CN106844165A - Alarm method and device - Google Patents
Alarm method and device Download PDFInfo
- Publication number
- CN106844165A CN106844165A CN201611170786.7A CN201611170786A CN106844165A CN 106844165 A CN106844165 A CN 106844165A CN 201611170786 A CN201611170786 A CN 201611170786A CN 106844165 A CN106844165 A CN 106844165A
- Authority
- CN
- China
- Prior art keywords
- alarm
- resource
- target resource
- monitoring parameter
- target
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 69
- 238000012544 monitoring process Methods 0.000 claims abstract description 101
- 238000001914 filtration Methods 0.000 claims abstract description 51
- 238000004891 communication Methods 0.000 claims abstract description 12
- 230000006870 function Effects 0.000 claims description 46
- 238000003860 storage Methods 0.000 claims description 20
- 238000004590 computer program Methods 0.000 claims description 15
- 230000001143 conditioned effect Effects 0.000 claims description 6
- 238000004364 calculation method Methods 0.000 claims description 4
- 230000005055 memory storage Effects 0.000 claims description 2
- 238000013461 design Methods 0.000 description 17
- 238000012545 processing Methods 0.000 description 14
- 239000003795 chemical substances by application Substances 0.000 description 11
- 238000010586 diagram Methods 0.000 description 10
- 230000000694 effects Effects 0.000 description 5
- 238000012986 modification Methods 0.000 description 5
- 230000004048 modification Effects 0.000 description 5
- 230000008859 change Effects 0.000 description 4
- 230000008569 process Effects 0.000 description 4
- 230000009471 action Effects 0.000 description 3
- 239000002131 composite material Substances 0.000 description 2
- 230000007812 deficiency Effects 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 239000004973 liquid crystal related substance Substances 0.000 description 2
- 230000003287 optical effect Effects 0.000 description 2
- 230000003068 static effect Effects 0.000 description 2
- 241000208340 Araliaceae Species 0.000 description 1
- 241000196324 Embryophyta Species 0.000 description 1
- 235000005035 Panax pseudoginseng ssp. pseudoginseng Nutrition 0.000 description 1
- 235000003140 Panax quinquefolius Nutrition 0.000 description 1
- 238000000429 assembly Methods 0.000 description 1
- 230000000712 assembly Effects 0.000 description 1
- 230000008901 benefit Effects 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 239000003818 cinder Substances 0.000 description 1
- 230000006835 compression Effects 0.000 description 1
- 238000007906 compression Methods 0.000 description 1
- 238000010276 construction Methods 0.000 description 1
- 230000001419 dependent effect Effects 0.000 description 1
- 238000000151 deposition Methods 0.000 description 1
- 238000009826 distribution Methods 0.000 description 1
- 235000008434 ginseng Nutrition 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 238000005259 measurement Methods 0.000 description 1
- 230000008439 repair process Effects 0.000 description 1
- 230000001960 triggered effect Effects 0.000 description 1
- 238000012795 verification Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/30—Monitoring
- G06F11/32—Monitoring with visual or acoustical indication of the functioning of the machine
- G06F11/324—Display of status information
- G06F11/327—Alarm or error message display
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/06—Management of faults, events, alarms or notifications
- H04L41/0604—Management of faults, events, alarms or notifications using filtering, e.g. reduction of information by using priority, element types, position or time
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/06—Management of faults, events, alarms or notifications
- H04L41/0681—Configuration of triggering conditions
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Theoretical Computer Science (AREA)
- Quality & Reliability (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Debugging And Monitoring (AREA)
- Alarm Systems (AREA)
Abstract
The embodiment of the present application provides alarm method and device, is related to communication technical field, solves the problems, such as that existing alarm mode is less efficient under extensive resource scene in the prior art.The method includes:Resource filtering condition according to defined in the alarm regulation being pre-created, acquisition meets the target resource list of the resource filtering condition, and the alarm regulation defines the resource filtering condition, the monitoring parameter of the target resource and the alarm threshold of the monitoring parameter;For each target resource in the target resource list, following operation is performed respectively:Obtain the currency of the monitoring parameter of the target resource;Determine the currency whether in the range of the alarm threshold;If the currency sends alarm information in the range of the alarm threshold.
Description
Technical field
The application is related to communication technical field, more particularly to alarm method and device.
Background technology
OpenStack is the open source projects for providing software with management for the construction of public cloud, private clound and mixed cloud,
It is also current maximum cloud platform of increasing income.OpenStack includes multiple projects, such as Telemetry projects.Wherein, Telemetry
Project includes Ceilometer sub-projects and Aodh sub-projects, and Ceilometer sub-projects are mainly responsible in Telemetry projects
The functions such as collection, storage, the inquiry of measurement monitoring information;Aodh sub-projects are mainly responsible for alerting service, including alarm definition, announcement
The functions such as alert assessment, alarm notification.
At present, Telemetry projects provide three kinds of alarm modes, including:Threshold value (threshold) alarm, Composite
Alarm and Gnocchi alarms.These three alarm modes are required to be respectively created alarm regulation for each resource, and this is extensive
It is less efficient under resource scene.
Therefore, under OpenStack platforms, how to improve the alarm efficiency under extensive resource scene is urgently to solve at present
Problem certainly.
The content of the invention
Embodiments herein provides alarm method and device, at least to solve current existing alarm mode extensive
Less efficient problem under resource scene.
To reach above-mentioned purpose, embodiments herein is adopted the following technical scheme that:
On the one hand, there is provided a kind of alarm method, OpenStack platforms are applied to, the method includes:According to what is be pre-created
Resource filtering condition defined in alarm regulation, acquisition meets the target resource list of the resource filtering condition, the alarm regulation
Define the resource filtering condition, the monitoring parameter of the target resource and the alarm threshold of the monitoring parameter;Provided for the target
Each target resource in the list of source, performs following operation respectively:Obtain the currency of the monitoring parameter of the target resource;Really
Whether the fixed currency is in the range of the alarm threshold;If the currency sends alarm information in the range of the alarm threshold.
Under the extensive resource scene of OpenStack platforms, when creating alarm to one group of same monitoring parameter of resource, relative to
It is the method that each resource in one group of resource creates alarm regulation the need for existing, the alarm method that the application is provided is only
Alarm monitoring is carried out by an alarm regulation need to be created, the redundancy that a large amount of alarm regulations are produced is created so as to reduce, improved
Alarm efficiency under large scale scene, and then reduce the management cost of OpenStack platforms.
In a kind of possible design, the alarm regulation also defines the aggregate function of the monitoring parameter and monitors the target
The time span of resource;The currency of the monitoring parameter of the acquisition target resource, including:Mark according to the target resource,
The monitoring parameter and the time span, call the aggregate function query statistic database, obtain the monitoring parameter of the target resource
Currency, wherein, the staqtistical data base includes the correspondence of the mark, the monitoring parameter and the time span of the target resource
Relation.
In a kind of possible design, the resource filtering condition includes:The type of the target resource;Or, meet default
The type of the target resource of condition.Because the resource filtering condition defined in alarm regulation can be to meet pre-conditioned mesh
The type of resource is marked, therefore, it can be monitored according to the user's request asset creation alarm regulation special to a group, further
Improve Consumer's Experience.
In a kind of possible design, the alarm information includes the mark of the target resource.
In a kind of possible design, the alarm regulation also defines packet keyword;In the announcement that the basis is pre-created
Police regulations then defined in resource filtering condition, after acquisition meets the target resource list of the resource filtering condition, also include:Root
According to the packet keyword, the target resource in the target resource list is grouped, is obtained at least one set of target resource.
In a kind of possible design, the alarm information also includes the group mark of packet where the target resource.
Another aspect, the embodiment of the present application provides a kind of alarm device, and the device is applied to OpenStack platforms, the announcement
Alarm device includes:Acquisition module, determining module and sending module;The acquisition module, for according to the alarm regulation being pre-created
Defined in resource filtering condition, acquisition meets the target resource list of the resource filtering condition, and the alarm regulation defines this
Resource filtering condition, the monitoring parameter of the target resource and the alarm threshold of the monitoring parameter;For in the target resource list
Each target resource:The acquisition module, is additionally operable to obtain the currency of the monitoring parameter of the target resource;The determination mould
Block, for determining the currency whether in the range of the alarm threshold;The sending module, if for the currency in the alarm threshold
In the range of value, then alarm information is sent to external equipment.Under the extensive resource scene of OpenStack platforms, to one group of money
When the same monitoring parameter in source creates alarm, relative to the need for existing for each resource in one group of resource creates announcement
Police regulations method then, the alarm equipment that the application is provided only needs to carry out alarm monitoring by creating an alarm regulation, so as to subtract
Lack the redundancy that a large amount of alarm regulations of establishment are produced, improve the alarm efficiency under large scale scene, and then reduce
The management cost of OpenStack platforms.
In a kind of possible design, the alarm regulation also defines the aggregate function of the monitoring parameter and monitors the target
The time span of resource;The acquisition module, is additionally operable to take the currency of the monitoring parameter for obtaining the target resource, specifically includes:Root
According to the mark of the target resource, the monitoring parameter and the time span, the aggregate function query statistic database is called, be somebody's turn to do
The currency of the monitoring parameter of target resource, wherein, the staqtistical data base includes the mark of the target resource, the monitoring parameter
With the corresponding relation of the time span.
In a kind of possible design, the resource filtering condition includes:The type of the target resource;Or, meet default
The type of the target resource of condition.Because the resource filtering condition defined in alarm regulation can be to meet pre-conditioned mesh
The type of resource is marked, therefore, it can be monitored according to the user's request asset creation alarm regulation special to a group, further
Improve Consumer's Experience.
In a kind of possible design, the alarm information includes the mark of the target resource.
In a kind of possible design, the alarm regulation also defines packet keyword, and the alarm device also includes packet
Module;The grouping module, for the resource filtering condition in the acquisition module according to defined in the alarm regulation being pre-created, obtains
After taking the target resource list for meeting the resource filtering condition, according to the packet keyword, by the target resource list
Target resource is grouped, and obtains at least one set of target resource.
In a kind of possible design, the alarm information also includes the group mark of packet where the target resource.
Another aspect, embodiments herein provides a kind of alarm equipment, including:Processor, memory, bus and communication
Interface;The memory is used to store computer executed instructions, and the processor is connected with the memory by the bus, when the alarm
When equipment is run, computer executed instructions of the computing device memory storage, so that the alarm equipment is performed as above
State the alarm method of any one.
Another aspect, the embodiment of the present application provides a kind of computer-readable storage medium, for saving as above-mentioned any one
Alarm method used by computer software instructions, it is included for performing the journey designed by above-mentioned any one alarm method
Sequence.
Another aspect, the embodiment of the present application provides a kind of computer program, and the computer program includes instruction, when the meter
When calculation machine program is computer-executed so that computer can perform the flow in the alarm method of above-mentioned any one.
In addition, the technique effect that any one design is brought in above-mentioned alarm device embodiment is reference can be made to above-mentioned alarm
The technique effect that different designs mode is brought in embodiment of the method, here is omitted.
These aspects or other aspects of the application can more straightforward in the following description.
Brief description of the drawings
The logical architecture figure of the OpenStack that Fig. 1 is applied by the embodiment of the present application;
The configuration diagram of the Telemetry projects that Fig. 2 is provided for the embodiment of the present application;
A kind of computer equipment schematic diagram that Fig. 3 is provided for the embodiment of the present application;
A kind of schematic flow sheet of alarm method that Fig. 4 is provided for the embodiment of the present application;
A kind of structural representation of alarm device that Fig. 5 is provided for the embodiment of the present application;
The structural representation of another alarm device that Fig. 6 is provided for the embodiment of the present application.
Specific embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present application, the technical scheme in the embodiment of the present application is described.
The logical architecture figure of the OpenStack that Fig. 1 is applied by the embodiment of the present application.As shown in figure 1, OpenStack bags
Multiple projects are included, these projects constitute the OpenStack cloud environments of complete set function.Wherein most crucial project includes:
Nova, Cinder and Neutron, these projects constitute a most basic function of OpenStack cloud environments.
Certainly, in addition to Nova, Cinder and Neutron project, also some very important projects are used for providing
Perfect OpenStack cloud platform abilities, such as Glance, Keystone, Horizon, Swift, Ironic, Trove,
Sahara, Heat and Ceilometer.Wherein, these projects in OpenStack operate in virtual machine (English:
Virtual Machines, abbreviation:VMs in).
The function to each project in OpenStack is briefly discussed below below:
Nova:There is provided the virtual machine Capacity Management of physical machine resource, and virtual machine life cycle management.
Cinder:There is provided the ability of the block storage device management of virtual machine.
Neutron:There is provided the management of virtualizing network resources, including network, subnet, port and VPN
(English:Virtual Private Network, abbreviation:The high-level service such as VPN).
Glance:There is provided mirror image management service, including the mirror image and snapshot needed for virtual machine etc..
Keystone:There is provided user management and authentication service.
Horizon:There is provided the instrument board (webpage (English of OpenStack:Web) interface) service.
Swift:There is provided object storage service.
Ironic:There is provided bare machine management service.
Trove:There is provided the function of " database is service ".
Sahara:There is provided big data service.
Heat:There is provided arranging service and software merit rating service.
Ceilometer projects:There is provided monitoring metering service.
Wherein, at OpenStack M editions, (OpenStack is come the Ceilometer projects in Fig. 1 using the order of alphabet
Name its version) and M editions after be renamed as Telemetry projects.Telemetry projects are by before OpenStack M editions
The function of Ceilometer projects splits into two parts:One is Ceilometer sub-projects, is responsible for Telemetry specially
The functions such as monitoring information acquisition, storage, inquiry are measured in mesh, such as virtual machine, volume, mirror image etc. in collection OpenStack environment
The metrical information and status information of virtual machine related resource and physical host;One is Aodh sub-projects, is responsible for alarm specially
The function such as definition, assessment, alarm notification.
Fig. 2 is the configuration diagram of Telemetry projects.As shown in Fig. 2 Telemetry projects include:Ceilometer
Sub-project, database, application programming interface (English:Application Programming Interface, abbreviation:
) and Aodh sub-projects API.
The function to modules in Telemetry projects is briefly discussed below below:
Ceilometer sub-projects:Including polling agent (English:Polling Agents) service, notification agent (English:
Notification Agents) service and collection service (English:Collectors).
Polling agent:It is that resource information in the control node and all calculate nodes for operate in a set of OpenStack is adopted
Collection agency.Wherein, the node of each management service operation is control node, and the node of virtual machine operation is calculate node.If fortune
In control node, polling agent is responsible for being gathered by the API of each modules of OpenStack the resource information of OpenStack to row,
The API of Glance is for example called to gather the information of mirror image size;If operating in calculate node, polling agent is responsible for the node
The information gathering of upper virtual machine, for example, gather the central processing unit (English of the virtual machine that the main frame is operated above:Central
Processing Unit, abbreviation:CPU) utilization rate, memory usage, disk read-write speed etc..
