CN104572391B - Monitoring alarm tactics configuring method and device, monitoring alarm method and device - Google Patents

Monitoring alarm tactics configuring method and device, monitoring alarm method and device Download PDF

Info

Publication number
CN104572391B
CN104572391B CN201310486294.9A CN201310486294A CN104572391B CN 104572391 B CN104572391 B CN 104572391B CN 201310486294 A CN201310486294 A CN 201310486294A CN 104572391 B CN104572391 B CN 104572391B
Authority
CN
China
Prior art keywords
time point
monitored
alarm
monitoring
index
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201310486294.9A
Other languages
Chinese (zh)
Other versions
CN104572391A (en
Inventor
邱磊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Tencent Computer Systems Co Ltd
Original Assignee
Shenzhen Tencent Computer Systems Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Tencent Computer Systems Co Ltd filed Critical Shenzhen Tencent Computer Systems Co Ltd
Priority to CN201310486294.9A priority Critical patent/CN104572391B/en
Publication of CN104572391A publication Critical patent/CN104572391A/en
Application granted granted Critical
Publication of CN104572391B publication Critical patent/CN104572391B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Alarm Systems (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The invention discloses a kind of monitoring alarm tactics configuring methods, comprising the following steps: obtains the corresponding historical data of index to be monitored in system and its institute's bearer service;Historical data of the same index to be monitored at each time point is analyzed, determines corresponding monitoring type, and calculates same index to be monitored in the reasonable waving interval at each time point;According to monitoring type and reasonable waving interval calculated, corresponding alarm monitoring strategy is generated.The method and device of alarm is monitored the invention also discloses a kind of monitoring alarm strategy configuration device and using monitoring alarm strategy configuration.The present invention not only realizes the automation and intelligence of the configuration of monitoring alarm strategy, and also improves the accuracy of monitoring.

