CN105574055B - Prevent the method and device that memory exhausts - Google Patents

Prevent the method and device that memory exhausts Download PDF

Info

Publication number
CN105574055B
CN105574055B CN201410642496.2A CN201410642496A CN105574055B CN 105574055 B CN105574055 B CN 105574055B CN 201410642496 A CN201410642496 A CN 201410642496A CN 105574055 B CN105574055 B CN 105574055B
Authority
CN
China
Prior art keywords
default
default object
inquiry
intercepted
memory
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201410642496.2A
Other languages
Chinese (zh)
Other versions
CN105574055A (en
Inventor
王世纪
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Advanced New Technologies Co Ltd
Advantageous New Technologies Co Ltd
Original Assignee
Alibaba Group Holding Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alibaba Group Holding Ltd filed Critical Alibaba Group Holding Ltd
Priority to CN201410642496.2A priority Critical patent/CN105574055B/en
Publication of CN105574055A publication Critical patent/CN105574055A/en
Application granted granted Critical
Publication of CN105574055B publication Critical patent/CN105574055B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Debugging And Monitoring (AREA)

Abstract

The application proposes a kind of method and device for preventing memory from exhausting.Wherein, this method comprises: intercepting the operation of inquiry database when monitoring the operation of inquiry database;And for interception behavior every time, judge whether returning the result for intercepted inquiry operation is default object, if default object, then obtain the size of element in default object, and the rank of corresponding monitored object is determined according to the size of element in preassigned and the default object of acquisition, so that monitor supervision platform counts the monitored object for the different stage being collected into, when the monitored object quantity of different stage reaches corresponding threshold value, the warning message of releasing memory is sent.The embodiment of the present application prevents the method and device that memory exhausts, the warning message of releasing memory can be sent to administrative staff in time, facilitate administrative staff to discharge in time, application server is avoided the case where memory exhausts occur, and then the stability and robustness of server can be improved.

Description

Prevent the method and device that memory exhausts
Technical field
This application involves field of computer technology more particularly to a kind of method and devices for preventing memory from exhausting.
Background technique
With the fast development of network technology, the system based on browser and server structure is increasingly come popular.This is The core that function is realized is concentrated and is completed in the server by system, simplifies the exploitation, maintenance and use of system.In terminal only One browser need to be installed, SQL Server (Structured Query Language, structuralized query are installed in server Language), the inscriptions on bones or tortoise shells (Oracle), the databases such as MYSQL, browser carries out data interaction with database by server.
Under normal conditions, during browser carries out data interaction with database by server, in order to enable with Family can check that corresponding query result, server need the query result for meeting querying condition being loaded into clothes from database It is engaged in the memory in device, when query result includes more data, more memory source can be occupied.However, due to server In limited memory, if memory shared by query result cannot be discharged in time, with the increase of inquiry operation, in server Memory can exhaust, to the case where slow operation or even card machine occur.
Summary of the invention
The application is intended to solve at least some of the technical problems in related technologies.
For this purpose, first purpose of the application is to propose a kind of method for preventing memory from exhausting, this method can in time to Administrative staff send the warning message of releasing memory, facilitate administrative staff to discharge in time, application server is avoided memory consumption occur Most situation, and then the stability and robustness of server can be improved.
Second purpose of the application is to propose a kind of device for preventing memory from exhausting.
In order to achieve the above object, the application first aspect embodiment proposes a kind of method for preventing memory from exhausting, comprising: when When monitoring the operation of inquiry database, the operation of the inquiry database is intercepted;And for behavior is intercepted every time, judge institute Whether returning the result for the inquiry operation of interception is to preset object then to obtain element in the default object if default object Size, and determine according to the size of element in preassigned and the default object of acquisition the rank of corresponding monitored object, So that monitor supervision platform counts the monitored object for the different stage being collected into, when the monitored object quantity of different stage reaches When corresponding threshold value, the warning message of releasing memory is sent.
The embodiment of the present application prevents the method that memory exhausts, and intercepts the operation of inquiry database, and for interception every time Behavior judges whether returning the result for intercepted inquiry operation is default object, if default object, then obtains default object The size of middle element, and the grade for corresponding to monitored object is determined according to the size of element in preassigned and the default object of acquisition Not, so that monitor supervision platform counts the monitored object for the different stage being collected into, when the monitored object quantity of different stage When reaching corresponding threshold value, the warning message of releasing memory is sent, so that administrative staff are according to the timely releasing memory of warning message, It avoids application server from the case where memory exhausts occur, and then the stability and robustness of server can be improved.
In order to achieve the above object, the application second aspect embodiment proposes a kind of device for preventing memory from exhausting, comprising: block Module is cut, for when monitoring the operation of inquiry database, intercepting the operation of the inquiry database;And processing module, For for behavior is intercepted every time, judging whether returning the result for intercepted inquiry operation is default object, if default pair As then obtaining the size of element in the default object, and according to element in preassigned and the default object of acquisition Size determines the rank of corresponding monitored object, so that monitor supervision platform counts the monitored object for the different stage being collected into, When the monitored object quantity of different stage reaches corresponding threshold value, the warning message of releasing memory is sent.
The embodiment of the present application prevents the device that memory exhausts, and the operation of inquiry database, needle are intercepted by blocking module Behavior is intercepted to each, processing module judges whether returning the result for intercepted inquiry operation is default object, if default Object then obtains the size of element in default object, and true according to the size of element in preassigned and the default object of acquisition Surely the rank of monitored object is corresponded to, so that monitor supervision platform counts the monitored object for the different stage being collected into, works as difference When the monitored object quantity of rank reaches corresponding threshold value, the warning message of releasing memory is sent, so that administrative staff are according to report The alert timely releasing memory of information, avoids application server from the case where memory exhausts occur, and then the stability of server can be improved And robustness.
Detailed description of the invention
Fig. 1 is the flow chart of the method for preventing memory from exhausting of the application one embodiment.
Fig. 2 is the structural schematic diagram of the device for preventing memory from exhausting of the application one embodiment.
Fig. 3 is the structural schematic diagram of the device for preventing memory from exhausting of the application another embodiment.
Specific embodiment
Embodiments herein is described below in detail, examples of the embodiments are shown in the accompanying drawings, wherein from beginning to end Same or similar label indicates same or similar element or element with the same or similar functions.Below with reference to attached The embodiment of figure description is exemplary, it is intended to for explaining the application, and should not be understood as the limitation to the application.
Below with reference to the accompanying drawings the method and device for preventing memory from exhausting of the embodiment of the present application is described.
Fig. 1 is the flow chart of the method for preventing memory from exhausting of the application one embodiment, as shown in Figure 1, in this prevents Depositing the method exhausted includes:
S101 intercepts the operation of the inquiry database when monitoring the operation of inquiry database.
In this embodiment, firstly, creating an interception function based on tangent plane programming, wherein the interception function is mainly used In the inquiry operation that interception application server is sent to database.Then, the inquiry behaviour that application server is sent to database It is monitored, when monitoring the inquiry operation that application server is sent to database, inquires number by intercepting intercepting api calls According to the operation in library.
S102 intercepts behavior for each, judges whether returning the result for intercepted inquiry operation is default object, if To preset object, then the size of element in default object is obtained, and according to element in preassigned and the default object of acquisition Size determines the rank of corresponding monitored object, so that monitor supervision platform counts the monitored object for the different stage being collected into, When the monitored object quantity of different stage reaches corresponding threshold value, the warning message of releasing memory is sent.