Notification agent:In OpenStack, each service can process some virtual resources and resource status generation
Message of being given notice when change is to notifying bus (notify bus be also referred to as message queue).Notification agent is responsible for reception
The notification message that other assemblies send in OpenStack, while also being responsible for from the message for notifying bus reception polling agent to send
And processed.
Collector:Notification agent continues the message of collection to be sent in notice bus after message has been processed, and gathers
Device can monitor notice bus, receive the message of collection, and the message format of collection is turned into rule sample record storage to number
According to storehouse.
API:Including ceilometer-api and aodh-api.
Wherein, ceilometer-api provides the API service of Ceilometer sub-projects.Main API includes:Inquiry
Continuous data (English:Sample-list API), inquiry measuring index (English:Meter-list API), inquiry stoichiometric number
According to statistics (English:Statistic-list the resource object list (English that API), inquiry be collected:
Resource-list API) etc..
Aodh-api provides the API service of Aodh sub-projects.
Database:The data gathered for the collector for storing Ceilometer and the data being input into by API.
Aodh sub-projects:Including Aodh assessment (English:Aodh-evaluater) service and Aodh notify (English:aodh-
Notifier) service.
Wherein, the alarm method that the embodiment of the present application is provided is mainly by Aodh sub-projects to realize.The application is implemented
In example, operation Aodh subitem destination devices are referred to as alarm device, certainly, operation Aodh subitem destination devices are also likely to be other
Title, the embodiment of the present application is not especially limited to this.
Below in conjunction with the accompanying drawing in the embodiment of the present application, the technical scheme in the embodiment of the present application is described.
It should be noted that "/" herein represent or the meaning, for example, A/B can represent A or B;Herein
"and/or" is only a kind of incidence relation for describing affiliated partner, and expression there may be three kinds of relations, for example, A and/or B, can
To represent:Individualism A, while there is A and B, individualism B these three situations." multiple " refers to two or more.
" component ", " module ", " system " etc. are intended to refer to computer related entity as used herein the term, should
Computer related entity can be hardware, firmware, the combination of hardware and software, software or operating software.For example, component
May be, but not limited to, is:Treatment, processor, object, executable file, executory thread, the journey run on a processor
Sequence and/or computer.As an example, the application for running on the computing device and the computing device can be components.One or
Multiple components may reside in executory process and/or thread, and component may be located in a computer and/or
Person is distributed between two or more computers.Additionally, these components can be each with various data structures from thereon
Plant execution in computer-readable medium.These components can by such as according to have one or more packets (for example, come
From a data for component, the component is interacted and/or with signal with another component in local system, distributed system
Mode interacted by the network of such as internet etc and other systems) signal, with locally and/or remotely process
Mode is communicated.
It should be noted that in the embodiment of the present application, the word such as " exemplary " or " such as " makees example, example for expression
Card or explanation.Any embodiment or design for being described as " exemplary " or " such as " in the embodiment of the present application should not
It is interpreted than other embodiments or design more preferably or more advantage.Specifically, " exemplary " or " example are used
Such as " word is intended to that related notion is presented in a concrete fashion.
It should be noted that in the embodiment of the present application, " (English:Of) ", " corresponding (English:Corresponding,
Relevant it is) " and " corresponding (English:Corresponding) " can use with sometimes, it is noted that do not emphasizing it
During difference, its is to be expressed be meant that it is consistent.
As shown in figure 3, alarm device in the embodiment of the present application can by the computer equipment (or system) in Fig. 3 come
Realize.
Fig. 3 show the computer equipment schematic diagram of the embodiment of the present application offer.Computer equipment 300 includes at least one
Processor 301, communication bus 302, the communication interface 304 of memory 303 and at least one.
Processor 301 can be a general central processor (English:Central Processing Unit, abbreviation:
CPU), microprocessor, ASIC (English:Application-Specific Integrated Circuit,
Abbreviation:ASIC), or one or more be used for control application scheme program perform integrated circuit.
Communication bus 302 may include a path, and information is transmitted between said modules.
Communication interface 304, using the device of the class of any transceiver one, for other equipment or communication, such as
Ethernet, wireless access network (English:Radio Access Network, abbreviation:RAN), WLAN (English:
Wireless Local Area Networks, abbreviation:WLAN) etc..
Memory 303 can be read-only storage (English:Read-Only Memory, abbreviation:ROM) or static state can be stored
Information and the other kinds of static storage device of instruction, random access memory (English:Random Access Memory,
Abbreviation:RAM) or can storage information and instruction other kinds of dynamic memory, or electric erazable programmable only
Read memory (English:Electrically Erasable Programmable Read-Only Memory, abbreviation:
EEPROM), read-only optical disc (English:Compact Disc Read-Only Memory, abbreviation:) or other light are taken inventory CD-ROM
Storage, laser disc storage (including compression laser disc, laser disc, laser disc, Digital Versatile Disc, Blu-ray Disc etc.), magnetic disk storage medium or
Other magnetic storage apparatus of person or can be used in carrying or store the desired program code with instruction or data structure form
And can be by any other medium of computer access, but not limited to this.Memory can be individually present, by bus and place
Reason device is connected.Memory can also be integrated with processor.
Wherein, memory 303 is used to store the application code for performing application scheme, and is controlled by processor 301
System is performed.Processor 301 is used to perform the application code stored in memory 303, so as in realizing the embodiment of the present application
Alarm method.
In implementing, such as used as a kind of embodiment, processor 301 can include one or more CPU, in Fig. 3
CPU0 and CPU1.
In implementing, such as used as a kind of embodiment, computer equipment 300 can include multiple processors, in Fig. 3
Processor 301 and processor 308.Each in these processors can be a monokaryon (English:Single-CPU) place
Reason device, or a multinuclear (English:Multi-CPU) processor.Here processor can refer to one or more equipment,
Circuit, and/or the process cores for processing data (such as computer program instructions).
In implementing, used as a kind of embodiment, computer equipment 300 can also include output equipment 305 and input
Equipment 306.Output equipment 305 and processor 301 communicate, and can in many ways carry out display information.For example, output equipment 305
Can be liquid crystal display (English:Liquid Crystal Display, abbreviation:LCD), Light-Emitting Diode (English:Light
Emitting Diode, abbreviation:LED) display device, cathode-ray tube (English:Cathode Ray Tube, abbreviation:CRT) show
Show equipment, or projecting apparatus (English:Projector) etc..Input equipment 306 and processor 301 communicate, and can connect in many ways
It is input into by user.For example, input equipment 306 can be mouse, keyboard, touch panel device or sensing equipment etc..
Above-mentioned computer equipment 300 can be a general purpose computing device or a dedicated computing machine equipment.
In implementing, computer equipment 300 can be desktop computer, portable computer, the webserver, palm PC (English:
Personal Digital Assistant, abbreviation:PDA), cell phone, panel computer, wireless terminal device, communication equipment,
Embedded device or the equipment for having similar structures in Fig. 3.The embodiment of the present application does not limit the type of computer equipment 300.
As shown in figure 4, a kind of schematic flow sheet of the alarm method provided for the embodiment of the present application, including step S401-
S402:
The resource filtering condition of S401, alarm device according to defined in the alarm regulation being pre-created, acquisition meets the money
The target resource list of source filter condition.
Wherein, in the embodiment of the present application, the alarm regulation being pre-created defines the prison of resource filtering condition, target resource
The alarm threshold of control parameter and the monitoring parameter.
Certainly, in the embodiment of the present application, rank, the alarm of alarm regulation can also be defined in the alarm regulation being pre-created
The information such as alarm status, tenant identification and the ID of rule, the embodiment of the present application is not especially limited to this.
Exemplary, the monitoring parameter of target resource can be the CPU usage of virtual machine, the use of the hard disk of virtual machine
Rate, the disk read-write speed of virtual machine, network rate of virtual machine etc., the embodiment of the present application is not especially limited to this.
S402, for each target resource in target resource list, alarm device performs following operation respectively:
T1:Alarm device obtains the currency of the monitoring parameter of target resource.
T2:Whether alarm device determines the currency of the monitoring parameter of target resource in the range of alarm threshold.
T3:If in the range of alarm threshold, alarm device is to external equipment for the currency of the monitoring parameter of target resource
Send alarm information.
Optionally, the mark of target resource can be included in the alarm information, such external equipment is receiving the alarm
After message, the position of the resource for alerting can be inquired according to the mark of the target resource, and then for alerting
Resource processed.
Optionally, in the embodiment of the present application, alarm device determine target resource monitoring parameter currency whether
After in the range of alarm threshold, new information can also be sent to the database of the monitoring parameter of storage target resource, renewal disappears
The corresponding alarm status of monitoring parameter of target resource and the mark of target resource are carried in breath, so as to obtain database according to more
The alarm status carried in new information updates the data the corresponding alarm status of monitoring parameter of the target resource stored in storehouse.Its
In, if alarm regulation M resource suitable for the Resources list, wherein, M is the positive integer more than or equal to 1, then need more
The new M corresponding alarm status of monitoring parameter of resource, hair is inquired in order to external equipment according to the alarm status after renewal
The mark of the resource of raw alarm, and then according to the position for identifying the resource for determining to alert of the resource for alerting, so that
Resource to alerting is processed.Wherein, alarm status generally includes three types:Data deficiencies, normal and alarm.This
In application embodiment, if the currency of the monitoring parameter of target resource is in the range of alarm threshold, corresponding alarm status is
" alarm ";If not in the range of alarm threshold, corresponding alarm status is for " just for the currency of the monitoring parameter of target resource
Often ";If the currency missing of the monitoring parameter of target resource, it is impossible to judge whether in the range of alarm threshold, then corresponding announcement
Alert state is " data deficiencies ".
Under the extensive resource scene of OpenStack platforms, alarm is created to one group of same monitoring parameter of resource
When, relative to being the method that each resource in one group of resource creates alarm regulation the need for existing, what the application was provided
Alarm method only needs to carry out alarm monitoring by creating an alarm regulation, creates what a large amount of alarm regulations were produced so as to reduce
Redundancy, improves the alarm efficiency under large scale scene, and then reduce the management cost of OpenStack platforms.
Further, alarm regulation can also define the aggregate function and monitoring objective resource of the monitoring parameter of target resource
Time span, then alarm device obtain the currency of monitoring parameter of target resource and can specifically include:Alarm device according to
The mark of target resource, the monitoring parameter of target resource and time span, the aggregate function of the monitoring parameter of invocation target resource
Query statistic database, obtains the currency of the monitoring parameter of the target resource.Wherein, the staqtistical data base includes that target is provided
The mark in source, the monitoring parameter of target resource and the corresponding relation of time span.
Optionally, aggregate function can be average function, minimize function, the function of maximizing, ask
The function of variance, the embodiment of the present application is not especially limited to this.
In a kind of possible implementation, resource filtering condition can include:The type of target resource;Or, meet pre-
If the type of the target resource of condition.
For example, the type of target resource can be virtual machine, hard disk, server etc..
In the embodiment of the present application, the type of target resource can be directly defined in resource filtering condition, it is also possible to pass through
Some parameters related to the type of target resource defined in resource filtering condition determine the type of target resource, such as,
When Destination Resource Type is virtual machine, some related parameters of virtual machine, these parameters can be defined in resource filtering condition
The type that the target resource can be uniquely determined is virtual machine;Or, when Destination Resource Type is hard disk, resource filtering condition
In can define some related parameters of hard disk, the type that these parameters can uniquely determine the target resource is hard disk;Or,
When Destination Resource Type is server, some related parameters of server, these parameters can be defined in resource filtering condition
The type that the target resource can be uniquely determined is server;The embodiment of the present application is not especially limited to this.
The type for meeting pre-conditioned target resource can be one group of virtual machine that user adds " vip_vm " label,
Deng.
Wherein, because the resource filtering condition defined in alarm regulation can be the class of the target resource for meeting pre-conditioned
Type, therefore, it can be monitored according to the user's request asset creation alarm regulation special to a group, further improve user
Experience.
Optionally, when a virtual machine is newly increased in OpenStack platforms, user can be the virtual machine for newly increasing
Also " vip_vm " label is added, so can be using the same of the virtual machine for carrying " vip_vm " label stored in database
One monitoring parameter carries out an alarm regulation of alarm monitoring, and the same monitoring parameter of the virtual machine to newly increasing carries out alarm prison
Control, it is no longer necessary to re-create an alarm regulation for a certain monitoring parameter according to existing alarm method, reduce establishment
The redundancy that unnecessary alarm regulation is produced, improves the efficiency of alarm, and then reduce the management cost of OpenStack platforms.
Further, the alarm regulation can also define packet keyword.So, in alarm device according to being pre-created
Resource filtering condition defined in alarm regulation, acquisition meet the resource filtering condition target resource list (step S401) it
Afterwards, can also include:Be grouped for the target resource in target resource list according to packet keyword by alarm device, is obtained
At least one set of target resource.
Such as, the embodiment of the present application can be using the unique mark of resource as packet keyword in target resource list
Target resource is grouped, and obtains at least one set of target resource, wherein, a target resource is included in each group of target resource.
The unique mark of resource for example can be universal virtual machine unique identifier (English:Universally Unique
Identifier, abbreviation:UUID), UUID of disk etc..
Certainly, in the embodiment of the present application, packet keyword can also be other, at least one set of target money obtained after packet
This can also be not especially limited comprising multiple target resources, the embodiment of the present application in a certain group of target resource in source.
Optionally, alarm device can also include the group of packet where target resource to the alarm information that external equipment sends
Mark.So external equipment, can be according to the group of packet where target resource mark soon after the alarm information is received
Speed inquires the position of packet where the resource for alerting, and then can determine occur according to the mark of the resource for alerting
The position of the resource of alarm, so as to be processed for the resource for alerting.
It should be noted that the alarm method in the embodiment of the present application is readily adaptable for use in existing Composite modes,
For example by multiple threshold ranges of the multiple monitoring parameters in one group of resource, combined by " and (and) " " or (or) " etc. and defined
One alarm regulation is monitored to one group of resource, specifically refers to the description of above method embodiment, and the embodiment of the present application exists
This is repeated no more.
To sum up, under the extensive resource scene of OpenStack platforms, one group of same monitoring parameter of resource is created
During alarm, relative to being the method that each resource in one group of resource creates alarm regulation the need for existing, the application is carried
The alarm method of confession is only needed to carry out alarm monitoring by creating an alarm regulation, and a large amount of alarm regulations products are created so as to reduce
Raw redundancy, improves the alarm efficiency under large scale scene, and then reduce the management cost of OpenStack platforms.
Exemplary, it is assumed that system A includes 5 virtual machines and 5 hard disks, and each virtual machine includes 1 CPU.Table 1 is
In the utilization rate of the CPU at moment 1, table 2 is the utilization rate of 5 hard disks at the moment 1 of system A to 5 virtual machines of system A.
Table 1
Table 2
The Resources list | Monitoring parameter |
The hard disk 1 of system A | The utilization rate 67% of hard disk 1 |
The hard disk 2 of system A | The utilization rate 54% of hard disk 2 |
The hard disk 3 of system A | The utilization rate 85% of hard disk 3 |
The hard disk 4 of system A | The utilization rate 49% of hard disk 4 |
The hard disk 5 of system A | The utilization rate 23% of hard disk 5 |
Assuming that user needs to be monitored two groups of resources of system A:
1st, whether the utilization rate of 5 virtual machines of monitoring system A CPU at a time is more than or equal to 80%, if greatly
In equal to 80%, triggering is alerted, and sends a message for request release resource to external equipment.
2nd, whether the utilization rate of 5 hard disks of monitoring system A hard disk at a time is more than or equal to 80%, if greater than
Equal to 80%, triggering alarm.
According to the method for existing establishment alarm regulation, user is needed to two groups of asset creations, 10 alarm rule in system A
Then, but except UUID is different in preceding 5 alarm regulations in 10 alarm regulations, other are all identical, afterwards in 5 alarm regulations except
UUID is different, other all identical.
By taking 5 utilization rates of the CPU of virtual machine of monitoring system A as an example, according to the alarm method that above-described embodiment is provided
This group of virtual machine can be handled as follows:
First, alarm device creates an alarm regulation according to the demand of user, and the alarm regulation is specifically as follows:System
More than or equal to 80% triggering alarm, triggering alerts backward external equipment hair to the virtual machine of system A CPU usage at a time
Send the message of request release resource.Wherein, the resource filtering condition defined in the alarm regulation is virtual machine, the target of system A
The monitoring parameter of resource is the utilization rate of CPU of virtual machine, the threshold value of the monitoring parameter of target resource be more than or equal to 80%, it is tactile
Execution action after hair alarm is the message that request release resource is sent to external equipment.
It should be noted that in the embodiment of the present application, alarm device is when alarm regulation is created, it usually needs verification definition
Parameters it is whether correct, correctly then create alarm regulation and be stored in database.
It should be noted that the alarm regulation in the embodiment of the present application can define the action performed after triggering alarm,
The action performed after triggering alarm can not be defined, the embodiment of the present application is not especially limited to this.
Secondly, " system A's is virtual for resource filtering condition of the alarm device according to defined in the alarm regulation being pre-created
Machine ", it is the first row in table 1 that acquisition meets the target resource list of resource filtering condition, including system A 5 virtual machines.
Again, alarm device is performed respectively for meeting 5 virtual machines in the target resource list of resource filtering condition
Hereinafter operate:
Virtual machine 1 for system A:First, alarm device obtains the currency of the utilization rate of the CPU1 of virtual machine 1, by
Table one is as can be seen that the utilization rate of CPU1 is 40% at the moment 1.Secondly, alarm device determines the currency of the utilization rate of CPU1
Whether 80% is more than or equal to, if greater than equal to 80%, then triggering is alerted.Due to 40% be less than 80%, therefore CPU1 use
The currency of rate not in the range of alarm threshold, therefore can without send alarm information.Optionally, alarm device can be to depositing
The database of the monitoring parameter of storage target resource sends new information, and the utilization rate of the CPU1 of virtual machine 1 is carried in new information
Alarm status be the mark of " normal " and virtual machine 1 so that database according to the alarm status of carrying in new information
The corresponding alarm status of utilization rate alarm status of CPU1 of the virtual machine 1 stored in storehouse is updated the data for " normal " for " just
Often ".
Virtual machine 2 for system A is to virtual machine 4:By table one as can be seen that the utilization rate of the CPU2 of virtual machine 2, virtual
The utilization rate of the utilization rate of the CPU3 of machine 3 and the CPU4 of virtual machine 4 at the moment 1 not in the range of alarm threshold, therefore
Processed with reference to the above-mentioned processing mode to virtual machine 1, the embodiment of the present application will not be repeated here.
Virtual machine 5 for system A:First, alarm device obtains the currency of the utilization rate of the CPU5 of virtual machine 5, by table
One as can be seen that the utilization rate of CPU5 is 81% at the moment 1.Secondly, alarm device determines that the currency of the utilization rate of CPU5 is
No to be more than or equal to 80%, if greater than equal to 80%, then triggering is alerted.Due to 81% be more than 80%, therefore CPU5 utilization rate
In the scope of alarm, therefore alarm device sends alarm information to external equipment.Optionally, alarm device can be to storage target
The database of the monitoring parameter of resource sends new information, and the alarm of the utilization rate of the CPU5 of virtual machine 5 is carried in new information
State is the mark of " alarm " and virtual machine 5, so as to obtain database according to the alarm status carried in new information " to accuse
Police " is " alarm " come the corresponding alarm status of utilization rate alarm status of the CPU5 for updating the data the virtual machine 5 stored in storehouse.By
The message that request discharges is sent to external equipment after alarm triggered alarm is also defined in alarm regulation, therefore, when alarm is filled
After putting to external device (ED) transmission alarm information, the message of request release resource can also be sent to external equipment.Optionally, accuse
Can be with the mark of the virtual machine 5 of carrying system A, for indicating be currently in the alarm information that alarm device is sent to external equipment
The alarm that the virtual machine 5 of system A sends.
Similar, when user needs the utilization rate of 5 hard disks of monitoring system A, alarm device can be according to user's
Demand, creates an alarm regulation.The alarm regulation is specifically as follows:The hard disk of system A hard disk utilization rate at a time
More than or equal to 80% triggering alarm.Wherein, the resource filtering condition defined in the alarm regulation is hard disk, the target of system A
The monitoring parameter of resource is the utilization rate of hard disk, the threshold value of the monitoring parameter of target resource is more than or equal to 80%.Based on the announcement
The method that the method for police regulations then 5 utilization rates of hard disk of monitoring system A refers to above-mentioned monitoring CPU utilization rate, the application reality
Example is applied to will not be repeated here.
By above example as can be seen that under the extensive resource scene of OpenStack platforms, relative to existing need
To be each resource method that creates alarm regulation in one group of resource, the alarm method that the application is provided only needs establishment one
Individual alarm regulation can carry out alarm monitoring, so that, reduce and create the redundancy that a large amount of alarm regulations are produced, improve extensive
Alarm efficiency under scene, and then reduce the management cost of OpenStack platforms.
It is above-mentioned that the scheme that the application is provided is introduced from the angle of alarm method mainly.It is understood that above-mentioned
Alarm device in alarm method in order to realize above-mentioned functions, it comprises perform the corresponding hardware configuration of each function and/or
Software module.Those skilled in the art should be readily appreciated that, with reference to each example that the embodiments described herein is described
Module and method and step, the application can realize with the combining form of hardware or hardware and computer software.Certain function
Performed in the way of hardware or computer software drive hardware actually, depending on the application-specific of technical scheme with design about
Beam condition.Professional and technical personnel can realize described function to each specific application using distinct methods, but
It is this to realize it is not considered that exceeding scope of the present application.
The embodiment of the present application can carry out the division of functional module according to above method example to alarm device, for example, can
Each functional module is divided to correspond to each function, it is also possible to which two or more functions are integrated in a processing module
In.Above-mentioned integrated module can both be realized in the form of hardware, it would however also be possible to employ the form of software function module is realized.Need
It is noted that the division in the embodiment of the present application to module is schematical, only a kind of division of logic function, it is actual real
There can be other dividing mode now.
In the case where each functional module is divided using correspondence each function, Fig. 5 shows involved in above-described embodiment
And alarm device a kind of possible structural representation, the alarm device 500 includes:Acquisition module 501, determining module 502
With sending module 503.Wherein, acquisition module 501 is used in supporting alarm device 500 to perform Fig. 4 step S401, step S402
In T1;Determining module 502 is used to supporting that alarm device 500 to perform the T2 in step S402 in Fig. 4;Sending module 503 is used for
T3 in the support execution of alarm device 500 Fig. 4 in step S402.
Optionally, alarm regulation also defines the aggregate function of the monitoring parameter of target resource and monitors the target resource
Time span.Acquisition module 501 obtains the currency of the monitoring parameter of target resource, can specifically include:According to target resource
Mark, the monitoring parameter of target resource and monitor the time span of the target resource, the monitoring parameter of invocation target resource
Aggregate function query statistic database, obtains the currency of the monitoring parameter of target resource, wherein, staqtistical data base includes mesh
Mark the mark of resource, the monitoring parameter of target resource and monitor the corresponding relation of the time span of the target resource.
Optionally, alarm regulation also defines packet keyword.As shown in figure 5, the alarm device 500 can also include dividing
Group module 504.Grouping module 504 is used for the resource filtering in acquisition module 501 according to defined in the alarm regulation being pre-created
Condition, acquisition meets after the target resource list of resource filtering condition, according to packet keyword, will meet resource filtering condition
Target resource list in target resource be grouped, obtain at least one set of target resource.
Wherein, all related contents of each step that above method embodiment is related to can quote corresponding function module
Function description, will not be repeated here.
Under the extensive resource scene of OpenStack platforms, relative to the need for existing for each in one group of resource
The method that individual resource all creates alarm regulation, the alarm method that the application is provided only needs to be accused by creating an alarm regulation
Police commissioner is controlled, so that, reduce and create the redundancy that a large amount of alarm regulations are produced, the alarm efficiency under large scale scene is improve, enter
And reduce the management cost of OpenStack platforms.
Using in the case of integrated unit, Fig. 6 shows that one kind of involved alarm device in above-described embodiment can
The structural representation of energy, the alarm device 600 includes:Processing unit 601 and communication unit 602.Wherein, processing unit 601 is used
T1 and T2 in step S401, S402 in supporting alarm device 600 to perform Fig. 4;Communication unit 602 is used to support alarm dress
Put the T3 in the step S402 in 600 execution Fig. 4.
Optionally, alarm regulation also define target resource monitoring parameter aggregate function and monitoring objective resource when
Between span.Processing unit 601 is additionally operable to mark according to target resource, the monitoring parameter of target resource and monitoring objective resource
Time span, the aggregate function query statistic database of the monitoring parameter of invocation target resource obtains the monitoring ginseng of target resource
The currency of amount, wherein, staqtistical data base includes the mark of target resource, the monitoring parameter of target resource and monitoring objective money
The corresponding relation of the time span in source.
Optionally, alarm regulation also defines packet keyword.Processing unit 601 is additionally operable to according to the announcement being pre-created
Police regulations then defined in resource filtering condition, after acquisition meets the target resource list of resource filtering condition, closed according to packet
Key word, the target resource that will meet in the target resource list of resource filtering condition is grouped, and obtains at least one set of target money
Source.
Wherein, all related contents of each step that above method embodiment is related to can quote corresponding function module
Function description, will not be repeated here.
Under the extensive resource scene of OpenStack platforms, relative to the need for existing for each in one group of resource
The method that individual resource all creates alarm regulation, the alarm device that the application is provided only needs to be accused by creating an alarm regulation
Police commissioner is controlled, so that, reduce and create the redundancy that a large amount of alarm regulations are produced, the alarm efficiency under large scale scene is improve, enter
And reduce the management cost of OpenStack platforms.
The embodiment of the present application additionally provides a kind of computer-readable storage medium, by saving as based on used by above-mentioned alarm device
Calculation machine software instruction, it is included for performing the program designed by above method embodiment.By performing the program of configuration, can be with
Realize alarm method.
The embodiment of the present application additionally provides a kind of computer program, and the computer program includes instruction, when the computer journey
When sequence is computer-executed so that computer can perform the flow of above method embodiment.
In addition, the technique effect that any one design is brought in above-mentioned alarm device embodiment is reference can be made to above-mentioned alarm
The technique effect that different designs mode is brought in embodiment of the method, here is omitted.
Although being described to the application with reference to each embodiment herein, however, implementing the application required for protection
During, those skilled in the art are by checking the accompanying drawing, disclosure and appended claims, it will be appreciated that and it is real
Other changes of the existing open embodiment.In the claims, " including " (English:Comprising) word is not excluded for other
Part or step, "a" or "an" are not excluded for the situation of multiple.Single processor or other units can realize right
It is required that in some functions enumerating.Mutually different has been recited in mutually different dependent some measures, it is not intended that this
A little measures can not combine and produce good effect.
It will be understood by those skilled in the art that embodiments herein can be provided as method, device (equipment) or computer journey
Sequence product.Therefore, in terms of the application can be using complete hardware embodiment, complete software embodiment or combination software and hardware
The form of embodiment.And, the application can be used and wherein include the calculating of computer usable program code at one or more
The computer program implemented in machine usable storage medium (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.)
The form of product.Computer program is stored/distributed in suitable medium, is provided together with other hardware or as the one of hardware
Part, it would however also be possible to employ other distribution forms, such as passes through Internet or other wired or wireless telecommunication systems.
The application be with reference to the embodiment of the present application method, device (equipment) and computer program product flow chart with/
Or block diagram is described.It should be understood that each flow during flow chart and/or block diagram can be realized by computer program instructions and/
Or the combination of the flow and/or square frame in square frame and flow chart and/or block diagram.These computer program instructions can be provided
To the processor of all-purpose computer, special-purpose computer, Embedded Processor or other programmable data processing devices producing one
Individual machine so that produced for realizing by the instruction of computer or the computing device of other programmable data processing devices
The device of the function of being specified in one flow of flow chart or multiple one square frame of flow and/or block diagram or multiple square frames.
These computer program instructions may be alternatively stored in can guide computer or other programmable data processing devices with spy
In determining the computer-readable memory that mode works so that instruction of the storage in the computer-readable memory is produced and include finger
Make the manufacture of device, the command device realize in one flow of flow chart or multiple one square frame of flow and/or block diagram or
The function of being specified in multiple square frames.
These computer program instructions can be also loaded into computer or other programmable data processing devices so that in meter
Series of operation steps is performed on calculation machine or other programmable devices to produce computer implemented treatment, so as in computer or
The instruction performed on other programmable devices is provided for realizing in one flow of flow chart or multiple flows and/or block diagram one
The step of function of being specified in individual square frame or multiple square frames.
Although being described to the application with reference to specific features and embodiment, it is clear that, do not departing from this Shen
In the case of spirit and scope please, various modifications and combinations can be carried out to it.Correspondingly, the specification and drawings are only institute
The exemplary illustration of the application that attached claim is defined, and be considered as covered in the range of the application any and all and repair
Change, change, combining or equivalent.Obviously, those skilled in the art the application can be carried out it is various change and modification without
Depart from spirit and scope.So, if the application these modification and modification belong to the application claim and its
Within the scope of equivalent technologies, then the application is also intended to comprising these changes and modification.
Claims (15)
1. a kind of alarm method, methods described is applied to OpenStack platforms, it is characterised in that methods described includes:
Resource filtering condition according to defined in the alarm regulation being pre-created, acquisition meets the target of the resource filtering condition
The Resources list, the alarm regulation defines the resource filtering condition, the monitoring parameter of the target resource and the monitoring
The alarm threshold of parameter;
For each target resource in the target resource list, following operation is performed respectively:
Obtain the currency of the monitoring parameter of the target resource;
Determine the currency whether in the range of the alarm threshold;
If the currency sends alarm information in the range of the alarm threshold.
2. method according to claim 1, it is characterised in that the alarm regulation also defines the poly- of the monitoring parameter
Close the time span of function and the monitoring target resource;
The currency of the monitoring parameter for obtaining the target resource, including:
Mark, the monitoring parameter and the time span according to the target resource, call the aggregate function inquiry system
Storehouse is counted, the currency of the monitoring parameter of the target resource is obtained, wherein, the staqtistical data base includes the target
The corresponding relation of the mark of resource, the monitoring parameter and the time span.
3. method according to claim 1 and 2, it is characterised in that the resource filtering condition includes:The target resource
Type;Or, meet the type of the pre-conditioned target resource.
4. the method according to claim any one of 1-3, it is characterised in that the alarm information includes the target resource
Mark.
5. the method according to claim any one of 1-4, it is characterised in that it is crucial that the alarm regulation also defines packet
Word;
In the resource filtering condition defined in the alarm regulation that the basis is pre-created, acquisition meets the resource filtering condition
Target resource list after, also include:
According to the packet keyword, the target resource in the target resource list is grouped, is obtained at least one set of mesh
Mark resource.
6. method according to claim 5, it is characterised in that the alarm information also includes where the target resource point
The group mark of group.
7. a kind of alarm device, described device is applied to OpenStack platforms, it is characterised in that the alarm device includes:Obtain
Modulus block, determining module and sending module;
The acquisition module, for the resource filtering condition according to defined in the alarm regulation being pre-created, acquisition meets described
The target resource list of resource filtering condition, the alarm regulation defines the resource filtering condition, the target resource
The alarm threshold of monitoring parameter and the monitoring parameter;
For each target resource in the target resource list:
The acquisition module, is additionally operable to obtain the currency of the monitoring parameter of the target resource;
The determining module, for determining the currency whether in the range of the alarm threshold;
The sending module, if for the currency in the range of the alarm threshold, sending alarm to external equipment and disappearing
Breath.
8. device according to claim 7, it is characterised in that the alarm regulation also defines the poly- of the monitoring parameter
Close the time span of function and the monitoring target resource;
The acquisition module, is additionally operable to take the currency of the monitoring parameter for obtaining the target resource, specifically includes:
Mark, the monitoring parameter and the time span according to the target resource, call the aggregate function inquiry system
Storehouse is counted, the currency of the monitoring parameter of the target resource is obtained, wherein, the staqtistical data base includes the target
The corresponding relation of the mark of resource, the monitoring parameter and the time span.
9. the device according to claim 7 or 8, it is characterised in that the resource filtering condition includes:The target resource
Type;Or, meet the type of the pre-conditioned target resource.
10. the device according to claim any one of 7-9, it is characterised in that the alarm information includes target money
The mark in source.
11. device according to claim any one of 7-10, it is characterised in that the alarm regulation also defines packet and closes
Key word, the alarm device also includes grouping module;
The grouping module, for the resource filtering bar in the acquisition module according to defined in the alarm regulation being pre-created
Part, acquisition meets after the target resource list of the resource filtering condition, according to the packet keyword, by target money
Target resource in the list of source is grouped, and obtains at least one set of target resource.
12. devices according to claim 11, it is characterised in that the alarm information is also included where the target resource
The group mark of packet.
A kind of 13. alarm equipments, it is characterised in that including:Processor, memory, bus and communication interface;
The memory is used to store computer executed instructions, and the processor is connected with the memory by the bus,
When the alarm equipment runs, the computer executed instructions of memory storage described in the computing device, so that institute
State alarm method of the alarm equipment execution as described in any one in claim 1-6.
14. a kind of computer-readable storage mediums, it is characterised in that for saving as the announcement in claim 1-6 described in any one
Computer software instructions used by alarm method, it is included for performing the announcement in the above-mentioned 1-6 for claim described in any one
Program designed by alarm method.
15. a kind of computer programs, it is characterised in that the computer program includes instruction, when the computer program is counted
When calculation machine is performed so that computer performs the flow in the alarm method as described in any one in claim 1-6.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611170786.7A CN106844165B (en) | 2016-12-16 | 2016-12-16 | Alarm method and device |
CN202010968139.0A CN112214382B (en) | 2016-12-16 | Alarm method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611170786.7A CN106844165B (en) | 2016-12-16 | 2016-12-16 | Alarm method and device |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010968139.0A Division CN112214382B (en) | 2016-12-16 | Alarm method and device |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106844165A true CN106844165A (en) | 2017-06-13 |
CN106844165B CN106844165B (en) | 2020-09-29 |
Family
ID=59139580
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201611170786.7A Active CN106844165B (en) | 2016-12-16 | 2016-12-16 | Alarm method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106844165B (en) |
Cited By (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107369094A (en) * | 2017-06-14 | 2017-11-21 | 广东网金控股股份有限公司 | A kind of methods of risk assessment based on user behavior, device and financial terminal machine |
CN108206769A (en) * | 2017-12-26 | 2018-06-26 | 中国移动通信集团江苏有限公司 | Method, apparatus, equipment and the medium of screen quality alarm |
CN110912773A (en) * | 2019-11-25 | 2020-03-24 | 深圳晶泰科技有限公司 | Cluster monitoring system and monitoring method for multiple public cloud computing platforms |
CN111026607A (en) * | 2019-11-14 | 2020-04-17 | 山东中创软件商用中间件股份有限公司 | Server monitoring system and method and server data acquisition method and system |
CN111061612A (en) * | 2019-12-12 | 2020-04-24 | 天地伟业技术有限公司 | Embedded system state monitoring method |
CN111200526A (en) * | 2019-12-31 | 2020-05-26 | 中国建设银行股份有限公司 | Monitoring system and method of network equipment |
CN111371841A (en) * | 2020-02-17 | 2020-07-03 | 平安科技(深圳)有限公司 | Data monitoring method and device |
CN111782486A (en) * | 2020-07-03 | 2020-10-16 | 上海浦东发展银行股份有限公司 | Alarm implementation method and system based on dynamic configuration |
CN112433919A (en) * | 2020-11-25 | 2021-03-02 | 深圳前海微众银行股份有限公司 | Information warning method, equipment and storage medium |
CN113034864A (en) * | 2021-03-19 | 2021-06-25 | 北京北特圣迪科技发展有限公司 | Stage mechanical equipment threshold value warning method and system |
CN113034728A (en) * | 2021-02-26 | 2021-06-25 | 北京车和家信息技术有限公司 | Alarm processing method and device |
CN113612622A (en) * | 2021-06-28 | 2021-11-05 | 苏州浪潮智能科技有限公司 | Method and device for alarming each module under network operating system |
CN114708717A (en) * | 2022-04-18 | 2022-07-05 | 中国银行股份有限公司 | Association alarm method and device for system monitoring |
WO2023138058A1 (en) * | 2022-01-21 | 2023-07-27 | 苏州浪潮智能科技有限公司 | Alarm event processing method and apparatus, and computer-readable storage medium |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101741615A (en) * | 2009-12-14 | 2010-06-16 | 北京神州泰岳软件股份有限公司 | Server-based alarm filtering system and method |
CN104348653A (en) * | 2013-08-06 | 2015-02-11 | 中国电信股份有限公司 | Method and system for realizing user task of cloud management platform as well as trigger |
CN104410535A (en) * | 2014-12-23 | 2015-03-11 | 浪潮电子信息产业股份有限公司 | Intelligent monitoring and alarming method for cloud resources |
CN105243004A (en) * | 2015-09-15 | 2016-01-13 | 浪潮集团有限公司 | Failure resource detection method and apparatus |
CN105471671A (en) * | 2015-11-10 | 2016-04-06 | 国云科技股份有限公司 | Method for customizing monitoring rules of cloud platform resources |
-
2016
- 2016-12-16 CN CN201611170786.7A patent/CN106844165B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101741615A (en) * | 2009-12-14 | 2010-06-16 | 北京神州泰岳软件股份有限公司 | Server-based alarm filtering system and method |
CN104348653A (en) * | 2013-08-06 | 2015-02-11 | 中国电信股份有限公司 | Method and system for realizing user task of cloud management platform as well as trigger |
CN104410535A (en) * | 2014-12-23 | 2015-03-11 | 浪潮电子信息产业股份有限公司 | Intelligent monitoring and alarming method for cloud resources |
CN105243004A (en) * | 2015-09-15 | 2016-01-13 | 浪潮集团有限公司 | Failure resource detection method and apparatus |
CN105471671A (en) * | 2015-11-10 | 2016-04-06 | 国云科技股份有限公司 | Method for customizing monitoring rules of cloud platform resources |
Cited By (19)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107369094A (en) * | 2017-06-14 | 2017-11-21 | 广东网金控股股份有限公司 | A kind of methods of risk assessment based on user behavior, device and financial terminal machine |
CN108206769A (en) * | 2017-12-26 | 2018-06-26 | 中国移动通信集团江苏有限公司 | Method, apparatus, equipment and the medium of screen quality alarm |
CN108206769B (en) * | 2017-12-26 | 2020-07-17 | 中国移动通信集团江苏有限公司 | Method, apparatus, device and medium for filtering network quality alarms |
CN111026607A (en) * | 2019-11-14 | 2020-04-17 | 山东中创软件商用中间件股份有限公司 | Server monitoring system and method and server data acquisition method and system |
CN110912773A (en) * | 2019-11-25 | 2020-03-24 | 深圳晶泰科技有限公司 | Cluster monitoring system and monitoring method for multiple public cloud computing platforms |
CN111061612A (en) * | 2019-12-12 | 2020-04-24 | 天地伟业技术有限公司 | Embedded system state monitoring method |
CN111200526B (en) * | 2019-12-31 | 2022-09-16 | 中国建设银行股份有限公司 | Monitoring system and method of network equipment |
CN111200526A (en) * | 2019-12-31 | 2020-05-26 | 中国建设银行股份有限公司 | Monitoring system and method of network equipment |
CN111371841A (en) * | 2020-02-17 | 2020-07-03 | 平安科技(深圳)有限公司 | Data monitoring method and device |
CN111371841B (en) * | 2020-02-17 | 2023-04-07 | 平安科技(深圳)有限公司 | Data monitoring method and device |
CN111782486A (en) * | 2020-07-03 | 2020-10-16 | 上海浦东发展银行股份有限公司 | Alarm implementation method and system based on dynamic configuration |
CN111782486B (en) * | 2020-07-03 | 2024-04-16 | 上海浦东发展银行股份有限公司 | Alarm realization method and system based on dynamic configuration |
CN112433919A (en) * | 2020-11-25 | 2021-03-02 | 深圳前海微众银行股份有限公司 | Information warning method, equipment and storage medium |
CN113034728A (en) * | 2021-02-26 | 2021-06-25 | 北京车和家信息技术有限公司 | Alarm processing method and device |
CN113034864A (en) * | 2021-03-19 | 2021-06-25 | 北京北特圣迪科技发展有限公司 | Stage mechanical equipment threshold value warning method and system |
CN113612622A (en) * | 2021-06-28 | 2021-11-05 | 苏州浪潮智能科技有限公司 | Method and device for alarming each module under network operating system |
CN113612622B (en) * | 2021-06-28 | 2023-01-24 | 苏州浪潮智能科技有限公司 | Method and device for alarming each module under network operating system |
WO2023138058A1 (en) * | 2022-01-21 | 2023-07-27 | 苏州浪潮智能科技有限公司 | Alarm event processing method and apparatus, and computer-readable storage medium |
CN114708717A (en) * | 2022-04-18 | 2022-07-05 | 中国银行股份有限公司 | Association alarm method and device for system monitoring |
Also Published As
Publication number | Publication date |
---|---|
CN106844165B (en) | 2020-09-29 |
CN112214382A (en) | 2021-01-12 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106844165A (en) | Alarm method and device | |
CN106489251B (en) | The methods, devices and systems of applied topology relationship discovery | |
CN108776934B (en) | Distributed data calculation method and device, computer equipment and readable storage medium | |
CN110493080B (en) | Block link point monitoring method and device, electronic equipment and storage medium | |
CN103999091B (en) | Geographical mapped system security incident | |
US20160103750A1 (en) | Application programming interface monitoring tool notification and escalation method and system | |
US20160103757A1 (en) | Quantization of Data Streams of Instrumented Software | |
CN105573824B (en) | Monitoring method and system for distributed computing system | |
CN108874640A (en) | A kind of appraisal procedure and device of clustering performance | |
US9766993B2 (en) | Quality of information assessment in dynamic sensor networks | |
JP2018533779A (en) | Performance monitoring of distributed storage systems | |
US9043317B2 (en) | System and method for event-driven prioritization | |
WO2020015115A1 (en) | Fault alarm method and terminal device | |
US11456932B2 (en) | System capacity heatmap | |
US9417949B1 (en) | Generic alarm correlation by means of normalized alarm codes | |
CN111078695B (en) | Method and device for calculating association relation of metadata in enterprise | |
JP6299599B2 (en) | Information system construction support apparatus, information system construction support method, and information system construction support program | |
CN109992473A (en) | Monitoring method, device, equipment and the storage medium of application system | |
CN109800204A (en) | Data distributing method and Related product | |
JP5268589B2 (en) | Information processing apparatus and information processing apparatus operating method | |
CN111338888A (en) | Data statistical method and device, electronic equipment and storage medium | |
CN113360321B (en) | Micro-service retry calling method and device, electronic equipment and storage medium | |
CN108337100A (en) | A kind of method and apparatus of cloud platform monitoring | |
CN104937613A (en) | Heuristics to quantify data quality | |
CN117370053A (en) | Information system service operation-oriented panoramic monitoring method and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right | ||
TR01 | Transfer of patent right |
Effective date of registration: 20220217 Address after: 550025 Huawei cloud data center, jiaoxinggong Road, Qianzhong Avenue, Gui'an New District, Guiyang City, Guizhou Province Patentee after: Huawei Cloud Computing Technologies Co.,Ltd. Address before: 518129 Bantian HUAWEI headquarters office building, Longgang District, Guangdong, Shenzhen Patentee before: HUAWEI TECHNOLOGIES Co.,Ltd. |