CN112311617A - Configured data monitoring and alarming method and system - Google Patents

Configured data monitoring and alarming method and system Download PDF

Info

Publication number
CN112311617A
CN112311617A CN201910712965.6A CN201910712965A CN112311617A CN 112311617 A CN112311617 A CN 112311617A CN 201910712965 A CN201910712965 A CN 201910712965A CN 112311617 A CN112311617 A CN 112311617A
Authority
CN
China
Prior art keywords
monitoring
alarm
data
server
preset
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910712965.6A
Other languages
Chinese (zh)
Inventor
李小文
李晟
邢荣荣
李佳贞
苏薇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Government And Enterprises Customer Branch Office Of China Mobile Communications Co ltd
China Mobile Communications Group Co Ltd
Original Assignee
Government And Enterprises Customer Branch Office Of China Mobile Communications Co ltd
China Mobile Communications Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Government And Enterprises Customer Branch Office Of China Mobile Communications Co ltd, China Mobile Communications Group Co Ltd filed Critical Government And Enterprises Customer Branch Office Of China Mobile Communications Co ltd
Priority to CN201910712965.6A priority Critical patent/CN112311617A/en
Publication of CN112311617A publication Critical patent/CN112311617A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/50Testing arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/06Management of faults, events, alarms or notifications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/06Management of faults, events, alarms or notifications
    • H04L41/0631Management of faults, events, alarms or notifications using root cause analysis; using analysis of correlation between notifications, alarms or events based on decision criteria, e.g. hierarchy, tree or time analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/08Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/16Threshold monitoring

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Environmental & Geological Engineering (AREA)
  • Debugging And Monitoring (AREA)

Abstract

The embodiment of the invention provides a configured data monitoring and alarming method and a system, wherein the method comprises the following steps: acquiring monitoring task information, wherein the monitoring task information is generated by user-defined configuration of a server to be monitored by a user, and the monitoring task information comprises monitoring items; monitoring the server according to the configured monitoring task information and acquiring monitoring data of monitoring items, wherein the monitoring data comprises at least one of service data, service data and system data; calling an alarm module through a preset interface, wherein the alarm module analyzes the collected monitoring data of the monitoring item based on a preset alarm strategy so as to judge whether an alarm is generated; if yes, the alarm module gives real-time alarm to the configured alarm object. The technical scheme provided by the embodiment of the invention can solve the problems that the monitoring item is difficult to change and the operation and maintenance efficiency is low during the monitoring of the server in the prior art.

Description

Configured data monitoring and alarming method and system
[ technical field ] A method for producing a semiconductor device
The invention relates to the technical field of computers, in particular to a configured data monitoring and alarming method and system.
[ background of the invention ]
At present, with the rapid development of science and technology and information, data is increasing explosively, the big data era is changing our lives, and mobile internet, internet of things, smart home, automatic driving, social network, digital home, electronic commerce and the like are all application forms of modern information technology.
With the development of big data, the monitoring of data and service is not slow, in the existing monitoring system, shell monitoring scripts are mainly installed in all servers in machine rooms of various regions and are respectively stored according to predefined data tables, corresponding data graphs are extracted from a database, and corresponding data graphs are displayed at a web end, so that a user can conveniently browse the data graphs of the monitoring service and the system.
However, hundreds of independent systems are provided, each system bears different services and data, the performance and the service are different, and each server needs to modify a monitoring script whenever the monitoring requirement changes, so that the monitoring is easy to make mistakes, the monitoring item is difficult to change, and the operation and maintenance efficiency is low.
[ summary of the invention ]
In view of this, embodiments of the present invention provide a configured data monitoring and warning method and system, so as to solve the problems in the prior art that monitoring items are difficult to change during server monitoring and operation and maintenance efficiency is low.
In order to achieve the above object, according to an aspect of the present invention, there is provided a configured data monitoring alarm method, the method including: acquiring monitoring task information, wherein the monitoring task information is generated by user-defined configuration of a server to be monitored by a user, and the monitoring task information comprises monitoring items; monitoring the server according to the configured monitoring task information and collecting monitoring data of the monitoring item, wherein the monitoring data comprises at least one of service data, service data and system data; calling an alarm module through a preset interface, wherein the alarm module analyzes the collected monitoring data of the monitoring item based on a preset alarm strategy so as to judge whether an alarm is generated; if yes, the alarm module gives an alarm to the configured alarm object in real time.
Optionally, after the monitoring is performed on the server according to the configured monitoring task information and the monitoring data of the monitoring item is collected, and before the alarm module is called through a preset interface, the method further includes: acquiring a monitoring task adjusting instruction sent by the user, wherein the monitoring task adjusting instruction comprises an added monitoring item and/or a deleted monitoring item; adjusting the monitoring task information according to the monitoring task adjusting instruction; and monitoring the server according to the adjusted monitoring task information and collecting monitoring data of the monitoring item.
Optionally, the monitoring the server according to the configured monitoring task information and collecting the monitoring data of the monitoring item includes: monitoring the process that the server stores the received service data into a corresponding local database; scanning service data in a local database of the server according to preset interval time to obtain a first data index related to the service data, wherein the first data index comprises data writing integrity and data writing accuracy; the alarm module analyzes the collected monitoring data of the monitoring item based on a preset alarm strategy to judge whether an alarm is generated, and the method comprises the following steps: and judging whether to generate an alarm or not according to a preset alarm strategy and a first data index of the service data.
Optionally, the monitoring the server according to the configured monitoring task information and collecting monitoring data includes: acquiring service data generated when the server transmits the service data, wherein the service data comprises a delay rate, a packet loss rate and a jitter rate; the alarm module analyzes the collected monitoring data of the monitoring item based on a preset alarm strategy to judge whether an alarm is generated, and the method comprises the following steps: analyzing the service data to obtain a first analysis result; and judging whether to generate an alarm or not according to a preset alarm strategy and the first analysis result.
Optionally, the monitoring the server according to the configured monitoring task information and collecting monitoring data includes: collecting system data of the server, wherein the system data comprises CPU utilization rate, memory utilization rate, hard disk residual space and network interface real-time flow; the alarm module analyzes the collected monitoring data of the monitoring item based on a preset alarm strategy to judge whether an alarm is generated, and the method comprises the following steps: analyzing the system data to obtain a second analysis result; and judging whether to generate an alarm or not according to a preset alarm strategy and the second analysis result.
Optionally, the performing real-time warning on the preset warning object by the warning module includes: determining an alarm grade according to the monitoring data and a preset alarm threshold; determining an alarm mode according to the alarm level, wherein the alarm mode comprises any one of short messages, mails and mobile phone APP reminders; and performing real-time alarm to the configured alarm object according to the alarm mode.
Optionally, the performing real-time warning on the preset warning object by the warning module includes: acquiring an alarm object and an alarm mode configured by the user in a self-defined way, wherein the alarm mode comprises any one of short messages, mails and mobile phone APP reminders; and adopting the configured alarm mode to carry out real-time alarm on the configured alarm object.
Optionally, the monitoring the server according to the configured monitoring task information and collecting monitoring data includes: reading a configuration file library of the server to be monitored according to the monitoring task information, and generating a related monitoring item configuration file according to a preset rule; reading the monitoring item configuration file; and starting a data acquisition process to acquire the monitoring data.
In order to achieve the above object, according to an aspect of the present invention, a configured data monitoring and warning system is provided, which includes a monitoring module and a warning module; the monitoring module comprises a monitoring item configuration unit, a service data monitoring unit and a system data monitoring unit, wherein the monitoring item configuration unit is used for configuring the monitoring item of the server to be monitored in a user-defined manner; the service data monitoring unit is used for monitoring the server and acquiring the service data of the monitoring item; the service data monitoring unit is used for monitoring data generated when the server needing to be monitored transmits the service data; the system data monitoring unit is used for monitoring the system data of the server to be monitored; the alarm module is provided with a calling interface, can be called by the monitoring module, and is used for analyzing the collected monitoring data of the monitoring item based on a preset alarm strategy so as to judge whether to generate an alarm or not, and if so, the alarm module gives an alarm to a configured alarm object in real time.
In order to achieve the above object, according to one aspect of the present invention, there is provided an electronic apparatus comprising: at least one processor; and at least one memory communicatively coupled to the processor, wherein the memory stores program instructions executable by the processor, and the processor calls the program instructions to perform the configured data monitoring alarm method.
To achieve the above object, according to one aspect of the present invention, there is provided a non-transitory computer-readable storage medium storing computer instructions that cause the computer to execute the above-described configured data monitoring alarm method.
In the scheme, the configurable monitoring item is used for monitoring the service data, the service data and the system data of more systems, so that the monitoring item realizes 'hot plug', the system needing monitoring can be added at any time, the system not needing monitoring can be stopped, the monitoring alarm system can be flexibly executed according to the configuration of a user, the linear increase of the processing capacity of the whole monitoring alarm system is realized, the whole service range of the system is expanded, and the practicability is improved.
[ description of the drawings ]
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings needed to be used in the embodiments will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without inventive labor.
FIG. 1 is a schematic diagram of an alternative configurable data monitoring alarm system provided in an embodiment of the present invention;
FIG. 2 is a flowchart of an alternative configured data monitoring alarm method according to an embodiment of the present invention;
fig. 3 is a schematic diagram of an alternative electronic device according to an embodiment of the present invention.
[ detailed description ] embodiments
For better understanding of the technical solutions of the present invention, the following detailed descriptions of the embodiments of the present invention are provided with reference to the accompanying drawings.
It should be understood that the described embodiments are only some embodiments of the invention, and not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The terminology used in the embodiments of the invention is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. As used in the examples of the present invention and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise.
It should be understood that the term "and/or" as used herein is merely one type of association that describes an associated object, meaning that three relationships may exist, e.g., a and/or B may mean: a exists alone, A and B exist simultaneously, and B exists alone. In addition, the character "/" herein generally indicates that the former and latter related objects are in an "or" relationship.
It should be understood that although the terms first, second, third, etc. may be used to describe the terminals in the embodiments of the present invention, the terminals should not be limited by these terms. These terms are only used to distinguish one terminal from another. For example, a first terminal may also be referred to as a second terminal, and similarly, a second terminal may also be referred to as a first terminal, without departing from the scope of embodiments of the present invention.
The word "if" as used herein may be interpreted as "at … …" or "when … …" or "in response to a determination" or "in response to a detection", depending on the context. Similarly, the phrases "if determined" or "if detected (a stated condition or event)" may be interpreted as "when determined" or "in response to a determination" or "when detected (a stated condition or event)" or "in response to a detection (a stated condition or event)", depending on the context.
Fig. 1 is a functional block diagram of a configured data monitoring alarm system according to an embodiment of the present invention, and as shown in fig. 1, a configured data monitoring alarm system 100 according to an embodiment of the present invention includes a monitoring module 10 and an alarm module 20.
The monitoring module 10 and the alarm module 20 are independently deployed, the expansion is easy, the configuration is flexible, the monitoring module 10 calls the alarm module 20 through a preset interface, and the high-cohesion low-coupling software architecture design is realized.
The monitoring module 10 includes a monitoring item configuration unit 101, a service data monitoring unit 102, a service data monitoring unit 103, and a system data monitoring unit 104.
And the monitoring item configuration unit 101 is configured to configure monitoring task information of the server to be monitored in a user-defined manner, where the monitoring task information includes a monitoring item. The user can freely configure on a configuration page of the monitoring and warning system. The monitoring item configuration unit is the core of the system, and a user completes the definition content of the monitoring item through self-defined configuration. The configured monitoring items include the type, name, execution time, monitoring frequency, required monitoring plug-in, plug-in parameters and the like of the monitoring item, such as a monitoring item defined by a user, namely 'monitoring the CPU utilization rate of the charging system through a snmp protocol'.
The type of the monitoring item comprises at least one of business data, service data and system data. It can be understood that, when the type of the monitoring item customized by the user is the service data, the service data monitoring unit monitors the monitoring item according to the defined monitoring task information, and collects the service data of the monitoring item.
In this embodiment, the server may be a distributed server or a server cluster, and it can be understood that, for different service scenarios, the server may be named correspondingly according to the scenario, for example: user system, charging system, resource system. In practical applications, there are many servers to be monitored, so that flexible monitoring is required. All servers are configured and managed in a centralized mode, development period can be shortened, the behavior of each module can be normalized, and task transmission among the modules is combined more seamlessly.
Further, the configured data monitoring and warning system 100 adopts a zero-client mode, which may also be called an ultra-thin client, and is a server-based computing mode, the zero-client mode does not require excessive participation of users in project deployment, operation and maintenance personnel are thoroughly liberated, management, configuration and upgrade of the zero-client mode are simpler, and cost expenditure can also be reduced.
Further, the monitoring item configuration unit 101 is further configured to obtain a monitoring task adjustment instruction sent by the user, where the monitoring task adjustment instruction includes adding a monitoring item and/or deleting a monitoring item; and adjusting the monitoring task information according to the monitoring task adjusting instruction. Therefore, the system can monitor the server and collect monitoring data of the monitoring items according to the adjusted monitoring task information. It can be understood that, in the monitoring process, the server to be monitored is added at any time, and the server to be monitored can also be stopped at any time, so that the monitoring and warning system is very flexible to execute according to the user-defined configuration of the user.
The service data monitoring unit 102 is configured to monitor the monitoring item and acquire service data of the monitoring item, and specifically, is configured to store the received service data in a corresponding local database by the monitoring server.
The service data monitoring unit 102 is further configured to scan service data in a local database of the server according to a preset interval time to obtain a first data index related to the service data, where the first data index includes data writing integrity and data writing accuracy.
Correspondingly, the service data monitoring unit 102 is further configured to write the first data indicator into a preset service data table, so that the collected service data can be stored, and the alarm module or other modules can be called conveniently.
The type of the local database of the server that can be monitored by the monitoring alarm system provided by this embodiment may be an oracle database, a MySQL database, a mongodb database, an ftp database, and the like. The service data may be, for example, information of registered users, a user payment record, and the like. For example, the data source server of the user system receives 100 pieces of user registration information, where the number of data stored in the local database is only 89, and the data writing integrity of this user registration information is only 89%, for example: the data stored in the local database is only 80 pieces accurate, and the data writing accuracy of the user registration information is only 80%.
The service data monitoring unit 103 is configured to collect service data generated when the server transmits the service data, and a monitoring object of the service data monitoring unit 103 may be a java schedule, a tomacat process, a linux process, or the like. The service data includes a delay rate, a packet loss rate, and a jitter rate. The delay rate may be calculated according to the generation timestamp and the reception timestamp of the service data. The packet loss rate can be calculated according to the number of the transmission pieces and the number of the reception pieces of the service data. The jitter rate can be calculated according to the jitter data packets in the service data and the weight of the data packets. In other embodiments, the service data also includes throughput, etc.
The service data monitoring unit 103 is further configured to write the acquired service data of the monitoring item into a preset service data table.
And the system monitoring unit 104 is configured to acquire system data of the server according to the configured monitoring task information, where the system data includes a CPU utilization rate, a memory utilization rate, a hard disk remaining space, a network interface real-time traffic, and the like. For example: the system data of each server can be obtained by collecting the data at preset time intervals, for example, every 1 s.
The system monitoring unit 104 is further configured to write the collected system data of the monitoring item into a preset system data table.
The monitoring module 10 is further configured with a database for storing a preset service data table, a service data table and a system data table. The alarm module 20 can call the data in the database according to a preset interface.
In one embodiment, the database of the monitoring module 10 is an inflixdb database. The inflixdb database is an open-source distributed time sequence database, and the data format of the inflixdb database contains data of a Timestamp field, such as the utilization rate of a CPU at a certain time, the memory utilization rate, and the like. It will be appreciated that the time series data can facilitate querying, retrieving, analyzing, filtering the system data through time attributes. The inflixdb database can be stored according to a storage area preset by a user, for example, the storage life of data in the first storage area is 1 month, and the data are automatically deleted after the expiration.
And the alarm module 20 is provided with a calling interface and can be called by the monitoring module 10. The alarm module 20 includes an alarm configuration unit 201, a business data analysis unit 202, a service data analysis unit 203, a system data analysis unit 204, and an alarm unit 205.
The alarm configuration unit 201 is configured to configure an alarm object and an alarm mode in a user-defined manner, where the alarm object may be a user or a user group, and the alarm mode includes any one of a short message, a mail, and a mobile phone APP alert.
For example, alarm objects related to system data are configured as system maintenance personnel, and alarm objects related to business data are configured as database maintenance personnel. The method can be configured independently according to the property and the data type of the server, and has high flexibility.
The alarm configuration unit 201 is further configured to determine an alarm level according to the monitoring data and a preset alarm threshold; and determining an alarm mode according to the alarm level.
In one embodiment, the alarm level is configured from high to low as very important, and general. For example, when the number of alarm processes is greater than a preset maximum value, the system may preferentially process a high alarm level, and when the alarm level is high, the system may perform real-time alarm to the configured alarm object through the alarm modes of all paths. When the alarm level is low, real-time alarm can be carried out on the configured alarm object through one of the alarm modes.
For example, the delay rate in the system data: the first alarm threshold value is 8ms, the corresponding alarm level is general, and the alarm mode is mobile phone APP reminding; the second alarm threshold value is 10ms, the corresponding alarm level is important, and the alarm mode is a mail; the third alarm threshold is 12ms, the corresponding alarm level is very important, and the alarm mode is all ways (namely, short message, mail, mobile phone APP prompt).
The service data analysis unit 202 is configured to determine whether to generate an alarm according to a preset alarm policy and a first data index of the service data. The first data index comprises data writing integrity and data writing accuracy; for example, when the data write integrity of the corresponding database of the user system server is 89%, when the alarm policy: and the threshold value of the data writing integrity is 90%, and when the threshold value is less than 90%, an alarm is generated.
The service data analysis unit 203 is used for analyzing the service data to obtain a first analysis result; and judging whether to generate an alarm or not according to a preset alarm strategy and the first analysis result. The service data includes a delay rate, a packet loss rate, and a jitter rate. For example, the preset alarm policy is: when the service data is transmitted, the delay rate threshold is 10ms, and when the delay rate threshold is more than 10ms, an alarm is generated. Then, when the first analysis result (delay value of 5ms) is obtained by the analysis, no alarm is generated.
A system data analysis unit 204 for: analyzing system data to obtain a second analysis result; and judging whether to generate an alarm or not according to a preset alarm strategy and a second analysis result. The system data comprises CPU utilization rate, memory utilization rate, hard disk residual space and network interface real-time flow. For example, the preset alarm policy is: the threshold value of the memory utilization rate is 90%, and when the threshold value is larger than 90%, an alarm is generated. Then, when the second analysis result (memory usage rate is 92%) obtained by the analysis, an alarm is generated.
And the alarm unit 206 is configured to perform real-time alarm on the configured alarm object.
In the scheme, the configurable monitoring item is used for monitoring the service data, the service data and the system data of more systems, so that the monitoring item realizes 'hot plug', the system needing monitoring can be added at any time, the system not needing monitoring can be stopped, the monitoring alarm system can be flexibly executed according to the configuration of a user, the linear increase of the processing capacity of the whole monitoring alarm system is realized, the whole service range of the system is expanded, and the practicability is improved.
An embodiment of the present invention provides a configured data monitoring and warning method, and fig. 2 is a flowchart of the configured data monitoring and warning method provided in the embodiment of the present invention, as shown in fig. 2, the method includes:
step S101, acquiring monitoring task information, wherein the monitoring task information is generated by user-defined configuration of a server needing to be monitored by a user, and the monitoring task information comprises monitoring items.
The user can freely configure on a configuration page of the monitoring and warning system. The monitoring item configuration unit is the core of the system, and a user completes the definition content of the monitoring item through self-defined configuration. The monitoring item configuration unit is the core of the system, and a user completes the definition content of the monitoring item through self-defined configuration. The configured monitoring items comprise the type, name, execution time, monitoring frequency, required monitoring plug-ins, plug-in parameters and the like of the monitoring items, for example, the monitoring items of 'monitoring the CPU utilization rate of the charging system through a snmp protocol' defined by a user are used for flexibly setting a monitoring period by using a cron expression.
In this embodiment, the server may be a distributed server or a server cluster, and it can be understood that, for different service scenarios, the server may be named correspondingly according to the scenario, for example: user system, charging system, resource system. In practical application, a plurality of servers need to be monitored, so that flexible monitoring needs to be realized, and the operation and maintenance efficiency is improved.
And S102, monitoring the server according to the configured monitoring task information and collecting monitoring data of the monitoring item, wherein the monitoring data comprises at least one of service data, service data and system data. It is understood that the data is classified into service data, and system data according to the type of the data. When the type of the monitoring item customized by the user is service data, the system monitors the monitoring item according to the defined monitoring task information and collects the service data of the monitoring item.
The service data may be, for example, information of registered users, a user payment record, and the like. Each piece of service data may carry a timestamp, information indicating the type of data content, version information indicating the version of data content, and the like.
The service data is data generated when the server transmits service data, and the service data comprises a delay rate, a packet loss rate and a jitter rate. The delay rate may be calculated according to the generation timestamp and the reception timestamp of the service data. The packet loss rate can be calculated according to the number of the transmission pieces and the number of the reception pieces of the service data. The jitter rate can be calculated according to the jitter data packets in the service data and the weight of the data packets. In other embodiments, the service data also includes throughput, etc.
The system data comprises CPU utilization rate, memory utilization rate, hard disk residual space, network interface real-time flow and the like. For example: the system data of each server can be obtained by collecting the data at preset time intervals, for example, every 1 s.
Further, the monitoring task information may further include a collection policy configured by a user in a customized manner, and the collection policy may be, for example, a collection frequency and a monitoring period. For example, the system data collection is performed every 2 minutes for the server of the user system, and the service data collection is performed every 5 minutes for the server of the billing system.
Step S103, calling an alarm module through a preset interface, wherein the alarm module analyzes the collected monitoring data of the monitoring item based on a preset alarm strategy to judge whether an alarm is generated.
The alarm module is independently deployed and is provided with a calling interface 201 which can be called. It can be understood that the alarm module analyzes and processes the collected monitoring data and the preset alarm strategy.
In some embodiments, the alarm policy may define alarm reference criteria (e.g., comparison to historical alarms), filtering rules (e.g., comparison to previous alarms, deduplication), and so forth. For example, a server of a user system is monitored, the CPU utilization rate of the server is used as a monitoring item, a dynamic threshold value mode is adopted for alarming, whether the acquired system data exceeds the dynamic threshold value or not is calculated, and if yes, alarming is carried out.
Step S104, if yes, the alarm module gives real-time alarm to the configured alarm object. The configured alarm object may be a user or a group of users.
In the scheme, the configurable monitoring item is used for monitoring the service data, the service data and the system data of more systems, so that the monitoring item realizes 'hot plug', the system needing monitoring can be added at any time, the system not needing monitoring can be stopped, the monitoring alarm system can be flexibly executed according to the configuration of a user, the linear increase of the processing capacity of the whole monitoring alarm system is realized, the whole service range of the system is expanded, and the practicability is improved.
Optionally, after monitoring the server according to the configured monitoring task information and acquiring monitoring data of the monitoring item, and before calling the alarm module through a preset interface, the method further includes:
acquiring a monitoring task adjusting instruction sent by a user, wherein the monitoring task adjusting instruction comprises an added monitoring item and/or a deleted monitoring item; adjusting monitoring task information according to the monitoring task adjusting instruction; and monitoring the server according to the adjusted monitoring task information and acquiring monitoring data of the monitoring item.
Therefore, the system can monitor the server and collect monitoring data of the monitoring items according to the adjusted monitoring task information. It can be understood that, in the monitoring process, the server to be monitored is added at any time, and the server to be monitored can also be stopped at any time, so that the monitoring and warning system is very flexible to execute according to the user-defined configuration of the user.
Optionally, monitoring the server according to the configured monitoring task information and collecting monitoring data of the monitoring item, including:
the monitoring server stores the received service data to a corresponding local database; scanning service data in a local database of a server according to preset interval time to obtain a first data index related to the service data, wherein the first data index comprises data writing integrity and data writing accuracy; the warning module analyzes the monitoring data of the collected monitoring items based on a preset warning strategy to judge whether to generate a warning, and the warning method comprises the following steps: and judging whether to generate an alarm or not according to a preset alarm strategy and a first data index of the service data.
The type of the local database of the server that can be monitored by the monitoring alarm system provided by this embodiment may be an oracle database, a MySQL database, a mongodb database, an ftp database, and the like. The service data may be, for example, information of registered users, a user payment record, and the like. For example, the data source server of the user system receives 100 pieces of user registration information, where the number of data stored in the local database is only 89, and the data writing integrity of this user registration information is only 89%, for example: the data stored in the local database is only 80 pieces accurate, and the data writing accuracy of the user registration information is only 80%. When the alarm strategy is as follows: the threshold value of the data writing integrity is 90%, and when the threshold value is less than 90%, an alarm is generated.
Optionally, monitoring the server and collecting monitoring data according to the configured monitoring task information includes: acquiring service data generated when a server transmits service data, wherein the service data comprises a delay rate, a packet loss rate and a jitter rate; the warning module analyzes the monitoring data of the collected monitoring items based on a preset warning strategy to judge whether to generate a warning, and the warning method comprises the following steps: analyzing the service data to obtain a first analysis result; and judging whether to generate an alarm or not according to a preset alarm strategy and the first analysis result.
Optionally, monitoring the server and collecting monitoring data according to the configured monitoring task information includes: collecting system data of a server, wherein the system data comprises CPU utilization rate, memory utilization rate, hard disk residual space and network interface real-time flow; the warning module analyzes the monitoring data of the collected monitoring items based on a preset warning strategy to judge whether to generate a warning, and the warning method comprises the following steps: analyzing system data to obtain a second analysis result; and judging whether to generate an alarm or not according to a preset alarm strategy and a second analysis result.
Optionally, after monitoring the server according to the configured monitoring task information and acquiring monitoring data of the monitoring item, and before calling the alarm module through a preset interface, the method further includes:
and respectively storing the acquired business data, service data and system data into corresponding data tables of the database. In one embodiment, the database is an inflixdb database. The inflixdb database is an open-source distributed time sequence database, and the data format of the inflixdb database contains data of a Timestamp field, such as the utilization rate of a CPU at a certain time, the memory utilization rate, and the like. It will be appreciated that the time series data can facilitate querying, retrieving, analyzing, filtering the system data through time attributes. The inflixdb database can be stored according to a storage area preset by a user, for example, the storage life of data in the first storage area is 1 month, and the data are automatically deleted after the expiration.
Optionally, the alarming module performs real-time alarming on a preset alarming object, including: determining an alarm grade according to the monitoring data and a preset alarm threshold; determining an alarm mode according to the alarm level, wherein the alarm mode comprises any one of short messages, mails and mobile phone APP reminders; and performing real-time alarm to the configured alarm object according to the alarm mode.
In one embodiment, the alarm level is configured from high to low as very important, and general. For example, when the number of alarm processes is greater than a preset maximum value, the system may preferentially process a high alarm level, and when the alarm level is high, the system may perform real-time alarm to the configured alarm object through the alarm modes of all paths. When the alarm level is low, real-time alarm can be carried out on the configured alarm object through one of the alarm modes.
Optionally, the alarming module performs real-time alarming on a preset alarming object, including: acquiring an alarm object and an alarm mode configured by a user in a self-defined way, wherein the alarm mode comprises any one of short messages, mails and mobile phone APP reminders; and performing real-time alarm on the configured alarm object by adopting the configured alarm mode.
For example, the delay rate in the system data: the first alarm threshold value is 8ms, the corresponding alarm level is general, and the alarm mode is mobile phone APP reminding; the second alarm threshold value is 10ms, the corresponding alarm level is important, and the alarm mode is a mail; the third alarm threshold is 12ms, the corresponding alarm level is very important, and the alarm mode is all ways (namely, short message, mail, mobile phone APP prompt).
In other embodiments, the configured alarm object may also be alerted in real time according to an alarm manner (e.g., short message) configured by the user.
For example, alarms relating to system data are sent to system maintenance personnel and alarms relating to business data are sent to database maintenance personnel.
Optionally, monitoring the server and collecting monitoring data according to the configured monitoring task information includes:
reading a configuration file library of a server to be monitored according to the monitoring task information, and generating a related monitoring item configuration file according to a preset rule; reading a monitoring item configuration file; and starting a data acquisition process to acquire monitoring data.
In the scheme, the configurable monitoring item is used for monitoring the service data, the service data and the system data of more systems, so that the monitoring item realizes 'hot plug', the system needing monitoring can be added at any time, the system not needing monitoring can be stopped, the monitoring alarm system can be flexibly executed according to the configuration of a user, the linear increase of the processing capacity of the whole monitoring alarm system is realized, the whole service range of the system is expanded, and the practicability is improved.
An embodiment of the present invention provides a non-transitory computer readable storage medium storing computer instructions, wherein the computer instructions cause the computer to perform the following steps:
acquiring monitoring task information, wherein the monitoring task information is generated by user-defined configuration of a server to be monitored by a user, and the monitoring task information comprises monitoring items; monitoring the server according to the configured monitoring task information and collecting monitoring data of the monitoring item, wherein the monitoring data comprises at least one of service data, service data and system data; calling an alarm module through a preset interface, wherein the alarm module analyzes the collected monitoring data of the monitoring item based on a preset alarm strategy so as to judge whether an alarm is generated; if yes, the alarm module gives an alarm to the configured alarm object in real time.
Optionally, the computer instructions cause the computer to further perform the steps of: acquiring a monitoring task adjusting instruction sent by the user, wherein the monitoring task adjusting instruction comprises an added monitoring item and/or a deleted monitoring item; adjusting the monitoring task information according to the monitoring task adjusting instruction; and monitoring the server according to the adjusted monitoring task information and collecting monitoring data of the monitoring item.
Optionally, the computer instructions cause the computer to further perform the steps of: monitoring the process that the server stores the received service data into a corresponding local database; scanning service data in a local database of the server according to preset interval time to obtain a first data index related to the service data, wherein the first data index comprises data writing integrity and data writing accuracy; the alarm module analyzes the collected monitoring data of the monitoring item based on a preset alarm strategy to judge whether an alarm is generated, and the method comprises the following steps: and judging whether to generate an alarm or not according to a preset alarm strategy and a first data index of the service data.
Optionally, the computer instructions cause the computer to further perform the steps of: acquiring service data generated when the server transmits the service data, wherein the service data comprises a delay rate, a packet loss rate and a jitter rate; the alarm module analyzes the collected monitoring data of the monitoring item based on a preset alarm strategy to judge whether an alarm is generated, and the method comprises the following steps: analyzing the service data to obtain a first analysis result; and judging whether to generate an alarm or not according to a preset alarm strategy and the first analysis result.
Optionally, the computer instructions cause the computer to further perform the steps of: collecting system data of the server, wherein the system data comprises CPU utilization rate, memory utilization rate, hard disk residual space and network interface real-time flow; the alarm module analyzes the collected monitoring data of the monitoring item based on a preset alarm strategy to judge whether an alarm is generated, and the method comprises the following steps: analyzing the system data to obtain a second analysis result; and judging whether to generate an alarm or not according to a preset alarm strategy and the second analysis result.
Optionally, the computer instructions cause the computer to further perform the steps of: determining an alarm grade according to the monitoring data and a preset alarm threshold; determining an alarm mode according to the alarm level, wherein the alarm mode comprises any one of short messages, mails and mobile phone APP reminders; and performing real-time alarm to the configured alarm object according to the alarm mode.
Optionally, the computer instructions cause the computer to further perform the steps of: acquiring an alarm object and an alarm mode configured by the user in a self-defined way, wherein the alarm mode comprises any one of short messages, mails and mobile phone APP reminders; and adopting the configured alarm mode to carry out real-time alarm on the configured alarm object.
Optionally, the computer instructions cause the computer to further perform the steps of: reading a configuration file library of the server to be monitored according to the monitoring task information, and generating a related monitoring item configuration file according to a preset rule; reading the monitoring item configuration file; and starting a data acquisition process to acquire the monitoring data.
Fig. 3 is a schematic diagram of an electronic device 300 according to an embodiment of the present invention, and as shown in fig. 3, the electronic device 300 according to the embodiment includes: at least one processor 310 and a communication interface 320; and at least one memory 330 communicatively coupled to the processor 310, wherein the memory 330 stores program instructions executable by the processor 310, and the processor 310 calls the program instructions to perform the configured data monitoring alarm method described above. To avoid repetition, it is not repeated herein.
The electronic device 300 may be a desktop computer, a notebook, a palm computer, a cloud server, or other electronic devices. The electronic devices may include, but are not limited to, a processor 310, a communication interface 320, and a memory 330. Those skilled in the art will appreciate that fig. 3 is merely an example of the electronic device 100 and does not constitute a limitation of the electronic device 100 and may include more or fewer components than shown, or combine certain components, or different components, e.g., the electronic device may also include a communication bus 340, etc.
The Processor 101 may be a Central Processing Unit (CPU), other general purpose Processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), a Field Programmable Gate Array (FPGA) or other Programmable logic device, discrete Gate or transistor logic device, discrete hardware component, or the like. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
The storage 330 may be an internal storage unit of the electronic device 300, such as a hard disk or a memory of the electronic device 300. The memory 330 may also be an external storage device of the electronic device 300, such as a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), etc. provided on the electronic device 300. Further, the memory 330 may also include both internal storage units of the electronic device 300 and external storage devices. The memory 330 is used to store program instructions and other programs and data required by the electronic device. The memory 330 may also be used to temporarily store data that has been output or is to be output.
It is clear to those skilled in the art that, for convenience and brevity of description, the specific working processes of the above-described systems, apparatuses and units may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
In the embodiments provided in the present invention, it should be understood that the disclosed system, apparatus and method may be implemented in other ways. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the units is only one logical division, and there may be other divisions in actual implementation, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, or in a form of hardware plus a software functional unit.
The integrated unit implemented in the form of a software functional unit may be stored in a computer readable storage medium. The software functional unit is stored in a storage medium and includes several instructions for causing a computer device (which may be a personal computer, a server, or a network device) or a Processor (Processor) to execute some steps of the methods according to the embodiments of the present invention. And the aforementioned storage medium includes: various media capable of storing program codes, such as a usb disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk.
The above description is only for the purpose of illustrating the preferred embodiments of the present invention and is not to be construed as limiting the invention, and any modifications, equivalents, improvements and the like made within the spirit and principle of the present invention should be included in the scope of the present invention.

Claims (10)

1. A configured data monitoring and alarming method is characterized by comprising the following steps:
acquiring monitoring task information, wherein the monitoring task information is generated by user-defined configuration of a server to be monitored by a user, and the monitoring task information comprises monitoring items;
monitoring the server according to the configured monitoring task information and collecting monitoring data of the monitoring item, wherein the monitoring data comprises at least one of service data, service data and system data;
calling an alarm module through a preset interface, wherein the alarm module analyzes the collected monitoring data of the monitoring item based on a preset alarm strategy so as to judge whether an alarm is generated;
if yes, the alarm module gives an alarm to the configured alarm object in real time.
2. The method according to claim 1, wherein after the monitoring the server according to the configured monitoring task information and collecting the monitoring data of the monitoring item, and before the calling an alarm module through a preset interface, the method further comprises:
acquiring a monitoring task adjusting instruction sent by the user, wherein the monitoring task adjusting instruction comprises an added monitoring item and/or a deleted monitoring item;
adjusting the monitoring task information according to the monitoring task adjusting instruction;
and monitoring the server according to the adjusted monitoring task information and collecting monitoring data of the monitoring item.
3. The method according to claim 1, wherein the monitoring the server according to the configured monitoring task information and collecting monitoring data of the monitoring item comprises:
monitoring the process that the server stores the received service data into a corresponding local database;
scanning service data in a local database of the server according to preset interval time to obtain a first data index related to the service data, wherein the first data index comprises data writing integrity and data writing accuracy;
the alarm module analyzes the collected monitoring data of the monitoring item based on a preset alarm strategy to judge whether an alarm is generated, and the method comprises the following steps:
and judging whether to generate an alarm or not according to a preset alarm strategy and a first data index of the service data.
4. The method of claim 1, wherein the monitoring the server according to the configured monitoring task information and collecting monitoring data comprises:
acquiring service data generated when the server transmits the service data, wherein the service data comprises a delay rate, a packet loss rate and a jitter rate;
the alarm module analyzes the collected monitoring data of the monitoring item based on a preset alarm strategy to judge whether an alarm is generated, and the method comprises the following steps:
analyzing the service data to obtain a first analysis result;
and judging whether to generate an alarm or not according to a preset alarm strategy and the first analysis result.
5. The method of claim 1, wherein the monitoring the server according to the configured monitoring task information and collecting monitoring data comprises:
collecting system data of the server, wherein the system data comprises CPU utilization rate, memory utilization rate, hard disk residual space and network interface real-time flow;
the alarm module analyzes the collected monitoring data of the monitoring item based on a preset alarm strategy to judge whether an alarm is generated, and the method comprises the following steps:
analyzing the system data to obtain a second analysis result;
and judging whether to generate an alarm or not according to a preset alarm strategy and the second analysis result.
6. The method according to any one of claims 1 to 5, wherein the alarming module performs real-time alarming to a preset alarming object, and comprises:
determining an alarm grade according to the monitoring data and a preset alarm threshold;
determining an alarm mode according to the alarm level, wherein the alarm mode comprises any one of short messages, mails and mobile phone APP reminders;
and performing real-time alarm to the configured alarm object according to the alarm mode.
7. The method according to any one of claims 1 to 5, wherein the alarm module gives an alarm to a preset alarm object in real time, and the method comprises the following steps:
acquiring an alarm object and an alarm mode configured by the user in a self-defined way, wherein the alarm mode comprises any one of short messages, mails and mobile phone APP reminders;
and adopting the configured alarm mode to carry out real-time alarm on the configured alarm object.
8. The method of claim 1, wherein the monitoring the server according to the configured monitoring task information and collecting monitoring data comprises:
reading a configuration file library of the server to be monitored according to the monitoring task information, and generating a related monitoring item configuration file according to a preset rule;
reading the monitoring item configuration file;
and starting a data acquisition process to acquire the monitoring data.
9. A configurated data monitoring alarm system is characterized by comprising a monitoring module and an alarm module;
the monitoring module comprises a monitoring item configuration unit, a service data monitoring unit and a system data monitoring unit, wherein the monitoring item configuration unit is used for configuring the monitoring item of the server to be monitored in a user-defined manner; the service data monitoring unit is used for monitoring the server and acquiring the service data of the monitoring item; the service data monitoring unit is used for monitoring data generated when the server needing to be monitored transmits the service data; the system data monitoring unit is used for monitoring the system data of the server to be monitored;
the alarm module is provided with a calling interface, can be called by the monitoring module, and is used for analyzing the collected monitoring data of the monitoring item based on a preset alarm strategy so as to judge whether to generate an alarm or not, and if so, the alarm module gives an alarm to a configured alarm object in real time.
10. An electronic device, comprising: at least one processor; and at least one memory communicatively coupled to the processor, wherein the memory stores program instructions executable by the processor, and wherein the processor calls the program instructions to perform the configured data monitoring alarm method of any of claims 1 to 8.
CN201910712965.6A 2019-08-02 2019-08-02 Configured data monitoring and alarming method and system Pending CN112311617A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910712965.6A CN112311617A (en) 2019-08-02 2019-08-02 Configured data monitoring and alarming method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910712965.6A CN112311617A (en) 2019-08-02 2019-08-02 Configured data monitoring and alarming method and system

Publications (1)

Publication Number Publication Date
CN112311617A true CN112311617A (en) 2021-02-02

Family

ID=74485944

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910712965.6A Pending CN112311617A (en) 2019-08-02 2019-08-02 Configured data monitoring and alarming method and system

Country Status (1)

Country Link
CN (1) CN112311617A (en)

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112835768A (en) * 2021-02-25 2021-05-25 紫光云技术有限公司 Real-time monitoring resource measurement data method based on ceilometer
CN113242148A (en) * 2021-05-17 2021-08-10 深圳市腾讯网域计算机网络有限公司 Method, device, medium and electronic equipment for generating monitoring alarm related information
CN113517998A (en) * 2021-04-22 2021-10-19 康键信息技术(深圳)有限公司 Processing method, device and equipment of early warning configuration data and storage medium
CN113656239A (en) * 2021-06-02 2021-11-16 北京百度网讯科技有限公司 Monitoring method and device for middleware and computer program product
CN113704058A (en) * 2021-08-05 2021-11-26 北京百度网讯科技有限公司 Business model monitoring method and device and electronic equipment
CN113806166A (en) * 2021-08-25 2021-12-17 合众人寿保险股份有限公司 Object monitoring method and device, storage medium and electronic equipment
CN114071263A (en) * 2021-07-14 2022-02-18 北京天元创新科技有限公司 Method and device for removing duplicate of optical fiber network alarm repeated data
CN114338480A (en) * 2021-12-31 2022-04-12 国泰君安证券股份有限公司 System, method and device for monitoring and processing stock market interface based on TCP (Transmission control protocol), processor and storage medium thereof
CN114389971A (en) * 2022-03-23 2022-04-22 苏州浪潮智能科技有限公司 Intelligent monitoring fine adjustment method, device, equipment and storage medium
CN114710390A (en) * 2022-02-18 2022-07-05 联通沃悦读科技文化有限公司 Monitoring alarm method, system, equipment and medium for internet system
CN114785722A (en) * 2022-06-14 2022-07-22 武汉四通信息服务有限公司 Monitoring data processing method and device and computer readable storage medium
CN116664102A (en) * 2023-05-12 2023-08-29 上海天玑科技股份有限公司 Monitoring and warning method for operation and maintenance flow

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107678907A (en) * 2017-05-22 2018-02-09 平安科技(深圳)有限公司 Database business logic monitoring method, system and storage medium
CN109582547A (en) * 2018-12-11 2019-04-05 平安科技(深圳)有限公司 Electronic device, monitoring data alarm method and storage medium
CN109783322A (en) * 2018-11-22 2019-05-21 远光软件股份有限公司 A kind of monitoring analysis system and its method of enterprise information system operating status

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107678907A (en) * 2017-05-22 2018-02-09 平安科技(深圳)有限公司 Database business logic monitoring method, system and storage medium
CN109783322A (en) * 2018-11-22 2019-05-21 远光软件股份有限公司 A kind of monitoring analysis system and its method of enterprise information system operating status
CN109582547A (en) * 2018-12-11 2019-04-05 平安科技(深圳)有限公司 Electronic device, monitoring data alarm method and storage medium

Cited By (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112835768A (en) * 2021-02-25 2021-05-25 紫光云技术有限公司 Real-time monitoring resource measurement data method based on ceilometer
CN113517998A (en) * 2021-04-22 2021-10-19 康键信息技术(深圳)有限公司 Processing method, device and equipment of early warning configuration data and storage medium
CN113517998B (en) * 2021-04-22 2024-04-09 康键信息技术(深圳)有限公司 Processing method, device, equipment and storage medium of early warning configuration data
CN113242148A (en) * 2021-05-17 2021-08-10 深圳市腾讯网域计算机网络有限公司 Method, device, medium and electronic equipment for generating monitoring alarm related information
CN113242148B (en) * 2021-05-17 2022-08-23 深圳市腾讯网域计算机网络有限公司 Method, device, medium and electronic equipment for generating monitoring alarm related information
CN113656239A (en) * 2021-06-02 2021-11-16 北京百度网讯科技有限公司 Monitoring method and device for middleware and computer program product
CN114071263A (en) * 2021-07-14 2022-02-18 北京天元创新科技有限公司 Method and device for removing duplicate of optical fiber network alarm repeated data
CN113704058B (en) * 2021-08-05 2024-04-09 北京百度网讯科技有限公司 Service model monitoring method and device and electronic equipment
CN113704058A (en) * 2021-08-05 2021-11-26 北京百度网讯科技有限公司 Business model monitoring method and device and electronic equipment
CN113806166A (en) * 2021-08-25 2021-12-17 合众人寿保险股份有限公司 Object monitoring method and device, storage medium and electronic equipment
CN114338480A (en) * 2021-12-31 2022-04-12 国泰君安证券股份有限公司 System, method and device for monitoring and processing stock market interface based on TCP (Transmission control protocol), processor and storage medium thereof
CN114710390A (en) * 2022-02-18 2022-07-05 联通沃悦读科技文化有限公司 Monitoring alarm method, system, equipment and medium for internet system
CN114389971A (en) * 2022-03-23 2022-04-22 苏州浪潮智能科技有限公司 Intelligent monitoring fine adjustment method, device, equipment and storage medium
WO2023178923A1 (en) * 2022-03-23 2023-09-28 苏州浪潮智能科技有限公司 Intelligent monitoring micro-adjustment method and apparatus, device, and storage medium
CN114389971B (en) * 2022-03-23 2022-12-23 苏州浪潮智能科技有限公司 Intelligent monitoring fine adjustment method, device, equipment and storage medium
CN114785722A (en) * 2022-06-14 2022-07-22 武汉四通信息服务有限公司 Monitoring data processing method and device and computer readable storage medium
CN116664102A (en) * 2023-05-12 2023-08-29 上海天玑科技股份有限公司 Monitoring and warning method for operation and maintenance flow

Similar Documents

Publication Publication Date Title
CN112311617A (en) Configured data monitoring and alarming method and system
CN110213068B (en) Message middleware monitoring method and related equipment
CN110224858B (en) Log-based alarm method and related device
CN108776934B (en) Distributed data calculation method and device, computer equipment and readable storage medium
CN110489391B (en) Data processing method and related equipment
CN111181801B (en) Node cluster testing method and device, electronic equipment and storage medium
CN108038130B (en) Automatic false user cleaning method, device, equipment and storage medium
CN106548402B (en) Resource transfer monitoring method and device
CN110232010A (en) A kind of alarm method, alarm server and monitoring server
CN113190423B (en) Method, device and system for monitoring service data
CN113176978A (en) Monitoring method, system and device based on log file and readable storage medium
CN111651595A (en) Abnormal log processing method and device
CN114090366A (en) Method, device and system for monitoring data
CN111694677A (en) Message queue management method, device, terminal and computer-readable storage medium
CN111130867B (en) Intelligent household equipment alarm method and device based on Internet of things
CN113596078A (en) Service problem positioning method and device
CN105471938B (en) Server load management method and device
CN111339062A (en) Data monitoring method and device, electronic equipment and storage medium
CN112948224A (en) Data processing method, device, terminal and storage medium
CN112306871A (en) Data processing method, device, equipment and storage medium
CN111431733A (en) Service alarm coverage information evaluation method and device
CN114513334B (en) Risk management method and risk management device
CN106708706B (en) Alarm information processing method and device for task program abnormity
CN109508356B (en) Data abnormality early warning method, device, computer equipment and storage medium
CN115114316A (en) Processing method, device, cluster and storage medium for high-concurrency data

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20210202

RJ01 Rejection of invention patent application after publication