CN111258860B - Data alarm method, device, computer equipment and storage medium - Google Patents

Data alarm method, device, computer equipment and storage medium Download PDF

Info

Publication number
CN111258860B
CN111258860B CN202010058160.7A CN202010058160A CN111258860B CN 111258860 B CN111258860 B CN 111258860B CN 202010058160 A CN202010058160 A CN 202010058160A CN 111258860 B CN111258860 B CN 111258860B
Authority
CN
China
Prior art keywords
alarm
data
current
interface
target
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010058160.7A
Other languages
Chinese (zh)
Other versions
CN111258860A (en
Inventor
刘舟
李奕臻
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Sanqi Mutual Entertainment Technology Co ltd
Original Assignee
Guangzhou Sanqi Mutual Entertainment Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Sanqi Mutual Entertainment Technology Co ltd filed Critical Guangzhou Sanqi Mutual Entertainment Technology Co ltd
Priority to CN202010058160.7A priority Critical patent/CN111258860B/en
Publication of CN111258860A publication Critical patent/CN111258860A/en
Application granted granted Critical
Publication of CN111258860B publication Critical patent/CN111258860B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/32Monitoring with visual or acoustical indication of the functioning of the machine
    • G06F11/324Display of status information
    • G06F11/327Alarm or error message display

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Quality & Reliability (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Alarm Systems (AREA)

Abstract

The application relates to a data alarm method, a data alarm device, computer equipment and a storage medium. The method comprises the following steps: acquiring current alarm data corresponding to a target interface, wherein the current alarm data comprises current alarm type data and corresponding current alarm item data; acquiring corresponding target alarm type description data according to the current alarm type data; determining a target alarm state according to the current alarm data and the target alarm type description data; and generating corresponding alarm information according to the target alarm state. The method can improve the alarm efficiency.

Description

Data alarm method, device, computer equipment and storage medium
Technical Field
The present disclosure relates to the field of computer technologies, and in particular, to a data alarm method, apparatus, computer device, and storage medium.
Background
In the current alarm system, different service parties generally need to develop a set of corresponding alarm system according to own service requirements, and no mode capable of intensively alarming exists. In the current alarm mode of the alarm system, if the service data of different service parties need to be monitored and alarmed, centralized alarm cannot be achieved, and the alarm system corresponding to each service party needs to be monitored and alarmed, so that the alarm efficiency is low.
Disclosure of Invention
In view of the foregoing, it is desirable to provide a data alert method, apparatus, computer device, and storage medium that can improve alert efficiency.
A data alert method, the method comprising:
acquiring current alarm data corresponding to a target interface, wherein the current alarm data comprises current alarm type data and corresponding current alarm item data;
acquiring corresponding target alarm type description data according to the current alarm type data;
determining a target alarm state according to the current alarm data and the target alarm type description data;
and generating corresponding alarm information according to the target alarm state.
In one embodiment, obtaining current alarm data corresponding to a target interface includes: acquiring interface alarm data returned by each trigger interface, wherein the interface alarm data comprises interface alarm type data and corresponding interface alarm item data; acquiring preset interface triggering conditions corresponding to the alarm type data of each interface; determining a target interface from all trigger interfaces according to preset interface trigger conditions and interface alarm item data; and acquiring the current alarm data corresponding to the target interface according to the corresponding relation between the trigger interface and the alarm data.
In one embodiment, the step of generating the trigger interface includes: receiving a user login request, wherein the user login request carries a current user identifier; according to the user login request, the login of the current user corresponding to the current user identifier is realized, a user alarm access request sent by the current user is received, and the user alarm access request carries user alarm type data and corresponding user alarm item data; distributing a corresponding calling interface according to the user alarm access request; and acquiring user alarm type description data corresponding to the user alarm item data through the calling interface so that the terminal generates a corresponding trigger interface according to the user alarm type description data.
In one embodiment, obtaining corresponding target alarm type description data according to current alarm type data includes: acquiring a candidate alarm type description data set, wherein the candidate alarm type description data set comprises at least one candidate alarm type description data, and each candidate alarm type description data has corresponding candidate alarm type data; and determining target alarm type description data from the candidate alarm type description data set according to the current alarm type data and the candidate alarm type data.
In one embodiment, the data alert method further comprises: acquiring a current alarm access request, and determining current alarm type data and corresponding original alarm item data according to the current alarm access request; distributing corresponding access interfaces according to the current alarm access request; acquiring current alarm item information corresponding to the original alarm item data through an access interface; generating current alarm item data corresponding to the current alarm type data according to the current alarm item information and the original alarm item data; generating corresponding current alarm type description data according to the current alarm item data corresponding to the current alarm type data, and taking the current alarm type description data as candidate alarm type description data.
In one embodiment, the data alert method further comprises: extracting a corresponding target key field from the alarm information; detecting whether the same historical alarm key field exists in the alarm counter according to the target key field; when the historical alarm key fields with the same target key fields do not exist in the alarm counter, triggering alarm according to alarm information and sending the alarm information; when the historical alarm key fields with the same target key field exist in the alarm counter, acquiring an alarm strategy corresponding to the number of historical alarms, and determining a current alarm time interval according to the historical alarm time corresponding to the historical alarm key field and the current time corresponding to the target key field; and determining whether to trigger an alarm according to the current alarm time interval and the alarm strategy.
In one embodiment, determining whether to trigger an alarm according to a current alarm time interval and an alarm strategy includes acquiring an alarm time interval threshold corresponding to the alarm strategy; triggering an alarm when the current alarm time interval is not smaller than the alarm time interval threshold; and when the current alarm time interval is smaller than the alarm time interval threshold value, not triggering an alarm.
In one embodiment, determining the corresponding target alarm state according to the current alarm data and the target alarm type description data includes: when the current alarm data is matched with the target alarm type description data, determining that the corresponding target alarm state is a first alarm state; when the current alarm data is not matched with the target alarm type description data, determining that the corresponding target alarm state is a second alarm state, and the first alarm state and the second alarm state are alarm states with opposite states.
A data alert device, the device comprising:
the first acquisition module is used for acquiring current alarm data corresponding to the target interface, wherein the current alarm data comprises current alarm type data and corresponding current alarm item data;
the second acquisition module is used for acquiring corresponding target alarm type description data according to the current alarm type data;
The alarm state determining module is used for determining a target alarm state according to the current alarm data and the target alarm type description data;
and the alarm information generation module is used for generating corresponding alarm information according to the target alarm state.
A computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, the processor implementing the steps of:
acquiring current alarm data corresponding to a target interface, wherein the current alarm data comprises current alarm type data and corresponding current alarm item data;
acquiring corresponding target alarm type description data according to the current alarm type data;
determining a target alarm state according to the current alarm data and the target alarm type description data;
and generating corresponding alarm information according to the target alarm state.
A computer readable storage medium having stored thereon a computer program which when executed by a processor performs the steps of:
acquiring current alarm data corresponding to a target interface, wherein the current alarm data comprises current alarm type data and corresponding current alarm item data;
acquiring corresponding target alarm type description data according to the current alarm type data;
Determining a target alarm state according to the current alarm data and the target alarm type description data;
and generating corresponding alarm information according to the target alarm state.
The data alarming method, the device, the computer equipment and the storage medium, wherein the server acquires current alarming data corresponding to the target interface, and the current alarming data comprises current alarming type data and corresponding current alarming item data; acquiring corresponding target alarm type description data according to the current alarm type data; determining a target alarm state according to the current alarm data and the target alarm type description data; and generating corresponding alarm information according to the target alarm state. Therefore, different service parties correspond to different trigger interfaces, the service parties can send corresponding alarm data to the server through the corresponding trigger interfaces, and the server is used for carrying out centralized monitoring and alarming on the alarm data of the different service parties, so that the data monitoring efficiency is improved.
Drawings
FIG. 1 is a diagram of an application environment for a data alerting method in one embodiment;
FIG. 2 is a flow chart of a data alert method in one embodiment;
FIG. 3 is a flow chart illustrating the current alert data acquisition steps in one embodiment;
FIG. 4 is a flow chart of a trigger interface generation step in one embodiment;
FIG. 5 is a flow chart illustrating the steps of obtaining target alert type description data in one embodiment;
FIG. 6 is a flow chart of a data alert method in another embodiment;
FIG. 7 is a flow chart of a data alerting method in yet another embodiment;
FIG. 8 is a flow chart illustrating the target alert status determination steps in one embodiment;
FIG. 9 is a block diagram of a data alert device in one embodiment;
fig. 10 is an internal structural view of a computer device in one embodiment.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application will be further described in detail with reference to the accompanying drawings and examples. It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the present application.
The data alarming method provided by the application can be applied to an application environment shown in figure 1. The terminal 102 communicates with the processing server 104 through a network, and the processing server 104 and the service server 106 are connected through a network. The terminal 102 may be, but not limited to, various personal computers, notebook computers, smartphones, tablet computers, and portable wearable devices, and the processing server 104 and the service server 106 may be implemented by separate servers or a server cluster composed of a plurality of servers. The processing server 104 is used for centralized data alarming, and the service server 106 is a server corresponding to a service party, the service server 106 is provided with a corresponding trigger interface, and the processing server 104 can obtain alarming data corresponding to different service parties through the trigger interface.
Specifically, the service server 106 collects the corresponding alarm data, and the processing server 104 acquires the corresponding alarm data from the service server 106 through the trigger interface as the current alarm data. Or, the processing server 104 may determine the target service server 106 from the service servers 106, obtain corresponding current alarm data through the target interface, where the current alarm data includes current alarm type data and corresponding current alarm item data, obtain corresponding target alarm type description data according to the current alarm type data, determine a target alarm state according to the current alarm data and the target alarm type description data, and generate corresponding alarm information according to the target alarm state. Further, the server 104 may send alert information to the terminal 102, which may be presented by the terminal 102 through a related alert application.
In one embodiment, as shown in fig. 2, a data alert method is provided, and the method is applied to the processing server in fig. 1 for illustration, and includes the following steps:
step 202, current alarm data corresponding to the target interface is obtained, wherein the current alarm data comprises current alarm type data and corresponding current alarm item data.
The server is provided with a plurality of trigger interfaces, the trigger interfaces are interfaces for triggering alarm, the target interfaces are determined from the plurality of trigger interfaces, specifically, the target interfaces can be determined from the plurality of trigger interfaces according to preset trigger conditions corresponding to the trigger interfaces, for example, the trigger interfaces meeting the preset trigger conditions can be used as the target interfaces. The preset triggering condition is an alarm condition used for monitoring the triggering interface in advance, and can be set according to actual service requirements or actual application scenes.
The corresponding alarm data exists in each trigger interface, namely, different alarm data can be acquired through different trigger interfaces, so that after the target interface is determined, the corresponding alarm data is acquired through the target interface and is used as current alarm data.
The alarm data comprises alarm type data and alarm item data corresponding to the alarm type data, wherein the alarm type data is used for describing service alarm types, such as game server alarms, jump middleware alarms (an open source middleware) and Kafka middleware alarms, which can be used as alarm type data. The alarm item data is based on the corresponding alarm type data, one alarm type data can have a plurality of alarm item data, the alarm item data can be customized, and the alarm item data can be obtained according to service requirements or product application scene settings. For example, the alarm type data is: the Kafka middleware alarms, and different Topic conditions in the Kafka middleware are various alarm item data because different business parties need to monitor different Topic conditions in the Kafka middleware.
Specifically, the server determines a target interface from a plurality of trigger interfaces, acquires corresponding current alarm data through the target interface, and after the current alarm data are obtained, the current alarm data comprise current alarm type data and corresponding current alarm item data.
And step 204, acquiring corresponding target alarm type description data according to the current alarm type data.
The alarm type description data is used for defining and developing the trigger interface, and a corresponding trigger interface can be created according to the alarm type description data, that is, the corresponding alarm type description data exists in different trigger interfaces, wherein the alarm type description data comprises alarm item type data and alarm item information corresponding to the corresponding alarm item data, the alarm item information is used for describing specific data corresponding to the alarm item data, and a service party can be configured according to an actual service scene and product requirements.
Wherein, because each trigger interface has corresponding alarm type data and corresponding alarm item data, the corresponding alarm type description data can be obtained according to the alarm type data. Specifically, after the current alarm type data is acquired, the current alarm type data is corresponding to the target interface, and the target interface is created through the corresponding alarm type description data, so that the corresponding target alarm type description data can be acquired according to the current alarm type data.
And 206, determining the target alarm state according to the current alarm data and the target alarm type description data.
The target alarm state herein is an alarm state corresponding to the target interface, and the alarm state includes, but is not limited to, a first alarm state and a second alarm state, where the first alarm state and the second alarm state are alarm states with opposite states, for example, the first alarm state may be an alarm on state, and the second alarm state may be an alarm off state.
Specifically, after the current alarm data and the target alarm type description data are acquired, the corresponding target alarm state may be determined according to the current alarm data and the target alarm type description data, specifically, the target alarm data corresponding to the target alarm type description data may be acquired, the target alarm data and the current alarm data are compared to obtain the target alarm state, for example, if the target alarm data are matched with the current alarm data, the target alarm state is determined to be the first alarm state, and if the target alarm data are not matched with the current alarm data, the target alarm state is determined to be the second alarm state.
The target alert data is matched with the current alert data, specifically, the target alert data may be determined to be matched with the current alert data when the target alert item data corresponding to the same alert type data is the same as the current alert item data, or may be determined to be not matched with the current alert data when the target alert item data corresponding to the same alert type data is not the same as the current alert item data, because the target alert data includes the target alert type data and the corresponding target alert item data.
And step 208, generating corresponding alarm information according to the target alarm state.
Wherein, after the target alarm state is obtained, corresponding alarm information can be generated according to the target alarm state, wherein the alarm information is information related to the alarm, including but not limited to alarm signals and the like. The generating the corresponding alarm information according to the target alarm state may specifically be determining whether an alarm occurs according to the target alarm state, if the alarm occurs, generating the corresponding alarm information according to the current alarm data, and if the alarm does not occur according to the target alarm state, generating the alarm information is not needed.
Whether an alarm occurs or not is determined according to the target alarm state, and the target alarm state may be a first alarm state, and the first alarm state is an alarm on state, and when the target alarm state is the alarm on state, corresponding alarm information is generated according to the current alarm data, that is, the current alarm data is carried into the alarm information. When the target alarm state can be a second alarm state, and the second alarm state is an alarm closing state, when the target alarm state is the alarm closing state, no alarm information is required to be generated.
In the data alarming method, the server acquires current alarming data corresponding to the target interface, wherein the current alarming data comprises current alarming type data and corresponding current alarming item data; acquiring corresponding target alarm type description data according to the current alarm type data; determining a target alarm state according to the current alarm data and the target alarm type description data; and generating corresponding alarm information according to the target alarm state. Therefore, different service parties correspond to different trigger interfaces, the service parties can send corresponding alarm data to the server through the corresponding trigger interfaces, and the server is used for carrying out centralized monitoring and alarming on the alarm data of the different service parties, so that the data monitoring efficiency is improved.
In one embodiment, as shown in fig. 3, obtaining current alarm data corresponding to a target interface includes:
step 302, obtaining interface alarm data returned by each trigger interface, wherein the interface alarm data comprises interface alarm type data and corresponding interface alarm item data.
Step 304, obtaining preset interface triggering conditions corresponding to the alarm type data of each interface.
The interface alarm data herein refers to alarm data corresponding to a trigger interface, where the trigger interface is an interface for triggering an alarm, and each trigger interface has corresponding interface alarm data, that is, different interface alarm data can be obtained through different trigger interfaces.
Specifically, corresponding interface alarm data are obtained through each trigger interface, the interface alarm data comprise interface alarm type data and corresponding interface alarm item data, wherein each interface alarm type data has corresponding preset interface trigger conditions, the preset interface trigger conditions are alarm conditions for monitoring the alarm type data are set in advance, and the preset interface trigger conditions corresponding to each interface alarm type data can be set according to actual service needs or actual application scenes.
And step 306, determining a target interface from all the trigger interfaces according to the preset interface trigger conditions and interface alarm item data.
Step 308, obtaining the current alarm data corresponding to the target interface according to the corresponding relation between the trigger interface and the alarm data.
Specifically, after obtaining the preset interface triggering conditions corresponding to the alarm type data of each interface, determining a target interface from each triggering interface according to the preset interface triggering conditions and the alarm item data of the interface, and specifically, determining the triggering interface corresponding to the alarm item data of the interface meeting the preset interface triggering conditions as the target interface.
Further, the corresponding relation between the trigger interface and the alarm data is obtained, and the alarm data corresponding to the target interface is obtained according to the relation and used as the current alarm data. The corresponding alarm data can be acquired through the trigger interface, and different trigger interfaces correspond to different alarm data, so that the relation between the trigger interface and the alarm data can be established in advance, for example, the interface identifier of the trigger interface is acquired, and the relation between the interface identifier and the corresponding alarm data is established, so that after the target interface is determined, the target interface identifier corresponding to the target interface is acquired, and the matched alarm data is searched according to the target interface identifier and the relation to serve as the current alarm data.
In one embodiment, as shown in fig. 4, the step of generating the trigger interface includes:
step 402, a user login request is received, where the user login request carries a current user identifier.
Step 404, implementing the login of the current user corresponding to the current user identifier according to the user login request, and receiving a user alarm access request sent by the current user, where the user alarm access request carries user alarm type data and corresponding user alarm item data.
The user login request is used by the current user to request login, and carries the current user identifier, wherein the current user identifier is used for uniquely identifying the current login user. Specifically, the server may receive a user login request sent from the terminal, may set a related application at the terminal, trigger generation of the user login request through an interface of the related application, and send the user login request to the server through a network.
Further, after receiving the user login request, the server may implement the current user login corresponding to the current user identifier according to the user login request, specifically, may verify whether the current user corresponding to the current user identifier has login rights, if the current user has login rights, the login is successful, and if the current user does not have login rights, the login rights are opened for the current user, so as to implement the current user login.
Secondly, the server returns a successful login message to the terminal, the terminal can receive a user alarm access request sent by the current user, the user alarm access request is used for requesting access to alarm, the current user can edit user alarm type data and corresponding user alarm item data through a relevant application interface of the terminal, and the user alarm type data and the corresponding user alarm item data are sent to the server through the user alarm access request.
Step 406, distributing the corresponding calling interface according to the user alarm access request.
And step 408, acquiring user alarm type description data corresponding to the user alarm item data through a calling interface so that the terminal generates a corresponding triggering interface according to the user alarm type description data.
Specifically, after receiving the user alarm access request, the server may allocate a corresponding call interface according to the user alarm access request, where the call interface is used to call user alarm type data edited by a user and corresponding alarm item data, after allocating the corresponding call interface, the service side may obtain user alarm type description data corresponding to the user alarm item data through the call interface, specifically, the service side may obtain user alarm item data through the call interface, edit user alarm item information corresponding to the user alarm item data according to its own service requirement or application scenario, generate corresponding user alarm type description data according to the user alarm item information and the user alarm item data, and send the generated user alarm type description data to the server.
The user alarm item information is specific data corresponding to the user alarm item data, and the user alarm item information is filled into the corresponding user alarm item data to obtain user alarm type description data. Further, after receiving the user alarm type description data, the server sends the user alarm type description data to the terminal where the current user is located, so that the terminal generates a corresponding trigger interface according to the user alarm type description data. Specifically, when the terminal receives the user alarm type description data, a corresponding trigger interface can be created according to an interface definition protocol and information required by interface creation in the user alarm type description data.
In one embodiment, as shown in fig. 5, obtaining corresponding target alarm type description data according to current alarm type data includes:
step 502, a candidate alarm type description data set is acquired, wherein the candidate alarm type description data set comprises at least one candidate alarm type description data, and each candidate alarm type description data has corresponding candidate alarm type data.
Step 504, determining target alarm type description data from the candidate alarm type description data set according to the current alarm type data and the candidate alarm type data.
The candidate alarm type description data set herein is a set of candidate alarm type description data, and includes at least one candidate alarm type description data, specifically, all generated alarm type description data may be stored as candidate alarm type description data locally to form the candidate alarm type description data set. The alarm type description data comprises corresponding alarm type data and corresponding alarm item data, so that each candidate alarm type description data has corresponding candidate alarm type data and corresponding candidate alarm item data.
Further, the target alarm type description data may be determined from the candidate alarm type description data set according to the current alarm type data and the candidate alarm type data in the current alarm data, specifically, the current alarm type data may be compared with each candidate alarm type data in the candidate alarm type data set, and when the current alarm type data is the same as the candidate alarm type data, the candidate alarm type description data corresponding to the candidate alarm type data is used as the target alarm type description data. Or detecting whether the current alarm type data is the associated data of the candidate alarm type data, if so, using the candidate alarm type description data corresponding to the candidate alarm type data as the target alarm type description data.
In one embodiment, as shown in fig. 6, the data alert method further includes:
step 602, a current alarm access request is acquired, and current alarm type data and corresponding original alarm item data are determined according to the current alarm access request.
Step 604, corresponding access interfaces are allocated according to the current alarm access request.
Step 606, the current alarm item information corresponding to the original alarm item data is obtained through the access interface.
The current alarm access request is currently used for requesting alarm access, the current alarm access request can be obtained from a terminal, a terminal user can trigger generation of the current alarm access request through relevant application arranged on the terminal, and the current alarm access request is sent to a server.
Further, after receiving the current alarm access request, the server may determine current alarm type data and corresponding original alarm item data according to the current alarm access request, where the original alarm item data refers to alarm item data that is not configured with alarm item information, and the alarm item information corresponding to the original alarm item data may be configured by user definition according to an actual service requirement or an application scenario.
And secondly, after the current alarm type data and the corresponding original alarm item data are obtained, a corresponding access interface can be allocated according to the current alarm access request, wherein the access interface is a channel for configuring alarm item information corresponding to the original alarm item data, and a service party can configure the alarm item information corresponding to the original alarm item data through the access interface.
Finally, the service party can configure the current alarm item information corresponding to the original alarm item data through the distributed access interface according to the service requirement or the actual scene, wherein the current alarm item information is specific data corresponding to the original alarm item data and is used for describing the specific condition of the original alarm item data.
And 608, generating current alarm item data corresponding to the current alarm type data according to the current alarm item information and the original alarm item data.
Step 610, generating corresponding current alarm type description data according to the current alarm item data corresponding to the current alarm type data, and taking the current alarm type description data as candidate alarm type description data.
The current alarm item information is specific data corresponding to the original alarm item data and is used for describing the specific situation of the original alarm item data, so that the current alarm item data corresponding to the current alarm type data can be generated according to the current alarm item information and the original alarm item data, specifically, the original alarm item data is taken as a key, the corresponding current alarm item information is taken as a value corresponding to the key, and the corresponding current alarm item data is generated through the key-value.
Further, after the current alarm type data is obtained, corresponding current alarm type description data may be generated according to the current alarm item data corresponding to the current alarm type data, and specifically, the current alarm type description data may be obtained by combining the current alarm type data and the corresponding current alarm item data. And finally, taking the current alarm type description data as candidate alarm type description data in a candidate alarm type description data set.
In one embodiment, as shown in fig. 7, the data alert method further includes:
step 702, extracting a corresponding target key field from the alarm information.
Step 704, detecting whether the historical alarm key field exists in the alarm counter with the same as the target key field according to the target key field.
In step 706, when the historical alarm key field which is the same as the target key field does not exist in the alarm counter, an alarm is triggered according to the alarm information, and the alarm information is sent.
The target key field is configured in advance and can be determined according to service requirements or application scenes. Since the alarm information is composed of a plurality of fields, the target key field can be determined from the plurality of fields according to the service requirement or the application scene, and the target key field is used as a detection standard.
Specifically, after the alarm information is obtained, a corresponding target key field is extracted from the alarm information, and whether the same historical alarm key field exists in the alarm counter is detected according to the target key field, wherein the historical alarm key field refers to a key field which is stored in the alarm counter and is the same as the target key field.
When the fact that the historical alarm key field which is the same as the target key field does not exist in the alarm counter is detected, the fact that the historical alarm field which is the same as the target key field is not stored in the alarm counter is explained, that is, the target key field is not alarmed before the fact, therefore when the fact that the historical alarm key field which is the same as the target key field does not exist in the alarm counter is detected, alarm is triggered according to alarm information, and the alarm information is sent.
When sending the alarm information, the server can store a plurality of alarm modes in advance, select a target alarm mode from all alarm modes according to actual service requirements or application scenes, and send the alarm information through the target alarm mode.
Step 708, when the historical alarm key field which is the same as the target key field exists in the alarm counter, acquiring an alarm strategy corresponding to the number of historical alarms, and determining a current alarm time interval according to the historical alarm time corresponding to the historical alarm key field and the current time corresponding to the target key field.
Step 710, determining whether to trigger an alarm according to the current alarm time interval and the alarm policy.
When the historical alarm key field which is the same as the target key field exists in the alarm counter, the historical alarm field which is the same as the target key field is stored in the alarm counter, and the target key field is alarmed before the historical alarm field is stored, so that in order to avoid repeated alarms, the historical alarm key field needs to be alarmed according to an alarm strategy.
Specifically, the historical alarm times are obtained, the historical alarm times refer to the times of alarming the target key field obtained by counting by the alarm counter, alarm strategies corresponding to different historical alarm times are different, and the relation between the historical alarm times and the alarm strategies can be set in advance and can be set according to service requirements or application scenes. Further, the historical alarm time corresponding to the historical alarm key field and the current time corresponding to the target key field are obtained, and the current alarm time interval is obtained through calculation according to the historical alarm time and the current time. Specifically, the time difference between the historical alarm time and the current time is taken as the current alarm time interval.
Finally, whether to trigger the alarm can be determined according to the current alarm time interval and the alarm strategy, specifically, because the alarm strategy has the corresponding alarm time interval threshold, the alarm time interval threshold corresponding to the alarm strategy can be obtained, and whether to generate the alarm is determined according to the current alarm time interval and the alarm time interval threshold corresponding to the alarm strategy.
In one embodiment, determining whether to trigger an alarm according to the current alarm time interval and the alarm policy includes acquiring an alarm time interval threshold corresponding to the alarm policy, triggering the alarm when the current alarm time interval is not less than the alarm time interval threshold, and not triggering the alarm when the current alarm time interval is less than the alarm time interval threshold.
The determining whether to trigger the alarm according to the current alarm time interval and the alarm policy may specifically be that, since different alarm policies correspond to different alarm time interval thresholds, a relationship between each alarm policy and the corresponding alarm time interval threshold may be set in advance according to an actual service requirement or an application scenario, the alarm time interval threshold corresponding to the alarm policy is obtained, whether to need to generate an alarm is determined according to the alarm time interval threshold and the current alarm time interval, when the current alarm time interval is not less than the alarm time interval threshold, the alarm is triggered, and when the current time interval is less than the alarm time interval threshold, the alarm is not touched.
For example, the target key field is at 13:00 alarms occur for the first time, and at this time, the first alarm strategy is: every 10 minutes, therefore, the alarm time interval threshold corresponding to the first alarm strategy is: 10 minutes, alarm counter at 14:05 receives the same target key field, since 14:05 and 13:00 has exceeded 10 minutes, so at 14:05, a second alarm occurs, and at this time, the second alarm strategy is: every 15 minutes, therefore, the alarm time interval threshold corresponding to the second alarm strategy is: 15 minutes, alarm counter at 14: the same target key field is received 15 minutes, since 14:15 and 14:05 does not exceed 15 minutes, so at 14:15 does not alarm and stores the target key field. That is, different alarm times correspond to different alarm policies, and different alarm policies correspond to different alarm time interval thresholds.
In one embodiment, as shown in fig. 8, determining a corresponding target alarm state according to the current alarm data and the target alarm type description data includes:
step 802, when the current alarm data matches the target alarm type description data, determining the corresponding target alarm state as the first alarm state.
In step 804, when the current alarm data and the target alarm type description data are not matched, it is determined that the corresponding target alarm state is the second alarm state, and the first alarm state and the second alarm state are alarm states with opposite states.
Specifically, whether an alarm occurs is determined according to the target alarm state, which may be a first alarm state, where the first alarm state is an alarm on state, and when the target alarm state is the alarm on state, corresponding alarm information is generated according to the current alarm data, that is, the current alarm data is carried into the alarm information. When the target alarm state can be a second alarm state, and the second alarm state is an alarm closing state, when the target alarm state is the alarm closing state, no alarm information is required to be generated.
Specifically, the current alarm data and the target alarm type description data are matched, and the target alarm type description data has corresponding target alarm data, so that the current alarm data and the target alarm data can be compared, when the current alarm data and the target alarm data are matched, the current alarm data and the target alarm type description data are indicated to be matched, the corresponding target alarm state is determined to be a first alarm state, and when the current alarm data and the target alarm type description data are not matched, the corresponding target alarm state is determined to be a second alarm state.
In a specific embodiment, a data alarming method is provided, which specifically includes the following steps:
1. and acquiring current alarm data corresponding to the target interface, wherein the current alarm data comprises current alarm type data and corresponding current alarm item data.
1-1, receiving a user login request, wherein the user login request carries a current user identifier.
1-2, realizing the login of the current user corresponding to the current user identifier according to the user login request, and receiving a user alarm access request sent by the current user, wherein the user alarm access request carries user alarm type data and corresponding user alarm item data.
1-3, distributing corresponding calling interfaces according to the user alarm access request.
1-4, acquiring user alarm type description data corresponding to the user alarm item data through a calling interface, so that the terminal generates a corresponding triggering interface according to the user alarm type description data.
1-5, acquiring interface alarm data returned by each trigger interface, wherein the interface alarm data comprises interface alarm type data and corresponding interface alarm item data.
1-6, acquiring preset interface triggering conditions corresponding to the alarm type data of each interface.
1-7, determining a target interface from all trigger interfaces according to preset interface trigger conditions and interface alarm item data.
1-8, acquiring current alarm data corresponding to the target interface according to the corresponding relation between the trigger interface and the alarm data.
2. And acquiring corresponding target alarm type description data according to the current alarm type data.
2-1, acquiring a current alarm access request, and determining current alarm type data and corresponding original alarm item data according to the current alarm access request.
2-2, distributing corresponding access interfaces according to the current alarm access request.
2-3, acquiring current alarm item information corresponding to the original alarm item data through an access interface.
2-4, generating current alarm item data corresponding to the current alarm type data according to the current alarm item information and the original alarm item data.
2-5, generating corresponding current alarm type description data according to the current alarm item data corresponding to the current alarm type data, and taking the current alarm type description data as candidate alarm type description data.
2-6, acquiring a candidate alarm type description data set, wherein the candidate alarm type description data set comprises at least one candidate alarm type description data, and each candidate alarm type description data has corresponding candidate alarm type data.
2-7, determining target alarm type description data from the candidate alarm type description data set according to the current alarm type data and the candidate alarm type data.
3. And determining the target alarm state according to the current alarm data and the target alarm type description data.
3-1, when the current alarm data is matched with the target alarm type description data, determining the corresponding target alarm state as a first alarm state.
3-2, when the current alarm data is not matched with the target alarm type description data, determining that the corresponding target alarm state is a second alarm state, and the first alarm state and the second alarm state are alarm states with opposite states.
4. And generating corresponding alarm information according to the target alarm state.
5. And extracting a corresponding target key field from the alarm information.
6. And detecting whether the same historical alarm key field exists in the alarm counter according to the target key field.
7. When the historical alarm key fields with the same target key fields do not exist in the alarm counter, the alarm is triggered according to the alarm information, and the alarm information is sent.
8. When the historical alarm key fields with the same target key field exist in the alarm counter, acquiring an alarm strategy corresponding to the number of historical alarms, and determining a current alarm time interval according to the historical alarm time corresponding to the historical alarm key field and the current time corresponding to the target key field.
9. And determining whether to trigger an alarm according to the current alarm time interval and the alarm strategy.
9-1, acquiring an alarm time interval threshold corresponding to the alarm strategy.
9-2, triggering an alarm when the current alarm time interval is not smaller than the alarm time interval threshold.
9-3, when the current alarm time interval is smaller than the alarm time interval threshold value, not triggering an alarm.
It should be understood that, although the steps in the above-described flowcharts are shown in order as indicated by the arrows, these steps are not necessarily performed in order as indicated by the arrows. The steps are not strictly limited to the order of execution unless explicitly recited herein, and the steps may be executed in other orders. Moreover, at least some of the steps in the flowcharts described above may include a plurality of sub-steps or stages that are not necessarily performed at the same time, but may be performed at different times, and the order of execution of the sub-steps or stages is not necessarily sequential, but may be performed alternately or alternately with at least a part of the sub-steps or stages of other steps or other steps.
In one embodiment, as shown in fig. 9, there is provided a data alert device 900 comprising: a first acquisition module 902, a second acquisition module 904, an alarm state determination module 906, and an alarm information generation module 908, wherein:
The first obtaining module 902 is configured to obtain current alarm data corresponding to the target interface, where the current alarm data includes current alarm type data and corresponding current alarm item data.
And a second obtaining module 904, configured to obtain corresponding target alarm type description data according to the current alarm type data.
The alarm state determining module 906 is configured to determine a target alarm state according to the current alarm data and the target alarm type description data.
The alarm information generating module 908 is configured to generate corresponding alarm information according to the target alarm state.
In an embodiment, the first obtaining module 902 is further configured to obtain interface alarm data returned by each trigger interface, where the interface alarm data includes interface alarm type data and corresponding interface alarm item data, obtain preset interface trigger conditions corresponding to each interface alarm type data, determine a target interface from each trigger interface according to the preset interface trigger conditions and the interface alarm item data, and obtain current alarm data corresponding to the target interface according to a corresponding relationship between the trigger interface and the alarm data.
In one embodiment, the first obtaining module 902 is further configured to receive a user login request, where the user login request carries a current user identifier, implement login of a current user corresponding to the current user identifier according to the user login request, receive a user alert access request sent by the current user, where the user alert access request carries user alert type data and corresponding user alert item data, allocate a corresponding call interface according to the user alert access request, and obtain, by using the call interface, user alert type description data corresponding to the user alert item data, so that the terminal generates a corresponding trigger interface according to the user alert type description data.
In one embodiment, the second obtaining module 904 is further configured to obtain a candidate alarm type description data set, where the candidate alarm type description data set includes at least one candidate alarm type description data, each candidate alarm type description data has corresponding candidate alarm type data, and determine target alarm type description data from the candidate alarm type description data set according to the current alarm type data and the candidate alarm type data.
In one embodiment, the data alert device 900 is further configured to obtain a current alert access request, determine current alert type data and corresponding original alert item data according to the current alert access request, allocate a corresponding access interface according to the current alert access request, obtain current alert item information corresponding to the original alert item data through the access interface, generate current alert item data corresponding to the current alert type data according to the current alert item information and the original alert item data, generate corresponding current alert type description data according to the current alert item data corresponding to the current alert type data, and use the current alert type description data as candidate alert type description data.
In one embodiment, the data alarm device 900 is further configured to extract a corresponding target key field from the alarm information, detect whether the same historical alarm key field exists in the alarm counter according to the target key field, trigger an alarm according to the alarm information when the same historical alarm key field does not exist in the alarm counter, send the alarm information, obtain an alarm policy corresponding to the number of historical alarms when the same historical alarm key field exists in the alarm counter, determine a current alarm time interval according to a historical alarm time corresponding to the historical alarm key field and a current time corresponding to the target key field, and determine whether to trigger an alarm according to the current alarm time interval and the alarm policy.
In this embodiment, the data alarm device 900 is further configured to obtain an alarm time interval threshold corresponding to an alarm policy, trigger an alarm when the current alarm time interval is not less than the alarm time interval threshold, and not trigger an alarm when the current alarm time interval is less than the alarm time interval threshold.
In one embodiment, the alarm state determining module 906 is further configured to determine that the corresponding target alarm state is a first alarm state when the current alarm data matches the target alarm type description data, and determine that the corresponding target alarm state is a second alarm state when the current alarm data does not match the target alarm type description data, where the first alarm state and the second alarm state are alarm states opposite to each other. The specific limitation of the data alarm device can be referred to the limitation of the data alarm method hereinabove, and will not be repeated herein. The various modules in the data alert device described above may be implemented in whole or in part by software, hardware, and combinations thereof. The above modules may be embedded in hardware or may be independent of a processor in the computer device, or may be stored in software in a memory in the computer device, so that the processor may call and execute operations corresponding to the above modules.
In one embodiment, a computer device is provided, which may be a server, and the internal structure of which may be as shown in fig. 10. The computer device includes a processor, a memory, a network interface, and a database connected by a system bus. Wherein the processor of the computer device is configured to provide computing and control capabilities. The memory of the computer device includes a non-volatile storage medium and an internal memory. The non-volatile storage medium stores an operating system, computer programs, and a database. The internal memory provides an environment for the operation of the operating system and computer programs in the non-volatile storage media. The database of the computer device is used for storing alarm information. The network interface of the computer device is used for communicating with an external terminal through a network connection. The computer program is executed by a processor to implement a data alerting method.
It will be appreciated by those skilled in the art that the structure shown in fig. 10 is merely a block diagram of some of the structures associated with the present application and is not limiting of the computer device to which the present application may be applied, and that a particular computer device may include more or fewer components than shown, or may combine certain components, or have a different arrangement of components.
In one embodiment, a computer device is provided comprising a memory, a processor, and a computer program stored on the memory and executable on the processor, the processor implementing the steps of when executing the computer program: acquiring current alarm data corresponding to a target interface, wherein the current alarm data comprises current alarm type data and corresponding current alarm item data; acquiring corresponding target alarm type description data according to the current alarm type data; determining a target alarm state according to the current alarm data and the target alarm type description data; and generating corresponding alarm information according to the target alarm state.
In one embodiment, the processor when executing the computer program further performs the steps of: acquiring interface alarm data returned by each trigger interface, wherein the interface alarm data comprises interface alarm type data and corresponding interface alarm item data; acquiring preset interface triggering conditions corresponding to the alarm type data of each interface; determining a target interface from all trigger interfaces according to preset interface trigger conditions and interface alarm item data; and acquiring the current alarm data corresponding to the target interface according to the corresponding relation between the trigger interface and the alarm data.
In one embodiment, the processor when executing the computer program further performs the steps of: receiving a user login request, wherein the user login request carries a current user identifier; according to the user login request, the login of the current user corresponding to the current user identifier is realized, a user alarm access request sent by the current user is received, and the user alarm access request carries user alarm type data and corresponding user alarm item data; distributing a corresponding calling interface according to the user alarm access request; and acquiring user alarm type description data corresponding to the user alarm item data through the calling interface so that the terminal generates a corresponding trigger interface according to the user alarm type description data.
In one embodiment, the processor when executing the computer program further performs the steps of: acquiring a candidate alarm type description data set, wherein the candidate alarm type description data set comprises at least one candidate alarm type description data, and each candidate alarm type description data has corresponding candidate alarm type data; and determining target alarm type description data from the candidate alarm type description data set according to the current alarm type data and the candidate alarm type data.
In one embodiment, the processor when executing the computer program further performs the steps of: acquiring a current alarm access request, and determining current alarm type data and corresponding original alarm item data according to the current alarm access request; distributing corresponding access interfaces according to the current alarm access request; acquiring current alarm item information corresponding to the original alarm item data through an access interface; generating current alarm item data corresponding to the current alarm type data according to the current alarm item information and the original alarm item data; generating corresponding current alarm type description data according to the current alarm item data corresponding to the current alarm type data, and taking the current alarm type description data as candidate alarm type description data.
In one embodiment, the processor when executing the computer program further performs the steps of: extracting a corresponding target key field from the alarm information; detecting whether the same historical alarm key field exists in the alarm counter according to the target key field; when the historical alarm key fields with the same target key fields do not exist in the alarm counter, triggering alarm according to alarm information and sending the alarm information; when the historical alarm key fields with the same target key field exist in the alarm counter, acquiring an alarm strategy corresponding to the number of historical alarms, and determining a current alarm time interval according to the historical alarm time corresponding to the historical alarm key field and the current time corresponding to the target key field; and determining whether to trigger an alarm according to the current alarm time interval and the alarm strategy.
In one embodiment, the processor when executing the computer program further performs the steps of: acquiring an alarm time interval threshold corresponding to an alarm strategy; triggering an alarm when the current alarm time interval is not smaller than the alarm time interval threshold; and when the current alarm time interval is smaller than the alarm time interval threshold value, not triggering an alarm.
In one embodiment, the processor when executing the computer program further performs the steps of: when the current alarm data is matched with the target alarm type description data, determining that the corresponding target alarm state is a first alarm state; when the current alarm data is not matched with the target alarm type description data, determining that the corresponding target alarm state is a second alarm state, and the first alarm state and the second alarm state are alarm states with opposite states.
In one embodiment, a computer readable storage medium is provided having a computer program stored thereon, which when executed by a processor, performs the steps of: acquiring current alarm data corresponding to a target interface, wherein the current alarm data comprises current alarm type data and corresponding current alarm item data; acquiring corresponding target alarm type description data according to the current alarm type data; determining a target alarm state according to the current alarm data and the target alarm type description data; and generating corresponding alarm information according to the target alarm state.
In one embodiment, the processor when executing the computer program further performs the steps of: acquiring interface alarm data returned by each trigger interface, wherein the interface alarm data comprises interface alarm type data and corresponding interface alarm item data; acquiring preset interface triggering conditions corresponding to the alarm type data of each interface; determining a target interface from all trigger interfaces according to preset interface trigger conditions and interface alarm item data; and acquiring the current alarm data corresponding to the target interface according to the corresponding relation between the trigger interface and the alarm data.
In one embodiment, the processor when executing the computer program further performs the steps of: receiving a user login request, wherein the user login request carries a current user identifier; according to the user login request, the login of the current user corresponding to the current user identifier is realized, a user alarm access request sent by the current user is received, and the user alarm access request carries user alarm type data and corresponding user alarm item data; distributing a corresponding calling interface according to the user alarm access request; and acquiring user alarm type description data corresponding to the user alarm item data through the calling interface so that the terminal generates a corresponding trigger interface according to the user alarm type description data.
In one embodiment, the processor when executing the computer program further performs the steps of: acquiring a candidate alarm type description data set, wherein the candidate alarm type description data set comprises at least one candidate alarm type description data, and each candidate alarm type description data has corresponding candidate alarm type data; and determining target alarm type description data from the candidate alarm type description data set according to the current alarm type data and the candidate alarm type data.
In one embodiment, the processor when executing the computer program further performs the steps of: acquiring a current alarm access request, and determining current alarm type data and corresponding original alarm item data according to the current alarm access request; distributing corresponding access interfaces according to the current alarm access request; acquiring current alarm item information corresponding to the original alarm item data through an access interface; generating current alarm item data corresponding to the current alarm type data according to the current alarm item information and the original alarm item data; generating corresponding current alarm type description data according to the current alarm item data corresponding to the current alarm type data, and taking the current alarm type description data as candidate alarm type description data.
In one embodiment, the processor when executing the computer program further performs the steps of: extracting a corresponding target key field from the alarm information; detecting whether the same historical alarm key field exists in the alarm counter according to the target key field; when the historical alarm key fields with the same target key fields do not exist in the alarm counter, triggering alarm according to alarm information and sending the alarm information; when the historical alarm key fields with the same target key field exist in the alarm counter, acquiring an alarm strategy corresponding to the number of historical alarms, and determining a current alarm time interval according to the historical alarm time corresponding to the historical alarm key field and the current time corresponding to the target key field; and determining whether to trigger an alarm according to the current alarm time interval and the alarm strategy.
In one embodiment, the processor when executing the computer program further performs the steps of: acquiring an alarm time interval threshold corresponding to an alarm strategy; triggering an alarm when the current alarm time interval is not smaller than the alarm time interval threshold; and when the current alarm time interval is smaller than the alarm time interval threshold value, not triggering an alarm.
In one embodiment, the processor when executing the computer program further performs the steps of: when the current alarm data is matched with the target alarm type description data, determining that the corresponding target alarm state is a first alarm state; when the current alarm data is not matched with the target alarm type description data, determining that the corresponding target alarm state is a second alarm state, and the first alarm state and the second alarm state are alarm states with opposite states.
Those skilled in the art will appreciate that implementing all or part of the above described methods may be accomplished by way of a computer program stored on a non-transitory computer readable storage medium, which when executed, may comprise the steps of the embodiments of the methods described above. Any reference to memory, storage, database, or other medium used in the various embodiments provided herein may include non-volatile and/or volatile memory. The nonvolatile memory can include Read Only Memory (ROM), programmable ROM (PROM), electrically Programmable ROM (EPROM), electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM) or external cache memory. By way of illustration and not limitation, RAM is available in a variety of forms such as Static RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), double Data Rate SDRAM (DDRSDRAM), enhanced SDRAM (ESDRAM), synchronous Link DRAM (SLDRAM), memory bus direct RAM (RDRAM), direct memory bus dynamic RAM (DRDRAM), and memory bus dynamic RAM (RDRAM), among others.
The technical features of the above embodiments may be arbitrarily combined, and all possible combinations of the technical features in the above embodiments are not described for brevity of description, however, as long as there is no contradiction between the combinations of the technical features, they should be considered as the scope of the description.
The above examples merely represent a few embodiments of the present application, which are described in more detail and are not to be construed as limiting the scope of the invention. It should be noted that it would be apparent to those skilled in the art that various modifications and improvements could be made without departing from the spirit of the present application, which would be within the scope of the present application. Accordingly, the scope of protection of the present application is to be determined by the claims appended hereto.

Claims (9)

1. A data alert method, the method comprising:
acquiring interface alarm data returned by each trigger interface, wherein the interface alarm data comprises interface alarm type data and corresponding interface alarm item data;
acquiring preset interface triggering conditions corresponding to the interface alarm type data;
determining a target interface from each triggering interface according to the preset interface triggering conditions and the interface alarm item data;
Acquiring current alarm data corresponding to the target interface according to the corresponding relation between the trigger interface and the alarm data, wherein the current alarm data comprises current alarm type data and corresponding current alarm item data; the step of generating the trigger interface includes:
receiving a user login request, wherein the user login request carries a current user identifier;
according to the user login request, the login of the current user corresponding to the current user identifier is realized, a user alarm access request sent by the current user is received, and the user alarm access request carries user alarm type data and corresponding user alarm item data;
distributing a corresponding calling interface according to the user alarm access request;
acquiring user alarm type description data corresponding to the user alarm item data through the calling interface so that a terminal generates a corresponding trigger interface according to the user alarm type description data;
acquiring corresponding target alarm type description data according to the current alarm type data;
determining a target alarm state according to the current alarm data and the target alarm type description data;
and generating corresponding alarm information according to the target alarm state.
2. The method according to claim 1, wherein the obtaining corresponding target alarm type description data according to the current alarm type data includes:
acquiring a candidate alarm type description data set, wherein the candidate alarm type description data set comprises at least one candidate alarm type description data, and each candidate alarm type description data has corresponding candidate alarm type data;
and determining target alarm type description data from a candidate alarm type description data set according to the current alarm type data and the candidate alarm type data.
3. The method according to claim 2, wherein the method further comprises:
acquiring a current alarm access request, and determining current alarm type data and corresponding original alarm item data according to the current alarm access request;
distributing corresponding access interfaces according to the current alarm access request;
acquiring current alarm item information corresponding to the original alarm item data through the access interface;
generating current alarm item data corresponding to the current alarm type data according to the current alarm item information and the original alarm item data;
Generating corresponding current alarm type description data according to the current alarm item data corresponding to the current alarm type data, and taking the current alarm type description data as candidate alarm type description data.
4. The method according to claim 1, wherein the method further comprises:
extracting a corresponding target key field from the alarm information;
detecting whether a historical alarm key field which is the same as the target key field exists in an alarm counter according to the target key field;
when the history alarm key field which is the same as the target key field does not exist in the alarm counter, triggering alarm according to the alarm information, and sending the alarm information;
when the historical alarm key field which is the same as the target key field exists in the alarm counter, acquiring an alarm strategy corresponding to the number of historical alarms, and determining a current alarm time interval according to the historical alarm time corresponding to the historical alarm key field and the current time corresponding to the target key field;
and determining whether to trigger an alarm according to the current alarm time interval and the alarm strategy.
5. The method of claim 4, wherein said determining whether to trigger an alarm based on the current alarm time interval and the alarm policy comprises:
Acquiring an alarm time interval threshold corresponding to the alarm strategy;
triggering an alarm when the current alarm time interval is not smaller than the alarm time interval threshold;
and when the current alarm time interval is smaller than the alarm time interval threshold value, not triggering an alarm.
6. The method of claim 1, wherein the determining a corresponding target alert status from the current alert data and the target alert type description data comprises:
when the current alarm data is matched with the target alarm type description data, determining that the corresponding target alarm state is a first alarm state;
and when the current alarm data is not matched with the target alarm type description data, determining that the corresponding target alarm state is a second alarm state, wherein the first alarm state and the second alarm state are alarm states with opposite states.
7. A data alert device, the device comprising:
the first acquisition module is used for acquiring interface alarm data returned by each trigger interface, wherein the interface alarm data comprises interface alarm type data and corresponding interface alarm item data, acquiring preset interface trigger conditions corresponding to each interface alarm type data, determining a target interface from each trigger interface according to the preset interface trigger conditions and the interface alarm item data, and acquiring current alarm data corresponding to the target interface according to the corresponding relation between the trigger interface and the alarm data, wherein the current alarm data comprises current alarm type data and corresponding current alarm item data; the step of generating the trigger interface includes: receiving a user login request, wherein the user login request carries a current user identifier, realizing the login of a current user corresponding to the current user identifier according to the user login request, receiving a user alarm access request sent by the current user, wherein the user alarm access request carries user alarm type data and corresponding user alarm item data, distributing a corresponding calling interface according to the user alarm access request, and acquiring user alarm type description data corresponding to the user alarm item data through the calling interface so that a terminal generates a corresponding trigger interface according to the user alarm type description data;
The second acquisition module is used for acquiring corresponding target alarm type description data according to the current alarm type data;
the alarm state determining module is used for determining a target alarm state according to the current alarm data and the target alarm type description data;
and the alarm information generation module is used for generating corresponding alarm information according to the target alarm state.
8. A computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, characterized in that the processor implements the steps of the method according to any one of claims 1 to 6 when the computer program is executed by the processor.
9. A computer readable storage medium, on which a computer program is stored, characterized in that the computer program, when being executed by a processor, implements the steps of the method of any of claims 1 to 6.
CN202010058160.7A 2020-01-19 2020-01-19 Data alarm method, device, computer equipment and storage medium Active CN111258860B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010058160.7A CN111258860B (en) 2020-01-19 2020-01-19 Data alarm method, device, computer equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010058160.7A CN111258860B (en) 2020-01-19 2020-01-19 Data alarm method, device, computer equipment and storage medium

Publications (2)

Publication Number Publication Date
CN111258860A CN111258860A (en) 2020-06-09
CN111258860B true CN111258860B (en) 2023-08-08

Family

ID=70953354

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010058160.7A Active CN111258860B (en) 2020-01-19 2020-01-19 Data alarm method, device, computer equipment and storage medium

Country Status (1)

Country Link
CN (1) CN111258860B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113350791A (en) * 2021-05-21 2021-09-07 广州三七极创网络科技有限公司 Edge processing method, device, equipment and storage medium of virtual role

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2004002063A1 (en) * 2002-06-19 2003-12-31 Huawei Technologies Co.,Ltd A network management centralization alarm box and alarm processing method
CN102717815A (en) * 2012-05-15 2012-10-10 江苏物泰信息科技有限公司 Intelligent warning method of special vehicle and warning system thereof
CN105160809A (en) * 2015-09-14 2015-12-16 北京奇虎科技有限公司 Intelligent wearable apparatus and alarm method, system
CN108199860A (en) * 2016-12-08 2018-06-22 中国移动通信有限公司研究院 A kind of alert processing method and the network equipment
CN109743191A (en) * 2018-11-28 2019-05-10 中通服建设有限公司 A kind of accurate positioning centralized processing system of equipment alarm, method and device
CN110635938A (en) * 2019-08-19 2019-12-31 腾讯科技(深圳)有限公司 Monitoring method, system, equipment and medium

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2004002063A1 (en) * 2002-06-19 2003-12-31 Huawei Technologies Co.,Ltd A network management centralization alarm box and alarm processing method
CN102717815A (en) * 2012-05-15 2012-10-10 江苏物泰信息科技有限公司 Intelligent warning method of special vehicle and warning system thereof
CN105160809A (en) * 2015-09-14 2015-12-16 北京奇虎科技有限公司 Intelligent wearable apparatus and alarm method, system
CN108199860A (en) * 2016-12-08 2018-06-22 中国移动通信有限公司研究院 A kind of alert processing method and the network equipment
CN109743191A (en) * 2018-11-28 2019-05-10 中通服建设有限公司 A kind of accurate positioning centralized processing system of equipment alarm, method and device
CN110635938A (en) * 2019-08-19 2019-12-31 腾讯科技(深圳)有限公司 Monitoring method, system, equipment and medium

Also Published As

Publication number Publication date
CN111258860A (en) 2020-06-09

Similar Documents

Publication Publication Date Title
CN109670950B (en) Transaction monitoring method, device, equipment and storage medium based on blockchain
CN109542961B (en) Data storage method, device, computer equipment and storage medium
CN109039937B (en) Dynamic current limiting method, dynamic current limiting device, computer equipment and storage medium
CN108696581B (en) Distributed information caching method and device, computer equipment and storage medium
CN110602169B (en) Service calling method and device, computer equipment and storage medium
CN112910945A (en) Request link tracking method and service request processing method
CN109325010B (en) Log checking method, device, computer equipment and storage medium
CN109299147A (en) Database access processing method, device, computer equipment and storage medium
CN110708247A (en) Message routing method, message routing device, computer equipment and storage medium
CN110674149B (en) Service data processing method and device, computer equipment and storage medium
CN109831521B (en) Cache instance management method and device, computer equipment and storage medium
CN111258860B (en) Data alarm method, device, computer equipment and storage medium
CN108924772B (en) Short message sending method and device, computer equipment and storage medium
WO2024125108A1 (en) On-demand enabling method and apparatus for security aspect of mobile terminal
CN111382976B (en) Early warning data processing method and device, computer equipment and storage medium
CN113965406A (en) Network blocking method, device, electronic device and storage medium
CN112070585A (en) Order state unified management method and device, computer equipment and storage medium
CN109857344B (en) Heartbeat state judgment method and device based on shared memory and computer equipment
CN111464393A (en) Method and device for monitoring running state of block chain and storage medium
CN116684196A (en) Network data processing method, device, communication equipment and storage medium
CN114244566B (en) Illegal external connection detection method and device based on IP address and computer equipment
CN108965426B (en) Data processing method and device for audio system, computer equipment and storage medium
CN112559290B (en) Service call monitoring method, device, computer equipment and storage medium
CN110969430B (en) Suspicious user identification method, suspicious user identification device, computer equipment and storage medium
CN110955579A (en) Ambari-based large data platform monitoring method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant