CN108829568A - A kind of data monitoring method and device - Google Patents

A kind of data monitoring method and device Download PDF

Info

Publication number
CN108829568A
CN108829568A CN201810550230.3A CN201810550230A CN108829568A CN 108829568 A CN108829568 A CN 108829568A CN 201810550230 A CN201810550230 A CN 201810550230A CN 108829568 A CN108829568 A CN 108829568A
Authority
CN
China
Prior art keywords
data
alarm
data source
type
error
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810550230.3A
Other languages
Chinese (zh)
Inventor
雷万达
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Da Fei Yun Loan Technology (beijing) Co Ltd
Original Assignee
Da Fei Yun Loan Technology (beijing) Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Da Fei Yun Loan Technology (beijing) Co Ltd filed Critical Da Fei Yun Loan Technology (beijing) Co Ltd
Priority to CN201810550230.3A priority Critical patent/CN108829568A/en
Publication of CN108829568A publication Critical patent/CN108829568A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/32Monitoring with visual or acoustical indication of the functioning of the machine
    • G06F11/324Display of status information
    • G06F11/327Alarm or error message display
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/3003Monitoring arrangements specially adapted to the computing system or computing system component being monitored

Abstract

The present invention provides a kind of data monitoring method and device, this method includes:Data access is determined according to the type of data source, and accesses data source according to data access;Data analysis rule is determined according to the type of data in data source, and the alarm task of data is generated according to data analysis rule;The warning message of alarm task is pushed according to preset alarm mode.Due to supporting access, the analysis of multi-dimensional data and the extension of more type of alarms of multiple data sources, this can realize that multi-data source shares a set of monitoring scheme, to increase the versatility of monitoring, bring convenience to later period system maintenance.

Description

A kind of data monitoring method and device
Technical field
The present invention relates to Developing Technology of Applied Software fields, more specifically to a kind of data monitoring method and device.
Background technique
For the stable operation of operation system, the monitoring for generating data in system operation just becomes especially to weigh It wants.
Current monitoring scheme is mainly:Data source to be monitored is specified in advance, and the data which reports are carried out It analyzes and alarms.But using existing monitoring scheme, a set of monitoring scheme will be respectively set in every kind of data source, this just can not Meet complicated and diversified monitoring demand.
Summary of the invention
In view of this, the present invention provides a kind of data monitoring method and device, with solve it is existing for every kind of data source all The problem of a set of monitoring scheme is set.Technical solution is as follows:
A kind of data monitoring method, including:
Data access is determined according to the type of data source, and accesses the data according to the data access Source;
Data analysis rule is determined according to the type of data in the data source, and is generated according to the data analysis rule The alarm task of the data;
The warning message of the alarm task is pushed according to preset alarm mode.
Preferably, the type according to data source determines data access, including:
Determine the type of the data source;
If the type of the data source is database table, the data access of the data source is determined as database and is connected It connects;
If the type of the data source is interface, the data access of the data source is determined as Hyper text transfer association View;
If the type of the data source is Internet protocol address port, the data access of the data source is determined For Telnet.
Preferably, the type according to data in the data source determines data analysis rule, and according to the data Analysis rule generates the alarm task of the data, including:
In the case where the type of the data is text, the text threshold value and text for obtaining the data report an error threshold Value;
Judge whether the data are equal to the text threshold value;
If the data are not equal to the text threshold value, report an error, and obtain the data source in preset period of time Text reports an error number;
Judge whether the text number that reports an error is less than the text and reports an error threshold value;
If the text reports an error, number is less than the text and reports an error threshold value, transfers the alarm task of last generation, and In the case that the alarm task that last time generates is abnormal alarm, abnormal restoring alarm task is generated;
If the text reports an error, number reports an error threshold value not less than the text, generates abnormal alarm task.
Preferably,
In the case where the type of the data is numerical value, the numerical value allowed band and numerical value for obtaining the data report an error Threshold value;
Judge the data whether in the numerical value allowed band;
If the data in the numerical value allowed band, do not report an error, and obtain the data source in preset period of time Interior numerical value reports an error number;
Judge whether the numerical value number that reports an error is less than the numerical value and reports an error threshold value;
If the numerical value reports an error, number is less than the numerical value and reports an error threshold value, transfers the alarm task of last generation, and In the case that the alarm task that last time generates is abnormal alarm, abnormal restoring alarm task is generated;
If the numerical value reports an error, number reports an error threshold value not less than the numerical value, generates abnormal alarm task.
Preferably, the preset alarm mode, including:One of SMS alarm, mail alarm and interface alarm are more Kind.
Preferably, after the data source according to data access access, further include:
Data collection list is written into data in the data source.
Preferably, after the alarm task that the data are generated according to the data analysis rule, further include:
Alarm task list is written into the alarm task.
Preferably, it is described push warning message according to preset alarm mode after, further include:
Alarming result table is written into the push result of the warning message and the warning message.
A kind of data monitoring device, including:Data access module, task generation module and alarm pushing module;
The data access module determines data access for the type according to data source, and according to the data Access way accesses the data source;
The task generation module for determining data analysis rule according to the type of data in the data source, and is pressed The alarm task of the data is generated according to the data analysis rule;
The alarm pushing module, for pushing the warning message of the alarm task according to preset alarm mode.
Preferably, the data access module, is specifically used for:
Determine the type of the data source;If the type of the data source is database table, by the data of the data source Access way is determined as database connection;If the type of the data source is interface, by the data access of the data source It is determined as hypertext transfer protocol;If the type of the data source is Internet protocol address port, by the number of the data source It is determined as Telnet according to access way.
Compared to the prior art, what the present invention realized has the beneficial effect that:
Above data monitoring method and device provided by the invention can access data source according to the type of data source, press Data are analyzed according to the type of data in data source, and then are pushed according to preset alarm mode about data alarm task Warning message.The surveillance and control measure to match can be determined for the data in different types of data source and data source, and It is applied to different alarm scenes.Due to the access of support multiple data sources, the analysis of multi-dimensional data and more type of alarms Extension, this can realize that multi-data source shares a set of monitoring scheme, to increase the versatility of monitoring, tie up to later period system Shield is brought convenience.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this The embodiment of invention for those of ordinary skill in the art without creative efforts, can also basis The attached drawing of offer obtains other attached drawings.
Fig. 1 is the method flow diagram of data monitoring method provided in an embodiment of the present invention;
Fig. 2 is the Part Methods flow chart of data monitoring method provided in an embodiment of the present invention;
Fig. 3 is another part method flow diagram of data monitoring method provided in an embodiment of the present invention;
Fig. 4 is the structural schematic diagram of data monitoring device provided in an embodiment of the present invention.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every other Embodiment shall fall within the protection scope of the present invention.
The embodiment of the present invention provides a kind of data monitoring method, and the method flow diagram of this method is as shown in Figure 1, include as follows Step:
S10 determines data access according to the type of data source, and accesses data source according to data access;
By taking Microsoft Commercial Internet System as an example, before system is formally online, has mass data and need to monitor, for example, Monitor whether untreated order volume within a specified time reaches specified quantity, whether specified interface feedback error information number reaches Whether predetermined number of times, specified Third-party payment platform response time reach specified duration etc..For untreated order volume, specified connect Mouthful and specified Third-party payment platform belong to different data sources, data source types are followed successively by database table, interface and mutually Networking protocol address port.
For different data Source Type, different access ways can be pre-defined to realize access data source.For example, for number According to library table, Connectivity Technical of Database timing can be used and connect;For interface, hypertext transfer protocol timing can be used and call;It is right In Internet protocol address port, Telnet technology, i.e. the standard agreement timing of Internet remote login service can be used It logs in, with the connectivity of test target address and response time etc..
Connectivity Technical of Database, hypertext transfer protocol and Telnet technology are simply introduced below:
Common Connectivity Technical of Database is JDBC (connection of JavaDatabase Connectivity, Java database) It is a kind of for executing the JavaAPI of SQL statement, unified access can be provided for a variety of relational databases, it is by one group of use Class and the interface composition that Java language is write.
Hypertext transfer protocol (Hyper Text Transfer Protocol, http protocol) is for servicing from WWW Device transmits hypertext to the transport protocol of local browser.Which employs request/response models.User end to server sends one A request, request header include the method for request, URL, protocol version and include request modifier, customer information and content Similar to the message structure of MIME.In response with a statusline, the content of response includes the version of messaging protocol to server, Success or error coded, which add, includes server info, entity metamessage and possible physical contents.
Telnet is used for Internet session, and basic function is --- and allow user to log into remote host system. Originally, it only allows the local computer of user to connect with remote computer, thus become a terminal of distance host, it Authorized user is allowed to enter other machines in network and just as user operates at the scene.Once into host, user The anything of host permission can be operated, such as:Read file, editing files or delete file etc..
In addition, accessing after data source for convenience of the data in management data source, number can be written in the data in data source According to collection table.
S20 determines data analysis rule according to the type of data in data source, and generates data according to data analysis rule Alarm task;
In the present embodiment, corresponding threshold value can be determined according to the type of data, and divided using corresponding manner of comparison Analysis.
During specific implementation, " data analysis rule is determined in step 20 according to the type of data in data source, and is pressed The alarm task of data is generated according to data analysis rule ", following steps can be specifically used, method flow diagram is as shown in Figure 2:
S201, in the case where the type of data is text, the text threshold value and text for obtaining data report an error threshold value;
S202, judges whether data are equal to text threshold value;If data are not equal to text threshold value, S203 is thened follow the steps;
In the present embodiment, if data are equal to text threshold value, then it represents that data are normal.
S203 reports an error, and obtains text of the data source in preset period of time and report an error number;
S204, judges whether the text number that reports an error is less than text and reports an error threshold value;If text reports an error, number reports an error less than text Threshold value thens follow the steps S205;If text reports an error, number reports an error threshold value not less than text, thens follow the steps S206;
S205 transfers the alarm task of last generation, and in the feelings that the upper primary alarm task generated is abnormal alarm Under condition, abnormal restoring alarm task is generated;
S206 generates abnormal alarm task.
During specific implementation, " data analysis rule is determined in step 20 according to the type of data in data source, and is pressed The alarm task of data is generated according to data analysis rule ", following steps can also be specifically used, method flow diagram is as shown in Figure 3:
S301, in the case where the type of data is numerical value, the numerical value allowed band and numerical value for obtaining data report an error threshold Value;
Whether S302 judges data in numerical value allowed band;If data in numerical value allowed band, do not then follow the steps S303;
In the present embodiment, if data are in numerical value allowed band, then it represents that data are normal.
S303 reports an error, and obtains numerical value of the data source in preset period of time and report an error number;
S304, judges whether the numerical value number that reports an error is less than numerical value and reports an error threshold value;If numerical value reports an error, number reports an error less than numerical value Threshold value thens follow the steps S305;If numerical value reports an error, number reports an error threshold value not less than numerical value, thens follow the steps S306;
S305 transfers the alarm task of last generation, and in the feelings that the upper primary alarm task generated is abnormal alarm Under condition, abnormal restoring alarm task is generated;
S306 generates abnormal alarm task.
In addition, for record alarm task, it, can be by alarm task write-in alarm task list after generating alarm task.
S30 pushes the warning message of alarm task according to preset alarm mode.
It should be noted that preset alarm mode includes but is not limited in SMS alarm, mail alarm and interface alarm It is one or more.
In the case where preset alarm mode is SMS alarm, short message enquiry subscription information, for example, short message subscription number, Short message content and short message subscribe to people etc., according to short message subscription information push note;It is mail alarm in preset alarm mode In the case of, mail subscription information is inquired, for example, mail subscription mailbox, Mail Contents and mail subscription people etc., order according to mail Read content push mail;In the case where preset alarm mode is that interface is alarmed, query interface subscription information, for example, interface is ordered Address, interface display content etc. are read, according to interface subscription information calling interface.
In addition, to record the push of warning message and warning message as a result, warning message and its push result can be write Enter alarming result table.
Above step S201~step S206 is only in step S20 that the embodiment of the present application discloses " according in data source The type of data determines data analysis rule, and the alarm task of data is generated according to data analysis rule " one kind of process is excellent The implementation of choosing, the specific implementation in relation to this process can be arbitrarily arranged according to their own needs, it is not limited here.
Above step S301~step S306 is only in step S20 that the embodiment of the present application discloses " according in data source The type of data determines data analysis rule, and the alarm task of data is generated according to data analysis rule " one kind of process is excellent The implementation of choosing, the specific implementation in relation to this process can be arbitrarily arranged according to their own needs, it is not limited here.
Data monitoring method provided in an embodiment of the present invention, for the data in different types of data source and data source It can determine the surveillance and control measure to match, and be applied to different alarm scenes.Due to supporting access, the multidimensional of multiple data sources The analysis of degree evidence and the extension of more type of alarms, this can realize that multi-data source shares a set of monitoring scheme, to increase The versatility of monitoring is added, has been brought convenience to later period system maintenance.
The data monitoring method provided based on the above embodiment, the embodiment of the present invention then provide a kind of above-mentioned data prison of execution The device of prosecutor method, the apparatus structure schematic diagram is as shown in figure 4, include:Data access module 10, task generation module 20 and report Alert pushing module 30;
Data access module 10 determines data access for the type according to data source, and according to data access side Formula accesses data source;
Task generation module 20, for determining data analysis rule according to the type of data in data source, and according to data The alarm task of analysis rule generation data;
Alarm pushing module 30, for pushing the warning message of alarm task according to preset alarm mode.
It should be noted that preset alarm mode includes but is not limited in SMS alarm, mail alarm and interface alarm It is one or more.
In some other embodiment, data access module 10 is specifically used for:
Determine the type of data source;If the type of data source is database table, the data access of data source is determined For database connection;If the type of data source is interface, the data access of data source is determined as hypertext transfer protocol; If the type of data source is Internet protocol address port, the data access of data source is determined as Telnet.
In some other embodiment, task generation module 20 is specifically used for:
In the case where the type of data is text, the text threshold value and text for obtaining data report an error threshold value;
Judge whether data are equal to text threshold value;
If data are not equal to text threshold value, report an error, and obtains text of the data source in preset period of time and report an error number;
Judge whether the text number that reports an error is less than text and reports an error threshold value;
If text reports an error, number is less than text and reports an error threshold value, transfers the alarm task of last generation, and in upper primary life At alarm task be abnormal alarm in the case where, generate abnormal restoring alarm task;
If text reports an error, number reports an error threshold value not less than text, generates abnormal alarm task.
In some other embodiment, task generation module 20 is specifically used for:
In the case where the type of data is numerical value, the numerical value allowed band and numerical value for obtaining data report an error threshold value;
Judge data whether in numerical value allowed band;
If data in numerical value allowed band, do not report an error, and obtain numerical value of the data source in preset period of time and report an error Number;
Judge whether the numerical value number that reports an error is less than numerical value and reports an error threshold value;
If numerical value reports an error, number is less than numerical value and reports an error threshold value, transfers the alarm task of last generation, and in upper primary life At alarm task be abnormal alarm in the case where, generate abnormal restoring alarm task;
If numerical value reports an error, number reports an error threshold value not less than numerical value, generates abnormal alarm task.
For convenience of the data in management data source, in some other embodiment, data access module 10 is also used to:
Data collection list is written into data in data source.
To record alarm task, in some other embodiment, task generation module 20 is also used to:
It will alarm task write-in alarm task list
For record warning message and warning message push as a result, in some other embodiment, pushing module of alarming 30 are also used to:
Alarming result table is written into the push result of warning message and warning message.
Data monitoring device provided in an embodiment of the present invention, for the data in different types of data source and data source It can determine the surveillance and control measure to match, and be applied to different alarm scenes.Due to supporting access, the multidimensional of multiple data sources The analysis of degree evidence and the extension of more type of alarms, this can realize that multi-data source shares a set of monitoring scheme, to increase The versatility of monitoring is added, has been brought convenience to later period system maintenance.
A kind of data monitoring method provided by the present invention and device are described in detail above, it is used herein A specific example illustrates the principle and implementation of the invention, and the above embodiments are only used to help understand originally The method and its core concept of invention;At the same time, for those skilled in the art, according to the thought of the present invention, specific There will be changes in embodiment and application range, in conclusion the content of the present specification should not be construed as to of the invention Limitation.
It should be noted that all the embodiments in this specification are described in a progressive manner, each embodiment weight Point explanation is the difference from other embodiments, and the same or similar parts between the embodiments can be referred to each other. For the device disclosed in the embodiment, since it is corresponded to the methods disclosed in the examples, so being described relatively simple, phase Place is closed referring to method part illustration.
It should also be noted that, herein, relational terms such as first and second and the like are used merely to one Entity or operation are distinguished with another entity or operation, without necessarily requiring or implying between these entities or operation There are any actual relationship or orders.Moreover, the terms "include", "comprise" or its any other variant are intended to contain Lid non-exclusive inclusion, so that the element that the process, method, article or equipment including a series of elements is intrinsic, It further include either the element intrinsic for these process, method, article or equipments.In the absence of more restrictions, The element limited by sentence "including a ...", it is not excluded that in the process, method, article or equipment including the element In there is also other identical elements.
The foregoing description of the disclosed embodiments enables those skilled in the art to implement or use the present invention. Various modifications to these embodiments will be readily apparent to those skilled in the art, as defined herein General Principle can be realized in other embodiments without departing from the spirit or scope of the present invention.Therefore, of the invention It is not intended to be limited to the embodiments shown herein, and is to fit to and the principles and novel features disclosed herein phase one The widest scope of cause.

Claims (10)

1. a kind of data monitoring method, which is characterized in that including:
Data access is determined according to the type of data source, and accesses the data source according to the data access;
Data analysis rule is determined according to the type of data in the data source, and according to described in data analysis rule generation The alarm task of data;
The warning message of the alarm task is pushed according to preset alarm mode.
2. the method according to claim 1, wherein described determine data access side according to the type of data source Formula, including:
Determine the type of the data source;
If the type of the data source is database table, the data access of the data source is determined as database connection;
If the type of the data source is interface, the data access of the data source is determined as hypertext transfer protocol;
If the type of the data source is Internet protocol address port, the data access of the data source is determined as far Cheng Denglu.
3. the method according to claim 1, wherein the type according to data in the data source determines number According to analysis rule, and the alarm task of the data is generated according to the data analysis rule, including:
In the case where the type of the data is text, the text threshold value and text for obtaining the data report an error threshold value;
Judge whether the data are equal to the text threshold value;
If the data are not equal to the text threshold value, report an error, and obtain text of the data source in preset period of time Report an error number;
Judge whether the text number that reports an error is less than the text and reports an error threshold value;
If the text reports an error, number is less than the text and reports an error threshold value, transfers the alarm task of last generation, and upper one In the case that the alarm task of secondary generation is abnormal alarm, abnormal restoring alarm task is generated;
If the text reports an error, number reports an error threshold value not less than the text, generates abnormal alarm task.
4. the method according to claim 1, wherein the type according to data in the data source determines number According to analysis rule, and the alarm task of the data is generated according to the data analysis rule, including:
In the case where the type of the data is numerical value, the numerical value allowed band and numerical value for obtaining the data report an error threshold Value;
Judge the data whether in the numerical value allowed band;
If the data in the numerical value allowed band, do not report an error, and obtain the data source in preset period of time Numerical value reports an error number;
Judge whether the numerical value number that reports an error is less than the numerical value and reports an error threshold value;
If the numerical value reports an error, number is less than the numerical value and reports an error threshold value, transfers the alarm task of last generation, and upper one In the case that the alarm task of secondary generation is abnormal alarm, abnormal restoring alarm task is generated;
If the numerical value reports an error, number reports an error threshold value not less than the numerical value, generates abnormal alarm task.
5. the method according to claim 1, wherein the preset alarm mode, including:SMS alarm, mail One of alarm and interface alarm are a variety of.
6. the method according to claim 1, wherein described access the data according to the data access After source, further include:
Data collection list is written into data in the data source.
7. the method according to claim 1, wherein described generate the data according to the data analysis rule Alarm task after, further include:
Alarm task list is written into the alarm task.
8. the method according to claim 1, wherein it is described according to preset alarm mode push warning message it Afterwards, further include:
Alarming result table is written into the push result of the warning message and the warning message.
9. a kind of data monitoring device, which is characterized in that including:Data access module, task generation module and alarm push mould Block;
The data access module determines data access for the type according to data source, and according to the data access Mode accesses the data source;
The task generation module, for determining data analysis rule according to the type of data in the data source, and according to institute State the alarm task that data analysis rule generates the data;
The alarm pushing module, for pushing the warning message of the alarm task according to preset alarm mode.
10. device according to claim 9, which is characterized in that the data access module is specifically used for:
Determine the type of the data source;If the type of the data source is database table, by the data access of the data source Mode is determined as database connection;If the type of the data source is interface, the data access of the data source is determined For hypertext transfer protocol;If the type of the data source is Internet protocol address port, the data of the data source are connect Enter mode and is determined as Telnet.
CN201810550230.3A 2018-05-31 2018-05-31 A kind of data monitoring method and device Pending CN108829568A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810550230.3A CN108829568A (en) 2018-05-31 2018-05-31 A kind of data monitoring method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810550230.3A CN108829568A (en) 2018-05-31 2018-05-31 A kind of data monitoring method and device

Publications (1)

Publication Number Publication Date
CN108829568A true CN108829568A (en) 2018-11-16

Family

ID=64146992

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810550230.3A Pending CN108829568A (en) 2018-05-31 2018-05-31 A kind of data monitoring method and device

Country Status (1)

Country Link
CN (1) CN108829568A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110718295A (en) * 2019-09-06 2020-01-21 广东宝莱特医用科技股份有限公司 Alarm management method and system of blood purification equipment
CN111861662A (en) * 2020-07-17 2020-10-30 上海聚音信息科技有限公司 Order push-back and inventory management method, device and computer readable storage medium
CN113641557A (en) * 2021-08-30 2021-11-12 平安证券股份有限公司 Data monitoring processing method, device, equipment and storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120191440A1 (en) * 2011-01-25 2012-07-26 Power Analytics Corporation Systems and methods for real-time dc microgrid power analytics for mission-critical power systems
CN106815115A (en) * 2017-01-13 2017-06-09 郑州云海信息技术有限公司 A kind of operation condition of server monitoring system
CN107491375A (en) * 2017-08-18 2017-12-19 国网山东省电力公司信息通信公司 Equipment detection and fault early warning system and method under a kind of cloud computing environment
CN107945086A (en) * 2017-11-17 2018-04-20 广州葵翼信息科技有限公司 A kind of big data resource management system applied to smart city
CN108092849A (en) * 2017-12-06 2018-05-29 链家网(北京)科技有限公司 Business datum monitoring method, apparatus and system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120191440A1 (en) * 2011-01-25 2012-07-26 Power Analytics Corporation Systems and methods for real-time dc microgrid power analytics for mission-critical power systems
CN106815115A (en) * 2017-01-13 2017-06-09 郑州云海信息技术有限公司 A kind of operation condition of server monitoring system
CN107491375A (en) * 2017-08-18 2017-12-19 国网山东省电力公司信息通信公司 Equipment detection and fault early warning system and method under a kind of cloud computing environment
CN107945086A (en) * 2017-11-17 2018-04-20 广州葵翼信息科技有限公司 A kind of big data resource management system applied to smart city
CN108092849A (en) * 2017-12-06 2018-05-29 链家网(北京)科技有限公司 Business datum monitoring method, apparatus and system

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110718295A (en) * 2019-09-06 2020-01-21 广东宝莱特医用科技股份有限公司 Alarm management method and system of blood purification equipment
CN111861662A (en) * 2020-07-17 2020-10-30 上海聚音信息科技有限公司 Order push-back and inventory management method, device and computer readable storage medium
CN111861662B (en) * 2020-07-17 2021-08-17 上海聚音信息科技有限公司 Order push-back and inventory management method, device and computer readable storage medium
CN113641557A (en) * 2021-08-30 2021-11-12 平安证券股份有限公司 Data monitoring processing method, device, equipment and storage medium

Similar Documents

Publication Publication Date Title
US11792291B1 (en) Proxying hypertext transfer protocol (HTTP) requests for microservices
CN111522922B (en) Log information query method and device, storage medium and computer equipment
US10585908B2 (en) Method and system for parameterizing log file location assignments for a log analytics system
US11803548B1 (en) Automated generation of metrics from log data
CN101345751B (en) Identifying application user as source of database activity
US20100088197A1 (en) Systems and methods for generating remote system inventory capable of differential update reports
US11362912B2 (en) Support ticket platform for improving network infrastructures
CN108829568A (en) A kind of data monitoring method and device
CN108958959B (en) Method and device for detecting hive data table
CN104935601B (en) Web log file safety analytical method based on cloud, apparatus and system
US10986020B2 (en) Reconstructing message flows based on hash values
Jeong et al. An IoT platform for civil infrastructure monitoring
CN111404937B (en) Method and device for detecting server vulnerability
US10826965B2 (en) Network monitoring to identify network issues
CN112000992A (en) Data leakage prevention protection method and device, computer readable medium and electronic equipment
US11676345B1 (en) Automated adaptive workflows in an extended reality environment
CN105607983B (en) Data exception monitoring method and device
Chattopadhyay et al. Web based RFID asset management solution established on cloud services
CN116208579A (en) Information pushing method, device, equipment and storage medium
CN115277355A (en) Method, device, equipment and medium for processing state code data of monitoring system
CN112291264B (en) Security control method, device, server and storage medium
US11544343B1 (en) Codeless anchor generation for detectable features in an environment
CN113590234A (en) Method, device and equipment for automatically acquiring data and storage medium
CN109412861B (en) Method for establishing security association display of terminal network
CN103297761B (en) Monitoring method and system for video analysis

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20181116