After obtaining inquiry database manipulation by intercepting function, it can determine whether that returning the result for intercepted inquiry operation is It is no for default object, wherein above-mentioned default object may include set, above-mentioned set can be set (collection), list (list) and Map (mapping) etc..When above-mentioned inquiry operation return the result be that default object is for example gathered when, can obtain first in default object The size of element is then based on the rank that preassigned determines monitored object corresponding to default object, is determining corresponding monitoring pair After the rank of elephant, the monitored object of appropriate level can print.Wherein, above-mentioned monitored object can include but is not limited to log.
For example, preset standard are as follows: the size of element is less than or equal to 1k in default object, and the rank of corresponding log is DEBUG rank;The size of element is greater than 1k in default object, and is less than or equal to 5k, and the rank of corresponding log is INFO Rank;The size of element is greater than 5k in default object, and is less than or equal to 1M, and the rank of corresponding log is WARN rank; The size of element is greater than 1M in default object, and the rank of corresponding log is ERROR rank.If it is determined that element in default object Size is 25k, can determine that the rank of the default corresponding log of object is WARN rank, exportable WARN according to preset standard The log of rank.
In this embodiment, when the inquiry operation intercepted return the result be not default object when, can check return As a result whether comprising default object in corresponding object properties, if obtaining element in the default object comprising presetting object Size.
For example, do not gather when intercepting returning the result for the inquiry operation that is intercepted of function, when general object, can look into Whether see in the corresponding attribute of object comprising set, if comprising set, gather in element size, and according to calibrating in advance The quasi- size with element in the set obtained determines the rank of the log of corresponding set.
During printing the log of appropriate level, monitor supervision platform collects the log of different stage, and to different stage Log counted, if the quantity of the log of corresponding level be more than corresponding threshold value, monitor supervision platform can by mail and/ Or the mode of short message sends the warning message of different stage to related personnel.Related personnel is in the alarm for receiving monitor supervision platform transmission After information, the memory in application server can be discharged in time according to warning message.
For example it is assumed that the corresponding threshold value of log that INFO rank is arranged in monitor supervision platform is 30000, the day of WARN rank The corresponding threshold value of will is 10000.If the quantity that monitor supervision platform monitors the log of INFO rank has been more than 30000, or The log quantity of person's WARN rank is more than 10000, at this point, monitor supervision platform can be by way of short message or mail to management Personnel send warning message, administrative staff receive monitor supervision platform send warning message after, can timely releasing memory, avoid answering There is the case where memory exhausts with server, and then the stability and robustness of application server can be improved.
The embodiment of the present application prevents the method that memory exhausts, and intercepts the operation of inquiry database, and for interception every time Behavior judges whether returning the result for intercepted inquiry operation is default object, if default object, then obtains default object The size of middle element, and the grade for corresponding to monitored object is determined according to the size of element in preassigned and the default object of acquisition Not, so that monitor supervision platform counts the monitored object for the different stage being collected into, when the monitored object quantity of different stage When reaching corresponding threshold value, the warning message of releasing memory is sent, so that administrative staff are according to the timely releasing memory of warning message, It avoids application server from the case where memory exhausts occur, and then the stability and robustness of server can be improved.
In order to realize above-described embodiment, the application also proposes a kind of device for preventing memory from exhausting.
Fig. 2 is the structural schematic diagram of the device for preventing memory from exhausting of the application one embodiment, as shown in Fig. 2, the dress Set includes: blocking module 100 and processing module 200, in which:
Blocking module 100 is used to intercept the operation of inquiry database when monitoring the operation of inquiry database;And place It manages module 200 and is used for judging whether returning the result for intercepted inquiry operation is default object for behavior is intercepted every time, if To preset object, then the size of element in default object is obtained, and according to element in preassigned and the default object of acquisition Size determines the rank of corresponding monitored object, so that monitor supervision platform counts the monitored object for the different stage being collected into, When the monitored object quantity of different stage reaches corresponding threshold value, the warning message of releasing memory is sent.
Wherein, above-mentioned default object may include set.Above-mentioned set can be set (collection), list (list) and map (mapping) etc., above-mentioned monitored object can include but is not limited to log.
Specifically, when processing module 200 determine inquiry operation return the result be that default object is for example gathered when, can obtain The size that element in object must be preset is then based on the rank that preassigned determines log corresponding to default object, and true Surely after the rank for corresponding to log, the log of appropriate level is printed.
For example, preset standard are as follows: the size of element is less than or equal to 1k in default object, and the rank of corresponding log is DEBUG rank;The size of element is greater than 1k in default object, and is less than or equal to 5k, and the rank of corresponding log is INFO Rank;The size of element is greater than 5k in default object, and is less than or equal to 1M, and the rank of corresponding log is WARN rank; The size of element is greater than 1M in default object, and the rank of corresponding log is ERROR rank.If it is determined that element in default object Size is 25k, and processing module 200 can determine that the rank of the default corresponding log of object is WARN grades according to preset standard Not, and the log of WARN rank is printed.
Above-mentioned blocking module 100 is used to inquire the operation of database by intercepting intercepting api calls.
In addition, the creation module 300 is for intercepting as shown in figure 3, above-mentioned apparatus can also include creation module 300 Before operation of the module by intercepting intercepting api calls inquiry database, function is intercepted based on tangent plane programming creation.
Above-mentioned processing module 200 is also used to: if returning the result for the inquiry operation intercepted is not default object, being checked It returns the result whether comprising default object in corresponding object properties, if obtaining element in default object comprising presetting object Size.
