation request by the server is used to identify the monitoring instance of the database type, the server creates the monitoring instance based on the monitoring instance template corresponding to the monitoring instance of the database type, that is, the monitoring object corresponding to the newly created monitoring instance is the database.
Because at least one item to be configured is defined in the monitoring instance template, the newly created monitoring instance comprises at least one item to be configured, which requires the user to set the configuration content. And the server sends the items to be configured in the newly created monitoring instances to the terminal. And the terminal displays the to-be-configured items in the newly created monitoring instance so that the user sets configuration content for each to-be-configured item. The terminal acquires the original configuration content set by the user for each item to be configured and sends the original configuration content set by the user for each item to be configured to the server.
S14: and receiving the original configuration content of the item to be configured returned by the terminal.
In this embodiment, after the server sends the items to be configured in the newly created monitoring instance to the terminal, the server receives the original configuration content, which is returned by the terminal and is set by the user for each item to be configured in the newly created monitoring instance. The original configuration content set by the user for each item to be configured refers to the content input by the user for each item to be configured. For example, if the content to be configured, which is input by the user for the monitoring instance name, is "first database", the terminal identifies the "first database" as the original configuration content that is set by the user for the item to be configured, which is the monitoring instance name.
S15: and carrying out identity marking on the original configuration content of the item to be configured based on the unique identity, and determining the original configuration content after identity marking as the final configuration content of the item to be configured.
In this embodiment, after acquiring original configuration content set by a user for an item to be configured in a newly created monitoring instance, a server performs identity marking on the original configuration content of the item to be configured in the newly created monitoring instance based on a unique identity of the user, and determines the original configuration content of the item to be configured after identity marking as final configuration content of a corresponding item to be configured.
As an embodiment of the present invention, S15 may specifically include the following steps:
and combining the unique identity with the original configuration content of the item to be configured based on a preset character string combination mode to obtain the final configuration content of the item to be configured.
In this embodiment, the server may combine the unique identity of the user with the original configuration content of the item to be configured based on a preset character string combination manner, and determine the combined content as the final configuration content of the item to be configured. The preset character string combination mode can be set according to actual requirements, and is not limited here. For example, the preset string combination method may be: and adding the unique identity of the user before the original configuration content of the item to be configured to obtain the combined content. For example, if the unique identity of the user is "abdae" and the original configuration content of the item to be configured, namely the name of the alarm contact, is "three-in-one", the server adds "abdae" before "three-in-one" to obtain "three-in-one" of abdae, and takes "three-in-one" of abdae as the final configuration content of the item to be configured, namely the name of the alarm contact.
As can be seen from the above, in the configuration method of the monitoring instance provided in this embodiment, the unique identifier of the user to which the terminal sending the request for creating the monitoring instance belongs is determined, and the configuration content set by the user for the to-be-configured item of the monitoring instance is identity-labeled based on the unique identifier of the user, so that, even though the original configuration content set by different users for the same to-be-configured item in the same type of monitoring instance is the same, the unique identifiers of different users are different, so that the server can distinguish the configuration content set by different users for the same to-be-configured item in the same type of monitoring instance based on the unique identifiers of the users, so that the different users do not cause constraints on the configuration content set by the same to-be-configured item on the basis of the unique identifiers of the users, that is, the configuration content set by the same to-be-configured item by different users can be the same, the setting range of the configuration content of the item to be configured is expanded.
Referring to fig. 3, fig. 3 is a flowchart illustrating an implementation of S15 in a configuration method of a monitoring example according to an embodiment of the present invention. With respect to the embodiment corresponding to fig. 1, S15 in the configuration method of the monitoring example provided in this embodiment specifically includes S151 to S153, which are detailed as follows:
s151: and acquiring the attribute information of the item to be configured.
In this embodiment, after defining the to-be-configured item of each monitoring instance template, the developer needs to add attribute information to each to-be-configured item. The server may store the attribute information of all items to be configured in each monitoring instance template in the attribute information table of the monitoring instance template. The attribute information of the item to be configured is used for identifying whether the configuration content of the item to be configured has global uniqueness. Globally unique refers to being unique throughout the monitoring system.
For example, the attribute information of the item to be configured may be represented by "0" or "1", where "0" represents that the configuration content of the item to be configured does not have global uniqueness, and "1" identifies that the configuration content of the item to be configured has global uniqueness. For example, for items to be configured, such as a monitoring instance name, an alarm contact group name, and the like, which require global uniqueness of configuration content, the developer may set all the attribute information thereof to "1", and for other items to be configured, the developer may set the attribute information thereof to "0".
In this embodiment, the server may obtain attribute information of each item to be configured in the newly created monitoring instance from the attribute information table of the monitoring instance template corresponding to the extracted monitoring instance type identifier.
S152: and determining a target item to be configured from the items to be configured based on the attribute information of the items to be configured.
And the server determines a target item to be configured from the items to be configured in the newly created monitoring instance based on the attribute information of the items to be configured in the newly created monitoring instance. The attribute information of the target item to be configured is used for identifying that the configuration content of the target item to be configured has global uniqueness.
The server determines, based on the attribute information of each item to be configured in the newly created monitoring instance, a target item to be configured from each item to be configured in the newly created monitoring instance, and specifically may include: the server detects the attribute information of each item to be configured, and if the detected attribute information of a certain item to be configured is used for identifying that the configuration content of the item to be configured has global uniqueness, the item to be configured is determined as a target item to be configured. For example, if the attribute information of a certain item to be configured is "1", the server determines that the item to be configured is the target item to be configured because "1" indicates that the configuration content of the item to be configured has global uniqueness.
S153: and carrying out identity marking on the original configuration content to be configured of the target based on the unique identity, and determining the original configuration content after identity marking as the final configuration content of the target item to be configured.
In this embodiment, after the target to-be-configured item is determined, the server performs identity tagging on the original configuration content of the target to-be-configured item based on the unique identity of the user, and determines the original configuration content of the target to-be-configured item after the identity tagging as the final configuration content.
As an embodiment of the present invention, the configuration method of the monitoring instance may further include the following steps:
and determining the original configuration contents of the other items to be configured except the target item to be configured in the items to be configured as the final configuration contents.
In this embodiment, the server does not perform any processing on the original configuration content of the remaining items to be configured, except the target item to be configured, in the items to be configured of the newly created monitoring instance, and directly determines the original configuration content of the remaining items to be configured, except the target item to be configured, as the final configuration content of the corresponding item to be configured.
It can be seen from the above that, in the configuration method of the monitoring instance provided in this embodiment, only the original configuration content of the target to-be-configured item, which requires the configuration content to have global uniqueness, is subjected to the identity marking, and the original configuration content of the to-be-configured item, which does not require the configuration content to have global uniqueness, is not subjected to any processing, so that the configuration efficiency of the monitoring instance is improved.
Fig. 4 is a block diagram illustrating a structure of a server according to an embodiment of the present invention, where the server includes units for executing steps in the embodiments corresponding to fig. 1 to fig. 3. Please refer to fig. 1 to 3 and fig. 1 to 3 for the corresponding embodiments. For convenience of explanation, only the portions related to the present embodiment are shown. Referring to fig. 3, the server 400 includes: first extracting unit 41, first determining unit 42, transmitting unit 43, receiving unit 44, and marking unit 45. Wherein:
the first extracting unit 41 is configured to, if a monitoring instance creation request sent by a terminal is received, extract a monitoring instance type identifier carried in the monitoring instance creation request.
The first determination unit 42 is configured to determine a unique identity of a user to which the terminal belongs.
The sending unit 43 is configured to create a monitoring instance based on the monitoring instance template corresponding to the monitoring instance type identifier, and send an item to be configured in the monitoring instance to the terminal, so that the terminal obtains and returns original configuration content set by a user for the item to be configured.
The receiving unit 44 is configured to receive the original configuration content of the item to be configured returned by the terminal.
The marking unit 45 is configured to perform identity marking on the original configuration content of the item to be configured based on the unique identity, and determine the original configuration content after identity marking as the final configuration content of the item to be configured.
As an embodiment of the present invention, the marking unit 45 is specifically configured to:
and combining the unique identity with the original configuration content of the item to be configured based on a preset character string combination mode to obtain the final configuration content of the item to be configured.
As an embodiment of the present invention, the marking unit 45 includes: the device comprises a first acquisition unit, a second determination unit and a third determination unit. Wherein:
the first obtaining unit is used for obtaining the attribute information of the item to be configured.
The second determining unit is used for determining a target item to be configured from the items to be configured based on the attribute information of the items to be configured.
The determining unit is configured to identify and mark the original configuration content to be configured of the target based on the unique identity, and determine the original configuration content after the identity marking as the final configuration content of the target item to be configured.
As an embodiment of the present invention, the server 400 further includes a fourth determination unit.
The fourth determining unit is used for determining original configuration contents of other items to be configured except the target item to be configured in the items to be configured as final configuration contents of the items to be configured.
As an embodiment of the present invention, the first determination unit 42 includes: the device comprises a second extraction unit, a fifth determination unit and a sixth determination unit. Wherein:
and the second extraction unit is used for extracting the terminal identification carried by the monitoring instance creation request.
The fifth determining unit is used for determining the unique identity of the user corresponding to the terminal identifier based on the preset corresponding relation between the terminal identifier and the unique identity of the user.
The sixth determining unit is configured to determine the unique identity of the user corresponding to the terminal identifier as the unique identity of the user to which the terminal belongs.
As can be seen from the above, the server provided in this embodiment identifies the configuration contents set by the user for the to-be-configured item of the monitoring instance by determining the unique identifier of the user to which the terminal that sends the monitoring instance creation request belongs, and based on the unique identifier of the user, identifies the configuration contents set by the user for the to-be-configured item of the monitoring instance, so that, even though the original configuration contents set by different users for the same to-be-configured item in the same type of monitoring instance are the same, the server can distinguish the configuration contents set by different users for the same to-be-configured item in the same type of monitoring instance based on the unique identifiers of the different users, so that the different users do not cause constraints on the settings of the configuration contents of the same to-be-configured item, that is, the configuration contents set by different users for the same to-be-configured item can be the same, the setting range of the configuration content of the item to be configured is expanded.
The identity marking is only carried out on the original configuration content of the target item to be configured, which requires the configuration content to have global uniqueness, and the original configuration content of the item to be configured, which does not require the configuration content to have global uniqueness, is not processed, so that the configuration efficiency of the monitoring instance is improved.
Fig. 5 is a block diagram of a server according to another embodiment of the present invention. As shown in fig. 5, the server 5 of this embodiment includes: a processor 50, a memory 51 and a computer program 52 stored in said memory 51 and executable on said processor 50, such as a program for monitoring a configuration method of an instance. The processor 50, when executing the computer program 52, implements the steps in the embodiments of the configuration method of each monitoring instance described above, such as S11 to S15 shown in fig. 1. Alternatively, when the processor 50 executes the computer program 52, the functions of the units in the embodiment corresponding to fig. 4, for example, the functions of the units 51 to 55 shown in fig. 4, are implemented, for which reference is specifically made to the relevant description in the embodiment corresponding to fig. 4, which is not repeated herein.
Illustratively, the computer program 52 may be divided into one or more units, which are stored in the memory 51 and executed by the processor 50 to accomplish the present invention. The one or more units may be a series of computer program instruction segments capable of performing specific functions, which are used to describe the execution of the computer program 52 in the server 5. For example, the computer program 52 may be divided into a first extracting unit, a first determining unit, a transmitting unit, a receiving unit, and a marking unit, and the specific functions of the units are as described above.
The server may include, but is not limited to, a processor 50, a memory 51. Those skilled in the art will appreciate that fig. 5 is merely an example of a server 5 and does not constitute a limitation of server 5 and may include more or fewer components than shown, or some components in combination, or different components, e.g., the server may also include input output devices, network access devices, buses, etc.
The Processor 50 may be a Central Processing Unit (CPU), other general purpose Processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), an off-the-shelf Programmable Gate Array (FPGA) or other Programmable logic device, discrete Gate or transistor logic, discrete hardware components, etc. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
The storage 51 may be an internal storage unit of the server 5, such as a hard disk or a memory of the server 5. The memory 51 may also be an external storage device of the server 5, such as a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card) and the like provided on the server 5. Further, the memory 51 may also include both an internal storage unit and an external storage device of the server 5. The memory 51 is used for storing the computer program and other programs and data required by the server. The memory 51 may also be used to temporarily store data that has been output or is to be output.
The above-mentioned embodiments are only used for illustrating the technical solutions of the present invention, and not for limiting the same; although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; such modifications and substitutions do not substantially depart from the spirit and scope of the embodiments of the present invention, and are intended to be included within the scope of the present invention.

Claims (10)

1. A method for configuring a monitoring instance, comprising:
if a monitoring instance creating request sent by a terminal is received, extracting a monitoring instance type identifier carried by the monitoring instance creating request;
determining the unique identity of the user to which the terminal belongs;
creating a monitoring instance based on a monitoring instance template corresponding to the monitoring instance type identifier, and sending an item to be configured in the monitoring instance to the terminal, so that the terminal acquires and returns original configuration content set by a user for the item to be configured; the item to be configured of the monitoring instance refers to a basic information item which needs to be configured after the monitoring instance is created;
receiving the original configuration content of the item to be configured returned by the terminal;
and carrying out identity marking on the original configuration content of the item to be configured based on the unique identity, and determining the original configuration content after identity marking as the final configuration content of the item to be configured.
2. The method according to claim 1, wherein the identity marking original configuration content of the item to be configured based on the unique identity, and determining the original configuration content after identity marking as final configuration content of the item to be configured comprises:
and combining the unique identity with the original configuration content of the item to be configured based on a preset character string combination mode to obtain the final configuration content of the item to be configured.
3. The method according to claim 1, wherein the identity marking original configuration content of the item to be configured based on the unique identity, and determining the original configuration content after identity marking as final configuration content of the item to be configured comprises:
acquiring attribute information of the item to be configured;
determining a target item to be configured from the items to be configured based on the attribute information of the items to be configured;
and carrying out identity marking on the original configuration content to be configured of the target based on the unique identity, and determining the original configuration content after identity marking as the final configuration content of the target item to be configured.
4. The method for configuring a monitoring instance of claim 3, further comprising:
and determining the original configuration contents of the other items to be configured except the target item to be configured in the items to be configured as the final configuration contents.
5. The method for configuring a monitoring instance according to any one of claims 1 to 4, wherein the monitoring instance creation request further carries a terminal identifier;
the determining the unique identity of the user to which the terminal belongs includes:
extracting a terminal identifier carried by the monitoring instance establishing request;
determining the unique identity of the user corresponding to the terminal identifier based on a preset corresponding relation between the terminal identifier and the unique identity of the user;
and determining the unique identity of the user corresponding to the terminal identifier as the unique identity of the user to which the terminal belongs.
6. A server, comprising a memory, a processor, and a computer program stored in the memory and executable on the processor, the processor implementing the steps when executing the computer program:
if a monitoring instance creating request sent by a terminal is received, extracting a monitoring instance type identifier carried by the monitoring instance creating request;
determining the unique identity of the user to which the terminal belongs;
creating a monitoring instance based on a monitoring instance template corresponding to the monitoring instance type identifier, and sending an item to be configured in the monitoring instance to the terminal, so that the terminal acquires and returns original configuration content set by a user for the item to be configured; the item to be configured of the monitoring instance refers to a basic information item which needs to be configured after the monitoring instance is created;
receiving the original configuration content of the item to be configured returned by the terminal;
and carrying out identity marking on the original configuration content of the item to be configured based on the unique identity, and determining the original configuration content after identity marking as the final configuration content of the item to be configured.
7. The server according to claim 6, wherein the identity marking the original configuration content of the item to be configured based on the unique identity, and determining the original configuration content after identity marking as the final configuration content of the item to be configured comprises:
and combining the unique identity with the original configuration content of the item to be configured based on a preset character string combination mode to obtain the final configuration content of the item to be configured.
8. The server according to claim 6, wherein the identity marking the original configuration content of the item to be configured based on the unique identity, and determining the original configuration content after identity marking as the final configuration content of the item to be configured comprises:
acquiring attribute information of the item to be configured;
determining a target item to be configured from the items to be configured based on the attribute information of the items to be configured;
and carrying out identity marking on the original configuration content to be configured of the target based on the unique identity, and determining the original configuration content after identity marking as the final configuration content of the target item to be configured.
9. The server according to any of claims 6-8, wherein the monitoring instance creation request further carries a terminal identity;
the determining the unique identity of the user to which the terminal belongs includes:
extracting a terminal identifier carried by the monitoring instance establishing request;
determining the unique identity of the user corresponding to the terminal identifier based on a preset corresponding relation between the terminal identifier and the unique identity of the user;
and determining the unique identity of the user corresponding to the terminal identifier as the unique identity of the user to which the terminal belongs.
10. A computer-readable storage medium, in which a computer program is stored which, when being executed by a processor, carries out the steps of the method according to any one of claims 1 to 5.
CN201810592825.5A 2018-06-11 2018-06-11 Configuration method of monitoring instance, server and computer readable storage medium Active CN109032655B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201810592825.5A CN109032655B (en) 2018-06-11 2018-06-11 Configuration method of monitoring instance, server and computer readable storage medium
PCT/CN2018/105528 WO2019237538A1 (en) 2018-06-11 2018-09-13 Method for configuring monitoring instance, server, and computer-readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810592825.5A CN109032655B (en) 2018-06-11 2018-06-11 Configuration method of monitoring instance, server and computer readable storage medium

Publications (2)

Publication Number Publication Date
CN109032655A CN109032655A (en) 2018-12-18
CN109032655B true CN109032655B (en) 2021-10-29

Family

ID=64612413

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810592825.5A Active CN109032655B (en) 2018-06-11 2018-06-11 Configuration method of monitoring instance, server and computer readable storage medium

Country Status (2)

Country Link
CN (1) CN109032655B (en)
WO (1) WO2019237538A1 (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112711514A (en) * 2020-12-30 2021-04-27 北京珞安科技有限责任公司 Monitoring system, method and device of terminal equipment

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1909486A (en) * 2006-08-09 2007-02-07 艾默生网络能源有限公司 Monitoring system and its dynamic self-configuration method
CN104022894A (en) * 2014-05-12 2014-09-03 东软熙康健康科技有限公司 Method for managing application configuration parameters in concentrated mode and method for configuring application parameters
CN104333614A (en) * 2014-10-31 2015-02-04 北京奇虎科技有限公司 Terminal recognition method, device and system
AU2018200125A1 (en) * 2012-03-14 2018-02-01 Nasdaq Technology Ab Method and system for facilitating access to recorded data

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104113435B (en) * 2014-07-04 2017-11-07 广州华多网络科技有限公司 Generate the method and device of mark
CN106254575B (en) * 2016-09-09 2019-11-05 广州酷狗计算机科技有限公司 A kind of method and apparatus of determining user identifier

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1909486A (en) * 2006-08-09 2007-02-07 艾默生网络能源有限公司 Monitoring system and its dynamic self-configuration method
AU2018200125A1 (en) * 2012-03-14 2018-02-01 Nasdaq Technology Ab Method and system for facilitating access to recorded data
CN104022894A (en) * 2014-05-12 2014-09-03 东软熙康健康科技有限公司 Method for managing application configuration parameters in concentrated mode and method for configuring application parameters
CN104333614A (en) * 2014-10-31 2015-02-04 北京奇虎科技有限公司 Terminal recognition method, device and system

Also Published As

Publication number Publication date
WO2019237538A1 (en) 2019-12-19
CN109032655A (en) 2018-12-18

Similar Documents

Publication Publication Date Title
CN107665233B (en) Database data processing method and device, computer equipment and storage medium
CN107196788B (en) Method and device for processing buried point data, server and client
CN109743315B (en) Behavior identification method, behavior identification device, behavior identification equipment and readable storage medium for website
US10628577B2 (en) Identifying software components in a software codebase
CN109951435B (en) Equipment identifier providing method and device and risk control method and device
CN110489391B (en) Data processing method and related equipment
WO2017101606A1 (en) System and method for collecting and analyzing data
CN113489713B (en) Network attack detection method, device, equipment and storage medium
CN111198976B (en) Cloud asset association analysis system, method, electronic equipment and medium
CN106878108B (en) Network flow playback test method and device
CN109740129B (en) Report generation method, device and equipment based on blockchain and readable storage medium
CN109241084B (en) Data query method, terminal equipment and medium
CN110659206A (en) Simulation architecture establishing method, device, medium and electronic equipment based on microservice
CN106488585A (en) Display control method and system in wireless connection realization
CN109032655B (en) Configuration method of monitoring instance, server and computer readable storage medium
CN114386853A (en) Data auditing processing method, device and equipment based on universal auditing model
CN116069838A (en) Data processing method, device, computer equipment and storage medium
CN111046393B (en) Vulnerability information uploading method and device, terminal equipment and storage medium
CN111338958A (en) Parameter generation method and device of test case and terminal equipment
CN110020166B (en) Data analysis method and related equipment
CN110119337B (en) Data analysis method and device and server
CN109788054B (en) Configuration method, server and medium for distributed application coordination service node
CN109067542B (en) Token generation method, and tracking method and device based on Token
CN109635015B (en) Determination method and device for attribute data using object and server
CN112800130A (en) Data uplink method, system, device, equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant