CN110113224A - Capacity monitor method, apparatus, computer equipment and storage medium - Google Patents

Capacity monitor method, apparatus, computer equipment and storage medium Download PDF

Info

Publication number
CN110113224A
CN110113224A CN201910208505.XA CN201910208505A CN110113224A CN 110113224 A CN110113224 A CN 110113224A CN 201910208505 A CN201910208505 A CN 201910208505A CN 110113224 A CN110113224 A CN 110113224A
Authority
CN
China
Prior art keywords
log
capacity
preset
real time
monitored object
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910208505.XA
Other languages
Chinese (zh)
Other versions
CN110113224B (en
Inventor
何勇彬
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
OneConnect Smart Technology Co Ltd
Original Assignee
OneConnect Smart Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by OneConnect Smart Technology Co Ltd filed Critical OneConnect Smart Technology Co Ltd
Priority to CN201910208505.XA priority Critical patent/CN110113224B/en
Publication of CN110113224A publication Critical patent/CN110113224A/en
Application granted granted Critical
Publication of CN110113224B publication Critical patent/CN110113224B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/06Management of faults, events, alarms or notifications
    • H04L41/0631Management of faults, events, alarms or notifications using root cause analysis; using analysis of correlation between notifications, alarms or events based on decision criteria, e.g. hierarchy, tree or time analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/06Management of faults, events, alarms or notifications
    • H04L41/069Management of faults, events, alarms or notifications using logs of notifications; Post-processing of notifications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/08Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
    • H04L43/0876Network utilisation, e.g. volume of load or congestion level
    • H04L43/0882Utilisation of link capacity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/16Threshold monitoring
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/50Testing arrangements

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Environmental & Geological Engineering (AREA)
  • Debugging And Monitoring (AREA)

Abstract

The invention discloses a kind of capacity monitor methods, device, computer equipment and storage medium, the described method includes: being tested using preset pressure test mode monitored object, obtain the capacity peak value of monitored object, the capacity threshold of monitored object is set according to capacity peak value, it is detected using capacity of the preset monitoring tools to monitored object, the real time capacity data of monitored object are obtained in real time, when detecting that real time capacity data are more than capacity threshold, obtain the real time access log of monitored object, if the real time access log corresponding response time is greater than preset response time threshold value, then carry out abnormal capacity alarm, and the journal file in preset log library is cleared up.The embodiment of the present invention can be realized the automatic monitoring to the capacity of server, the maintenance efficiency to the capacity of server be improved, to improve the level of intelligence of the capacity monitor of server in application system.

Description

Capacity monitor method, apparatus, computer equipment and storage medium
Technical field
The present invention relates to system monitor technique field more particularly to a kind of system monitoring method, apparatus, computer equipment and Storage medium.
Background technique
With the high speed development of network technology, miscellaneous application increases swift and violent in mobile Internet, is the life of people Work brings many conveniences, at the same time, user to the service response speed of application system, and service stability requirement Also higher and higher.When coping with the user group of enormous amount, service provider, can be to using in order to guarantee the normal operation of server Family provides normal access service, it is necessary to assure the capacity of the server of application system is sufficient, if the memory size of server or Person's disk size is insufficient, then exception occurs in the service that will lead to application system, and normal access service can not be provided for user.
Currently, service provider is usually according to the performance issue of the application system of the user feedback received or certain clothes The warning information that business device is issued due to itself off-capacity, finds the exception of the off-capacity of the server of application system, and lead to Know that staff verifies and safeguards to the exception of server, however, in both cases, being required to spend human resources The exception of the off-capacity of processing server is carried out, also, application system has been in the state of off-capacity, application system Service state will be affected, and cause application system that can not provide normal access service.
Summary of the invention
A kind of capacity monitor method, apparatus, computer equipment and storage medium are provided in the embodiment of the present invention, to solve mesh The preceding capacity monitor to server in application system is not in time and the horizontal low problem of monitoring intelligent.
A kind of capacity monitor method, comprising:
Monitored object is tested using preset pressure test mode, obtains the capacity peak value of the monitored object, And the capacity threshold of the monitored object is set according to the capacity peak value;
It is detected using capacity of the preset monitoring tools to the monitored object, obtains the monitored object in real time Real time capacity data;
If detecting, the real time capacity data are more than the capacity threshold, from preset log library, described in acquisition The real time access log of monitored object, wherein the real time access log includes that real time access request and the real time access are asked The response time asked;
If the response time of the real time access request is greater than preset response time threshold value, abnormal capacity announcement is carried out It is alert;
The journal file in the preset log library is cleared up using preset processing scheme.
A kind of capacity monitor device, comprising:
Pressure test module obtains the prison for testing using preset pressure test mode monitored object The capacity peak value of object is controlled, and the capacity threshold of the monitored object is set according to the capacity peak value;
Capacity check module, for being detected using capacity of the preset monitoring tools to the monitored object, in real time Obtain the real time capacity data of the monitored object;
Log acquisition module, if for detecting that the real time capacity data are more than the capacity threshold, from preset In log library, the real time access log of the monitored object is obtained, wherein the real time access log includes real time access request With the response time of real time access request;
Abnormality alarming module, if the response time for real time access request is greater than preset response time threshold value, Then carry out abnormal capacity alarm;
Log cleaning modul, for using preset processing scheme to carry out the journal file in the preset log library Cleaning.
A kind of computer equipment, including memory, processor and storage are in the memory and can be in the processing The computer program run on device, the processor realize above-mentioned capacity monitor method when executing the computer program.
A kind of computer readable storage medium, the computer-readable recording medium storage have computer program, the meter Calculation machine program realizes above-mentioned capacity monitor method when being executed by processor.
Above-mentioned capacity monitor method, apparatus, computer equipment and storage medium, by using preset pressure test mode Monitored object is tested, the capacity peak value of monitored object is obtained, determines the maximum that the server of application system can be provided Service performance, and according to the capacity threshold of capacity peak value setting monitored object, the accuracy of the capacity threshold of setting is improved, is used Monitoring tools are monitored the capacity of monitored object, obtain the real time capacity data of monitored object in real time, realize to server Capacity automatic monitoring, when detect real time capacity data be more than capacity threshold when, from preset log library, obtain monitoring The real time access log of object is carried out using real time access log corresponding response time and preset response time threshold value into one The comparison of step ground, and in the case where the real time access log corresponding response time being greater than preset response time threshold value, it issues different The information of Chang Rongliang alarm finds the exception that the capacity of server occurs in time, improves the timeliness and standard of capacity abnormality alarming True property, meanwhile, the journal file in log library is cleared up using preset processing scheme, the memory for discharging server is empty Between, the maintenance efficiency to the capacity of server is improved, to improve the level of intelligence of the capacity monitor of server in application system.
Detailed description of the invention
In order to illustrate the technical solution of the embodiments of the present invention more clearly, below by institute in the description to the embodiment of the present invention Attached drawing to be used is needed to be briefly described, it should be apparent that, the accompanying drawings in the following description is only some implementations of the invention Example, for those of ordinary skill in the art, without any creative labor, can also be according to these attached drawings Obtain other attached drawings.
Fig. 1 is an application environment schematic diagram of capacity monitor method in one embodiment of the invention;
Fig. 2 is a flow chart of capacity monitor method in one embodiment of the invention;
Fig. 3 is the specific flow chart cleared up in capacity monitor method journal file in one embodiment of the invention;
Fig. 4 is the specific flow chart for carrying out dilatation in one embodiment of the invention in capacity monitor method to monitored object;
Fig. 5 is the specific flow chart for obtaining response time threshold value in one embodiment of the invention in capacity monitor method;
Fig. 6 is the specific flow chart for calculating response time threshold value in one embodiment of the invention in capacity monitor method;
Fig. 7 is a functional block diagram of capacity monitor device in one embodiment of the invention;
Fig. 8 is a schematic diagram of computer equipment in one embodiment of the invention.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation description, it is clear that described embodiments are some of the embodiments of the present invention, instead of all the embodiments.Based on this hair Embodiment in bright, every other implementation obtained by those of ordinary skill in the art without making creative efforts Example, shall fall within the protection scope of the present invention.
Capacity monitor method provided by the embodiments of the present application, can be applicable in the application environment such as Fig. 1, the application environment packet Include server-side and monitored object, wherein be attached between server-side and monitored object by network, server-side passes through network pair The capacity of monitored object is monitored, if exception occurs in the capacity that server-side monitors monitored object, carries out abnormality alarming, and The journal file of monitored object is cleared up.Monitored object specifically can be, but not limited to be various personal computers, notebook Computer and server, server-side can specifically be realized with the server cluster that independent server or multiple servers form. Capacity monitor method provided in an embodiment of the present invention is applied to server-side.
In one embodiment, Fig. 2 shows a flow chart of capacity monitor method in the present embodiment, this method is applied in Fig. 1 In server-side, be monitored and alert for the capacity to monitored object.As shown in Fig. 2, the capacity monitor method includes step Rapid S10 is to step S50, and details are as follows:
S10: testing monitored object using preset pressure test mode, obtains the capacity peak value of monitored object, And the capacity threshold of monitored object is set according to capacity peak value.
In the present embodiment, monitored object, which refers to, provides the server or clothes of the functions such as access, storage in application system Business device cluster, capacity refer to that monitored object operates normally required various software and hardware resources, are specifically including but not limited to CPU money Source, memory size and disk size, pressure test are soft for assessing one kind of the performance of application system, reliability and stability Part test mode can determine the maximum service performance that application system can be provided by pressure test.
Specifically, preset pressure test mode refers to, by using the practical application of test software simulation application system Environment, and the system loading of the process of test software analog subscriber access monitoring object is run, monitored object is tested, directly Until the collapse of the application system of simulation.Obtain application system collapse when the corresponding capacity of monitored object, and using the capacity as The capacity peak value of monitored object, wherein capacity peak value includes but is not limited to that cpu resource peak value, memory size peak value and disk hold Peak value is measured, actual application environment includes hardware environment and software environment, and test software specifically can be pressure survey tool JMeter, It can be pressure survey tool Tsung etc., specific test software can be configured according to the needs of practical application, not limited herein System.
Preferably, preset pressure test mode can be used pressure survey tool JMeter and test monitored object, should Pressure survey tool JMeter is that a kind of pressure of open source surveys product, can be used for the static resource and dynamic resource of test application system, And to server, network or the huge load of simulating etc., by the way that the number of repetition accessed to monitored object and simultaneously is arranged Hair degree carries out pressure test to monitored object using pressure survey tool JMeter, it can be deduced that the maximum that monitored object can be provided Service performance.
Specifically, capacity threshold is configured according to obtained capacity peak value, which can specifically include But it is not limited to cpu resource utilization rate threshold value, memory size threshold value and disk size threshold value, and each capacity threshold is less than correspondence Capacity peak value, if the capacity of monitored object be more than the capacity threshold, then it represents that there is the exception of off-capacity in monitored object, should Capacity threshold specifically can be set to the 90% of capacity peak value, may be set to be the 85% of capacity peak value, herein with no restrictions, It can specifically be configured according to the needs of practical application, for example, capacity threshold can be according to the capacity exception of monitored object Maintenance time is determined, and the maintenance time of capacity exception is shorter, and capacity threshold can be set bigger.
S20: being detected using capacity of the preset monitoring tools to monitored object, obtains the real-time of monitored object in real time Capacity data.
Specifically, server-side can be used the monitoring tools such as Ganglia or Zabbix and be monitored to monitored object, real When obtain monitored object real time capacity data, which includes server identification information, monitoring period and monitoring Value, server identification information can carry out unique identification to the server in application system.
Wherein, Ganglia is the cluster observation project of an open source, can be used for monitoring the work shape of a large amount of monitoring nodes State, Zabbix are the open sources of the enterprise-level of the monitoring of offer distributed system and network monitoring function based on WEB interface Project.
Optionally, the real time capacity data that server-side can will acquire are stored in preset capacity information library, so as to The capacity data that monitors that server-side can obtain monitored object from preset capacity information library is analyzed.
S30: if detecting, real time capacity data are more than capacity threshold, from preset log library, obtain monitored object Real time access log, wherein the real time access log include real time access request and real time access request response time.
In the present embodiment, preset log library is the database for storing the access log of monitored object, accesses day Will is used to record loud consumed by the request of request content and monitored object customer in response end that user initiates monitored object Between seasonable, real time access log includes but is not limited to the response time of real time access request and real time access request, real time access Request refers to the request content that user submits to monitored object, and the response time of real time access request refers to monitored object from reception Duration consumed by access request to the response for completing request content.
Specifically, server-side is compared using the capacity threshold of the real time capacity data and monitored object that monitor, if Detect that real time capacity data are more than capacity threshold, then it represents that the exception of off-capacity will occur in monitored object, and server-side is from pre- If log library in obtain the real time access log of monitored object, obtain and with real time capacity data be in the real-time of same time point Access log conducts further analysis the service state of monitored object to confirm that being more than capacity in real time capacity data In the case where threshold value, whether monitored object can also provide normal access service.
S40: if the response time of real time access request is greater than preset response time threshold value, abnormal capacity announcement is carried out It is alert.
In the present embodiment, it is compared using the response time that real time access is requested with preset response time threshold value, If the response time of real time access log is greater than preset response time threshold value, it is insufficient to confirm that the capacity of monitored object occurs Abnormal conditions, server-side according in real time capacity data server identification information and monitor value generate the announcement that abnormal capacity alerts Alert information, wherein warning information includes exception object, abnormal key name and abnormal data etc., which, which refers to, capacity occurs The IP address of insufficient monitored object, the anomaly item refer to the project name for off-capacity occur, which refers to super The real time capacity data of overcapacity threshold value.
Specifically, preset information is sent by warning information to receive in address, issue the alarm letter of abnormal capacity alarm Breath, so that staff according to the server identification in real time capacity data, determines the monitored object of off-capacity occur, and Positioning problems can be carried out according to the measured value in real-time traffic data, wherein the information, which receives address, can be mail reception Address is also possible to short message and receives address etc..
S50: the journal file in preset log library is cleared up using preset processing scheme.
In the present embodiment, the journal file in preset log library includes but is not limited to access log, security log, is System log, DNS service log, FTP connection log and HTTP transaction log etc., preset processing scheme is for monitored object The scheme cleared up of journal file, pre-set log for clearance is deleted, with the memory space of release monitored object.
Wherein, log for clearance can be specifically configured according to the importance degree of journal file, for example, FTP connection The importance degree of log is lower, can set log for clearance for FTP connection log.Alternatively, log for clearance can also be with It is configured according to the storage time of journal file, for example, the journal file by storage time greater than one week is set as clearance Log, specific log for clearance can be configured according to the needs of practical application, herein with no restrictions.
It is understood that in application system, log amount that the monitored object of web access generates daily is provided very Greatly, monitored object occur off-capacity abnormal conditions be typically due to log amount of storage it is excessive cause, if right not in time Journal file is cleared up, then will affect the disk size of monitored object.
In the corresponding embodiment of Fig. 2, monitored object is tested by using preset pressure test mode, is obtained The capacity peak value of monitored object determines the maximum service performance that the monitored object of application system can be provided, and according to capacity peak The capacity threshold of value setting monitored object, improves the accuracy of the capacity threshold of setting, using monitoring tools to monitored object Capacity is monitored, and obtains the real time capacity data of monitored object in real time, realizes the automatic monitoring to the capacity of monitored object, when When detecting that real time capacity data are more than capacity threshold, from preset log library, the real time access log of monitored object is obtained, It is further compared using real time access log corresponding response time and preset response time threshold value, and is visited in real time In the case where asking that the log corresponding response time is greater than preset response time threshold value, the information of abnormal capacity alarm is issued, and The capacity of Shi Faxian monitored object is abnormal, improves the accuracy of capacity abnormality alarming, meanwhile, using preset processing scheme to day Journal file in will library is cleared up, and the memory headroom of monitored object is discharged, and is improved the maintenance to the capacity of monitored object and is imitated Rate, to improve the level of intelligence to the capacity monitor of monitored object in application system.
In one embodiment, journal file includes Log Types and logging time, and the present embodiment is to mentioned in step S50 The concrete methods of realizing that the journal file in preset log library is cleared up using preset processing scheme carry out it is detailed Explanation.
Referring to Fig. 3, Fig. 3 shows a specific flow chart of step S50, details are as follows:
S501: the target type of log to be processed is determined according to preset processing scheme.
Specifically, log to be processed refers to the log text for needing to carry out classified compression in monitored object or deleting processing Part, journal file include Log Types and logging time, and the file designation rule of different types of journal file is different, log text The title of part can corresponding mark Log Types, server-side can according to journal file name determine journal file log Type, wherein target type is pre-set Log Types in preset processing scheme, indicates that server-side is needed to belonging to this The journal file of target type is cleared up, and the target type of log to be processed specifically set according to business It sets, herein with no restrictions.
S502: if the Log Types of journal file belong to target type, which is identified as log to be processed.
Specifically, the Log Types of the journal file in the preset log library of traversal queries, if the log class of journal file Type belongs to target type, then the journal file is identified as log to be processed, indicates that the journal file needs to carry out classified compression Or delete processing.
S503: according to the logging time of log to be processed, the storage time of log to be processed is determined.
Specifically, logging time indicates the generation time of journal file, and the life of journal file is subtracted using the current time The storage time of log to be processed is obtained at the time, that is, indicates the storage duration of log to be processed.
For example, 0 dividing 0 second when the current time is 1 day 1 October in 2015, the logging time of a log to be processed is 2015 0 divides 0 second when on September 30,1, then the storage time of log to be processed is one.
S504: the log to be processed that storage time is greater than preset storage time threshold value is deleted.
Specifically, preset storage time threshold value is the storage term of validity of log to be processed, storage time threshold value tool Body can be set to 10 days, may be set to be 20 days, can specifically be configured according to the needs of practical application, if to be processed The corresponding storage time of log is more than preset storage time threshold value, and server-side then deletes the log to be processed, release monitoring The memory space of object.
S505: the log to be processed for being less than or equal to preset storage time threshold value to storage time is compressed.
Specifically, if storage time is less than or equal to the log to be processed of preset storage time threshold value into compression, Indicate that log to be processed was in term of validity, server-side is using preset compress mode to be processed within term of validity Log is compressed, by same type of log compression to be processed into same compressed file, for example, using GZIP compressing file Tool encodes log to be processed, and multiplicity present in log to be processed, redundancy are effectively reduced, to reach The purpose of data compression.
In the corresponding embodiment of Fig. 3, by obtaining the log to be processed in the corresponding log library of monitored object, according to The logging time for handling log, determines the storage time of log to be processed, and judge whether log to be processed is expired, when by storing Between be greater than preset storage time threshold value log to be processed delete, so as to by the journal file of inessential property delete, release Put the memory space of monitored object, and to storage time be less than or equal to the log to be processed of preset storage time threshold value into Row compression, saves the memory space of monitored object, improves the maintenance efficiency of the capacity of server.
In one embodiment, after step S50, i.e., in the preset processing scheme of use to the day in preset log library After will file is cleared up, the capacity monitor method further include:
Dilatation processing is carried out to monitored object using preset dilatation scheme.
Specifically, preset dilatation scheme is the processing mode expanded for the capacity to monitored object, server-side Disk size, content capacity or the cpu resource etc. that monitored object can be expanded using the preset dilatation scheme, improve monitoring The service performance of object, for example, by increase monitored object in number of servers, storage disk quantity, access bandwidth quantity, Or the modes such as server computational power carry out dilatation maintenance to monitored object, to guarantee that application system can provide just for user Normal access service.
In the present embodiment, by carrying out dilatation processing to monitored object, the exception for the off-capacity that solution occurs in time, The abnormal maintenance efficiency of the off-capacity occurred to monitored object is improved, and improves the service performance of application system, so that Application system can provide normal access service for user.
In one embodiment, as shown in figure 4, abnormal capacity alarm includes disk size alarm, memory size alarm and CPU Resource alarm, the present embodiment carry out monitored object using preset dilatation scheme to mentioned in above-mentioned capacity monitor method The concrete methods of realizing of dilatation processing is described in detail, and details are as follows:
S601: if it is disk size alarm or memory size alarm that abnormal capacity, which alerts, according to preset longitudinal expansion Appearance scheme carries out dilatation processing to monitored object.
In the present embodiment, abnormal capacity alarm includes that disk size alarm, memory size alarm and cpu resource alert, If the abnormal capacity alarm that server-side generates is disk size alarm or memory size alarm, then it represents that the disk of monitored object Capacity or memory size are more than the capacity threshold that server-side is monitored object setting, and server-side can be expanded using preset longitudinal direction The scheme of appearance carries out dilatation to monitored object, for example, can add pre- when the disk array of monitored object reaches storage cap First configured disk array improves the hardware configuration of monitored object with the disk size of expanding monitoring object, to improve prison Control the memory capacity of object.
S602: if the alarm of abnormal capacity is that cpu resource alerts, according to preset lateral dilatation scheme to monitored object into Row dilatation processing.
Specifically, if the abnormal capacity alarm that server-side generates is that cpu resource alerts, then it represents that the CPU of monitored object is provided Source utilization rate is more than capacity threshold, and server-side can carry out dilatation to application system using the scheme of lateral dilatation, for example, to answer Increase a pre-configured server with system, a greater amount of access requests is supported using more node servers, from And mitigate the cpu load pressure of monitored object, improve the access service provision capacity of application system.
It should be noted that it should be noted that there is no inevitable successively execution suitable between step S601 and step S602 Sequence is also possible to the relationship executed side by side, herein with no restrictions.
In the corresponding embodiment of Fig. 4, by detecting the concrete type of abnormal capacity alarm, corresponding dilatation scheme is obtained Dilatation processing is carried out to monitored object, improves the software and hardware configuration of monitored object, and improves the capacity occurred to monitored object not The abnormal maintenance efficiency of foot enables application system to provide normal access service for user, thus the service of application system Performance.
In one embodiment, as shown in figure 5, after step S30, and before step S40, if that is, in the detection It is more than capacity threshold to real time capacity data, then from preset log library, after the real time access log for obtaining monitored object, And if it is greater than preset response time threshold value in the response time of real time access request, it carries out abnormal capacity and alerts it Before, the capacity monitor method further include:
S31: the access type of real time access request in real time access log is obtained, wherein the access type includes static state Resource request and dynamic resource request.
In the present embodiment, static resource request refers to that client sends the access that static resource is requested to monitored object Request, monitored object obtains designed HTML from the memory of monitored object, and (HyperText Markup Language surpasses Text mark up language) page returns to client.Dynamic resource request refers to that client sends dynamic resource to monitored object and asks The access request asked, monitored object need to connect database, after running processing data by database, will handle obtained content Monitored object is submitted to, Content Transformation is again that html page returns to client by monitored object.
Specifically, real time access log includes the response time of access request and access request, and server-side can be to real-time The access type of access request is detected in access log, obtains the access type of real time access log.
S32: if the access type of real time access request is static resource request, static resource is requested into corresponding static state Response time threshold value is as preset response time threshold value.
Specifically, server-side can be arranged static resource and ask according to the hardware configuration information of monitored object in monitored object Corresponding steady-error coefficient time threshold is sought, the hardware configuration of monitored object is higher, when static resource requests corresponding steady-error coefficient Between threshold value can be set smaller.Can it be static state that server-side can distinguish monitored object according to steady-error coefficient time threshold Resource request provides normal access service and rings static state if the access type of real time access request is static resource request Answer time threshold as preset response time threshold value, for being compared with the real-time response time in real time access log.
S33: if the access type of real time access request is dynamic resource request, dynamic resource is requested into corresponding dynamic Response time threshold value is as preset response time threshold value.
Specifically, server-side can be arranged dynamic resource and ask according to the hardware configuration information of monitored object in monitored object Corresponding dynamic response time threshold value is sought, the hardware configuration of monitored object is higher, when dynamic resource requests corresponding dynamic response Between threshold value can be set smaller.Can it be dynamic that server-side can distinguish monitored object according to dynamic response time threshold value Resource request provides normal access service and rings dynamic if the access type of real time access request is dynamic resource request Answer time threshold as preset response time threshold value, for being compared with the real-time response time in real time access log.
In the corresponding embodiment of Fig. 5, by obtaining the access type of access request in real time access log, and according to reality When access log access type carry out obtaining response time threshold value, use the response time threshold value that gets and real time access day The real-time response time in will is compared, so that the accuracy analyzed the real-time response time of monitored object is higher, To improve the accuracy of abnormal capacity monitor.
In one embodiment, as shown in fig. 6, before step S31, i.e., real time access is asked in obtaining real time access log Before the access type asked, the capacity monitor method further include:
S34: from preset log library, the history access log of monitored object is obtained, wherein the history access log packet Include the response time of history access request and history access request.
In the present embodiment, preset log library is the database for storing the access log of monitored object, server-side History access log can be obtained from preset log library, wherein the history access log includes but is not limited to history access The response time of request and history access request, history access request refer to the request content submitted with user orientation server, history The response time of access request refers to server from when receiving consumed by history access request to the response for completing request content It is long.
S35: the access type of history access request is obtained, and the access type of history access request is asked for static resource The history access log asked is saved in static log and concentrates, and by the access type of history access request is that dynamic resource is requested History access log be saved in dynamic log concentration.
Specifically, in each history access log, server-side detects the access type of history access request, will The access type of history access request is that the history access log storage of static resource request is concentrated to static log, and will be gone through The access type of history access request is that the history access log storage of dynamic resource request is concentrated to dynamic log, wherein static Log collection and dynamic log collection are the pre-set file storage of server-side.
S36: calculating the average value of the response time for the history access request that static log is concentrated, and should by what is be calculated Average value is as steady-error coefficient time threshold.
Specifically, the history access log corresponding response time that server-side is concentrated by the static log of calculating is averaged Value, and corresponding steady-error coefficient time threshold is requested using the average value being calculated as static resource, it is used for Differentiated Services device It can request to provide normal access service for static resource.
S37: calculating the average value of the response time for the history access request that dynamic log is concentrated, and should by what is be calculated Average value is as dynamic response time threshold value.
Specifically, the history access log corresponding response time that server-side is concentrated by calculating dynamic log is averaged Value, and corresponding dynamic response time threshold value is requested using the average value being calculated as dynamic resource, it is used for Differentiated Services device It can request to provide normal access service for dynamic resource.
For example, dynamic log is concentrated including five history access logs, and the corresponding response of five history access logs Time is respectively 10S, 12S, 15S, 10S and 18S, when the response of the history access log of the second log concentration is obtained by calculation Between average value are as follows: (10s+12s+15s+10s+18s) ÷ 5=13s, then dynamic resource requests corresponding dynamic response time threshold Value is 13S.
In the corresponding embodiment of Fig. 6, by obtaining history access log, and according to the corresponding access of history access log Type is classified, and the history access log storage that access type is static resource request is concentrated to static log, and will Access type is that the history access log storage of dynamic resource request is concentrated to dynamic log, is concentrated by the static log of calculating The average value of history access log corresponding response time determines steady-error coefficient time threshold, meanwhile, by calculating dynamic log The average value of the response time of the history access log of concentration, determines dynamic response time threshold value, so that the response of access request The setting of time threshold is more accurate.
It should be understood that the size of the serial number of each step is not meant that the order of the execution order in above-described embodiment, each process Execution sequence should be determined by its function and internal logic, the implementation process without coping with the embodiment of the present invention constitutes any limit It is fixed.
In one embodiment, a kind of capacity monitor device is provided, capacity is supervised in the capacity monitor device and above-described embodiment Prosecutor method corresponds.As shown in fig. 7, the capacity monitor device includes: pressure test module 71, capacity check module 72, day Will obtains module 73, abnormality alarming module 74 and log cleaning modul 75.Detailed description are as follows for each functional module:
Pressure test module 71 is monitored for being tested using preset pressure test mode monitored object The capacity peak value of object, and according to the capacity threshold of capacity peak value setting monitored object;
Capacity check module 72 is obtained in real time for being detected using capacity of the preset monitoring tools to monitored object Take the real time capacity data of monitored object;
Log acquisition module 73, if for detecting that real time capacity data are more than capacity threshold, from preset log library In, obtain the real time access log of monitored object, wherein the real time access log includes that real time access request and real time access are asked The response time asked;
Abnormality alarming module 74, if the response time for real time access request is greater than preset response time threshold value, Carry out abnormal capacity alarm;
Log cleaning modul 75, it is clear for using preset processing scheme to carry out the journal file in preset log library Reason.
Further, journal file includes Log Types and logging time, and log cleaning modul 65 includes:
Type acquisition submodule 7501, for determining the target type of log to be processed according to preset processing scheme;
File identification submodule 7502, if the Log Types for journal file belong to target type, by log text Part is identified as log to be processed;
Time computational submodule 7503 determines the storage of log to be processed for the logging time according to log to be processed Time;
Submodule 7504 is deleted in log, and the log to be processed for storage time to be greater than preset storage time threshold value is deleted It removes;
Log compression submodule 7505, for storage time be less than or equal to preset storage time threshold value wait locate Reason log is compressed.
Further, the capacity monitor device further include:
Dilatation module 76, for carrying out dilatation processing to monitored object using preset dilatation scheme.
Further, abnormal capacity alarm includes disk size alarm, memory size alarm and cpu resource alarm, dilatation Module 76 includes:
Lateral dilatation submodule 761, if being used for abnormal capacity alarm is that disk size alarm or memory size alert, Dilatation processing is carried out to monitored object according to preset longitudinal dilatation scheme;
Longitudinal dilatation submodule 762 laterally expands if being that cpu resource is alerted for abnormal capacity alarm according to preset Appearance scheme carries out dilatation processing to monitored object.
Further, the capacity monitor device further include:
Log query module 731, for obtaining the access type that real time access is requested in real time access log, wherein should Access type includes static resource request and dynamic resource request;
First setup module 732 provides static state if the access type for real time access request is static resource request Request corresponding steady-error coefficient time threshold as preset response time threshold value in source;
Second setup module 733 provides dynamic if the access type for real time access request is dynamic resource request Request corresponding dynamic response time threshold value as preset response time threshold value in source.
Further, the capacity monitor device further include:
Data acquisition module 734, for obtaining the history access log of monitored object from preset log library, wherein The history access log includes the response time of history access request and history access request;
Log categorization module 735, for obtaining the access type of history access request, and by the access of history access request Type is that the history access log of static resource request is saved in static log and concentrates, and by the access class of history access request Type is that the history access log of dynamic resource request is saved in dynamic log concentration;
First computing module 736, the average value of the response time for calculating the history access request that static log is concentrated, And using the average value being calculated as steady-error coefficient time threshold;
Second computing module 737, the average value of the response time of the history access request for calculating dynamic log concentration, And using the average value being calculated as dynamic response time threshold value.
Specific about capacity monitor device limits the restriction that may refer to above for capacity monitor method, herein not It repeats again.Modules in above-mentioned capacity monitor device can be realized fully or partially through software, hardware and combinations thereof.On Stating each module can be embedded in the form of hardware or independently of in the processor in computer equipment, can also store in a software form In memory in computer equipment, the corresponding operation of the above modules is executed in order to which processor calls.
In one embodiment, a kind of computer equipment is provided, which can be server, internal junction Composition can be as shown in Figure 8.The computer equipment include by system bus connect processor, memory, network interface and Database.Wherein, the processor of the computer equipment is for providing calculating and control ability.The memory packet of the computer equipment Include non-volatile memory medium, built-in storage.The non-volatile memory medium is stored with operating system, computer program and data Library.The built-in storage provides environment for the operation of operating system and computer program in non-volatile memory medium.The calculating The network interface of machine equipment is used to communicate with external terminal by network connection.When the computer program is executed by processor with Realize a kind of capacity monitor method.
In one embodiment, a kind of computer equipment is provided, including memory, processor and storage are on a memory And the computer program that can be run on a processor, processor realize capacity monitor in above-described embodiment when executing computer program Step in method, such as step S10 shown in Fig. 2 to step S50, alternatively, processor is realized when executing computer program State the function of each module of capacity monitor device in embodiment, such as module 71 shown in Fig. 7 is to the function of module 75.To avoid weight Multiple, which is not described herein again.
In one embodiment, a kind of computer readable storage medium is provided, computer program is stored thereon with, is calculated Machine program realizes the step in above-described embodiment in capacity monitor method, such as step S10 shown in Fig. 2 when being executed by processor To step S60, alternatively, processor realizes the function of each module of capacity monitor device in above-described embodiment when executing computer program Can, such as module 71 shown in Fig. 7 is to the function of module 75.To avoid repeating, which is not described herein again.
Those of ordinary skill in the art will appreciate that realizing all or part of the process in above-described embodiment method, being can be with Relevant hardware is instructed to complete by computer program, the computer program can be stored in a non-volatile computer In read/write memory medium, the computer program is when being executed, it may include such as the process of the embodiment of above-mentioned each method.Wherein, To any reference of memory, storage, database or other media used in each embodiment provided herein, Including non-volatile and/or volatile memory.Nonvolatile memory may include read-only memory (ROM), programming ROM (PROM), electrically programmable ROM (EPROM), electrically erasable ROM (EEPROM) or flash memory.Volatile memory may include Random access memory (RAM) or external cache.By way of illustration and not limitation, RAM is available in many forms, Such as static state RAM (SRAM), dynamic ram (DRAM), synchronous dram (SDRAM), double data rate sdram (DDRSDRAM), enhancing Type SDRAM (ESDRAM), synchronization link (Synchlink) DRAM (SLDRAM), memory bus (Rambus) direct RAM (RDRAM), direct memory bus dynamic ram (DRDRAM) and memory bus dynamic ram (RDRAM) etc..
It is apparent to those skilled in the art that for convenience of description and succinctly, only with above-mentioned each function Can unit, module division progress for example, in practical application, can according to need and by above-mentioned function distribution by different Functional unit, module are completed, i.e., the internal structure of described device is divided into different functional unit or module, more than completing The all or part of function of description.
Embodiment described above is merely illustrative of the technical solution of the present invention, rather than its limitations;Although referring to aforementioned reality Applying example, invention is explained in detail, those skilled in the art should understand that: it still can be to aforementioned each Technical solution documented by embodiment is modified or equivalent replacement of some of the technical features;And these are modified Or replacement, the spirit and scope for technical solution of various embodiments of the present invention that it does not separate the essence of the corresponding technical solution should all It is included within protection scope of the present invention.

Claims (10)

1. a kind of capacity monitor method, which is characterized in that the capacity monitor method includes:
Monitored object is tested using preset pressure test mode, obtains the capacity peak value of the monitored object, and root The capacity threshold of the monitored object is set according to the capacity peak value;
It is detected using capacity of the preset monitoring tools to the monitored object, obtains the real-time of the monitored object in real time Capacity data;
If detecting, the real time capacity data are more than that the capacity threshold obtains the monitoring from preset log library The real time access log of object, wherein the real time access log includes that real time access request and the real time access are requested Response time;
If the response time of the real time access request is greater than preset response time threshold value, abnormal capacity alarm is carried out;
The journal file in the preset log library is cleared up using preset processing scheme.
2. capacity monitor method as described in claim 1, which is characterized in that the journal file includes Log Types and log Time, it is described using preset processing scheme to the journal file in the preset log library carry out cleaning include:
The target type of log to be processed is determined according to the preset processing scheme;
If the Log Types of the journal file belong to the target type, which is identified as described wait locate Manage log;
According to the logging time of the log to be processed, the storage time of the log to be processed is determined;
The log to be processed that the storage time is greater than preset storage time threshold value is deleted;
The log to be processed for being less than or equal to the preset storage time threshold value to the storage time is compressed.
3. capacity monitor method as described in claim 1, which is characterized in that if in the response of real time access request Time is greater than preset response time threshold value, then after carrying out abnormal capacity alarm, the capacity monitor method further include:
Dilatation processing is carried out to the monitored object using preset dilatation scheme.
4. capacity monitor method as described in claim 1, which is characterized in that the exception capacity alarm includes that disk size is accused Alert, memory size alarm and cpu resource alarm, it is described that dilatation processing is carried out to the monitored object using preset dilatation scheme Include:
If the exception capacity alarm is disk size alarm or memory size alarm, according to preset longitudinal direction Dilatation scheme carries out dilatation processing to the monitored object;
If the exception capacity alarm is that the cpu resource alerts, according to preset lateral dilatation scheme to the monitoring pair As carrying out dilatation processing.
5. capacity monitor method as described in claim 1, which is characterized in that if detecting the real time capacity data described More than the capacity threshold, then from preset log library, after the real time access log for obtaining the monitored object, and If the response time of the real time access request is greater than preset response time threshold value, carries out abnormal capacity and alert it Before, the capacity monitor method further include:
Obtain the access type of the request of real time access described in the real time access log, wherein the access type includes quiet State resource request and dynamic resource request;
If the access type of the real time access request is static resource request, the static resource is requested corresponding Steady-error coefficient time threshold is as the preset response time threshold value;
If the access type of the real time access request is dynamic resource request, the dynamic resource is requested corresponding Dynamic response time threshold value is as the preset response time threshold value.
6. capacity monitor method as claimed in claim 5, which is characterized in that obtain institute in the real time access log described Before the access type for stating real time access request, the capacity monitor method further include:
From the preset log library, the history access log of the monitored object is obtained, wherein the history access log The response time including the history access request and the history access request;
The access type of the history access request is obtained, and is the static money by the access type of the history access request The history access log of source request is saved in static log and concentrates, and is by the access type of the history access request The history access log of the dynamic resource request is saved in dynamic log concentration;
The average value of the response time for the history access request that the static log is concentrated is calculated, and will be calculated The average value as the steady-error coefficient time threshold;
The average value of the response time for the history access request that the dynamic log is concentrated is calculated, and will be calculated The average value as the dynamic response time threshold value.
7. a kind of capacity monitor device, which is characterized in that the capacity monitor device includes:
Pressure test module obtains the monitoring pair for testing using preset pressure test mode monitored object The capacity peak value of elephant, and the capacity threshold of the monitored object is set according to the capacity peak value;
Capacity check module is obtained in real time for being detected using capacity of the preset monitoring tools to the monitored object The real time capacity data of the monitored object;
Log acquisition module, if for detecting that the real time capacity data are more than the capacity threshold, from preset log In library, the real time access log of the monitored object is obtained, wherein the real time access log includes real time access request and institute State the response time of real time access request;
Abnormality alarming module, if the response time for real time access request is greater than preset response time threshold value, into Row exception capacity alarm;
Log cleaning modul, it is clear for using preset processing scheme to carry out the journal file in the preset log library Reason.
8. capacity monitor device as claimed in claim 7, which is characterized in that the log cleaning modul includes:
Type acquisition submodule, for determining the target type of log to be processed according to the preset processing scheme;
File identification submodule, if the Log Types for the journal file belong to the target type, by the day Will file identification is the log to be processed;
Time computational submodule determines the log to be processed for the logging time according to the log to be processed Storage time;
Submodule is deleted in log, and the log to be processed for the storage time to be greater than preset storage time threshold value is deleted It removes;
Log compression submodule, for being less than or equal to described in the preset storage time threshold value to the storage time Log to be processed is compressed.
9. a kind of computer equipment, including memory, processor and storage are in the memory and can be in the processor The computer program of upper operation, which is characterized in that the processor realized when executing the computer program as claim 1 to Any one of 6 capacity monitor methods.
10. a kind of computer readable storage medium, the computer-readable recording medium storage has computer program, and feature exists In realization capacity monitor method as described in any one of claim 1 to 6 when the computer program is executed by processor.
CN201910208505.XA 2019-03-19 2019-03-19 Capacity monitoring method and device, computer equipment and storage medium Active CN110113224B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910208505.XA CN110113224B (en) 2019-03-19 2019-03-19 Capacity monitoring method and device, computer equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910208505.XA CN110113224B (en) 2019-03-19 2019-03-19 Capacity monitoring method and device, computer equipment and storage medium

Publications (2)

Publication Number Publication Date
CN110113224A true CN110113224A (en) 2019-08-09
CN110113224B CN110113224B (en) 2022-08-09

Family

ID=67484403

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910208505.XA Active CN110113224B (en) 2019-03-19 2019-03-19 Capacity monitoring method and device, computer equipment and storage medium

Country Status (1)

Country Link
CN (1) CN110113224B (en)

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110737593A (en) * 2019-09-19 2020-01-31 平安科技(深圳)有限公司 Intelligent capacity management method, device and storage medium
CN111162965A (en) * 2019-12-17 2020-05-15 杭州迪普科技股份有限公司 Method and device for monitoring Buffer
CN111181812A (en) * 2020-01-03 2020-05-19 四川新网银行股份有限公司 Link fault detection method based on network flow
CN111651170A (en) * 2020-05-29 2020-09-11 平安医疗健康管理股份有限公司 Instance dynamic adjustment method and device and related equipment
WO2021073144A1 (en) * 2019-10-18 2021-04-22 平安科技(深圳)有限公司 Distributed file system monitoring method and device, terminal, and storage medium
CN112732999A (en) * 2021-01-21 2021-04-30 建信金融科技有限责任公司 Static disaster recovery method, system, electronic device and storage medium
CN112965658A (en) * 2021-02-04 2021-06-15 许亮 Disk IO processing method and system
CN113434135A (en) * 2021-06-28 2021-09-24 青岛海尔科技有限公司 Interface call repetition determination method and device, storage medium and electronic device
CN113630327A (en) * 2021-10-12 2021-11-09 北京每日优鲜电子商务有限公司 Flow control method and device, electronic equipment and computer readable medium
CN113900906A (en) * 2021-10-28 2022-01-07 北京达佳互联信息技术有限公司 Log capacity determination method and device, electronic equipment and storage medium
CN117112331A (en) * 2023-08-30 2023-11-24 贝壳找房(北京)科技有限公司 Method for generating pressure measurement prompt, electronic equipment, storage medium and computer program product

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160164912A1 (en) * 2014-12-09 2016-06-09 Fortinet, Inc. Near real-time detection of denial-of-service attacks
CN106817253A (en) * 2017-01-04 2017-06-09 郑州云海信息技术有限公司 The monitor in real time of journal file and the method and system of alarm
CN107241229A (en) * 2017-07-03 2017-10-10 北京奇安信科技有限公司 A kind of business monitoring method and device based on interface testing instrument
CN108234199A (en) * 2017-12-20 2018-06-29 中国联合网络通信集团有限公司 Monitoring method, apparatus and system based on Kafka
CN108255884A (en) * 2016-12-29 2018-07-06 大唐移动通信设备有限公司 A kind of data processing method and device of the log information of OMC
CN109284267A (en) * 2018-09-26 2019-01-29 深圳壹账通智能科技有限公司 Blog management method and terminal device based on abnormal monitoring

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160164912A1 (en) * 2014-12-09 2016-06-09 Fortinet, Inc. Near real-time detection of denial-of-service attacks
CN108255884A (en) * 2016-12-29 2018-07-06 大唐移动通信设备有限公司 A kind of data processing method and device of the log information of OMC
CN106817253A (en) * 2017-01-04 2017-06-09 郑州云海信息技术有限公司 The monitor in real time of journal file and the method and system of alarm
CN107241229A (en) * 2017-07-03 2017-10-10 北京奇安信科技有限公司 A kind of business monitoring method and device based on interface testing instrument
CN108234199A (en) * 2017-12-20 2018-06-29 中国联合网络通信集团有限公司 Monitoring method, apparatus and system based on Kafka
CN109284267A (en) * 2018-09-26 2019-01-29 深圳壹账通智能科技有限公司 Blog management method and terminal device based on abnormal monitoring

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
张乐君: "磁盘容量远程监控程序的设计与实现", 《铁路计算机应用》 *

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110737593B (en) * 2019-09-19 2022-03-29 平安科技(深圳)有限公司 Intelligent capacity management method, device and storage medium
CN110737593A (en) * 2019-09-19 2020-01-31 平安科技(深圳)有限公司 Intelligent capacity management method, device and storage medium
WO2021073144A1 (en) * 2019-10-18 2021-04-22 平安科技(深圳)有限公司 Distributed file system monitoring method and device, terminal, and storage medium
CN111162965A (en) * 2019-12-17 2020-05-15 杭州迪普科技股份有限公司 Method and device for monitoring Buffer
CN111181812A (en) * 2020-01-03 2020-05-19 四川新网银行股份有限公司 Link fault detection method based on network flow
CN111651170A (en) * 2020-05-29 2020-09-11 平安医疗健康管理股份有限公司 Instance dynamic adjustment method and device and related equipment
CN112732999A (en) * 2021-01-21 2021-04-30 建信金融科技有限责任公司 Static disaster recovery method, system, electronic device and storage medium
CN112732999B (en) * 2021-01-21 2023-06-09 建信金融科技有限责任公司 Static disaster recovery method, system, electronic equipment and storage medium
CN112965658A (en) * 2021-02-04 2021-06-15 许亮 Disk IO processing method and system
CN113434135A (en) * 2021-06-28 2021-09-24 青岛海尔科技有限公司 Interface call repetition determination method and device, storage medium and electronic device
CN113434135B (en) * 2021-06-28 2023-06-16 青岛海尔科技有限公司 Method and device for determining call repeatability of interface, storage medium and electronic device
CN113630327B (en) * 2021-10-12 2022-02-18 北京每日优鲜电子商务有限公司 Flow control method and device, electronic equipment and computer readable medium
CN113630327A (en) * 2021-10-12 2021-11-09 北京每日优鲜电子商务有限公司 Flow control method and device, electronic equipment and computer readable medium
CN113900906A (en) * 2021-10-28 2022-01-07 北京达佳互联信息技术有限公司 Log capacity determination method and device, electronic equipment and storage medium
CN117112331A (en) * 2023-08-30 2023-11-24 贝壳找房(北京)科技有限公司 Method for generating pressure measurement prompt, electronic equipment, storage medium and computer program product

Also Published As

Publication number Publication date
CN110113224B (en) 2022-08-09

Similar Documents

Publication Publication Date Title
CN110113224A (en) Capacity monitor method, apparatus, computer equipment and storage medium
CN109522287B (en) Monitoring method, system, equipment and medium for distributed file storage cluster
US10785131B2 (en) Method and system for synchronous and asynchronous monitoring
CN109729131B (en) Application request processing method and device and router
US8725844B2 (en) Method and system for adjusting the relative value of system configuration recommendations
CN108563544A (en) System performance testing method, apparatus, computer equipment and storage medium
US8204719B2 (en) Methods and systems for model-based management using abstract models
WO2019128299A1 (en) Test system and test method
CN110569222B (en) Link tracking method and device, computer equipment and readable storage medium
EP3809269B1 (en) Monitoring a distributed application server environment
CN102255776A (en) Method and device for monitoring state of on-line application
CN109062769B (en) Method, device and equipment for predicting IT system performance risk trend
CN112182089B (en) Report generation method, device and equipment based on data warehouse model
CN108259266A (en) Web site performance monitoring method and system
US20170199800A1 (en) System and method for comprehensive performance and availability tracking using passive monitoring and intelligent synthetic transaction generation in a transaction processing system
CN112866319B (en) Log data processing method, system and storage medium
CN110674149B (en) Service data processing method and device, computer equipment and storage medium
CN105262634A (en) Monitoring threshold generation method, device and system
CN112433908B (en) Method, system, device and medium for determining interval time of detection server
CN113419950A (en) Method and device for generating UI automation script, computer equipment and storage medium
CN103885877A (en) Method and device for generating simulation browser testing script of HTTP
US20230053592A1 (en) Performance profiler of third party automations
CN114528179B (en) Data acquisition program state monitoring method, device, equipment and storage medium
CN112860763B (en) Real-time streaming data processing method and device, computer equipment and storage medium
CN114598622A (en) Data monitoring method and device, storage medium and computer equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant