CN110138634B - Key data monitoring method and terminal - Google Patents

Key data monitoring method and terminal Download PDF

Info

Publication number
CN110138634B
CN110138634B CN201910265472.2A CN201910265472A CN110138634B CN 110138634 B CN110138634 B CN 110138634B CN 201910265472 A CN201910265472 A CN 201910265472A CN 110138634 B CN110138634 B CN 110138634B
Authority
CN
China
Prior art keywords
data
key data
key
message middleware
data request
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910265472.2A
Other languages
Chinese (zh)
Other versions
CN110138634A (en
Inventor
刘德建
林伟
郭玉湖
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Fujian Tianquan Educational Technology Ltd
Original Assignee
Fujian Tianquan Educational Technology Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Fujian Tianquan Educational Technology Ltd filed Critical Fujian Tianquan Educational Technology Ltd
Priority to CN202110040419.XA priority Critical patent/CN112910683B/en
Priority to CN201910265472.2A priority patent/CN110138634B/en
Priority to CN202110040430.6A priority patent/CN112910684B/en
Publication of CN110138634A publication Critical patent/CN110138634A/en
Application granted granted Critical
Publication of CN110138634B publication Critical patent/CN110138634B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/06Management of faults, events, alarms or notifications
    • H04L41/0631Management of faults, events, alarms or notifications using root cause analysis; using analysis of correlation between notifications, alarms or events based on decision criteria, e.g. hierarchy, tree or time analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/08Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
    • H04L43/0823Errors, e.g. transmission errors
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange

Abstract

The invention discloses a method and a terminal for monitoring key data, which collect all data requests through a real-time streaming platform, send return data corresponding to all the data requests to a message middleware, acquire corresponding key data from the message middleware according to key data request information acquired from the real-time streaming platform, and judge whether the key data is normal, and are different from the prior art which can only monitor related data of the same service process.

Description

Key data monitoring method and terminal
Technical Field
The invention relates to the technical field of data monitoring, in particular to a method and a terminal for monitoring key data.
Background
Modern internet products are mostly used through clients, and each client corresponds to a respective server. Usually, each server runs a separate item, and some servers or microservices may be aggregated into one item, which is a variety of situations.
When the system is in normal operation, the abnormal condition of the service data may occur, and in order to find the abnormal condition in operation in time, many systems have monitoring systems. In these monitoring systems, especially for monitoring in a micro-service scenario, it is generally only done to monitor service-related service information corresponding to the monitoring system itself, for example, only monitor information such as CPU and memory resources of the monitoring system itself and thread pool, total number of threads, and utilization rate of the monitoring system itself, and at most there may be some service data monitoring for the monitoring system itself, such as data format, type, and whether it is in a data standard format, and there is no monitoring method for full-flow key service data in a micro-service scenario, which is not perfect at present.
Disclosure of Invention
The technical problem to be solved by the invention is as follows: the method and the terminal for monitoring the key data can monitor the key business data of the whole process and improve the efficiency.
In order to solve the technical problems, the invention adopts a technical scheme that:
a method for monitoring key data comprises the following steps:
s1, collecting all data requests through a real-time streaming platform, and sending data returned according to the data requests to a message middleware;
s2, obtaining preset important data request information from the real-time streaming platform, obtaining corresponding important data from the message middleware according to the important data request information, and judging whether the important data are normal or not.
In order to solve the technical problem, the invention adopts another technical scheme as follows:
a monitoring terminal of important data comprises a memory, a processor and a computer program which is stored on the memory and can run on the processor, wherein the processor executes the computer program to realize the following steps:
s1, collecting all data requests through a real-time streaming platform, and sending data returned according to the data requests to a message middleware;
s2, obtaining preset important data request information from the real-time streaming platform, obtaining corresponding important data from the message middleware according to the important data request information, and judging whether the important data are normal or not.
The invention has the beneficial effects that: the method comprises the steps of collecting all data requests through a real-time streaming platform, sending return data corresponding to all the data requests to a message middleware, obtaining corresponding key data from the message middleware according to key data request information obtained from the real-time streaming platform, and judging whether the key data are normal or not, wherein the method is different from the prior art which can only monitor related data of the same service process.
Drawings
Fig. 1 is a flowchart illustrating steps of a method for monitoring key data according to an embodiment of the present invention;
fig. 2 is a schematic structural diagram of a monitoring terminal for important data according to an embodiment of the present invention;
fig. 3 is a relationship diagram of modules in a method for monitoring key data according to an embodiment of the present invention;
description of reference numerals:
1. a monitoring terminal of key data; 2. a memory; 3. a processor.
Detailed Description
In order to explain technical contents, achieved objects, and effects of the present invention in detail, the following description is made with reference to the accompanying drawings in combination with the embodiments.
The most key idea of the invention is that a real-time streaming platform collects all data requests, a message middleware collects return data corresponding to all data requests, and corresponding key data is obtained from the message middleware according to key data request information obtained from the real-time streaming platform, so as to judge whether the key data is normal.
Referring to fig. 1, a method for monitoring key data includes the steps of:
s1, collecting all data requests through a real-time streaming platform, and sending data returned according to the data requests to a message middleware;
s2, obtaining preset important data request information from the real-time streaming platform, obtaining corresponding important data from the message middleware according to the important data request information, and judging whether the important data are normal or not.
From the above description, the beneficial effects of the present invention are: the method comprises the steps of collecting all data requests through a real-time streaming platform, sending return data corresponding to all the data requests to a message middleware, obtaining corresponding key data from the message middleware according to key data request information obtained from the real-time streaming platform, and judging whether the key data are normal or not, wherein the method is different from the prior art which can only monitor related data of the same service process.
Further, the step S1 of sending the data returned according to the data request to the message middleware includes:
forwarding data returned according to the data request to a gateway through a real-time streaming platform;
and sending the data returned according to the data request to the message middleware through the gateway.
As can be seen from the above description, the real-time streaming platform forwards the returned data to the gateway, and the gateway is used to implement that the returned data is sent from the real-time streaming platform to the message middleware, so that the data can be quickly forwarded, and the efficiency is improved; meanwhile, the data request and the returned data can be separately stored in different modules, so that the subsequent monitoring on a plurality of key data is facilitated.
Further, the data returned according to the data request includes a unique identifier of a corresponding interface;
the step S1 includes:
generating a unique identifier of an interface corresponding to each data request through a gateway;
the step S2 of obtaining information of a preset key data request from the real-time streaming platform includes:
acquiring a corresponding key data request from the real-time streaming platform according to the unique identifier;
determining data items of the key data request;
the step S2 of acquiring the corresponding important data from the message middleware according to the information of the important data request includes:
and acquiring the key data corresponding to the key data request from the message middleware according to the unique identifier and the data item of the key data request.
As can be seen from the above description, by setting the unique identifier, return data corresponding to the key data request, that is, key data, can be conveniently obtained, and subsequent collection and judgment of the key data are facilitated, so that whether the key data are normal or not is effectively monitored; when the key data request is obtained according to the unique identifier, the data item of the key data request needs to be determined, and the corresponding key data is obtained from the message middleware according to the unique identifier and the data item, so that the accuracy of obtaining the key data is ensured, and omission is avoided.
Further, the step S2 of determining whether the important data is normal includes:
and judging whether the key data are in a normal range according to a preset key data calculation rule, and if not, sending alarm information.
According to the description, the key data are judged according to the preset key data rule, so that the method is suitable for various service scenes, is wide in applicability, can be convenient for finding the abnormality of the key data in time, and improves the safety and the accuracy of the service.
Further, the determining, according to a preset key data calculation rule, whether the key data is in a normal range further includes:
verifying whether the key data acquired from the message middleware is key data corresponding to a key interface, if so, judging whether the key data is in a normal range according to a preset key data calculation rule; and if not, re-acquiring the key data corresponding to the key interface.
According to the above description, before judging whether the key data is abnormal according to the preset key data calculation rule, the key data needs to be verified, and only when the key data is determined to be the key data corresponding to the key interface, the abnormality judgment is performed, so that the accuracy of monitoring the key data is further improved.
Referring to fig. 2, a monitoring terminal for important data includes a memory, a processor, and a computer program stored in the memory and capable of running on the processor, where the processor executes the computer program to implement the following steps:
s1, collecting all data requests through a real-time streaming platform, and sending data returned according to the data requests to a message middleware;
s2, obtaining preset important data request information from the real-time streaming platform, obtaining corresponding important data from the message middleware according to the important data request information, and judging whether the important data are normal or not.
From the above description, the beneficial effects of the present invention are: the method comprises the steps of collecting all data requests through a real-time streaming platform, sending return data corresponding to all the data requests to a message middleware, obtaining corresponding key data from the message middleware according to key data request information obtained from the real-time streaming platform, and judging whether the key data are normal or not, wherein the method is different from the prior art which can only monitor related data of the same service process.
Further, the step S1 of sending the data returned according to the data request to the message middleware includes:
forwarding data returned according to the data request to a gateway through a real-time streaming platform;
and sending the data returned according to the data request to the message middleware through the gateway.
As can be seen from the above description, the real-time streaming platform forwards the returned data to the gateway, and the gateway is used to implement that the returned data is sent from the real-time streaming platform to the message middleware, so that the data can be quickly forwarded, and the efficiency is improved; meanwhile, the data request and the returned data can be separately stored in different modules, so that the subsequent monitoring on a plurality of key data is facilitated.
Further, the data returned according to the data request includes a unique identifier of a corresponding interface;
the step S1 includes:
generating a unique identifier of an interface corresponding to each data request through a gateway;
the step S2 of obtaining information of a preset key data request from the real-time streaming platform includes:
acquiring a corresponding key data request from the real-time streaming platform according to the unique identifier;
determining data items of the key data request;
the step S2 of acquiring the corresponding important data from the message middleware according to the information of the important data request includes:
and acquiring the key data corresponding to the key data request from the message middleware according to the unique identifier and the data item of the key data request.
As can be seen from the above description, by setting the unique identifier, return data corresponding to the key data request, that is, key data, can be conveniently obtained, and subsequent collection and judgment of the key data are facilitated, so that whether the key data are normal or not is effectively monitored; when the key data request is obtained according to the unique identifier, the data item of the key data request needs to be determined, and the corresponding key data is obtained from the message middleware according to the unique identifier and the data item, so that the accuracy of obtaining the key data is ensured, and omission is avoided.
Further, the step S2 of determining whether the important data is normal includes:
and judging whether the key data are in a normal range according to a preset key data calculation rule, and if not, sending alarm information.
According to the description, the key data are judged according to the preset key data rule, so that the method is suitable for various service scenes, is wide in applicability, can be convenient for finding the abnormality of the key data in time, and improves the safety and the accuracy of the service.
Further, the determining, according to a preset key data calculation rule, whether the key data is in a normal range further includes:
verifying whether the key data acquired from the message middleware is key data corresponding to a key interface, if so, judging whether the key data is in a normal range according to a preset key data calculation rule; and if not, re-acquiring the key data corresponding to the key interface.
According to the above description, before judging whether the key data is abnormal according to the preset key data calculation rule, the key data needs to be verified, and only when the key data is determined to be the key data corresponding to the key interface, the abnormality judgment is performed, so that the accuracy of monitoring the key data is further improved.
Example one
Referring to fig. 1 and fig. 3, a method for monitoring key data includes the steps of:
after a client requests a uniform gateway interface, a gateway executes service logic to generate a unique identifier of an interface corresponding to each data request;
s1, collecting all data requests through a real-time streaming platform, and sending data returned according to the data requests to a message middleware;
the data returned according to the data request comprises a unique identifier of a corresponding interface;
the returned data of the data request corresponding to the same interface can be conveniently identified through the unique identifier;
specifically, all data requests, that is, requests requiring access to microservices, pass through the real-time streaming platform in advance, and initial data request collection is performed through the real-time streaming platform;
as shown in fig. 3, after the micro service that the data request needs to access returns corresponding data, the real-time streaming platform obtains the data returned according to the data request;
the real-time streaming platform forwards data returned according to the data request to the gateway;
the gateway records all returned data and sends the data returned according to the data request to MQ message middleware;
the gateway sends the returned data to the MQ message middleware in a JSON data format, and specific fields comprise an interface type called by a client, an interface type called by a micro service, data information returned by a micro service interface, a unique identifier corresponding to an interface and the like;
returning the returned data to the client after the gateway sends the returned data to the MQ message middleware;
s2, obtaining preset important data request information from the real-time streaming platform, obtaining corresponding important data from the message middleware according to the important data request information, and judging whether the important data are normal or not.
The method comprises the steps that a key data request is a data request corresponding to a key interface, the key interface is set according to specific services, which interfaces can be configured in a background as the key interfaces, marking is carried out according to URL addresses of the interfaces, the key interface is determined according to the marking in the process of monitoring key data, and a unique identifier corresponding to the key interface is obtained;
specifically, the data monitoring platform acquires key data request parameter information of a corresponding interface from the real-time streaming platform according to the unique identifier, and determines a data item of the key data request;
the data monitoring platform subscribes the key data corresponding to the key data request from the message middleware in real time according to the unique identifier and the data item of the key data request, wherein the key data is all the return fields of the key data request;
when the data monitoring platform receives the subscribed key data, judging whether the key data is in a normal range according to a preset key data calculation rule, if not, sending an alarm message to a notification platform, and notifying related personnel that information needing to be processed by the abnormal data currently exists by the notification platform;
the preset calculation rule of the key data is determined according to a specific business rule, and the normal range of the key data also needs to be set according to the specific business rule, for example, whether the sum of the key data in a preset time is greater than a preset value is judged, so that whether the key data is abnormal or not is determined;
for example, in a financial transaction system, the amount of transactions made by different types of accounts over a fixed period of time needs to be within a certain range, and then the business rules need to be monitored. The account of the small user type is between 8:00 and 16:00 per day, the total amount of expenditure and income of each account is required to be between 0 and 50000, the data is considered to be normal only between 0 and 50000, and the data is considered to be abnormal when the data exceeds the range;
by monitoring each transaction interface, a plurality of batches of operations can exist in each transaction, the data can be paid out or can be received, the data request of the request interface is collected through the real-time streaming platform, and the message middleware records return data corresponding to the data request;
the data monitoring platform subscribes all the return data of the data request of each small user type account corresponding to the transaction interface between 8:00 and 16:00 in real time from the message middleware according to the unique identifier and the data item, wherein the return data is the key data at the moment;
after the data monitoring platform receives the subscribed key data, adding the key data corresponding to each small user type account to realize the calculation of the total transaction amount of each small user type account, and judging whether the total transaction amount of each small user type account is between 0 and 50000, if so, the transaction amount accords with the business rule, and the data is normal; if not, the data is abnormal, abnormal conditions such as account theft or system BUG and the like may occur, alarm information is sent to a notification platform, and the notification platform notifies related personnel that information required to be processed by abnormal data currently exists.
Example two
The difference between the present embodiment and the first embodiment is:
the step of judging whether the key data are in the normal range according to a preset key data calculation rule further comprises the following steps:
verifying whether the key data acquired from the message middleware is key data corresponding to a key interface, if so, judging whether the key data is in a normal range according to a preset key data calculation rule; and if not, re-acquiring the key data corresponding to the key interface.
Specifically, after receiving the subscribed key data, the data monitoring platform verifies in advance whether the received key data is the key data corresponding to the key interface, that is, whether the received key data is the return data of the key data request corresponding to the key interface, if yes, determines whether the key data is in a normal range according to a preset key data calculation rule, and if not, re-acquires the key data corresponding to the key interface, that is, re-executes step S2.
EXAMPLE III
Referring to fig. 2, a monitoring terminal 1 for important data includes a memory 2, a processor 3, and a computer program stored on the memory 2 and capable of running on the processor 3, where the processor 3 implements the steps in the first embodiment when executing the computer program.
Example four
Referring to fig. 2, a monitoring terminal 1 for important data includes a memory 2, a processor 3 and a computer program stored in the memory 2 and capable of running on the processor 3, and the processor 3 implements the steps of the second embodiment when executing the computer program.
In summary, according to the monitoring method and terminal for key data provided by the present invention, all data requests are collected through a real-time streaming platform, return data corresponding to all data requests are sent to a message middleware through a gateway, a data item of a corresponding key data request is determined from the real-time streaming platform according to a unique identifier of an interface, corresponding key data is obtained from the message middleware according to the unique identifier and the data item, whether the key data is normal is determined, an alarm is given in time when the key data is abnormal, different from the prior art that only related data of the same service process can be monitored, the present invention can monitor key service data of a whole flow, realize collection of global data requests and return data without affecting original service logic, can realize fast forwarding of data, and ensure accuracy when obtaining the key data, omission is avoided, whether important data are normal or not can be judged in time, faults caused by data abnormity are avoided, monitoring efficiency of the important data is improved, and applicability is wide.
The above description is only an embodiment of the present invention, and not intended to limit the scope of the present invention, and all equivalent changes made by using the contents of the present specification and the drawings, or applied directly or indirectly to the related technical fields, are included in the scope of the present invention.

Claims (8)

1. A method for monitoring key data is characterized by comprising the following steps:
s1, collecting all data requests through a real-time streaming platform, and sending data returned according to the data requests to a message middleware;
s2, acquiring preset important data request information from the real-time streaming platform, acquiring corresponding important data from the message middleware according to the important data request information, and judging whether the important data are normal or not;
the data returned according to the data request comprises the unique identification of the corresponding interface;
the step S1 includes:
generating a unique identifier of an interface corresponding to each data request through a gateway;
the step S2 of obtaining information of a preset key data request from the real-time streaming platform includes:
acquiring a corresponding key data request from the real-time streaming platform according to the unique identifier;
determining data items of the key data request;
the step S2 of acquiring the corresponding important data from the message middleware according to the information of the important data request includes:
and acquiring the key data corresponding to the key data request from the message middleware according to the unique identifier and the data item of the key data request.
2. The method for monitoring key data according to claim 1, wherein the step S1 of sending the data returned according to the data request to a message middleware includes:
forwarding data returned according to the data request to a gateway through a real-time streaming platform;
and sending the data returned according to the data request to the message middleware through the gateway.
3. The method for monitoring the important data according to claim 1, wherein the step S2 of determining whether the important data is normal includes:
and judging whether the key data are in a normal range according to a preset key data calculation rule, and if not, sending alarm information.
4. The method for monitoring the key data according to claim 3, wherein the determining whether the key data is in a normal range according to a preset key data calculation rule further comprises:
verifying whether the key data acquired from the message middleware is key data corresponding to a key interface, if so, judging whether the key data is in a normal range according to a preset key data calculation rule; and if not, re-acquiring the key data corresponding to the key interface.
5. A monitoring terminal of important data comprises a memory, a processor and a computer program which is stored on the memory and can run on the processor, and is characterized in that the processor executes the computer program to realize the following steps:
s1, collecting all data requests through a real-time streaming platform, and sending data returned according to the data requests to a message middleware;
s2, acquiring preset important data request information from the real-time streaming platform, acquiring corresponding important data from the message middleware according to the important data request information, and judging whether the important data are normal or not;
the data returned according to the data request comprises the unique identification of the corresponding interface;
the step S1 includes:
generating a unique identifier of an interface corresponding to each data request through a gateway;
the step S2 of obtaining information of a preset key data request from the real-time streaming platform includes:
acquiring a corresponding key data request from the real-time streaming platform according to the unique identifier;
determining data items of the key data request;
the step S2 of acquiring the corresponding important data from the message middleware according to the information of the important data request includes:
and acquiring the key data corresponding to the key data request from the message middleware according to the unique identifier and the data item of the key data request.
6. The terminal for monitoring key data according to claim 5, wherein the sending the data returned according to the data request to the message middleware in step S1 includes:
forwarding data returned according to the data request to a gateway through a real-time streaming platform;
and sending the data returned according to the data request to the message middleware through the gateway.
7. The terminal for monitoring key data according to claim 5, wherein the step S2 of determining whether the key data is normal includes:
and judging whether the key data are in a normal range according to a preset key data calculation rule, and if not, sending alarm information.
8. The terminal for monitoring key data according to claim 7, wherein the determining whether the key data is in a normal range according to a preset key data calculation rule further comprises:
verifying whether the key data acquired from the message middleware is key data corresponding to a key interface, if so, judging whether the key data is in a normal range according to a preset key data calculation rule; and if not, re-acquiring the key data corresponding to the key interface.
CN201910265472.2A 2019-04-03 2019-04-03 Key data monitoring method and terminal Active CN110138634B (en)

Priority Applications (3)

Application Number Priority Date Filing Date Title
CN202110040419.XA CN112910683B (en) 2019-04-03 2019-04-03 Method and terminal for acquiring key data state
CN201910265472.2A CN110138634B (en) 2019-04-03 2019-04-03 Key data monitoring method and terminal
CN202110040430.6A CN112910684B (en) 2019-04-03 2019-04-03 Method and terminal for monitoring key data through real-time streaming platform

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910265472.2A CN110138634B (en) 2019-04-03 2019-04-03 Key data monitoring method and terminal

Related Child Applications (2)

Application Number Title Priority Date Filing Date
CN202110040430.6A Division CN112910684B (en) 2019-04-03 2019-04-03 Method and terminal for monitoring key data through real-time streaming platform
CN202110040419.XA Division CN112910683B (en) 2019-04-03 2019-04-03 Method and terminal for acquiring key data state

Publications (2)

Publication Number Publication Date
CN110138634A CN110138634A (en) 2019-08-16
CN110138634B true CN110138634B (en) 2021-02-09

Family

ID=67569016

Family Applications (3)

Application Number Title Priority Date Filing Date
CN202110040430.6A Active CN112910684B (en) 2019-04-03 2019-04-03 Method and terminal for monitoring key data through real-time streaming platform
CN202110040419.XA Active CN112910683B (en) 2019-04-03 2019-04-03 Method and terminal for acquiring key data state
CN201910265472.2A Active CN110138634B (en) 2019-04-03 2019-04-03 Key data monitoring method and terminal

Family Applications Before (2)

Application Number Title Priority Date Filing Date
CN202110040430.6A Active CN112910684B (en) 2019-04-03 2019-04-03 Method and terminal for monitoring key data through real-time streaming platform
CN202110040419.XA Active CN112910683B (en) 2019-04-03 2019-04-03 Method and terminal for acquiring key data state

Country Status (1)

Country Link
CN (3) CN112910684B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113342606A (en) * 2021-06-07 2021-09-03 平安证券股份有限公司 Data monitoring method, device, equipment and storage medium based on message middleware

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104270609A (en) * 2014-10-09 2015-01-07 深圳市中控生物识别技术有限公司 Method, system and device for remote monitoring
CN108039986A (en) * 2017-12-12 2018-05-15 北京星河星云信息技术有限公司 Monitor the method, apparatus and storage medium of web application performances
CN108512689A (en) * 2017-12-15 2018-09-07 中国平安财产保险股份有限公司 Micro services business monitoring method and server

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FI123641B (en) * 2008-09-30 2013-08-30 Aito Technologies Oy Real-time management of packet data service traffic in mobile communications
US8676753B2 (en) * 2009-10-26 2014-03-18 Amazon Technologies, Inc. Monitoring of replicated data instances
CN103856359B (en) * 2012-11-28 2018-03-13 腾讯科技(深圳)有限公司 Obtain the method and system of information
CN104836694B (en) * 2014-02-11 2019-05-10 中国移动通信集团河北有限公司 Method for monitoring network and device
KR101621019B1 (en) * 2015-01-28 2016-05-13 한국인터넷진흥원 Method for detecting attack suspected anomal event
CN108989136B (en) * 2017-05-31 2020-10-20 中国移动通信集团公司 Business end-to-end performance monitoring method and device
CN107992398B (en) * 2017-12-22 2021-04-27 宜人恒业科技发展(北京)有限公司 Monitoring method and monitoring system of service system
CN108650230A (en) * 2018-04-08 2018-10-12 福建网龙计算机网络信息技术有限公司 A kind of method and system preventing button automatically clicking
CN109189643A (en) * 2018-09-11 2019-01-11 五八有限公司 Monitoring method, device, equipment and the storage medium of request interface response data

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104270609A (en) * 2014-10-09 2015-01-07 深圳市中控生物识别技术有限公司 Method, system and device for remote monitoring
CN108039986A (en) * 2017-12-12 2018-05-15 北京星河星云信息技术有限公司 Monitor the method, apparatus and storage medium of web application performances
CN108512689A (en) * 2017-12-15 2018-09-07 中国平安财产保险股份有限公司 Micro services business monitoring method and server

Also Published As

Publication number Publication date
CN112910683B (en) 2022-07-26
CN112910684B (en) 2022-07-26
CN112910683A (en) 2021-06-04
CN112910684A (en) 2021-06-04
CN110138634A (en) 2019-08-16

Similar Documents

Publication Publication Date Title
CN107992398B (en) Monitoring method and monitoring system of service system
CN110086666B (en) Alarm method, device and system
US9369521B2 (en) Naming of distributed business transactions
US20150170070A1 (en) Method, apparatus, and system for monitoring website
US20060026467A1 (en) Method and apparatus for automatically discovering of application errors as a predictive metric for the functional health of enterprise applications
CN110740103A (en) Service request processing method and device, computer equipment and storage medium
CN106548402B (en) Resource transfer monitoring method and device
CN109783325B (en) Service monitoring method, device, equipment and storage medium
KR20070078399A (en) Trading system
US20090064324A1 (en) Non-intrusive monitoring of services in a service-oriented architecture
CN110493065A (en) The alarm association degree analysis method and system of a kind of cloud center O&M
CN112636979B (en) Cluster alarm method and related device
CN110138634B (en) Key data monitoring method and terminal
CN109714214B (en) Server exception handling method and management equipment
CN106612263B (en) Method and equipment for processing application access request
CN106789335B (en) Method and system for processing information
CN111628878A (en) Fault positioning method, device and system based on multi-stage network nodes
CN116010190A (en) ESB service monitoring management system and method
CN109670952B (en) Collecting and paying transaction platform
CN111431733A (en) Service alarm coverage information evaluation method and device
CN110865918A (en) Database monitoring method and device, computer equipment and storage medium
CN108880920B (en) Cloud service management method and device and electronic equipment
CN112804070B (en) Business obstacle positioning method, device and equipment
CN112596974A (en) Full link monitoring method, device, equipment and storage medium
CN112286778A (en) Service chain call analysis method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant