CN109981338A - Alarm method, device and the storage medium that code pulls - Google Patents

Alarm method, device and the storage medium that code pulls Download PDF

Info

Publication number
CN109981338A
CN109981338A CN201910112905.0A CN201910112905A CN109981338A CN 109981338 A CN109981338 A CN 109981338A CN 201910112905 A CN201910112905 A CN 201910112905A CN 109981338 A CN109981338 A CN 109981338A
Authority
CN
China
Prior art keywords
code
pulls
information
pull
default alarm
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910112905.0A
Other languages
Chinese (zh)
Inventor
段乾
吴峰
郭伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Yidianshikong Network Co Ltd
Original Assignee
Shanghai Yidianshikong Network Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Yidianshikong Network Co Ltd filed Critical Shanghai Yidianshikong Network Co Ltd
Priority to CN201910112905.0A priority Critical patent/CN109981338A/en
Publication of CN109981338A publication Critical patent/CN109981338A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/06Management of faults, events, alarms or notifications
    • H04L41/0631Management of faults, events, alarms or notifications using root cause analysis; using analysis of correlation between notifications, alarms or events based on decision criteria, e.g. hierarchy, tree or time analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/21Monitoring or handling of messages
    • H04L51/224Monitoring or handling of messages providing notification on incoming messages, e.g. pushed notifications of received messages
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/56Unified messaging, e.g. interactions between e-mail, instant messaging or converged IP messaging [CPM]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/145Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms

Abstract

This application discloses a kind of alarm methods that code pulls.The described method includes: the code for receiving user pulls request, acquires and the code for obtaining the user pulls information;Judge that the code pulls whether information meets default alarm regulation;If the code, which pulls information, meets default alarm regulation, issues and alert to designated user;Request is pulled using the code for receiving user, it acquires and the code for obtaining the user pulls the mode of information, pull whether information meets default alarm regulation by judging the code, meet default alarm regulation if having reached the code and having pulled information, the purpose of alarm is then issued to designated user, to realize the technical effect for pulling and being monitored to code, and then solve and lack surveillance and control measure when user pulls code from third-party agent management tool in the related technology, lead to the problem that code safety is lower.

Description

Alarm method, device and the storage medium that code pulls
Technical field
This application involves field of information processing, in particular to a kind of alarm method that code pulls, device and storage Medium.
Background technique
Code management tools in the related technology have VSS, Cc, SVN, Git etc., existing code management tools generally for Family upload code has real time monitoring and corresponding data consolidated statement to show, but such software is downloaded user when pulling code More effective alarm method and data summarization method are not provided, and then leads to any possible permission unauthorized operation or usurps Account, which pulls code operation all, can cause the leakage of code, core resource.
Lack surveillance and control measure when pulling code from third-party agent management tool for user in the related technology, leads to generation The lower problem of code safety, currently no effective solution has been proposed.
Summary of the invention
The main purpose of the application is to provide a kind of alarm method that code pulls, device and storage medium, to solve Lack surveillance and control measure when user pulls code from third-party agent management tool in the related technology, causes code safety lower The problem of.
To achieve the goals above, according to a first aspect of the present application, the embodiment of the present application provides a kind of code and pulls Alarm method, which comprises the code for receiving user pulls request, acquires and the code for obtaining the user pulls letter Breath;Judge that the code pulls whether information meets default alarm regulation;If the code, which pulls information, meets default alarm Rule is then issued to designated user and is alerted.
With reference to first aspect, the embodiment of the present application provides the first possible embodiment of first aspect, wherein institute State the code pull information be pull the time, pull personnel, pull equipment, pull in path and object code at least one Kind.
With reference to first aspect, the embodiment of the present application provides second of possible embodiment of first aspect, wherein institute State that judge that the code pulls information whether to meet default alarm regulation include: to judge that the code pulls in information to pull people The personnel whether member has in the default alarm regulation pull permission.
With reference to first aspect, the embodiment of the present application provides the third possible embodiment of first aspect, wherein institute State that described to judge that the code pulls information whether to meet default alarm regulation include: to judge that the code pulls the drawing in information Whether the time is taken to be in the default alarm regulation allows to execute in the time interval for pulling operation.
With reference to first aspect, the embodiment of the present application provides the 4th kind of possible embodiment of first aspect, wherein institute State that described to judge that the code pulls information whether to meet default alarm regulation include: to judge that the code pulls the drawing in information Whether the IP address of equipment is taken to belong in the default alarm regulation allows to execute the IP address for pulling operation.
With reference to first aspect, the embodiment of the present application provides the 5th kind of possible embodiment of first aspect, wherein institute State that judge that the code pulls information whether to meet default alarm regulation include: to judge that the code pulls in information to pull road Whether diameter, which belongs in the default alarm regulation, allows to execute the code library path for pulling operation.
With reference to first aspect, the embodiment of the present application provides the 6th kind of possible embodiment of first aspect, wherein institute State that judge that the code pulls information whether to meet default alarm regulation include: to judge that the code pulls the target generation in information Whether the type and data volume of code, which belong in the default alarm regulation, allows to execute the type and data volume for pulling operation.
With reference to first aspect, the embodiment of the present application provides the 7th kind of possible embodiment of first aspect, wherein institute State to designated user issue alarm include short massage notice, mail notification, third party's social platform notice and Advise By Wire in extremely Few one kind.
To achieve the goals above, according to a second aspect of the present application, the embodiment of the present application provides a kind of code and pulls Alarm device, comprising: information acquisition unit, the code for receiving user pull request, acquire and obtain the user's Code pulls information;Whether information judging unit, the code for judging that the information acquisition unit collects pull information Meet default alarm regulation;Execution unit is alerted, for when the code pulls information and meets default alarm regulation, Xiang Zhiding User issues alarm.
To achieve the goals above, according to the third aspect of the application, the embodiment of the present application provides a kind of non-transient meter Calculation machine readable storage medium storing program for executing, wherein the non-transient computer readable storage medium stores computer instruction, and the computer refers to Order makes the computer execute the alarm method that code described in any of the above embodiments pulls.
In the embodiment of the present application, request is pulled using the code for receiving user, acquires and obtains the code of the user The mode for pulling information pulls whether information meets default alarm regulation by judging the code, if having reached the generation Code pulls information and meets default alarm regulation, then the purpose of alarm is issued to designated user, thus realize to code pull into The technical effect of row monitoring, and then solve shortage when user pulls code from third-party agent management tool in the related technology Surveillance and control measure leads to the problem that code safety is lower.
Detailed description of the invention
The attached drawing constituted part of this application is used to provide further understanding of the present application, so that the application's is other Feature, objects and advantages become more apparent upon.The illustrative examples attached drawing and its explanation of the application is for explaining the application, not Constitute the improper restriction to the application.In the accompanying drawings:
Fig. 1 is according to a kind of flow chart for the alarm method that code pulls provided by the present application;
Fig. 2 is according to a kind of block diagram representation for the alarm device that code pulls provided by the present application.
Specific embodiment
In order to make those skilled in the art more fully understand application scheme, below in conjunction in the embodiment of the present application Attached drawing, the technical scheme in the embodiment of the application is clearly and completely described, it is clear that described embodiment is only The embodiment of the application a part, instead of all the embodiments.Based on the embodiment in the application, ordinary skill people Member's every other embodiment obtained without making creative work, all should belong to the model of the application protection It encloses.
It should be noted that the description and claims of this application and term " first " in above-mentioned attached drawing, " Two " etc. be to be used to distinguish similar objects, without being used to describe a particular order or precedence order.It should be understood that using in this way Data be interchangeable under appropriate circumstances, so as to embodiments herein described herein.In addition, term " includes " and " tool Have " and their any deformation, it is intended that cover it is non-exclusive include, for example, containing a series of steps or units Process, method, system, product or equipment those of are not necessarily limited to be clearly listed step or unit, but may include without clear Other step or units listing to Chu or intrinsic for these process, methods, product or equipment.
In this application, term " on ", "lower", "left", "right", "front", "rear", "top", "bottom", "inner", "outside", " in ", "vertical", "horizontal", " transverse direction ", the orientation or positional relationship of the instructions such as " longitudinal direction " be orientation based on the figure or Positional relationship.These terms are not intended to limit indicated dress primarily to better describe the application and embodiment Set, element or component must have particular orientation, or constructed and operated with particular orientation.
Also, above-mentioned part term is other than it can be used to indicate that orientation or positional relationship, it is also possible to for indicating it His meaning, such as term " on " also are likely used for indicating certain relations of dependence or connection relationship in some cases.For ability For the those of ordinary skill of domain, the concrete meaning of these terms in this application can be understood as the case may be.
In addition, term " installation ", " setting ", " being equipped with ", " connection ", " connected ", " socket " shall be understood in a broad sense.For example, It may be a fixed connection, be detachably connected or monolithic construction;It can be mechanical connection, or electrical connection;It can be direct phase It even, or indirectly connected through an intermediary, or is two connections internal between device, element or component. For those of ordinary skills, the concrete meaning of above-mentioned term in this application can be understood as the case may be.
It should be noted that in the absence of conflict, the features in the embodiments and the embodiments of the present application can phase Mutually combination.The application is described in detail below with reference to the accompanying drawings and in conjunction with the embodiments.
Consider: code management tools in the related technology have VSS, Cc, SVN, Git etc., and existing code management tools are general There are real time monitoring and corresponding data consolidated statement to show all over for user's upload code, but such software is downloaded user and drawn More effective alarm method and data summarization method are not provided when replacing code, and then lead to any possible permission unauthorized operation Or usurp account and pull code operation all and can cause the leakage of code, core resource, therefore, this application provides a kind of codes Alarm method, device and the storage medium pulled.
As shown in Figure 1, this method includes the following steps, namely S101 to step S103:
Step S101, the code for receiving user pull request, acquire and the code for obtaining the user pulls information;
Preferably, administrator will need monitored item by configuring system configuration, guarantee that configuration has come into force after preservation, correspondence is matched The Database Systems for including but are not limited to be stored in similar to mysql are set, or are stored in file system.
Preferably, code management software is modified, hook (callback) is added in code management software.
Preferably, by the modification to code management tools software, when user pulls code, by existed system Hook (callback) is added to service back the parameters such as the machine IP for pulling code, user name and corresponding code library path It adjusts, obtains code and pull information.
Step S102 judges that the code pulls whether information meets default alarm regulation;
Preferably, the warning information by the configuration of corresponding data and administrator compares, and retains correspondence and pull information Periodically it is aggregated to form report data.
Step S103 is issued to designated user and is alerted if the code pulls information and meets default alarm regulation.
Preferably, if hitting certain rules, alarm is issued by modes such as short message, mail, nail nail, wechats.
It can be seen from the above description that the present invention realizes following technical effect:
In the embodiment of the present application, request is pulled using the code for receiving user, acquires and obtains the code of the user The mode for pulling information pulls whether information meets default alarm regulation by judging the code, if having reached the generation Code pulls information and meets default alarm regulation, then the purpose of alarm is issued to designated user, thus realize to code pull into The technical effect of row monitoring, and then solve shortage when user pulls code from third-party agent management tool in the related technology Surveillance and control measure leads to the problem that code safety is lower.
According to embodiments of the present invention, as preferred in the embodiment of the present application, the code pull information be pull the time, Personnel are pulled, equipment is pulled, pulls at least one of path and object code, in some other embodiment of the application, It can also include the other information that user generates in pulling coding process that the code, which pulls information,.
According to embodiments of the present invention, as preferred in the embodiment of the present application, the judgement code, which pulls information, is The no default alarm regulation of satisfaction includes: to judge that the code pulls in information to pull whether personnel have the default alarm rule Personnel in then pull permission.
According to embodiments of the present invention, as preferred in the embodiment of the present application, the judgement code, which pulls information, is The no default alarm regulation of satisfaction includes: to judge that the code pulls in information to pull whether the time is in the default alarm rule Allow to execute in the time interval for pulling operation in then.
According to embodiments of the present invention, as preferred in the embodiment of the present application, the judgement code, which pulls information, is It is no meet default alarm regulation include: judge the code pull the IP address for pulling equipment in information whether belong to it is described pre- If allowing to execute the IP address for pulling operation in alarm regulation.
According to embodiments of the present invention, as preferred in the embodiment of the present application, the judgement code, which pulls information, is The no default alarm regulation of satisfaction includes: to judge that the code pulls in information to pull whether path belongs to the default alarm rule Allow to execute the code library path for pulling operation in then.
According to embodiments of the present invention, as preferred in the embodiment of the present application, the judgement code, which pulls information, is The no default alarm regulation of satisfaction includes: to judge that the code pulls the type of the object code in information and whether data volume belongs to Allow to execute the type and data volume for pulling operation in the default alarm regulation.
According to embodiments of the present invention, described to issue alarm to designated user and include as preferred in the embodiment of the present application At least one of short massage notice, mail notification, third party's social platform notice and Advise By Wire, in some other of the application In embodiment, the mode of the alarm can also can send the mode of information for other to designated user.
It should be noted that step shown in the flowchart of the accompanying drawings can be in such as a group of computer-executable instructions It is executed in computer system, although also, logical order is shown in flow charts, and it in some cases, can be with not The sequence being same as herein executes shown or described step.
According to embodiments of the present invention, additionally provide it is a kind of for implementing the device of the above method, as shown in Fig. 2, the device It include: information acquisition unit 10, the code for receiving user pulls request, acquires and the code for obtaining the user pulls letter Breath;Information judging unit 20, for judge code that the information acquisition unit collects pull information whether meet it is default Alarm regulation;Execution unit 30 is alerted, for being sent out to designated user when the code pulls information and meets default alarm regulation It alerts out.
Request is pulled according to the code that information acquisition unit 10 described herein is used to receive user, acquires and obtains institute The code for stating user pulls information, it is preferred that by the modification to code management tools software, when user pulls code, leads to Cross machine IP, user name and the corresponding code library path etc. that hook (callback) is added on existed system by code is pulled Parameter carries out service readjustment, obtains code and pulls information.
It is used to judge the code that the information acquisition unit collects according to information judging unit 20 described herein Pull whether information meets default alarm regulation, it is preferred that do the warning information of the configuration of corresponding data and administrator pair Than, and retain and corresponding pull information and be periodically aggregated to form report data.
It is used to meet default alarm regulation when the code pulls information according to alarm execution unit 30 described herein When, it issues and alerts to designated user, it is preferred that if hitting certain rules, sent out by modes such as short message, mail, nail nail, wechats It alerts out.
According to embodiments of the present invention, a kind of non-transient computer readable storage medium is additionally provided, which is characterized in that described Non-transient computer readable storage medium stores computer instruction, and the computer instruction makes the computer execute above-mentioned code The alarm method pulled.
Obviously, those skilled in the art should be understood that each module of the above invention or each step can be with general Computing device realize that they can be concentrated on a single computing device, or be distributed in multiple computing devices and formed Network on, optionally, they can be realized with the program code that computing device can perform, it is thus possible to which they are stored Be performed by computing device in the storage device, perhaps they are fabricated to each integrated circuit modules or by they In multiple modules or step be fabricated to single integrated circuit module to realize.In this way, the present invention is not limited to any specific Hardware and software combines.
The foregoing is merely preferred embodiment of the present application, are not intended to limit this application, for the skill of this field For art personnel, various changes and changes are possible in this application.Within the spirit and principles of this application, made any to repair Change, equivalent replacement, improvement etc., should be included within the scope of protection of this application.

Claims (10)

1. a kind of alarm method that code pulls, which is characterized in that the described method includes:
The code for receiving user pulls request, acquires and the code for obtaining the user pulls information;
Judge that the code pulls whether information meets default alarm regulation;And
If the code, which pulls information, meets default alarm regulation, issues and alert to designated user.
2. the alarm method that code according to claim 1 pulls, which is characterized in that it is to pull that the code, which pulls information, Time pulls personnel, pulls equipment, pulls at least one of path and object code.
3. the alarm method that code according to claim 2 pulls, which is characterized in that the judgement code pulls letter Whether breath, which meets default alarm regulation, includes:
Judge that the code pulls the personnel whether personnel have in the default alarm regulation that pull in information and pulls permission.
4. the alarm method that code according to claim 2 pulls, which is characterized in that the judgement code pulls letter Whether breath, which meets default alarm regulation, includes:
Judge the code pull in information pull the time whether be in the default alarm regulation allow execute pull In the time interval of operation.
5. the alarm method that code according to claim 2 pulls, which is characterized in that the judgement code pulls letter Whether breath, which meets default alarm regulation, includes:
Judge that the code pulls the permission whether IP address for pulling equipment in information belongs in the default alarm regulation Execute the IP address for pulling operation.
6. the alarm method that code according to claim 2 pulls, which is characterized in that the judgement code pulls letter Whether breath, which meets default alarm regulation, includes:
Judge the code pull in information pull path whether belong in the default alarm regulation allow execute pull The code library path of operation.
7. the alarm method that code according to claim 2 pulls, which is characterized in that the judgement code pulls letter Whether breath, which meets default alarm regulation, includes:
Judge that the code pulls the type of the object code in information and whether data volume belongs in the default alarm regulation Allow to execute and pull the type and data volume of operation.
8. the alarm method that code according to claim 1 pulls, which is characterized in that described issue to designated user alerts Including at least one of short massage notice, mail notification, third party's social platform notice and Advise By Wire.
9. a kind of alarm device that code pulls characterized by comprising
Information acquisition unit, the code for receiving user pull request, acquire and the code for obtaining the user pulls information;
Information judging unit, for judging that the code that the information acquisition unit collects pulls whether information meets default announcement Police regulations are then;
Execution unit is alerted, for issuing and alerting to designated user when the code pulls information and meets default alarm regulation.
10. a kind of non-transient computer readable storage medium, which is characterized in that the non-transient computer readable storage medium is deposited Computer instruction is stored up, the computer instruction pulls code described in any one of described computer perform claim requirement 1 to 8 Alarm method.
CN201910112905.0A 2019-02-13 2019-02-13 Alarm method, device and the storage medium that code pulls Pending CN109981338A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910112905.0A CN109981338A (en) 2019-02-13 2019-02-13 Alarm method, device and the storage medium that code pulls

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910112905.0A CN109981338A (en) 2019-02-13 2019-02-13 Alarm method, device and the storage medium that code pulls

Publications (1)

Publication Number Publication Date
CN109981338A true CN109981338A (en) 2019-07-05

Family

ID=67076877

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910112905.0A Pending CN109981338A (en) 2019-02-13 2019-02-13 Alarm method, device and the storage medium that code pulls

Country Status (1)

Country Link
CN (1) CN109981338A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110532018A (en) * 2019-08-27 2019-12-03 上海易点时空网络有限公司 Code submits method and device
CN111343005A (en) * 2020-02-11 2020-06-26 杭州涂鸦信息技术有限公司 Method and system for quickly taking local automatic configuration into effect

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1956449A (en) * 2005-10-28 2007-05-02 北京书生数字技术有限公司 Encipher transmission method and equipment system for preventing cpying data resource
CN101841411A (en) * 2005-10-28 2010-09-22 北京书生数字技术有限公司 Data resource anti-copying encrypted transmission method and device system
CN105122255A (en) * 2012-12-17 2015-12-02 微软技术许可有限责任公司 Management system for point of care testing
CN106067881A (en) * 2016-06-24 2016-11-02 泰康保险集团股份有限公司 Data Access Security control method based on OS/400, Apparatus and system
CN106951801A (en) * 2017-04-12 2017-07-14 中国民生银行股份有限公司 The processing method and processing device of external data
CN107426182A (en) * 2017-06-21 2017-12-01 郑州云海信息技术有限公司 The access control method and system of a kind of storage management system
CN107480551A (en) * 2017-07-06 2017-12-15 网易(杭州)网络有限公司 A kind of file management method and device

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1956449A (en) * 2005-10-28 2007-05-02 北京书生数字技术有限公司 Encipher transmission method and equipment system for preventing cpying data resource
CN101841411A (en) * 2005-10-28 2010-09-22 北京书生数字技术有限公司 Data resource anti-copying encrypted transmission method and device system
CN105122255A (en) * 2012-12-17 2015-12-02 微软技术许可有限责任公司 Management system for point of care testing
CN106067881A (en) * 2016-06-24 2016-11-02 泰康保险集团股份有限公司 Data Access Security control method based on OS/400, Apparatus and system
CN106951801A (en) * 2017-04-12 2017-07-14 中国民生银行股份有限公司 The processing method and processing device of external data
CN107426182A (en) * 2017-06-21 2017-12-01 郑州云海信息技术有限公司 The access control method and system of a kind of storage management system
CN107480551A (en) * 2017-07-06 2017-12-15 网易(杭州)网络有限公司 A kind of file management method and device

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110532018A (en) * 2019-08-27 2019-12-03 上海易点时空网络有限公司 Code submits method and device
CN111343005A (en) * 2020-02-11 2020-06-26 杭州涂鸦信息技术有限公司 Method and system for quickly taking local automatic configuration into effect
CN111343005B (en) * 2020-02-11 2024-01-30 杭州涂鸦信息技术有限公司 Method and system for quickly effecting local automation configuration

Similar Documents

Publication Publication Date Title
CN109684179B (en) Early warning method, device, equipment and storage medium for system fault
CN104038952B (en) The Forecasting Methodology and forecasting system of accident
EP1994514B1 (en) Method and apparatus to provide outbreak notification based on historical location data
CN108269386B (en) Short message sending device, short message issuing device and system for emergency early warning information
CN109511089A (en) A kind of monitoring method and device
CN109219838A (en) A kind of Traffic monitoring alarm method, device, terminal device and storage medium
CN109558301A (en) A kind of distributed system data monitoring method, device and relevant device
CN107193714B (en) Alarm display method and device
CN106292496A (en) A kind of subway monitoring system alarming management method
CN103529707A (en) Design method for full object-oriented intelligent alarm model in integrated supervisory control system of metro
CN102694671A (en) Method for realizing fault warning and device thereof
CN109981338A (en) Alarm method, device and the storage medium that code pulls
CN105205624A (en) Enterprise probity risk monitoring system
CN109714387A (en) A kind of operation management system alarm method for subscribing subscribes to terminal, issue terminal and system
CN109669835A (en) MySQL database monitoring method, device, equipment and readable storage medium storing program for executing
CN109861856A (en) Notification method, device, storage medium and the computer equipment of system failure information
CN101766847B (en) Wireless monitoring system for medical equipment
CN104581806A (en) Method and terminal for monitoring service system
CN101102217B (en) Processing method for duplicate alert and discontinuous reporting and monitoring in telecom network management system
CN114757645A (en) Intelligent rod system
CN114996085A (en) Prometheus-based real-time service monitoring method and system
CN102932169B (en) Customizable network management system alarm icon display method
CN110865921A (en) Data monitoring method and device, readable storage medium and electronic equipment
CN108959016A (en) Acquisition management method, apparatus, server and the data acquisition equipment of monitoring parameter
CN109829833A (en) Power distribution network alarm method and system, electronic equipment and computer readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20190705