CN102930690B - Alarm processor and alarm processing method - Google Patents

Alarm processor and alarm processing method Download PDF

Info

Publication number
CN102930690B
CN102930690B CN201210457643.XA CN201210457643A CN102930690B CN 102930690 B CN102930690 B CN 102930690B CN 201210457643 A CN201210457643 A CN 201210457643A CN 102930690 B CN102930690 B CN 102930690B
Authority
CN
China
Prior art keywords
data
police
alarm
back end
reported
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201210457643.XA
Other languages
Chinese (zh)
Other versions
CN102930690A (en
Inventor
曾文杰
刘浩
冯顾
胡宇
华起
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Qihoo Technology Co Ltd
Original Assignee
Beijing Qihoo Technology Co Ltd
Qizhi Software Beijing Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Qihoo Technology Co Ltd, Qizhi Software Beijing Co Ltd filed Critical Beijing Qihoo Technology Co Ltd
Priority to CN201210457643.XA priority Critical patent/CN102930690B/en
Priority to CN201410508900.7A priority patent/CN104200611B/en
Publication of CN102930690A publication Critical patent/CN102930690A/en
Application granted granted Critical
Publication of CN102930690B publication Critical patent/CN102930690B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Alarm Systems (AREA)

Abstract

The invention discloses an alarm processor, which is used for processing data which need to be alarmed and comprises a data sheet construction module and an alarm module, wherein the data sheet construction module is applied to construct an alarm data sheet according to the data which need to be alarmed; the data which need to be alarmed comprise at least two data items; the alarm data sheet comprises a plurality of data nodes, wherein each of the data nodes is linked with an annular double linked list; each of the annular double linked lists comprises a plurality of list nodes, wherein the data nodes are identified by at least one data item selected from the data which need to be alarmed; the same data which need to be alarmed of the at least one data item are stored below the same data node and sequentially stored in the corresponding list nodes of the annular double linked list of the data node; the alarm module determines whether the data need to be alarmed in the annular double linked lists associated to the data nodes conform to an alarm strategy according to the preset alarm strategy; and when the data are determined to conform to the alarm strategy, the alarm module alarms. In addition, the invention further provides an alarm processing method.

Description

A kind of alarm processor and alarm processing method
Technical field
The present invention relates to field of computer technology, be specifically related to a kind of alarm processor and alarm processing method.
Background technology
Along with the fast development of network, occurred need to being the network system of a large number of users service.These network systems have a large amount of servers that are distributed in each address, and these servers are conventionally configured to the mode of cluster and come for user service.Along with providing, the server of service is more and more, to the monitoring performance of these servers and when breaking down, reports to the police in time, exactly and becomes the problem of paying special attention at present.
When supervisory control system is used for monitoring extensive server, can produce a large amount of monitor datas.Along with monitor data is more and more, how to monitor data extract, analyze, effectively management is to fast to operating personnel in time, report to the police and become fast reaction, the repair ability of considering the network system that comprises extensive server exactly, directly affect the service quality of network system.
Summary of the invention
In view of the above problems, the present invention has been proposed to a kind of overcome the problems referred to above or the alarm processor addressing the above problem at least in part and alarm processing method are provided.
According to one aspect of the present invention, alarm processor is provided, its data that needs are reported to the police are processed, this alarm processor comprises: tables of data constructing module, the data that are suitable for reporting to the police are as required constructed alert data table, the described data of reporting to the police that need comprise at least two data item, described alert data table comprises a plurality of back end, each back end cochain is connected to annular doubly linked list, described annular doubly linked list comprises a plurality of chained list nodes, at least one data item selected in the data that wherein back end is reported to the police by needs identifies, the data that the needs that this at least one data item is identical are reported to the police are stored in corresponding chained list node in the annular doubly linked list that is also stored in order this back end under same back end, and alarm module, according to predetermined warning strategy, determine whether the data that needs in the annular doubly linked list being associated with back end are reported to the police meet described warnings strategy, when determining that meeting reports to the police when tactful, report to the police.
According to a further aspect in the invention, a kind of alarm processing method is provided, its data that needs are reported to the police are processed, this alarm processing method comprises: the data of reporting to the police are as required constructed alert data table, the described data of reporting to the police that need comprise at least two data item, described alert data table comprises a plurality of back end, each back end cochain is connected to annular doubly linked list, described annular doubly linked list comprises a plurality of chained list nodes, at least one data item selected in the data that wherein each back end is reported to the police by needs identifies, the data that the needs that this at least one data item is identical are reported to the police are stored in corresponding chained list node in the annular doubly linked list that is also stored in order this back end under same back end, according to predetermined warning strategy, determine that whether the data that the needs in the annular doubly linked list being associated with back end are reported to the police meet described warning strategy, report to the police when determining satisfied warning strategy.
Alarm processor of the present invention and alarm processing method can be applied in supervisory control system, especially monitor in the supervisory control system of many even thousands of, up to ten thousand machines, and the data of being convenient to needs to report to the police are classified, added up, and report to the police.Operating personnel can be located quickly and accurately and occur abnormal machine.
Above-mentioned explanation is only the general introduction of technical solution of the present invention, in order to better understand technological means of the present invention, and can be implemented according to the content of specification, and for above and other objects of the present invention, feature and advantage can be become apparent, below especially exemplified by the specific embodiment of the present invention.
Accompanying drawing explanation
By reading below detailed description of the preferred embodiment, various other advantage and benefits will become cheer and bright for those of ordinary skills.Accompanying drawing is only for the object of preferred implementation is shown, and do not think limitation of the present invention.And in whole accompanying drawing, by identical reference symbol, represent identical parts.In the accompanying drawings:
Fig. 1 shows according to the block diagram of the alarm processor of one embodiment of the invention;
Fig. 2 shows the schematic diagram of alert data table according to an embodiment of the invention; And
Fig. 3 shows the flow chart of alarm processing method according to an embodiment of the invention.
Embodiment
Exemplary embodiment of the present disclosure is described below with reference to accompanying drawings in more detail.Although shown exemplary embodiment of the present disclosure in accompanying drawing, yet should be appreciated that and can realize the disclosure and the embodiment that should do not set forth limits here with various forms.On the contrary, it is in order more thoroughly to understand the disclosure that these embodiment are provided, and can by the scope of the present disclosure complete convey to those skilled in the art.
The invention provides a kind of alarm processor, it can be for the supervisory control system of monitoring multiple servers, in supervisory control system, monitor after a large amount of misoperation data of multiple servers, alarm processor is processed effectively to these a large amount of misoperation data, thereby in time, report to the police exactly.
Fig. 1 shows according to the block diagram of the alarm processor 100 of one embodiment of the invention.As shown in Figure 1, alarm processor 100 comprises tables of data constructing module 110 and alarm module 120.
The data that tables of data constructing module 110 is suitable for reporting to the police are as required constructed alert data table.The data of need reporting to the police here, can be for example the misoperation data of monitored machine.These misoperation data comprise at least two data item, for example, can comprise: machine domain name, the tactful ID that reports to the police, monitor data item ID, fault value and timestamp.Wherein machine domain name is the monitored domain name that whether has abnormal machine; The tactful ID that reports to the police is the corresponding predetermined warning strategy of taking; Monitor data item ID is an operating index corresponding to monitored machine; Fault value is the abnormal data of the monitor data item of the machine that monitors; Timestamp is the time of abnormal data that monitors the monitor data item of machine.Think special instruction, these misoperation data are not limited to given example above, and it can be the two or more or whole of listed data item in above-mentioned example, can be also other data item.
The alert data table that tables of data constructing module 110 is constructed as shown in Figure 2.Alert data table 200 in Fig. 2 be take that the data that needs report to the police comprise machine domain name, the tactful ID that reports to the police, monitor data item ID, fault value and these five data item of timestamp are illustrating that example is carried out.As can be seen from Figure 2, alert data table 200 comprises a plurality of back end 210, only schematically shows 3 back end 210 here.Each back end 210 chain is connected to an annular doubly linked list 220, and annular doubly linked list 220 comprises a plurality of chained list node 2220-2205.In Fig. 2 for illustrate clear for the purpose of, annular doubly linked list 220 is drawn in outside alert data table 200, in fact, annular doubly linked list 220 is tight associated with alert data table 200.In alert data table 200, machine domain name in the service data that each back end 210 is reported to the police by needs and the tactful ID that reports to the police identify, the service data that stores the needs warning with same machines domain name and identical warning strategy ID in each chained list node of the annular doubly linked list 220 being associated with each back end 210, the size of the value of the timestamp of the service data that a plurality of chained list nodes are reported to the police according to the needs on it is link arrangement successively in annular doubly linked list 220.
What think special instruction is, according to the alert data table 200 shown in Fig. 2, in the data of reporting to the police at a large amount of needs, even if machine domain name is identical, but the tactful ID that reports to the police is different, also can form different back end 210, that is, same server has different back end 210 because the tactful ID that reports to the police is different.On the other hand, even if the tactful ID that reports to the police is identical, but machine domain name is different, also can form different back end 210.Only have machine domain name and report to the police tactful ID all identical data be just positioned at a back end 210, and be distributed on each the corresponding chained list node in corresponding with this back end 210 orderly annular doubly linked list 220.Whenever data enter in alert data table 200, these data are just assigned to corresponding back end 210, and these data are mounted in annular doubly linked list 220 to the chained list node place corresponding with timestamp in these data.Utilize the alert data table 200 shown in Fig. 2, can exist under the situation of the data that need in a large number warning, the dissimilar alarm content of each machine is differentiated, thereby can accurately locate which machine in a large amount of monitored machines, occurred problem, and occurred what problem.
In the annular doubly linked list 220 of Fig. 2, can set certain is some chained list node of standard time stamp, then by each data by the value of timestamp from small to large or from big to small from the chained list node of standard time stamp by clockwise or counter clockwise direction arrange.For example, as shown in Figure 2, in annular doubly linked list 220,2200 chained list nodes for standard time stamp, the value of timestamp increases gradually in the direction of the clock, the chained list node of the value maximum that is timestamp from chained list node 2200 beginning counter clockwise directions and its most contiguous chained list node 2205; And from chained list node 2200, start the chained list node of the value minimum that clockwise directions and its most contiguous chained list node 2201 are timestamp.2202, the value that 2203,2204 values that are timestamp are greater than 2201 timestamp is less than three data that value value and timestamp of 2205 timestamp increases successively.In Fig. 2, only to comprise 5 data instances in annular doubly linked list 220, in annular doubly linked list 220, can comprise still less in practice or more data.The number of the chained list node comprising in annular doubly linked list 220 in addition, also may change in time.When having new data to enter, just according to the value of its timestamp, be inserted into the correspondence position in annular doubly linked list 220.
In the embodiment shown in Figure 2, back end is with machine domain name and these two data item identifier of tactful ID of reporting to the police.The present invention is not limited thereto.In fact, when operating personnel's focus is different, back end can be by the different data item identifier being selected from the data that need to report to the police, and in addition, being used for the data item of identification data node can be also one, two or more.Like this, being used for the identical all data of data item of identification data node is all stored under same back end and with another data item size, is stored in order corresponding chained list node in the annular doubly linked list of this back end.For example, when trying same software out on each machine, operating personnel want to monitor the effect that this software moves on each machine, the parameter that at this moment this software can be exerted an influence to machine performance, machine domain name and timestamp are as monitor data item, with this monitor data item of the parameter that machine performance is exerted an influence wherein, carry out identification data node, data placement by the parameter that machine performance is exerted an influence in different range is under different back end, the data that are arranged under each back end are in turn arranged in to annular doubly linked list by the size of the value of its timestamp, can count thus impact when this software moves on each machine, the performance of machine being produced.
In addition, in the embodiment described in Fig. 2, alarm module 120 is selected the corresponding strategy of reporting to the police according to the warning strategy ID in each back end 210, and whether the data of determining that according to the selected strategy of reporting to the police the needs in the annular doubly linked list 220 being associated with back end 210 are reported to the police reach the alert if in selected warning strategy, when definite, report to the police while meeting alert if.For example, when alert if is while within N minute, occurring that M time (wherein N and M are more than or equal to 1 integer) reports to the police, from annular doubly linked list 220, the place of the value maximum of timestamp starts to get successively the data in time N minute, taken out data amount check and M are compared, if the data amount check taking out is more than or equal to M, represent to reach alert if, alarm module 120 can be by reporting to the police (example of warning comprises Email and/or a note, but does not invent and be not limited to this); If the data amount check taking out is less than M, represent also not meet alert if, do not need to report to the police.Hence one can see that, by using annular doubly linked list 220 to calculate soon, learns whether reach alert if.In addition, alert if can also increase other content, for example, surpasses S(S be more than or equal to 1 integer when reporting to the police) inferior, alarm module 120 is no longer reported to the police.
Below by a concrete example, describe alarm module 120 in detail.
When the strategy of reporting to the police is " #118#add_ops#2#4#5# machine loading is too high ", it represents that this No. ID of reporting to the police tactful is 118, belongs to warning group add_ops.Alert if is: if there are 4 such situations to occur in 2 minutes, with regard to sending out, report to the police (example of warning comprises Email or note, but the present invention is not limited to this), carry out at most 5 times and report to the police, alarm content is " machine loading is too high ".
Alternatively, alarm processor 100 according to the present invention can also comprise alarm history memory 130, and this alarm history memory 130 is couple to alarm module 120, the historical record of the alarming result of store alarms module 120.Here, alarm history memory 130 can store data in hbase database, because hbase database is distributed database, well an extension storage.Alternatively, alarm history memory 130 also can be independent of alarm processor 100 of the present invention and arrange.
The present invention also provides a kind of alarm processing method, and its data that needs are reported to the police are processed.
Fig. 3 shows the flow chart of alarm processing method according to an embodiment of the invention.As shown in Figure 3, this alarm processing method starts from step S310, and at step S310, the data of reporting to the police are as required constructed alert data table.The described data of reporting to the police that need comprise at least two data item.The data of need reporting to the police here, can be for example the misoperation data of monitored machine.These misoperation data comprise at least two data item, for example, can comprise: machine domain name, the tactful ID that reports to the police, monitor data item ID, fault value and timestamp.Wherein machine domain name is the monitored domain name that whether has abnormal machine; The tactful ID that reports to the police is the corresponding predetermined warning strategy of taking; Monitor data item ID is an operating index corresponding to monitored machine; Fault value is the abnormal data of the monitor data item of the machine that monitors; With timestamp be the time of abnormal data that monitors the monitor data item of machine.Think special instruction, these misoperation data are not limited to given example above, and it can be the two or more or whole of listed data item in above-mentioned example, can be also other data item.
Alert data table comprises a plurality of back end, each back end cochain is connected to annular doubly linked list, described annular doubly linked list comprises a plurality of chained list nodes, at least one data item selected in the data that wherein each back end is reported to the police by needs identifies, and the data that the needs that this at least one data item is identical are reported to the police are stored in corresponding chained list node in the annular doubly linked list that is also stored in order this back end under same back end.Concrete with reference to above about the explanation of Fig. 2.
Subsequently, at step S320, obtain the data that need warning, and the content of data based data item is wherein stored into the chained list node place of the corresponding data node in alert data table.Owing to being long-term monitoring to the monitoring of machine conventionally, so being the data that the needs to constantly obtaining are reported to the police, processes alarm processing method of the present invention.
Subsequently, at step S330, according to the alert data table of structure and pre-stored predetermined warning strategy, determine whether the data that obtained needs are reported to the police meet the alert if in warning strategy, when determining while meeting alert if, enter step S340, report to the police; When not meeting alert if, get back to step S320, continuing to obtain needs the data of reporting to the police and stores.Here, each strategy of reporting to the police comprises unique warning strategy ID and alert if.About illustrating referring to above about the part of the description of alarm module 120 of the strategy of reporting to the police, no longer describe in detail here.
Particularly, alert if in warning strategy can comprise that a certain monitored data item occurs that the number of times that surpasses the first predetermined threshold reaches or the information with regard to reporting to the police more than the first pre-determined number within a predetermined period of time, as previously described, for example, when the strategy of reporting to the police is " 2#4# machine loading is too high ", if representing had 4 such situations to occur in 2 minutes, with regard to sending out Email or note, report to the police.At this moment, from annular doubly linked list, need the position of value maximum of the timestamp of the data of reporting to the police to start to obtain the data in 2 minutes, if the number of the data that obtain is greater than or equal to 4, report to the police.
Alternatively, alert if in warning strategy can also comprise that alarm times reaches the information that the second pre-determined number is no longer reported to the police, like this, after step S340, can also comprise step S350, at step S350, determine whether alarm times reaches the second pre-determined number, when alarm times reaches the second pre-determined number, carry out step S360, no longer report to the police; When alarm times does not reach the second pre-determined number, perform step S330.For example, when the strategy of reporting to the police is " 2#4#5# machine loading is too high ", described at step S330, there are 4 such situations appearance in 2 minutes, enter step S340, report to the police.Next, in step S350, when alarm times reaches 5 times, enter step S360, no longer report to the police; When alarm times does not reach 5 times, perform step S330.
Alternatively, alarm processing method 300 of the present invention can also comprise step S370: alarming result is stored in alarm history memory, so that operating personnel check and monitor the operation conditions of multiple servers.Like this, in the situation that operating personnel do not hear at the scene and not warning or see alarming result in time, can learn very soon whether have abnormal conditions to occur by checking the alarming result information of storing in alarm history memory.
It should be noted that, method shown in Fig. 3 do not limit by shown in the order of each step carry out, can adjust as required the sequencing of each step, in addition, described step is also not limited to above-mentioned steps and divides, and above-mentioned steps can further split into more multi-step also can be merged into still less step.
Alarm processor of the present invention and alarm processing method can be applied in supervisory control system, especially monitor in the supervisory control system of many even thousands of, up to ten thousand machines, and the data of being convenient to needs to report to the police are classified, added up, and report to the police.Operating personnel can be located quickly and accurately and occur abnormal machine.
The algorithm providing at this is intrinsic not relevant to any certain computer, virtual system or miscellaneous equipment with demonstration.Various general-purpose systems also can with based on using together with this teaching.According to description above, it is apparent constructing the desired structure of this type systematic.In addition, the present invention is not also for any certain programmed language.It should be understood that and can utilize various programming languages to realize content of the present invention described here, and the description of above language-specific being done is in order to disclose preferred forms of the present invention.
In the specification that provided herein, a large amount of details have been described.Yet, can understand, embodiments of the invention can not put into practice in the situation that there is no these details.In some instances, be not shown specifically known method, structure and technology, so that not fuzzy understanding of this description.
Similarly, be to be understood that, in order to simplify the disclosure and to help to understand one or more in each inventive aspect, in the above in the description of exemplary embodiment of the present invention, each feature of the present invention is grouped together into single embodiment, figure or sometimes in its description.Yet, the method for the disclosure should be construed to the following intention of reflection: the present invention for required protection requires than the more feature of feature of clearly recording in each claim.Or rather, as reflected in claims below, inventive aspect is to be less than all features of disclosed single embodiment above.Therefore, claims of following embodiment are incorporated to this embodiment thus clearly, and wherein each claim itself is as independent embodiment of the present invention.
Those skilled in the art are appreciated that and can the module in the equipment in embodiment are adaptively changed and they are arranged in one or more equipment different from this embodiment.Module in embodiment or unit or assembly can be combined into a module or unit or assembly, and can put them into a plurality of submodules or subelement or sub-component in addition.At least some in such feature and/or process or unit are mutually repelling, and can adopt any combination to combine all processes or the unit of disclosed all features in this specification (comprising claim, summary and the accompanying drawing followed) and disclosed any method like this or equipment.Unless clearly statement in addition, in this specification (comprising claim, summary and the accompanying drawing followed) disclosed each feature can be by providing identical, be equal to or the alternative features of similar object replaces.
In addition, those skilled in the art can understand, although embodiment more described herein comprise some feature rather than further feature included in other embodiment, the combination of the feature of different embodiment means within scope of the present invention and forms different embodiment.For example, in the following claims, the one of any of embodiment required for protection can be used with compound mode arbitrarily.
All parts embodiment of the present invention can realize with hardware, or realizes with the software module moved on one or more processor, or realizes with their combination.It will be understood by those of skill in the art that and can use in practice microprocessor or digital signal processor (DSP) to realize the some or all functions according to the some or all parts in the embodiment of the present invention.The present invention for example can also be embodied as, for carrying out part or all equipment or device program (, computer program and computer program) of method as described herein.Realizing program of the present invention and can be stored on computer-readable medium like this, or can there is the form of one or more signal.Such signal can be downloaded and obtain from internet website, or provides on carrier signal, or provides with any other form.
It should be noted above-described embodiment the present invention will be described rather than limit the invention, and those skilled in the art can design alternative embodiment in the situation that do not depart from the scope of claims.In the claims, any reference symbol between bracket should be configured to limitations on claims.Word " comprises " not to be got rid of existence and is not listed as element or step in the claims.Being positioned at word " " before element or " one " does not get rid of and has a plurality of such elements.The present invention can be by means of including the hardware of some different elements and realizing by means of the computer of suitably programming.In having enumerated the unit claim of some devices, several in these devices can be to carry out imbody by same hardware branch.The use of word first, second and C grade does not represent any order.Can be title by these word explanations.

Claims (10)

1. an alarm processor, its data that needs are reported to the police are processed, and this alarm processor comprises:
Tables of data constructing module, the data that are suitable for reporting to the police are as required constructed alert data table, the described data of reporting to the police that need comprise at least two data item, described alert data table comprises a plurality of back end, each back end cochain is connected to annular doubly linked list, described annular doubly linked list comprises a plurality of chained list nodes, at least one data item selected in the data that wherein back end is reported to the police by needs identifies, the data that the needs that this at least one data item is identical are reported to the police are stored in corresponding chained list node in the annular doubly linked list that is also stored in order this back end under same back end, and
Alarm module, determines according to predetermined warning strategy whether the data that needs in the annular doubly linked list being associated with back end are reported to the police meet described warnings strategy, when determining that meeting reports to the police when tactful, reports to the police;
Wherein, described warning strategy comprises report to the police tactful ID and alert if, and described at least two data item comprise two or more in following: machine domain name, the tactful ID that reports to the police, monitor data item ID, fault value and timestamp, wherein,
Machine domain name is the monitored domain name that whether has abnormal machine;
The tactful ID that reports to the police, corresponding to predetermined warning strategy;
Monitor data item ID, corresponding to an operating index of monitored machine;
Fault value, the abnormal data of the monitor data item of the machine monitoring; With
Timestamp, monitors time of abnormal data of the monitor data item of machine.
2. alarm processor according to claim 1, wherein,
Machine domain name in the data that described back end is reported to the police by needs and the tactful ID that reports to the police identify, and store in each chained list node of the annular doubly linked list being associated with each back end, have the data that the needs of same machines domain name and identical warning strategy ID are reported to the police, the timestamp value size of the data that described a plurality of chained list nodes are reported to the police according to the needs on it links arrangement.
3. alarm processor as claimed in claim 1 or 2, the alert if in wherein said warning strategy comprises that the information that the number of times of the first predetermined threshold reaches or just reports to the police more than the first pre-determined number appears surpassing in monitor data item within a predetermined period of time,
Described alarm module obtains chained list node within a predetermined period of time according to the timestamp value of the data that need in annular doubly linked list to report to the police, if the quantity of chained list node is greater than or equal to described the first pre-determined number, reports to the police.
4. alarm processor as claimed in claim 3, wherein, described alert if also comprises that alarm times reaches the information that the second pre-determined number is no longer reported to the police.
5. alarm processor as claimed in claim 3, also comprises:
Alarm history memory, the historical record of its store alarms result.
6. an alarm processing method, its data that needs are reported to the police are processed, and this alarm processing method comprises:
The data of reporting to the police are as required constructed alert data table, the described data of reporting to the police that need comprise at least two data item, described alert data table comprises a plurality of back end, each back end cochain is connected to annular doubly linked list, described annular doubly linked list comprises a plurality of chained list nodes, at least one data item selected in the data that wherein each back end is reported to the police by needs identifies, the data that the needs that this at least one data item is identical are reported to the police are stored in corresponding chained list node in the annular doubly linked list that is also stored in order this back end under same back end,
According to predetermined warning strategy, determine that whether the data that the needs in the annular doubly linked list being associated with back end are reported to the police meet described warning strategy, report to the police when determining satisfied warning strategy;
Wherein, described warning strategy comprises report to the police tactful ID and alert if, and described at least two data item comprise two or more in following: machine domain name, the tactful ID that reports to the police, monitor data item ID, fault value and timestamp, wherein,
Machine domain name is the monitored domain name that whether has abnormal machine;
The tactful ID that reports to the police, corresponding to predetermined warning strategy;
Monitor data item ID, corresponding to an operating index of monitored machine;
Fault value, the abnormal data of the monitor data item of the machine monitoring; With
Timestamp, monitors time of abnormal data of the monitor data item of machine.
7. alarm processing method as claimed in claim 6, wherein,
Machine domain name in the data that described back end is reported to the police by needs and the tactful ID that reports to the police identify, and store in each chained list node of the annular doubly linked list being associated with each back end, have the data that the needs of same machines domain name and identical warning strategy ID are reported to the police, the timestamp value size of the data that described a plurality of chained list nodes are reported to the police according to the needs on it links arrangement.
8. the alarm processing method as described in claim 6 or 7, wherein, described alert if comprises that the information that the number of times of the first predetermined threshold reaches or just reports to the police more than the first pre-determined number appears surpassing in monitor data item within a predetermined period of time,
The predetermined warning strategy of described basis determines whether the data that the needs in the annular doubly linked list being associated with back end are reported to the police meet described warning strategy, the step of reporting to the police when determining satisfied warning strategy is: according to described alert if, the timestamp value of the data based on needing in annular doubly linked list to report to the police is obtained chained list node within a predetermined period of time, if the quantity of chained list node is greater than or equal to described the first pre-determined number, report to the police.
9. alarm processing method as claimed in claim 8, wherein, described alert if also comprises that alarm times reaches the information that the second pre-determined number is no longer reported to the police.
10. alarm processing method as claimed in claim 8, also comprises:
The historical record of alarming result is stored in alarm history memory.
CN201210457643.XA 2012-11-14 2012-11-14 Alarm processor and alarm processing method Expired - Fee Related CN102930690B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201210457643.XA CN102930690B (en) 2012-11-14 2012-11-14 Alarm processor and alarm processing method
CN201410508900.7A CN104200611B (en) 2012-11-14 2012-11-14 A kind of alarm processor and alarm processing method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210457643.XA CN102930690B (en) 2012-11-14 2012-11-14 Alarm processor and alarm processing method

Related Child Applications (1)

Application Number Title Priority Date Filing Date
CN201410508900.7A Division CN104200611B (en) 2012-11-14 2012-11-14 A kind of alarm processor and alarm processing method

Publications (2)

Publication Number Publication Date
CN102930690A CN102930690A (en) 2013-02-13
CN102930690B true CN102930690B (en) 2014-10-15

Family

ID=47645477

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210457643.XA Expired - Fee Related CN102930690B (en) 2012-11-14 2012-11-14 Alarm processor and alarm processing method

Country Status (1)

Country Link
CN (1) CN102930690B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104200611A (en) * 2012-11-14 2014-12-10 北京奇虎科技有限公司 Alarming processor and alarming processing method
CN104702443A (en) * 2012-11-14 2015-06-10 北京奇虎科技有限公司 Processor and method for processing data needed to be alarmed

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102970162B (en) * 2012-11-14 2015-04-01 北京奇虎科技有限公司 Processor and method used for processing data to be alarmed
CN108255667B (en) * 2017-12-27 2021-07-06 创新先进技术有限公司 Service monitoring method and device and electronic equipment

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1378143A (en) * 2001-03-30 2002-11-06 深圳市中兴通讯股份有限公司 Method for realizing quick data transfer
CN101184003A (en) * 2007-12-03 2008-05-21 中兴通讯股份有限公司 NMP based front and background alarm management system and management method thereof
CN102722965A (en) * 2012-05-28 2012-10-10 深圳市邦健电子有限公司 Alarm management and supervision devices
CN102970162A (en) * 2012-11-14 2013-03-13 北京奇虎科技有限公司 Processor and method used for processing data to be alarmed

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH11242789A (en) * 1998-02-24 1999-09-07 Sekisui Chem Co Ltd Alarm signaling terminal device

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1378143A (en) * 2001-03-30 2002-11-06 深圳市中兴通讯股份有限公司 Method for realizing quick data transfer
CN101184003A (en) * 2007-12-03 2008-05-21 中兴通讯股份有限公司 NMP based front and background alarm management system and management method thereof
CN102722965A (en) * 2012-05-28 2012-10-10 深圳市邦健电子有限公司 Alarm management and supervision devices
CN102970162A (en) * 2012-11-14 2013-03-13 北京奇虎科技有限公司 Processor and method used for processing data to be alarmed

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
JP特开平11-242789A 1999.09.07

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104200611A (en) * 2012-11-14 2014-12-10 北京奇虎科技有限公司 Alarming processor and alarming processing method
CN104702443A (en) * 2012-11-14 2015-06-10 北京奇虎科技有限公司 Processor and method for processing data needed to be alarmed
CN104200611B (en) * 2012-11-14 2017-04-05 北京奇虎科技有限公司 A kind of alarm processor and alarm processing method
CN104702443B (en) * 2012-11-14 2018-03-06 北京奇虎科技有限公司 For handling the processor and method of the data for needing to alarm

Also Published As

Publication number Publication date
CN102930690A (en) 2013-02-13

Similar Documents

Publication Publication Date Title
CN105095056B (en) A kind of method of data warehouse data monitoring
CN103001824B (en) A kind of supervisory control system and method for supervising monitoring multiple servers
CN102970162B (en) Processor and method used for processing data to be alarmed
JP2023062204A (en) Method for filtering process control system alarms, device for filtering process control system alarms, and tangible computer readable storage medium
CN102938710A (en) Monitoring system and method for large-scale servers
CN102930690B (en) Alarm processor and alarm processing method
CN103401698A (en) Monitoring system used for alarming server status in server cluster operation
CN103490937A (en) Method and device for filtering monitoring data
US9842134B2 (en) Data query interface system in an event historian
CN102937930A (en) Application program monitoring system and method
CN105656699A (en) Alarm management method and system for content distribution network
JP6109662B2 (en) Operation management apparatus, operation management method, and program
CN102932442A (en) Equipment, system and method for distributed data storage system
US9019095B2 (en) Systems and methods for integrating alarm processing and presentation of alarms for a power generation system
CN104753712A (en) Alarming report method, alarming report node and alarming report system
CN115118574B (en) Data processing method, device and storage medium
CN104361713A (en) Index data monitoring method, device and server
US20180069765A1 (en) Displaying data of a data processing system
JP2022104538A (en) Method, system and computer program for alarm processing
CN104702443A (en) Processor and method for processing data needed to be alarmed
US20170317912A1 (en) Notifying original state listeners of events in a domain model
CN104200611A (en) Alarming processor and alarming processing method
CN104750083A (en) Production line management and control method and production line management and control device
CN106681852A (en) Method and device for adjusting browser compatibility
CN102308309A (en) Technologies for mapping a set of criteria

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20220729

Address after: Room 801, 8th floor, No. 104, floors 1-19, building 2, yard 6, Jiuxianqiao Road, Chaoyang District, Beijing 100015

Patentee after: BEIJING QIHOO TECHNOLOGY Co.,Ltd.

Address before: 100088 room 112, block D, 28 new street, new street, Xicheng District, Beijing (Desheng Park)

Patentee before: BEIJING QIHOO TECHNOLOGY Co.,Ltd.

Patentee before: Qizhi software (Beijing) Co.,Ltd.

CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20141015