CN106201827B - Monitoring data collection method and system - Google Patents

Monitoring data collection method and system Download PDF

Info

Publication number
CN106201827B
CN106201827B CN201610552164.4A CN201610552164A CN106201827B CN 106201827 B CN106201827 B CN 106201827B CN 201610552164 A CN201610552164 A CN 201610552164A CN 106201827 B CN106201827 B CN 106201827B
Authority
CN
China
Prior art keywords
probe
target
monitoring data
application
identity
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610552164.4A
Other languages
Chinese (zh)
Other versions
CN106201827A (en
Inventor
崔喜龙
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Neusoft Corp
Original Assignee
Neusoft Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Neusoft Corp filed Critical Neusoft Corp
Priority to CN201610552164.4A priority Critical patent/CN106201827B/en
Publication of CN106201827A publication Critical patent/CN106201827A/en
Application granted granted Critical
Publication of CN106201827B publication Critical patent/CN106201827B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/3003Monitoring arrangements specially adapted to the computing system or computing system component being monitored
    • G06F11/302Monitoring arrangements specially adapted to the computing system or computing system component being monitored where the computing system component is a software system
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/3089Monitoring arrangements determined by the means or processing involved in sensing the monitored data, e.g. interfaces, connectors, sensors, probes, agents

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Quality & Reliability (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • Mathematical Physics (AREA)
  • Stored Programmes (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a kind of monitoring data collection method and system.System includes at least one probe, and for acquiring the monitoring data of at least one application, probe and application are corresponded.Method includes:Obtain the monitoring data of at least one application by least one probe collection, wherein each probe configuration has associated probe identity, and probe identity is for indicating whether designated user has the supervision authority to application corresponding to associated probe;According to probe identity, target-probe is determined, wherein target-probe includes at least one described probe, and probe identity indicates that designated user has the probe to the supervision authority of application corresponding to associated probe;The monitoring data that storage target-probe is got.In this way, the differentiated demand of these users can be met by only disposing a set of supervisory control and data acquisition system, so as to reduce the lower deployment cost of system, be easy to system upgrade and maintenance for the user with different monitoring permission.

Description

Monitoring data collection method and system
Technical field
The present invention relates to apply data monitoring field, and in particular, to a kind of monitoring data collection method and system.
Background technique
User can carry out data monitoring to application by supervisory control and data acquisition system.In general, system developer can be with Corresponding probe is disposed for user's each application to be monitored, the monitoring data of corresponding application is obtained by probe.Sometimes, System can be there are many different versions, for example, free version, personal version, enterprise version etc..Since different editions correspond to different monitoring Permission, therefore, the application that can be monitored using the user of the system of different editions are also different.When faced with this situation, In the related technology, every kind of version is needed all to dispose a set of supervisory control and data acquisition system, this just considerably increases being deployed to for system Originally, upgrade cost and maintenance cost.
Summary of the invention
The object of the present invention is to provide a kind of monitoring data collection method and system, so as to solve the deficiencies in the prior art.
To achieve the goals above, the present invention provides a kind of monitoring data collection method, is applied to monitoring data collection system System, the system comprises at least one probes, for acquiring the monitoring data of at least one application, the probe and the application It corresponds, the method includes:Obtain the monitoring number of at least one application by least one probe collection According to, wherein each probe configuration has associated probe identity, and the probe identity is for indicating whether designated user has There is the supervision authority to application corresponding to associated probe;According to the probe identity, target-probe is determined, wherein institute Stating target-probe includes at least one described probe, and it is right to associated probe institute that probe identity indicates that designated user has The probe of the supervision authority for the application answered;Store the monitoring data that the target-probe is got.
Optionally, it is described obtain by least one probe collection at least one application monitoring data the step of it Before, the method also includes:Obtain the subscriber identity information of active user;According to the subscriber identity information, work as described in judgement Whether preceding user is the designated user;When determining the active user is the designated user, executes the acquisition and pass through The step of monitoring data of at least one application of at least one probe collection.
Optionally, it is described obtain by least one probe collection at least one application monitoring data the step of it Before, the method also includes:Obtain the authority information of the designated user;According to the authority information, the specified use is determined Family has the application of supervision authority;According to the determination of the application to the designated user with supervision authority as a result, for each institute State the associated probe identity of probe configuration.
Optionally, the probe identity is also used to indicate the designated user to application corresponding to associated probe Target monitoring data;Described according to the probe identity, after the step of determining target-probe, the method also includes:Root According to the probe identity, the target monitoring data are filtered out from the monitoring data that the target-probe is got;And institute Stating the step of storing the monitoring data that the target-probe is got includes:Store the monitoring number got from the target-probe The target monitoring data filtered out in.
Optionally, the method also includes:Target monitoring DB definition instruction is received, the target monitoring data definition refers to It enables and is used to indicate the target monitoring data that the designated user is directed to target application;Referred to according to the target monitoring data definition It enables, is the associated probe identity of probe configuration corresponding to the target application.
Optionally, the method also includes:Receive the probe identity invalidation request for specified probe;In response to the spy The request of needle indicating failure releases the specified probe and the association between the associated probe identity of the specified probe.
Optionally, the method also includes:Judge whether the specified probe is one of described target-probe;Determining Stating specified probe is the target-probe a period of time, the monitoring data that the specified probe stored before deleting obtains.
Optionally, the method also includes:Show at least part in stored monitoring data.
The present invention also provides a kind of supervisory control and data acquisition system, the system comprises:At least one probe, for acquiring extremely The monitoring data of a few application, the probe and the application correspond, wherein each probe configuration has associated Probe identity, the probe identity is for indicating whether designated user has the prison to application corresponding to associated probe Control permission;Data acquisition module, for obtaining the monitoring for passing through at least one application described at least one described probe collection Data;Target-probe determining module determines target-probe for according to the probe identity, wherein the target-probe includes In at least one described probe, probe identity indicates that designated user has the monitoring to application corresponding to associated probe The probe of permission;Memory module, the monitoring data got for storing the target-probe.
Optionally, the system also includes:Subscriber identity information obtains module, for obtaining the user identity of active user Information;First judgment module, for judging whether the active user is the specified use according to the subscriber identity information Family;The data acquisition module is used to obtain when the first judgment module determines that the active user is the designated user Take the monitoring data by least one application described at least one described probe collection.
Optionally, the system also includes:Permission acquisition module, the permission for obtaining the designated user are believed Breath;Using determining module, for determining that the designated user has the application of supervision authority according to the authority information;And Configuration module is identified, for there is the determining for application of supervision authority to tie the designated user using determining module according to described Fruit is each associated probe identity of probe configuration.
Optionally, the probe identity is also used to indicate the designated user to application corresponding to associated probe Target monitoring data;And the system also includes:Data filtering module is used for according to the probe identity, from the target The target monitoring data are filtered out in the monitoring data that probe is got;And the memory module is for storing the data The target monitoring data that filtering module is filtered out from the monitoring data that the target-probe is got.
Optionally, the system also includes:First receiving module, it is described for receiving target monitoring DB definition instruction Target monitoring DB definition instruction is used to indicate the target monitoring data that the designated user is directed to target application;Mark configuration mould Block, for being the associated spy of probe configuration corresponding to the target application according to the target monitoring DB definition instruction Needle mark.
Optionally, the system also includes:Second receiving module, for receiving the probe identity failure for being directed to specified probe Request;Identify configuration module, in response to the probe identity invalidation request, release the specified probe with and described specify Association between the associated probe identity of probe.
Optionally, the system also includes:Second judgment module, for judging whether the specified probe is the target One of probe;Data removing module, for second judgment module determine the specified probe be the target-probe it For the moment, the monitoring data that the specified probe stored before deleting obtains.
Optionally, the system also includes:Data exhibiting module, for showing at least one in stored monitoring data Part.
In the above-mentioned technical solutions, the monitoring data all applied can be got by each probe.Each probe tool There is associated probe identity, system can filter out and user monitoring permission according to the associated probe identity of each probe Corresponding target-probe stores the monitoring data that these target-probes are got later, so that the user uses in the future.This Sample, for the user with different monitoring permission, only disposing a set of supervisory control and data acquisition system can meet these users' Differentiated demand is easy to system upgrade and maintenance so as to reduce the lower deployment cost of system, and upgrade and maintenance cost compared with It is low.
Other features and advantages of the present invention will the following detailed description will be given in the detailed implementation section.
Detailed description of the invention
The drawings are intended to provide a further understanding of the invention, and constitutes part of specification, with following tool Body embodiment is used to explain the present invention together, but is not construed as limiting the invention.In the accompanying drawings:
Fig. 1 is a kind of flow chart of the monitoring data collection method provided according to an exemplary embodiment.
Fig. 2 is a kind of flow chart of the monitoring data collection method provided according to another exemplary embodiment.
Fig. 3 is a kind of flow chart of the monitoring data collection method provided according to another exemplary embodiment.
Fig. 4 is a kind of flow chart of the monitoring data collection method provided according to another exemplary embodiment.
Fig. 5 is a kind of block diagram of the supervisory control and data acquisition system provided according to an exemplary embodiment.
Specific embodiment
Below in conjunction with attached drawing, detailed description of the preferred embodiments.It should be understood that this place is retouched The specific embodiment stated is merely to illustrate and explain the present invention, and is not intended to restrict the invention.
Fig. 1 is a kind of flow chart of the monitoring data collection method provided according to an exemplary embodiment, wherein this method It can be applied to supervisory control and data acquisition system.The supervisory control and data acquisition system may include at least one probe, such as subsequent Fig. 5 Shown in probe 101~10N, wherein N >=1.These probes are used to acquire the monitoring data of at least one application, wherein probe It is corresponded with application.Illustratively, probe 101With apply 201It is corresponding, for acquiring this using 201Monitoring data;Probe 102With apply 202It is corresponding, for acquiring this using 202Monitoring data;And so on.
With reference to Fig. 1, monitoring data collection method provided by the invention be may comprise steps of.
In a step 101, the monitoring data of at least one application by least one probe collection is obtained, wherein every A probe configuration has associated probe identity, and the probe identity is for indicating whether designated user has to associated probe The supervision authority of corresponding application.
In the present invention, each probe can have associated probe identity, and the probe identity of each probe can To be unique.System can be according to the supervision authority of designated user, for the associated probe identity of each probe configuration.
Illustratively, system can obtain the authority information of designated user first, wherein the authority information can indicate be Unite can monitor all using (for example, shown in fig. 5 apply 201~20N) in, designated user has supervision authority Using.Later, system can determine that designated user has the application of supervision authority, and foundation according to the authority information got The definitive result is the associated probe identity of each probe configuration.Illustratively, each probe identity can include but is not limited to Following information:The id information of associated probe, and, for indicating it is right to associated probe institute whether designated user has The instruction information indicator of the supervision authority for the application answered, wherein as indicator=0, indicate the designated user not With the supervision authority to application, as indicator=1, indicate that the designated user has the supervision authority of corresponding application.
For example, it is assumed that some designated user has the application of supervision authority for using 201With apply 202.So, system is Using 201The value of indicator this information element in the probe identity configured is 1, for using 202The probe configured The value of indicator this information element in mark is 1, for using 203~apply 20NIn the probe identity configured The value of this information element of indicator is 0.
Illustratively, in system probe identity associated for each probe configuration, probe identity can be written related In the configuration file of the probe of connection.
In a step 102, according to probe identity, target-probe is determined, wherein target-probe includes at least one described spy In needle, probe identity indicates that designated user has the probe to the supervision authority of application corresponding to associated probe.
Illustratively, system can be from whole probes (as shown in Figure 5 101~10N) in, it will be 1 comprising being worth Probe associated by the probe identity of indicator screens, and the probe that these are filtered out is determined as target-probe.
In step 103, the monitoring data that storage target-probe is got.
In this way, system can be directed to designated user, the monitoring of its application with supervision authority is stored for the designated user Data.In this way, the designated user can carry out data query, data exhibiting etc. according to demand at any time.Do not have for designated user The application of standby supervision authority, system can filter out the monitoring data of these applications, and without storage, so realize data every From.
In the above-mentioned technical solutions, the monitoring data all applied can be got by each probe.Each probe tool There is associated probe identity, system can filter out and user monitoring permission according to the associated probe identity of each probe Corresponding target-probe stores the monitoring data that these target-probes are got later, so that the user uses in the future.This Sample, for the user with different monitoring permission, only disposing a set of supervisory control and data acquisition system can meet these users' Differentiated demand.For example, being directed to the user of different monitoring permission, need to be only adapted for each probe configuration and user monitoring permission Probe identity.It, can be from by probe identity in this way, system is after the monitoring data for getting each probe collection In filter out the monitoring data for meeting the limitation of user monitoring permission, and store the monitoring data that filters out for user.Pass through this Mode, without disposing corresponding acquisition system respectively for each user with different monitoring permission, so as to drop The lower deployment cost of low system is easy to system upgrade and maintenance, and upgrading and maintenance cost are lower.
In order to ensure the safety of monitoring data, optionally, system is before the monitoring data for obtaining probe collection, first Authentication is carried out to the active user of system.When determining active user is designated user, the monitoring of probe collection is just obtained Data.Fig. 2 is a kind of flow chart of the monitoring data collection method provided according to this exemplary embodiment.As shown in Fig. 2, On the basis of method shown in FIG. 1, this method may also comprise the following steps:.
In step 201, the subscriber identity information of active user is obtained.
Illustratively, the subscriber identity information of active user can for example including but be not limited to:The user name of active user and Encrypted message.
In step 202, according to the subscriber identity information, judge whether active user is designated user.
Illustratively, it can be previously stored with the subscriber identity information of designated user in systems.Judging that active user is Not no when being designated user, system can be by comparing the subscriber identity information of active user and the subscriber identity information of designated user It is whether consistent, to obtain judgement result.For example, in the subscriber identity information of active user and the subscriber identity information of designated user When consistent, system determines that active user is designated user.In the subscriber identity information of active user and user's body of designated user When part information is inconsistent, system determines that active user is not designated user.When determining active user is designated user, step is executed Rapid 101 and subsequent step.When determining active user not is designated user, system can refuse any operation of active user, And it will not turn-on data monitoring.Thereby, it is possible to enhance the safety for applying data.
In another embodiment of the present invention, the associated probe identity of each probe is specified in addition to can be used to indicate that Whether user has except the supervision authority to corresponding application, may be used to indicate that designated user to associated probe The target monitoring data of corresponding application.For example, probe identity may include following information:The ID of associated probe believes Breath, for indicating whether designated user has the instruction information to the supervision authority of application corresponding to associated probe The data type information of application corresponding to indicator and associated probe, wherein the data type information is used for Indicate designated user to the data type of the desired target monitoring data of the application.
Illustratively, designated user can define its desired target monitoring data for being directed to target application, wherein target is answered With can be designated user have supervision authority application any one of or more persons.When user carries out target monitoring data definition After operation, system can receive corresponding target monitoring DB definition instruction.By parsing to the instruction, system can be obtained Know that target application be the data types of which and target monitoring data is.Next, system can be supervised according to the target DB definition instruction is controlled, is the associated probe identity of probe configuration corresponding to target application, so that the probe identity can Designated user is represented to the data type of the desired target monitoring data of the target application.
In this embodiment, as shown in figure 3, after step 102, the above method can also include the following steps.
In step 301, according to probe identity, target monitoring number is filtered out from the monitoring data that target-probe is got According to.
Illustratively, it is assumed that target-probe includes probe 101With probe 102, and in probe 101Associated probe identity In include the first data type information, wherein first data type information is for indicating that designated user is directed to using 201It is expected that Target monitoring data data type, and in probe 102It include the second data type information in associated probe identity, Wherein, second data type information is for indicating that designated user is directed to using 202The data class of desired target monitoring data Type.In this way, system can be according to probe 10 when executing step 3011Associated probe identity, from probe 101It gets The monitoring data for meeting data type represented by first data type information is filtered out in monitoring data, as application 201Target monitoring data, and from probe 102It is filtered out in the monitoring data got and meets second data type information The monitoring data of represented data type, as using 202Target monitoring data.
In this case, step 103 shown in Fig. 1 becomes:Storage is from the monitoring data that target-probe is got The target monitoring data filtered out.
As a result, when the user with identical supervision authority has different monitoring demands to some application, for example, user The monitoring data D1 of A1 is applied in U1 expectation monitoring, and the monitoring data D2 of A1 is applied in user U2 expectation monitoring, these demands are different User can define the data type of respective desired target monitoring data.Then, system can be supervised according to user-defined target The data type of data is controlled, is the associated probe identity of probe configuration of respective application.In this way, by subsequent according to probe mark Know and carry out data filtering, different designated users can get the target monitoring data for meeting respective demand.And for user The monitoring data being not concerned with, system can be without storages, so as to save memory space.
When the type of the target monitoring data of designated user changes, for example, user U1 expectation monitoring is using A1's Monitoring data D1 and monitoring data D2, then user can redefine for the target monitoring data using A1.System can also be with In the manner described above, the target monitoring data newly defined according to user reconfigure probe identity for the corresponding probe of application A1.
In addition, designated user can also request the probe identity of some probe to fail at any time according to self-demand.When specified When user issues request, specifically, as shown in figure 4, the above method can also include the following steps:
In step 401, the probe identity invalidation request for specified probe is received.Wherein, specifying probe is specified use Family is with supervision authority using any one of corresponding probe or more persons.
In step 402, in response to the probe identity invalidation request, release the specified probe with and this specify probe related Association between the probe identity of connection.
For example, the designated user can issue and be directed to when designated user's confirmation does not need to be monitored some application This applies the probe identity invalidation request of corresponding probe.System can release the spy after receiving this invalidation request Association between needle and associated probe identity.In this way, when system determines target-probe from whole probes, due to the spy Needle does not have associated probe identity, and therefore, system would know that application and the non-user application to be monitored corresponding to the probe, System would not also store the monitoring data by the probe collection, these monitoring datas can be filtered in the data filtering stage.
Moreover it is preferred that as shown in figure 4, the above method can also include:
In step 403, judge whether specified probe is one of target-probe.
In step 404, determining that specified probe is target-probe a period of time, the specified probe stored before deleting obtains Monitoring data.
That is, if stored before system in relation to the monitoring data for specifying probe to get, it should releasing With simultaneously or after associated between the associated probe identity of the specified probe, system can also delete specified probe Store before by the monitoring data for specifying probe to get, to save memory space, reduce useless monitoring data to being The occupancy of system memory space.
In addition, system can answer user demand after system stores monitoring data, at least one in monitoring data Part is showed.Illustratively, system can all show the monitoring data stored.Alternatively, system can be by this The monitoring data newly stored in secondary data acquisition is showed.Alternatively, the data query of the available user of system instructs, And instructed according to the data query, inquiry meets the monitoring data of data query instruction from the monitoring data of storage, later, The monitoring data inquired show, etc..In the present invention, data exhibiting mode can for example including but it is unlimited In:Table shows, curve graph shows, pie chart shows, histogram shows etc..By data exhibiting, it is more clear that family can be used Monitoring data that is clear, intuitively knowing application understands application performance convenient for user.
Fig. 5 is a kind of block diagram of the supervisory control and data acquisition system 500 provided according to an exemplary embodiment.As shown in figure 5, The system 500 may include:At least one probe is (for example, the probe 10 shown in Fig. 51~10N), data acquisition module 30, target Probe determining module 40 and memory module 50.
Wherein, at least one probe is used to acquire the monitoring data of at least one application, also, probe and application one are a pair of It answers.Illustratively, probe 101With apply 201It is corresponding, for acquiring this using 201Monitoring data;Probe 102With apply 202Phase It is corresponding, for acquiring this using 202Monitoring data;And so on.In addition, each probe configuration has associated probe mark Know, the probe identity is for indicating whether designated user has the supervision authority to application corresponding to associated probe.
Data acquisition module 30 is used to obtain the prison of at least one application by least one probe collection Control data.
Target-probe determining module 40 is used to determine target-probe, wherein the target-probe according to the probe identity Including at least one described probe, probe identity indicates that designated user has to application corresponding to associated probe The probe of supervision authority.
Memory module 50 is for storing the monitoring data that the target-probe is got.
In the above-mentioned technical solutions, the monitoring data all applied can be got by each probe.Each probe tool There is associated probe identity, system can filter out and user monitoring permission according to the associated probe identity of each probe Corresponding target-probe stores the monitoring data that these target-probes are got later, so that the user uses in the future.This Sample, for the user with different monitoring permission, only disposing a set of supervisory control and data acquisition system can meet these users' Differentiated demand.For example, being directed to the user of different monitoring permission, need to be only adapted for each probe configuration and user monitoring permission Probe identity.It, can be from by probe identity in this way, system is after the monitoring data for getting each probe collection In filter out the monitoring data for meeting the limitation of user monitoring permission, and store the monitoring data that filters out for user.Pass through this Mode, without disposing corresponding acquisition system respectively for each user with different monitoring permission, so as to drop The lower deployment cost of low system is easy to system upgrade and maintenance, and upgrading and maintenance cost are lower.
Optionally, the system 500 can also include:Subscriber identity information obtains module, for obtaining active user's Subscriber identity information;First judgment module, for judging whether the active user is described according to the subscriber identity information Designated user;The data acquisition module 30 is used to determine that the active user is the specified use in the first judgment module When family, the monitoring data of at least one application by least one probe collection is obtained.
Optionally, the system 500 can also include:Permission acquisition module, for obtaining the designated user's Authority information;Using determining module, for determining that the designated user has answering for supervision authority according to the authority information With;And mark configuration module, for according to the application using determining module to the designated user with supervision authority Determination as a result, be each associated probe identity of probe configuration.
Optionally, the probe identity is also used to indicate the designated user to application corresponding to associated probe Target monitoring data;And the system 500 can also include:Data filtering module, for according to the probe identity, from The target monitoring data are filtered out in the monitoring data that the target-probe is got;And the memory module 50 is for depositing Store up the target monitoring data that the data filtering module is filtered out from the monitoring data that the target-probe is got.
Optionally, the system 500 can also include:First receiving module refers to for receiving target monitoring data definition It enables, the target monitoring DB definition instruction is used to indicate the target monitoring data that the designated user is directed to target application;Mark Configuration module is known, for being probe configuration phase corresponding to the target application according to the target monitoring DB definition instruction Associated probe identity.
Optionally, the system 500 can also include:Second receiving module, for receiving the probe for being directed to specified probe Indicating failure request;Identify configuration module, in response to the probe identity invalidation request, release the specified probe with and Association between the associated probe identity of specified probe.
Optionally, the system 500 can also include:Second judgment module, for judge the specified probe whether be One of described target-probe;Data removing module, for determining that the specified probe is the mesh in second judgment module Mark probe for the moment, the monitoring data that the specified probe stored before deleting obtains.
Optionally, the system 500 can also include:Data exhibiting module, for showing in stored monitoring data At least part.
About the device in above-described embodiment, wherein modules execute the concrete mode of operation in related this method Embodiment in be described in detail, no detailed explanation will be given here.
It is described the prefered embodiments of the present invention in detail above in conjunction with attached drawing, still, the present invention is not limited to above-mentioned realities The detail in mode is applied, within the scope of the technical concept of the present invention, a variety of letters can be carried out to technical solution of the present invention Monotropic type, these simple variants all belong to the scope of protection of the present invention.
It is further to note that specific technical features described in the above specific embodiments, in not lance In the case where shield, it can be combined in any appropriate way.In order to avoid unnecessary repetition, the present invention to it is various can No further explanation will be given for the combination of energy.
In addition, various embodiments of the present invention can be combined randomly, as long as it is without prejudice to originally The thought of invention, it should also be regarded as the disclosure of the present invention.

Claims (14)

1. a kind of monitoring data collection method is applied to supervisory control and data acquisition system, the system comprises at least one probes, use In the monitoring data for acquiring at least one application, the probe and the application are corresponded, which is characterized in that the method packet It includes:
Obtain the monitoring data of at least one application by least one probe collection, wherein each spy Needle is configured with associated probe identity, and the probe identity is for indicating whether designated user has to associated probe institute The supervision authority of corresponding application, and the instruction designated user is to the target monitoring of application corresponding to associated probe Data;
According to the probe identity, target-probe is determined, wherein the target-probe includes at least one described probe, Probe identity indicates that designated user has the probe to the supervision authority of application corresponding to associated probe;
According to the probe identity, the target monitoring data are filtered out from the monitoring data that the target-probe is got;
Store the target monitoring data filtered out from the monitoring data that the target-probe is got.
2. the method according to claim 1, wherein being obtained through at least one probe collection at least described Before the step of monitoring data of one application, the method also includes:
Obtain the subscriber identity information of active user;
According to the subscriber identity information, judge whether the active user is the designated user;
When determining the active user is the designated user, described obtain through at least one probe collection at least is executed The step of monitoring data of one application.
3. the method according to claim 1, wherein being obtained through at least one probe collection at least described Before the step of monitoring data of one application, the method also includes:
Obtain the authority information of the designated user;
According to the authority information, determine that the designated user has the application of supervision authority;
It is according to the determination of the application to the designated user with supervision authority as a result, associated for each probe configuration Probe identity.
4. the method according to claim 1, wherein the method also includes:
Target monitoring DB definition instruction is received, the target monitoring DB definition instruction is used to indicate the designated user and is directed to The target monitoring data of target application;
It is the associated probe mark of probe configuration corresponding to the target application according to the target monitoring DB definition instruction Know.
5. the method according to claim 1, wherein the method also includes:
The probe identity invalidation request for specified probe is received, the specified probe is that the designated user has supervision authority Using any one of corresponding probe or more persons;
In response to the probe identity invalidation request, release the specified probe with and the associated probe mark of the specified probe Association between knowledge.
6. according to the method described in claim 5, it is characterized in that, the method also includes:
Judge whether the specified probe is one of described target-probe;
Determining that the specified probe is the target-probe a period of time, the prison that the specified probe stored before deleting obtains Control data.
7. method according to claim 1 to 6, which is characterized in that the method also includes:
Show at least part in stored monitoring data.
8. a kind of supervisory control and data acquisition system, which is characterized in that the system comprises:
At least one probe, for acquiring the monitoring data of at least one application, the probe and the application are corresponded, In, each probe configuration has an associated probe identity, and the probe identity is for indicating whether designated user has pair The supervision authority of application corresponding to associated probe, and the instruction designated user is to corresponding to associated probe The target monitoring data of application;
Data acquisition module, for obtaining the monitoring number for passing through at least one application described at least one described probe collection According to;
Target-probe determining module determines target-probe for according to the probe identity, wherein the target-probe includes In at least one described probe, probe identity indicates that designated user has the monitoring to application corresponding to associated probe The probe of permission;
Data filtering module, for being filtered out from the monitoring data that the target-probe is got according to the probe identity The target monitoring data;
Memory module is filtered out from the monitoring data that the target-probe is got for storing the data filtering module The target monitoring data.
9. system according to claim 8, which is characterized in that the system also includes:
Subscriber identity information obtains module, for obtaining the subscriber identity information of active user;
First judgment module, for judging whether the active user is the designated user according to the subscriber identity information;
The data acquisition module is used to obtain when the first judgment module determines that the active user is the designated user Take the monitoring data by least one application described at least one described probe collection.
10. system according to claim 8, which is characterized in that the system also includes:
Permission acquisition module, for obtaining the authority information of the designated user;
Using determining module, for determining that the designated user has the application of supervision authority according to the authority information;And
Configuration module is identified, for there is the application of supervision authority really to the designated user using determining module according to described Determine as a result, being each associated probe identity of probe configuration.
11. system according to claim 8, which is characterized in that the system also includes:
First receiving module, for receiving target monitoring DB definition instruction, the target monitoring DB definition instruction is for referring to Show that the designated user is directed to the target monitoring data of target application;
Configuration module is identified, for being probe corresponding to the target application according to the target monitoring DB definition instruction Configure associated probe identity.
12. system according to claim 8, which is characterized in that the system also includes:
Second receiving module, for receiving the probe identity invalidation request for being directed to specified probe, the specified probe is the finger User is determined with supervision authority using any one of corresponding probe or more persons;
Identify configuration module, in response to the probe identity invalidation request, release the specified probe with and described specify Association between the associated probe identity of probe.
13. system according to claim 12, which is characterized in that the system also includes:
Second judgment module, for judging whether the specified probe is one of described target-probe;
Data removing module, for determining that the specified probe is the target-probe a period of time in second judgment module, The monitoring data that the specified probe stored before deleting obtains.
14. the system according to any one of claim 8-13, which is characterized in that the system also includes:
Data exhibiting module, for showing at least part in stored monitoring data.
CN201610552164.4A 2016-07-13 2016-07-13 Monitoring data collection method and system Active CN106201827B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610552164.4A CN106201827B (en) 2016-07-13 2016-07-13 Monitoring data collection method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610552164.4A CN106201827B (en) 2016-07-13 2016-07-13 Monitoring data collection method and system

Publications (2)

Publication Number Publication Date
CN106201827A CN106201827A (en) 2016-12-07
CN106201827B true CN106201827B (en) 2018-11-27

Family

ID=57477849

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610552164.4A Active CN106201827B (en) 2016-07-13 2016-07-13 Monitoring data collection method and system

Country Status (1)

Country Link
CN (1) CN106201827B (en)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107222331B (en) * 2017-04-26 2019-12-06 东软集团股份有限公司 method and device for monitoring performance of distributed application system, storage medium and equipment
CN108255672B (en) * 2017-12-29 2021-08-06 东软集团股份有限公司 Data verification method and device, storage medium and electronic equipment
CN108459944A (en) * 2018-03-29 2018-08-28 中科创能实业有限公司 System operation monitoring method, device and server
CN109032884B (en) * 2018-06-11 2021-05-28 平安科技(深圳)有限公司 Monitoring data processing method, server and computer readable storage medium
CN109598108B (en) * 2018-10-31 2020-11-03 东软集团股份有限公司 Program product selling method, block link point, storage medium, and block link system
CN111062009A (en) * 2019-12-18 2020-04-24 国网山东省电力公司泰安供电公司 Power system information authority management method, system, terminal and storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1525668A (en) * 2003-05-02 2004-09-01 北京中星微电子有限公司 A remote wireless monitoring system and method thereof
CN101483545A (en) * 2008-12-31 2009-07-15 中国建设银行股份有限公司 Financial service monitoring method and system
CN101753832A (en) * 2008-12-04 2010-06-23 北京中星微电子有限公司 Cloud mirror control method in video monitoring system, system and central platform server
CN102739802A (en) * 2012-07-06 2012-10-17 广东电网公司汕头供电局 Service application-oriented IT contralized operation and maintenance analyzing system
CN105446875A (en) * 2014-11-18 2016-03-30 国网山东省电力公司 SAP platform based monitoring method and monitoring system for interface and system

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8181069B2 (en) * 2009-09-08 2012-05-15 International Business Machines Corporation Method and system for problem determination using probe collections and problem classification for the technical support services
US9923808B2 (en) * 2012-10-09 2018-03-20 Netscout Systems, Inc. System and method for real-time load balancing of network packets

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1525668A (en) * 2003-05-02 2004-09-01 北京中星微电子有限公司 A remote wireless monitoring system and method thereof
CN101753832A (en) * 2008-12-04 2010-06-23 北京中星微电子有限公司 Cloud mirror control method in video monitoring system, system and central platform server
CN101483545A (en) * 2008-12-31 2009-07-15 中国建设银行股份有限公司 Financial service monitoring method and system
CN102739802A (en) * 2012-07-06 2012-10-17 广东电网公司汕头供电局 Service application-oriented IT contralized operation and maintenance analyzing system
CN105446875A (en) * 2014-11-18 2016-03-30 国网山东省电力公司 SAP platform based monitoring method and monitoring system for interface and system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
中国移动增值业务集中管理系统的设计与实现;吕林;《中国优秀硕士学位论文全文数据库 信息科技辑》;20160415(第04期);I138-168 *

Also Published As

Publication number Publication date
CN106201827A (en) 2016-12-07

Similar Documents

Publication Publication Date Title
CN106201827B (en) Monitoring data collection method and system
CN106790001B (en) Unified interface-based multi-system role authority management method and system
DE102014101392B4 (en) Configure a device based on proximity to other devices
CN100541475C (en) The device management method that is used for equipment management system
CN105095062B (en) Applied program testing method and system
CN105446811B (en) Application process is associated with starting method and association starter
US20080126287A1 (en) Method for management of policy conflict in a policy continuum
CN107832196A (en) A kind of monitoring device and monitoring method for real-time logs anomalous content
CN104794374B (en) A kind of application rights management method and apparatus for Android system
CN101163309A (en) Method, system and device for implementing information locking
EP2723117B1 (en) Managed unit device, self-optimization method and system
CN101369933A (en) Automatic test method and system
CN107104848B (en) Information technology system monitoring method and device
CN104135378A (en) Method of management control of Internet of Things gateways and management control entity for Internet of Things gateways
CN110113325A (en) Network Data Control method, apparatus and storage medium based on third party SDK
CN103810420B (en) One kind applies anti-uninstall method and system
CN109474470A (en) One kind is from monitoring method and device
CN105700942B (en) Application process is associated with starting method and association starter
CN110138780A (en) A method of internet-of-things terminal threat detection is realized based on probe technique
CN108494749B (en) Method, device and equipment for disabling IP address and computer readable storage medium
CN101202656A (en) Method and apparatus for resource supervising
WO2015184850A1 (en) Method, apparatus and system for collecting stale data
CN106203067B (en) A kind of method for cleaning and device of application program
KR101973728B1 (en) Integration security anomaly symptom monitoring system
CN105763365B (en) Exception handling method and device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant