CN109714230B - Flow monitoring method and device and computing equipment - Google Patents

Flow monitoring method and device and computing equipment Download PDF

Info

Publication number
CN109714230B
CN109714230B CN201811647440.0A CN201811647440A CN109714230B CN 109714230 B CN109714230 B CN 109714230B CN 201811647440 A CN201811647440 A CN 201811647440A CN 109714230 B CN109714230 B CN 109714230B
Authority
CN
China
Prior art keywords
switch
detected
port
terminal
identifier
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201811647440.0A
Other languages
Chinese (zh)
Other versions
CN109714230A (en
Inventor
朱文进
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
21VIANET GROUP Inc
Original Assignee
21VIANET GROUP Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 21VIANET GROUP Inc filed Critical 21VIANET GROUP Inc
Priority to CN201811647440.0A priority Critical patent/CN109714230B/en
Publication of CN109714230A publication Critical patent/CN109714230A/en
Application granted granted Critical
Publication of CN109714230B publication Critical patent/CN109714230B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The application provides a traffic monitoring method, a traffic monitoring device and computing equipment, which are used for monitoring traffic of a switch port connected with a server and relate to the technical field of internet communication. The method comprises the steps that flow information of a port to be detected of a switch is detected in real time aiming at the port to be detected of the switch, wherein the flow information comprises a port identification to be detected of the switch and a data transmission speed of the port to be detected of the switch; if the fact that the flow of the port to be detected of the switch is abnormal is determined according to the data transmission speed of the port to be detected of the switch, searching a first terminal identification corresponding to the port identification to be detected of the switch; and sending an alarm to the first terminal corresponding to the first terminal identification. Therefore, when the switch is detected to detect the abnormal flow of the port to be detected, the terminal of the manager connected with the server of the port to be detected of the switch can be notified at the first time, so that the manager can maintain the server as fast as possible, and the loss is reduced.

Description

Flow monitoring method and device and computing equipment
Technical Field
The present application relates to the field of internet communication technologies, and in particular, to a method and an apparatus for monitoring traffic and a computing device.
Background
An internet Data center idc (internet Data center) is an all-round service for enterprises and governments in terms of server hosting, renting, related value adding and the like, wherein a telecommunication department establishes a standardized telecommunication professional computer room environment by utilizing the existing internet communication lines and bandwidth resources. The IDC forms a part of network basic resources, and provides a high-end data transmission and high-speed access service.
At present, in an IDC machine room, an operator and customer service have a single communication mode, and the operator cannot know that a server is abnormal at the first time. In addition, customer service personnel cannot know that the server of the operator is abnormal in the first time, so that the abnormal elimination period is long and the efficiency is low.
Disclosure of Invention
In order to monitor the traffic of a switch port connected with a server, the application provides a traffic monitoring method, a traffic monitoring device and computing equipment.
In a first aspect, the present application provides a traffic monitoring method, in which traffic information of a port to be detected of a switch is detected in real time for the port to be detected of the switch, where the traffic information includes an identifier of the port to be detected of the switch and a data transmission speed of the port to be detected of the switch;
if the fact that the flow of the port to be detected of the switch is abnormal is determined according to the data transmission speed of the port to be detected of the switch, searching a first terminal identification corresponding to the port identification to be detected of the switch;
and sending an alarm to a first terminal corresponding to the first terminal identification, wherein the first terminal is a terminal of a manager of the server connected with the port to be detected of the switch.
In a second aspect, the present application provides a flow monitoring device, comprising:
the detection module is used for detecting the flow information of the port to be detected of the switch in real time aiming at the port to be detected of the switch, wherein the flow information comprises the identifier of the port to be detected of the switch and the data transmission speed of the port to be detected of the switch;
the searching module is used for searching a first terminal identifier corresponding to the port identifier to be detected of the switch if the fact that the flow of the port to be detected of the switch is abnormal is determined according to the data transmission speed of the port to be detected of the switch;
and the sending module is used for sending an alarm to a first terminal corresponding to the first terminal identification, wherein the first terminal is a terminal of a manager of the server connected with the port to be detected of the switch.
Another embodiment of the present application also provides a computing device comprising at least one processor; and a memory communicatively coupled to the at least one processor; the memory stores instructions executable by the at least one processor, and the instructions are executed by the at least one processor to enable the at least one processor to execute any of the traffic monitoring methods provided by the embodiments of the present application.
Another embodiment of the present application further provides a computer storage medium, where the computer storage medium stores computer-executable instructions, and the computer-executable instructions are configured to cause a computer to execute any of the flow monitoring methods in the embodiments of the present application.
According to the traffic monitoring method, the traffic monitoring device and the computing equipment, when the traffic abnormality of the port to be detected of the switch is detected, the terminal of the manager connected with the server to be detected of the switch can be notified at the first time, so that the manager can maintain the server as fast as possible, and loss is reduced.
Additional features and advantages of the application will be set forth in the description which follows, and in part will be obvious from the description, or may be learned by the practice of the application. The objectives and other advantages of the application may be realized and attained by the structure particularly pointed out in the written description and claims hereof as well as the appended drawings.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings needed to be used in the embodiments of the present invention will be briefly described below, and it is obvious that the drawings described below are only some embodiments of the present invention, and it is obvious for those skilled in the art that other drawings can be obtained according to the drawings without creative efforts.
Fig. 1 is a schematic view of an application scenario for completing flow monitoring according to an embodiment of the present application;
fig. 2 is a flowchart of a flow monitoring method according to an embodiment of the present application;
fig. 3 is a schematic diagram of another application scenario for completing traffic monitoring according to an embodiment of the present application;
fig. 4 is a flowchart of another traffic monitoring method provided in the embodiment of the present application;
fig. 5 is a flow monitoring device according to an embodiment of the present disclosure;
fig. 6 is a schematic structural diagram of a computing device according to an embodiment of the present application.
Detailed Description
In order to perform traffic monitoring on a port where a server is connected with a switch, embodiments of the present application provide a traffic monitoring method, an apparatus, and a computing device. For further understanding of the scheme provided in the embodiments of the present application, the following description is given of the basic principle of the scheme:
in the prior art, in the IDC machine room, the communication mode between an operator and customer service is single, so that the operator cannot know that the server is abnormal at the first time. In view of this, an embodiment of the present application provides a traffic monitoring method, in which traffic information of a port to be detected of a switch is detected in real time for the port to be detected of the switch, where the traffic information includes a port identifier to be detected of the switch and a data transmission speed of the port to be detected of the switch; if the fact that the flow of the port to be detected of the switch is abnormal is determined according to the data transmission speed of the port to be detected of the switch, searching a first terminal identification corresponding to the port identification to be detected of the switch; and sending an alarm to a first terminal corresponding to the first terminal identification, wherein the first terminal is a terminal of a manager of the server connected with the port to be detected of the switch.
By the method, when the flow abnormity of the port to be detected of the switch is detected, the operator corresponding to the server connected with the port to be detected can be notified at the first time, so that the operator can maintain the server as fast as possible, the efficiency of removing the flow abnormity is improved, and the loss of the operator is reduced.
Fig. 1 is a schematic view of an application scenario in which traffic monitoring is completed according to an embodiment of the present application. The scene comprises the following steps: the system comprises a switch 01, a server 11 connected with a port 10 to be detected by the switch, a traffic monitoring server 02 and a first terminal 03. The flow monitoring server 02 detects the flow information of the port to be detected 10 of the switch in real time, wherein the flow information comprises the port identification to be detected of the switch and the data transmission speed of the port to be detected 10 of the switch. And if the flow abnormity of the port to be detected of the switch is determined according to the data transmission speed of the port to be detected 10 of the switch, searching a first terminal identification corresponding to the port identification to be detected of the switch. The traffic monitoring server 02 sends an alarm to the first terminal 03 corresponding to the first terminal identifier, where the first terminal 03 is a terminal of a manager of the server 11.
The first terminal identifier may be a mailbox, a mobile phone number, and the like. The first terminal 11 may be a mobile phone, a tablet computer, a notebook computer, a personal computer, or the like.
A flow monitoring method provided in an embodiment of the present application is further described below with reference to the accompanying drawings.
Fig. 2 is a flowchart of a flow monitoring method according to an embodiment of the present application. The process comprises the following steps:
step 201: and detecting the flow information of the port to be detected of the switch in real time aiming at the port to be detected of the switch, wherein the flow information comprises the identification of the port to be detected of the switch and the data transmission speed of the port to be detected of the switch.
Step 202: and if the flow abnormity of the port to be detected of the switch is determined according to the data transmission speed of the port to be detected of the switch, searching a first terminal identification corresponding to the port identification to be detected of the switch.
Step 203: and sending an alarm to a first terminal corresponding to the first terminal identification, wherein the first terminal is a terminal of a manager of the server connected with the port to be detected of the switch.
Specifically, a plurality of switches can be detected in real time to detect the ports to be detected, and the ports to be detected of the switches are the ports where the servers are connected with the switches. Therefore, when the switch is detected to detect that the flow of the port to be detected of the switch is abnormal, the terminal of the manager connected with the server of the port to be detected of the switch can be notified at the first time, so that the manager can maintain the server as fast as possible, and loss is reduced.
Fig. 3 is a schematic view of an application scenario in which traffic monitoring is completed by the scheme provided in the present application. The scene comprises a switch 01, a server A connected with a port 001 to be detected of the switch, a server B connected with a port 002 to be detected of the switch, a terminal 1 of a manager of the server A, a manager terminal 2 of the server B and a flow monitoring server 02. The traffic monitoring server 02 detects traffic information of 001 and 002 in real time. And determining that the 001 has abnormal flow according to the data transmission speed of 001, and determining that 002 has no abnormality according to the data transmission speed of 002. The traffic monitoring server 02 sends an alarm to the terminal 1.
Therefore, managers of the server can know that the flow abnormality occurs to the switch port of the server in the first time, so that the managers can maintain the server in the first time, and the loss is reduced.
In a possible implementation manner, it is determined that a port to be detected of the switch has a traffic anomaly by the following method: and determining whether the data transmission speed of the port to be detected of the switch exceeds a first preset threshold value. If the flow rate exceeds a first preset threshold value, determining that the flow rate of the port to be detected of the switch is abnormal; and if the flow rate does not exceed the first preset threshold value, determining that the flow rate abnormality does not occur to the port to be detected of the switch.
Sending an alarm to the first terminal corresponding to the first terminal identifier, specifically including: and sending a first alarm to a first terminal corresponding to the first terminal identifier, wherein the first alarm indicates that the data transmission speed of the port to be detected of the switch approaches to the upper limit of the bandwidth.
Specifically, the first preset threshold is set according to the upper limit of the bandwidth. For example, the bandwidth cap is 100M/s, the first preset threshold may be set to 80% (80M/s) or 85% (85M/s) of the bandwidth cap. And if the data transmission speed of the port to be detected of the switch exceeds 80M/s (a first preset threshold), sending a first alarm (indicating that the data transmission speed of the port to be detected of the switch approaches to the upper limit of the bandwidth) to the first terminal corresponding to the first terminal identifier. When the data transmission speed of a switch port approaches the upper bandwidth limit, the normal operation of a server connected to the switch port is affected. Therefore, by the method, the manager of the server can maintain the server as fast as possible so as to ensure the normal operation of the server and reduce the loss.
When detecting that the data transmission speed of the port to be detected of the switch exceeds a first preset threshold value, after determining that the flow of the port to be detected of the switch is abnormal, the method further comprises the following steps: and increasing the upper limit of the bandwidth of the port to be detected of the switch. Therefore, the bandwidth upper limit of the switch port with abnormal flow is increased, the normal operation of the server connected with the switch port can be ensured, and the server breakdown is avoided.
After the bandwidth upper limit of the port to be detected of the switch is increased, the method further comprises the following steps: if the data transmission speed of the port to be detected of the switch is determined to exceed a second preset threshold value, searching a second terminal identification corresponding to the port identification to be detected of the switch; sending a second alarm to a second terminal corresponding to the second terminal identifier; the second alarm indicates that a server connected with the port to be detected of the switch needs to be maintained, and the second terminal is a terminal of a technician who provides technical service for a content operator of the server.
In specific implementation, the second preset threshold is set according to the upper limit of the bandwidth. For example, the second preset threshold may be set to 90% (90M/s) or 95% (95M/s) of the upper bandwidth limit at 100M/s. When the data transmission speed of the port to be detected of the switch reaches 90% or 95% of the upper limit of the bandwidth, the server connected with the port of the switch is likely to crash, so that when the data transmission speed of the port to be detected of the switch is determined to exceed the second preset threshold, a terminal of a technician providing technical service for a content operator of the server is timely notified, abnormality is eliminated, and loss is reduced.
Fig. 4 is a flowchart of a flow monitoring method provided in the embodiment of the present application. The process comprises the following steps:
step 401: and detecting the flow information of the port to be detected of the switch in real time, wherein the flow information comprises the identifier of the port to be detected of the switch and the data transmission speed of the port to be detected of the switch.
Step 402: and determining whether the data transmission speed of the port to be detected of the switch exceeds a first preset threshold value and whether the data transmission speed exceeds a second preset threshold value. If the data transmission speed does not exceed the first preset threshold, step 406 is executed, if the first preset threshold is not greater than the data transmission speed and is less than the second preset threshold, step 403 is executed, and if the data transmission speed is not greater than the second preset threshold, step 405 is executed.
Step 403: and sending a first alarm to a first terminal corresponding to the first terminal identifier, wherein the first alarm indicates that the data transmission speed of the port to be detected of the switch approaches to the upper limit of the bandwidth.
Step 404: and increasing the upper limit of the bandwidth of the port to be detected of the switch.
Step 405: and increasing the upper limit of the bandwidth of the port to be detected of the switch, and sending a second alarm to a second terminal corresponding to the second terminal identifier.
Step 406: and determining that the flow abnormality does not occur to the port to be detected of the switch.
By the method, when the flow abnormity of the port to be detected of the switch is detected, a manager of the server connected with the port to be detected of the switch and a technician providing service for a content operator of the server are notified to maintain the server, so that the period of flow abnormity elimination is shortened, and the efficiency of flow abnormity elimination is improved.
In order to improve the experience of the operator, after receiving the alarm, the method may contact a customer service person, and after sending the first alarm to the first terminal corresponding to the first terminal identifier, further include: and sending the second terminal identification to the first terminal.
Therefore, the manager of the operator can know the mobile phone number or the mailbox of the corresponding technical personnel providing the high-tech service, so that the technical personnel can be contacted to provide the technical service, and the abnormal flow is eliminated.
In order to further monitor the traffic abnormality of the port to be detected of the switch, the method further comprises the following steps:
if the absolute value of the difference value between the data transmission speed of the port to be detected of the switch at the current time and the data transmission speed of the time point at the preset time from the current time exceeds a third preset threshold value, generating a third alarm indicating that the server is possibly abnormal or the link between the server and the switch is possibly abnormal; and sending the generated third alarm to the first terminal corresponding to the first terminal identifier.
In specific implementation, the third preset threshold is set according to the situation. For example, 30M/s, 40M/s or 50M/s may be set. Or, if the data transmission speed of the port to be detected at the current time of the switch is a specified multiple, for example, 2 times, 4 times, of the data transmission speed of the time point at the preset time from the current time. For example, when the data transmission speed of the port to be detected of the switch at the current time is 20M/s, and the data transmission speed of the time point at the preset time from the current time is 80M/s, a third alarm indicating that the server connected to the port to be detected of the switch is definitely abnormal or the link between the server and the switch is abnormal is generated. Specifically, when the data transmission speed of the port to be detected of the switch suddenly increases within a certain time, the server connected to the port to be detected of the switch may be attacked, and when the data transmission speed of the port to be detected of the switch suddenly decreases within a certain time, the server may have a problem of being unable to access.
By the method, when the data transmission speed of the port to be detected of the switch is detected to be suddenly changed, the manager of the server connected with the port to be detected of the switch is timely notified, so that the manager can timely eliminate the abnormality, the period for eliminating the abnormality is prolonged, and the loss is reduced.
In a possible implementation manner, a relation table of port identification to be detected of the switch and the first terminal identification is stored in advance; searching for the first terminal identifier corresponding to the port identifier to be detected of the switch specifically includes: and searching a first terminal identification corresponding to the port identification to be detected of the switch in the prestored relation table of the port identification to be detected of the switch and the first terminal identification.
Therefore, when the switch detects that the flow of the port to be detected is abnormal, the manager of the server connected with the port to be detected of the switch can be informed in time, so that the manager can eliminate the abnormality.
In order to enable a content operator of a server to contact a technician providing technical service for the server, in the method, an association relationship between a second terminal identifier and a port identifier to be detected of the switch is established, wherein the second terminal identifier can be associated with at least one port identifier to be detected of the switch; searching for the second terminal identifier corresponding to the port identifier to be detected of the switch specifically includes: and searching for the second terminal identifier corresponding to the port identifier to be detected of the switch in the incidence relation between the second terminal identifier and the port identifier to be detected of the switch.
In specific implementation, a technician logs in the traffic monitoring platform according to the account and the password, and can select at least one switch to-be-detected port identifier associated with the second terminal identifier from the switch to-be-detected port identifiers.
By the method, the port identification to be detected of each switch corresponds to the second terminal identification, so that an operator can find technical personnel providing technical service for the switch, and when the switch is abnormal, the operator can contact the technical personnel to remove the abnormality, so that the experience is improved, and the loss is reduced.
Based on the same inventive concept, the embodiment of the application provides a flow monitoring device. Fig. 5 is a schematic view of a flow monitoring device in an embodiment of the present application. The device includes:
the detecting module 501 is configured to detect, in real time, traffic information of a port to be detected of a switch, where the traffic information includes an identifier of the port to be detected of the switch and a data transmission speed of the port to be detected of the switch.
The searching module 502 is configured to search for a first terminal identifier corresponding to a port identifier to be detected of the switch if it is determined that the port to be detected of the switch has abnormal traffic according to the data transmission speed of the port to be detected of the switch.
A sending module 503, configured to send an alarm to a first terminal corresponding to the first terminal identifier, where the first terminal is a terminal of a manager of a server connected to the port to be detected of the switch.
Further, the searching module 502 specifically includes:
the first determining unit is used for determining whether the data transmission speed of the port to be detected of the switch exceeds a first preset threshold value or not;
the second determining unit is used for determining that the flow of the port to be detected of the switch is abnormal if the first preset threshold value is exceeded;
a third determining unit, configured to determine that no traffic abnormality occurs in the port to be detected of the switch if the traffic abnormality does not exceed the first preset threshold;
the sending module 503 specifically includes: and the sending unit is used for sending a first alarm to the first terminal corresponding to the first terminal identifier, wherein the first alarm indicates that the data transmission speed of the port to be detected of the switch approaches to the upper limit of the bandwidth.
Further, the increasing module is configured to increase the upper limit of the bandwidth of the port to be detected of the switch after the finding module 502 determines that the port to be detected of the switch has abnormal traffic.
Further, the second searching module is configured to search for a second terminal identifier corresponding to the identifier of the port to be detected of the switch if it is determined that the data transmission speed of the port to be detected of the switch exceeds a second preset threshold value after the bandwidth upper limit of the port to be detected of the switch is increased by the increasing module;
the second sending module is used for sending a second alarm to a second terminal corresponding to the second terminal identifier; the second alarm indicates that a server connected with the port to be detected of the switch needs to be maintained, and the second terminal is a terminal of a technician who provides technical service for a content operator of the server.
Further, the third sending module is configured to send the second terminal identifier to the first terminal after the sending module 503 sends the alarm to the first terminal corresponding to the first terminal identifier.
Further, the apparatus further comprises:
the generating module is used for generating a third alarm indicating that the server is possibly abnormal or a link between the server and the switch is possibly abnormal if the absolute value of the difference value between the data transmission speed of the port to be detected of the switch at the current time and the data transmission speed of the time point at the preset time away from the current time exceeds a third preset threshold value;
and the fourth sending module is used for sending the generated third alarm to the first terminal corresponding to the first terminal identifier.
Optionally, the apparatus further comprises:
the storage module is used for pre-storing a relation table between the port identification to be detected of the switch and the first terminal identification;
the searching module 502 specifically includes:
and the searching unit is used for searching the first terminal identification corresponding to the port identification to be detected of the switch in the prestored relation table of the port identification to be detected of the switch and the first terminal identification.
Further, the apparatus further comprises:
the establishing module is used for establishing an incidence relation between the second terminal identifier and the port identifier to be detected of the switch, wherein the second terminal identifier can be associated with at least one port identifier to be detected of the switch;
the searching module 502 specifically includes:
and the second searching unit is used for searching the second terminal identifier corresponding to the port identifier to be detected of the switch in the incidence relation between the second terminal identifier and the port identifier to be detected of the switch.
Having described the traffic monitoring method and apparatus of an exemplary embodiment of the present application, a computing device according to another exemplary embodiment of the present application is next described.
As will be appreciated by one skilled in the art, aspects of the present application may be embodied as a system, method or program product. Accordingly, various aspects of the present application may be embodied in the form of: an entirely hardware embodiment, an entirely software embodiment (including firmware, microcode, etc.) or an embodiment combining hardware and software aspects that may all generally be referred to herein as a "circuit," module "or" system.
In some possible implementations, a computing device according to the present application may include at least one processor, and at least one memory. The memory has stored therein program code which, when executed by the processor, causes the processor to perform the steps of the flow monitoring method according to various exemplary embodiments of the present application described above in the present specification. For example, the processor may perform step 201 as shown in FIG. 2 along with step 203 or step 401 as shown in FIG. 4 along with step 406.
The computing device 130 according to this embodiment of the present application is described below with reference to fig. 6. The computing device 130 shown in fig. 6 is only an example and should not bring any limitations to the functionality or scope of use of the embodiments of the present application.
As shown in fig. 6, computing device 130 is embodied in the form of a general purpose computing device. Components of computing device 130 may include, but are not limited to: the at least one processor 131, the at least one memory 132, and a bus 133 that connects the various system components (including the memory 132 and the processor 131).
Bus 133 represents one or more of any of several types of bus structures, including a memory bus or memory controller, a peripheral bus, a processor, or a local bus using any of a variety of bus architectures.
The memory 132 may include readable media in the form of volatile memory, such as Random Access Memory (RAM)1321 and/or cache memory 1322, and may further include Read Only Memory (ROM) 1323.
Memory 132 may also include a program/utility 1325 having a set (at least one) of program modules 1324, such program modules 1324 including, but not limited to: an operating system, one or more application programs, other program modules, and program data, each of which, or some combination thereof, may comprise an implementation of a network environment.
Computing device 130 may also communicate with one or more external devices 134 (e.g., keyboard, pointing device, etc.), with one or more devices that enable a user to interact with computing device 130, and/or with any devices (e.g., router, modem, etc.) that enable computing device 130 to communicate with one or more other computing devices. Such communication may occur via input/output (I/O) interfaces 135. Also, computing device 130 may communicate with one or more networks (e.g., a Local Area Network (LAN), a Wide Area Network (WAN), and/or a public network, such as the internet) via network adapter 136. As shown, network adapter 136 communicates with other modules for computing device 130 over bus 133. It should be understood that although not shown in the figures, other hardware and/or software modules may be used in conjunction with computing device 130, including but not limited to: microcode, device drivers, redundant processors, external disk drive arrays, RAID systems, tape drives, and data backup storage systems, among others.
In some possible embodiments, the various aspects of the traffic monitoring method provided in this application may also be implemented in the form of a program product, which includes program code for causing a computer device to perform the steps in the traffic monitoring method according to various exemplary embodiments of this application described above in this specification when the program product is run on the computer device, for example, the computer device may perform the steps 201 and 203 shown in fig. 2 or the steps 401 and 406 shown in fig. 4.
The program product may employ any combination of one or more readable media. The readable medium may be a readable signal medium or a readable storage medium. A readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples (a non-exhaustive list) of the readable storage medium include: an electrical connection having one or more wires, a portable disk, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
The program product for flow monitoring of embodiments of the present application may employ a portable compact disk read only memory (CD-ROM) and include program code, and may be run on a computing device. However, the program product of the present application is not limited thereto, and in this document, a readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device.
A readable signal medium may include a propagated data signal with readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated data signal may take any of a variety of forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A readable signal medium may also be any readable medium that is not a readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device.
Program code embodied on a readable medium may be transmitted using any appropriate medium, including but not limited to wireless, wireline, optical fiber cable, RF, etc., or any suitable combination of the foregoing.
Program code for carrying out operations of the present application may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, C + + or the like and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computing device, partly on the user's device, as a stand-alone software package, partly on the user's computing device and partly on a remote computing device, or entirely on the remote computing device or server. In the case of a remote computing device, the remote computing device may be connected to the user computing device over any kind of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or may be connected to an external computing device (e.g., over the internet using an internet service provider).
It should be noted that although several units or sub-units of the apparatus are mentioned in the above detailed description, such division is merely exemplary and not mandatory. Indeed, the features and functions of two or more units described above may be embodied in one unit, according to embodiments of the application. Conversely, the features and functions of one unit described above may be further divided into embodiments by a plurality of units.
Further, while the operations of the methods of the present application are depicted in the drawings in a particular order, this does not require or imply that these operations must be performed in this particular order, or that all of the illustrated operations must be performed, to achieve desirable results. Additionally or alternatively, certain steps may be omitted, multiple steps combined into one step execution, and/or one step broken down into multiple step executions.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
While the preferred embodiments of the present application have been described, additional variations and modifications in those embodiments may occur to those skilled in the art once they learn of the basic inventive concepts. Therefore, it is intended that the appended claims be interpreted as including preferred embodiments and all alterations and modifications as fall within the scope of the application.
It will be apparent to those skilled in the art that various changes and modifications may be made in the present application without departing from the spirit and scope of the application. Thus, if such modifications and variations of the present application fall within the scope of the claims of the present application and their equivalents, the present application is intended to include such modifications and variations as well.

Claims (8)

1. A method of traffic monitoring, the method comprising:
detecting flow information of a port to be detected of a switch in real time aiming at the port to be detected of the switch, wherein the flow information comprises a port identification to be detected of the switch and a data transmission speed of the port to be detected of the switch;
if the flow abnormity of the port to be detected of the switch is determined according to the data transmission speed of the port to be detected of the switch, the method specifically comprises the following steps:
determining whether the data transmission speed of a port to be detected of the switch exceeds a first preset threshold value or not;
if the flow rate exceeds a first preset threshold value, determining that the flow rate of the port to be detected of the switch is abnormal; searching a first terminal identification corresponding to the port identification to be detected of the switch; increasing the upper limit of the bandwidth of the port to be detected of the switch;
if the flow rate does not exceed the first preset threshold value, determining that the flow rate abnormality does not occur to the port to be detected of the switch;
sending an alarm to a first terminal corresponding to the first terminal identifier, where the first terminal is a terminal of a manager of a server connected to a port to be detected of the switch, and the sending of the alarm specifically includes:
and sending a first alarm to a first terminal corresponding to the first terminal identifier, wherein the first alarm indicates that the data transmission speed of the port to be detected of the switch approaches to the upper limit of the bandwidth.
2. The method according to claim 1, wherein after the bandwidth upper limit of the port to be detected by the switch is increased, the method further comprises:
if the data transmission speed of the port to be detected of the switch is determined to exceed a second preset threshold value, searching a second terminal identification corresponding to the port identification to be detected of the switch;
sending a second alarm to a second terminal corresponding to the second terminal identifier;
the second alarm indicates that a server connected with the port to be detected of the switch needs to be maintained, and the second terminal is a terminal of a technician who provides technical service for a content operator of the server.
3. The method of claim 2, wherein after sending the first alarm to the first terminal corresponding to the first terminal identifier, further comprising:
and sending the second terminal identification to the first terminal.
4. The method of claim 1, further comprising:
if the absolute value of the difference value between the data transmission speed of the port to be detected of the switch at the current time and the data transmission speed of the time point at the preset time from the current time exceeds a third preset threshold value, generating a third alarm indicating that the server is possibly abnormal or the link between the server and the switch is possibly abnormal;
and sending the generated third alarm to the first terminal corresponding to the first terminal identifier.
5. The method of claim 1, further comprising:
pre-storing a relation table of port identification to be detected of the switch and a first terminal identification;
searching for the first terminal identifier corresponding to the port identifier to be detected of the switch specifically includes:
and searching a first terminal identification corresponding to the port identification to be detected of the switch in the prestored relation table of the port identification to be detected of the switch and the first terminal identification.
6. The method of claim 2, further comprising:
establishing an association relationship between the second terminal identifier and the port identifier to be detected of the switch, wherein the second terminal identifier can be associated with at least one port identifier to be detected of the switch;
searching for the second terminal identifier corresponding to the port identifier to be detected of the switch specifically includes:
and searching for the second terminal identifier corresponding to the port identifier to be detected of the switch in the incidence relation between the second terminal identifier and the port identifier to be detected of the switch.
7. A flow monitoring device, the device comprising:
the detection module is used for detecting the flow information of the port to be detected of the switch in real time aiming at the port to be detected of the switch, wherein the flow information comprises the identifier of the port to be detected of the switch and the data transmission speed of the port to be detected of the switch;
the searching module is used for searching a first terminal identifier corresponding to the port identifier to be detected of the switch if the fact that the flow of the port to be detected of the switch is abnormal is determined according to the data transmission speed of the port to be detected of the switch; the method specifically comprises the following steps: the first determining unit is used for determining whether the data transmission speed of the port to be detected of the switch exceeds a first preset threshold value or not; the second determining unit is used for determining that the flow of the port to be detected of the switch is abnormal if the first preset threshold value is exceeded; a third determining unit, configured to determine that no traffic abnormality occurs in the port to be detected of the switch if the traffic abnormality does not exceed the first preset threshold;
the heightening module is used for heightening the upper limit of the bandwidth of the port to be detected of the switch after the searching module determines that the port to be detected of the switch has abnormal flow;
the sending module is used for sending an alarm to a first terminal corresponding to the first terminal identification, wherein the first terminal is a terminal of a manager of a server connected with a port to be detected of the switch; the method specifically comprises the following steps:
and the sending unit is used for sending a first alarm to the first terminal corresponding to the first terminal identifier, wherein the first alarm indicates that the data transmission speed of the port to be detected of the switch approaches to the upper limit of the bandwidth.
8. A computing device, comprising: at least one processor; and a memory communicatively coupled to the at least one processor; wherein the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the method of any one of claims 1-6.
CN201811647440.0A 2018-12-29 2018-12-29 Flow monitoring method and device and computing equipment Active CN109714230B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811647440.0A CN109714230B (en) 2018-12-29 2018-12-29 Flow monitoring method and device and computing equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811647440.0A CN109714230B (en) 2018-12-29 2018-12-29 Flow monitoring method and device and computing equipment

Publications (2)

Publication Number Publication Date
CN109714230A CN109714230A (en) 2019-05-03
CN109714230B true CN109714230B (en) 2021-02-02

Family

ID=66260330

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811647440.0A Active CN109714230B (en) 2018-12-29 2018-12-29 Flow monitoring method and device and computing equipment

Country Status (1)

Country Link
CN (1) CN109714230B (en)

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110351117A (en) * 2019-05-24 2019-10-18 上海毅云网络科技有限公司 A kind of server operation management method
CN111106961B (en) * 2019-12-24 2022-11-01 新浪网技术(中国)有限公司 Switch flow abnormity alarm method and device
CN110912839B (en) * 2019-12-24 2021-11-26 北京东土军悦科技有限公司 Main and standby switch detection method, system, terminal and storage medium
CN111200522A (en) * 2019-12-27 2020-05-26 视联动力信息技术股份有限公司 Port detection method, device, equipment and storage medium
CN111756716A (en) * 2020-06-15 2020-10-09 深信服科技股份有限公司 Flow detection method and device and computer readable storage medium
CN114629824B (en) * 2022-03-24 2024-03-19 阿里巴巴(中国)有限公司 Packet loss positioning method, device, computing equipment and medium
CN115277491B (en) * 2022-06-15 2023-06-06 中国联合网络通信集团有限公司 Method and device for determining abnormal data and computer readable storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20030021763A (en) * 2001-09-07 2003-03-15 (주) 엘지텔레콤 method and apparatus for sensing a signal interference of signal transfer exchanger
CN204517837U (en) * 2015-04-22 2015-07-29 深圳市高德信通信股份有限公司 A kind of bandwidth monitor warning system
CN107135127A (en) * 2017-06-26 2017-09-05 福建中金在线信息科技有限公司 A kind of network flow abnormal detecting method and device
WO2018059687A1 (en) * 2016-09-29 2018-04-05 Telefonaktiebolaget Lm Ericsson (Publ) Handling of drop events of traffic flows

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103905219A (en) * 2012-12-24 2014-07-02 上海粱江通信系统股份有限公司 System and method for monitoring and storing communication information in service platform
CN104954184A (en) * 2015-06-15 2015-09-30 四川长虹电器股份有限公司 Monitoring and alarming method and system for cloud background server cluster
CN108243061A (en) * 2017-10-10 2018-07-03 北京车和家信息技术有限公司 Apparatus monitoring method, device and computer equipment based on Nagios

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20030021763A (en) * 2001-09-07 2003-03-15 (주) 엘지텔레콤 method and apparatus for sensing a signal interference of signal transfer exchanger
CN204517837U (en) * 2015-04-22 2015-07-29 深圳市高德信通信股份有限公司 A kind of bandwidth monitor warning system
WO2018059687A1 (en) * 2016-09-29 2018-04-05 Telefonaktiebolaget Lm Ericsson (Publ) Handling of drop events of traffic flows
CN107135127A (en) * 2017-06-26 2017-09-05 福建中金在线信息科技有限公司 A kind of network flow abnormal detecting method and device

Also Published As

Publication number Publication date
CN109714230A (en) 2019-05-03

Similar Documents

Publication Publication Date Title
CN109714230B (en) Flow monitoring method and device and computing equipment
CN107426022B (en) Security event monitoring method and device, electronic equipment and storage medium
EP3340535A1 (en) Failure recovery method and device
CN104022904A (en) Unified management platform for IT devices in distributed computer rooms
CN107332765B (en) Method and apparatus for repairing router failures
EP3575975A1 (en) Method and apparatus for operating smart network interface card
CN110501956B (en) Production test alarm system, server and alarm information acquisition equipment
CN110691398B (en) Network interaction method, system, equipment and storage medium of intelligent equipment
US9872148B2 (en) Adaptive mobile wireless call rescue
CN109167703B (en) Unmanned vehicle data monitoring method, device, equipment and storage medium
CN105210043A (en) Information processing device
CN110896362A (en) Fault detection method and device
CN117041120A (en) Distributed full-link service monitoring system
CN116455725A (en) Network fault alarm method, system, terminal and storage medium
CN113132216B (en) Instant messaging method and device, readable storage medium and electronic equipment
US20180152544A1 (en) Emergency data cutoff for storage systems
CN112994934B (en) Data interaction method, device and system
CN113079055B (en) AGV operation data dynamic acquisition method and device
CN111371586B (en) Log data transmission method, device and equipment
CN113612659A (en) Equipment networking test method and device, electronic equipment and storage medium
CN110888770B (en) Method and device for transmitting information
CN116708135B (en) Network service fault monitoring method and device, electronic equipment and storage medium
CN110852537A (en) Service quality detection method and device
CN217282957U (en) Network security intrusion detection defense device
CN112636955A (en) Stacking double-hanging processing method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant