CN109981338A - Alarm method, device and the storage medium that code pulls - Google Patents
Alarm method, device and the storage medium that code pulls Download PDFInfo
- Publication number
- CN109981338A CN109981338A CN201910112905.0A CN201910112905A CN109981338A CN 109981338 A CN109981338 A CN 109981338A CN 201910112905 A CN201910112905 A CN 201910112905A CN 109981338 A CN109981338 A CN 109981338A
- Authority
- CN
- China
- Prior art keywords
- code
- pulls
- information
- pull
- default alarm
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/06—Management of faults, events, alarms or notifications
- H04L41/0631—Management of faults, events, alarms or notifications using root cause analysis; using analysis of correlation between notifications, alarms or events based on decision criteria, e.g. hierarchy, tree or time analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/21—Monitoring or handling of messages
- H04L51/224—Monitoring or handling of messages providing notification on incoming messages, e.g. pushed notifications of received messages
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/56—Unified messaging, e.g. interactions between e-mail, instant messaging or converged IP messaging [CPM]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/145—Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
Abstract
This application discloses a kind of alarm methods that code pulls.The described method includes: the code for receiving user pulls request, acquires and the code for obtaining the user pulls information;Judge that the code pulls whether information meets default alarm regulation;If the code, which pulls information, meets default alarm regulation, issues and alert to designated user;Request is pulled using the code for receiving user, it acquires and the code for obtaining the user pulls the mode of information, pull whether information meets default alarm regulation by judging the code, meet default alarm regulation if having reached the code and having pulled information, the purpose of alarm is then issued to designated user, to realize the technical effect for pulling and being monitored to code, and then solve and lack surveillance and control measure when user pulls code from third-party agent management tool in the related technology, lead to the problem that code safety is lower.
Description
Technical field
This application involves field of information processing, in particular to a kind of alarm method that code pulls, device and storage
Medium.
Background technique
Code management tools in the related technology have VSS, Cc, SVN, Git etc., existing code management tools generally for
Family upload code has real time monitoring and corresponding data consolidated statement to show, but such software is downloaded user when pulling code
More effective alarm method and data summarization method are not provided, and then leads to any possible permission unauthorized operation or usurps
Account, which pulls code operation all, can cause the leakage of code, core resource.
Lack surveillance and control measure when pulling code from third-party agent management tool for user in the related technology, leads to generation
The lower problem of code safety, currently no effective solution has been proposed.
Summary of the invention
The main purpose of the application is to provide a kind of alarm method that code pulls, device and storage medium, to solve
Lack surveillance and control measure when user pulls code from third-party agent management tool in the related technology, causes code safety lower
The problem of.
To achieve the goals above, according to a first aspect of the present application, the embodiment of the present application provides a kind of code and pulls
Alarm method, which comprises the code for receiving user pulls request, acquires and the code for obtaining the user pulls letter
Breath;Judge that the code pulls whether information meets default alarm regulation;If the code, which pulls information, meets default alarm
Rule is then issued to designated user and is alerted.
With reference to first aspect, the embodiment of the present application provides the first possible embodiment of first aspect, wherein institute
State the code pull information be pull the time, pull personnel, pull equipment, pull in path and object code at least one
Kind.
With reference to first aspect, the embodiment of the present application provides second of possible embodiment of first aspect, wherein institute
State that judge that the code pulls information whether to meet default alarm regulation include: to judge that the code pulls in information to pull people
The personnel whether member has in the default alarm regulation pull permission.
With reference to first aspect, the embodiment of the present application provides the third possible embodiment of first aspect, wherein institute
State that described to judge that the code pulls information whether to meet default alarm regulation include: to judge that the code pulls the drawing in information
Whether the time is taken to be in the default alarm regulation allows to execute in the time interval for pulling operation.
With reference to first aspect, the embodiment of the present application provides the 4th kind of possible embodiment of first aspect, wherein institute
State that described to judge that the code pulls information whether to meet default alarm regulation include: to judge that the code pulls the drawing in information
Whether the IP address of equipment is taken to belong in the default alarm regulation allows to execute the IP address for pulling operation.
With reference to first aspect, the embodiment of the present application provides the 5th kind of possible embodiment of first aspect, wherein institute
State that judge that the code pulls information whether to meet default alarm regulation include: to judge that the code pulls in information to pull road
Whether diameter, which belongs in the default alarm regulation, allows to execute the code library path for pulling operation.
With reference to first aspect, the embodiment of the present application provides the 6th kind of possible embodiment of first aspect, wherein institute
State that judge that the code pulls information whether to meet default alarm regulation include: to judge that the code pulls the target generation in information
Whether the type and data volume of code, which belong in the default alarm regulation, allows to execute the type and data volume for pulling operation.
With reference to first aspect, the embodiment of the present application provides the 7th kind of possible embodiment of first aspect, wherein institute
State to designated user issue alarm include short massage notice, mail notification, third party's social platform notice and Advise By Wire in extremely
Few one kind.
To achieve the goals above, according to a second aspect of the present application, the embodiment of the present application provides a kind of code and pulls
Alarm device, comprising: information acquisition unit, the code for receiving user pull request, acquire and obtain the user's
Code pulls information;Whether information judging unit, the code for judging that the information acquisition unit collects pull information
Meet default alarm regulation;Execution unit is alerted, for when the code pulls information and meets default alarm regulation, Xiang Zhiding
User issues alarm.
To achieve the goals above, according to the third aspect of the application, the embodiment of the present application provides a kind of non-transient meter
Calculation machine readable storage medium storing program for executing, wherein the non-transient computer readable storage medium stores computer instruction, and the computer refers to
Order makes the computer execute the alarm method that code described in any of the above embodiments pulls.
In the embodiment of the present application, request is pulled using the code for receiving user, acquires and obtains the code of the user
The mode for pulling information pulls whether information meets default alarm regulation by judging the code, if having reached the generation
Code pulls information and meets default alarm regulation, then the purpose of alarm is issued to designated user, thus realize to code pull into
The technical effect of row monitoring, and then solve shortage when user pulls code from third-party agent management tool in the related technology
Surveillance and control measure leads to the problem that code safety is lower.
Detailed description of the invention
The attached drawing constituted part of this application is used to provide further understanding of the present application, so that the application's is other
Feature, objects and advantages become more apparent upon.The illustrative examples attached drawing and its explanation of the application is for explaining the application, not
Constitute the improper restriction to the application.In the accompanying drawings:
Fig. 1 is according to a kind of flow chart for the alarm method that code pulls provided by the present application;
Fig. 2 is according to a kind of block diagram representation for the alarm device that code pulls provided by the present application.
Specific embodiment
In order to make those skilled in the art more fully understand application scheme, below in conjunction in the embodiment of the present application
Attached drawing, the technical scheme in the embodiment of the application is clearly and completely described, it is clear that described embodiment is only
The embodiment of the application a part, instead of all the embodiments.Based on the embodiment in the application, ordinary skill people
Member's every other embodiment obtained without making creative work, all should belong to the model of the application protection
It encloses.
It should be noted that the description and claims of this application and term " first " in above-mentioned attached drawing, "
Two " etc. be to be used to distinguish similar objects, without being used to describe a particular order or precedence order.It should be understood that using in this way
Data be interchangeable under appropriate circumstances, so as to embodiments herein described herein.In addition, term " includes " and " tool
Have " and their any deformation, it is intended that cover it is non-exclusive include, for example, containing a series of steps or units
Process, method, system, product or equipment those of are not necessarily limited to be clearly listed step or unit, but may include without clear
Other step or units listing to Chu or intrinsic for these process, methods, product or equipment.
In this application, term " on ", "lower", "left", "right", "front", "rear", "top", "bottom", "inner", "outside",
" in ", "vertical", "horizontal", " transverse direction ", the orientation or positional relationship of the instructions such as " longitudinal direction " be orientation based on the figure or
Positional relationship.These terms are not intended to limit indicated dress primarily to better describe the application and embodiment
Set, element or component must have particular orientation, or constructed and operated with particular orientation.
Also, above-mentioned part term is other than it can be used to indicate that orientation or positional relationship, it is also possible to for indicating it
His meaning, such as term " on " also are likely used for indicating certain relations of dependence or connection relationship in some cases.For ability
For the those of ordinary skill of domain, the concrete meaning of these terms in this application can be understood as the case may be.
In addition, term " installation ", " setting ", " being equipped with ", " connection ", " connected ", " socket " shall be understood in a broad sense.For example,
It may be a fixed connection, be detachably connected or monolithic construction;It can be mechanical connection, or electrical connection;It can be direct phase
It even, or indirectly connected through an intermediary, or is two connections internal between device, element or component.
For those of ordinary skills, the concrete meaning of above-mentioned term in this application can be understood as the case may be.
It should be noted that in the absence of conflict, the features in the embodiments and the embodiments of the present application can phase
Mutually combination.The application is described in detail below with reference to the accompanying drawings and in conjunction with the embodiments.
Consider: code management tools in the related technology have VSS, Cc, SVN, Git etc., and existing code management tools are general
There are real time monitoring and corresponding data consolidated statement to show all over for user's upload code, but such software is downloaded user and drawn
More effective alarm method and data summarization method are not provided when replacing code, and then lead to any possible permission unauthorized operation
Or usurp account and pull code operation all and can cause the leakage of code, core resource, therefore, this application provides a kind of codes
Alarm method, device and the storage medium pulled.
As shown in Figure 1, this method includes the following steps, namely S101 to step S103:
Step S101, the code for receiving user pull request, acquire and the code for obtaining the user pulls information;
Preferably, administrator will need monitored item by configuring system configuration, guarantee that configuration has come into force after preservation, correspondence is matched
The Database Systems for including but are not limited to be stored in similar to mysql are set, or are stored in file system.
Preferably, code management software is modified, hook (callback) is added in code management software.
Preferably, by the modification to code management tools software, when user pulls code, by existed system
Hook (callback) is added to service back the parameters such as the machine IP for pulling code, user name and corresponding code library path
It adjusts, obtains code and pull information.
Step S102 judges that the code pulls whether information meets default alarm regulation;
Preferably, the warning information by the configuration of corresponding data and administrator compares, and retains correspondence and pull information
Periodically it is aggregated to form report data.
Step S103 is issued to designated user and is alerted if the code pulls information and meets default alarm regulation.
Preferably, if hitting certain rules, alarm is issued by modes such as short message, mail, nail nail, wechats.
It can be seen from the above description that the present invention realizes following technical effect:
In the embodiment of the present application, request is pulled using the code for receiving user, acquires and obtains the code of the user
The mode for pulling information pulls whether information meets default alarm regulation by judging the code, if having reached the generation
Code pulls information and meets default alarm regulation, then the purpose of alarm is issued to designated user, thus realize to code pull into
The technical effect of row monitoring, and then solve shortage when user pulls code from third-party agent management tool in the related technology
Surveillance and control measure leads to the problem that code safety is lower.
According to embodiments of the present invention, as preferred in the embodiment of the present application, the code pull information be pull the time,
Personnel are pulled, equipment is pulled, pulls at least one of path and object code, in some other embodiment of the application,
It can also include the other information that user generates in pulling coding process that the code, which pulls information,.
According to embodiments of the present invention, as preferred in the embodiment of the present application, the judgement code, which pulls information, is
The no default alarm regulation of satisfaction includes: to judge that the code pulls in information to pull whether personnel have the default alarm rule
Personnel in then pull permission.
According to embodiments of the present invention, as preferred in the embodiment of the present application, the judgement code, which pulls information, is
The no default alarm regulation of satisfaction includes: to judge that the code pulls in information to pull whether the time is in the default alarm rule
Allow to execute in the time interval for pulling operation in then.
According to embodiments of the present invention, as preferred in the embodiment of the present application, the judgement code, which pulls information, is
It is no meet default alarm regulation include: judge the code pull the IP address for pulling equipment in information whether belong to it is described pre-
If allowing to execute the IP address for pulling operation in alarm regulation.
According to embodiments of the present invention, as preferred in the embodiment of the present application, the judgement code, which pulls information, is
The no default alarm regulation of satisfaction includes: to judge that the code pulls in information to pull whether path belongs to the default alarm rule
Allow to execute the code library path for pulling operation in then.
According to embodiments of the present invention, as preferred in the embodiment of the present application, the judgement code, which pulls information, is
The no default alarm regulation of satisfaction includes: to judge that the code pulls the type of the object code in information and whether data volume belongs to
Allow to execute the type and data volume for pulling operation in the default alarm regulation.
According to embodiments of the present invention, described to issue alarm to designated user and include as preferred in the embodiment of the present application
At least one of short massage notice, mail notification, third party's social platform notice and Advise By Wire, in some other of the application
In embodiment, the mode of the alarm can also can send the mode of information for other to designated user.
It should be noted that step shown in the flowchart of the accompanying drawings can be in such as a group of computer-executable instructions
It is executed in computer system, although also, logical order is shown in flow charts, and it in some cases, can be with not
The sequence being same as herein executes shown or described step.
According to embodiments of the present invention, additionally provide it is a kind of for implementing the device of the above method, as shown in Fig. 2, the device
It include: information acquisition unit 10, the code for receiving user pulls request, acquires and the code for obtaining the user pulls letter
Breath;Information judging unit 20, for judge code that the information acquisition unit collects pull information whether meet it is default
Alarm regulation;Execution unit 30 is alerted, for being sent out to designated user when the code pulls information and meets default alarm regulation
It alerts out.
Request is pulled according to the code that information acquisition unit 10 described herein is used to receive user, acquires and obtains institute
The code for stating user pulls information, it is preferred that by the modification to code management tools software, when user pulls code, leads to
Cross machine IP, user name and the corresponding code library path etc. that hook (callback) is added on existed system by code is pulled
Parameter carries out service readjustment, obtains code and pulls information.
It is used to judge the code that the information acquisition unit collects according to information judging unit 20 described herein
Pull whether information meets default alarm regulation, it is preferred that do the warning information of the configuration of corresponding data and administrator pair
Than, and retain and corresponding pull information and be periodically aggregated to form report data.
It is used to meet default alarm regulation when the code pulls information according to alarm execution unit 30 described herein
When, it issues and alerts to designated user, it is preferred that if hitting certain rules, sent out by modes such as short message, mail, nail nail, wechats
It alerts out.
According to embodiments of the present invention, a kind of non-transient computer readable storage medium is additionally provided, which is characterized in that described
Non-transient computer readable storage medium stores computer instruction, and the computer instruction makes the computer execute above-mentioned code
The alarm method pulled.
Obviously, those skilled in the art should be understood that each module of the above invention or each step can be with general
Computing device realize that they can be concentrated on a single computing device, or be distributed in multiple computing devices and formed
Network on, optionally, they can be realized with the program code that computing device can perform, it is thus possible to which they are stored
Be performed by computing device in the storage device, perhaps they are fabricated to each integrated circuit modules or by they
In multiple modules or step be fabricated to single integrated circuit module to realize.In this way, the present invention is not limited to any specific
Hardware and software combines.
The foregoing is merely preferred embodiment of the present application, are not intended to limit this application, for the skill of this field
For art personnel, various changes and changes are possible in this application.Within the spirit and principles of this application, made any to repair
Change, equivalent replacement, improvement etc., should be included within the scope of protection of this application.
Claims (10)
1. a kind of alarm method that code pulls, which is characterized in that the described method includes:
The code for receiving user pulls request, acquires and the code for obtaining the user pulls information;
Judge that the code pulls whether information meets default alarm regulation;And
If the code, which pulls information, meets default alarm regulation, issues and alert to designated user.
2. the alarm method that code according to claim 1 pulls, which is characterized in that it is to pull that the code, which pulls information,
Time pulls personnel, pulls equipment, pulls at least one of path and object code.
3. the alarm method that code according to claim 2 pulls, which is characterized in that the judgement code pulls letter
Whether breath, which meets default alarm regulation, includes:
Judge that the code pulls the personnel whether personnel have in the default alarm regulation that pull in information and pulls permission.
4. the alarm method that code according to claim 2 pulls, which is characterized in that the judgement code pulls letter
Whether breath, which meets default alarm regulation, includes:
Judge the code pull in information pull the time whether be in the default alarm regulation allow execute pull
In the time interval of operation.
5. the alarm method that code according to claim 2 pulls, which is characterized in that the judgement code pulls letter
Whether breath, which meets default alarm regulation, includes:
Judge that the code pulls the permission whether IP address for pulling equipment in information belongs in the default alarm regulation
Execute the IP address for pulling operation.
6. the alarm method that code according to claim 2 pulls, which is characterized in that the judgement code pulls letter
Whether breath, which meets default alarm regulation, includes:
Judge the code pull in information pull path whether belong in the default alarm regulation allow execute pull
The code library path of operation.
7. the alarm method that code according to claim 2 pulls, which is characterized in that the judgement code pulls letter
Whether breath, which meets default alarm regulation, includes:
Judge that the code pulls the type of the object code in information and whether data volume belongs in the default alarm regulation
Allow to execute and pull the type and data volume of operation.
8. the alarm method that code according to claim 1 pulls, which is characterized in that described issue to designated user alerts
Including at least one of short massage notice, mail notification, third party's social platform notice and Advise By Wire.
9. a kind of alarm device that code pulls characterized by comprising
Information acquisition unit, the code for receiving user pull request, acquire and the code for obtaining the user pulls information;
Information judging unit, for judging that the code that the information acquisition unit collects pulls whether information meets default announcement
Police regulations are then;
Execution unit is alerted, for issuing and alerting to designated user when the code pulls information and meets default alarm regulation.
10. a kind of non-transient computer readable storage medium, which is characterized in that the non-transient computer readable storage medium is deposited
Computer instruction is stored up, the computer instruction pulls code described in any one of described computer perform claim requirement 1 to 8
Alarm method.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910112905.0A CN109981338A (en) | 2019-02-13 | 2019-02-13 | Alarm method, device and the storage medium that code pulls |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910112905.0A CN109981338A (en) | 2019-02-13 | 2019-02-13 | Alarm method, device and the storage medium that code pulls |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109981338A true CN109981338A (en) | 2019-07-05 |
Family
ID=67076877
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910112905.0A Pending CN109981338A (en) | 2019-02-13 | 2019-02-13 | Alarm method, device and the storage medium that code pulls |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109981338A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110532018A (en) * | 2019-08-27 | 2019-12-03 | 上海易点时空网络有限公司 | Code submits method and device |
CN111343005A (en) * | 2020-02-11 | 2020-06-26 | 杭州涂鸦信息技术有限公司 | Method and system for quickly taking local automatic configuration into effect |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1956449A (en) * | 2005-10-28 | 2007-05-02 | 北京书生数字技术有限公司 | Encipher transmission method and equipment system for preventing cpying data resource |
CN101841411A (en) * | 2005-10-28 | 2010-09-22 | 北京书生数字技术有限公司 | Data resource anti-copying encrypted transmission method and device system |
CN105122255A (en) * | 2012-12-17 | 2015-12-02 | 微软技术许可有限责任公司 | Management system for point of care testing |
CN106067881A (en) * | 2016-06-24 | 2016-11-02 | 泰康保险集团股份有限公司 | Data Access Security control method based on OS/400, Apparatus and system |
CN106951801A (en) * | 2017-04-12 | 2017-07-14 | 中国民生银行股份有限公司 | The processing method and processing device of external data |
CN107426182A (en) * | 2017-06-21 | 2017-12-01 | 郑州云海信息技术有限公司 | The access control method and system of a kind of storage management system |
CN107480551A (en) * | 2017-07-06 | 2017-12-15 | 网易(杭州)网络有限公司 | A kind of file management method and device |
-
2019
- 2019-02-13 CN CN201910112905.0A patent/CN109981338A/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1956449A (en) * | 2005-10-28 | 2007-05-02 | 北京书生数字技术有限公司 | Encipher transmission method and equipment system for preventing cpying data resource |
CN101841411A (en) * | 2005-10-28 | 2010-09-22 | 北京书生数字技术有限公司 | Data resource anti-copying encrypted transmission method and device system |
CN105122255A (en) * | 2012-12-17 | 2015-12-02 | 微软技术许可有限责任公司 | Management system for point of care testing |
CN106067881A (en) * | 2016-06-24 | 2016-11-02 | 泰康保险集团股份有限公司 | Data Access Security control method based on OS/400, Apparatus and system |
CN106951801A (en) * | 2017-04-12 | 2017-07-14 | 中国民生银行股份有限公司 | The processing method and processing device of external data |
CN107426182A (en) * | 2017-06-21 | 2017-12-01 | 郑州云海信息技术有限公司 | The access control method and system of a kind of storage management system |
CN107480551A (en) * | 2017-07-06 | 2017-12-15 | 网易(杭州)网络有限公司 | A kind of file management method and device |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110532018A (en) * | 2019-08-27 | 2019-12-03 | 上海易点时空网络有限公司 | Code submits method and device |
CN111343005A (en) * | 2020-02-11 | 2020-06-26 | 杭州涂鸦信息技术有限公司 | Method and system for quickly taking local automatic configuration into effect |
CN111343005B (en) * | 2020-02-11 | 2024-01-30 | 杭州涂鸦信息技术有限公司 | Method and system for quickly effecting local automation configuration |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109684179B (en) | Early warning method, device, equipment and storage medium for system fault | |
CN104038952B (en) | The Forecasting Methodology and forecasting system of accident | |
EP1994514B1 (en) | Method and apparatus to provide outbreak notification based on historical location data | |
CN108269386B (en) | Short message sending device, short message issuing device and system for emergency early warning information | |
CN109511089A (en) | A kind of monitoring method and device | |
CN109219838A (en) | A kind of Traffic monitoring alarm method, device, terminal device and storage medium | |
CN109558301A (en) | A kind of distributed system data monitoring method, device and relevant device | |
CN107193714B (en) | Alarm display method and device | |
CN106292496A (en) | A kind of subway monitoring system alarming management method | |
CN103529707A (en) | Design method for full object-oriented intelligent alarm model in integrated supervisory control system of metro | |
CN102694671A (en) | Method for realizing fault warning and device thereof | |
CN109981338A (en) | Alarm method, device and the storage medium that code pulls | |
CN105205624A (en) | Enterprise probity risk monitoring system | |
CN109714387A (en) | A kind of operation management system alarm method for subscribing subscribes to terminal, issue terminal and system | |
CN109669835A (en) | MySQL database monitoring method, device, equipment and readable storage medium storing program for executing | |
CN109861856A (en) | Notification method, device, storage medium and the computer equipment of system failure information | |
CN101766847B (en) | Wireless monitoring system for medical equipment | |
CN104581806A (en) | Method and terminal for monitoring service system | |
CN101102217B (en) | Processing method for duplicate alert and discontinuous reporting and monitoring in telecom network management system | |
CN114757645A (en) | Intelligent rod system | |
CN114996085A (en) | Prometheus-based real-time service monitoring method and system | |
CN102932169B (en) | Customizable network management system alarm icon display method | |
CN110865921A (en) | Data monitoring method and device, readable storage medium and electronic equipment | |
CN108959016A (en) | Acquisition management method, apparatus, server and the data acquisition equipment of monitoring parameter | |
CN109829833A (en) | Power distribution network alarm method and system, electronic equipment and computer readable storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190705 |