CN111090567A - Link alarm method, equipment and storage medium - Google Patents

Link alarm method, equipment and storage medium Download PDF

Info

Publication number
CN111090567A
CN111090567A CN201911049992.6A CN201911049992A CN111090567A CN 111090567 A CN111090567 A CN 111090567A CN 201911049992 A CN201911049992 A CN 201911049992A CN 111090567 A CN111090567 A CN 111090567A
Authority
CN
China
Prior art keywords
hard disk
larger
card
threshold
threshold value
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN201911049992.6A
Other languages
Chinese (zh)
Inventor
胡龙
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Suzhou Inspur Intelligent Technology Co Ltd
Original Assignee
Suzhou Inspur Intelligent Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Suzhou Inspur Intelligent Technology Co Ltd filed Critical Suzhou Inspur Intelligent Technology Co Ltd
Priority to CN201911049992.6A priority Critical patent/CN111090567A/en
Publication of CN111090567A publication Critical patent/CN111090567A/en
Withdrawn legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/32Monitoring with visual or acoustical indication of the functioning of the machine
    • G06F11/324Display of status information
    • G06F11/327Alarm or error message display

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Quality & Reliability (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Debugging And Monitoring (AREA)

Abstract

The invention discloses a link alarm method, which comprises the following steps: acquiring topology information of a link; judging whether the devices in the link are all in a healthy state; acquiring error counts of the devices in response to the devices all being in a healthy state; determining whether an error count of the device is greater than a threshold; and responding to the fact that the error count of the equipment is larger than a threshold value, and obtaining the position information of the equipment with the error count larger than the threshold value according to the topology information so as to alarm. The invention also discloses a computer device and a readable storage medium. The method disclosed by the invention can flexibly adapt to various scenes by acquiring the topology information of the link without predicting networking, and can improve the efficiency of fault positioning and fault removal according to the topology information when detecting that the equipment fault or the error count in the link is greater than a threshold value.

Description

Link alarm method, equipment and storage medium
Technical Field
The invention relates to the technical field of storage, in particular to a link alarm method, link alarm equipment and a storage medium.
Background
With the increasing complexity of IT systems, various products have different hardware topologies. The back end has various links and various extension devices, and a unified method for managing the health state and a unified automatic detection mode are not provided.
In the prior art, only when equipment in a link fails, a user can sense the equipment failure, early warning cannot be performed in advance, and in addition, the position of the failed equipment cannot be quickly positioned.
Therefore, a link alarm method is urgently needed.
Disclosure of Invention
In view of the above, in order to overcome at least one aspect of the above problems, an embodiment of the present invention provides a link alarm method, including:
acquiring topology information of a link;
judging whether the devices in the link are all in a healthy state;
acquiring error counts of the devices in response to the devices all being in a healthy state;
determining whether an error count of the device is greater than a threshold;
and responding to the fact that the error count of the equipment is larger than a threshold value, and obtaining the position information of the equipment with the error count larger than the threshold value according to the topology information so as to alarm.
In some embodiments, obtaining topology information of the link further comprises:
scanning information of a card and a hard disk in a link;
and determining the topology information of the link according to the card and hard disk information.
In some embodiments, determining whether all devices in the link are in a healthy state further comprises:
detecting the uplink port state and the downlink port state of the card and the hard disk parameters;
and judging whether the card is in a healthy state or not according to the uplink port state and the downlink port state of the card and judging whether the hard disk is in a healthy state or not according to the hard disk parameters.
In some embodiments, further comprising:
responding to the fault state of the card and/or the hard disk, and acquiring the position information of the card and/or the hard disk according to the topology information;
and sending alarm information according to the position information.
In some embodiments, in response to the devices each being in a healthy state, obtaining an error count for the device, further comprising:
and acquiring the number of error codes of the port of the card, the error correction times of the hard disk and the usage amount of the hard disk.
In some embodiments, determining whether the error count of the device is greater than a threshold further comprises:
judging whether the number of error codes of a port of a card and the increment of the error correction times of the hard disk in a preset time period are larger than a threshold value or not, and judging whether the usage amount of the hard disk is larger than the threshold value or not.
In some embodiments, in response to the error count of the device being greater than a threshold, obtaining location information of the device whose error count is greater than the threshold according to the topology information for alerting, further comprising:
judging whether the number of error codes of a port of the card and the increment of the error correction times of the hard disk in a preset time period are larger than a first threshold value or not;
responding to the increment larger than the first threshold, and judging whether the error code quantity of the port of the card and the increment of the error correction times of the hard disk in a preset time period are larger than a second threshold or not;
responding to the increment larger than the second threshold value, and performing first-level early warning;
and responding to the increment which is larger than the first threshold and smaller than the second threshold, and performing second-level early warning.
In some embodiments, further comprising:
judging whether the usage amount of the hard disk is larger than a third threshold value;
responding to the fact that the usage amount of the hard disk is larger than the third threshold value, and judging whether the usage amount of the hard disk is larger than a fourth threshold value;
responding to the fact that the usage amount is larger than the fourth threshold value, and performing first-level early warning;
and responding to the fact that the usage amount is larger than the third threshold and smaller than the fourth threshold, and performing second-level early warning.
Based on the same inventive concept, according to another aspect of the present invention, an embodiment of the present invention further provides a computer apparatus, including:
at least one processor; and
a memory storing a computer program operable on the processor, wherein the processor executes the program to perform any of the steps of the link alarm method as described above.
Based on the same inventive concept, according to another aspect of the present invention, an embodiment of the present invention further provides a computer-readable storage medium storing a computer program which, when executed by a processor, performs the steps of any of the link alarm methods described above.
The invention has one of the following beneficial technical effects: the method disclosed by the invention can flexibly adapt to various scenes by acquiring the topology information of the link without predicting networking, and can improve the efficiency of fault positioning and fault removal according to the topology information when detecting that the equipment fault or the error count in the link is greater than a threshold value.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art that other embodiments can be obtained by using the drawings without creative efforts.
Fig. 1 is a schematic flowchart of a link alarm method according to an embodiment of the present invention;
FIG. 2 is a schematic diagram of a topology provided by an embodiment of the present invention;
FIG. 3 is a schematic structural diagram of a computer device provided in an embodiment of the present invention;
fig. 4 is a schematic structural diagram of a computer-readable storage medium according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the following embodiments of the present invention are described in further detail with reference to the accompanying drawings.
It should be noted that all expressions using "first" and "second" in the embodiments of the present invention are used for distinguishing two entities with the same name but different names or different parameters, and it should be noted that "first" and "second" are merely for convenience of description and should not be construed as limitations of the embodiments of the present invention, and they are not described in any more detail in the following embodiments.
According to an aspect of the present invention, an embodiment of the present invention provides a link alarm method, as shown in fig. 1, which may include the steps of: s1, acquiring the topological information of the link; s2, judging whether the devices in the link are all in a healthy state; s3, responding to the healthy state of the equipment, and acquiring the error count of the equipment; s4, judging whether the error count of the equipment is larger than a threshold value; s5, responding to the error count of the equipment is larger than the threshold value, and acquiring the position information of the equipment with the error count larger than the threshold value according to the topology information to alarm.
The method disclosed by the invention can flexibly adapt to various scenes by acquiring the topology information of the link without predicting networking, and can improve the efficiency of fault positioning and fault removal according to the topology information when detecting that the equipment fault or the error count in the link is greater than a threshold value.
In some embodiments, obtaining topology information of the link further comprises:
scanning information of a card and a hard disk in a link;
and determining the topology information of the link according to the card and hard disk information.
Specifically, the system sci device may be scanned, information of a back-end card (sas card or raid card) under the system is obtained, and then information of an expansion card and a hard disk under each back-end card is scanned, so that topology information can be obtained.
It should be noted that the card management tool may be used to scan information of the expansion card and the hard disk under each back-end card, and in addition, the hard disk may be directly connected to the back-end card or connected to the expansion card.
As shown in fig. 2, two sas cards are provided under one CPU, two expansion cards (expander1 and expander2) are provided under the sa card 1, each expansion card has a plurality of hard disks (disk 1-disk n), and the sa card 2 directly connects to the disk 1-disk n.
In some embodiments, determining whether all devices in the link are in a healthy state further comprises:
detecting the uplink port state and the downlink port state of the card and the hard disk parameters (such as error information, hard disk allowance and the like);
and judging whether the card is in a healthy state or not according to the uplink port state and the downlink port state of the card and judging whether the hard disk is in a healthy state or not according to the hard disk parameters.
Specifically, whether the state of the card is normal or not can be judged by detecting the states of the uplink port and the downlink port of the card, and whether the hard disk is in a normal state or not can be judged by detecting the parameters of the hard disk.
In some embodiments, further comprising:
responding to the fault state of the card and/or the hard disk, and acquiring the position information of the card and/or the hard disk according to the topology information;
and sending alarm information according to the position information.
Specifically, when a fault of the card or the hard disk is detected, the position of the corresponding card or the hard disk can be directly obtained through the topology information, so that the position of the fault card or the fault hard disk can be quickly positioned through the topology information, and the efficiency of eliminating the fault is improved.
In some embodiments, in response to the devices each being in a healthy state, obtaining an error count for the device, further comprising:
and acquiring the number of error codes of the port of the card, the error correction times of the hard disk and the usage amount of the hard disk.
Specifically, card devices in the link have requirements on the error rate, that is, when the error rate is controlled within a certain range, the system operation of the whole storage device is not affected, the error rate requirements are different for different storage devices and different application scenarios, and the maximum allowable error rate for ensuring the normal operation of the system can be determined according to actual conditions. The error correction times of the hard disk refer to the times of correcting errors by a self-correction mechanism of the hard disk when the hard disk writes data. The usage amount of the hard disk refers to that the hard disk has a backup area under normal conditions, and when the main area fails, the backup area can be used for storage.
In some embodiments, determining whether the error count of the device is greater than a threshold further comprises:
judging whether the number of error codes of a port of a card and the increment of the error correction times of the hard disk in a preset time period are larger than a threshold value or not, and judging whether the usage amount of the hard disk is larger than the threshold value or not.
In some embodiments, in response to the error count of the device being greater than a threshold, obtaining location information of the device whose error count is greater than the threshold according to the topology information for alerting, further comprising:
judging whether the number of error codes of a port of the card and the increment of the error correction times of the hard disk in a preset time period are larger than a first threshold value or not;
responding to the increment larger than the first threshold, and judging whether the error code quantity of the port of the card and the increment of the error correction times of the hard disk in a preset time period are larger than a second threshold or not;
responding to the increment larger than the second threshold value, and performing first-level early warning;
and responding to the increment which is larger than the first threshold and smaller than the second threshold, and performing second-level early warning.
Specifically, two levels of alarm levels may be set according to the magnitude of the increase, when the increase number of the error codes within the preset time period exceeds the first preset threshold but does not exceed the second preset threshold, a low level alarm is performed, and when the increase number of the error codes within the preset time period exceeds the second preset threshold, a high level alarm is performed. The user or the staff can carry out corresponding processing according to the received alarm level, and the condition with high level is processed preferentially, so that the operation is reasonably arranged on the basis of improving the stability and reliability of the system operation, and the processing flexibility of the staff is improved. Meanwhile, the corresponding card equipment can be accurately positioned according to the topology information.
In some embodiments, further comprising:
judging whether the usage amount of the hard disk is larger than a third threshold value;
responding to the fact that the usage amount of the hard disk is larger than the third threshold value, and judging whether the usage amount of the hard disk is larger than a fourth threshold value;
responding to the fact that the usage amount is larger than the fourth threshold value, and performing first-level early warning;
and responding to the fact that the usage amount is larger than the third threshold and smaller than the fourth threshold, and performing second-level early warning.
Specifically, two levels of alarm levels may be set according to the usage amount, a low level alarm is performed when the usage amount exceeds a third preset threshold but does not exceed a fourth preset threshold within a preset time period, and a high level alarm is performed when the usage amount exceeds the fourth preset threshold within the preset time period. The user or the staff can carry out corresponding processing according to the received alarm level, and the condition with high level is processed preferentially, so that the operation is reasonably arranged on the basis of improving the stability and reliability of the system operation, and the processing flexibility of the staff is improved. Meanwhile, the corresponding hard disk equipment can be accurately positioned according to the topology information.
It should be noted that the first threshold, the second threshold, the third threshold, and the fourth threshold may be set according to different links.
The method disclosed by the invention can flexibly adapt to various scenes by acquiring the topology information of the link without predicting networking, and can improve the efficiency of fault positioning and fault removal according to the topology information when detecting that the equipment fault or the error count in the link is greater than a threshold value.
Based on the same inventive concept, according to another aspect of the present invention, as shown in fig. 3, an embodiment of the present invention further provides a computer apparatus 501, comprising:
at least one processor 520; and
a memory 510, the memory 510 storing a computer program 511 executable on the processor, the processor 520 when executing the program performing the steps of any of the link alarm methods as described above.
Based on the same inventive concept, according to another aspect of the present invention, as shown in fig. 4, an embodiment of the present invention further provides a computer-readable storage medium 601, where the computer-readable storage medium 601 stores computer program instructions 610, and the computer program instructions 610, when executed by a processor, perform the steps of any of the above link alarm methods.
Finally, it should be noted that, as will be understood by those skilled in the art, all or part of the processes of the methods of the above embodiments may be implemented by a computer program to instruct related hardware to implement the methods. The storage medium may be a magnetic disk, an optical disk, a read-only memory (ROM), a Random Access Memory (RAM), or the like. The embodiments of the computer program may achieve the same or similar effects as any of the above-described method embodiments.
In addition, the apparatuses, devices, and the like disclosed in the embodiments of the present invention may be various electronic terminal devices, such as a mobile phone, a Personal Digital Assistant (PDA), a tablet computer (PAD), a smart television, and the like, or may be a large terminal device, such as a server, and the like, and therefore the scope of protection disclosed in the embodiments of the present invention should not be limited to a specific type of apparatus, device. The client disclosed by the embodiment of the invention can be applied to any one of the electronic terminal devices in the form of electronic hardware, computer software or a combination of the electronic hardware and the computer software.
Furthermore, the method disclosed according to an embodiment of the present invention may also be implemented as a computer program executed by a CPU, and the computer program may be stored in a computer-readable storage medium. The computer program, when executed by the CPU, performs the above-described functions defined in the method disclosed in the embodiments of the present invention.
Further, the above method steps and system elements may also be implemented using a controller and a computer readable storage medium for storing a computer program for causing the controller to implement the functions of the above steps or elements.
Further, it should be appreciated that the computer-readable storage media (e.g., memory) herein can be either volatile memory or nonvolatile memory, or can include both volatile and nonvolatile memory. By way of example, and not limitation, nonvolatile memory can include Read Only Memory (ROM), Programmable ROM (PROM), Electrically Programmable ROM (EPROM), Electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM), which can act as external cache memory. By way of example and not limitation, RAM is available in a variety of forms such as synchronous RAM (DRAM), Dynamic RAM (DRAM), Synchronous DRAM (SDRAM), Double Data Rate SDRAM (DDRSDRAM), Enhanced SDRAM (ESDRAM), Synchronous Link DRAM (SLDRAM), and Direct Rambus RAM (DRRAM). The storage devices of the disclosed aspects are intended to comprise, without being limited to, these and other suitable types of memory.
Those of skill would further appreciate that the various illustrative logical blocks, modules, circuits, and algorithm steps described in connection with the disclosure herein may be implemented as electronic hardware, computer software, or combinations of both. To clearly illustrate this interchangeability of hardware and software, various illustrative components, blocks, modules, circuits, and steps have been described above generally in terms of their functionality. Whether such functionality is implemented as software or hardware depends upon the particular application and design constraints imposed on the overall system. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the disclosed embodiments of the present invention.
The various illustrative logical blocks, modules, and circuits described in connection with the disclosure herein may be implemented or performed with the following components designed to perform the functions herein: a general purpose processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), a Field Programmable Gate Array (FPGA) or other programmable logic device, discrete gate or transistor logic, discrete hardware components, or any combination of these components. A general purpose processor may be a microprocessor, but in the alternative, the processor may be any conventional processor, controller, microcontroller, or state machine. A processor may also be implemented as a combination of computing devices, e.g., a combination of a DSP and a microprocessor, a plurality of microprocessors, one or more microprocessors in conjunction with a DSP, and/or any other such configuration.
The steps of a method or algorithm described in connection with the disclosure herein may be embodied directly in hardware, in a software module executed by a processor, or in a combination of the two. A software module may reside in RAM memory, flash memory, ROM memory, EPROM memory, EEPROM memory, registers, hard disk, a removable disk, a CD-ROM, or any other form of storage medium known in the art. An exemplary storage medium is coupled to the processor such the processor can read information from, and write information to, the storage medium. In the alternative, the storage medium may be integral to the processor. The processor and the storage medium may reside in an ASIC. The ASIC may reside in a user terminal. In the alternative, the processor and the storage medium may reside as discrete components in a user terminal.
In one or more exemplary designs, the functions may be implemented in hardware, software, firmware, or any combination thereof. If implemented in software, the functions may be stored on or transmitted over as one or more instructions or code on a computer-readable medium. Computer-readable media includes both computer storage media and communication media including any medium that facilitates transfer of a computer program from one place to another. A storage media may be any available media that can be accessed by a general purpose or special purpose computer. By way of example, and not limitation, such computer-readable media can comprise RAM, ROM, EEPROM, CD-ROM or other optical disk storage, magnetic disk storage or other magnetic storage devices, or any other medium that can be used to carry or store desired program code in the form of instructions or data structures and that can be accessed by a general-purpose or special-purpose computer, or a general-purpose or special-purpose processor. Also, any connection is properly termed a computer-readable medium. For example, if the software is transmitted from a website, server, or other remote source using a coaxial cable, fiber optic cable, twisted pair, Digital Subscriber Line (DSL), or wireless technologies such as infrared, radio, and microwave, then the coaxial cable, fiber optic cable, twisted pair, DSL, or wireless technologies such as infrared, radio, and microwave are included in the definition of medium. Disk and disc, as used herein, includes Compact Disc (CD), laser disc, optical disc, Digital Versatile Disc (DVD), floppy disk, blu-ray disc where disks usually reproduce data magnetically, while discs reproduce data optically with lasers. Combinations of the above should also be included within the scope of computer-readable media.
The foregoing is an exemplary embodiment of the present disclosure, but it should be noted that various changes and modifications could be made herein without departing from the scope of the present disclosure as defined by the appended claims. The functions, steps and/or actions of the method claims in accordance with the disclosed embodiments described herein need not be performed in any particular order. Furthermore, although elements of the disclosed embodiments of the invention may be described or claimed in the singular, the plural is contemplated unless limitation to the singular is explicitly stated.
It should be understood that, as used herein, the singular forms "a", "an" and "the" are intended to include the plural forms as well, unless the context clearly supports the exception. It should also be understood that "and/or" as used herein is meant to include any and all possible combinations of one or more of the associated listed items.
The numbers of the embodiments disclosed in the embodiments of the present invention are merely for description, and do not represent the merits of the embodiments.
It will be understood by those skilled in the art that all or part of the steps of implementing the above embodiments may be implemented by hardware, or may be implemented by a program instructing relevant hardware, and the program may be stored in a computer-readable storage medium, and the above-mentioned storage medium may be a read-only memory, a magnetic disk or an optical disk, etc.
Those of ordinary skill in the art will understand that: the discussion of any embodiment above is meant to be exemplary only, and is not intended to intimate that the scope of the disclosure, including the claims, of embodiments of the invention is limited to these examples; within the idea of an embodiment of the invention, also technical features in the above embodiment or in different embodiments may be combined and there are many other variations of the different aspects of the embodiments of the invention as described above, which are not provided in detail for the sake of brevity. Therefore, any omissions, modifications, substitutions, improvements, and the like that may be made without departing from the spirit and principles of the embodiments of the present invention are intended to be included within the scope of the embodiments of the present invention.

Claims (10)

1. A link alarm method includes the following steps:
acquiring topology information of a link;
judging whether the devices in the link are all in a healthy state;
acquiring error counts of the devices in response to the devices all being in a healthy state;
determining whether an error count of the device is greater than a threshold;
and responding to the fact that the error count of the equipment is larger than a threshold value, and obtaining the position information of the equipment with the error count larger than the threshold value according to the topology information so as to alarm.
2. The method of claim 1, wherein obtaining topology information for a link, further comprises:
scanning information of a card and a hard disk in a link;
and determining the topology information of the link according to the card and hard disk information.
3. The method of claim 2, wherein determining whether the devices in the link are all in a healthy state, further comprises:
detecting the uplink port state and the downlink port state of the card and the hard disk parameters;
and judging whether the card is in a healthy state or not according to the uplink port state and the downlink port state of the card and judging whether the hard disk is in a healthy state or not according to the hard disk parameters.
4. The method of claim 3, further comprising:
responding to the fault state of the card and/or the hard disk, and acquiring the position information of the card and/or the hard disk according to the topology information;
and sending alarm information according to the position information.
5. The method of claim 2, wherein obtaining an error count for a device in response to the devices each being in a healthy state, further comprises:
and acquiring the number of error codes of the port of the card, the error correction times of the hard disk and the usage amount of the hard disk.
6. The method of claim 5, wherein determining whether the error count of the device is greater than a threshold value further comprises:
judging whether the number of error codes of a port of a card and the increment of the error correction times of the hard disk in a preset time period are larger than a threshold value or not, and judging whether the usage amount of the hard disk is larger than the threshold value or not.
7. The method of claim 6, wherein in response to the error count of the device being greater than a threshold, obtaining location information for the device having the error count greater than the threshold based on the topology information for alerting, further comprising:
judging whether the number of error codes of a port of the card and the increment of the error correction times of the hard disk in a preset time period are larger than a first threshold value or not;
responding to the increment larger than the first threshold, and judging whether the error code quantity of the port of the card and the increment of the error correction times of the hard disk in a preset time period are larger than a second threshold or not;
responding to the increment larger than the second threshold value, and performing first-level early warning;
and responding to the increment which is larger than the first threshold and smaller than the second threshold, and performing second-level early warning.
8. The method of claim 7, further comprising:
judging whether the usage amount of the hard disk is larger than a third threshold value;
responding to the fact that the usage amount of the hard disk is larger than the third threshold value, and judging whether the usage amount of the hard disk is larger than a fourth threshold value;
responding to the fact that the usage amount is larger than the fourth threshold value, and performing first-level early warning;
and responding to the fact that the usage amount is larger than the third threshold and smaller than the fourth threshold, and performing second-level early warning.
9. A computer device, comprising:
at least one processor; and
memory storing a computer program operable on the processor, wherein the processor executes the program to perform the steps of the method according to any of claims 1-8.
10. A computer-readable storage medium, in which a computer program is stored which, when being executed by a processor, is adapted to carry out the steps of the method of any one of claims 1 to 8.
CN201911049992.6A 2019-10-31 2019-10-31 Link alarm method, equipment and storage medium Withdrawn CN111090567A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911049992.6A CN111090567A (en) 2019-10-31 2019-10-31 Link alarm method, equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911049992.6A CN111090567A (en) 2019-10-31 2019-10-31 Link alarm method, equipment and storage medium

Publications (1)

Publication Number Publication Date
CN111090567A true CN111090567A (en) 2020-05-01

Family

ID=70393039

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911049992.6A Withdrawn CN111090567A (en) 2019-10-31 2019-10-31 Link alarm method, equipment and storage medium

Country Status (1)

Country Link
CN (1) CN111090567A (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111740881A (en) * 2020-06-12 2020-10-02 广东浪潮大数据研究有限公司 Network card link detection method, system, equipment and computer storage medium
CN112328177A (en) * 2020-11-04 2021-02-05 苏州浪潮智能科技有限公司 Method, device and equipment for checking health state of storage system and readable medium
CN112596968A (en) * 2020-12-25 2021-04-02 苏州浪潮智能科技有限公司 IIC topology checking method, IIC topology checking device and storage medium
CN114003461A (en) * 2021-09-26 2022-02-01 苏州浪潮智能科技有限公司 Server failure prediction method, system, terminal and storage medium
CN114356984A (en) * 2021-12-24 2022-04-15 海光信息技术股份有限公司 Method, device, equipment and storage medium for marking risk state of storage
CN115333970A (en) * 2022-07-22 2022-11-11 苏州浪潮智能科技有限公司 Method and device for evaluating connection stability of equipment, computer equipment and storage medium

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111740881A (en) * 2020-06-12 2020-10-02 广东浪潮大数据研究有限公司 Network card link detection method, system, equipment and computer storage medium
CN111740881B (en) * 2020-06-12 2022-04-29 广东浪潮大数据研究有限公司 Network card link detection method, system, equipment and computer storage medium
CN112328177A (en) * 2020-11-04 2021-02-05 苏州浪潮智能科技有限公司 Method, device and equipment for checking health state of storage system and readable medium
CN112596968A (en) * 2020-12-25 2021-04-02 苏州浪潮智能科技有限公司 IIC topology checking method, IIC topology checking device and storage medium
CN114003461A (en) * 2021-09-26 2022-02-01 苏州浪潮智能科技有限公司 Server failure prediction method, system, terminal and storage medium
CN114356984A (en) * 2021-12-24 2022-04-15 海光信息技术股份有限公司 Method, device, equipment and storage medium for marking risk state of storage
CN114356984B (en) * 2021-12-24 2024-01-23 海光信息技术股份有限公司 Method, device, equipment and storage medium for marking risk state of memory
CN115333970A (en) * 2022-07-22 2022-11-11 苏州浪潮智能科技有限公司 Method and device for evaluating connection stability of equipment, computer equipment and storage medium
CN115333970B (en) * 2022-07-22 2023-08-11 苏州浪潮智能科技有限公司 Device connection stability evaluation method and device, computer device and storage medium

Similar Documents

Publication Publication Date Title
CN111090567A (en) Link alarm method, equipment and storage medium
US9411689B2 (en) Method and relevant apparatus for starting boot program
US10592332B2 (en) Auto-disabling DRAM error checking on threshold
CN110674005A (en) Method and device for monitoring server memory and readable medium
CN113472607B (en) Application program network environment detection method, device, equipment and storage medium
US11017875B2 (en) Tracking address ranges for computer memory errors
CN111124722B (en) Method, equipment and medium for isolating fault memory
CN111090545B (en) Method, device and medium for recovering failed CPLD
CN111104246B (en) Method, device, computer equipment and storage medium for improving verification efficiency of error detection and correction of DRAM
CN102135925B (en) Method and device for detecting error check and correcting memory
CN111104238B (en) CE-based memory diagnosis method, device and medium
CN111736765B (en) Method, device and medium for supervising data block state
CN111143106A (en) Repair method, device, equipment and medium for dual-port SSD
CN109217922B (en) Method and device for reporting loss alarm of received signal by optical module
CN113903389A (en) Slow disk detection method and device and computer readable and writable storage medium
CN110825556B (en) Method and device for judging data storage state in solid state disk
US20190155671A1 (en) Data storage device and associated operating method
CN109697158B (en) Log analysis method and device based on fault
CN110674003A (en) Early warning method and device for server hardware and storage medium
WO2021027271A1 (en) Bad block information protection method and apparatus, computer device and storage medium
CN109102839B (en) Bad block marking method, device, equipment and readable storage medium
CN111176932A (en) Method and device for recording abnormal event log and readable medium
CN110955916B (en) Data integrity protection method, system and related equipment
CN116028253A (en) Solid state disk error correction optimization method, system, equipment and medium
CN107154960B (en) Method and apparatus for determining service availability information for distributed storage systems

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication

Application publication date: 20200501

WW01 Invention patent application withdrawn after publication