CN106844165A - Alarm method and device - Google Patents

Alarm method and device Download PDF

Info

Publication number
CN106844165A
CN106844165A CN201611170786.7A CN201611170786A CN106844165A CN 106844165 A CN106844165 A CN 106844165A CN 201611170786 A CN201611170786 A CN 201611170786A CN 106844165 A CN106844165 A CN 106844165A
Authority
CN
China
Prior art keywords
alarm
resource
target resource
monitoring parameter
target
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201611170786.7A
Other languages
Chinese (zh)
Other versions
CN106844165B (en
Inventor
刘胜
赵波
郑振宇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Cloud Computing Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Priority to CN201611170786.7A priority Critical patent/CN106844165B/en
Priority to CN202010968139.0A priority patent/CN112214382B/en
Publication of CN106844165A publication Critical patent/CN106844165A/en
Application granted granted Critical
Publication of CN106844165B publication Critical patent/CN106844165B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/32Monitoring with visual or acoustical indication of the functioning of the machine
    • G06F11/324Display of status information
    • G06F11/327Alarm or error message display
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/06Management of faults, events, alarms or notifications
    • H04L41/0604Management of faults, events, alarms or notifications using filtering, e.g. reduction of information by using priority, element types, position or time
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/06Management of faults, events, alarms or notifications
    • H04L41/0681Configuration of triggering conditions

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Theoretical Computer Science (AREA)
  • Quality & Reliability (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Debugging And Monitoring (AREA)
  • Alarm Systems (AREA)

Abstract

The embodiment of the present application provides alarm method and device, is related to communication technical field, solves the problems, such as that existing alarm mode is less efficient under extensive resource scene in the prior art.The method includes:Resource filtering condition according to defined in the alarm regulation being pre-created, acquisition meets the target resource list of the resource filtering condition, and the alarm regulation defines the resource filtering condition, the monitoring parameter of the target resource and the alarm threshold of the monitoring parameter;For each target resource in the target resource list, following operation is performed respectively:Obtain the currency of the monitoring parameter of the target resource;Determine the currency whether in the range of the alarm threshold;If the currency sends alarm information in the range of the alarm threshold.

Description

Alarm method and device
Technical field
The application is related to communication technical field, more particularly to alarm method and device.
Background technology
OpenStack is the open source projects for providing software with management for the construction of public cloud, private clound and mixed cloud, It is also current maximum cloud platform of increasing income.OpenStack includes multiple projects, such as Telemetry projects.Wherein, Telemetry Project includes Ceilometer sub-projects and Aodh sub-projects, and Ceilometer sub-projects are mainly responsible in Telemetry projects The functions such as collection, storage, the inquiry of measurement monitoring information;Aodh sub-projects are mainly responsible for alerting service, including alarm definition, announcement The functions such as alert assessment, alarm notification.
At present, Telemetry projects provide three kinds of alarm modes, including:Threshold value (threshold) alarm, Composite Alarm and Gnocchi alarms.These three alarm modes are required to be respectively created alarm regulation for each resource, and this is extensive It is less efficient under resource scene.
Therefore, under OpenStack platforms, how to improve the alarm efficiency under extensive resource scene is urgently to solve at present Problem certainly.
The content of the invention
Embodiments herein provides alarm method and device, at least to solve current existing alarm mode extensive Less efficient problem under resource scene.
To reach above-mentioned purpose, embodiments herein is adopted the following technical scheme that:
On the one hand, there is provided a kind of alarm method, OpenStack platforms are applied to, the method includes:According to what is be pre-created Resource filtering condition defined in alarm regulation, acquisition meets the target resource list of the resource filtering condition, the alarm regulation Define the resource filtering condition, the monitoring parameter of the target resource and the alarm threshold of the monitoring parameter;Provided for the target Each target resource in the list of source, performs following operation respectively:Obtain the currency of the monitoring parameter of the target resource;Really Whether the fixed currency is in the range of the alarm threshold;If the currency sends alarm information in the range of the alarm threshold. Under the extensive resource scene of OpenStack platforms, when creating alarm to one group of same monitoring parameter of resource, relative to It is the method that each resource in one group of resource creates alarm regulation the need for existing, the alarm method that the application is provided is only Alarm monitoring is carried out by an alarm regulation need to be created, the redundancy that a large amount of alarm regulations are produced is created so as to reduce, improved Alarm efficiency under large scale scene, and then reduce the management cost of OpenStack platforms.
In a kind of possible design, the alarm regulation also defines the aggregate function of the monitoring parameter and monitors the target The time span of resource;The currency of the monitoring parameter of the acquisition target resource, including:Mark according to the target resource, The monitoring parameter and the time span, call the aggregate function query statistic database, obtain the monitoring parameter of the target resource Currency, wherein, the staqtistical data base includes the correspondence of the mark, the monitoring parameter and the time span of the target resource Relation.
In a kind of possible design, the resource filtering condition includes:The type of the target resource;Or, meet default The type of the target resource of condition.Because the resource filtering condition defined in alarm regulation can be to meet pre-conditioned mesh The type of resource is marked, therefore, it can be monitored according to the user's request asset creation alarm regulation special to a group, further Improve Consumer's Experience.
In a kind of possible design, the alarm information includes the mark of the target resource.
In a kind of possible design, the alarm regulation also defines packet keyword;In the announcement that the basis is pre-created Police regulations then defined in resource filtering condition, after acquisition meets the target resource list of the resource filtering condition, also include:Root According to the packet keyword, the target resource in the target resource list is grouped, is obtained at least one set of target resource.
In a kind of possible design, the alarm information also includes the group mark of packet where the target resource.
Another aspect, the embodiment of the present application provides a kind of alarm device, and the device is applied to OpenStack platforms, the announcement Alarm device includes:Acquisition module, determining module and sending module;The acquisition module, for according to the alarm regulation being pre-created Defined in resource filtering condition, acquisition meets the target resource list of the resource filtering condition, and the alarm regulation defines this Resource filtering condition, the monitoring parameter of the target resource and the alarm threshold of the monitoring parameter;For in the target resource list Each target resource:The acquisition module, is additionally operable to obtain the currency of the monitoring parameter of the target resource;The determination mould Block, for determining the currency whether in the range of the alarm threshold;The sending module, if for the currency in the alarm threshold In the range of value, then alarm information is sent to external equipment.Under the extensive resource scene of OpenStack platforms, to one group of money When the same monitoring parameter in source creates alarm, relative to the need for existing for each resource in one group of resource creates announcement Police regulations method then, the alarm equipment that the application is provided only needs to carry out alarm monitoring by creating an alarm regulation, so as to subtract Lack the redundancy that a large amount of alarm regulations of establishment are produced, improve the alarm efficiency under large scale scene, and then reduce The management cost of OpenStack platforms.
In a kind of possible design, the alarm regulation also defines the aggregate function of the monitoring parameter and monitors the target The time span of resource;The acquisition module, is additionally operable to take the currency of the monitoring parameter for obtaining the target resource, specifically includes:Root According to the mark of the target resource, the monitoring parameter and the time span, the aggregate function query statistic database is called, be somebody's turn to do The currency of the monitoring parameter of target resource, wherein, the staqtistical data base includes the mark of the target resource, the monitoring parameter With the corresponding relation of the time span.
In a kind of possible design, the resource filtering condition includes:The type of the target resource;Or, meet default The type of the target resource of condition.Because the resource filtering condition defined in alarm regulation can be to meet pre-conditioned mesh The type of resource is marked, therefore, it can be monitored according to the user's request asset creation alarm regulation special to a group, further Improve Consumer's Experience.
In a kind of possible design, the alarm information includes the mark of the target resource.
In a kind of possible design, the alarm regulation also defines packet keyword, and the alarm device also includes packet Module;The grouping module, for the resource filtering condition in the acquisition module according to defined in the alarm regulation being pre-created, obtains After taking the target resource list for meeting the resource filtering condition, according to the packet keyword, by the target resource list Target resource is grouped, and obtains at least one set of target resource.
In a kind of possible design, the alarm information also includes the group mark of packet where the target resource.
Another aspect, embodiments herein provides a kind of alarm equipment, including:Processor, memory, bus and communication Interface;The memory is used to store computer executed instructions, and the processor is connected with the memory by the bus, when the alarm When equipment is run, computer executed instructions of the computing device memory storage, so that the alarm equipment is performed as above State the alarm method of any one.
Another aspect, the embodiment of the present application provides a kind of computer-readable storage medium, for saving as above-mentioned any one Alarm method used by computer software instructions, it is included for performing the journey designed by above-mentioned any one alarm method Sequence.
Another aspect, the embodiment of the present application provides a kind of computer program, and the computer program includes instruction, when the meter When calculation machine program is computer-executed so that computer can perform the flow in the alarm method of above-mentioned any one.
In addition, the technique effect that any one design is brought in above-mentioned alarm device embodiment is reference can be made to above-mentioned alarm The technique effect that different designs mode is brought in embodiment of the method, here is omitted.
These aspects or other aspects of the application can more straightforward in the following description.
Brief description of the drawings
The logical architecture figure of the OpenStack that Fig. 1 is applied by the embodiment of the present application;
The configuration diagram of the Telemetry projects that Fig. 2 is provided for the embodiment of the present application;
A kind of computer equipment schematic diagram that Fig. 3 is provided for the embodiment of the present application;
A kind of schematic flow sheet of alarm method that Fig. 4 is provided for the embodiment of the present application;
A kind of structural representation of alarm device that Fig. 5 is provided for the embodiment of the present application;
The structural representation of another alarm device that Fig. 6 is provided for the embodiment of the present application.
Specific embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present application, the technical scheme in the embodiment of the present application is described.
The logical architecture figure of the OpenStack that Fig. 1 is applied by the embodiment of the present application.As shown in figure 1, OpenStack bags Multiple projects are included, these projects constitute the OpenStack cloud environments of complete set function.Wherein most crucial project includes: Nova, Cinder and Neutron, these projects constitute a most basic function of OpenStack cloud environments.
Certainly, in addition to Nova, Cinder and Neutron project, also some very important projects are used for providing Perfect OpenStack cloud platform abilities, such as Glance, Keystone, Horizon, Swift, Ironic, Trove, Sahara, Heat and Ceilometer.Wherein, these projects in OpenStack operate in virtual machine (English: Virtual Machines, abbreviation:VMs in).
The function to each project in OpenStack is briefly discussed below below:
Nova:There is provided the virtual machine Capacity Management of physical machine resource, and virtual machine life cycle management.
Cinder:There is provided the ability of the block storage device management of virtual machine.
Neutron:There is provided the management of virtualizing network resources, including network, subnet, port and VPN (English:Virtual Private Network, abbreviation:The high-level service such as VPN).
Glance:There is provided mirror image management service, including the mirror image and snapshot needed for virtual machine etc..
Keystone:There is provided user management and authentication service.
Horizon:There is provided the instrument board (webpage (English of OpenStack:Web) interface) service.
Swift:There is provided object storage service.
Ironic:There is provided bare machine management service.
Trove:There is provided the function of " database is service ".
Sahara:There is provided big data service.
Heat:There is provided arranging service and software merit rating service.
Ceilometer projects:There is provided monitoring metering service.
Wherein, at OpenStack M editions, (OpenStack is come the Ceilometer projects in Fig. 1 using the order of alphabet Name its version) and M editions after be renamed as Telemetry projects.Telemetry projects are by before OpenStack M editions The function of Ceilometer projects splits into two parts:One is Ceilometer sub-projects, is responsible for Telemetry specially The functions such as monitoring information acquisition, storage, inquiry are measured in mesh, such as virtual machine, volume, mirror image etc. in collection OpenStack environment The metrical information and status information of virtual machine related resource and physical host;One is Aodh sub-projects, is responsible for alarm specially The function such as definition, assessment, alarm notification.
Fig. 2 is the configuration diagram of Telemetry projects.As shown in Fig. 2 Telemetry projects include:Ceilometer Sub-project, database, application programming interface (English:Application Programming Interface, abbreviation: ) and Aodh sub-projects API.
The function to modules in Telemetry projects is briefly discussed below below:
Ceilometer sub-projects:Including polling agent (English:Polling Agents) service, notification agent (English: Notification Agents) service and collection service (English:Collectors).
Polling agent:It is that resource information in the control node and all calculate nodes for operate in a set of OpenStack is adopted Collection agency.Wherein, the node of each management service operation is control node, and the node of virtual machine operation is calculate node.If fortune In control node, polling agent is responsible for being gathered by the API of each modules of OpenStack the resource information of OpenStack to row, The API of Glance is for example called to gather the information of mirror image size;If operating in calculate node, polling agent is responsible for the node The information gathering of upper virtual machine, for example, gather the central processing unit (English of the virtual machine that the main frame is operated above:Central Processing Unit, abbreviation:CPU) utilization rate, memory usage, disk read-write speed etc..
Notification agent:In OpenStack, each service can process some virtual resources and resource status generation Message of being given notice when change is to notifying bus (notify bus be also referred to as message queue).Notification agent is responsible for reception The notification message that other assemblies send in OpenStack, while also being responsible for from the message for notifying bus reception polling agent to send And processed.
Collector:Notification agent continues the message of collection to be sent in notice bus after message has been processed, and gathers Device can monitor notice bus, receive the message of collection, and the message format of collection is turned into rule sample record storage to number According to storehouse.
API:Including ceilometer-api and aodh-api.
Wherein, ceilometer-api provides the API service of Ceilometer sub-projects.Main API includes:Inquiry Continuous data (English:Sample-list API), inquiry measuring index (English:Meter-list API), inquiry stoichiometric number According to statistics (English:Statistic-list the resource object list (English that API), inquiry be collected: Resource-list API) etc..
Aodh-api provides the API service of Aodh sub-projects.
Database:The data gathered for the collector for storing Ceilometer and the data being input into by API.
Aodh sub-projects:Including Aodh assessment (English:Aodh-evaluater) service and Aodh notify (English:aodh- Notifier) service.
Wherein, the alarm method that the embodiment of the present application is provided is mainly by Aodh sub-projects to realize.The application is implemented In example, operation Aodh subitem destination devices are referred to as alarm device, certainly, operation Aodh subitem destination devices are also likely to be other Title, the embodiment of the present application is not especially limited to this.
Below in conjunction with the accompanying drawing in the embodiment of the present application, the technical scheme in the embodiment of the present application is described.
It should be noted that "/" herein represent or the meaning, for example, A/B can represent A or B;Herein "and/or" is only a kind of incidence relation for describing affiliated partner, and expression there may be three kinds of relations, for example, A and/or B, can To represent:Individualism A, while there is A and B, individualism B these three situations." multiple " refers to two or more.
" component ", " module ", " system " etc. are intended to refer to computer related entity as used herein the term, should Computer related entity can be hardware, firmware, the combination of hardware and software, software or operating software.For example, component May be, but not limited to, is:Treatment, processor, object, executable file, executory thread, the journey run on a processor Sequence and/or computer.As an example, the application for running on the computing device and the computing device can be components.One or Multiple components may reside in executory process and/or thread, and component may be located in a computer and/or Person is distributed between two or more computers.Additionally, these components can be each with various data structures from thereon Plant execution in computer-readable medium.These components can by such as according to have one or more packets (for example, come From a data for component, the component is interacted and/or with signal with another component in local system, distributed system Mode interacted by the network of such as internet etc and other systems) signal, with locally and/or remotely process Mode is communicated.
It should be noted that in the embodiment of the present application, the word such as " exemplary " or " such as " makees example, example for expression Card or explanation.Any embodiment or design for being described as " exemplary " or " such as " in the embodiment of the present application should not It is interpreted than other embodiments or design more preferably or more advantage.Specifically, " exemplary " or " example are used Such as " word is intended to that related notion is presented in a concrete fashion.
It should be noted that in the embodiment of the present application, " (English:Of) ", " corresponding (English:Corresponding, Relevant it is) " and " corresponding (English:Corresponding) " can use with sometimes, it is noted that do not emphasizing it During difference, its is to be expressed be meant that it is consistent.
As shown in figure 3, alarm device in the embodiment of the present application can by the computer equipment (or system) in Fig. 3 come Realize.
Fig. 3 show the computer equipment schematic diagram of the embodiment of the present application offer.Computer equipment 300 includes at least one Processor 301, communication bus 302, the communication interface 304 of memory 303 and at least one.
Processor 301 can be a general central processor (English:Central Processing Unit, abbreviation: CPU), microprocessor, ASIC (English:Application-Specific Integrated Circuit, Abbreviation:ASIC), or one or more be used for control application scheme program perform integrated circuit.
Communication bus 302 may include a path, and information is transmitted between said modules.
Communication interface 304, using the device of the class of any transceiver one, for other equipment or communication, such as Ethernet, wireless access network (English:Radio Access Network, abbreviation:RAN), WLAN (English: Wireless Local Area Networks, abbreviation:WLAN) etc..
Memory 303 can be read-only storage (English:Read-Only Memory, abbreviation:ROM) or static state can be stored Information and the other kinds of static storage device of instruction, random access memory (English:Random Access Memory, Abbreviation:RAM) or can storage information and instruction other kinds of dynamic memory, or electric erazable programmable only Read memory (English:Electrically Erasable Programmable Read-Only Memory, abbreviation: EEPROM), read-only optical disc (English:Compact Disc Read-Only Memory, abbreviation:) or other light are taken inventory CD-ROM Storage, laser disc storage (including compression laser disc, laser disc, laser disc, Digital Versatile Disc, Blu-ray Disc etc.), magnetic disk storage medium or Other magnetic storage apparatus of person or can be used in carrying or store the desired program code with instruction or data structure form And can be by any other medium of computer access, but not limited to this.Memory can be individually present, by bus and place Reason device is connected.Memory can also be integrated with processor.
Wherein, memory 303 is used to store the application code for performing application scheme, and is controlled by processor 301 System is performed.Processor 301 is used to perform the application code stored in memory 303, so as in realizing the embodiment of the present application Alarm method.
In implementing, such as used as a kind of embodiment, processor 301 can include one or more CPU, in Fig. 3 CPU0 and CPU1.
In implementing, such as used as a kind of embodiment, computer equipment 300 can include multiple processors, in Fig. 3 Processor 301 and processor 308.Each in these processors can be a monokaryon (English:Single-CPU) place Reason device, or a multinuclear (English:Multi-CPU) processor.Here processor can refer to one or more equipment, Circuit, and/or the process cores for processing data (such as computer program instructions).
In implementing, used as a kind of embodiment, computer equipment 300 can also include output equipment 305 and input Equipment 306.Output equipment 305 and processor 301 communicate, and can in many ways carry out display information.For example, output equipment 305 Can be liquid crystal display (English:Liquid Crystal Display, abbreviation:LCD), Light-Emitting Diode (English:Light Emitting Diode, abbreviation:LED) display device, cathode-ray tube (English:Cathode Ray Tube, abbreviation:CRT) show Show equipment, or projecting apparatus (English:Projector) etc..Input equipment 306 and processor 301 communicate, and can connect in many ways It is input into by user.For example, input equipment 306 can be mouse, keyboard, touch panel device or sensing equipment etc..
Above-mentioned computer equipment 300 can be a general purpose computing device or a dedicated computing machine equipment. In implementing, computer equipment 300 can be desktop computer, portable computer, the webserver, palm PC (English: Personal Digital Assistant, abbreviation:PDA), cell phone, panel computer, wireless terminal device, communication equipment, Embedded device or the equipment for having similar structures in Fig. 3.The embodiment of the present application does not limit the type of computer equipment 300.
As shown in figure 4, a kind of schematic flow sheet of the alarm method provided for the embodiment of the present application, including step S401- S402:
The resource filtering condition of S401, alarm device according to defined in the alarm regulation being pre-created, acquisition meets the money The target resource list of source filter condition.
Wherein, in the embodiment of the present application, the alarm regulation being pre-created defines the prison of resource filtering condition, target resource The alarm threshold of control parameter and the monitoring parameter.
Certainly, in the embodiment of the present application, rank, the alarm of alarm regulation can also be defined in the alarm regulation being pre-created The information such as alarm status, tenant identification and the ID of rule, the embodiment of the present application is not especially limited to this.
Exemplary, the monitoring parameter of target resource can be the CPU usage of virtual machine, the use of the hard disk of virtual machine Rate, the disk read-write speed of virtual machine, network rate of virtual machine etc., the embodiment of the present application is not especially limited to this.
S402, for each target resource in target resource list, alarm device performs following operation respectively:
T1:Alarm device obtains the currency of the monitoring parameter of target resource.
T2:Whether alarm device determines the currency of the monitoring parameter of target resource in the range of alarm threshold.
T3:If in the range of alarm threshold, alarm device is to external equipment for the currency of the monitoring parameter of target resource Send alarm information.
Optionally, the mark of target resource can be included in the alarm information, such external equipment is receiving the alarm After message, the position of the resource for alerting can be inquired according to the mark of the target resource, and then for alerting Resource processed.
Optionally, in the embodiment of the present application, alarm device determine target resource monitoring parameter currency whether After in the range of alarm threshold, new information can also be sent to the database of the monitoring parameter of storage target resource, renewal disappears The corresponding alarm status of monitoring parameter of target resource and the mark of target resource are carried in breath, so as to obtain database according to more The alarm status carried in new information updates the data the corresponding alarm status of monitoring parameter of the target resource stored in storehouse.Its In, if alarm regulation M resource suitable for the Resources list, wherein, M is the positive integer more than or equal to 1, then need more The new M corresponding alarm status of monitoring parameter of resource, hair is inquired in order to external equipment according to the alarm status after renewal The mark of the resource of raw alarm, and then according to the position for identifying the resource for determining to alert of the resource for alerting, so that Resource to alerting is processed.Wherein, alarm status generally includes three types:Data deficiencies, normal and alarm.This In application embodiment, if the currency of the monitoring parameter of target resource is in the range of alarm threshold, corresponding alarm status is " alarm ";If not in the range of alarm threshold, corresponding alarm status is for " just for the currency of the monitoring parameter of target resource Often ";If the currency missing of the monitoring parameter of target resource, it is impossible to judge whether in the range of alarm threshold, then corresponding announcement Alert state is " data deficiencies ".
Under the extensive resource scene of OpenStack platforms, alarm is created to one group of same monitoring parameter of resource When, relative to being the method that each resource in one group of resource creates alarm regulation the need for existing, what the application was provided Alarm method only needs to carry out alarm monitoring by creating an alarm regulation, creates what a large amount of alarm regulations were produced so as to reduce Redundancy, improves the alarm efficiency under large scale scene, and then reduce the management cost of OpenStack platforms.
Further, alarm regulation can also define the aggregate function and monitoring objective resource of the monitoring parameter of target resource Time span, then alarm device obtain the currency of monitoring parameter of target resource and can specifically include:Alarm device according to The mark of target resource, the monitoring parameter of target resource and time span, the aggregate function of the monitoring parameter of invocation target resource Query statistic database, obtains the currency of the monitoring parameter of the target resource.Wherein, the staqtistical data base includes that target is provided The mark in source, the monitoring parameter of target resource and the corresponding relation of time span.
Optionally, aggregate function can be average function, minimize function, the function of maximizing, ask The function of variance, the embodiment of the present application is not especially limited to this.
In a kind of possible implementation, resource filtering condition can include:The type of target resource;Or, meet pre- If the type of the target resource of condition.
For example, the type of target resource can be virtual machine, hard disk, server etc..
In the embodiment of the present application, the type of target resource can be directly defined in resource filtering condition, it is also possible to pass through Some parameters related to the type of target resource defined in resource filtering condition determine the type of target resource, such as, When Destination Resource Type is virtual machine, some related parameters of virtual machine, these parameters can be defined in resource filtering condition The type that the target resource can be uniquely determined is virtual machine;Or, when Destination Resource Type is hard disk, resource filtering condition In can define some related parameters of hard disk, the type that these parameters can uniquely determine the target resource is hard disk;Or, When Destination Resource Type is server, some related parameters of server, these parameters can be defined in resource filtering condition The type that the target resource can be uniquely determined is server;The embodiment of the present application is not especially limited to this.
The type for meeting pre-conditioned target resource can be one group of virtual machine that user adds " vip_vm " label, Deng.
Wherein, because the resource filtering condition defined in alarm regulation can be the class of the target resource for meeting pre-conditioned Type, therefore, it can be monitored according to the user's request asset creation alarm regulation special to a group, further improve user Experience.
Optionally, when a virtual machine is newly increased in OpenStack platforms, user can be the virtual machine for newly increasing Also " vip_vm " label is added, so can be using the same of the virtual machine for carrying " vip_vm " label stored in database One monitoring parameter carries out an alarm regulation of alarm monitoring, and the same monitoring parameter of the virtual machine to newly increasing carries out alarm prison Control, it is no longer necessary to re-create an alarm regulation for a certain monitoring parameter according to existing alarm method, reduce establishment The redundancy that unnecessary alarm regulation is produced, improves the efficiency of alarm, and then reduce the management cost of OpenStack platforms.
Further, the alarm regulation can also define packet keyword.So, in alarm device according to being pre-created Resource filtering condition defined in alarm regulation, acquisition meet the resource filtering condition target resource list (step S401) it Afterwards, can also include:Be grouped for the target resource in target resource list according to packet keyword by alarm device, is obtained At least one set of target resource.
Such as, the embodiment of the present application can be using the unique mark of resource as packet keyword in target resource list Target resource is grouped, and obtains at least one set of target resource, wherein, a target resource is included in each group of target resource. The unique mark of resource for example can be universal virtual machine unique identifier (English:Universally Unique Identifier, abbreviation:UUID), UUID of disk etc..
Certainly, in the embodiment of the present application, packet keyword can also be other, at least one set of target money obtained after packet This can also be not especially limited comprising multiple target resources, the embodiment of the present application in a certain group of target resource in source.
Optionally, alarm device can also include the group of packet where target resource to the alarm information that external equipment sends Mark.So external equipment, can be according to the group of packet where target resource mark soon after the alarm information is received Speed inquires the position of packet where the resource for alerting, and then can determine occur according to the mark of the resource for alerting The position of the resource of alarm, so as to be processed for the resource for alerting.
It should be noted that the alarm method in the embodiment of the present application is readily adaptable for use in existing Composite modes, For example by multiple threshold ranges of the multiple monitoring parameters in one group of resource, combined by " and (and) " " or (or) " etc. and defined One alarm regulation is monitored to one group of resource, specifically refers to the description of above method embodiment, and the embodiment of the present application exists This is repeated no more.
To sum up, under the extensive resource scene of OpenStack platforms, one group of same monitoring parameter of resource is created During alarm, relative to being the method that each resource in one group of resource creates alarm regulation the need for existing, the application is carried The alarm method of confession is only needed to carry out alarm monitoring by creating an alarm regulation, and a large amount of alarm regulations products are created so as to reduce Raw redundancy, improves the alarm efficiency under large scale scene, and then reduce the management cost of OpenStack platforms.
Exemplary, it is assumed that system A includes 5 virtual machines and 5 hard disks, and each virtual machine includes 1 CPU.Table 1 is In the utilization rate of the CPU at moment 1, table 2 is the utilization rate of 5 hard disks at the moment 1 of system A to 5 virtual machines of system A.
Table 1
Table 2
The Resources list Monitoring parameter
The hard disk 1 of system A The utilization rate 67% of hard disk 1
The hard disk 2 of system A The utilization rate 54% of hard disk 2
The hard disk 3 of system A The utilization rate 85% of hard disk 3
The hard disk 4 of system A The utilization rate 49% of hard disk 4
The hard disk 5 of system A The utilization rate 23% of hard disk 5
Assuming that user needs to be monitored two groups of resources of system A:
1st, whether the utilization rate of 5 virtual machines of monitoring system A CPU at a time is more than or equal to 80%, if greatly In equal to 80%, triggering is alerted, and sends a message for request release resource to external equipment.
2nd, whether the utilization rate of 5 hard disks of monitoring system A hard disk at a time is more than or equal to 80%, if greater than Equal to 80%, triggering alarm.
According to the method for existing establishment alarm regulation, user is needed to two groups of asset creations, 10 alarm rule in system A Then, but except UUID is different in preceding 5 alarm regulations in 10 alarm regulations, other are all identical, afterwards in 5 alarm regulations except UUID is different, other all identical.
By taking 5 utilization rates of the CPU of virtual machine of monitoring system A as an example, according to the alarm method that above-described embodiment is provided This group of virtual machine can be handled as follows:
First, alarm device creates an alarm regulation according to the demand of user, and the alarm regulation is specifically as follows:System More than or equal to 80% triggering alarm, triggering alerts backward external equipment hair to the virtual machine of system A CPU usage at a time Send the message of request release resource.Wherein, the resource filtering condition defined in the alarm regulation is virtual machine, the target of system A The monitoring parameter of resource is the utilization rate of CPU of virtual machine, the threshold value of the monitoring parameter of target resource be more than or equal to 80%, it is tactile Execution action after hair alarm is the message that request release resource is sent to external equipment.
It should be noted that in the embodiment of the present application, alarm device is when alarm regulation is created, it usually needs verification definition Parameters it is whether correct, correctly then create alarm regulation and be stored in database.
It should be noted that the alarm regulation in the embodiment of the present application can define the action performed after triggering alarm, The action performed after triggering alarm can not be defined, the embodiment of the present application is not especially limited to this.
Secondly, " system A's is virtual for resource filtering condition of the alarm device according to defined in the alarm regulation being pre-created Machine ", it is the first row in table 1 that acquisition meets the target resource list of resource filtering condition, including system A 5 virtual machines.
Again, alarm device is performed respectively for meeting 5 virtual machines in the target resource list of resource filtering condition Hereinafter operate:
Virtual machine 1 for system A:First, alarm device obtains the currency of the utilization rate of the CPU1 of virtual machine 1, by Table one is as can be seen that the utilization rate of CPU1 is 40% at the moment 1.Secondly, alarm device determines the currency of the utilization rate of CPU1 Whether 80% is more than or equal to, if greater than equal to 80%, then triggering is alerted.Due to 40% be less than 80%, therefore CPU1 use The currency of rate not in the range of alarm threshold, therefore can without send alarm information.Optionally, alarm device can be to depositing The database of the monitoring parameter of storage target resource sends new information, and the utilization rate of the CPU1 of virtual machine 1 is carried in new information Alarm status be the mark of " normal " and virtual machine 1 so that database according to the alarm status of carrying in new information The corresponding alarm status of utilization rate alarm status of CPU1 of the virtual machine 1 stored in storehouse is updated the data for " normal " for " just Often ".
Virtual machine 2 for system A is to virtual machine 4:By table one as can be seen that the utilization rate of the CPU2 of virtual machine 2, virtual The utilization rate of the utilization rate of the CPU3 of machine 3 and the CPU4 of virtual machine 4 at the moment 1 not in the range of alarm threshold, therefore Processed with reference to the above-mentioned processing mode to virtual machine 1, the embodiment of the present application will not be repeated here.
Virtual machine 5 for system A:First, alarm device obtains the currency of the utilization rate of the CPU5 of virtual machine 5, by table One as can be seen that the utilization rate of CPU5 is 81% at the moment 1.Secondly, alarm device determines that the currency of the utilization rate of CPU5 is No to be more than or equal to 80%, if greater than equal to 80%, then triggering is alerted.Due to 81% be more than 80%, therefore CPU5 utilization rate In the scope of alarm, therefore alarm device sends alarm information to external equipment.Optionally, alarm device can be to storage target The database of the monitoring parameter of resource sends new information, and the alarm of the utilization rate of the CPU5 of virtual machine 5 is carried in new information State is the mark of " alarm " and virtual machine 5, so as to obtain database according to the alarm status carried in new information " to accuse Police " is " alarm " come the corresponding alarm status of utilization rate alarm status of the CPU5 for updating the data the virtual machine 5 stored in storehouse.By The message that request discharges is sent to external equipment after alarm triggered alarm is also defined in alarm regulation, therefore, when alarm is filled After putting to external device (ED) transmission alarm information, the message of request release resource can also be sent to external equipment.Optionally, accuse Can be with the mark of the virtual machine 5 of carrying system A, for indicating be currently in the alarm information that alarm device is sent to external equipment The alarm that the virtual machine 5 of system A sends.
Similar, when user needs the utilization rate of 5 hard disks of monitoring system A, alarm device can be according to user's Demand, creates an alarm regulation.The alarm regulation is specifically as follows:The hard disk of system A hard disk utilization rate at a time More than or equal to 80% triggering alarm.Wherein, the resource filtering condition defined in the alarm regulation is hard disk, the target of system A The monitoring parameter of resource is the utilization rate of hard disk, the threshold value of the monitoring parameter of target resource is more than or equal to 80%.Based on the announcement The method that the method for police regulations then 5 utilization rates of hard disk of monitoring system A refers to above-mentioned monitoring CPU utilization rate, the application reality Example is applied to will not be repeated here.
By above example as can be seen that under the extensive resource scene of OpenStack platforms, relative to existing need To be each resource method that creates alarm regulation in one group of resource, the alarm method that the application is provided only needs establishment one Individual alarm regulation can carry out alarm monitoring, so that, reduce and create the redundancy that a large amount of alarm regulations are produced, improve extensive Alarm efficiency under scene, and then reduce the management cost of OpenStack platforms.
It is above-mentioned that the scheme that the application is provided is introduced from the angle of alarm method mainly.It is understood that above-mentioned Alarm device in alarm method in order to realize above-mentioned functions, it comprises perform the corresponding hardware configuration of each function and/or Software module.Those skilled in the art should be readily appreciated that, with reference to each example that the embodiments described herein is described Module and method and step, the application can realize with the combining form of hardware or hardware and computer software.Certain function Performed in the way of hardware or computer software drive hardware actually, depending on the application-specific of technical scheme with design about Beam condition.Professional and technical personnel can realize described function to each specific application using distinct methods, but It is this to realize it is not considered that exceeding scope of the present application.
The embodiment of the present application can carry out the division of functional module according to above method example to alarm device, for example, can Each functional module is divided to correspond to each function, it is also possible to which two or more functions are integrated in a processing module In.Above-mentioned integrated module can both be realized in the form of hardware, it would however also be possible to employ the form of software function module is realized.Need It is noted that the division in the embodiment of the present application to module is schematical, only a kind of division of logic function, it is actual real There can be other dividing mode now.
In the case where each functional module is divided using correspondence each function, Fig. 5 shows involved in above-described embodiment And alarm device a kind of possible structural representation, the alarm device 500 includes:Acquisition module 501, determining module 502 With sending module 503.Wherein, acquisition module 501 is used in supporting alarm device 500 to perform Fig. 4 step S401, step S402 In T1;Determining module 502 is used to supporting that alarm device 500 to perform the T2 in step S402 in Fig. 4;Sending module 503 is used for T3 in the support execution of alarm device 500 Fig. 4 in step S402.
Optionally, alarm regulation also defines the aggregate function of the monitoring parameter of target resource and monitors the target resource Time span.Acquisition module 501 obtains the currency of the monitoring parameter of target resource, can specifically include:According to target resource Mark, the monitoring parameter of target resource and monitor the time span of the target resource, the monitoring parameter of invocation target resource Aggregate function query statistic database, obtains the currency of the monitoring parameter of target resource, wherein, staqtistical data base includes mesh Mark the mark of resource, the monitoring parameter of target resource and monitor the corresponding relation of the time span of the target resource.
Optionally, alarm regulation also defines packet keyword.As shown in figure 5, the alarm device 500 can also include dividing Group module 504.Grouping module 504 is used for the resource filtering in acquisition module 501 according to defined in the alarm regulation being pre-created Condition, acquisition meets after the target resource list of resource filtering condition, according to packet keyword, will meet resource filtering condition Target resource list in target resource be grouped, obtain at least one set of target resource.
Wherein, all related contents of each step that above method embodiment is related to can quote corresponding function module Function description, will not be repeated here.
Under the extensive resource scene of OpenStack platforms, relative to the need for existing for each in one group of resource The method that individual resource all creates alarm regulation, the alarm method that the application is provided only needs to be accused by creating an alarm regulation Police commissioner is controlled, so that, reduce and create the redundancy that a large amount of alarm regulations are produced, the alarm efficiency under large scale scene is improve, enter And reduce the management cost of OpenStack platforms.
Using in the case of integrated unit, Fig. 6 shows that one kind of involved alarm device in above-described embodiment can The structural representation of energy, the alarm device 600 includes:Processing unit 601 and communication unit 602.Wherein, processing unit 601 is used T1 and T2 in step S401, S402 in supporting alarm device 600 to perform Fig. 4;Communication unit 602 is used to support alarm dress Put the T3 in the step S402 in 600 execution Fig. 4.
Optionally, alarm regulation also define target resource monitoring parameter aggregate function and monitoring objective resource when Between span.Processing unit 601 is additionally operable to mark according to target resource, the monitoring parameter of target resource and monitoring objective resource Time span, the aggregate function query statistic database of the monitoring parameter of invocation target resource obtains the monitoring ginseng of target resource The currency of amount, wherein, staqtistical data base includes the mark of target resource, the monitoring parameter of target resource and monitoring objective money The corresponding relation of the time span in source.
Optionally, alarm regulation also defines packet keyword.Processing unit 601 is additionally operable to according to the announcement being pre-created Police regulations then defined in resource filtering condition, after acquisition meets the target resource list of resource filtering condition, closed according to packet Key word, the target resource that will meet in the target resource list of resource filtering condition is grouped, and obtains at least one set of target money Source.
Wherein, all related contents of each step that above method embodiment is related to can quote corresponding function module Function description, will not be repeated here.
Under the extensive resource scene of OpenStack platforms, relative to the need for existing for each in one group of resource The method that individual resource all creates alarm regulation, the alarm device that the application is provided only needs to be accused by creating an alarm regulation Police commissioner is controlled, so that, reduce and create the redundancy that a large amount of alarm regulations are produced, the alarm efficiency under large scale scene is improve, enter And reduce the management cost of OpenStack platforms.
The embodiment of the present application additionally provides a kind of computer-readable storage medium, by saving as based on used by above-mentioned alarm device Calculation machine software instruction, it is included for performing the program designed by above method embodiment.By performing the program of configuration, can be with Realize alarm method.
The embodiment of the present application additionally provides a kind of computer program, and the computer program includes instruction, when the computer journey When sequence is computer-executed so that computer can perform the flow of above method embodiment.
In addition, the technique effect that any one design is brought in above-mentioned alarm device embodiment is reference can be made to above-mentioned alarm The technique effect that different designs mode is brought in embodiment of the method, here is omitted.
Although being described to the application with reference to each embodiment herein, however, implementing the application required for protection During, those skilled in the art are by checking the accompanying drawing, disclosure and appended claims, it will be appreciated that and it is real Other changes of the existing open embodiment.In the claims, " including " (English:Comprising) word is not excluded for other Part or step, "a" or "an" are not excluded for the situation of multiple.Single processor or other units can realize right It is required that in some functions enumerating.Mutually different has been recited in mutually different dependent some measures, it is not intended that this A little measures can not combine and produce good effect.
It will be understood by those skilled in the art that embodiments herein can be provided as method, device (equipment) or computer journey Sequence product.Therefore, in terms of the application can be using complete hardware embodiment, complete software embodiment or combination software and hardware The form of embodiment.And, the application can be used and wherein include the calculating of computer usable program code at one or more The computer program implemented in machine usable storage medium (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.) The form of product.Computer program is stored/distributed in suitable medium, is provided together with other hardware or as the one of hardware Part, it would however also be possible to employ other distribution forms, such as passes through Internet or other wired or wireless telecommunication systems.
The application be with reference to the embodiment of the present application method, device (equipment) and computer program product flow chart with/ Or block diagram is described.It should be understood that each flow during flow chart and/or block diagram can be realized by computer program instructions and/ Or the combination of the flow and/or square frame in square frame and flow chart and/or block diagram.These computer program instructions can be provided To the processor of all-purpose computer, special-purpose computer, Embedded Processor or other programmable data processing devices producing one Individual machine so that produced for realizing by the instruction of computer or the computing device of other programmable data processing devices The device of the function of being specified in one flow of flow chart or multiple one square frame of flow and/or block diagram or multiple square frames.
These computer program instructions may be alternatively stored in can guide computer or other programmable data processing devices with spy In determining the computer-readable memory that mode works so that instruction of the storage in the computer-readable memory is produced and include finger Make the manufacture of device, the command device realize in one flow of flow chart or multiple one square frame of flow and/or block diagram or The function of being specified in multiple square frames.
These computer program instructions can be also loaded into computer or other programmable data processing devices so that in meter Series of operation steps is performed on calculation machine or other programmable devices to produce computer implemented treatment, so as in computer or The instruction performed on other programmable devices is provided for realizing in one flow of flow chart or multiple flows and/or block diagram one The step of function of being specified in individual square frame or multiple square frames.
Although being described to the application with reference to specific features and embodiment, it is clear that, do not departing from this Shen In the case of spirit and scope please, various modifications and combinations can be carried out to it.Correspondingly, the specification and drawings are only institute The exemplary illustration of the application that attached claim is defined, and be considered as covered in the range of the application any and all and repair Change, change, combining or equivalent.Obviously, those skilled in the art the application can be carried out it is various change and modification without Depart from spirit and scope.So, if the application these modification and modification belong to the application claim and its Within the scope of equivalent technologies, then the application is also intended to comprising these changes and modification.

Claims (15)

1. a kind of alarm method, methods described is applied to OpenStack platforms, it is characterised in that methods described includes:
Resource filtering condition according to defined in the alarm regulation being pre-created, acquisition meets the target of the resource filtering condition The Resources list, the alarm regulation defines the resource filtering condition, the monitoring parameter of the target resource and the monitoring The alarm threshold of parameter;
For each target resource in the target resource list, following operation is performed respectively:
Obtain the currency of the monitoring parameter of the target resource;
Determine the currency whether in the range of the alarm threshold;
If the currency sends alarm information in the range of the alarm threshold.
2. method according to claim 1, it is characterised in that the alarm regulation also defines the poly- of the monitoring parameter Close the time span of function and the monitoring target resource;
The currency of the monitoring parameter for obtaining the target resource, including:
Mark, the monitoring parameter and the time span according to the target resource, call the aggregate function inquiry system Storehouse is counted, the currency of the monitoring parameter of the target resource is obtained, wherein, the staqtistical data base includes the target The corresponding relation of the mark of resource, the monitoring parameter and the time span.
3. method according to claim 1 and 2, it is characterised in that the resource filtering condition includes:The target resource Type;Or, meet the type of the pre-conditioned target resource.
4. the method according to claim any one of 1-3, it is characterised in that the alarm information includes the target resource Mark.
5. the method according to claim any one of 1-4, it is characterised in that it is crucial that the alarm regulation also defines packet Word;
In the resource filtering condition defined in the alarm regulation that the basis is pre-created, acquisition meets the resource filtering condition Target resource list after, also include:
According to the packet keyword, the target resource in the target resource list is grouped, is obtained at least one set of mesh Mark resource.
6. method according to claim 5, it is characterised in that the alarm information also includes where the target resource point The group mark of group.
7. a kind of alarm device, described device is applied to OpenStack platforms, it is characterised in that the alarm device includes:Obtain Modulus block, determining module and sending module;
The acquisition module, for the resource filtering condition according to defined in the alarm regulation being pre-created, acquisition meets described The target resource list of resource filtering condition, the alarm regulation defines the resource filtering condition, the target resource The alarm threshold of monitoring parameter and the monitoring parameter;
For each target resource in the target resource list:
The acquisition module, is additionally operable to obtain the currency of the monitoring parameter of the target resource;
The determining module, for determining the currency whether in the range of the alarm threshold;
The sending module, if for the currency in the range of the alarm threshold, sending alarm to external equipment and disappearing Breath.
8. device according to claim 7, it is characterised in that the alarm regulation also defines the poly- of the monitoring parameter Close the time span of function and the monitoring target resource;
The acquisition module, is additionally operable to take the currency of the monitoring parameter for obtaining the target resource, specifically includes:
Mark, the monitoring parameter and the time span according to the target resource, call the aggregate function inquiry system Storehouse is counted, the currency of the monitoring parameter of the target resource is obtained, wherein, the staqtistical data base includes the target The corresponding relation of the mark of resource, the monitoring parameter and the time span.
9. the device according to claim 7 or 8, it is characterised in that the resource filtering condition includes:The target resource Type;Or, meet the type of the pre-conditioned target resource.
10. the device according to claim any one of 7-9, it is characterised in that the alarm information includes target money The mark in source.
11. device according to claim any one of 7-10, it is characterised in that the alarm regulation also defines packet and closes Key word, the alarm device also includes grouping module;
The grouping module, for the resource filtering bar in the acquisition module according to defined in the alarm regulation being pre-created Part, acquisition meets after the target resource list of the resource filtering condition, according to the packet keyword, by target money Target resource in the list of source is grouped, and obtains at least one set of target resource.
12. devices according to claim 11, it is characterised in that the alarm information is also included where the target resource The group mark of packet.
A kind of 13. alarm equipments, it is characterised in that including:Processor, memory, bus and communication interface;
The memory is used to store computer executed instructions, and the processor is connected with the memory by the bus, When the alarm equipment runs, the computer executed instructions of memory storage described in the computing device, so that institute State alarm method of the alarm equipment execution as described in any one in claim 1-6.
14. a kind of computer-readable storage mediums, it is characterised in that for saving as the announcement in claim 1-6 described in any one Computer software instructions used by alarm method, it is included for performing the announcement in the above-mentioned 1-6 for claim described in any one Program designed by alarm method.
15. a kind of computer programs, it is characterised in that the computer program includes instruction, when the computer program is counted When calculation machine is performed so that computer performs the flow in the alarm method as described in any one in claim 1-6.
CN201611170786.7A 2016-12-16 2016-12-16 Alarm method and device Active CN106844165B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201611170786.7A CN106844165B (en) 2016-12-16 2016-12-16 Alarm method and device
CN202010968139.0A CN112214382B (en) 2016-12-16 Alarm method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611170786.7A CN106844165B (en) 2016-12-16 2016-12-16 Alarm method and device

Related Child Applications (1)

Application Number Title Priority Date Filing Date
CN202010968139.0A Division CN112214382B (en) 2016-12-16 Alarm method and device

Publications (2)

Publication Number Publication Date
CN106844165A true CN106844165A (en) 2017-06-13
CN106844165B CN106844165B (en) 2020-09-29

Family

ID=59139580

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611170786.7A Active CN106844165B (en) 2016-12-16 2016-12-16 Alarm method and device

Country Status (1)

Country Link
CN (1) CN106844165B (en)

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107369094A (en) * 2017-06-14 2017-11-21 广东网金控股股份有限公司 A kind of methods of risk assessment based on user behavior, device and financial terminal machine
CN108206769A (en) * 2017-12-26 2018-06-26 中国移动通信集团江苏有限公司 Method, apparatus, equipment and the medium of screen quality alarm
CN110912773A (en) * 2019-11-25 2020-03-24 深圳晶泰科技有限公司 Cluster monitoring system and monitoring method for multiple public cloud computing platforms
CN111026607A (en) * 2019-11-14 2020-04-17 山东中创软件商用中间件股份有限公司 Server monitoring system and method and server data acquisition method and system
CN111061612A (en) * 2019-12-12 2020-04-24 天地伟业技术有限公司 Embedded system state monitoring method
CN111200526A (en) * 2019-12-31 2020-05-26 中国建设银行股份有限公司 Monitoring system and method of network equipment
CN111371841A (en) * 2020-02-17 2020-07-03 平安科技(深圳)有限公司 Data monitoring method and device
CN111782486A (en) * 2020-07-03 2020-10-16 上海浦东发展银行股份有限公司 Alarm implementation method and system based on dynamic configuration
CN112433919A (en) * 2020-11-25 2021-03-02 深圳前海微众银行股份有限公司 Information warning method, equipment and storage medium
CN113034864A (en) * 2021-03-19 2021-06-25 北京北特圣迪科技发展有限公司 Stage mechanical equipment threshold value warning method and system
CN113034728A (en) * 2021-02-26 2021-06-25 北京车和家信息技术有限公司 Alarm processing method and device
CN113612622A (en) * 2021-06-28 2021-11-05 苏州浪潮智能科技有限公司 Method and device for alarming each module under network operating system
CN114708717A (en) * 2022-04-18 2022-07-05 中国银行股份有限公司 Association alarm method and device for system monitoring
WO2023138058A1 (en) * 2022-01-21 2023-07-27 苏州浪潮智能科技有限公司 Alarm event processing method and apparatus, and computer-readable storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101741615A (en) * 2009-12-14 2010-06-16 北京神州泰岳软件股份有限公司 Server-based alarm filtering system and method
CN104348653A (en) * 2013-08-06 2015-02-11 中国电信股份有限公司 Method and system for realizing user task of cloud management platform as well as trigger
CN104410535A (en) * 2014-12-23 2015-03-11 浪潮电子信息产业股份有限公司 Intelligent monitoring and alarming method for cloud resources
CN105243004A (en) * 2015-09-15 2016-01-13 浪潮集团有限公司 Failure resource detection method and apparatus
CN105471671A (en) * 2015-11-10 2016-04-06 国云科技股份有限公司 Method for customizing monitoring rules of cloud platform resources

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101741615A (en) * 2009-12-14 2010-06-16 北京神州泰岳软件股份有限公司 Server-based alarm filtering system and method
CN104348653A (en) * 2013-08-06 2015-02-11 中国电信股份有限公司 Method and system for realizing user task of cloud management platform as well as trigger
CN104410535A (en) * 2014-12-23 2015-03-11 浪潮电子信息产业股份有限公司 Intelligent monitoring and alarming method for cloud resources
CN105243004A (en) * 2015-09-15 2016-01-13 浪潮集团有限公司 Failure resource detection method and apparatus
CN105471671A (en) * 2015-11-10 2016-04-06 国云科技股份有限公司 Method for customizing monitoring rules of cloud platform resources

Cited By (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107369094A (en) * 2017-06-14 2017-11-21 广东网金控股股份有限公司 A kind of methods of risk assessment based on user behavior, device and financial terminal machine
CN108206769A (en) * 2017-12-26 2018-06-26 中国移动通信集团江苏有限公司 Method, apparatus, equipment and the medium of screen quality alarm
CN108206769B (en) * 2017-12-26 2020-07-17 中国移动通信集团江苏有限公司 Method, apparatus, device and medium for filtering network quality alarms
CN111026607A (en) * 2019-11-14 2020-04-17 山东中创软件商用中间件股份有限公司 Server monitoring system and method and server data acquisition method and system
CN110912773A (en) * 2019-11-25 2020-03-24 深圳晶泰科技有限公司 Cluster monitoring system and monitoring method for multiple public cloud computing platforms
CN111061612A (en) * 2019-12-12 2020-04-24 天地伟业技术有限公司 Embedded system state monitoring method
CN111200526B (en) * 2019-12-31 2022-09-16 中国建设银行股份有限公司 Monitoring system and method of network equipment
CN111200526A (en) * 2019-12-31 2020-05-26 中国建设银行股份有限公司 Monitoring system and method of network equipment
CN111371841A (en) * 2020-02-17 2020-07-03 平安科技(深圳)有限公司 Data monitoring method and device
CN111371841B (en) * 2020-02-17 2023-04-07 平安科技(深圳)有限公司 Data monitoring method and device
CN111782486A (en) * 2020-07-03 2020-10-16 上海浦东发展银行股份有限公司 Alarm implementation method and system based on dynamic configuration
CN111782486B (en) * 2020-07-03 2024-04-16 上海浦东发展银行股份有限公司 Alarm realization method and system based on dynamic configuration
CN112433919A (en) * 2020-11-25 2021-03-02 深圳前海微众银行股份有限公司 Information warning method, equipment and storage medium
CN113034728A (en) * 2021-02-26 2021-06-25 北京车和家信息技术有限公司 Alarm processing method and device
CN113034864A (en) * 2021-03-19 2021-06-25 北京北特圣迪科技发展有限公司 Stage mechanical equipment threshold value warning method and system
CN113612622A (en) * 2021-06-28 2021-11-05 苏州浪潮智能科技有限公司 Method and device for alarming each module under network operating system
CN113612622B (en) * 2021-06-28 2023-01-24 苏州浪潮智能科技有限公司 Method and device for alarming each module under network operating system
WO2023138058A1 (en) * 2022-01-21 2023-07-27 苏州浪潮智能科技有限公司 Alarm event processing method and apparatus, and computer-readable storage medium
CN114708717A (en) * 2022-04-18 2022-07-05 中国银行股份有限公司 Association alarm method and device for system monitoring

Also Published As

Publication number Publication date
CN106844165B (en) 2020-09-29
CN112214382A (en) 2021-01-12

Similar Documents

Publication Publication Date Title
CN106844165A (en) Alarm method and device
CN106489251B (en) The methods, devices and systems of applied topology relationship discovery
CN108776934B (en) Distributed data calculation method and device, computer equipment and readable storage medium
CN110493080B (en) Block link point monitoring method and device, electronic equipment and storage medium
CN103999091B (en) Geographical mapped system security incident
US20160103750A1 (en) Application programming interface monitoring tool notification and escalation method and system
US20160103757A1 (en) Quantization of Data Streams of Instrumented Software
CN105573824B (en) Monitoring method and system for distributed computing system
CN108874640A (en) A kind of appraisal procedure and device of clustering performance
US9766993B2 (en) Quality of information assessment in dynamic sensor networks
JP2018533779A (en) Performance monitoring of distributed storage systems
US9043317B2 (en) System and method for event-driven prioritization
WO2020015115A1 (en) Fault alarm method and terminal device
US11456932B2 (en) System capacity heatmap
US9417949B1 (en) Generic alarm correlation by means of normalized alarm codes
CN111078695B (en) Method and device for calculating association relation of metadata in enterprise
JP6299599B2 (en) Information system construction support apparatus, information system construction support method, and information system construction support program
CN109992473A (en) Monitoring method, device, equipment and the storage medium of application system
CN109800204A (en) Data distributing method and Related product
JP5268589B2 (en) Information processing apparatus and information processing apparatus operating method
CN111338888A (en) Data statistical method and device, electronic equipment and storage medium
CN113360321B (en) Micro-service retry calling method and device, electronic equipment and storage medium
CN108337100A (en) A kind of method and apparatus of cloud platform monitoring
CN104937613A (en) Heuristics to quantify data quality
CN117370053A (en) Information system service operation-oriented panoramic monitoring method and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20220217

Address after: 550025 Huawei cloud data center, jiaoxinggong Road, Qianzhong Avenue, Gui'an New District, Guiyang City, Guizhou Province

Patentee after: Huawei Cloud Computing Technologies Co.,Ltd.

Address before: 518129 Bantian HUAWEI headquarters office building, Longgang District, Guangdong, Shenzhen

Patentee before: HUAWEI TECHNOLOGIES Co.,Ltd.