A kind of method and device carrying out alarm configuration based on service logic
Technical field
The present invention relates to many-to-many communication path analysis field, especially a kind of side that alarm configuration is carried out based on service logic
Method and device.
Background technique
The safety and stablization of today's society network be it is essential, in order to which the operation people for making network healthier are more
It will use analysis software and carry out awareness network operating condition.By configuring corresponding network business, (user matches considerable analysis software
The particular network task set) own net is analyzed.This analysis can greatly promote network operation and maintenance ability and
Failure disposal efficiency, it is effective to reduce fault time.And to the configuration of alarm in business for user's post analysis business, quickly
Play the role of where finding the problem vital.
Considerable technology can only configure alarm and alarm trigger condition when configuring alarm in a manner of unification.No
Energy various dimensions, the alarm for going configuration desired of multi-angle of view, user generally require to configure multiple non-intuitive alarms of complexity.
Summary of the invention
The technical problems to be solved by the present invention are: in view of the problems of the existing technology, providing one kind and being patrolled based on business
Collect the method and device for carrying out alarm configuration.By customized alarm, intelligent alarms, the long connection alarm of asynchronous duplex configuration,
Exhibition method.Corresponding data with alert is restored by different trees and realizes concentration, efficient management and configuration service are alert
Report.
The technical solution adopted by the invention is as follows:
It is a kind of based on service logic carry out alarm configuration method include:
Customized alarm configuration shows step, the switching display content by way of the column tab, by service logic data to set
The mode of shape structure is shown in Web page side, forms customized alarm configuration column;Tree is at least three layers, first layer
For operation layer, the second layer is application layer, and third layer to n-th layer is application layer, server layer or client tier;Each layer is right
After the alarm number answered and alarm sum are shown in the corresponding node of current layer, each layer is operated, with list mode by alarm
It shows in the Web page other side;N is more than or equal to 3;;Each node configures m alarm;M is more than or equal to 1;
Intelligent alarms show step, and the switching display content by way of the column tab will contain at least two in communication path
The service logic data of probe are shown in a manner of tree in Web page side, form intelligent alarms Show board;Tree
It is three layers, first layer is operation layer, and the second layer is application layer, and third layer is client tier;Pass through third layer node ID mistake simultaneously
After filtering out alarm relevant parameter, intelligent alarms are shown in the Web page other side in a manner of list;
The long connection alarm step of asynchronous duplex, the switching display content by way of the column tab, when certain application node is configured to
The long connection of asynchronous duplex in a manner of tree in application, being shown the service logic data of the application node in Web page one
Side forms the long connection alarm column of asynchronous duplex;After filtering out alarm relevant parameter by application node ID, with list mode exhibition
Show in the Web page other side.
Further, the customized alarm configuration shows that step specifically includes:
Service logic tree establishment step restores service logic data with zTree.js mode, and with tree-shaped knot
The mode of structure is presented in Web page side;Tree is at least three layers, and first layer is operation layer, and the second layer is application layer, the
Three layers to n-th layer be application layer, server layer or client tier;Simultaneously by zTree.js mode by the corresponding police of each layer
Count off and alarm sum are shown in the corresponding nodename of current layer (for example, entitled " the cabinet face system of the first-level nodes in Fig. 1
System ", second layer nodename be " 192.168.0.183 ", third layer nodename be " application ", " server " and " Beijing ",
4th node layer title " 192.168.0.183 ") after;
Check alarm step, clicking first layer or second layer tree can be by traffic ID or application ID in the database
Inquiry corresponding data simultaneously checks alarm all under the nodename respectively, and the data with alert restores Web by jQuery.js
In the alert list of the page other side, alarm is edited by alarm addition step, is checked;
Step is added in alarm, is clicked tree third layer to the node of n-th layer, is added alarm for respective nodes and to each
A alarm carries out alert action management;After filtering out alarm relevant parameter by the node ID of third layer to n-th layer simultaneously, use
JQuery.js restores alarm relevant parameter, and shows that in a manner of list, the alert list in the Web page other side is (in Fig. 1 right
The list of 6 row 12 of side column) in.
Further, the addition alarm includes customized addition alarm step and selection alarm template step;
Customized addition alarm step, including alarm relevant parameter is configured, by the way that the time bucket of alarm is arranged, if
Set the type and alarm trigger condition of alarm parameters, upon selection between in section data meet the trigger condition of configuration, then alarm
Triggering times add 1;Wherein alarm relevant parameter include alert name, alarm description, alert level, alert category, alarm types,
Configuration person, effectual time, alarm deactivate;By alarm relevant parameter, alarm time bucket, alarm parameters type and alarm trigger
The data of condition save in the database, by the correlation of the customized addition alarm saved in jQuery.js restoring data library
Data (such as " alert name ", " alarm description ", " alert level ", " alert category ", " time bucket ", " alarm class in Fig. 4
The operation such as type ", " configuration person ", " effective period of time ", " trigger condition " " alarm transmission ", " automatically saving data packet "), and with column
Table mode is shown in the alert list of the Web page other side;
Pre-configured same type data with alert before selecting alarm template step, database to obtain user, in advance
It is put into Ztree node, traffic ID, application ID, client id data is obtained according to Ztree node, and pass through the side jQuery.js
Formula reduction, and with list mode by alarm relevant parameter, the time bucket of alarm, the type of alarm parameters and alarm trigger condition
Data are added into the alert list of respective nodes and are shown, and the alarm parameters of duplication of name can cover or skip (as shown in Figure 7);
Alert action management includes carrying out enabling alert action to the alert list of the corresponding node of current layer, closing alarm
Operation deactivates alert action and replicated alarm operation;It is exactly to submit to change in database by JS list to deactivate that alarm, which deactivates,
Field, after dead period internal trigger alarm, if the field be dead status so if be not denoted as alarm;It enables, close
Alarm is directly to operate;Alarm duplication refers to the first alarm that same type is chosen in the list of right side (such as: choosing two individually
Client alarm), system can select client two chosen by data base querying to all single clients, user
A alarm copies to other single clients.
Further, the alarm trigger condition includes the combination of the "AND" of n alert consitions, "or" relationship, is placed in
In trigger condition frame (as shown in Figure 5), when click and/or button, selective goal (as shown in Figure 6) after pop-up box is opened;
During wherein "AND" "or" composition of relations is shown, beginning and end point is by before the and after parameter receipt in CSS element
Form, when relationship be or when, by jQuery.js and recursion method into html user select li element pass through append
Peer's li element is added to enter;And when relationship be and when, add one layer of ul and li element again into the li element of selection.
Further, the customized addition alarm step further includes being sent to mailbox functions, is sent to Linux system
In SYSLOG and automatically save data packet function.
Further, the intelligent alarms show that step specifically includes:
Intelligent service logic tree establishment step will contain at least two the service logic number of probe in communication path
According to being restored with zTree.js mode, and shown in a manner of tree in Web page side;Tree be three layers, first
Layer is operation layer, and the second layer is application layer, and third layer is client tier;
Intelligence checks alarm step, clicks first layer or second layer tree can be by traffic ID or application ID in data
Corresponding data is inquired in library and checks alarm all under the nodename respectively, and the data with alert passes through jQuery.js also
In the alert list of the former Web page other side, alarm is edited by alarm addition step, is checked;
Intelligent alarms add step, click tree third node layer, establish unique intelligence for the client tier node
Can alarm, and alert action management is carried out to intelligent alarms, while after filtering out alarm relevant parameter by third layer node ID,
With jQuery.js reduction alarm relevant parameter (such as " operation ", " state " " alert name ", " alert category ", " time in Fig. 2
The operation such as bucket ", " alarm types ", " alarm description ", " configuration person ", " starting down time ", " terminating down time "), and with
The mode of list is shown in the Web page other side;
Intelligent alarms operational administrative includes carrying out enabling alert action to the alarm of the corresponding node of current layer, closing alarm
Operation deactivates alert action and replicated alarm operation;It is exactly to submit to change in database by JS list to deactivate that alarm, which deactivates,
Field, after dead period internal trigger alarm, if the field be dead status so if be not denoted as alarm;It enables, close
Alarm is directly to operate;Alarm duplication refers to the first alarm that same type is chosen in the list of right side (such as: choosing two individually
Client alarm), system can select client two chosen by data base querying to all single clients, user
A alarm copies to other single clients.
Further, the long connection alarm step configuration detailed process of the asynchronous duplex includes:
Alert level relevant information configuration step is matched for carrying out parameter to alert level, alert category, effectual time
It sets, the parameter of setting is saved in the database, is restored by jQuery.js mode, and shown with list mode in Web page
The other side;
Alarm trigger condition configuration step sets alarm uplink and downlink payload data packet ratio normal range value
It sets, the parameter of setting is saved in the database, is restored by jQuery.js mode, and shown with list mode in Web page
The other side;When ratio is not in normal range value, then alarm is triggered;
Alarm sending function is saved for sending data with alert to SYSLOG or being sent to mailbox.
One kind carrying out alarm configuration device based on service logic
Customized alarm configures display module, the switching display content by way of the column tab, by service logic data to set
The mode of shape structure is shown in Web page side, forms customized alarm configuration column;Tree is at least three layers, first layer
For operation layer, the second layer is application layer, and third layer to n-th layer is application layer, server layer or client tier;Each layer is right
After the alarm number answered and alarm sum are shown in the corresponding node of current layer, each layer is operated, with list mode by alarm
It shows in the Web page other side;N is more than or equal to 3;Each node configures m alarm;M is more than or equal to 1;
Intelligent alarms display module, the switching display content by way of the column tab will contain at least two in communication path
The service logic data of probe are shown in a manner of tree in Web page side, form intelligent alarms Show board;Tree
It is three layers, first layer is operation layer, and the second layer is application layer, and third layer is client tier;Pass through third layer node ID mistake simultaneously
After filtering out alarm relevant parameter, intelligent alarms are shown in the Web page other side in a manner of list;
The long connection alarm modules of asynchronous duplex, the switching display content by way of the column tab, when certain application node is configured to
The long connection of asynchronous duplex in a manner of tree in application, being shown the service logic data of the application node in Web page one
Side forms the long connection alarm column of asynchronous duplex;After filtering out alarm relevant parameter by application node ID, with list mode exhibition
Show in the Web page other side.
Further, the customized alarm configuration display module specifically includes:
Service logic tree establishes module, service logic data is restored with zTree.js mode, and with tree-shaped knot
The mode of structure is presented in Web page side;Tree is at least three layers, and first layer is operation layer, and the second layer is application layer, the
Three layers to n-th layer be application layer, server layer or client tier;Simultaneously by zTree.js mode by the corresponding police of each layer
Count off and alarm sum are shown in the corresponding nodename of current layer (for example, entitled " the cabinet face system of the first-level nodes in Fig. 1
System ", second layer nodename be " 192.168.0.183 ", third layer nodename be " application ", " server " and " Beijing ",
4th node layer title " 192.168.0.183 ") after;
Check alarm modules, clicking first layer or second layer tree can be by traffic ID or application ID in the database
Inquiry corresponding data simultaneously checks alarm all under the nodename respectively, and the data with alert restores Web by jQuery.js
In the alert list of the page other side, alarm is edited by alarm adding module, is checked;
Alarm adding module clicks tree third layer to the node of n-th layer, adds alarm for respective nodes and to each
A alarm carries out alert action management;After filtering out alarm relevant parameter by the node ID of third layer to n-th layer simultaneously, use
JQuery.js restores alarm relevant parameter, and shows that in a manner of list, the alert list in the Web page other side is (in Fig. 1 right
The list of 6 row 12 of side column) in.
Further, the intelligent alarms show that step specifically includes:
Intelligent service logic tree establishment step will contain at least two the service logic number of probe in communication path
According to being restored with zTree.js mode, and shown in a manner of tree in Web page side;Tree be three layers, first
Layer is operation layer, and the second layer is application layer, and third layer is client tier;
Intelligence checks alarm step, clicks first layer or second layer tree can be by traffic ID or application ID in data
Corresponding data is inquired in library and checks alarm all under the nodename respectively, and the data with alert passes through jQuery.js also
In the alert list of the former Web page other side, alarm is edited by alarm addition step, is checked;
Intelligent alarms add step, click tree third node layer, establish unique intelligence for the client tier node
Can alarm, and alert action management is carried out to intelligent alarms, while after filtering out alarm relevant parameter by third layer node ID,
With jQuery.js reduction alarm relevant parameter (such as " operation ", " state " " alert name ", " alert category ", " time in Fig. 2
The operation such as bucket ", " alarm types ", " alarm description ", " configuration person ", " starting down time ", " terminating down time "), and with
The mode of list is shown in the Web page other side;
Intelligent alarms operational administrative includes carrying out enabling alert action to the alarm of the corresponding node of current layer, closing alarm
Operation deactivates alert action and replicated alarm operation;It is exactly to submit to change in database by JS list to deactivate that alarm, which deactivates,
Field, after dead period internal trigger alarm, if the field be dead status so if be not denoted as alarm;It enables, close
Alarm is directly to operate;Alarm duplication refers to the first alarm that same type is chosen in the list of right side (such as: choosing two individually
Client alarm), system can select client two chosen by data base querying to all single clients, user
A alarm copies to other single clients;
The long connection alarm step of the asynchronous duplex configures detailed process and includes:
Alert level relevant information configuration step is matched for carrying out parameter to alert level, alert category, effectual time
It sets, the parameter of setting is saved in the database, is restored by jQuery.js mode, and shown with list mode in Web page
The other side;
Alarm trigger condition configuration step sets alarm uplink and downlink payload data packet ratio normal range value
It sets, the parameter of setting is saved in the database, is restored by jQuery.js mode, and shown with list mode in Web page
The other side;When ratio is not in normal range value, then alarm is triggered;
Alarm sending function is saved for sending data with alert to SYSLOG or being sent to mailbox.
In conclusion by adopting the above-described technical solution, the beneficial effects of the present invention are:
1. customized alarm, intelligent alarms, the configuration of the long connection alarm of asynchronous duplex, exhibition method.I.e. by different
Tree restores corresponding data with alert and realizes concentration, efficient management and configuration service alarm.
2. deactivate and the closing function of alarm are convenient for user's energy when service logic needs change or testing characteristics of network
Unnecessary or wrong report alarm is allowed no longer to generate.
3. the configuration of effectual time allows user at the appointed time section just can use the alarm, reduce wrong report and unnecessary
The generation of alarm.
4. the duplication of alarm, convenient for users to quickly and efficiently identical alarm is configured under different business.
Accurate alarm trigger condition is gone out convenient for user configuration by reference to the mode of value 5. triggering in customized alarm.
6. the generation of user's alarm is informed after generating alarm by SYSLOG or lettergram mode.
Detailed description of the invention
Examples of the present invention will be described by way of reference to the accompanying drawings, in which:
Fig. 1 is customized alarm configuration schematic diagram.
Fig. 2 is intelligent alarms configuration schematic diagram.
Fig. 3 is asynchronous duplex alarm configuration schematic diagram.
Fig. 4 is alarm addition schematic diagram in customized alarm addition.
Fig. 5 be trigger condition with or composition of relations schematic diagram.
Fig. 6 is alarm trigger condition setting schematic diagram.
Fig. 7 is alarm template selection schematic diagram.
Fig. 8 is that alarm deactivates schematic diagram.
Fig. 9 is the addition schematic diagram using rule.
Figure 10 is multipath analysis figure in the present invention.
Figure 11 is communication path set interface in the present invention.
Figure 12 is middle probe set interface of the present invention,
Figure 13 is application configuration figure in the present invention
Figure 14 is in the present invention using the tree figure of the display interface after the completion of addition.
Figure 15 is customized IP figure in the present invention
Figure 16 is the display interface of customized network segment in the present invention
Figure 17 is the display interface after the completion of client addition.
Figure 18 is the display interface of three communication paths selection in the present invention.
Figure 19 is service logic figure in the present invention.
Specific embodiment
All features disclosed in this specification or disclosed all methods or in the process the step of, in addition to mutually exclusive
Feature and/or step other than, can combine in any way.
Any feature disclosed in this specification unless specifically stated can be equivalent or with similar purpose by other
Alternative features are replaced.That is, unless specifically stated, each feature is an example in a series of equivalent or similar characteristics
?.
Related description of the present invention:
Certain application node is configured to the long connection application of asynchronous duplex and comprises the concrete steps that: first choosing in the list of right side mutually similar
The alarm of type.Such as: choosing two single client alarms.So system can pass through data base querying to all single clients
End, user can select client, and that two alarms chosen are copied in other single clients is as shown in Figure 8.
Related description of the present invention:
1, the access client in network is classified as a kind of node, i.e. Internet subscribers' end node.Probe node, i.e. portion
The critical packet collection point of administration in a network, acquires and stores the server of network communication data, and probe node is fixed
A kind of node.Internet subscribers' end node can establish communication path with probe node, and IP node can be established with probe node
Communication path, can establish communication path between probe node, and Internet subscribers' end node and IP node cannot establish communication lines
Diameter.
2, communication path node adds step: when detecting that user triggers communication path node adding conditional, this implementation
In example when detecting that user clicks the addition communication path node button on the interface Figure 10, the addition of communication path node
Window receives the node type and nodal information that user is inputted by the window and shows a communication lines diametral pitch on interface
Point, while showing the nodal information of the communication path node;User clicks confirmation after inputting information in the window shown in Figure 11,
Just occurs a communication path node in interface.When communication path node is IP node, IP address can be single IP
Address or some network segment or some IP range.Probe adds step: as shown in figure 12, being set according to the data acquisition port in network
It is set to probe, and probe is shown as a kind of node at interface.Referring to network interface and 5.157net on the node 197 in Figure 10.
Communication path adds step: the addition of communication path is popped up when detecting that user triggers communication path adding conditional
Window, receives communication path starting point and terminal that user is inputted by the window, shows that one communicates between Origin And Destination
The arrow in path, communication path is directed toward terminal.
It in other embodiments, further include communication path node edit step: logical when detecting user for mouse and being placed in
Node editor is popped up when believing path node and right-click, addition communication path button is equipped in window, editor's node is pressed
Button and deletion of node press girl.
Communication path node edit step further comprises:
Communication path adds step: further popping up communication path when detecting that user clicks addition communication path button
Window is added, user is only needed to input the terminal of communication path, the communication that default user mouse is clicked in communication path addition window
Path node is the starting point of communication path.Communication path nodal information edit step: when detect user click editor node by
When button, node editor is popped up, the nodal information of communication path node is modified for user.
Communication path knot removal step: when detecting that user clicks that delete this on the interface deletion of node button Shi Zecong logical
Believe path node.
Another embodiment of the present invention can also carry out edit operation to the communication path that has added: when detecting that user will
When mouse is placed on communication path simultaneously right-click, then communication path editor is popped up, communication is provided in the window
Button is arranged in route deletion button and communication path.
Communication path edit step further comprises:
Communication path deletes step: deleting the communication path when detecting that user clicks communication path delete button.
Communication path setting step: the pop-up communication path setting circle when detecting that user clicks communication path setting button
Face, the interface display communication path and addition network equipment button;When detecting user's click addition network equipment button
Pop-up addition network equipment interface for users is that the communication path increases the network equipment.
Wherein, the communication path step between n server of setting and client includes;It is communicated when detecting that user clicks
Communication path set interface, the interface display communication path and addition network equipment button are popped up when button is set in path;
When detecting user and clicking addition network equipment button, pop-up addition network equipment interface for users is that the communication path increases net
Network equipment.
Communication path set interface is popped up when detecting that user clicks communication path setting button, the interface display should
Communication path and addition network equipment button;Pop-up addition network equipment circle when detecting user and clicking addition network equipment button
Face is that the communication path increases the network equipment for user.Application is selected on addition service logic figure interface referring to Figure 11 user
" upmserver " is clicked after determining, referring to Figure 10.
4, client is set in the communication path between n server and client and to apply be to be based on service logic figure to match
Set acquisition.Service logic figure configuration process is:
The detailed process of configuration service logic chart is:
41. configuration application first (application is configured in advance).
42. then configuration client (client we can pass through data help user obtain true environment in and application close
The IP/ network segment of connection)
43. configure communication path (be used for later period multipath analysis, the determination etc. in data acquisition source) if communication path with
Family do not configure if there is get automatically we default the communication path that a shortest path can be selected as user;If
Just first must configure communication path in another module without that because without path be represent no data acquisition source this
The path of sample is the path of mistake
44. associated services.If thinking that this client or application are relevant with other business when being user configuration
It is i.e. configurable.(being analyzed for quickly jumping to other business in analysis).
45. the merging of service logic figure shows that (this is in order to which bigger facilitates User-defined logic figure for the later period
Analysis).It specifically includes:
Based on Web page, Figure 13 is that user configure the relationship of applying in service logic and (matched by user at other using data
It is configured good to set the page).User is quite important to the selection of application in configuration service logic, so system can obtain use
The application of family configuration facilitates user to select.(see Figure 14) after addition application, there is this in logic chart and right side tree
The displaying of application.(logic chart realizes that tree is realized by zTree.js by D3.js, and the data generated are by user
Obtained by the application configuration defined.Generate logic node of graph and when tree node we can by ad hoc fashion (time+
Application ID or client ip address or network segment+MD5) generate unique encryption ID user later period alarm configuration, analysis etc.) wherein patrol
Circle represents host in volume figure, square represent using represent on this host with the presence of apply (be by D3.js to
Append insert element and element data are drawn in svg element).And server is user configuration in tree
Using when the server address that is configured, and when system can also obtain user configuration application automatically in client, configured has added
Add client address.As Figure 10 client at visible addition button, facilitate the client under user's self-defined application.Click adds
Add after button (see Figure 15, Figure 16), user can (include IP address, net to the title of client, type in the pop-up box of opening
Section, all clients), IP is obtained automatically, obtains network segment automatically, and IP address, network segment, NAT mapping, associated services etc. are configured
(Edit button for clicking client respective column can also carry out edit operation to relevant configuration), obtains such as " Chengdu " visitor in Figure 10
Family end.Wherein please note that automatic acquisition IP and automatic acquisition network segment item, the IP address in this configuration is that system passes through with network segment
The true client ip address of the user that probe is got and network segment, facilitate user's option and installment, and it is wrong also to can avoid user configuration
Accidentally.
Visible Figure 17 after the completion of client is configured, client column have had more just configured client in tree.
(unique encryption ID of client can be generated by parameters such as application, times where client in this step, this ID is logical
It also can be unique ID of client node, including subsequent analysis when crossing D3.JS rendering logic figure, the generation of alarm is all by this
What ID was associated, be herein identical with top application addition.Pass through the side addNodes in zTree.js after the completion of addition
Method is added client in tree and is shown, and editing various data then is to use updateNode method, and deletion is then
removeNode.) (three, client column rear button is respectively as follows: editor's client, edits communication path, deletes client behaviour
Make) if this client to corresponding application server has network communication path, (communication path represents network data from client
It has passed through which probe, equipment etc. during holding server.The path configured herein can obtain in this patent of multipath
To embodying) so system can configure a upper shortest communication path for customer analysis automatically.If without path or road
Diameter needs reselect, and opening pop-up box is configured after clicking communication path setting button.Volume in path profile configuration operation
(this step configures in other pages) can be edited to path by collecting button.Communication path button is obtained, can be got automatically
All paths provide user's selection, and (this communication path figure is a kind of path exhibition oneself drawn of being drawn in svg by D3.JS
Show.Different equipment, probe can be placed in path and be used for post analysis by user, and these parameters are all that can be placed on
Post analysis is acted in the element of each equipment and probe.Such as: we can be the id of probe, type, the title of equipment
Deng in placement and element object).After determining communication path, the communication path check box in client column front is chosen as it can be seen that patrolling
It collects in figure and logic chart of the customized client node to application node has occurred.And when node client IP address/net of addition
Section with already present client ip address/network segment it is absolutely identical when, system can automatic merge node, application server IP address and
The client of addition there are when inclusion relation also can automatic merge node (such as the following figure is (see the client in Figure 18: CRM application
Segment is network segment client, and network segment range when configuration is 192.168.5.0/24, i.e., it comprises all 5 nets for representative
The IP address of section.And the server ip address of 157 backtracking server applications is just that 192.168.5.157 is contained in 5 network segments.
So system can merge automatically, using 157 backtracking service nodes in logic chart, as appMerge, (there are CRM to answer in appMerge
With with upmserver application) client carry out line).
Logic node of graph can drag the layout for facilitating the customized service logic of user, when node is dragged to close to another node
When judge user and merging nodal operation, and can support the newname after the customized merge node of user.When
After two nodes merge, if this node has multiple main frames to be indicated with empty circles, multiple applications indicate (as follows with hollow square
Scheme (see Figure 19): appMerge node is CRM using manual merge node with upmserver, due to the presence of multiple applications,
So application identities are hollow square, and clientMerge is client and 157 backtracking servers under CRM is applied
The manual merge node of client under, no application is so be empty circles.And 157 backtracking server applications with
Its client segment is without manual union operation, so being shown as solid circles and square).
(merging back-end realization manually, [following all coordinates, data etc. are all to restore mongodb database by D3.js
In data show for logic chart after obtained with data method] are as follows: drag the X of node, Y-coordinate be merged X a little, Y seat
It marks within 5 pixels, merges when user selects to cancel, can be the X of dragging node, Y-coordinate is separate to be merged a little.Work as determination
When merging, we are found by the filter method of D3.js and are merged a little first, and modifying its pattern by force is open circles, when
Dragging point be merged a little be application when can be changed into open circles+hollow square.Then some of dragging point are got
It is added in the specified object mergeNode being merged a little after significant data [such as: id, type etc.], after merging such as A with B,
So mergeNode of A just has the parameters such as A-ID, A-TYPE, B-ID, B-TYPE, and to some dependency numbers being merged a little
According to directly being modified, dragging point is then deleted.After completing to the modification of point, judge to merge whether point with other nodes has line
Relationship.It is set to find the node after merging if there is then changing source target object in line data.If merged
Line has overlapping afterwards, then the existing line of dragging point before deleting, the mergeLink number of objects being merged in line a little
According to adding 1.Since there are incidence relations with dendrogram for logic chart.So choosing or deleting application when user's cancellation client
It afterwards, can traverse node data while system is by the ID for traversing all nodes [i.e. top is using the ID generated with client]
All ID in mergeNode object are present in mergeNode the data first deleted in mergeNode if it is this ID, so
After delete corresponding merging line.These operations are gone to judge whether remaining mergeNode has again multiple after finishing, and what is
Type.If there is multiple, and type still and is before consistent so this node and does not change, if only remaining next section
Point or an application can so modify corresponding node pattern, and top column is shown in specific judgement.After having deleted nodal information, judgement
Whether corresponding mergeLink has coincidence, has coincidence mergeLink data to subtract 1, if mergeLink is inherently 0 so straight
It connects and deletes line).According to above-mentioned principle, client (Chengdu), Apply Names (upmserver) business in such as Figure 10 of designing are patrolled
Collect figure.
After according to above configured, user can configure a accuracy height and intuitively be easy to show the service logic of understanding
Figure.
Embodiment one: it is based on Web page, figure one, figure two, figure three is respectively that user configures seen in the page in alarm
Concrete outcome.
In figure one, customized alarm configuration, business all in system is contained.It is used by obtaining service logic data
ZTree.js restoring data is showed in a manner of tree.The hierarchical relationship of tree are as follows: business > application > application/service
Device/client.After each tree-shaped node, list in the node comprising the alarm number enabled and alarm sum.Click first layer
Or second layer tree can inquire in the database corresponding data by traffic ID or application ID and check the node industry respectively
Lower all alarms are applied in business, and the functions such as can be edited, be deactivated, replicated to alarm.Click the node and point of third layer
Application/service device/client node is hit because node thus contains traffic ID, application ID, client id is so in addition to the above function
Can it is outer can also to corresponding node addition alarm (addition alarm contain customized addition alarm with select alarm template this two
The different mode of kind).
Addition alarm button is clicked, visible (figure four) the following contents of pop-up box is opened:
Title: the title of alarm cannot repeat.
It describes: the information such as the influence for describing alarm, the failure that may cause.
Grade: the grade of alarm, including high, medium and low 3 ranks are set.
Classify: the classification of alarm is set, user customized can classify, added classification before also can choose.
Alarm types: the selection affiliated type of alarm, the alarm types for allowing to add are related with the node that user chooses.Choosing
When middle application root node, any alarm cannot be added.When choosing application node, it can only add using monitoring alarm.Choose service
When device root node, any server alarm can only be added.When choosing individual server node, it is alert that individual server can only be added
Report.When choosing " IP client " type node, single client alarm can only be added.Single client alert definition: client
Any one IP meet alert consitions and just alarm.When choosing " all clients " type node, any client can only be added
Alarm.When choosing " network segment client " type node: not mapping the network segment client of NAT IP: it is alert that network segment client can only be configured
Report;It is mapped to the network segment client of NAT IP: " network segment client " alarm and " single client " alarm can be configured.
Configuration person: the configuration personnel of the alarm are set.
Effectual time: being arranged the effective time of the alarm, and system default is all periods.Select " set period " single choice
Button pops up the setting frame of set period, and user can according to need, the time for specifying the alarm to come into force.
Alarm deactivates, and for the exclusion period of the alarm to be arranged, in dead period, alarm does not come into force.
The time bucket of alarm time bucket: is set, and system provides " 1 second ", " 10 seconds " and " 60 seconds " this 3 kinds of times barrel.I.e.
By calculating data in the selection period and whether being greater than the trigger condition configured.
Trigger condition: the type and alarm trigger condition of alarm parameters are set, support to carry out between multiple alert consitions
The combination of "AND", "or" relationship is placed in the box below trigger condition (see figure five).When click and/or button, bullet is opened
Frame (see figure six) selective goal afterwards out, system can be got corresponding selection parameter type nearest three days by historical data and be averaged
Value and peak value are carried out when filling in parameter for user with reference to the accurate availability that ensure that parameter.With or composition of relations show in, open
Begin and end point is made of being drawn by before the and after parameter of element in CSS.When relationship be or when, pass through
JQuery.js and the recursion method li element that user selects into html add peer's li element by append and enter
(containing parameter name, trigger condition in this li element).And when relationship be and when, add one layer of ul again into the li element of selection
With li element.
It chooses " being sent to mailbox ", pops up receiver's input frame.It can the customized multiple receiver's information of addition.
It chooses " being sent to SYSLOG ", alarm will be sent in syslog.
Automatically save data packet: whether setting automatically saves data packet, and needs to save the time range of data packet.
After selection automatically saves data packet, when triggering the alarm, the data packet of the alarm can be downloaded to server automatically by system.
In above description, alarm deactivates the person of may be used in, and business need to change modification in use, network needs to interrupt
Stop the generation of unnecessary alarm whens inspection etc..And effectual time then more efficient intelligent can allow user's selection as worked
Day, specific festivals or holidays just enable alarm.And trigger condition by with or relationship configuration can then to allow alarm diversification to meet multiple
The intersection of condition alarm does not have to the single configuration that can only carry out single part as some softwares before again.
After the completion of configuration, assessment button can be clicked, parameter is assessed.When checking this alarm for historical data can
With property and accuracy.(see the patent No.: CN201510777904.X).
Selection alarm template button is clicked, visible (figure seven) the following contents of pop-up box is opened:
Pre-configured same type alarm, the business got by node before user being obtained by database
ID, application ID, client id are added into it fast in the alert list of this node, and the alarm of duplication of name can be covered or be skipped.
In upper left four blue icons of list, respectively enabling alarm, closing alarm, deactivated alarm, duplication police
Report.It is for carrying out batch operation to the alarm in choosing in the list of lower section.Wherein enabling with closing function is directly to operate.
Deactivated alarm then need to configure deactivate at the beginning of with the end time, an alarm can be traversed by setting rear system per minute
It sees whether reached deactivation condition, does not trigger the alarm if reaching condition, be more than end time system automatically alarm shape
State is changed to enable.Replicated alarm is then needed by selecting node location to get traffic ID, application ID, client id, and is obtained
The alarm types chosen are got, corresponding level in remaining business can choose by conditions above and pasted, replicated alarm
It is that the quick addition being used in other business is configured to existing alarm, the duplicate operation of user is avoided to improve configuration process
Efficiency.
In figure two, the node of intelligent alarms, the node for allowing to configure intelligent alarms is contained only, that is, represents this client
It holds and contains minimum two probes in the communication path of server, meet all of conditions above by inquiring under all business
Data restore tree, the hierarchical relationship of tree are as follows: business > application > client by zTree.js.Due to each
Node can only configure an intelligent alarms, so client node can only be clicked in intelligent alarms, if the node is matched in business
In the service logic figure set, intelligent alarms have been configured, client node has been clicked and inquires communication path number in all service logics
According to and with traffic ID, application ID, the data that client id is filled into relative client intelligent alarms pass through jQuery.js reduction number
According into right side list, checking and editing for next step.
In figure three, the long connection alarm of asynchronous duplex, node contains only the long connection application of asynchronous duplex.Pass through application ID
Use jQuery.js restoring data into right side list after filtering out data with alert, checking and editing for next step.
The invention is not limited to specific embodiments above-mentioned.The present invention, which expands to, any in the present specification to be disclosed
New feature or any new combination, and disclose any new method or process the step of or any new combination.