Specifically, it when processing module 200 judges that returning the result for intercepted inquiry operation is not default object, can look into It sees and returns the result whether comprising default object in corresponding object properties, if returning the result in corresponding object properties comprising default Object, then obtain the size of element in corresponding default object, and according in preassigned and the default object of acquisition element it is big The rank of small determining corresponding log works as different stage so that monitor supervision platform counts the log for the different stage being collected into Log quantity when reaching corresponding threshold value, monitor supervision platform sends the warning message of different stage by mail and/or short message.By This, so that administrative staff can avoid application server from the case where memory exhausts occur according to the timely releasing memory of warning message, into And the stability and robustness of application server can be improved.
The process that the device for preventing memory from exhausting prevents memory from exhausting can be found in Fig. 1, not repeat herein.
The embodiment of the present application prevents the device that memory exhausts, and the operation of inquiry database, needle are intercepted by blocking module Behavior is intercepted to each, processing module judges whether returning the result for intercepted inquiry operation is default object, if default Object then obtains the size of element in default object, and true according to the size of element in preassigned and the default object of acquisition Surely the rank of monitored object is corresponded to, so that monitor supervision platform counts the monitored object for the different stage being collected into, works as difference When the monitored object quantity of rank reaches corresponding threshold value, the warning message of releasing memory is sent, so that administrative staff are according to report The alert timely releasing memory of information, avoids application server from the case where memory exhausts occur, and then the stability of server can be improved And robustness.
In the description of this specification, reference term " one embodiment ", " some embodiments ", " example ", " specifically show The description of example " or " some examples " etc. means specific features, structure, material or spy described in conjunction with this embodiment or example Point is contained at least one embodiment or example of the application.In the present specification, schematic expression of the above terms are not It must be directed to identical embodiment or example.Moreover, particular features, structures, materials, or characteristics described can be in office It can be combined in any suitable manner in one or more embodiment or examples.In addition, without conflicting with each other, the skill of this field Art personnel can tie the feature of different embodiments or examples described in this specification and different embodiments or examples It closes and combines.
In addition, term " first ", " second " are used for descriptive purposes only and cannot be understood as indicating or suggesting relative importance Or implicitly indicate the quantity of indicated technical characteristic.Define " first " as a result, the feature of " second " can be expressed or Implicitly include at least one this feature.In the description of the present application, the meaning of " plurality " is at least two, such as two, three It is a etc., unless otherwise specifically defined.
Any process described otherwise above or method description are construed as in flow chart or herein, and expression includes It is one or more for realizing specific logical function or process the step of executable instruction code module, segment or portion Point, and the range of the preferred embodiment of the application includes other realization, wherein can not press shown or discussed suitable Sequence, including according to related function by it is basic simultaneously in the way of or in the opposite order, Lai Zhihang function, this should be by the application Embodiment person of ordinary skill in the field understood.
Expression or logic and/or step described otherwise above herein in flow charts, for example, being considered use In the order list for the executable instruction for realizing logic function, may be embodied in any computer-readable medium, for Instruction execution system, device or equipment (such as computer based system, including the system of processor or other can be held from instruction The instruction fetch of row system, device or equipment and the system executed instruction) it uses, or combine these instruction execution systems, device or set It is standby and use.For the purpose of this specification, " computer-readable medium ", which can be, any may include, stores, communicates, propagates or pass Defeated program is for instruction execution system, device or equipment or the dress used in conjunction with these instruction execution systems, device or equipment It sets.The more specific example (non-exhaustive list) of computer-readable medium include the following: there is the electricity of one or more wirings Interconnecting piece (electronic device), portable computer diskette box (magnetic device), random access memory (RAM), read-only memory (ROM), erasable edit read-only storage (EPROM or flash memory), fiber device and portable optic disk is read-only deposits Reservoir (CDROM).In addition, computer-readable medium can even is that the paper that can print described program on it or other are suitable Medium, because can then be edited, be interpreted or when necessary with it for example by carrying out optical scanner to paper or other media His suitable method is handled electronically to obtain described program, is then stored in computer storage.
It should be appreciated that each section of the application can be realized with hardware, software, firmware or their combination.Above-mentioned In embodiment, software that multiple steps or method can be executed in memory and by suitable instruction execution system with storage Or firmware is realized.It, and in another embodiment, can be under well known in the art for example, if realized with hardware Any one of column technology or their combination are realized: having a logic gates for realizing logic function to data-signal Discrete logic, with suitable combinational logic gate circuit specific integrated circuit, programmable gate array (PGA), scene Programmable gate array (FPGA) etc..
Those skilled in the art are understood that realize all or part of step that above-described embodiment method carries It suddenly is that relevant hardware can be instructed to complete by program, the program can store in a kind of computer-readable storage medium In matter, which when being executed, includes the steps that one or a combination set of embodiment of the method.
It, can also be in addition, can integrate in a processing module in each functional unit in each embodiment of the application It is that each unit physically exists alone, can also be integrated in two or more units in a module.Above-mentioned integrated mould Block both can take the form of hardware realization, can also be realized in the form of software function module.The integrated module is such as Fruit is realized and when sold or used as an independent product in the form of software function module, also can store in a computer In read/write memory medium.
Storage medium mentioned above can be read-only memory, disk or CD etc..Although having been shown and retouching above Embodiments herein is stated, it is to be understood that above-described embodiment is exemplary, and should not be understood as the limit to the application System, those skilled in the art can be changed above-described embodiment, modify, replace and become within the scope of application Type.

Claims (12)

1. a kind of method for preventing memory from exhausting characterized by comprising
When monitoring the operation of inquiry database, the operation of the inquiry database is intercepted;And
Behavior is intercepted for each, judges whether returning the result for intercepted inquiry operation is default object, if default pair As then obtaining the size of element in the default object, and according to element in preassigned and the default object of acquisition Size determines the rank of corresponding monitored object, so that monitor supervision platform counts the monitored object for the different stage being collected into, When the monitored object quantity of different stage reaches corresponding threshold value, the warning message of releasing memory is sent.
2. the method according to claim 1, wherein the operation for intercepting the inquiry database, comprising:
The operation of database is inquired by intercepting intercepting api calls.
3. according to the method described in claim 2, it is characterized in that, in the behaviour for inquiring database by intercepting intercepting api calls Before work, further includes:
It is created based on tangent plane programming and intercepts function.
4. the method according to claim 1, wherein returning the result in the intercepted inquiry operation of the judgement It whether is to determine and correspond in the size according to element in preassigned and the default object of acquisition after presetting object Before the rank of default object, further includes:
If returning the result for the inquiry operation intercepted is not default object, check described returning the result corresponding object properties In whether include the default object, if obtaining the size of element in the default object comprising the default object.
5. method according to claim 1-4, which is characterized in that the default object includes set, the prison Controlling object includes log.
6. according to the method described in claim 5, it is characterized in that, the monitored object quantity when different stage reaches corresponding threshold When value, the monitor supervision platform sends the warning message of different stage by mail and/or short message.
7. a kind of device for preventing memory from exhausting characterized by comprising
Blocking module, for when monitoring the operation of inquiry database, intercepting the operation of the inquiry database;And
Processing module, for for behavior is intercepted every time, judging whether returning the result for intercepted inquiry operation is default pair As if default object, then obtaining the size of element in the default object, and preset according to preassigned and the described of acquisition The size of element determines the rank of corresponding monitored object in object, so that monitoring pair of the monitor supervision platform to the different stage being collected into As being counted, when the monitored object quantity of different stage reaches corresponding threshold value, the warning message of releasing memory is sent.
8. device according to claim 7, which is characterized in that the blocking module is used for:
The operation of database is inquired by intercepting intercepting api calls.
9. device according to claim 8, which is characterized in that further include:
Creation module, for being based on section before the blocking module inquires the operation of database by interception intercepting api calls Programming creation intercepts function.
10. device according to claim 7, which is characterized in that the processing module is also used to:
If returning the result for the inquiry operation intercepted is not default object, check described returning the result corresponding object properties In whether include the default object, if obtaining the size of element in the default object comprising the default object.
11. according to the described in any item devices of claim 7-10, which is characterized in that the default object includes set, described Monitored object includes log.
12. device according to claim 11, which is characterized in that when the monitored object quantity of different stage reaches corresponding When threshold value, the monitor supervision platform sends the warning message of different stage by mail and/or short message.
CN201410642496.2A 2014-11-07 2014-11-07 Prevent the method and device that memory exhausts Active CN105574055B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410642496.2A CN105574055B (en) 2014-11-07 2014-11-07 Prevent the method and device that memory exhausts

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410642496.2A CN105574055B (en) 2014-11-07 2014-11-07 Prevent the method and device that memory exhausts

Publications (2)

Publication Number Publication Date
CN105574055A CN105574055A (en) 2016-05-11
CN105574055B true CN105574055B (en) 2019-02-26

Family

ID=55884194

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410642496.2A Active CN105574055B (en) 2014-11-07 2014-11-07 Prevent the method and device that memory exhausts

Country Status (1)

Country Link
CN (1) CN105574055B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI644210B (en) * 2017-09-08 2018-12-11 群聯電子股份有限公司 Memory management method, memory control circuit unit and memory storage apparatus
CN110362451B (en) * 2019-07-17 2023-09-26 北京小米移动软件有限公司 Monitoring method, device and medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101446914A (en) * 2007-11-26 2009-06-03 阿里巴巴集团控股有限公司 Database monitoring method and device
CN101763389A (en) * 2008-12-23 2010-06-30 中兴通讯股份有限公司 Device and method for controlling database resource
CN102902752A (en) * 2012-09-20 2013-01-30 新浪网技术(中国)有限公司 Method and system for monitoring log
CN103502925A (en) * 2012-12-21 2014-01-08 华为技术有限公司 Management method and device of monitoring records

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060200450A1 (en) * 2005-03-04 2006-09-07 Microsoft Corporation Monitoring health of actively executing computer applications
JP5444673B2 (en) * 2008-09-30 2014-03-19 富士通株式会社 Log management method, log management device, information processing device including log management device, and program

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101446914A (en) * 2007-11-26 2009-06-03 阿里巴巴集团控股有限公司 Database monitoring method and device
CN101763389A (en) * 2008-12-23 2010-06-30 中兴通讯股份有限公司 Device and method for controlling database resource
CN102902752A (en) * 2012-09-20 2013-01-30 新浪网技术(中国)有限公司 Method and system for monitoring log
CN103502925A (en) * 2012-12-21 2014-01-08 华为技术有限公司 Management method and device of monitoring records

Also Published As

Publication number Publication date
CN105574055A (en) 2016-05-11

Similar Documents

Publication Publication Date Title
US20240086421A1 (en) Method and Apparatus for Monitoring an In-memory Computer System
CN105095056B (en) A kind of method of data warehouse data monitoring
CN102340415B (en) Server cluster system and monitoring method thereof
CN102801785B (en) System and method for monitoring advertisement putting engine
CN109726209A (en) Log aggregation method and device
CN105302697A (en) Running state monitoring method and system of density data model database
CN109409096A (en) Kernel loophole restorative procedure, device, server and system
CN105656699A (en) Alarm management method and system for content distribution network
CN102231161A (en) Method for synchronously verifying and monitoring databases
CN112698915A (en) Multi-cluster unified monitoring alarm method, system, equipment and storage medium
CN105868878B (en) The Risk Identification Method and device of MAC Address
CN111740868B (en) Alarm data processing method and device and storage medium
CN109240876A (en) Example monitoring method, computer readable storage medium and terminal device
CN109992473A (en) Monitoring method, device, equipment and the storage medium of application system
CN109492406A (en) Monitor the methods, devices and systems of kernel loophole attack
JP2020057416A (en) Method and device for processing data blocks in distributed database
CN110413434A (en) The abnormality recognition method and device of server
CN105574055B (en) Prevent the method and device that memory exhausts
CN109558299A (en) Business monitoring and the method, apparatus of early warning, equipment and storage medium
CN109510730A (en) Distributed system and its monitoring method, device, electronic equipment and storage medium
CN115981950A (en) Monitoring alarm method, device, equipment and computer readable storage medium
CN105607983A (en) Data exception monitoring method and apparatus
CN115185778A (en) Database monitoring method and device
CN114416560A (en) Program crash analysis aggregation method and system
CN115150253A (en) Fault root cause determination method and device and electronic equipment

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20201010

Address after: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands

Patentee after: Innovative advanced technology Co.,Ltd.

Address before: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands

Patentee before: Advanced innovation technology Co.,Ltd.

Effective date of registration: 20201010

Address after: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands

Patentee after: Advanced innovation technology Co.,Ltd.

Address before: A four-storey 847 mailbox in Grand Cayman Capital Building, British Cayman Islands

Patentee before: Alibaba Group Holding Ltd.

TR01 Transfer of patent right