CN108829568A - A kind of data monitoring method and device - Google Patents
A kind of data monitoring method and device Download PDFInfo
- Publication number
- CN108829568A CN108829568A CN201810550230.3A CN201810550230A CN108829568A CN 108829568 A CN108829568 A CN 108829568A CN 201810550230 A CN201810550230 A CN 201810550230A CN 108829568 A CN108829568 A CN 108829568A
- Authority
- CN
- China
- Prior art keywords
- data
- alarm
- data source
- type
- error
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/30—Monitoring
- G06F11/32—Monitoring with visual or acoustical indication of the functioning of the machine
- G06F11/324—Display of status information
- G06F11/327—Alarm or error message display
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/30—Monitoring
- G06F11/3003—Monitoring arrangements specially adapted to the computing system or computing system component being monitored
Abstract
The present invention provides a kind of data monitoring method and device, this method includes:Data access is determined according to the type of data source, and accesses data source according to data access;Data analysis rule is determined according to the type of data in data source, and the alarm task of data is generated according to data analysis rule;The warning message of alarm task is pushed according to preset alarm mode.Due to supporting access, the analysis of multi-dimensional data and the extension of more type of alarms of multiple data sources, this can realize that multi-data source shares a set of monitoring scheme, to increase the versatility of monitoring, bring convenience to later period system maintenance.
Description
Technical field
The present invention relates to Developing Technology of Applied Software fields, more specifically to a kind of data monitoring method and device.
Background technique
For the stable operation of operation system, the monitoring for generating data in system operation just becomes especially to weigh
It wants.
Current monitoring scheme is mainly:Data source to be monitored is specified in advance, and the data which reports are carried out
It analyzes and alarms.But using existing monitoring scheme, a set of monitoring scheme will be respectively set in every kind of data source, this just can not
Meet complicated and diversified monitoring demand.
Summary of the invention
In view of this, the present invention provides a kind of data monitoring method and device, with solve it is existing for every kind of data source all
The problem of a set of monitoring scheme is set.Technical solution is as follows:
A kind of data monitoring method, including:
Data access is determined according to the type of data source, and accesses the data according to the data access
Source;
Data analysis rule is determined according to the type of data in the data source, and is generated according to the data analysis rule
The alarm task of the data;
The warning message of the alarm task is pushed according to preset alarm mode.
Preferably, the type according to data source determines data access, including:
Determine the type of the data source;
If the type of the data source is database table, the data access of the data source is determined as database and is connected
It connects;
If the type of the data source is interface, the data access of the data source is determined as Hyper text transfer association
View;
If the type of the data source is Internet protocol address port, the data access of the data source is determined
For Telnet.
Preferably, the type according to data in the data source determines data analysis rule, and according to the data
Analysis rule generates the alarm task of the data, including:
In the case where the type of the data is text, the text threshold value and text for obtaining the data report an error threshold
Value;
Judge whether the data are equal to the text threshold value;
If the data are not equal to the text threshold value, report an error, and obtain the data source in preset period of time
Text reports an error number;
Judge whether the text number that reports an error is less than the text and reports an error threshold value;
If the text reports an error, number is less than the text and reports an error threshold value, transfers the alarm task of last generation, and
In the case that the alarm task that last time generates is abnormal alarm, abnormal restoring alarm task is generated;
If the text reports an error, number reports an error threshold value not less than the text, generates abnormal alarm task.
Preferably,
In the case where the type of the data is numerical value, the numerical value allowed band and numerical value for obtaining the data report an error
Threshold value;
Judge the data whether in the numerical value allowed band;
If the data in the numerical value allowed band, do not report an error, and obtain the data source in preset period of time
Interior numerical value reports an error number;
Judge whether the numerical value number that reports an error is less than the numerical value and reports an error threshold value;
If the numerical value reports an error, number is less than the numerical value and reports an error threshold value, transfers the alarm task of last generation, and
In the case that the alarm task that last time generates is abnormal alarm, abnormal restoring alarm task is generated;
If the numerical value reports an error, number reports an error threshold value not less than the numerical value, generates abnormal alarm task.
Preferably, the preset alarm mode, including:One of SMS alarm, mail alarm and interface alarm are more
Kind.
Preferably, after the data source according to data access access, further include:
Data collection list is written into data in the data source.
Preferably, after the alarm task that the data are generated according to the data analysis rule, further include:
Alarm task list is written into the alarm task.
Preferably, it is described push warning message according to preset alarm mode after, further include:
Alarming result table is written into the push result of the warning message and the warning message.
A kind of data monitoring device, including:Data access module, task generation module and alarm pushing module;
The data access module determines data access for the type according to data source, and according to the data
Access way accesses the data source;
The task generation module for determining data analysis rule according to the type of data in the data source, and is pressed
The alarm task of the data is generated according to the data analysis rule;
The alarm pushing module, for pushing the warning message of the alarm task according to preset alarm mode.
Preferably, the data access module, is specifically used for:
Determine the type of the data source;If the type of the data source is database table, by the data of the data source
Access way is determined as database connection;If the type of the data source is interface, by the data access of the data source
It is determined as hypertext transfer protocol;If the type of the data source is Internet protocol address port, by the number of the data source
It is determined as Telnet according to access way.
Compared to the prior art, what the present invention realized has the beneficial effect that:
Above data monitoring method and device provided by the invention can access data source according to the type of data source, press
Data are analyzed according to the type of data in data source, and then are pushed according to preset alarm mode about data alarm task
Warning message.The surveillance and control measure to match can be determined for the data in different types of data source and data source, and
It is applied to different alarm scenes.Due to the access of support multiple data sources, the analysis of multi-dimensional data and more type of alarms
Extension, this can realize that multi-data source shares a set of monitoring scheme, to increase the versatility of monitoring, tie up to later period system
Shield is brought convenience.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below
There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this
The embodiment of invention for those of ordinary skill in the art without creative efforts, can also basis
The attached drawing of offer obtains other attached drawings.
Fig. 1 is the method flow diagram of data monitoring method provided in an embodiment of the present invention;
Fig. 2 is the Part Methods flow chart of data monitoring method provided in an embodiment of the present invention;
Fig. 3 is another part method flow diagram of data monitoring method provided in an embodiment of the present invention;
Fig. 4 is the structural schematic diagram of data monitoring device provided in an embodiment of the present invention.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete
Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on
Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every other
Embodiment shall fall within the protection scope of the present invention.
The embodiment of the present invention provides a kind of data monitoring method, and the method flow diagram of this method is as shown in Figure 1, include as follows
Step:
S10 determines data access according to the type of data source, and accesses data source according to data access;
By taking Microsoft Commercial Internet System as an example, before system is formally online, has mass data and need to monitor, for example,
Monitor whether untreated order volume within a specified time reaches specified quantity, whether specified interface feedback error information number reaches
Whether predetermined number of times, specified Third-party payment platform response time reach specified duration etc..For untreated order volume, specified connect
Mouthful and specified Third-party payment platform belong to different data sources, data source types are followed successively by database table, interface and mutually
Networking protocol address port.
For different data Source Type, different access ways can be pre-defined to realize access data source.For example, for number
According to library table, Connectivity Technical of Database timing can be used and connect;For interface, hypertext transfer protocol timing can be used and call;It is right
In Internet protocol address port, Telnet technology, i.e. the standard agreement timing of Internet remote login service can be used
It logs in, with the connectivity of test target address and response time etc..
Connectivity Technical of Database, hypertext transfer protocol and Telnet technology are simply introduced below:
Common Connectivity Technical of Database is JDBC (connection of JavaDatabase Connectivity, Java database)
It is a kind of for executing the JavaAPI of SQL statement, unified access can be provided for a variety of relational databases, it is by one group of use
Class and the interface composition that Java language is write.
Hypertext transfer protocol (Hyper Text Transfer Protocol, http protocol) is for servicing from WWW
Device transmits hypertext to the transport protocol of local browser.Which employs request/response models.User end to server sends one
A request, request header include the method for request, URL, protocol version and include request modifier, customer information and content
Similar to the message structure of MIME.In response with a statusline, the content of response includes the version of messaging protocol to server,
Success or error coded, which add, includes server info, entity metamessage and possible physical contents.
Telnet is used for Internet session, and basic function is --- and allow user to log into remote host system.
Originally, it only allows the local computer of user to connect with remote computer, thus become a terminal of distance host, it
Authorized user is allowed to enter other machines in network and just as user operates at the scene.Once into host, user
The anything of host permission can be operated, such as:Read file, editing files or delete file etc..
In addition, accessing after data source for convenience of the data in management data source, number can be written in the data in data source
According to collection table.
S20 determines data analysis rule according to the type of data in data source, and generates data according to data analysis rule
Alarm task;
In the present embodiment, corresponding threshold value can be determined according to the type of data, and divided using corresponding manner of comparison
Analysis.
During specific implementation, " data analysis rule is determined in step 20 according to the type of data in data source, and is pressed
The alarm task of data is generated according to data analysis rule ", following steps can be specifically used, method flow diagram is as shown in Figure 2:
S201, in the case where the type of data is text, the text threshold value and text for obtaining data report an error threshold value;
S202, judges whether data are equal to text threshold value;If data are not equal to text threshold value, S203 is thened follow the steps;
In the present embodiment, if data are equal to text threshold value, then it represents that data are normal.
S203 reports an error, and obtains text of the data source in preset period of time and report an error number;
S204, judges whether the text number that reports an error is less than text and reports an error threshold value;If text reports an error, number reports an error less than text
Threshold value thens follow the steps S205;If text reports an error, number reports an error threshold value not less than text, thens follow the steps S206;
S205 transfers the alarm task of last generation, and in the feelings that the upper primary alarm task generated is abnormal alarm
Under condition, abnormal restoring alarm task is generated;
S206 generates abnormal alarm task.
During specific implementation, " data analysis rule is determined in step 20 according to the type of data in data source, and is pressed
The alarm task of data is generated according to data analysis rule ", following steps can also be specifically used, method flow diagram is as shown in Figure 3:
S301, in the case where the type of data is numerical value, the numerical value allowed band and numerical value for obtaining data report an error threshold
Value;
Whether S302 judges data in numerical value allowed band;If data in numerical value allowed band, do not then follow the steps
S303;
In the present embodiment, if data are in numerical value allowed band, then it represents that data are normal.
S303 reports an error, and obtains numerical value of the data source in preset period of time and report an error number;
S304, judges whether the numerical value number that reports an error is less than numerical value and reports an error threshold value;If numerical value reports an error, number reports an error less than numerical value
Threshold value thens follow the steps S305;If numerical value reports an error, number reports an error threshold value not less than numerical value, thens follow the steps S306;
S305 transfers the alarm task of last generation, and in the feelings that the upper primary alarm task generated is abnormal alarm
Under condition, abnormal restoring alarm task is generated;
S306 generates abnormal alarm task.
In addition, for record alarm task, it, can be by alarm task write-in alarm task list after generating alarm task.
S30 pushes the warning message of alarm task according to preset alarm mode.
It should be noted that preset alarm mode includes but is not limited in SMS alarm, mail alarm and interface alarm
It is one or more.
In the case where preset alarm mode is SMS alarm, short message enquiry subscription information, for example, short message subscription number,
Short message content and short message subscribe to people etc., according to short message subscription information push note;It is mail alarm in preset alarm mode
In the case of, mail subscription information is inquired, for example, mail subscription mailbox, Mail Contents and mail subscription people etc., order according to mail
Read content push mail;In the case where preset alarm mode is that interface is alarmed, query interface subscription information, for example, interface is ordered
Address, interface display content etc. are read, according to interface subscription information calling interface.
In addition, to record the push of warning message and warning message as a result, warning message and its push result can be write
Enter alarming result table.
Above step S201~step S206 is only in step S20 that the embodiment of the present application discloses " according in data source
The type of data determines data analysis rule, and the alarm task of data is generated according to data analysis rule " one kind of process is excellent
The implementation of choosing, the specific implementation in relation to this process can be arbitrarily arranged according to their own needs, it is not limited here.
Above step S301~step S306 is only in step S20 that the embodiment of the present application discloses " according in data source
The type of data determines data analysis rule, and the alarm task of data is generated according to data analysis rule " one kind of process is excellent
The implementation of choosing, the specific implementation in relation to this process can be arbitrarily arranged according to their own needs, it is not limited here.
Data monitoring method provided in an embodiment of the present invention, for the data in different types of data source and data source
It can determine the surveillance and control measure to match, and be applied to different alarm scenes.Due to supporting access, the multidimensional of multiple data sources
The analysis of degree evidence and the extension of more type of alarms, this can realize that multi-data source shares a set of monitoring scheme, to increase
The versatility of monitoring is added, has been brought convenience to later period system maintenance.
The data monitoring method provided based on the above embodiment, the embodiment of the present invention then provide a kind of above-mentioned data prison of execution
The device of prosecutor method, the apparatus structure schematic diagram is as shown in figure 4, include:Data access module 10, task generation module 20 and report
Alert pushing module 30;
Data access module 10 determines data access for the type according to data source, and according to data access side
Formula accesses data source;
Task generation module 20, for determining data analysis rule according to the type of data in data source, and according to data
The alarm task of analysis rule generation data;
Alarm pushing module 30, for pushing the warning message of alarm task according to preset alarm mode.
It should be noted that preset alarm mode includes but is not limited in SMS alarm, mail alarm and interface alarm
It is one or more.
In some other embodiment, data access module 10 is specifically used for:
Determine the type of data source;If the type of data source is database table, the data access of data source is determined
For database connection;If the type of data source is interface, the data access of data source is determined as hypertext transfer protocol;
If the type of data source is Internet protocol address port, the data access of data source is determined as Telnet.
In some other embodiment, task generation module 20 is specifically used for:
In the case where the type of data is text, the text threshold value and text for obtaining data report an error threshold value;
Judge whether data are equal to text threshold value;
If data are not equal to text threshold value, report an error, and obtains text of the data source in preset period of time and report an error number;
Judge whether the text number that reports an error is less than text and reports an error threshold value;
If text reports an error, number is less than text and reports an error threshold value, transfers the alarm task of last generation, and in upper primary life
At alarm task be abnormal alarm in the case where, generate abnormal restoring alarm task;
If text reports an error, number reports an error threshold value not less than text, generates abnormal alarm task.
In some other embodiment, task generation module 20 is specifically used for:
In the case where the type of data is numerical value, the numerical value allowed band and numerical value for obtaining data report an error threshold value;
Judge data whether in numerical value allowed band;
If data in numerical value allowed band, do not report an error, and obtain numerical value of the data source in preset period of time and report an error
Number;
Judge whether the numerical value number that reports an error is less than numerical value and reports an error threshold value;
If numerical value reports an error, number is less than numerical value and reports an error threshold value, transfers the alarm task of last generation, and in upper primary life
At alarm task be abnormal alarm in the case where, generate abnormal restoring alarm task;
If numerical value reports an error, number reports an error threshold value not less than numerical value, generates abnormal alarm task.
For convenience of the data in management data source, in some other embodiment, data access module 10 is also used to:
Data collection list is written into data in data source.
To record alarm task, in some other embodiment, task generation module 20 is also used to:
It will alarm task write-in alarm task list
For record warning message and warning message push as a result, in some other embodiment, pushing module of alarming
30 are also used to:
Alarming result table is written into the push result of warning message and warning message.
Data monitoring device provided in an embodiment of the present invention, for the data in different types of data source and data source
It can determine the surveillance and control measure to match, and be applied to different alarm scenes.Due to supporting access, the multidimensional of multiple data sources
The analysis of degree evidence and the extension of more type of alarms, this can realize that multi-data source shares a set of monitoring scheme, to increase
The versatility of monitoring is added, has been brought convenience to later period system maintenance.
A kind of data monitoring method provided by the present invention and device are described in detail above, it is used herein
A specific example illustrates the principle and implementation of the invention, and the above embodiments are only used to help understand originally
The method and its core concept of invention;At the same time, for those skilled in the art, according to the thought of the present invention, specific
There will be changes in embodiment and application range, in conclusion the content of the present specification should not be construed as to of the invention
Limitation.
It should be noted that all the embodiments in this specification are described in a progressive manner, each embodiment weight
Point explanation is the difference from other embodiments, and the same or similar parts between the embodiments can be referred to each other.
For the device disclosed in the embodiment, since it is corresponded to the methods disclosed in the examples, so being described relatively simple, phase
Place is closed referring to method part illustration.
It should also be noted that, herein, relational terms such as first and second and the like are used merely to one
Entity or operation are distinguished with another entity or operation, without necessarily requiring or implying between these entities or operation
There are any actual relationship or orders.Moreover, the terms "include", "comprise" or its any other variant are intended to contain
Lid non-exclusive inclusion, so that the element that the process, method, article or equipment including a series of elements is intrinsic,
It further include either the element intrinsic for these process, method, article or equipments.In the absence of more restrictions,
The element limited by sentence "including a ...", it is not excluded that in the process, method, article or equipment including the element
In there is also other identical elements.
The foregoing description of the disclosed embodiments enables those skilled in the art to implement or use the present invention.
Various modifications to these embodiments will be readily apparent to those skilled in the art, as defined herein
General Principle can be realized in other embodiments without departing from the spirit or scope of the present invention.Therefore, of the invention
It is not intended to be limited to the embodiments shown herein, and is to fit to and the principles and novel features disclosed herein phase one
The widest scope of cause.
Claims (10)
1. a kind of data monitoring method, which is characterized in that including:
Data access is determined according to the type of data source, and accesses the data source according to the data access;
Data analysis rule is determined according to the type of data in the data source, and according to described in data analysis rule generation
The alarm task of data;
The warning message of the alarm task is pushed according to preset alarm mode.
2. the method according to claim 1, wherein described determine data access side according to the type of data source
Formula, including:
Determine the type of the data source;
If the type of the data source is database table, the data access of the data source is determined as database connection;
If the type of the data source is interface, the data access of the data source is determined as hypertext transfer protocol;
If the type of the data source is Internet protocol address port, the data access of the data source is determined as far
Cheng Denglu.
3. the method according to claim 1, wherein the type according to data in the data source determines number
According to analysis rule, and the alarm task of the data is generated according to the data analysis rule, including:
In the case where the type of the data is text, the text threshold value and text for obtaining the data report an error threshold value;
Judge whether the data are equal to the text threshold value;
If the data are not equal to the text threshold value, report an error, and obtain text of the data source in preset period of time
Report an error number;
Judge whether the text number that reports an error is less than the text and reports an error threshold value;
If the text reports an error, number is less than the text and reports an error threshold value, transfers the alarm task of last generation, and upper one
In the case that the alarm task of secondary generation is abnormal alarm, abnormal restoring alarm task is generated;
If the text reports an error, number reports an error threshold value not less than the text, generates abnormal alarm task.
4. the method according to claim 1, wherein the type according to data in the data source determines number
According to analysis rule, and the alarm task of the data is generated according to the data analysis rule, including:
In the case where the type of the data is numerical value, the numerical value allowed band and numerical value for obtaining the data report an error threshold
Value;
Judge the data whether in the numerical value allowed band;
If the data in the numerical value allowed band, do not report an error, and obtain the data source in preset period of time
Numerical value reports an error number;
Judge whether the numerical value number that reports an error is less than the numerical value and reports an error threshold value;
If the numerical value reports an error, number is less than the numerical value and reports an error threshold value, transfers the alarm task of last generation, and upper one
In the case that the alarm task of secondary generation is abnormal alarm, abnormal restoring alarm task is generated;
If the numerical value reports an error, number reports an error threshold value not less than the numerical value, generates abnormal alarm task.
5. the method according to claim 1, wherein the preset alarm mode, including:SMS alarm, mail
One of alarm and interface alarm are a variety of.
6. the method according to claim 1, wherein described access the data according to the data access
After source, further include:
Data collection list is written into data in the data source.
7. the method according to claim 1, wherein described generate the data according to the data analysis rule
Alarm task after, further include:
Alarm task list is written into the alarm task.
8. the method according to claim 1, wherein it is described according to preset alarm mode push warning message it
Afterwards, further include:
Alarming result table is written into the push result of the warning message and the warning message.
9. a kind of data monitoring device, which is characterized in that including:Data access module, task generation module and alarm push mould
Block;
The data access module determines data access for the type according to data source, and according to the data access
Mode accesses the data source;
The task generation module, for determining data analysis rule according to the type of data in the data source, and according to institute
State the alarm task that data analysis rule generates the data;
The alarm pushing module, for pushing the warning message of the alarm task according to preset alarm mode.
10. device according to claim 9, which is characterized in that the data access module is specifically used for:
Determine the type of the data source;If the type of the data source is database table, by the data access of the data source
Mode is determined as database connection;If the type of the data source is interface, the data access of the data source is determined
For hypertext transfer protocol;If the type of the data source is Internet protocol address port, the data of the data source are connect
Enter mode and is determined as Telnet.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810550230.3A CN108829568A (en) | 2018-05-31 | 2018-05-31 | A kind of data monitoring method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810550230.3A CN108829568A (en) | 2018-05-31 | 2018-05-31 | A kind of data monitoring method and device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108829568A true CN108829568A (en) | 2018-11-16 |
Family
ID=64146992
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810550230.3A Pending CN108829568A (en) | 2018-05-31 | 2018-05-31 | A kind of data monitoring method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108829568A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110718295A (en) * | 2019-09-06 | 2020-01-21 | 广东宝莱特医用科技股份有限公司 | Alarm management method and system of blood purification equipment |
CN111861662A (en) * | 2020-07-17 | 2020-10-30 | 上海聚音信息科技有限公司 | Order push-back and inventory management method, device and computer readable storage medium |
CN113641557A (en) * | 2021-08-30 | 2021-11-12 | 平安证券股份有限公司 | Data monitoring processing method, device, equipment and storage medium |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20120191440A1 (en) * | 2011-01-25 | 2012-07-26 | Power Analytics Corporation | Systems and methods for real-time dc microgrid power analytics for mission-critical power systems |
CN106815115A (en) * | 2017-01-13 | 2017-06-09 | 郑州云海信息技术有限公司 | A kind of operation condition of server monitoring system |
CN107491375A (en) * | 2017-08-18 | 2017-12-19 | 国网山东省电力公司信息通信公司 | Equipment detection and fault early warning system and method under a kind of cloud computing environment |
CN107945086A (en) * | 2017-11-17 | 2018-04-20 | 广州葵翼信息科技有限公司 | A kind of big data resource management system applied to smart city |
CN108092849A (en) * | 2017-12-06 | 2018-05-29 | 链家网(北京)科技有限公司 | Business datum monitoring method, apparatus and system |
-
2018
- 2018-05-31 CN CN201810550230.3A patent/CN108829568A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20120191440A1 (en) * | 2011-01-25 | 2012-07-26 | Power Analytics Corporation | Systems and methods for real-time dc microgrid power analytics for mission-critical power systems |
CN106815115A (en) * | 2017-01-13 | 2017-06-09 | 郑州云海信息技术有限公司 | A kind of operation condition of server monitoring system |
CN107491375A (en) * | 2017-08-18 | 2017-12-19 | 国网山东省电力公司信息通信公司 | Equipment detection and fault early warning system and method under a kind of cloud computing environment |
CN107945086A (en) * | 2017-11-17 | 2018-04-20 | 广州葵翼信息科技有限公司 | A kind of big data resource management system applied to smart city |
CN108092849A (en) * | 2017-12-06 | 2018-05-29 | 链家网(北京)科技有限公司 | Business datum monitoring method, apparatus and system |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110718295A (en) * | 2019-09-06 | 2020-01-21 | 广东宝莱特医用科技股份有限公司 | Alarm management method and system of blood purification equipment |
CN111861662A (en) * | 2020-07-17 | 2020-10-30 | 上海聚音信息科技有限公司 | Order push-back and inventory management method, device and computer readable storage medium |
CN111861662B (en) * | 2020-07-17 | 2021-08-17 | 上海聚音信息科技有限公司 | Order push-back and inventory management method, device and computer readable storage medium |
CN113641557A (en) * | 2021-08-30 | 2021-11-12 | 平安证券股份有限公司 | Data monitoring processing method, device, equipment and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11792291B1 (en) | Proxying hypertext transfer protocol (HTTP) requests for microservices | |
CN111522922B (en) | Log information query method and device, storage medium and computer equipment | |
US10585908B2 (en) | Method and system for parameterizing log file location assignments for a log analytics system | |
US11803548B1 (en) | Automated generation of metrics from log data | |
CN101345751B (en) | Identifying application user as source of database activity | |
US20100088197A1 (en) | Systems and methods for generating remote system inventory capable of differential update reports | |
US11362912B2 (en) | Support ticket platform for improving network infrastructures | |
CN108829568A (en) | A kind of data monitoring method and device | |
CN108958959B (en) | Method and device for detecting hive data table | |
CN104935601B (en) | Web log file safety analytical method based on cloud, apparatus and system | |
US10986020B2 (en) | Reconstructing message flows based on hash values | |
Jeong et al. | An IoT platform for civil infrastructure monitoring | |
CN111404937B (en) | Method and device for detecting server vulnerability | |
US10826965B2 (en) | Network monitoring to identify network issues | |
CN112000992A (en) | Data leakage prevention protection method and device, computer readable medium and electronic equipment | |
US11676345B1 (en) | Automated adaptive workflows in an extended reality environment | |
CN105607983B (en) | Data exception monitoring method and device | |
Chattopadhyay et al. | Web based RFID asset management solution established on cloud services | |
CN116208579A (en) | Information pushing method, device, equipment and storage medium | |
CN115277355A (en) | Method, device, equipment and medium for processing state code data of monitoring system | |
CN112291264B (en) | Security control method, device, server and storage medium | |
US11544343B1 (en) | Codeless anchor generation for detectable features in an environment | |
CN113590234A (en) | Method, device and equipment for automatically acquiring data and storage medium | |
CN109412861B (en) | Method for establishing security association display of terminal network | |
CN103297761B (en) | Monitoring method and system for video analysis |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20181116 |