CN110138634B - Key data monitoring method and terminal - Google Patents
Key data monitoring method and terminal Download PDFInfo
- Publication number
- CN110138634B CN110138634B CN201910265472.2A CN201910265472A CN110138634B CN 110138634 B CN110138634 B CN 110138634B CN 201910265472 A CN201910265472 A CN 201910265472A CN 110138634 B CN110138634 B CN 110138634B
- Authority
- CN
- China
- Prior art keywords
- data
- key data
- key
- message middleware
- data request
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/06—Management of faults, events, alarms or notifications
- H04L41/0631—Management of faults, events, alarms or notifications using root cause analysis; using analysis of correlation between notifications, alarms or events based on decision criteria, e.g. hierarchy, tree or time analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
- H04L43/08—Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
- H04L43/0823—Errors, e.g. transmission errors
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/04—Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
Abstract
The invention discloses a method and a terminal for monitoring key data, which collect all data requests through a real-time streaming platform, send return data corresponding to all the data requests to a message middleware, acquire corresponding key data from the message middleware according to key data request information acquired from the real-time streaming platform, and judge whether the key data is normal, and are different from the prior art which can only monitor related data of the same service process.
Description
Technical Field
The invention relates to the technical field of data monitoring, in particular to a method and a terminal for monitoring key data.
Background
Modern internet products are mostly used through clients, and each client corresponds to a respective server. Usually, each server runs a separate item, and some servers or microservices may be aggregated into one item, which is a variety of situations.
When the system is in normal operation, the abnormal condition of the service data may occur, and in order to find the abnormal condition in operation in time, many systems have monitoring systems. In these monitoring systems, especially for monitoring in a micro-service scenario, it is generally only done to monitor service-related service information corresponding to the monitoring system itself, for example, only monitor information such as CPU and memory resources of the monitoring system itself and thread pool, total number of threads, and utilization rate of the monitoring system itself, and at most there may be some service data monitoring for the monitoring system itself, such as data format, type, and whether it is in a data standard format, and there is no monitoring method for full-flow key service data in a micro-service scenario, which is not perfect at present.
Disclosure of Invention
The technical problem to be solved by the invention is as follows: the method and the terminal for monitoring the key data can monitor the key business data of the whole process and improve the efficiency.
In order to solve the technical problems, the invention adopts a technical scheme that:
a method for monitoring key data comprises the following steps:
s1, collecting all data requests through a real-time streaming platform, and sending data returned according to the data requests to a message middleware;
s2, obtaining preset important data request information from the real-time streaming platform, obtaining corresponding important data from the message middleware according to the important data request information, and judging whether the important data are normal or not.
In order to solve the technical problem, the invention adopts another technical scheme as follows:
a monitoring terminal of important data comprises a memory, a processor and a computer program which is stored on the memory and can run on the processor, wherein the processor executes the computer program to realize the following steps:
s1, collecting all data requests through a real-time streaming platform, and sending data returned according to the data requests to a message middleware;
s2, obtaining preset important data request information from the real-time streaming platform, obtaining corresponding important data from the message middleware according to the important data request information, and judging whether the important data are normal or not.
The invention has the beneficial effects that: the method comprises the steps of collecting all data requests through a real-time streaming platform, sending return data corresponding to all the data requests to a message middleware, obtaining corresponding key data from the message middleware according to key data request information obtained from the real-time streaming platform, and judging whether the key data are normal or not, wherein the method is different from the prior art which can only monitor related data of the same service process.
Drawings
Fig. 1 is a flowchart illustrating steps of a method for monitoring key data according to an embodiment of the present invention;
fig. 2 is a schematic structural diagram of a monitoring terminal for important data according to an embodiment of the present invention;
fig. 3 is a relationship diagram of modules in a method for monitoring key data according to an embodiment of the present invention;
description of reference numerals:
1. a monitoring terminal of key data; 2. a memory; 3. a processor.
Detailed Description
In order to explain technical contents, achieved objects, and effects of the present invention in detail, the following description is made with reference to the accompanying drawings in combination with the embodiments.
The most key idea of the invention is that a real-time streaming platform collects all data requests, a message middleware collects return data corresponding to all data requests, and corresponding key data is obtained from the message middleware according to key data request information obtained from the real-time streaming platform, so as to judge whether the key data is normal.
Referring to fig. 1, a method for monitoring key data includes the steps of:
s1, collecting all data requests through a real-time streaming platform, and sending data returned according to the data requests to a message middleware;
s2, obtaining preset important data request information from the real-time streaming platform, obtaining corresponding important data from the message middleware according to the important data request information, and judging whether the important data are normal or not.
From the above description, the beneficial effects of the present invention are: the method comprises the steps of collecting all data requests through a real-time streaming platform, sending return data corresponding to all the data requests to a message middleware, obtaining corresponding key data from the message middleware according to key data request information obtained from the real-time streaming platform, and judging whether the key data are normal or not, wherein the method is different from the prior art which can only monitor related data of the same service process.
Further, the step S1 of sending the data returned according to the data request to the message middleware includes:
forwarding data returned according to the data request to a gateway through a real-time streaming platform;
and sending the data returned according to the data request to the message middleware through the gateway.
As can be seen from the above description, the real-time streaming platform forwards the returned data to the gateway, and the gateway is used to implement that the returned data is sent from the real-time streaming platform to the message middleware, so that the data can be quickly forwarded, and the efficiency is improved; meanwhile, the data request and the returned data can be separately stored in different modules, so that the subsequent monitoring on a plurality of key data is facilitated.
Further, the data returned according to the data request includes a unique identifier of a corresponding interface;
the step S1 includes:
generating a unique identifier of an interface corresponding to each data request through a gateway;
the step S2 of obtaining information of a preset key data request from the real-time streaming platform includes:
acquiring a corresponding key data request from the real-time streaming platform according to the unique identifier;
determining data items of the key data request;
the step S2 of acquiring the corresponding important data from the message middleware according to the information of the important data request includes:
and acquiring the key data corresponding to the key data request from the message middleware according to the unique identifier and the data item of the key data request.
As can be seen from the above description, by setting the unique identifier, return data corresponding to the key data request, that is, key data, can be conveniently obtained, and subsequent collection and judgment of the key data are facilitated, so that whether the key data are normal or not is effectively monitored; when the key data request is obtained according to the unique identifier, the data item of the key data request needs to be determined, and the corresponding key data is obtained from the message middleware according to the unique identifier and the data item, so that the accuracy of obtaining the key data is ensured, and omission is avoided.
Further, the step S2 of determining whether the important data is normal includes:
and judging whether the key data are in a normal range according to a preset key data calculation rule, and if not, sending alarm information.
According to the description, the key data are judged according to the preset key data rule, so that the method is suitable for various service scenes, is wide in applicability, can be convenient for finding the abnormality of the key data in time, and improves the safety and the accuracy of the service.
Further, the determining, according to a preset key data calculation rule, whether the key data is in a normal range further includes:
verifying whether the key data acquired from the message middleware is key data corresponding to a key interface, if so, judging whether the key data is in a normal range according to a preset key data calculation rule; and if not, re-acquiring the key data corresponding to the key interface.
According to the above description, before judging whether the key data is abnormal according to the preset key data calculation rule, the key data needs to be verified, and only when the key data is determined to be the key data corresponding to the key interface, the abnormality judgment is performed, so that the accuracy of monitoring the key data is further improved.
Referring to fig. 2, a monitoring terminal for important data includes a memory, a processor, and a computer program stored in the memory and capable of running on the processor, where the processor executes the computer program to implement the following steps:
s1, collecting all data requests through a real-time streaming platform, and sending data returned according to the data requests to a message middleware;
s2, obtaining preset important data request information from the real-time streaming platform, obtaining corresponding important data from the message middleware according to the important data request information, and judging whether the important data are normal or not.
From the above description, the beneficial effects of the present invention are: the method comprises the steps of collecting all data requests through a real-time streaming platform, sending return data corresponding to all the data requests to a message middleware, obtaining corresponding key data from the message middleware according to key data request information obtained from the real-time streaming platform, and judging whether the key data are normal or not, wherein the method is different from the prior art which can only monitor related data of the same service process.
Further, the step S1 of sending the data returned according to the data request to the message middleware includes:
forwarding data returned according to the data request to a gateway through a real-time streaming platform;
and sending the data returned according to the data request to the message middleware through the gateway.
As can be seen from the above description, the real-time streaming platform forwards the returned data to the gateway, and the gateway is used to implement that the returned data is sent from the real-time streaming platform to the message middleware, so that the data can be quickly forwarded, and the efficiency is improved; meanwhile, the data request and the returned data can be separately stored in different modules, so that the subsequent monitoring on a plurality of key data is facilitated.
Further, the data returned according to the data request includes a unique identifier of a corresponding interface;
the step S1 includes:
generating a unique identifier of an interface corresponding to each data request through a gateway;
the step S2 of obtaining information of a preset key data request from the real-time streaming platform includes:
acquiring a corresponding key data request from the real-time streaming platform according to the unique identifier;
determining data items of the key data request;
the step S2 of acquiring the corresponding important data from the message middleware according to the information of the important data request includes:
and acquiring the key data corresponding to the key data request from the message middleware according to the unique identifier and the data item of the key data request.
As can be seen from the above description, by setting the unique identifier, return data corresponding to the key data request, that is, key data, can be conveniently obtained, and subsequent collection and judgment of the key data are facilitated, so that whether the key data are normal or not is effectively monitored; when the key data request is obtained according to the unique identifier, the data item of the key data request needs to be determined, and the corresponding key data is obtained from the message middleware according to the unique identifier and the data item, so that the accuracy of obtaining the key data is ensured, and omission is avoided.
Further, the step S2 of determining whether the important data is normal includes:
and judging whether the key data are in a normal range according to a preset key data calculation rule, and if not, sending alarm information.
According to the description, the key data are judged according to the preset key data rule, so that the method is suitable for various service scenes, is wide in applicability, can be convenient for finding the abnormality of the key data in time, and improves the safety and the accuracy of the service.
Further, the determining, according to a preset key data calculation rule, whether the key data is in a normal range further includes:
verifying whether the key data acquired from the message middleware is key data corresponding to a key interface, if so, judging whether the key data is in a normal range according to a preset key data calculation rule; and if not, re-acquiring the key data corresponding to the key interface.
According to the above description, before judging whether the key data is abnormal according to the preset key data calculation rule, the key data needs to be verified, and only when the key data is determined to be the key data corresponding to the key interface, the abnormality judgment is performed, so that the accuracy of monitoring the key data is further improved.
Example one
Referring to fig. 1 and fig. 3, a method for monitoring key data includes the steps of:
after a client requests a uniform gateway interface, a gateway executes service logic to generate a unique identifier of an interface corresponding to each data request;
s1, collecting all data requests through a real-time streaming platform, and sending data returned according to the data requests to a message middleware;
the data returned according to the data request comprises a unique identifier of a corresponding interface;
the returned data of the data request corresponding to the same interface can be conveniently identified through the unique identifier;
specifically, all data requests, that is, requests requiring access to microservices, pass through the real-time streaming platform in advance, and initial data request collection is performed through the real-time streaming platform;
as shown in fig. 3, after the micro service that the data request needs to access returns corresponding data, the real-time streaming platform obtains the data returned according to the data request;
the real-time streaming platform forwards data returned according to the data request to the gateway;
the gateway records all returned data and sends the data returned according to the data request to MQ message middleware;
the gateway sends the returned data to the MQ message middleware in a JSON data format, and specific fields comprise an interface type called by a client, an interface type called by a micro service, data information returned by a micro service interface, a unique identifier corresponding to an interface and the like;
returning the returned data to the client after the gateway sends the returned data to the MQ message middleware;
s2, obtaining preset important data request information from the real-time streaming platform, obtaining corresponding important data from the message middleware according to the important data request information, and judging whether the important data are normal or not.
The method comprises the steps that a key data request is a data request corresponding to a key interface, the key interface is set according to specific services, which interfaces can be configured in a background as the key interfaces, marking is carried out according to URL addresses of the interfaces, the key interface is determined according to the marking in the process of monitoring key data, and a unique identifier corresponding to the key interface is obtained;
specifically, the data monitoring platform acquires key data request parameter information of a corresponding interface from the real-time streaming platform according to the unique identifier, and determines a data item of the key data request;
the data monitoring platform subscribes the key data corresponding to the key data request from the message middleware in real time according to the unique identifier and the data item of the key data request, wherein the key data is all the return fields of the key data request;
when the data monitoring platform receives the subscribed key data, judging whether the key data is in a normal range according to a preset key data calculation rule, if not, sending an alarm message to a notification platform, and notifying related personnel that information needing to be processed by the abnormal data currently exists by the notification platform;
the preset calculation rule of the key data is determined according to a specific business rule, and the normal range of the key data also needs to be set according to the specific business rule, for example, whether the sum of the key data in a preset time is greater than a preset value is judged, so that whether the key data is abnormal or not is determined;
for example, in a financial transaction system, the amount of transactions made by different types of accounts over a fixed period of time needs to be within a certain range, and then the business rules need to be monitored. The account of the small user type is between 8:00 and 16:00 per day, the total amount of expenditure and income of each account is required to be between 0 and 50000, the data is considered to be normal only between 0 and 50000, and the data is considered to be abnormal when the data exceeds the range;
by monitoring each transaction interface, a plurality of batches of operations can exist in each transaction, the data can be paid out or can be received, the data request of the request interface is collected through the real-time streaming platform, and the message middleware records return data corresponding to the data request;
the data monitoring platform subscribes all the return data of the data request of each small user type account corresponding to the transaction interface between 8:00 and 16:00 in real time from the message middleware according to the unique identifier and the data item, wherein the return data is the key data at the moment;
after the data monitoring platform receives the subscribed key data, adding the key data corresponding to each small user type account to realize the calculation of the total transaction amount of each small user type account, and judging whether the total transaction amount of each small user type account is between 0 and 50000, if so, the transaction amount accords with the business rule, and the data is normal; if not, the data is abnormal, abnormal conditions such as account theft or system BUG and the like may occur, alarm information is sent to a notification platform, and the notification platform notifies related personnel that information required to be processed by abnormal data currently exists.
Example two
The difference between the present embodiment and the first embodiment is:
the step of judging whether the key data are in the normal range according to a preset key data calculation rule further comprises the following steps:
verifying whether the key data acquired from the message middleware is key data corresponding to a key interface, if so, judging whether the key data is in a normal range according to a preset key data calculation rule; and if not, re-acquiring the key data corresponding to the key interface.
Specifically, after receiving the subscribed key data, the data monitoring platform verifies in advance whether the received key data is the key data corresponding to the key interface, that is, whether the received key data is the return data of the key data request corresponding to the key interface, if yes, determines whether the key data is in a normal range according to a preset key data calculation rule, and if not, re-acquires the key data corresponding to the key interface, that is, re-executes step S2.
EXAMPLE III
Referring to fig. 2, a monitoring terminal 1 for important data includes a memory 2, a processor 3, and a computer program stored on the memory 2 and capable of running on the processor 3, where the processor 3 implements the steps in the first embodiment when executing the computer program.
Example four
Referring to fig. 2, a monitoring terminal 1 for important data includes a memory 2, a processor 3 and a computer program stored in the memory 2 and capable of running on the processor 3, and the processor 3 implements the steps of the second embodiment when executing the computer program.
In summary, according to the monitoring method and terminal for key data provided by the present invention, all data requests are collected through a real-time streaming platform, return data corresponding to all data requests are sent to a message middleware through a gateway, a data item of a corresponding key data request is determined from the real-time streaming platform according to a unique identifier of an interface, corresponding key data is obtained from the message middleware according to the unique identifier and the data item, whether the key data is normal is determined, an alarm is given in time when the key data is abnormal, different from the prior art that only related data of the same service process can be monitored, the present invention can monitor key service data of a whole flow, realize collection of global data requests and return data without affecting original service logic, can realize fast forwarding of data, and ensure accuracy when obtaining the key data, omission is avoided, whether important data are normal or not can be judged in time, faults caused by data abnormity are avoided, monitoring efficiency of the important data is improved, and applicability is wide.
The above description is only an embodiment of the present invention, and not intended to limit the scope of the present invention, and all equivalent changes made by using the contents of the present specification and the drawings, or applied directly or indirectly to the related technical fields, are included in the scope of the present invention.
Claims (8)
1. A method for monitoring key data is characterized by comprising the following steps:
s1, collecting all data requests through a real-time streaming platform, and sending data returned according to the data requests to a message middleware;
s2, acquiring preset important data request information from the real-time streaming platform, acquiring corresponding important data from the message middleware according to the important data request information, and judging whether the important data are normal or not;
the data returned according to the data request comprises the unique identification of the corresponding interface;
the step S1 includes:
generating a unique identifier of an interface corresponding to each data request through a gateway;
the step S2 of obtaining information of a preset key data request from the real-time streaming platform includes:
acquiring a corresponding key data request from the real-time streaming platform according to the unique identifier;
determining data items of the key data request;
the step S2 of acquiring the corresponding important data from the message middleware according to the information of the important data request includes:
and acquiring the key data corresponding to the key data request from the message middleware according to the unique identifier and the data item of the key data request.
2. The method for monitoring key data according to claim 1, wherein the step S1 of sending the data returned according to the data request to a message middleware includes:
forwarding data returned according to the data request to a gateway through a real-time streaming platform;
and sending the data returned according to the data request to the message middleware through the gateway.
3. The method for monitoring the important data according to claim 1, wherein the step S2 of determining whether the important data is normal includes:
and judging whether the key data are in a normal range according to a preset key data calculation rule, and if not, sending alarm information.
4. The method for monitoring the key data according to claim 3, wherein the determining whether the key data is in a normal range according to a preset key data calculation rule further comprises:
verifying whether the key data acquired from the message middleware is key data corresponding to a key interface, if so, judging whether the key data is in a normal range according to a preset key data calculation rule; and if not, re-acquiring the key data corresponding to the key interface.
5. A monitoring terminal of important data comprises a memory, a processor and a computer program which is stored on the memory and can run on the processor, and is characterized in that the processor executes the computer program to realize the following steps:
s1, collecting all data requests through a real-time streaming platform, and sending data returned according to the data requests to a message middleware;
s2, acquiring preset important data request information from the real-time streaming platform, acquiring corresponding important data from the message middleware according to the important data request information, and judging whether the important data are normal or not;
the data returned according to the data request comprises the unique identification of the corresponding interface;
the step S1 includes:
generating a unique identifier of an interface corresponding to each data request through a gateway;
the step S2 of obtaining information of a preset key data request from the real-time streaming platform includes:
acquiring a corresponding key data request from the real-time streaming platform according to the unique identifier;
determining data items of the key data request;
the step S2 of acquiring the corresponding important data from the message middleware according to the information of the important data request includes:
and acquiring the key data corresponding to the key data request from the message middleware according to the unique identifier and the data item of the key data request.
6. The terminal for monitoring key data according to claim 5, wherein the sending the data returned according to the data request to the message middleware in step S1 includes:
forwarding data returned according to the data request to a gateway through a real-time streaming platform;
and sending the data returned according to the data request to the message middleware through the gateway.
7. The terminal for monitoring key data according to claim 5, wherein the step S2 of determining whether the key data is normal includes:
and judging whether the key data are in a normal range according to a preset key data calculation rule, and if not, sending alarm information.
8. The terminal for monitoring key data according to claim 7, wherein the determining whether the key data is in a normal range according to a preset key data calculation rule further comprises:
verifying whether the key data acquired from the message middleware is key data corresponding to a key interface, if so, judging whether the key data is in a normal range according to a preset key data calculation rule; and if not, re-acquiring the key data corresponding to the key interface.
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110040419.XA CN112910683B (en) | 2019-04-03 | 2019-04-03 | Method and terminal for acquiring key data state |
CN201910265472.2A CN110138634B (en) | 2019-04-03 | 2019-04-03 | Key data monitoring method and terminal |
CN202110040430.6A CN112910684B (en) | 2019-04-03 | 2019-04-03 | Method and terminal for monitoring key data through real-time streaming platform |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910265472.2A CN110138634B (en) | 2019-04-03 | 2019-04-03 | Key data monitoring method and terminal |
Related Child Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110040430.6A Division CN112910684B (en) | 2019-04-03 | 2019-04-03 | Method and terminal for monitoring key data through real-time streaming platform |
CN202110040419.XA Division CN112910683B (en) | 2019-04-03 | 2019-04-03 | Method and terminal for acquiring key data state |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110138634A CN110138634A (en) | 2019-08-16 |
CN110138634B true CN110138634B (en) | 2021-02-09 |
Family
ID=67569016
Family Applications (3)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110040430.6A Active CN112910684B (en) | 2019-04-03 | 2019-04-03 | Method and terminal for monitoring key data through real-time streaming platform |
CN202110040419.XA Active CN112910683B (en) | 2019-04-03 | 2019-04-03 | Method and terminal for acquiring key data state |
CN201910265472.2A Active CN110138634B (en) | 2019-04-03 | 2019-04-03 | Key data monitoring method and terminal |
Family Applications Before (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110040430.6A Active CN112910684B (en) | 2019-04-03 | 2019-04-03 | Method and terminal for monitoring key data through real-time streaming platform |
CN202110040419.XA Active CN112910683B (en) | 2019-04-03 | 2019-04-03 | Method and terminal for acquiring key data state |
Country Status (1)
Country | Link |
---|---|
CN (3) | CN112910684B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113342606A (en) * | 2021-06-07 | 2021-09-03 | 平安证券股份有限公司 | Data monitoring method, device, equipment and storage medium based on message middleware |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104270609A (en) * | 2014-10-09 | 2015-01-07 | 深圳市中控生物识别技术有限公司 | Method, system and device for remote monitoring |
CN108039986A (en) * | 2017-12-12 | 2018-05-15 | 北京星河星云信息技术有限公司 | Monitor the method, apparatus and storage medium of web application performances |
CN108512689A (en) * | 2017-12-15 | 2018-09-07 | 中国平安财产保险股份有限公司 | Micro services business monitoring method and server |
Family Cites Families (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
FI123641B (en) * | 2008-09-30 | 2013-08-30 | Aito Technologies Oy | Real-time management of packet data service traffic in mobile communications |
US8676753B2 (en) * | 2009-10-26 | 2014-03-18 | Amazon Technologies, Inc. | Monitoring of replicated data instances |
CN103856359B (en) * | 2012-11-28 | 2018-03-13 | 腾讯科技(深圳)有限公司 | Obtain the method and system of information |
CN104836694B (en) * | 2014-02-11 | 2019-05-10 | 中国移动通信集团河北有限公司 | Method for monitoring network and device |
KR101621019B1 (en) * | 2015-01-28 | 2016-05-13 | 한국인터넷진흥원 | Method for detecting attack suspected anomal event |
CN108989136B (en) * | 2017-05-31 | 2020-10-20 | 中国移动通信集团公司 | Business end-to-end performance monitoring method and device |
CN107992398B (en) * | 2017-12-22 | 2021-04-27 | 宜人恒业科技发展(北京)有限公司 | Monitoring method and monitoring system of service system |
CN108650230A (en) * | 2018-04-08 | 2018-10-12 | 福建网龙计算机网络信息技术有限公司 | A kind of method and system preventing button automatically clicking |
CN109189643A (en) * | 2018-09-11 | 2019-01-11 | 五八有限公司 | Monitoring method, device, equipment and the storage medium of request interface response data |
-
2019
- 2019-04-03 CN CN202110040430.6A patent/CN112910684B/en active Active
- 2019-04-03 CN CN202110040419.XA patent/CN112910683B/en active Active
- 2019-04-03 CN CN201910265472.2A patent/CN110138634B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104270609A (en) * | 2014-10-09 | 2015-01-07 | 深圳市中控生物识别技术有限公司 | Method, system and device for remote monitoring |
CN108039986A (en) * | 2017-12-12 | 2018-05-15 | 北京星河星云信息技术有限公司 | Monitor the method, apparatus and storage medium of web application performances |
CN108512689A (en) * | 2017-12-15 | 2018-09-07 | 中国平安财产保险股份有限公司 | Micro services business monitoring method and server |
Also Published As
Publication number | Publication date |
---|---|
CN112910683B (en) | 2022-07-26 |
CN112910684B (en) | 2022-07-26 |
CN112910683A (en) | 2021-06-04 |
CN112910684A (en) | 2021-06-04 |
CN110138634A (en) | 2019-08-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107992398B (en) | Monitoring method and monitoring system of service system | |
CN110086666B (en) | Alarm method, device and system | |
US9369521B2 (en) | Naming of distributed business transactions | |
US20150170070A1 (en) | Method, apparatus, and system for monitoring website | |
US20060026467A1 (en) | Method and apparatus for automatically discovering of application errors as a predictive metric for the functional health of enterprise applications | |
CN110740103A (en) | Service request processing method and device, computer equipment and storage medium | |
CN106548402B (en) | Resource transfer monitoring method and device | |
CN109783325B (en) | Service monitoring method, device, equipment and storage medium | |
KR20070078399A (en) | Trading system | |
US20090064324A1 (en) | Non-intrusive monitoring of services in a service-oriented architecture | |
CN110493065A (en) | The alarm association degree analysis method and system of a kind of cloud center O&M | |
CN112636979B (en) | Cluster alarm method and related device | |
CN110138634B (en) | Key data monitoring method and terminal | |
CN109714214B (en) | Server exception handling method and management equipment | |
CN106612263B (en) | Method and equipment for processing application access request | |
CN106789335B (en) | Method and system for processing information | |
CN111628878A (en) | Fault positioning method, device and system based on multi-stage network nodes | |
CN116010190A (en) | ESB service monitoring management system and method | |
CN109670952B (en) | Collecting and paying transaction platform | |
CN111431733A (en) | Service alarm coverage information evaluation method and device | |
CN110865918A (en) | Database monitoring method and device, computer equipment and storage medium | |
CN108880920B (en) | Cloud service management method and device and electronic equipment | |
CN112804070B (en) | Business obstacle positioning method, device and equipment | |
CN112596974A (en) | Full link monitoring method, device, equipment and storage medium | |
CN112286778A (en) | Service chain call analysis method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |