CN106452851B - A kind of method and device carrying out alarm configuration based on service logic - Google Patents

A kind of method and device carrying out alarm configuration based on service logic Download PDF

Info

Publication number
CN106452851B
CN106452851B CN201610851834.2A CN201610851834A CN106452851B CN 106452851 B CN106452851 B CN 106452851B CN 201610851834 A CN201610851834 A CN 201610851834A CN 106452851 B CN106452851 B CN 106452851B
Authority
CN
China
Prior art keywords
alarm
layer
alert
node
tree
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610851834.2A
Other languages
Chinese (zh)
Other versions
CN106452851A (en
Inventor
罗鹰
王翔
林康
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Kelai Network Technology Co.,Ltd.
Original Assignee
CHENGDU COLASOFT Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by CHENGDU COLASOFT Co Ltd filed Critical CHENGDU COLASOFT Co Ltd
Priority to CN201610851834.2A priority Critical patent/CN106452851B/en
Publication of CN106452851A publication Critical patent/CN106452851A/en
Application granted granted Critical
Publication of CN106452851B publication Critical patent/CN106452851B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/06Management of faults, events, alarms or notifications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/22Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks comprising specially adapted graphical user interfaces [GUI]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Human Computer Interaction (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Computer And Data Communications (AREA)

Abstract

The present invention relates to many-to-many communication path analysis fields, in view of the problems of the existing technology, provide a kind of method and device that alarm configuration is carried out based on service logic.Pass through customized alarm, intelligent alarms, the configuration of the long connection alarm of asynchronous duplex, exhibition method.Corresponding data with alert, which is restored, by different trees realizes concentration, efficient management and configuration service alarm.Customized alarm configuration shows step, will include the service logic data service logical data of a probe in the communication path of client to server, is restored with zTree.js mode, and showed in a manner of tree;Tree is at least three layers, and first layer is operation layer, and the second layer is application layer, and third layer to n-th layer is application layer, server layer or client tier;N is more than or equal to 3;The corresponding alarm number of each layer and alarm sum are shown after the corresponding node of current layer by zTree.js mode;To every layer of progress corresponding operating, complete to show.

Description

A kind of method and device carrying out alarm configuration based on service logic
Technical field
The present invention relates to many-to-many communication path analysis field, especially a kind of side that alarm configuration is carried out based on service logic Method and device.
Background technique
The safety and stablization of today's society network be it is essential, in order to which the operation people for making network healthier are more It will use analysis software and carry out awareness network operating condition.By configuring corresponding network business, (user matches considerable analysis software The particular network task set) own net is analyzed.This analysis can greatly promote network operation and maintenance ability and Failure disposal efficiency, it is effective to reduce fault time.And to the configuration of alarm in business for user's post analysis business, quickly Play the role of where finding the problem vital.
Considerable technology can only configure alarm and alarm trigger condition when configuring alarm in a manner of unification.No Energy various dimensions, the alarm for going configuration desired of multi-angle of view, user generally require to configure multiple non-intuitive alarms of complexity.
Summary of the invention
The technical problems to be solved by the present invention are: in view of the problems of the existing technology, providing one kind and being patrolled based on business Collect the method and device for carrying out alarm configuration.By customized alarm, intelligent alarms, the long connection alarm of asynchronous duplex configuration, Exhibition method.Corresponding data with alert is restored by different trees and realizes concentration, efficient management and configuration service are alert Report.
The technical solution adopted by the invention is as follows:
It is a kind of based on service logic carry out alarm configuration method include:
Customized alarm configuration shows step, the switching display content by way of the column tab, by service logic data to set The mode of shape structure is shown in Web page side, forms customized alarm configuration column;Tree is at least three layers, first layer For operation layer, the second layer is application layer, and third layer to n-th layer is application layer, server layer or client tier;Each layer is right After the alarm number answered and alarm sum are shown in the corresponding node of current layer, each layer is operated, with list mode by alarm It shows in the Web page other side;N is more than or equal to 3;;Each node configures m alarm;M is more than or equal to 1;
Intelligent alarms show step, and the switching display content by way of the column tab will contain at least two in communication path The service logic data of probe are shown in a manner of tree in Web page side, form intelligent alarms Show board;Tree It is three layers, first layer is operation layer, and the second layer is application layer, and third layer is client tier;Pass through third layer node ID mistake simultaneously After filtering out alarm relevant parameter, intelligent alarms are shown in the Web page other side in a manner of list;
The long connection alarm step of asynchronous duplex, the switching display content by way of the column tab, when certain application node is configured to The long connection of asynchronous duplex in a manner of tree in application, being shown the service logic data of the application node in Web page one Side forms the long connection alarm column of asynchronous duplex;After filtering out alarm relevant parameter by application node ID, with list mode exhibition Show in the Web page other side.
Further, the customized alarm configuration shows that step specifically includes:
Service logic tree establishment step restores service logic data with zTree.js mode, and with tree-shaped knot The mode of structure is presented in Web page side;Tree is at least three layers, and first layer is operation layer, and the second layer is application layer, the Three layers to n-th layer be application layer, server layer or client tier;Simultaneously by zTree.js mode by the corresponding police of each layer Count off and alarm sum are shown in the corresponding nodename of current layer (for example, entitled " the cabinet face system of the first-level nodes in Fig. 1 System ", second layer nodename be " 192.168.0.183 ", third layer nodename be " application ", " server " and " Beijing ", 4th node layer title " 192.168.0.183 ") after;
Check alarm step, clicking first layer or second layer tree can be by traffic ID or application ID in the database Inquiry corresponding data simultaneously checks alarm all under the nodename respectively, and the data with alert restores Web by jQuery.js In the alert list of the page other side, alarm is edited by alarm addition step, is checked;
Step is added in alarm, is clicked tree third layer to the node of n-th layer, is added alarm for respective nodes and to each A alarm carries out alert action management;After filtering out alarm relevant parameter by the node ID of third layer to n-th layer simultaneously, use JQuery.js restores alarm relevant parameter, and shows that in a manner of list, the alert list in the Web page other side is (in Fig. 1 right The list of 6 row 12 of side column) in.
Further, the addition alarm includes customized addition alarm step and selection alarm template step;
Customized addition alarm step, including alarm relevant parameter is configured, by the way that the time bucket of alarm is arranged, if Set the type and alarm trigger condition of alarm parameters, upon selection between in section data meet the trigger condition of configuration, then alarm Triggering times add 1;Wherein alarm relevant parameter include alert name, alarm description, alert level, alert category, alarm types, Configuration person, effectual time, alarm deactivate;By alarm relevant parameter, alarm time bucket, alarm parameters type and alarm trigger The data of condition save in the database, by the correlation of the customized addition alarm saved in jQuery.js restoring data library Data (such as " alert name ", " alarm description ", " alert level ", " alert category ", " time bucket ", " alarm class in Fig. 4 The operation such as type ", " configuration person ", " effective period of time ", " trigger condition " " alarm transmission ", " automatically saving data packet "), and with column Table mode is shown in the alert list of the Web page other side;
Pre-configured same type data with alert before selecting alarm template step, database to obtain user, in advance It is put into Ztree node, traffic ID, application ID, client id data is obtained according to Ztree node, and pass through the side jQuery.js Formula reduction, and with list mode by alarm relevant parameter, the time bucket of alarm, the type of alarm parameters and alarm trigger condition Data are added into the alert list of respective nodes and are shown, and the alarm parameters of duplication of name can cover or skip (as shown in Figure 7);
Alert action management includes carrying out enabling alert action to the alert list of the corresponding node of current layer, closing alarm Operation deactivates alert action and replicated alarm operation;It is exactly to submit to change in database by JS list to deactivate that alarm, which deactivates, Field, after dead period internal trigger alarm, if the field be dead status so if be not denoted as alarm;It enables, close Alarm is directly to operate;Alarm duplication refers to the first alarm that same type is chosen in the list of right side (such as: choosing two individually Client alarm), system can select client two chosen by data base querying to all single clients, user A alarm copies to other single clients.
Further, the alarm trigger condition includes the combination of the "AND" of n alert consitions, "or" relationship, is placed in In trigger condition frame (as shown in Figure 5), when click and/or button, selective goal (as shown in Figure 6) after pop-up box is opened; During wherein "AND" "or" composition of relations is shown, beginning and end point is by before the and after parameter receipt in CSS element Form, when relationship be or when, by jQuery.js and recursion method into html user select li element pass through append Peer's li element is added to enter;And when relationship be and when, add one layer of ul and li element again into the li element of selection.
Further, the customized addition alarm step further includes being sent to mailbox functions, is sent to Linux system In SYSLOG and automatically save data packet function.
Further, the intelligent alarms show that step specifically includes:
Intelligent service logic tree establishment step will contain at least two the service logic number of probe in communication path According to being restored with zTree.js mode, and shown in a manner of tree in Web page side;Tree be three layers, first Layer is operation layer, and the second layer is application layer, and third layer is client tier;
Intelligence checks alarm step, clicks first layer or second layer tree can be by traffic ID or application ID in data Corresponding data is inquired in library and checks alarm all under the nodename respectively, and the data with alert passes through jQuery.js also In the alert list of the former Web page other side, alarm is edited by alarm addition step, is checked;
Intelligent alarms add step, click tree third node layer, establish unique intelligence for the client tier node Can alarm, and alert action management is carried out to intelligent alarms, while after filtering out alarm relevant parameter by third layer node ID, With jQuery.js reduction alarm relevant parameter (such as " operation ", " state " " alert name ", " alert category ", " time in Fig. 2 The operation such as bucket ", " alarm types ", " alarm description ", " configuration person ", " starting down time ", " terminating down time "), and with The mode of list is shown in the Web page other side;
Intelligent alarms operational administrative includes carrying out enabling alert action to the alarm of the corresponding node of current layer, closing alarm Operation deactivates alert action and replicated alarm operation;It is exactly to submit to change in database by JS list to deactivate that alarm, which deactivates, Field, after dead period internal trigger alarm, if the field be dead status so if be not denoted as alarm;It enables, close Alarm is directly to operate;Alarm duplication refers to the first alarm that same type is chosen in the list of right side (such as: choosing two individually Client alarm), system can select client two chosen by data base querying to all single clients, user A alarm copies to other single clients.
Further, the long connection alarm step configuration detailed process of the asynchronous duplex includes:
Alert level relevant information configuration step is matched for carrying out parameter to alert level, alert category, effectual time It sets, the parameter of setting is saved in the database, is restored by jQuery.js mode, and shown with list mode in Web page The other side;
Alarm trigger condition configuration step sets alarm uplink and downlink payload data packet ratio normal range value It sets, the parameter of setting is saved in the database, is restored by jQuery.js mode, and shown with list mode in Web page The other side;When ratio is not in normal range value, then alarm is triggered;
Alarm sending function is saved for sending data with alert to SYSLOG or being sent to mailbox.
One kind carrying out alarm configuration device based on service logic
Customized alarm configures display module, the switching display content by way of the column tab, by service logic data to set The mode of shape structure is shown in Web page side, forms customized alarm configuration column;Tree is at least three layers, first layer For operation layer, the second layer is application layer, and third layer to n-th layer is application layer, server layer or client tier;Each layer is right After the alarm number answered and alarm sum are shown in the corresponding node of current layer, each layer is operated, with list mode by alarm It shows in the Web page other side;N is more than or equal to 3;Each node configures m alarm;M is more than or equal to 1;
Intelligent alarms display module, the switching display content by way of the column tab will contain at least two in communication path The service logic data of probe are shown in a manner of tree in Web page side, form intelligent alarms Show board;Tree It is three layers, first layer is operation layer, and the second layer is application layer, and third layer is client tier;Pass through third layer node ID mistake simultaneously After filtering out alarm relevant parameter, intelligent alarms are shown in the Web page other side in a manner of list;
The long connection alarm modules of asynchronous duplex, the switching display content by way of the column tab, when certain application node is configured to The long connection of asynchronous duplex in a manner of tree in application, being shown the service logic data of the application node in Web page one Side forms the long connection alarm column of asynchronous duplex;After filtering out alarm relevant parameter by application node ID, with list mode exhibition Show in the Web page other side.
Further, the customized alarm configuration display module specifically includes:
Service logic tree establishes module, service logic data is restored with zTree.js mode, and with tree-shaped knot The mode of structure is presented in Web page side;Tree is at least three layers, and first layer is operation layer, and the second layer is application layer, the Three layers to n-th layer be application layer, server layer or client tier;Simultaneously by zTree.js mode by the corresponding police of each layer Count off and alarm sum are shown in the corresponding nodename of current layer (for example, entitled " the cabinet face system of the first-level nodes in Fig. 1 System ", second layer nodename be " 192.168.0.183 ", third layer nodename be " application ", " server " and " Beijing ", 4th node layer title " 192.168.0.183 ") after;
Check alarm modules, clicking first layer or second layer tree can be by traffic ID or application ID in the database Inquiry corresponding data simultaneously checks alarm all under the nodename respectively, and the data with alert restores Web by jQuery.js In the alert list of the page other side, alarm is edited by alarm adding module, is checked;
Alarm adding module clicks tree third layer to the node of n-th layer, adds alarm for respective nodes and to each A alarm carries out alert action management;After filtering out alarm relevant parameter by the node ID of third layer to n-th layer simultaneously, use JQuery.js restores alarm relevant parameter, and shows that in a manner of list, the alert list in the Web page other side is (in Fig. 1 right The list of 6 row 12 of side column) in.
Further, the intelligent alarms show that step specifically includes:
Intelligent service logic tree establishment step will contain at least two the service logic number of probe in communication path According to being restored with zTree.js mode, and shown in a manner of tree in Web page side;Tree be three layers, first Layer is operation layer, and the second layer is application layer, and third layer is client tier;
Intelligence checks alarm step, clicks first layer or second layer tree can be by traffic ID or application ID in data Corresponding data is inquired in library and checks alarm all under the nodename respectively, and the data with alert passes through jQuery.js also In the alert list of the former Web page other side, alarm is edited by alarm addition step, is checked;
Intelligent alarms add step, click tree third node layer, establish unique intelligence for the client tier node Can alarm, and alert action management is carried out to intelligent alarms, while after filtering out alarm relevant parameter by third layer node ID, With jQuery.js reduction alarm relevant parameter (such as " operation ", " state " " alert name ", " alert category ", " time in Fig. 2 The operation such as bucket ", " alarm types ", " alarm description ", " configuration person ", " starting down time ", " terminating down time "), and with The mode of list is shown in the Web page other side;
Intelligent alarms operational administrative includes carrying out enabling alert action to the alarm of the corresponding node of current layer, closing alarm Operation deactivates alert action and replicated alarm operation;It is exactly to submit to change in database by JS list to deactivate that alarm, which deactivates, Field, after dead period internal trigger alarm, if the field be dead status so if be not denoted as alarm;It enables, close Alarm is directly to operate;Alarm duplication refers to the first alarm that same type is chosen in the list of right side (such as: choosing two individually Client alarm), system can select client two chosen by data base querying to all single clients, user A alarm copies to other single clients;
The long connection alarm step of the asynchronous duplex configures detailed process and includes:
Alert level relevant information configuration step is matched for carrying out parameter to alert level, alert category, effectual time It sets, the parameter of setting is saved in the database, is restored by jQuery.js mode, and shown with list mode in Web page The other side;
Alarm trigger condition configuration step sets alarm uplink and downlink payload data packet ratio normal range value It sets, the parameter of setting is saved in the database, is restored by jQuery.js mode, and shown with list mode in Web page The other side;When ratio is not in normal range value, then alarm is triggered;
Alarm sending function is saved for sending data with alert to SYSLOG or being sent to mailbox.
In conclusion by adopting the above-described technical solution, the beneficial effects of the present invention are:
1. customized alarm, intelligent alarms, the configuration of the long connection alarm of asynchronous duplex, exhibition method.I.e. by different Tree restores corresponding data with alert and realizes concentration, efficient management and configuration service alarm.
2. deactivate and the closing function of alarm are convenient for user's energy when service logic needs change or testing characteristics of network Unnecessary or wrong report alarm is allowed no longer to generate.
3. the configuration of effectual time allows user at the appointed time section just can use the alarm, reduce wrong report and unnecessary The generation of alarm.
4. the duplication of alarm, convenient for users to quickly and efficiently identical alarm is configured under different business.
Accurate alarm trigger condition is gone out convenient for user configuration by reference to the mode of value 5. triggering in customized alarm.
6. the generation of user's alarm is informed after generating alarm by SYSLOG or lettergram mode.
Detailed description of the invention
Examples of the present invention will be described by way of reference to the accompanying drawings, in which:
Fig. 1 is customized alarm configuration schematic diagram.
Fig. 2 is intelligent alarms configuration schematic diagram.
Fig. 3 is asynchronous duplex alarm configuration schematic diagram.
Fig. 4 is alarm addition schematic diagram in customized alarm addition.
Fig. 5 be trigger condition with or composition of relations schematic diagram.
Fig. 6 is alarm trigger condition setting schematic diagram.
Fig. 7 is alarm template selection schematic diagram.
Fig. 8 is that alarm deactivates schematic diagram.
Fig. 9 is the addition schematic diagram using rule.
Figure 10 is multipath analysis figure in the present invention.
Figure 11 is communication path set interface in the present invention.
Figure 12 is middle probe set interface of the present invention,
Figure 13 is application configuration figure in the present invention
Figure 14 is in the present invention using the tree figure of the display interface after the completion of addition.
Figure 15 is customized IP figure in the present invention
Figure 16 is the display interface of customized network segment in the present invention
Figure 17 is the display interface after the completion of client addition.
Figure 18 is the display interface of three communication paths selection in the present invention.
Figure 19 is service logic figure in the present invention.
Specific embodiment
All features disclosed in this specification or disclosed all methods or in the process the step of, in addition to mutually exclusive Feature and/or step other than, can combine in any way.
Any feature disclosed in this specification unless specifically stated can be equivalent or with similar purpose by other Alternative features are replaced.That is, unless specifically stated, each feature is an example in a series of equivalent or similar characteristics ?.
Related description of the present invention:
Certain application node is configured to the long connection application of asynchronous duplex and comprises the concrete steps that: first choosing in the list of right side mutually similar The alarm of type.Such as: choosing two single client alarms.So system can pass through data base querying to all single clients End, user can select client, and that two alarms chosen are copied in other single clients is as shown in Figure 8.
Related description of the present invention:
1, the access client in network is classified as a kind of node, i.e. Internet subscribers' end node.Probe node, i.e. portion The critical packet collection point of administration in a network, acquires and stores the server of network communication data, and probe node is fixed A kind of node.Internet subscribers' end node can establish communication path with probe node, and IP node can be established with probe node Communication path, can establish communication path between probe node, and Internet subscribers' end node and IP node cannot establish communication lines Diameter.
2, communication path node adds step: when detecting that user triggers communication path node adding conditional, this implementation In example when detecting that user clicks the addition communication path node button on the interface Figure 10, the addition of communication path node Window receives the node type and nodal information that user is inputted by the window and shows a communication lines diametral pitch on interface Point, while showing the nodal information of the communication path node;User clicks confirmation after inputting information in the window shown in Figure 11, Just occurs a communication path node in interface.When communication path node is IP node, IP address can be single IP Address or some network segment or some IP range.Probe adds step: as shown in figure 12, being set according to the data acquisition port in network It is set to probe, and probe is shown as a kind of node at interface.Referring to network interface and 5.157net on the node 197 in Figure 10.
Communication path adds step: the addition of communication path is popped up when detecting that user triggers communication path adding conditional Window, receives communication path starting point and terminal that user is inputted by the window, shows that one communicates between Origin And Destination The arrow in path, communication path is directed toward terminal.
It in other embodiments, further include communication path node edit step: logical when detecting user for mouse and being placed in Node editor is popped up when believing path node and right-click, addition communication path button is equipped in window, editor's node is pressed Button and deletion of node press girl.
Communication path node edit step further comprises:
Communication path adds step: further popping up communication path when detecting that user clicks addition communication path button Window is added, user is only needed to input the terminal of communication path, the communication that default user mouse is clicked in communication path addition window Path node is the starting point of communication path.Communication path nodal information edit step: when detect user click editor node by When button, node editor is popped up, the nodal information of communication path node is modified for user.
Communication path knot removal step: when detecting that user clicks that delete this on the interface deletion of node button Shi Zecong logical Believe path node.
Another embodiment of the present invention can also carry out edit operation to the communication path that has added: when detecting that user will When mouse is placed on communication path simultaneously right-click, then communication path editor is popped up, communication is provided in the window Button is arranged in route deletion button and communication path.
Communication path edit step further comprises:
Communication path deletes step: deleting the communication path when detecting that user clicks communication path delete button.
Communication path setting step: the pop-up communication path setting circle when detecting that user clicks communication path setting button Face, the interface display communication path and addition network equipment button;When detecting user's click addition network equipment button Pop-up addition network equipment interface for users is that the communication path increases the network equipment.
Wherein, the communication path step between n server of setting and client includes;It is communicated when detecting that user clicks Communication path set interface, the interface display communication path and addition network equipment button are popped up when button is set in path; When detecting user and clicking addition network equipment button, pop-up addition network equipment interface for users is that the communication path increases net Network equipment.
Communication path set interface is popped up when detecting that user clicks communication path setting button, the interface display should Communication path and addition network equipment button;Pop-up addition network equipment circle when detecting user and clicking addition network equipment button Face is that the communication path increases the network equipment for user.Application is selected on addition service logic figure interface referring to Figure 11 user " upmserver " is clicked after determining, referring to Figure 10.
4, client is set in the communication path between n server and client and to apply be to be based on service logic figure to match Set acquisition.Service logic figure configuration process is:
The detailed process of configuration service logic chart is:
41. configuration application first (application is configured in advance).
42. then configuration client (client we can pass through data help user obtain true environment in and application close The IP/ network segment of connection)
43. configure communication path (be used for later period multipath analysis, the determination etc. in data acquisition source) if communication path with Family do not configure if there is get automatically we default the communication path that a shortest path can be selected as user;If Just first must configure communication path in another module without that because without path be represent no data acquisition source this The path of sample is the path of mistake
44. associated services.If thinking that this client or application are relevant with other business when being user configuration It is i.e. configurable.(being analyzed for quickly jumping to other business in analysis).
45. the merging of service logic figure shows that (this is in order to which bigger facilitates User-defined logic figure for the later period Analysis).It specifically includes:
Based on Web page, Figure 13 is that user configure the relationship of applying in service logic and (matched by user at other using data It is configured good to set the page).User is quite important to the selection of application in configuration service logic, so system can obtain use The application of family configuration facilitates user to select.(see Figure 14) after addition application, there is this in logic chart and right side tree The displaying of application.(logic chart realizes that tree is realized by zTree.js by D3.js, and the data generated are by user Obtained by the application configuration defined.Generate logic node of graph and when tree node we can by ad hoc fashion (time+ Application ID or client ip address or network segment+MD5) generate unique encryption ID user later period alarm configuration, analysis etc.) wherein patrol Circle represents host in volume figure, square represent using represent on this host with the presence of apply (be by D3.js to Append insert element and element data are drawn in svg element).And server is user configuration in tree Using when the server address that is configured, and when system can also obtain user configuration application automatically in client, configured has added Add client address.As Figure 10 client at visible addition button, facilitate the client under user's self-defined application.Click adds Add after button (see Figure 15, Figure 16), user can (include IP address, net to the title of client, type in the pop-up box of opening Section, all clients), IP is obtained automatically, obtains network segment automatically, and IP address, network segment, NAT mapping, associated services etc. are configured (Edit button for clicking client respective column can also carry out edit operation to relevant configuration), obtains such as " Chengdu " visitor in Figure 10 Family end.Wherein please note that automatic acquisition IP and automatic acquisition network segment item, the IP address in this configuration is that system passes through with network segment The true client ip address of the user that probe is got and network segment, facilitate user's option and installment, and it is wrong also to can avoid user configuration Accidentally.
Visible Figure 17 after the completion of client is configured, client column have had more just configured client in tree. (unique encryption ID of client can be generated by parameters such as application, times where client in this step, this ID is logical It also can be unique ID of client node, including subsequent analysis when crossing D3.JS rendering logic figure, the generation of alarm is all by this What ID was associated, be herein identical with top application addition.Pass through the side addNodes in zTree.js after the completion of addition Method is added client in tree and is shown, and editing various data then is to use updateNode method, and deletion is then removeNode.) (three, client column rear button is respectively as follows: editor's client, edits communication path, deletes client behaviour Make) if this client to corresponding application server has network communication path, (communication path represents network data from client It has passed through which probe, equipment etc. during holding server.The path configured herein can obtain in this patent of multipath To embodying) so system can configure a upper shortest communication path for customer analysis automatically.If without path or road Diameter needs reselect, and opening pop-up box is configured after clicking communication path setting button.Volume in path profile configuration operation (this step configures in other pages) can be edited to path by collecting button.Communication path button is obtained, can be got automatically All paths provide user's selection, and (this communication path figure is a kind of path exhibition oneself drawn of being drawn in svg by D3.JS Show.Different equipment, probe can be placed in path and be used for post analysis by user, and these parameters are all that can be placed on Post analysis is acted in the element of each equipment and probe.Such as: we can be the id of probe, type, the title of equipment Deng in placement and element object).After determining communication path, the communication path check box in client column front is chosen as it can be seen that patrolling It collects in figure and logic chart of the customized client node to application node has occurred.And when node client IP address/net of addition Section with already present client ip address/network segment it is absolutely identical when, system can automatic merge node, application server IP address and The client of addition there are when inclusion relation also can automatic merge node (such as the following figure is (see the client in Figure 18: CRM application Segment is network segment client, and network segment range when configuration is 192.168.5.0/24, i.e., it comprises all 5 nets for representative The IP address of section.And the server ip address of 157 backtracking server applications is just that 192.168.5.157 is contained in 5 network segments. So system can merge automatically, using 157 backtracking service nodes in logic chart, as appMerge, (there are CRM to answer in appMerge With with upmserver application) client carry out line).
Logic node of graph can drag the layout for facilitating the customized service logic of user, when node is dragged to close to another node When judge user and merging nodal operation, and can support the newname after the customized merge node of user.When After two nodes merge, if this node has multiple main frames to be indicated with empty circles, multiple applications indicate (as follows with hollow square Scheme (see Figure 19): appMerge node is CRM using manual merge node with upmserver, due to the presence of multiple applications, So application identities are hollow square, and clientMerge is client and 157 backtracking servers under CRM is applied The manual merge node of client under, no application is so be empty circles.And 157 backtracking server applications with Its client segment is without manual union operation, so being shown as solid circles and square).
(merging back-end realization manually, [following all coordinates, data etc. are all to restore mongodb database by D3.js In data show for logic chart after obtained with data method] are as follows: drag the X of node, Y-coordinate be merged X a little, Y seat It marks within 5 pixels, merges when user selects to cancel, can be the X of dragging node, Y-coordinate is separate to be merged a little.Work as determination When merging, we are found by the filter method of D3.js and are merged a little first, and modifying its pattern by force is open circles, when Dragging point be merged a little be application when can be changed into open circles+hollow square.Then some of dragging point are got It is added in the specified object mergeNode being merged a little after significant data [such as: id, type etc.], after merging such as A with B, So mergeNode of A just has the parameters such as A-ID, A-TYPE, B-ID, B-TYPE, and to some dependency numbers being merged a little According to directly being modified, dragging point is then deleted.After completing to the modification of point, judge to merge whether point with other nodes has line Relationship.It is set to find the node after merging if there is then changing source target object in line data.If merged Line has overlapping afterwards, then the existing line of dragging point before deleting, the mergeLink number of objects being merged in line a little According to adding 1.Since there are incidence relations with dendrogram for logic chart.So choosing or deleting application when user's cancellation client It afterwards, can traverse node data while system is by the ID for traversing all nodes [i.e. top is using the ID generated with client] All ID in mergeNode object are present in mergeNode the data first deleted in mergeNode if it is this ID, so After delete corresponding merging line.These operations are gone to judge whether remaining mergeNode has again multiple after finishing, and what is Type.If there is multiple, and type still and is before consistent so this node and does not change, if only remaining next section Point or an application can so modify corresponding node pattern, and top column is shown in specific judgement.After having deleted nodal information, judgement Whether corresponding mergeLink has coincidence, has coincidence mergeLink data to subtract 1, if mergeLink is inherently 0 so straight It connects and deletes line).According to above-mentioned principle, client (Chengdu), Apply Names (upmserver) business in such as Figure 10 of designing are patrolled Collect figure.
After according to above configured, user can configure a accuracy height and intuitively be easy to show the service logic of understanding Figure.
Embodiment one: it is based on Web page, figure one, figure two, figure three is respectively that user configures seen in the page in alarm Concrete outcome.
In figure one, customized alarm configuration, business all in system is contained.It is used by obtaining service logic data ZTree.js restoring data is showed in a manner of tree.The hierarchical relationship of tree are as follows: business > application > application/service Device/client.After each tree-shaped node, list in the node comprising the alarm number enabled and alarm sum.Click first layer Or second layer tree can inquire in the database corresponding data by traffic ID or application ID and check the node industry respectively Lower all alarms are applied in business, and the functions such as can be edited, be deactivated, replicated to alarm.Click the node and point of third layer Application/service device/client node is hit because node thus contains traffic ID, application ID, client id is so in addition to the above function Can it is outer can also to corresponding node addition alarm (addition alarm contain customized addition alarm with select alarm template this two The different mode of kind).
Addition alarm button is clicked, visible (figure four) the following contents of pop-up box is opened:
Title: the title of alarm cannot repeat.
It describes: the information such as the influence for describing alarm, the failure that may cause.
Grade: the grade of alarm, including high, medium and low 3 ranks are set.
Classify: the classification of alarm is set, user customized can classify, added classification before also can choose.
Alarm types: the selection affiliated type of alarm, the alarm types for allowing to add are related with the node that user chooses.Choosing When middle application root node, any alarm cannot be added.When choosing application node, it can only add using monitoring alarm.Choose service When device root node, any server alarm can only be added.When choosing individual server node, it is alert that individual server can only be added Report.When choosing " IP client " type node, single client alarm can only be added.Single client alert definition: client Any one IP meet alert consitions and just alarm.When choosing " all clients " type node, any client can only be added Alarm.When choosing " network segment client " type node: not mapping the network segment client of NAT IP: it is alert that network segment client can only be configured Report;It is mapped to the network segment client of NAT IP: " network segment client " alarm and " single client " alarm can be configured.
Configuration person: the configuration personnel of the alarm are set.
Effectual time: being arranged the effective time of the alarm, and system default is all periods.Select " set period " single choice Button pops up the setting frame of set period, and user can according to need, the time for specifying the alarm to come into force.
Alarm deactivates, and for the exclusion period of the alarm to be arranged, in dead period, alarm does not come into force.
The time bucket of alarm time bucket: is set, and system provides " 1 second ", " 10 seconds " and " 60 seconds " this 3 kinds of times barrel.I.e. By calculating data in the selection period and whether being greater than the trigger condition configured.
Trigger condition: the type and alarm trigger condition of alarm parameters are set, support to carry out between multiple alert consitions The combination of "AND", "or" relationship is placed in the box below trigger condition (see figure five).When click and/or button, bullet is opened Frame (see figure six) selective goal afterwards out, system can be got corresponding selection parameter type nearest three days by historical data and be averaged Value and peak value are carried out when filling in parameter for user with reference to the accurate availability that ensure that parameter.With or composition of relations show in, open Begin and end point is made of being drawn by before the and after parameter of element in CSS.When relationship be or when, pass through JQuery.js and the recursion method li element that user selects into html add peer's li element by append and enter (containing parameter name, trigger condition in this li element).And when relationship be and when, add one layer of ul again into the li element of selection With li element.
It chooses " being sent to mailbox ", pops up receiver's input frame.It can the customized multiple receiver's information of addition.
It chooses " being sent to SYSLOG ", alarm will be sent in syslog.
Automatically save data packet: whether setting automatically saves data packet, and needs to save the time range of data packet. After selection automatically saves data packet, when triggering the alarm, the data packet of the alarm can be downloaded to server automatically by system.
In above description, alarm deactivates the person of may be used in, and business need to change modification in use, network needs to interrupt Stop the generation of unnecessary alarm whens inspection etc..And effectual time then more efficient intelligent can allow user's selection as worked Day, specific festivals or holidays just enable alarm.And trigger condition by with or relationship configuration can then to allow alarm diversification to meet multiple The intersection of condition alarm does not have to the single configuration that can only carry out single part as some softwares before again.
After the completion of configuration, assessment button can be clicked, parameter is assessed.When checking this alarm for historical data can With property and accuracy.(see the patent No.: CN201510777904.X).
Selection alarm template button is clicked, visible (figure seven) the following contents of pop-up box is opened:
Pre-configured same type alarm, the business got by node before user being obtained by database ID, application ID, client id are added into it fast in the alert list of this node, and the alarm of duplication of name can be covered or be skipped.
In upper left four blue icons of list, respectively enabling alarm, closing alarm, deactivated alarm, duplication police Report.It is for carrying out batch operation to the alarm in choosing in the list of lower section.Wherein enabling with closing function is directly to operate. Deactivated alarm then need to configure deactivate at the beginning of with the end time, an alarm can be traversed by setting rear system per minute It sees whether reached deactivation condition, does not trigger the alarm if reaching condition, be more than end time system automatically alarm shape State is changed to enable.Replicated alarm is then needed by selecting node location to get traffic ID, application ID, client id, and is obtained The alarm types chosen are got, corresponding level in remaining business can choose by conditions above and pasted, replicated alarm It is that the quick addition being used in other business is configured to existing alarm, the duplicate operation of user is avoided to improve configuration process Efficiency.
In figure two, the node of intelligent alarms, the node for allowing to configure intelligent alarms is contained only, that is, represents this client It holds and contains minimum two probes in the communication path of server, meet all of conditions above by inquiring under all business Data restore tree, the hierarchical relationship of tree are as follows: business > application > client by zTree.js.Due to each Node can only configure an intelligent alarms, so client node can only be clicked in intelligent alarms, if the node is matched in business In the service logic figure set, intelligent alarms have been configured, client node has been clicked and inquires communication path number in all service logics According to and with traffic ID, application ID, the data that client id is filled into relative client intelligent alarms pass through jQuery.js reduction number According into right side list, checking and editing for next step.
In figure three, the long connection alarm of asynchronous duplex, node contains only the long connection application of asynchronous duplex.Pass through application ID Use jQuery.js restoring data into right side list after filtering out data with alert, checking and editing for next step.
The invention is not limited to specific embodiments above-mentioned.The present invention, which expands to, any in the present specification to be disclosed New feature or any new combination, and disclose any new method or process the step of or any new combination.

Claims (8)

1. a kind of method for carrying out alarm configuration based on service logic, characterized by comprising:
Customized alarm configuration shows step, the switching display content by way of the column tab, by service logic data with tree-shaped knot The mode of structure is shown in Web page side, forms customized alarm configuration column;Tree is at least three layers, and first layer is industry Business layer, the second layer is application layer, and third layer to n-th layer is application layer, server layer or client tier;Each layer is corresponding After alarm number and alarm sum are shown in the corresponding node of current layer, each layer is operated, is shown alarm with list mode In the Web page other side;N is more than or equal to 3;Each node configures m alarm;M is more than or equal to 1;
Intelligent alarms show step, and the switching display content by way of the column tab will contain at least two probe in communication path Service logic data shown in a manner of tree in Web page side, form intelligent alarms Show board;Tree is three Layer, first layer is operation layer, and the second layer is application layer, and third layer is client tier;It is filtered out simultaneously by third layer node ID After alarm relevant parameter, intelligent alarms are shown in the Web page other side in a manner of list;
The long connection alarm step of asynchronous duplex, the switching display content by way of the column tab, when certain application node be configured to it is asynchronous The long connection of duplex in a manner of tree in application, being shown the service logic data of the application node in Web page side, shape At the long connection alarm column of asynchronous duplex;After filtering out alarm relevant parameter by application node ID, shown with list mode The Web page other side;
The customized alarm configuration shows that step specifically includes:
Service logic tree establishment step restores service logic data with zTree.js mode, and with tree Mode is presented in Web page side;Tree is at least three layers, and first layer is operation layer, and the second layer is application layer, third layer It is application layer, server layer or client tier to n-th layer;Simultaneously by zTree.js mode by the corresponding alarm number of each layer After being shown in the corresponding nodename of current layer with alarm sum;
Check alarm step, clicking first layer or second layer tree can be inquired in the database by traffic ID or application ID Corresponding data simultaneously checks alarm all under the nodename respectively, and the data with alert restores Web page by jQuery.js In the alert list of the other side, alarm is edited by alarm addition step, is checked;
Step is added in alarm, is clicked tree third layer to the node of n-th layer, is added alarm for respective nodes and to each police Report carries out alert action management;After filtering out alarm relevant parameter by the node ID of third layer to n-th layer simultaneously, use JQuery.js restores alarm relevant parameter, and is shown in the alert list of the Web page other side in a manner of list.
2. a kind of method for carrying out alarm configuration based on service logic according to claim 1, it is characterised in that described to add Adding alarm includes customized addition alarm step and selection alarm template step;
Customized addition alarm step, including alarm relevant parameter is configured, by the way that the time bucket of alarm, setting police is arranged Report the type and alarm trigger condition of parameter, upon selection between in section data meet the trigger condition of configuration, the then triggering of alarm Number adds 1;Wherein alarm relevant parameter includes alert name, alarm description, alert level, alert category, alarm types, configuration Member, effectual time, alarm deactivate;By alarm relevant parameter, time bucket, the type of alarm parameters and the alarm trigger condition of alarm Data save in the database, by the related data of the customized addition alarm saved in jQuery.js restoring data library, And it is shown in the alert list of the Web page other side with list mode;
Pre-configured same type data with alert, is put into advance before selecting alarm template step, database to obtain user In Ztree node, traffic ID is obtained according to Ztree node, application ID, client id data, and also by jQuery.js mode Original, and with list mode by alarm relevant parameter, alarm time bucket, the type of alarm parameters and alarm trigger condition data It is added into the alert list of respective nodes and is shown, the alarm parameters of duplication of name can be covered or be skipped;
Alert action management includes carrying out enabling alert action to the alert list of the corresponding node of current layer, closing alarm behaviour Make, deactivate alert action and replicated alarm operation;It is exactly to submit to change stop words in database by JS list that alarm, which deactivates, Section, after dead period internal trigger alarm, if the field be dead status so if be not denoted as alarm;It enables, close police Report is directly to operate;Alarm duplication refers to the alarm that same type is first chosen in the list of right side, and system can pass through database All single clients are inquired, user can select client and two alarms chosen are copied to other single clients.
3. a kind of method for carrying out alarm configuration based on service logic according to claim 2, it is characterised in that the police Report trigger condition include the "AND" of n alert consitions, "or" relationship combination, be placed in trigger condition frame, when click and/or When button, selective goal after pop-up box is opened;During wherein "AND" "or" composition of relations is shown, beginning and end point is to pass through CSS Before and after parameter receipt in element forms, when relationship be or when, by jQuery.js and recursion method to html The li element of middle user's selection adds peer's li element by append and enters;And when relationship be and when, to selection One layer of ul and li element are added in li element again.
4. it is according to claim 1 it is a kind of based on service logic carry out alarm configuration method, it is characterised in that it is described from Definition addition alarm step further includes being sent to mailbox functions, is sent in the SYSLOG of Linux system and automatically saves number According to packet function.
5. a kind of method for carrying out alarm configuration based on service logic according to claim 1, it is characterised in that the intelligence Energy alarm shows that step specifically includes:
Intelligent service logic tree establishment step will contain at least two the service logic data of probe in communication path, It is restored with zTree.js mode, and is shown in a manner of tree in Web page side;Tree is three layers, first layer For operation layer, the second layer is application layer, and third layer is client tier;
Intelligence checks alarm step, and clicking first layer or second layer tree can be by traffic ID or application ID in the database Inquiry corresponding data simultaneously checks alarm all under the nodename respectively, and the data with alert restores Web by jQuery.js In the alert list of the page other side, alarm is edited by alarm addition step, is checked;
Intelligent alarms add step, click tree third node layer, and it is alert to establish unique intelligence for the client tier node Report, and alert action management is carried out to intelligent alarms, while after filtering out alarm relevant parameter by third layer node ID, use JQuery.js restores alarm relevant parameter, and is shown in a manner of list in the Web page other side;
Intelligent alarms operational administrative includes carrying out enabling alert action to the alarm of the corresponding node of current layer, closing alarm behaviour Make, deactivate alert action and replicated alarm operation;It is exactly to submit to change stop words in database by JS list that alarm, which deactivates, Section, after dead period internal trigger alarm, if the field be dead status so if be not denoted as alarm;It enables, close police Report is directly to operate;Alarm duplication refers to the alarm that same type is first chosen in the list of right side, and system can pass through database All single clients are inquired, user can select client and two alarms chosen are copied to other single clients.
6. a kind of method for carrying out alarm configuration based on service logic according to claim 1, it is characterised in that described different The long connection alarm step of step duplex configures detailed process and includes:
Alert level relevant information configuration step will for carrying out parameter configuration to alert level, alert category, effectual time The parameter of setting saves in the database, is restored by jQuery.js mode, and another in Web page with list mode displaying Side;
Alarm trigger condition configuration step is configured alarm uplink and downlink payload data packet ratio normal range value, will The parameter of setting saves in the database, is restored by jQuery.js mode, and another in Web page with list mode displaying Side;When ratio is not in normal range value, then alarm is triggered;
Alarm sending function is saved for sending data with alert to SYSLOG or being sent to mailbox.
7. one kind carries out alarm configuration device based on service logic, characterized by comprising:
Customized alarm configures display module, the switching display content by way of the column tab, by service logic data with tree-shaped knot The mode of structure is shown in Web page side, forms customized alarm configuration column;Tree is at least three layers, and first layer is industry Business layer, the second layer is application layer, and third layer to n-th layer is application layer, server layer or client tier;Each layer is corresponding After alarm number and alarm sum are shown in the corresponding node of current layer, each layer is operated, is shown alarm with list mode In the Web page other side;N is more than or equal to 3;Each node configures m alarm;M is more than or equal to 1;
Intelligent alarms display module, the switching display content by way of the column tab will contain at least two probe in communication path Service logic data shown in a manner of tree in Web page side, form intelligent alarms Show board;Tree is three Layer, first layer is operation layer, and the second layer is application layer, and third layer is client tier;It is filtered out simultaneously by third layer node ID After alarm relevant parameter, intelligent alarms are shown in the Web page other side in a manner of list;
The long connection alarm modules of asynchronous duplex, the switching display content by way of the column tab, when certain application node be configured to it is asynchronous The long connection of duplex in a manner of tree in application, being shown the service logic data of the application node in Web page side, shape At the long connection alarm column of asynchronous duplex;After filtering out alarm relevant parameter by application node ID, shown with list mode The Web page other side;
The customized alarm configuration display module specifically includes:
Service logic tree establishes module, service logic data is restored with zTree.js mode, and with tree Mode is presented in Web page side;Tree is at least three layers, and first layer is operation layer, and the second layer is application layer, third layer It is application layer, server layer or client tier to n-th layer;Simultaneously by zTree.js mode by the corresponding alarm number of each layer After being shown in the corresponding nodename of current layer with alarm sum;
Check alarm modules, clicking first layer or second layer tree can be inquired in the database by traffic ID or application ID Corresponding data simultaneously checks alarm all under the nodename respectively, and the data with alert restores Web page by jQuery.js In the alert list of the other side, alarm is edited by alarm adding module, is checked;
Alarm adding module clicks tree third layer to the node of n-th layer, adds alarm for respective nodes and to each police Report carries out alert action management;After filtering out alarm relevant parameter by the node ID of third layer to n-th layer simultaneously, use JQuery.js restores alarm relevant parameter, and is shown in the alert list of the Web page other side in a manner of list.
8. according to claim 7 a kind of based on service logic progress alarm configuration device, it is characterised in that the intelligence Alarm shows that step specifically includes:
Intelligent service logic tree establishment step will contain at least two the service logic data of probe in communication path, It is restored with zTree.js mode, and is shown in a manner of tree in Web page side;Tree is three layers, first layer For operation layer, the second layer is application layer, and third layer is client tier;
Intelligence checks alarm step, and clicking first layer or second layer tree can be by traffic ID or application ID in the database Inquiry corresponding data simultaneously checks alarm all under the nodename respectively, and the data with alert restores Web by jQuery.js In the alert list of the page other side, alarm is edited by alarm addition step, is checked;
Intelligent alarms add step, click tree third node layer, and it is alert to establish unique intelligence for the client tier node Report, and alert action management is carried out to intelligent alarms, while after filtering out alarm relevant parameter by third layer node ID, use JQuery.js restores alarm relevant parameter, and is shown in a manner of list in the Web page other side;
Intelligent alarms operational administrative includes carrying out enabling alert action to the alarm of the corresponding node of current layer, closing alarm behaviour Make, deactivate alert action and replicated alarm operation;It is exactly to submit to change stop words in database by JS list that alarm, which deactivates, Section, after dead period internal trigger alarm, if the field be dead status so if be not denoted as alarm;It enables, close police Report is directly to operate;Alarm duplication refers to the alarm that same type is first chosen in the list of right side, and system can pass through database All single clients are inquired, user can select client and two alarms chosen are copied to other single clients;
The long connection alarm step of the asynchronous duplex configures detailed process and includes:
Alert level relevant information configuration step will for carrying out parameter configuration to alert level, alert category, effectual time The parameter of setting saves in the database, is restored by jQuery.js mode, and another in Web page with list mode displaying Side;
Alarm trigger condition configuration step is configured alarm uplink and downlink payload data packet ratio normal range value, will The parameter of setting saves in the database, is restored by jQuery.js mode, and another in Web page with list mode displaying Side;When ratio is not in normal range value, then alarm is triggered;
Alarm sending function is saved for sending data with alert to SYSLOG or being sent to mailbox.
CN201610851834.2A 2016-09-27 2016-09-27 A kind of method and device carrying out alarm configuration based on service logic Active CN106452851B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610851834.2A CN106452851B (en) 2016-09-27 2016-09-27 A kind of method and device carrying out alarm configuration based on service logic

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610851834.2A CN106452851B (en) 2016-09-27 2016-09-27 A kind of method and device carrying out alarm configuration based on service logic

Publications (2)

Publication Number Publication Date
CN106452851A CN106452851A (en) 2017-02-22
CN106452851B true CN106452851B (en) 2019-06-11

Family

ID=58170088

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610851834.2A Active CN106452851B (en) 2016-09-27 2016-09-27 A kind of method and device carrying out alarm configuration based on service logic

Country Status (1)

Country Link
CN (1) CN106452851B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107368594B (en) * 2017-07-26 2020-05-19 成都科来软件有限公司 Industrial control data analysis result double-view display system
CN108280013B (en) * 2018-02-05 2021-07-23 中国银行股份有限公司 Method and device for displaying environmental resource monitoring page

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101183457A (en) * 2007-12-17 2008-05-21 北京航空航天大学 Intelligent management and automatic implementation system of policing command predetermined plan
CN103745015A (en) * 2014-01-25 2014-04-23 温州大学 Foreign affairs information management and release system
CN105450444A (en) * 2015-11-16 2016-03-30 成都科来软件有限公司 Network parameter alarm configuration system and network parameter alarm evaluation system based on network data

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DK2109323T3 (en) * 2008-04-08 2011-02-14 Tieto Oyj Dynamic error analysis for a centrally managed network element in a telecommunications system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101183457A (en) * 2007-12-17 2008-05-21 北京航空航天大学 Intelligent management and automatic implementation system of policing command predetermined plan
CN103745015A (en) * 2014-01-25 2014-04-23 温州大学 Foreign affairs information management and release system
CN105450444A (en) * 2015-11-16 2016-03-30 成都科来软件有限公司 Network parameter alarm configuration system and network parameter alarm evaluation system based on network data

Also Published As

Publication number Publication date
CN106452851A (en) 2017-02-22

Similar Documents

Publication Publication Date Title
US11741089B1 (en) Interactive location queries for raw machine data
US20220121410A1 (en) Technology add-on interface
CN106100999B (en) Image network flow control methods in a kind of virtualized network environment
CN1972217B (en) System and method of tiered communication services in a composite communication service
CN103973496B (en) Method for diagnosing faults and device
US20050091356A1 (en) Method and machine-readable medium for using matrices to automatically analyze network events and objects
CN109213747A (en) A kind of data managing method and device
US8589536B2 (en) Network monitoring system
CN110838944B (en) Method for realizing cloud center tenant dimension topological graph
CN111934922B (en) Method, device, equipment and storage medium for constructing network topology
CN107958337A (en) A kind of information resources visualize mobile management system
CN106452955B (en) A kind of detection method and system of abnormal network connection
CN105162627A (en) Method and system for discovering and presenting network application access information
CN114791846B (en) Method for realizing observability aiming at cloud-originated chaos engineering experiment
US11824729B2 (en) Generating a three-dimensional cityscape including a cluster of nodes
CN107491371A (en) A kind of method and device for monitoring deployment
CN106452851B (en) A kind of method and device carrying out alarm configuration based on service logic
CN106301945A (en) The setting of a kind of service condition based on service logic, methods of exhibiting and device
CN107506420B (en) Geographic information map configuration method and system based on local area network
US20120030572A1 (en) Network visualization system
CN115333966A (en) Nginx log analysis method, system and equipment based on topology
US20040250260A1 (en) Middle-ware interface status tool and method for using same
CN110968479A (en) Business-level full-link monitoring method for application program and server
US20090132958A1 (en) Distinct Groupings of Related Objects for Display in a User Interface
CN109639475A (en) Network self-diagnosis Fault Locating Method based on associated diagram

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CP03 Change of name, title or address

Address after: 610041 No. 06, floor 15, unit 2, building 1, No. 28, north section of Tianfu Avenue, Chengdu hi tech Zone, China (Sichuan) pilot Free Trade Zone, Chengdu, Sichuan

Patentee after: Chengdu Shumo Technology Co.,Ltd.

Address before: B6-7, Tianfu Software Park, 99 Tianhua 1st Road, high tech Zone, Chengdu, Sichuan 610041

Patentee before: COLASOFT Co.,Ltd.

CP03 Change of name, title or address
TR01 Transfer of patent right

Effective date of registration: 20220325

Address after: 610041 12th, 13th and 14th floors, unit 1, building 4, No. 966, north section of Tianfu Avenue, high tech Zone, Chengdu, Sichuan

Patentee after: Kelai Network Technology Co.,Ltd.

Address before: 610041 No. 06, floor 15, unit 2, building 1, No. 28, north section of Tianfu Avenue, Chengdu hi tech Zone, China (Sichuan) pilot Free Trade Zone, Chengdu, Sichuan

Patentee before: Chengdu Shumo Technology Co.,Ltd.

TR01 Transfer of patent right