Description

Monitoring alarm tactics configuring method and device, monitoring alarm method and device
Technical field
The present invention relates to computer field more particularly to a kind of monitoring alarm tactics configuring methods and device, monitoring alarm Method and device.
Background technique
Existing monitoring alarm is by manually according to the characteristics of software systems and its business carried and relevant people The experience of member, is arranged corresponding monitored object, and the corresponding warning strategies of human configuration.In existing monitoring method, alarm The human configuration of strategy, will expend a large amount of manpower, and the later period also needs constantly to safeguard, the accuracy of configuration strategy is also very It is difficult to guarantee.
Summary of the invention
The main purpose of technical solution of the present invention is to provide a kind of monitoring alarm tactics configuring method and device, monitoring alarm Method and device, it is intended to not only realize the automation and intelligence of warning strategies, and also improve the accuracy of monitoring.
To achieve the above object, the invention proposes a kind of monitoring alarm tactics configuring methods, comprising the following steps:
The corresponding historical data of index to be monitored in acquisition system and its institute's bearer service;
Historical data of the same index to be monitored at each time point is analyzed, determines corresponding monitoring type, and calculate same Reasonable waving interval of the index to be monitored at each time point;
According to monitoring type and reasonable waving interval calculated, corresponding alarm monitoring strategy is generated.
The invention also provides a kind of monitoring alarm method, the monitoring alarm strategy configured based on above-mentioned configuration method; The monitoring alarm method the following steps are included:
The operation data of index to be monitored is obtained in real time;
For the operation data corresponding time point according to the index to be monitored, the time point corresponding alarm plan is obtained Slightly;
It is monitored according to the warning strategies according to the operation data that the warning strategies treat monitor control index, and full When sufficient alarm conditions, alarm is generated.
Accordingly, the present invention also provides a kind of monitoring alarm strategy configuration devices, comprising:
Data acquisition module, for obtaining the corresponding historical data of index to be monitored in system and its institute's bearer service;
Computing module determines corresponding monitoring class for analyzing historical data of the same index to be monitored at each time point Type, and same index to be monitored is calculated in the reasonable waving interval at each time point;
Policy generation module, for generating corresponding alarm prison according to monitoring type and reasonable waving interval calculated Control strategy.
Accordingly, the present invention also provides a kind of monitoring alarm devices, comprising:
Data acquisition module, for obtaining the operation data of index to be monitored in real time;
Strategy obtains module and obtains the time for the operation data corresponding time point according to the index to be monitored The corresponding warning strategies of point;
Alarm module, the operation data for treating monitor control index according to the warning strategies are monitored, and are being met When alarm conditions, alarm is generated.
The present invention is monitored the historical data of all kinds of indexs of computer software and its business carried, so Probability statistical analysis is carried out to the historical data monitored afterwards, obtains the fluctuation characteristic of index entirety to be monitored, and according to the wave Dynamic feature, configures corresponding monitoring alarm strategy, then treats monitor control index using the warning strategies and is monitored and alerts, no But the automation and intelligence of warning strategies are realized, and also improves the accuracy of monitoring.
Detailed description of the invention
Fig. 1 is the flow diagram of monitoring alarm tactics configuring method first embodiment of the present invention;
Fig. 2 is in monitoring alarm tactics configuring method of the present invention, index to be monitored at some time point on historical data Schematic diagram;
Fig. 3 is the history that same index to be monitored is analyzed in monitoring alarm tactics configuring method of the present invention on each time point Data determine corresponding monitoring type, and calculate the process of reasonable waving interval of the same index to be monitored on each time point Schematic diagram;
Fig. 4 is the flow diagram of monitoring alarm tactics configuring method second embodiment of the present invention;
Fig. 5 is the reasonable waving interval that monitoring alarm tactics configuring method according to a first embodiment of the present invention is configured Floor map;
Fig. 6 is that reasonable waving interval shown in fig. 5 carries out the result schematic diagram after clustering;
Fig. 7 is that the rationally undulating value up and down of waving interval and the distribution in cluster line of demarcation is illustrated after Fig. 6 carries out clustering Figure;
Fig. 8 is the result schematic diagram after reasonable waving interval shown in Fig. 7 carries out curve fitting;
Fig. 9 is the flow diagram of monitoring alarm method preferred embodiment of the present invention;
Figure 10 is the functional block diagram of monitoring alarm strategy configuration device first embodiment of the present invention;
Figure 11 is the functional block diagram of computing module in monitoring alarm strategy configuration device of the present invention;
Figure 12 is the functional block diagram of monitoring alarm strategy configuration device second embodiment of the present invention;
Figure 13 is the functional block diagram of monitoring alarm device preferred embodiment of the present invention.
The embodiments will be further described with reference to the accompanying drawings for the realization, the function and the advantages of the object of the present invention.
Specific embodiment
Technical solution of the present invention is further illustrated with reference to the accompanying drawings and specific embodiments of the specification.It should be appreciated that this Locate described specific embodiment to be only used to explain the present invention, be not intended to limit the present invention.
Main idea is that provide a kind of monitoring method of business, to computer software and its carried The historical data of all kinds of indexs of business is monitored, and then carries out probability statistical analysis to the historical data monitored, is obtained The fluctuation characteristic of index entirety to be monitored, and according to the fluctuation characteristic, corresponding monitoring alarm strategy is configured, the announcement is then utilized It is pithy slightly to treat monitor control index and be monitored and alert, the automation and intelligence of warning strategies are not only realized, but also mention The high accuracy of monitoring.
Before describing the specific embodiment of the invention, the proprietary term that the present invention uses is introduced one by one:
Monitoring: refer to the monitoring of all kinds of indexs to be monitored to computer software and its institute's bearer service;
Alarm: refer to the warning for monitoring and being issued when all kinds of indexs to be monitored are abnormal;
Monitored object: refer to all kinds of indexs to be monitored of computer software and its institute's bearer service;
Threshold alarm: referring to the algorithm being monitored to the data volume of monitored object, when the data volume of monitored object is more than to set When fixed threshold value, alert;
Average value alarm: refer to the calculation being monitored to the fluctuation ratio (comparing with historical data) of monitored object data volume Method is alerted when fluctuating threshold value of the ratio more than setting;
Warning strategies: refer to the setting to the selection for alerting algorithm used in monitored object and the threshold value for alerting algorithm;
Hypothetical inspection: refer in mathematical statistics and a kind of overall method is inferred by sample according to certain assumed condition.Tool The body practice is: making certain it is assumed that being denoted as H0 to the totality studied according to the needs of problem;Suitable statistic is chosen, this The selection of statistic will make when assuming that H0 is set up, and be distributed as known;By the sample surveyed, the value of statistic is calculated, And it is tested according to previously given significance, make refusal or receives to assume the judgement of H0, such as Kolmogorov- Ke Smirnov(Er Monuofu-Vladimir Smirnov) examine etc.;
Normal distribution: if stochastic variable X one location parameter of obedience is μ, the probability distribution that scale parameter is б, and it is general Rate density function are as follows:
Then this stochastic variable is known as normal random variable, and the distribution that normal random variable is obeyed is known as normal state point Cloth is denoted as X~N (μ, б2), claim X Normal Distribution.When μ=0 at that time, б=1, normal distribution just becomes standardized normal distribution;
Limit error: P | X- μ | < б } ≈ 68.26%, P | X- μ | < 2 б } ≈ 95.45%, P | X- μ | < 3 б } ≈ 99.73%, 3 б are referred to as limit error, and the value of X is almost both fallen within centered on μ, using 3 б as in the section of radius, i.e. 3 σ principles;
Clustering: refer to that cluster is to sort data into a process of different class or cluster, so in the same cluster Object have a very big similitude, and the object between different clusters has a very big diversity, including hierarchical clustering method, decomposition method plus Enter method, dynamic state clustering, clustering ordered samples, there is overlapping to cluster and fuzzy clustering etc.;
Curve is like conjunction: referring to and selects curve type appropriate to be fitted observation data, and analyzes two with the curvilinear equation of fitting Relationship between variable, common method such as least square method etc..
Below with reference to above-mentioned proprietary term, the course of work of monitoring alarm of the present invention is described in detail.
Referring to Fig.1, monitoring alarm tactics configuring method first embodiment of the present invention is proposed.The alarm monitoring side of the embodiment Method the following steps are included:
Step S110, the corresponding historical data of index to be monitored in system and its institute's bearer service is obtained;
When the performance of judgement system and its ability of service bearer, it will be judged by each performance indicator.Therefore, first Index to be monitored is first set.Then it according to index to be monitored, obtains in system operation, index to be monitored is at each time point On historical data.As shown in Fig. 2, its index to be monitored is the access request amount of certain business, what which was monitored Time point is 0-300 time point.Curve 2a is the historical data of the index to be monitored at time point X1, such as before 0-30 days Historical data.Curve 2b is the historical data of the index to be monitored on 0-300 time point.
Step S120, historical data of the same index to be monitored on each time point is analyzed, determines corresponding monitoring type, And calculate reasonable waving interval of the same index to be monitored on each time point;
Historical data of the data volume of various indexs at same time point usually exists when by system and its institute's bearer service Fluctuation in a certain range, i.e., whole fluctuation range are limited.So by according to the historical data monitored, to same index to be monitored Business datum on each time point carries out probability statistical analysis, so that the fluctuation for finding upper index to be monitored of each time point is special Sign, then determines corresponding monitoring type and reasonable waving interval according to fluctuation characteristic.
Step S130, according to monitoring type and reasonable waving interval calculated, corresponding alarm monitoring strategy is generated.
Then according to the monitoring type and reasonable waving interval calculated judged, the alarm prison on each time point is generated Control strategy, for being used when alarm monitoring.
The present invention is monitored the historical data of all kinds of indexs of computer software and its business carried, so Probability statistical analysis is carried out to the historical data monitored afterwards, obtains the fluctuation characteristic of index entirety to be monitored, and according to the wave Dynamic feature, configures corresponding monitoring alarm strategy, then treats monitor control index using the warning strategies and is monitored and alerts, no But the automation and intelligence of warning strategies are realized, and also improves the accuracy of monitoring.
Further, include: referring to Fig. 3, above-mentioned steps S120
Step S121, by assuming that property is examined, judge whether index to be monitored obeys just in the historical data at each time point State distribution, and count the time point of all Normal Distributions;
By taking the calculating of the historical data on time point X1 as an example, as shown in Fig. 2, curve 2a is the access request amount of certain business Historical data at time point X1, such as the historical data before 0-30 days.Curve 2b is that the access request amount of certain business exists Historical data on 0-300 time point.By assuming that property is examined, whether the historical data that judgment curves 2a is indicated obeys normal state Distribution.Then successively judge other all time points historical data whether Normal Distribution, while counting all obediences The time point of normal distribution.
Step S122, whether the time point of all Normal Distributions is greater than or equal to a preset threshold;It is to be transferred to step Otherwise rapid S123 is transferred to step S124;
In the present embodiment, a preset threshold is arranged according to concrete condition, such as A*80%, which is index to be monitored All time points.If A is 288, find that the time point of all Normal Distributions is 250 after statistics, then the time point Significantly greater than 288*80%, so judging that the time point of all Normal Distributions is greater than or equal to a preset threshold.
Step S123, setting monitoring type is average value alarm, and it is [- 3 σ/μ ,+3 σ/μ] that reasonable waving interval, which is arranged,;
When being greater than or equal to a preset threshold at the time point of all Normal Distributions, alerted using average value, and set Setting reasonable waving interval is [- 3 σ/μ ,+3 σ/μ].
Step S124, setting monitoring type is threshold alarm, and it is [+3 σ/of μ -3 σ, μ] that reasonable waving interval, which is arranged,.
When the time point of all Normal Distributions is less than a preset threshold, using threshold alarm, and reasonable wave is set Dynamic section is [+3 σ/of μ -3 σ, μ].
The present invention will also provide a kind of monitoring alarm tactics configuring method second embodiment.As shown in figure 4, the embodiment Monitoring alarm tactics configuring method includes:
Step S210, the corresponding historical data of index to be monitored in system and its institute's bearer service is obtained;
Step S220, historical data of the same index to be monitored at each time point is analyzed, determines corresponding monitoring type, and Same index to be monitored is calculated in the reasonable waving interval at each time point;
Step S230, the undulating value up and down of the reasonable waving interval at each time point is subjected to clustering respectively, obtains wave The central value and division boundary point value of dynamic value demarcation interval and each demarcation interval;
As shown in figure 5, the fluctuation ratio situation due to different time points often has a certain difference, if each time Point all configures corresponding warning strategies, then needing a large amount of monitoring alarm strategy configurations in different time periods, is not only unfavorable for accusing The management of alert configuration, but also certain pressure will also be caused to subsequent monitoring.It therefore, will also be right after step S220 The undulating value up and down of the reasonable waving interval at each time point carries out clustering respectively, obtains undulating value demarcation interval and each division The central value and division boundary point value in section.As shown in fig. 6, it is the cluster analysis result of reasonable waving interval shown in fig. 5. It will be appreciated from fig. 6 that most fluctuation ratio concentrates between 5%~60% in reasonable waving interval in Fig. 5, pass through cluster point Analysis, is segmented into three sections, is respectively:
A, [0,18.5%] cluster centre a0 is 7.96%;
B, (18.5%, 41.5%] cluster centre b0 is 28.93%;
C, (41.5%, 100%] cluster centre c0 is 55.58%.
Then the undulating value that each cluster section is replaced with each cluster centre, so that numerous fluctuation ratios be made to be classified as three classes.
Step S240, according to division boundary point value, by the undulating value up and down of the reasonable waving interval on each time point It carries out curve fitting respectively, obtains the intersection point of matched curve and each cluster line of demarcation, then obtain the intersection point corresponding time Point, and according to the time point and the central value of each demarcation interval, repartition reasonable waving interval;
As shown in fig. 7, section a, section b and section c are by three cluster sections after clustering;A0, b0, c0 points It is not the cluster centre value of section a, section b and section c, also referred to as clusters line of demarcation;Curve 2c is index to be monitored at 0-300 The curve of reasonable waving interval on time point.As shown in Figure 7, after by clustering, curve 2c and cluster line of demarcation are (also Line represented by a0, b0, c0) intersection position cluster line of demarcation above and below recurrent fluctuations, it is difficult to determine specific separation. Therefore, after clustering to fluctuation ratio, also by by carrying out 10 rank curve matchings to the fluctuation data in Fig. 7, song is found The fluctuation data of line 2c and the intersection point of Cluster Decomposition line, to obtain final cluster centre value.As shown in figure 8, section a, area Between b and section c be by three cluster sections after clustering;A0, b0, c0 are the poly- of section a, section b and section c respectively Class central value, also referred to as cluster line of demarcation;Curve 2c is the song of reasonable waving interval of the index to be monitored on 0-300 time point Line;S1, S2, S3, S4 are the fluctuation data of curve 2c and the intersection point of Cluster Decomposition line after curve matching.Then according to being found Intersection point obtains final time interval and its cluster centre value:
(1), time point [0,163], cluster centre 7.96%;
(2), time point (163,195], cluster centre 28.93%;
(3), time point (195,253], cluster centre 55.58%;
(4), time point (253,288], cluster centre 28.93%.
According to the time interval of above-mentioned acquisition and its cluster centre value, corresponding reasonable waving interval is generated:
(1), (0 point, 13 points 35 minutes], waving interval be up and down fluctuation 7.96%;
(2), (13: 35,16 points 15 minutes], waving interval is fluctuation 28.93% up and down;
(3), (16: 15,21 points 05 minute], waving interval is fluctuation 55.58% up and down;
(4), (21: 05,23 points 55 minutes], waving interval is fluctuation 28.93% up and down.
Step S250, according to monitoring type and reasonable waving interval calculated, corresponding monitoring alarm strategy is generated.
The warning strategies that the present embodiment generates are by the undulating value clustering up and down of the reasonable waving interval on each time point Afterwards, less undulating value cluster section is formed, to no longer need a large amount of monitoring alarm strategy configurations in different time periods, not only Conducive to the management of alarm configuration, but also very big pressure will also be mitigated to subsequent monitoring.Moreover, the embodiment of the present invention is also logical Cross and carry out curve fitting to the undulating value up and down of the reasonable waving interval after clustering, obtain correct time section and rationally Waving interval improves the accuracy of monitoring alarm strategy configuration, further improves the efficiency of service alarm monitoring.
Based on the warning strategies that above-mentioned business monitoring warning strategies configuration method is configured, the present invention also provides a kind of industry Business alarm monitoring method.As shown in figure 9, the service alarm monitoring method the following steps are included:
Step S410, the operation data of index to be monitored is obtained in real time;
According to set index to be monitored, its corresponding operation data of detecting real-time.For example, when index to be monitored is certain The request amount of business then grabs the operation data then when detecting the business and requesting.
Step S420, according to the operation data corresponding time point of the index to be monitored, it is corresponding to obtain the time point Warning strategies;
According to above-mentioned grabbed operation data, the time point where operation data is obtained, and phase is obtained according to the time The warning strategies answered.The warning strategies are the strategies of the configured generation of method through the above configuration.The warning strategies include monitoring It alerts algorithm and alerts the setting of the threshold value of algorithm.
Step S430, it is supervised according to the warning strategies according to the operation data that the warning strategies treat monitor control index Control, and when meeting alarm conditions, generate alarm.
Then business datum is monitored according to acquired warning strategies, by taking threshold alarm algorithm as an example, if detecting When the fluctuation ratio of the index to be monitored arrived is greater than the threshold value of setting, then alarm is generated;If the wave of the index to be monitored detected When dynamic ratio is less than or equal to the threshold value of setting, then alarm is not generated.
The warning strategies that the present invention is generated using above-mentioned configuration method are monitored and alert to business to be monitored, not only The automation and intelligence of the configuration of monitoring alarm strategy are realized, and also improves the efficiency of business monitoring.
Corresponding above method embodiment, the present invention also provides a kind of monitoring alarm strategy configuration device first embodiments. As shown in Figure 10, the business monitoring warning strategies configuration device of the embodiment includes:
Data acquisition module 110, for obtaining the corresponding historical data of index to be monitored in system and its institute's bearer service;
Computing module 120, for analyze same index to be monitored at every point of time on historical data, judge corresponding Alarm type, and calculate same index to be monitored at every point of time on reasonable waving interval;
Policy generation module 130, for generating corresponding alarm according to alarm type and reasonable waving interval calculated Monitoring strategies.
When the performance of judgement system and its ability of service bearer, it will be judged by each performance indicator.Therefore, first Index to be monitored is first set.Then data acquisition module 110 obtains in system operation, according to index to be monitored wait supervise Control historical data of the index on each time point.Computing module 120 is according to the historical data monitored, to same index to be monitored Business datum on each time point carries out probability statistical analysis, so that the fluctuation for finding upper index to be monitored of each time point is special Sign, then determines corresponding monitoring type and reasonable waving interval according to fluctuation characteristic.Finally, 130 basis of policy generation module The monitoring type and reasonable waving interval calculated judged, generates the alarm monitoring strategy on each time point, for alarm It is used when monitoring.
The present invention is monitored the historical data of all kinds of indexs of computer software and its business carried, so Probability statistical analysis is carried out to the historical data monitored afterwards, obtains the fluctuation characteristic of index entirety to be monitored, and according to the wave Dynamic feature, configures corresponding monitoring alarm strategy, then treats monitor control index using the warning strategies and is monitored and alerts, no But the automation and intelligence of warning strategies are realized, and also improves the accuracy of monitoring.
Further, referring to Fig.1 1, above-mentioned computing module 120 includes:
Computing unit 121, be used for by assuming that property examine, judge index to be monitored each time point historical data whether Normal Distribution, and count the time point of all Normal Distributions;
Setting unit 123, when the time point for all Normal Distributions is greater than or equal to a preset threshold, using flat Mean value alarm, and it is [- 3 σ/μ ,+3 σ/μ] that reasonable waving interval, which is arranged,;It is pre- less than one when the time point of all Normal Distributions If when threshold value, using threshold alarm, and it is [+3 σ/of μ -3 σ, μ] that reasonable waving interval, which is arranged,.
Referring to Fig.1 2, propose business monitoring warning strategies configuration device second embodiment of the present invention.Based on the above embodiment, The business monitoring warning strategies configuration device of the present embodiment further include:
Cluster Analysis module 140, for clustering the undulating value up and down of the reasonable waving interval at each time point respectively Analysis obtains the central value of undulating value demarcation interval and each demarcation interval and divides boundary point value;
Curve fitting module 150 is used for point value of demarcating according to the division, by the reasonable waving interval on each time point Upper and lower undulating value carries out curve fitting respectively, obtains the intersection point of matched curve and each cluster line of demarcation, then obtains the intersection point Corresponding time point, and according to the time point and the central value of each demarcation interval, repartition reasonable waving interval.
As shown in figure 5, the fluctuation ratio situation due to different time points often has a certain difference, if each time Point all configures corresponding warning strategies, then needing a large amount of monitoring alarm strategy configurations in different time periods, is not only unfavorable for accusing The management of alert configuration, but also certain pressure will also be caused to subsequent monitoring.Therefore, Cluster Analysis module 140 will also be right The undulating value up and down of the reasonable waving interval at each time point carries out clustering respectively, obtains undulating value demarcation interval and each division The central value and division boundary point value in section.As shown in fig. 6, it is the cluster analysis result of reasonable waving interval shown in fig. 5. It will be appreciated from fig. 6 that most fluctuation ratio concentrates between 5%~60% in reasonable waving interval in Fig. 5, pass through cluster point Analysis, is segmented into three sections, is respectively:
A, [0,18.5%] cluster centre a0 is 7.96%;
B, (18.5%, 41.5%] cluster centre b0 is 28.93%;
C, (41.5%, 100%] cluster centre c0 is 55.58%.
Then the undulating value that each cluster section is replaced with each cluster centre, so that numerous fluctuation ratios be made to be classified as three classes.
As shown in fig. 7, section a, section b and section c are by three cluster sections after clustering;A0, b0, c0 points It is not the cluster centre value of section a, section b and section c, also referred to as clusters line of demarcation;Curve 2c is index to be monitored at 0-300 The curve of reasonable waving interval on time point.As shown in Figure 7, after by clustering, curve 2c and cluster line of demarcation are (also Line represented by a0, b0, c0) intersection position cluster line of demarcation above and below recurrent fluctuations, it is difficult to determine specific separation. Therefore, after clustering to fluctuation ratio, curve fitting module 150 will also be by carrying out 10 ranks to the fluctuation data in Fig. 7 Curve matching finds the fluctuation data of curve 2c and the intersection point of Cluster Decomposition line, to obtain final cluster centre value.Such as figure Shown in 8, section a, section b and section c are by three cluster sections after clustering;A0, b0, c0 are section a, area respectively Between b and section c cluster centre value, also referred to as cluster line of demarcation;Curve 2c is conjunction of the index to be monitored on 0-300 time point Manage the curve of waving interval;S1, S2, S3, S4 are the fluctuation data of curve 2c and the intersection point of Cluster Decomposition line after curve matching.So Afterwards according to the intersection point found, final time interval and its cluster centre value are obtained:
(1), time point [0,163], cluster centre 7.96%;
(2), time point (163,195], cluster centre 28.93%;
(3), time point (195,253], cluster centre 55.58%;
(4), time point (253,288], cluster centre 28.93%.
According to the time interval of above-mentioned acquisition and its cluster centre value, corresponding reasonable waving interval is generated:
(1), (0 point, 13 points 35 minutes], waving interval be up and down fluctuation 7.96%;
(2), (13: 35,16 points 15 minutes], waving interval is fluctuation 28.93% up and down;
(3), (16: 15,21 points 05 minute], waving interval is fluctuation 55.58% up and down;
(4), (21: 05,23 points 55 minutes], waving interval is fluctuation 28.93% up and down.
The warning strategies that the present embodiment generates are by the undulating value clustering up and down of the reasonable waving interval on each time point Afterwards, less undulating value cluster section is formed, to no longer need a large amount of monitoring alarm strategy configurations in different time periods, not only Conducive to the management of alarm configuration, but also very big pressure will also be mitigated to subsequent monitoring.Moreover, the embodiment of the present invention is also logical Cross and carry out curve fitting to the undulating value up and down of the reasonable waving interval after clustering, obtain correct time section and rationally Waving interval improves the accuracy of monitoring alarm strategy configuration, further improves the efficiency of service alarm monitoring.
Accordingly, the strategy configured based on above-mentioned configuration method, the present invention also provides a kind of monitoring alarm devices.Such as Shown in Figure 13, which includes:
Detecting module 210, for obtaining the operation data of index to be monitored in real time;
Strategy obtains module 220, for the operation data corresponding time point according to the index to be monitored, when obtaining this Between put corresponding warning strategies;
Alarm module 230, for treating the operation number of monitor control index according to the warning strategies according to the warning strategies According to being monitored, and when meeting alarm conditions, alarm is generated.
Detecting module 210 will be according to set index to be monitored, its corresponding operation data of detecting real-time.For example, working as Index to be monitored is that the request amount of certain business then grabs the operation data then when detecting the business and requesting.Strategy obtains Modulus block 220 obtains the time point where operation data according to above-mentioned grabbed operation data, and obtains phase according to the time The warning strategies answered.The warning strategies are the strategies of the configured generation of method through the above configuration.The warning strategies include monitoring It alerts algorithm and alerts the setting of the threshold value of algorithm.Then alarm module 230 is then according to acquired warning strategies to business Data are monitored, by taking threshold alarm algorithm as an example, if the fluctuation ratio of the index to be monitored detected is greater than the threshold value of setting When, then generate alarm;If the fluctuation ratio of the index to be monitored detected is less than or equal to the threshold value of setting, announcement is not generated It is alert.
The warning strategies that the present invention is generated using above-mentioned configuration method are monitored and alert to business to be monitored, not only The automation and intelligence of the configuration of monitoring alarm strategy are realized, and also improves the efficiency of business monitoring.
It should be noted that, in this document, the terms "include", "comprise" or its any other variant are intended to non-row His property includes, so that the process, method, article or the device that include a series of elements not only include those elements, and And further include other elements that are not explicitly listed, or further include for this process, method, article or device institute it is intrinsic Element.In the absence of more restrictions, the element limited by sentence " including one ... ", it is not excluded that including There is also other identical elements in the process, method of the element, article or device.
The serial number of the above embodiments of the invention is only for description, does not represent the advantages or disadvantages of the embodiments.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side Method can be realized by means of software and necessary general hardware platform, naturally it is also possible to by hardware, but in many cases The former is more preferably embodiment.Based on this understanding, technical solution of the present invention substantially in other words does the prior art The part contributed out can be embodied in the form of software products, and the monitoring alarm strategy configuration device and monitoring device will It is realized by some instructions, which is stored in a storage medium (such as ROM/RAM, magnetic disk, CD), sets for terminal Standby (can be mobile phone, computer, server or the network equipment etc.) executes method described in each embodiment of the present invention.
The above description is only a preferred embodiment of the present invention, is not intended to limit the scope of the invention, all utilizations Equivalent structure or equivalent flow shift made by description of the invention and accompanying drawing content is applied directly or indirectly in other correlations Technical field, be included within the scope of the present invention.

Claims (12)

1. a kind of monitoring alarm tactics configuring method, which comprises the following steps:
The corresponding historical data of index to be monitored in acquisition system and its institute's bearer service;
Historical data of the same index to be monitored at each time point is analyzed, determines corresponding monitoring type, and is calculated same wait supervise Index is controlled in the reasonable waving interval at each time point;
According to monitoring type and reasonable waving interval calculated, corresponding alarm monitoring strategy is generated;
Wherein, historical data of the same index to be monitored of analysis at each time point, determines corresponding monitoring type, and calculate Reasonable waving interval of the same index to be monitored at each time point, comprising:
By assuming that property is examined, judge index to be monitored each time point historical data whether Normal Distribution, and count The time point of all Normal Distributions;
Judge whether the time point of all Normal Distributions is greater than or equal to a preset threshold, obtains judging result;
Corresponding monitoring type is determined according to the judging result, and the reasonable waving interval at each time point is set.
2. monitoring alarm tactics configuring method according to claim 1, which is characterized in that described according to the judging result It determines corresponding monitoring type, and the reasonable waving interval at each time point is set, comprising:
It is greater than or equal to the preset threshold when the time point of all Normal Distributions, monitoring type is set for average value announcement It is alert, and the reasonable waving interval at each time point is set;The average value alarm is the hair when fluctuating threshold value of the ratio more than setting Raw alarm;
When being less than the preset threshold at the time point of all Normal Distributions, setting monitoring type is threshold alarm, and is set Set the reasonable waving interval at each time point.
3. monitoring alarm tactics configuring method according to claim 2, which is characterized in that the monitoring type is average value When alarm, the reasonable waving interval at corresponding time point is [- 3 σ/μ ,+3 σ/μ], and wherein μ and σ is index to be monitored when each Between the mean value and standard deviation of historical data put.
4. monitoring alarm tactics configuring method according to claim 2, which is characterized in that the monitoring type is threshold value announcement When alert, the reasonable waving interval at corresponding time point is [+3 σ of μ -3 σ, μ], and wherein μ and σ is index to be monitored at each time point Historical data mean value and standard deviation.
5. monitoring alarm tactics configuring method according to claim 1 to 4, which is characterized in that it is described calculate it is same to Monitor control index is after the reasonable waving interval at each time point further include:
The undulating value up and down of the reasonable waving interval at each time point is subjected to clustering respectively, obtain undulating value demarcation interval and The central value and division boundary point value of each demarcation interval;
According to division boundary point value, the undulating value up and down of the reasonable waving interval on each time point is subjected to curve respectively and is intended Close, obtain the intersection point of matched curve and each cluster line of demarcation, then obtain the intersection point corresponding time point, and according to it is described when Between put and each demarcation interval central value, repartition reasonable waving interval.
6. a kind of alarm monitoring method, which is characterized in that the announcement configured based on any configuration method of claim 1-5 It is pithy to omit;The alarm monitoring method the following steps are included:
The operation data of index to be monitored is obtained in real time;
According to the operation data corresponding time point of the index to be monitored, the time point corresponding warning strategies are obtained;
It is monitored according to the operation data that the warning strategies treat monitor control index, and when meeting alarm conditions, generates announcement It is alert.
7. a kind of monitoring alarm strategy configuration device characterized by comprising
Data acquisition module, for obtaining the corresponding historical data of index to be monitored in system and its institute's bearer service;
Computing module determines corresponding monitoring type for analyzing historical data of the same index to be monitored at each time point, and Same index to be monitored is calculated in the reasonable waving interval at each time point;
Policy generation module, for generating corresponding alarm monitoring plan according to monitoring type and reasonable waving interval calculated Slightly;
The computing module includes computing unit and setting unit;
The computing unit is used for by assuming that property inspection, judges whether index to be monitored takes in the historical data at each time point From normal distribution, and count the time point of all Normal Distributions;
The setting unit is sentenced for judging that the time point of all Normal Distributions is greater than or equal to a preset threshold Disconnected result;Corresponding monitoring type is set according to the judging result, and the reasonable waving interval at each time point is set.
8. monitoring alarm strategy configuration device according to claim 7, which is characterized in that the setting unit, for working as The time point of all Normal Distributions is greater than or equal to the preset threshold, and setting monitoring type is average value alarm monitoring, And the reasonable waving interval that each time point is arranged is [- 3 σ/μ ,+3 σ/μ];It is less than institute when the time point of all Normal Distributions When stating preset threshold, monitoring type is set for threshold alarm monitoring, and the reasonable waving interval that each time point is arranged is [μ -3 σ, μ +3σ];Wherein μ and σ is mean value and standard deviation of the index to be monitored in the historical data at each time point;The average value alarm To alert when fluctuating threshold value of the ratio more than setting.
9. monitoring alarm strategy configuration device according to claim 8, which is characterized in that the monitoring type is average value When alarm, the reasonable waving interval at corresponding time point is [- 3 σ/μ ,+3 σ/μ], and wherein μ and σ is index to be monitored when each Between the mean value and standard deviation of historical data put.
10. monitoring alarm strategy configuration device according to claim 8, which is characterized in that the monitoring type is threshold value When alarm, the reasonable waving interval at corresponding time point is [+3 σ of μ -3 σ, μ], and wherein μ and σ is index to be monitored in each time The mean value and standard deviation of the historical data of point.
11. according to the described in any item monitoring alarm strategy configuration devices of claim 7-10, which is characterized in that the configuration dress It sets further include:
Cluster Analysis module is obtained for the undulating value up and down of the reasonable waving interval at each time point to be carried out clustering respectively It obtains the central value of undulating value demarcation interval and each demarcation interval and divides boundary point value;
Curve fitting module is used for according to point value of demarcating is divided, by the undulating value up and down of the reasonable waving interval on each time point It carries out curve fitting respectively, obtains the intersection point of matched curve and each cluster line of demarcation, then obtain the intersection point corresponding time Point, and according to the time point and the central value of each demarcation interval, repartition reasonable waving interval.
12. a kind of warning monitor device characterized by comprising
Data acquisition module, for obtaining the operation data of index to be monitored in real time;
Strategy obtains module and obtains the time point pair for the operation data corresponding time point according to the index to be monitored The warning strategies answered;The warning strategies are the warning strategies that are configured based on any configuration method of claim 1-5;
Alarm module, the operation data for treating monitor control index according to the warning strategies are monitored, and are alerted meeting When condition, alarm is generated.
CN201310486294.9A 2013-10-16 2013-10-16 Monitoring alarm tactics configuring method and device, monitoring alarm method and device Active CN104572391B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310486294.9A CN104572391B (en) 2013-10-16 2013-10-16 Monitoring alarm tactics configuring method and device, monitoring alarm method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310486294.9A CN104572391B (en) 2013-10-16 2013-10-16 Monitoring alarm tactics configuring method and device, monitoring alarm method and device

Publications (2)

Publication Number Publication Date
CN104572391A CN104572391A (en) 2015-04-29
CN104572391B true CN104572391B (en) 2019-03-15

Family

ID=53088525

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310486294.9A Active CN104572391B (en) 2013-10-16 2013-10-16 Monitoring alarm tactics configuring method and device, monitoring alarm method and device

Country Status (1)

Country Link
CN (1) CN104572391B (en)

Families Citing this family (29)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105187788B (en) * 2015-09-02 2018-12-07 台山核电合营有限公司 A kind of method and system of analog machine real-time data record and displaying
CN105096217B (en) * 2015-09-08 2019-05-21 深圳供电局有限公司 A kind of automatic power-measuring terminal communications status prediction technique and system
CN106571934B (en) * 2015-10-08 2019-08-27 中国移动通信集团四川有限公司 A kind of worksheet processing method and apparatus based on regression analysis
CN105930245B (en) * 2015-12-16 2018-12-28 中国银联股份有限公司 A kind of transaction terminal service condition monitoring method and system
CN106293976A (en) * 2016-08-15 2017-01-04 东软集团股份有限公司 Application performance Risk Forecast Method, device and system
CN106407082B (en) * 2016-09-30 2019-06-14 国家电网公司 A kind of information system alarm method and device
CN106878064B (en) * 2017-01-16 2021-08-13 腾讯科技(深圳)有限公司 Data monitoring method and device
CN107659466B (en) * 2017-09-25 2020-10-23 四川长虹电器股份有限公司 System and method for quantifying and calculating throughput capacity service level of cloud system
CN108255667B (en) * 2017-12-27 2021-07-06 创新先进技术有限公司 Service monitoring method and device and electronic equipment
CN110262947B (en) * 2018-03-12 2022-05-17 腾讯科技(深圳)有限公司 Threshold warning method and device, computer equipment and storage medium
CN108874642A (en) * 2018-05-25 2018-11-23 平安科技(深圳)有限公司 SQL method for monitoring performance, device, computer equipment and storage medium
CN108846669B (en) * 2018-05-29 2022-05-10 中国建设银行股份有限公司 Security monitoring method, system, device and storage medium for transaction
CN108829535A (en) * 2018-06-08 2018-11-16 上海擎创信息技术有限公司 Data processing method, terminal and computer readable storage medium
CN109327334A (en) * 2018-09-30 2019-02-12 山东中创软件商用中间件股份有限公司 A kind of alarm method being directed to equipment performance, device and equipment
CN111275466B (en) * 2018-12-04 2023-12-05 北京京东振世信息技术有限公司 Method and device for early warning of out-of-date single quantity
CN109612760A (en) * 2018-12-19 2019-04-12 中国科学院长春光学精密机械与物理研究所 A kind of Working condition detecting method of mechanical equipment, device and storage medium
CN110020769A (en) * 2018-12-19 2019-07-16 阿里巴巴集团控股有限公司 A kind of business risk monitoring method, device and equipment
CN110005659B (en) * 2019-04-08 2020-08-11 深圳市华星光电技术有限公司 Real-time monitoring method for air cylinder
CN112532404B (en) * 2019-09-17 2023-09-22 中国移动通信集团广东有限公司 Data monitoring method and device and electronic equipment
CN111061615A (en) * 2019-12-25 2020-04-24 北京每日优鲜电子商务有限公司 Data monitoring method and device for data warehouse, server and storage medium
CN111459746B (en) * 2020-02-27 2023-06-27 北京三快在线科技有限公司 Alarm generation method, device, electronic equipment and readable storage medium
CN113495909A (en) * 2020-04-06 2021-10-12 中信百信银行股份有限公司 Customer complaint single quantity early warning method and device, electronic equipment and storage medium
CN111597088A (en) * 2020-05-15 2020-08-28 广州探途网络技术有限公司 Data warehouse data monitoring method, warehouse system and electronic equipment
CN111882289B (en) * 2020-07-01 2023-11-14 国网河北省电力有限公司经济技术研究院 Device and method for measuring and calculating project data auditing index interval
CN111882112B (en) * 2020-07-01 2024-05-10 北京嘀嘀无限科技发展有限公司 Method and system for predicting arrival time
CN113760637A (en) * 2020-09-25 2021-12-07 天翼智慧家庭科技有限公司 Method and apparatus for determining a threshold value for threshold class monitoring data
CN112948210A (en) * 2021-02-26 2021-06-11 深圳依时货拉拉科技有限公司 Method and device for detecting QPS index abnormity and computer equipment
CN115174354A (en) * 2022-07-22 2022-10-11 科来网络技术股份有限公司 Platform side data alarm method and device, monitoring equipment and readable storage medium
CN116185783B (en) * 2023-04-24 2023-07-14 山东溯源安全科技有限公司 Monitoring method and device of electronic equipment, electronic equipment and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1472674A (en) * 2003-08-04 2004-02-04 西安交通大学 Self-adapt dynamic apparatus status alarming method based on probability model
JP2009211658A (en) * 2008-03-06 2009-09-17 Nec Corp Failure detection device, failure detection method and program therefor
CN101964997A (en) * 2009-07-21 2011-02-02 中国移动通信集团黑龙江有限公司 Method and device for carrying out early warning on network performance
CN102080569A (en) * 2010-12-10 2011-06-01 煤炭科学研究总院重庆研究院 Distributed optical fiber temperature measurement-based fire early warning method for belt conveyor

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100442726C (en) * 2006-06-13 2008-12-10 华为技术有限公司 Method for monitoring network service fault
CN102740247B (en) * 2011-04-15 2015-07-01 中国移动通信集团山东有限公司 Method and device for generating warning message
CN103200039B (en) * 2012-01-09 2017-01-18 阿里巴巴集团控股有限公司 Data monitoring method and device

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1472674A (en) * 2003-08-04 2004-02-04 西安交通大学 Self-adapt dynamic apparatus status alarming method based on probability model
JP2009211658A (en) * 2008-03-06 2009-09-17 Nec Corp Failure detection device, failure detection method and program therefor
CN101964997A (en) * 2009-07-21 2011-02-02 中国移动通信集团黑龙江有限公司 Method and device for carrying out early warning on network performance
CN102080569A (en) * 2010-12-10 2011-06-01 煤炭科学研究总院重庆研究院 Distributed optical fiber temperature measurement-based fire early warning method for belt conveyor

Also Published As

Publication number Publication date
CN104572391A (en) 2015-04-29

Similar Documents

Publication Publication Date Title
CN104572391B (en) Monitoring alarm tactics configuring method and device, monitoring alarm method and device
Charrad et al. NbClust: an R package for determining the relevant number of clusters in a data set
CN106209432B (en) Network equipment inferior health method for early warning and device based on dynamic threshold
CN112188531B (en) Abnormality detection method, abnormality detection device, electronic apparatus, and computer storage medium
CN108206747B (en) Alarm generation method and system
CN106844138A (en) O&M warning system and method
CN116304766B (en) Multi-sensor-based quick assessment method for state of switch cabinet
CN110086649A (en) Detection method, device, computer equipment and the storage medium of abnormal flow
CN109491850A (en) A kind of disk failure prediction technique and device
CN105871634B (en) Detect the method for cluster exception and the system of application, management cluster
CN110210508A (en) Model generating method, anomalous traffic detection method, device, electronic equipment, computer readable storage medium
CN108572905B (en) Monitoring method and system based on distributed computation
CN108880845A (en) A kind of method and relevant apparatus of information alert
CN112596990B (en) Alarm storm processing method and device and terminal equipment
CN107436277A (en) The single index data quality control method differentiated based on similarity distance
CN112989332B (en) Abnormal user behavior detection method and device
US20150205856A1 (en) Dynamic brownian motion with density superposition for abnormality detection
CN115759729A (en) Disaster risk early warning management system based on algorithm and prediction method
CN108809760A (en) The control method and device in sampling period in sampled-data system
CN113271224A (en) Node positioning method and device, storage medium and electronic device
CN107276779A (en) A kind of monitoring method, system and equipment
CN114707834A (en) Alarm reminding method and device and storage medium
CN110182871A (en) A kind of method for treating water and terminal based on full-automatic medicine system
CN113032239A (en) Risk prompting method and device, electronic equipment and storage medium
CN110677271B (en) Big data alarm method, device, equipment and storage medium based on ELK

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant