CN110365525A - A kind of alarm method based on management agreement, equipment and storage medium - Google Patents
A kind of alarm method based on management agreement, equipment and storage medium Download PDFInfo
- Publication number
- CN110365525A CN110365525A CN201910572758.5A CN201910572758A CN110365525A CN 110365525 A CN110365525 A CN 110365525A CN 201910572758 A CN201910572758 A CN 201910572758A CN 110365525 A CN110365525 A CN 110365525A
- Authority
- CN
- China
- Prior art keywords
- alarm
- hardware device
- record sheet
- recorded
- information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 43
- 238000003860 storage Methods 0.000 title claims abstract description 32
- 230000004044 response Effects 0.000 claims abstract description 13
- 238000004590 computer program Methods 0.000 claims description 15
- 230000007812 deficiency Effects 0.000 abstract description 2
- 230000006870 function Effects 0.000 description 11
- 238000010586 diagram Methods 0.000 description 5
- 108010028984 3-isopropylmalate dehydratase Proteins 0.000 description 4
- 238000004422 calculation algorithm Methods 0.000 description 4
- 238000005516 engineering process Methods 0.000 description 3
- 230000002159 abnormal effect Effects 0.000 description 2
- 238000004364 calculation method Methods 0.000 description 2
- 238000013461 design Methods 0.000 description 2
- 230000000694 effects Effects 0.000 description 2
- 230000005611 electricity Effects 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000008569 process Effects 0.000 description 2
- 238000012545 processing Methods 0.000 description 2
- 230000001360 synchronised effect Effects 0.000 description 2
- 241000208340 Araliaceae Species 0.000 description 1
- 235000005035 Panax pseudoginseng ssp. pseudoginseng Nutrition 0.000 description 1
- 235000003140 Panax quinquefolius Nutrition 0.000 description 1
- 230000009471 action Effects 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 238000004891 communication Methods 0.000 description 1
- 230000004069 differentiation Effects 0.000 description 1
- 239000000284 extract Substances 0.000 description 1
- 239000000835 fiber Substances 0.000 description 1
- 235000008434 ginseng Nutrition 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 238000003780 insertion Methods 0.000 description 1
- 230000037431 insertion Effects 0.000 description 1
- 230000014759 maintenance of location Effects 0.000 description 1
- 238000012544 monitoring process Methods 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 239000013307 optical fiber Substances 0.000 description 1
- 238000010926 purge Methods 0.000 description 1
- 238000011084 recovery Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/02—Standardisation; Integration
- H04L41/0213—Standardised network management protocols, e.g. simple network management protocol [SNMP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/06—Management of faults, events, alarms or notifications
- H04L41/0631—Management of faults, events, alarms or notifications using root cause analysis; using analysis of correlation between notifications, alarms or events based on decision criteria, e.g. hierarchy, tree or time analysis
Abstract
The invention discloses a kind of alarm methods based on management agreement, comprising steps of obtaining the parameter information of hardware device by the management agreement poll;Judge in the parameter information with the presence or absence of parameter preset;Judge whether the hardware device is recorded in alarm record sheet;In response to the parameter information that this poll obtains being packaged into Trap warning information and is sent there are parameter preset and hardware device is not recorded in the alarm record sheet.The invention also discloses a kind of computer equipment and readable storage medium storing program for executing.Alarm method proposed by the present invention based on management agreement solves during supervising to various types of hardware, after certain components of fractional hardware are led to the problem of, the problem of cannot sending in such a way that Trap is alerted, makes up hardware device deficiency.
Description
Technical field
The present invention relates to monitoring fields, and in particular to a kind of alarm method based on management agreement, equipment and storage are situated between
Matter.
Background technique
ISPIM software can obtain the hardware information of equipment by IPMI and snmp protocol, but it is hard to obtain these
Whole Trap warning information of part, the reason is that not all hardware device can send the Trap alarm letter of whole components
Breath.
Therefore, it is badly in need of a kind of Trap warning information of all components that these hardware can be received in such a way that Trap is alerted
Method.
Summary of the invention
In view of this, at least one aspect in order to overcome the above problem, proposing for the embodiment of the present invention are a kind of based on pipe
The alarm method of agreement is managed, comprising steps of
The parameter information of hardware device is obtained by the management agreement poll;
Judge in the parameter information with the presence or absence of parameter preset;
Judge whether the hardware device is recorded in alarm record sheet;
In response to there are the parameter preset and the hardware device is not recorded in the alarm record sheet, by this
The parameter information that poll obtains is packaged into Trap warning information and sends.
In some embodiments, further includes:
According to the Trap warning information, the hardware device is recorded in alarm record sheet.
In some embodiments, the hardware device is recorded in alarm record sheet, further comprises:
The IP address of the hardware device, device type, unit type, component locations and alarm cause are recorded in announcement
In alert record sheet.
In some embodiments, further includes:
In response to there are the parameter preset and the hardware device is recorded in the alarm record sheet, by this next round
The parameter information obtained is ask to abandon.
In some embodiments, further includes:
In response to there is no the parameter preset and the hardware device is recorded in alarm record sheet, by this poll
The parameter information of acquisition is packaged into Trap alarm clearing information and sends.
In some embodiments, further includes:
According to the Trap alarm clearing information, corresponding hardware device in alarm record sheet is eliminated.
In some embodiments, corresponding hardware device in alarm record sheet is eliminated, further comprises:
IP address, device type, unit type, component locations and the alarm of the corresponding hardware device of record sheet will be alerted
Reason is eliminated.
In some embodiments, further includes:
It, will sheet in response to there is no the parameter preset and the hardware device is not recorded in the alarm record sheet
The parameter information that secondary poll obtains abandons.
Based on the same inventive concept, according to another aspect of the present invention, the embodiments of the present invention also provide at least one
A processor;And
Memory, the memory are stored with the computer program that can be run on the processor, which is characterized in that institute
State the step of executing any alarm method based on management agreement as described above when processor executes described program.
Based on the same inventive concept, according to another aspect of the present invention, the embodiments of the present invention also provide a kind of meters
Calculation machine readable storage medium storing program for executing, the computer-readable recording medium storage have computer program, and the computer program is processed
The step of any alarm method based on management agreement as described above is executed when device executes.
The present invention has following advantageous effects: the alarm method proposed by the present invention based on management agreement solves
During ISPIM supervises various types of hardware, after certain components of fractional hardware are led to the problem of, it cannot be alerted by Trap
Mode the problem of sending, make up hardware device deficiency, improve ISPIM function, meet the different demands of client.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below
There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this
Some embodiments of invention for those of ordinary skill in the art without creative efforts, can be with
Other embodiments are obtained according to these attached drawings.
Fig. 1 is a kind of flow diagram for alarm method based on management agreement that the embodiment of the present invention provides;
Fig. 2 is a kind of flow diagram for alarm method based on management agreement that the embodiment of the present invention provides;
Fig. 3 is the structural schematic diagram for the computer equipment that the embodiment of the present invention provides;
Fig. 4 is the structural schematic diagram for the computer readable storage medium that the embodiment of the present invention provides.
Specific embodiment
To make the objectives, technical solutions, and advantages of the present invention clearer, below in conjunction with specific embodiment, and reference
The embodiment of the present invention is further described in attached drawing.
It should be noted that all statements for using " first " and " second " are for differentiation two in the embodiment of the present invention
The non-equal entity of a same names or non-equal parameter, it is seen that " first " " second " only for the convenience of statement, does not answer
It is interpreted as the restriction to the embodiment of the present invention, subsequent embodiment no longer illustrates this one by one.
According to an aspect of the present invention, the embodiment of the present invention proposes a kind of alarm method based on management agreement, such as
May include step shown in Fig. 1: S1 obtains the parameter information of hardware device by the management agreement poll;S2, judgement
It whether there is parameter preset in the parameter information;S3, judges whether the hardware device is recorded in alarm record sheet;S4,
Believe in response to the parameter that there are parameter preset and hardware device is not recorded in the alarm record sheet, this poll is obtained
Breath is packaged into Trap warning information and sends.
Alarm method proposed by the present invention based on management agreement can use to be obtained by IPMI, SNMP or SMI-S agreement
The Global Information for getting hardware when finding that these hardware generate failure, again seals these fault messages further through comparison
Dress, and sent in the form that Trap is alerted, and these fault messages record is got up, in next polling procedure
In, it is found that these fault messages restore, then send out the Trap information an of fault recovery, and corresponding alarm record purge,
After the certain component generations for solving the problems, such as fractional hardware, the problem of cannot being sent in such a way that Trap is alerted.
In some embodiments, for different agreements, the parameter preset of hardware device is also different, such as in snmp protocol
In, the parameter preset of fan, power supply and hard disk can be unplug, represents and extracts slot position, and corresponding plug (is not default ginseng
Number) it is then insertion slot position.Power supply, fan, CPU, network interface card, RAID card, memory, disk, Logical Disk and caching parameter preset
It can be fault, represent abnormal state, it is normal that corresponding normal (not being parameter preset) represents state.Cpu temperature, environment
The parameter preset of temperature, power supply realtime power and rotation speed of the fan can be over-threshold, and representing is more than threshold value, accordingly
Below-threshold (not being parameter preset) represent be lower than threshold value.
It should be noted that being more than threshold value, refer to cpu temperature, environment temperature, power supply realtime power, rotation speed of the fan etc. is more than
To the reasonable value that hardware device is set, after being more than, the service life of hardware device will affect, it should be noted that.Lower than threshold value, refer to
Cpu temperature, environment temperature, power supply realtime power, rotation speed of the fan etc. show to change within the resultant force value set to hardware device
Component is operating normally.
In IPMI protocol CPU, memory, fan and power supply parameter preset can be na, represent abnormal state, accordingly
OK (not being parameter preset) to represent state normal.
Above-mentioned hardware device is merely examples explanation, can also obtain other letters using IPMI, SNMP or SMI-S agreement
Breath, for example, information such as controller of the utilization rate information of CPU, memory and disk or magnetic battle array etc., all have corresponding
Parameter preset.
In some embodiments, after receiving Trap warning information, the relevant parameter of hardware device can be recorded in
It alerts in record sheet, such as can be former by the IP address of hardware device, device type, unit type, component locations and alarm
Because being recorded in alarm record sheet.
In some embodiments, method of the invention further include: in response to there are the parameter preset and the hardware
Equipment is recorded in the alarm record sheet, and the parameter information that this poll is obtained abandons.
In some embodiments, method of the invention further include: in response to there is no the parameter presets and described hard
Part equipment is recorded in alarm record sheet, and it is concurrent that the parameter information that this poll obtains is packaged into Trap alarm clearing information
It send.
In some embodiments, method of the invention further include: in response to there is no the parameter presets and described hard
Part equipment is not recorded in the alarm record sheet, and the parameter information that this poll is obtained abandons.
In some embodiments, if the failure of the hardware device of last time poll record is not eliminated, in current poll
The same fault message of the equipment is obtained again, then is given up the information that this poll obtains, and is recorded in record sheet as long as alerting
Alarm record do not eliminate, then same fault message is got in polling procedure, and without any processing.
In some embodiments, the parameter preset if it does not exist, equally judges whether the hardware device records
In alarm record sheet;
If the hardware device is recorded in alarm record sheet, illustrate that corresponding fault message has solved, then incite somebody to action this
The parameter information that wheel obtains is packaged into Trap alarm clearing information and sends.It, can be in this way, after receiving alarm clearing information
Corresponding hardware device in record sheet will be alerted to eliminate, for example, with can will will alerting the IP of the corresponding hardware device of record sheet
Location, device type, unit type, component locations and alarm cause are eliminated, thus time alarm judgement under the influence of not.If described hard
Part equipment is not recorded in the alarm record sheet, and the parameter information that this poll is obtained abandons.I.e. hardware device is not
It breaks down, also there is no need to do any processing.
Below with reference to Fig. 2 shows flow diagram the alarm method the present invention is based on management agreement is described.
Can order be passed through first: snmpwalk-r 2-v 3-u snmpuser-a SHA-A'123456Aa? '-x
AES-X'123456Aa? '-l authPriv 172.18.41.451.3.6.1.4.1.232.3.2.5.1.1.5 and order
Snmpwalk-r 2-v 3-u snmpuser-a SHA-A ' 123456Aa? '-x AES-X'123456Aa? '-l authPriv
172.18.41.451.3.6.1.4.1.232.3.2.5.1.1.64 getting the corresponding information of equipment.
Does is wherein 172.18.41.45 IP address of equipment, snmpuser SHA 123456Aa? AES123456Aa?-l
AuthPriv, this 6 are respectively SNMPv3 user information, successively are as follows: user name, identifying algorithm, and authentication key, Encryption Algorithm,
Encryption key, security level.
The corresponding information of equipment are as follows:
SNMPv2-SMI::enterprises.232.3.2.5.1.1.5.0.0=INTEGER:unpl ug
SNMPv2-SMI::enterprises.232.3.2.5.1.1.5.0.1=INTEGER:plug
SNMPv2-SMI::enterprises.232.3.2.5.1.1.5.0.2=INTEGER:plug
SNMPv2-SMI::enterprises.232.3.2.5.1.1.5.0.3=INTEGER:plug
SNMPv2-SMI::enterprises.232.3.2.5.1.1.64.0.0=INTEGER:Por t 1IBox 3Bay
4
SNMPv2-SMI::enterprises.232.3.2.5.1.1.64.0.1=INTEGER:Por t 1IBox 3Bay
3
SNMPv2-SMI::enterprises.232.3.2.5.1.1.64.0.2=INTEGER:Por t 1IBox 3Bay
2
SNMPv2-SMI::enterprises.232.3.2.5.1.1.64.0.3=INTEGER:Por t 1IBox 3Bay
2
It can be seen that in conjunction with the above corresponding information.Hard disk positioned at Port 1I Box 3Bay 4 is pulled out, and is then sentenced
Break the hard disk whether be recorded in alarm record sheet in.
If not existing in alarm record sheet, these out of order component informations are encapsulated into Trap alarm
In VariableBinding, the important information in part is as follows:
VBS[
(1.3.6.1.4.1.232.11.2.11.1.1.0.1=172.18.41.45 IP address of equipment);
(1.3.6.1.4.1.232.6.2.9.3.1.1.0.2=SERVER device class);
(1.3.6.1.4.1.232.6.2.9.3.1.2.0.3=DSIK component categories);
1.3.6.1.4.1.232.6.2.9.3.1.5.0.4=Port 1I Box 3Bay 4 (component locations);
(1.3.6.1.4.1.232.6.2.9.3.1.5.0.5=unplug alarm cause);
1.3.6.1.4.1.232.6.2.9.3.1.5.0.6=0 (indicate it is alarm)]
Remarks: bracket content is to explain the content of this information, is not to send content.
Complete Trap information are as follows:
Snmptrap-v 3-a SHA-A 123456Aa?-x AES-X 123456Aa?-l authPriv-u
snmpuser 172.18.31.57:162 1.3.6.1.4.1.232.11.2.11.1.1.0.1s"172.18.41.45"1.3
.6.1.4.1.232.11.2.11.1.1.0.2s"SERVER"1.3.6.1.4.1.232.6.2.9.3.1.2.0.3s"DSIK"1
.3.6.1.4.1.232.11.2.11.1.1.0.4s"Port 1I Box 3Bay 4"1.3.6.1.4.1.232.11.2.11.1
.1.0.5s"unplug"1.3.6.1.4.1.232.6.2.9.3.1.2.0.6s"0"
Then it the relevant information and its alarm cause of the component for going out alarm, records, after being polled again, hair
These existing alarms it is recovered and after, send the information of an alarm clearing again, and believing accordingly in alarm record sheet
Breath is deleted.In the Trap information of alarm clearing, it is only necessary to be changed to 1 the 0 of last line, be
1.3.6.1.4.1.232.6.2.9.3.1.5.0.6=1.
If the fault message exists in alarm record sheet, do not deal with, directly abandons.
Alarm method proposed by the present invention based on management agreement solves the mistake supervised in ISPIM to various types of hardware
Cheng Zhong after certain components of fractional hardware are led to the problem of, the problem of cannot sending in such a way that Trap is alerted, makes up hardware and sets
It is standby insufficient, ISPIM function is improved, the different demands of client are met.
Based on the same inventive concept, according to another aspect of the present invention, as shown in figure 3, the embodiment of the present invention also mentions
Supply a kind of computer equipment 501, comprising:
At least one processor 520;And
Memory 510, memory 510 are stored with the computer program 511 that can be run on a processor, and processor 520 is held
The step of any alarm method based on management agreement as above is executed when line program.
Based on the same inventive concept, according to another aspect of the present invention, as shown in figure 4, the embodiment of the present invention also mentions
A kind of computer readable storage medium 601 is supplied, computer readable storage medium 601 is stored with computer program instructions 610, meter
The step of any alarm method based on management agreement as above is executed when calculation machine program instruction 610 is executed by processor.
Finally, it should be noted that those of ordinary skill in the art will appreciate that realizing the whole in above-described embodiment method
Or part process, related hardware can be instructed to complete by computer program, program to can be stored in one computer-readable
It takes in storage medium, the program is when being executed, it may include such as the process of the embodiment of above-mentioned each method.Wherein, storage medium
It can be magnetic disk, CD, read-only memory (ROM) or random access memory (RAM) etc..The implementation of above-mentioned computer program
Example, can achieve the identical or similar effect of corresponding aforementioned any means embodiment.
In addition, typically, device disclosed by the embodiments of the present invention, equipment etc. can be various electric terminal equipments, such as hand
Machine, personal digital assistant (PDA), tablet computer (PAD), smart television etc., are also possible to large-scale terminal device, such as server
Deng, therefore protection scope disclosed by the embodiments of the present invention should not limit as certain certain types of device, equipment.The present invention is implemented
Client disclosed in example, which can be, is applied to any one of the above electricity with the combining form of electronic hardware, computer software or both
In sub- terminal device.
In addition, disclosed method is also implemented as the computer program executed by CPU according to embodiments of the present invention, it should
Computer program may be stored in a computer readable storage medium.When the computer program is executed by CPU, the present invention is executed
The above-mentioned function of being limited in method disclosed in embodiment.
In addition, above method step and system unit also can use controller and for storing so that controller is real
The computer readable storage medium of the computer program of existing above-mentioned steps or Elementary Function is realized.
In addition, it should be appreciated that the computer readable storage medium (for example, memory) of this paper can be volatibility and deposit
Reservoir or nonvolatile memory, or may include both volatile memory and nonvolatile memory.As an example and
Unrestricted, nonvolatile memory may include read-only memory (ROM), programming ROM (PROM), electrically programmable ROM
(EPROM), electrically erasable programmable ROM (EEPROM) or flash memory.Volatile memory may include that arbitrary access is deposited
Reservoir (RAM), the RAM can serve as external cache.As an example and not restrictive, RAM can be with a variety of
Form obtains, such as synchronous random access memory (DRAM), dynamic ram (DRAM), synchronous dram (SDRAM), double data rate SDRAM (DDR
SDRAM), enhance SDRAM (ESDRAM), synchronization link DRAM (SLDRAM) and directly Rambus RAM (DRRAM).Institute is public
The storage equipment for the aspect opened is intended to the memory of including but not limited to these and other suitable type.
Those skilled in the art will also understand is that, various illustrative logical blocks, mould in conjunction with described in disclosure herein
Block, circuit and algorithm steps may be implemented as the combination of electronic hardware, computer software or both.It is hard in order to clearly demonstrate
This interchangeability of part and software, with regard to various exemplary components, square, module, circuit and step function to its into
General description is gone.This function is implemented as software and is also implemented as hardware depending on concrete application and application
To the design constraint of whole system.The function that those skilled in the art can realize in various ways for every kind of concrete application
Can, but this realization decision should not be interpreted as causing a departure from range disclosed by the embodiments of the present invention.
Various illustrative logical blocks, module and circuit, which can use, in conjunction with described in disclosure herein is designed to
The following component of function here is executed to realize or execute: general processor, digital signal processor (DSP), dedicated integrated electricity
It is road (ASIC), field programmable gate array (FPGA) or other programmable logic device, discrete gate or transistor logic, discrete
Any combination of hardware component or these components.General processor can be microprocessor, but alternatively, processor can
To be any conventional processors, controller, microcontroller or state machine.Processor also may be implemented as calculating the group of equipment
Close, for example, the combination of DSP and microprocessor, multi-microprocessor, one or more microprocessors combination DSP and/or it is any its
Its this configuration.
The step of method in conjunction with described in disclosure herein or algorithm, can be directly contained in hardware, be held by processor
In capable software module or in combination of the two.Software module may reside within RAM memory, flash memory, ROM storage
Device, eprom memory, eeprom memory, register, hard disk, removable disk, CD-ROM or known in the art it is any its
In the storage medium of its form.Illustrative storage medium is coupled to processor, enables a processor to from the storage medium
Information is written to the storage medium in middle reading information.In an alternative, storage medium can be integral to the processor
Together.Pocessor and storage media may reside in ASIC.ASIC may reside in user terminal.In an alternative
In, it is resident in the user terminal that pocessor and storage media can be used as discrete assembly.
In one or more exemplary designs, function can be realized in hardware, software, firmware or any combination thereof.
If realized in software, can using function as one or more instruction or code may be stored on the computer-readable medium or
It is transmitted by computer-readable medium.Computer-readable medium includes computer storage media and communication media, which is situated between
Matter includes any medium for helping for computer program to be transmitted to another position from a position.Storage medium can be energy
Any usable medium being enough accessed by a general purpose or special purpose computer.As an example and not restrictive, the computer-readable medium
It may include that RAM, ROM, EEPROM, CD-ROM or other optical disc memory apparatus, disk storage equipment or other magnetic storages are set
It is standby, or can be used for carrying or storage form be instruct or the required program code of data structure and can by general or
Special purpose computer or any other medium of general or specialized processor access.In addition, any connection can suitably claim
For computer-readable medium.For example, if using coaxial cable, optical fiber cable, twisted pair, digital subscriber line (DSL) or all
It is if the wireless technology of infrared ray, radio and microwave to send software from website, server or other remote sources, then above-mentioned coaxial
Cable, fiber optic cable, twisted pair, DSL or such as wireless technology of infrared ray, radio and microwave are included in determining for medium
Justice.As used herein, disk and CD include compact disk (CD), it is laser disk, CD, digital versatile disc (DVD), soft
Disk, Blu-ray disc, wherein disk usually magnetically reproduce data, and CD using laser optics reproduce data.Above content
Combination should also be as being included in the range of computer-readable medium.
It is exemplary embodiment disclosed by the invention above, it should be noted that in the sheet limited without departing substantially from claim
Under the premise of inventive embodiments scope of disclosure, it may be many modifications and modify.According to open embodiment described herein
The function of claim to a method, step and/or movement be not required to the execution of any particular order.In addition, although the present invention is implemented
Element disclosed in example can be described or be required in the form of individual, but be unless explicitly limited odd number, it is understood that be multiple.
It should be understood that it is used in the present context, unless the context clearly supports exceptions, singular " one
It is a " it is intended to also include plural form.It is to be further understood that "and/or" used herein refers to including one or one
Any and all possible combinations of a above project listed in association.
It is for illustration only that the embodiments of the present invention disclose embodiment sequence number, does not represent the advantages or disadvantages of the embodiments.
Those of ordinary skill in the art will appreciate that realizing that all or part of the steps of above-described embodiment can pass through hardware
Complete, relevant hardware can also be instructed to complete by program, program can store in a kind of computer-readable storage
In medium, storage medium mentioned above can be read-only memory, disk or CD etc..
It should be understood by those ordinary skilled in the art that: the discussion of any of the above embodiment is exemplary only, not
It is intended to imply that range disclosed by the embodiments of the present invention (including claim) is limited to these examples;In the think of of the embodiment of the present invention
Under road, it can also be combined between the technical characteristic in above embodiments or different embodiments, and there is this hair as above
Many other variations of the different aspect of bright embodiment, for simplicity, they are not provided in details.Therefore, all in the present invention
Within the spirit and principle of embodiment, any omission, modification, equivalent replacement, improvement for being made etc. be should be included in of the invention real
It applies within the protection scope of example.
Claims (10)
1. a kind of alarm method based on management agreement, comprising steps of
The parameter information of hardware device is obtained by the management agreement poll;
Judge in the parameter information with the presence or absence of parameter preset;
Judge whether the hardware device is recorded in alarm record sheet;
In response to there are the parameter preset and the hardware device is not recorded in the alarm record sheet, by this poll
The parameter information of acquisition is packaged into Trap warning information and sends.
2. the method as described in claim 1, which is characterized in that further include:
According to the Trap warning information, the hardware device is recorded in alarm record sheet.
3. method according to claim 2, which is characterized in that the hardware device is recorded in alarm record sheet, into one
Step includes:
The IP address of the hardware device, device type, unit type, component locations and alarm cause are recorded in alarm note
It records in table.
4. the method as described in claim 1, which is characterized in that further include:
In response to there are the parameter preset and the hardware device is recorded in the alarm record sheet, this poll is obtained
The parameter information taken abandons.
5. the method as described in claim 1, which is characterized in that further include:
In response to there is no the parameter preset and the hardware device is recorded in alarm record sheet, this poll is obtained
Parameter information be packaged into Trap alarm clearing information and send.
6. method as claimed in claim 5, which is characterized in that further include:
According to the Trap alarm clearing information, corresponding hardware device in alarm record sheet is eliminated.
7. method as claimed in claim 6, which is characterized in that eliminate corresponding hardware device in alarm record sheet, further
Include:
IP address, device type, unit type, component locations and the alarm cause of the corresponding hardware device of record sheet will be alerted
It eliminates.
8. method as claimed in claim 5, which is characterized in that further include:
In response to there is no the parameter preset and the hardware device is not recorded in the alarm record sheet, by this next round
The parameter information obtained is ask to abandon.
9. a kind of computer equipment, comprising:
At least one processor;And
Memory, the memory are stored with the computer program that can be run on the processor, which is characterized in that the place
It manages perform claim when device executes described program and requires method described in 1-8 any one.
10. a kind of computer readable storage medium, the computer-readable recording medium storage has computer program, and feature exists
In perform claim requires method described in 1-8 any one when the computer program is executed by processor.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910572758.5A CN110365525A (en) | 2019-06-28 | 2019-06-28 | A kind of alarm method based on management agreement, equipment and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910572758.5A CN110365525A (en) | 2019-06-28 | 2019-06-28 | A kind of alarm method based on management agreement, equipment and storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110365525A true CN110365525A (en) | 2019-10-22 |
Family
ID=68215992
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910572758.5A Pending CN110365525A (en) | 2019-06-28 | 2019-06-28 | A kind of alarm method based on management agreement, equipment and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110365525A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111104238A (en) * | 2019-10-30 | 2020-05-05 | 苏州浪潮智能科技有限公司 | CE-based memory diagnosis method, device and medium |
CN111176932A (en) * | 2019-12-13 | 2020-05-19 | 苏州浪潮智能科技有限公司 | Method and device for recording abnormal event log and readable medium |
CN111431751A (en) * | 2020-03-31 | 2020-07-17 | 贵州电网有限责任公司 | Alarm management method and system based on network resources |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107276813A (en) * | 2017-06-30 | 2017-10-20 | 郑州云海信息技术有限公司 | A kind of SNMP TRAP alarm methods and device |
CN107835097A (en) * | 2017-11-22 | 2018-03-23 | 凌云天博光电科技股份有限公司 | Warning information synchronous method and device, network element |
CN107888424A (en) * | 2017-11-27 | 2018-04-06 | 凌云天博光电科技股份有限公司 | Warning information recognition methods and device, NMS |
CN108829563A (en) * | 2018-06-25 | 2018-11-16 | 郑州云海信息技术有限公司 | A kind of alarm method and alarm device |
-
2019
- 2019-06-28 CN CN201910572758.5A patent/CN110365525A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107276813A (en) * | 2017-06-30 | 2017-10-20 | 郑州云海信息技术有限公司 | A kind of SNMP TRAP alarm methods and device |
CN107835097A (en) * | 2017-11-22 | 2018-03-23 | 凌云天博光电科技股份有限公司 | Warning information synchronous method and device, network element |
CN107888424A (en) * | 2017-11-27 | 2018-04-06 | 凌云天博光电科技股份有限公司 | Warning information recognition methods and device, NMS |
CN108829563A (en) * | 2018-06-25 | 2018-11-16 | 郑州云海信息技术有限公司 | A kind of alarm method and alarm device |
Non-Patent Citations (1)
Title |
---|
项洪印: "电力通信综合告警系统马可尼传输网管接入", 《中国新通信》 * |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111104238A (en) * | 2019-10-30 | 2020-05-05 | 苏州浪潮智能科技有限公司 | CE-based memory diagnosis method, device and medium |
CN111104238B (en) * | 2019-10-30 | 2022-06-03 | 苏州浪潮智能科技有限公司 | CE-based memory diagnosis method, device and medium |
CN111176932A (en) * | 2019-12-13 | 2020-05-19 | 苏州浪潮智能科技有限公司 | Method and device for recording abnormal event log and readable medium |
CN111431751A (en) * | 2020-03-31 | 2020-07-17 | 贵州电网有限责任公司 | Alarm management method and system based on network resources |
CN111431751B (en) * | 2020-03-31 | 2022-11-18 | 贵州电网有限责任公司 | Alarm management method and system based on network resources |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110365525A (en) | A kind of alarm method based on management agreement, equipment and storage medium | |
CN111585867B (en) | Message processing method and device, electronic equipment and readable storage medium | |
CN110362455B (en) | Data processing method and data processing device | |
CN107590392A (en) | Utilize the system and method for script verification hardware integrity | |
CN112818307A (en) | User operation processing method, system, device and computer readable storage medium | |
CN105897933A (en) | Service request processing method and device | |
CN109558272A (en) | The fault recovery method and device of server | |
CN110502875A (en) | A kind of security of computer software guard system | |
CN110532293B (en) | Data stream life cycle management method and system based on block chain technology | |
CN111818025A (en) | User terminal detection method and device | |
CN104734896A (en) | Method and system for acquiring running situations of service sub-systems | |
CN110442497A (en) | A kind of alarm method, equipment and the readable medium of virtualization system storage state | |
CN113868699A (en) | UKey-based personal information protection method and system | |
CN113360568A (en) | Method and system for shielding alliance link data and computer readable storage medium | |
CN102404161B (en) | Method and universal serial bus (USB) equipment for detecting secret leakage | |
CN115134143B (en) | Global Internet of things equipment authentication method, device and storage medium | |
CN109960924A (en) | One subsystem login method, device, system and electronic equipment | |
CN104239425B (en) | The method, apparatus and system of file access | |
CN115081028A (en) | Webpage tamper-proof safety protection system | |
CN111242770B (en) | Risk equipment identification method and device, electronic equipment and readable storage medium | |
CN108304729A (en) | Method for reporting log by client and electronic equipment | |
CN114338777B (en) | Escape control method and device | |
CN113660247B (en) | Method, system and readable storage medium for validating configuration of cluster environment | |
CN111131200B (en) | Network security detection method and device | |
CN110263585B (en) | Test supervision method, device, equipment and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20191022 |
|
RJ01 | Rejection of invention patent application after publication |