CN112181785B - Method, terminal and storage medium for automatically adding monitoring equipment - Google Patents

Method, terminal and storage medium for automatically adding monitoring equipment Download PDF

Info

Publication number
CN112181785B
CN112181785B CN202011131519.5A CN202011131519A CN112181785B CN 112181785 B CN112181785 B CN 112181785B CN 202011131519 A CN202011131519 A CN 202011131519A CN 112181785 B CN112181785 B CN 112181785B
Authority
CN
China
Prior art keywords
monitored
equipment
deployment
service process
monitoring program
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202011131519.5A
Other languages
Chinese (zh)
Other versions
CN112181785A (en
Inventor
涂唯坚
周建二
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Southwest University of Science and Technology
Peng Cheng Laboratory
Original Assignee
Southwest University of Science and Technology
Peng Cheng Laboratory
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Southwest University of Science and Technology, Peng Cheng Laboratory filed Critical Southwest University of Science and Technology
Priority to CN202011131519.5A priority Critical patent/CN112181785B/en
Publication of CN112181785A publication Critical patent/CN112181785A/en
Application granted granted Critical
Publication of CN112181785B publication Critical patent/CN112181785B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/3003Monitoring arrangements specially adapted to the computing system or computing system component being monitored
    • G06F11/3006Monitoring arrangements specially adapted to the computing system or computing system component being monitored where the computing system is distributed, e.g. networked systems, clusters, multiprocessor systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/3003Monitoring arrangements specially adapted to the computing system or computing system component being monitored
    • G06F11/302Monitoring arrangements specially adapted to the computing system or computing system component being monitored where the computing system component is a software system
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/3051Monitoring arrangements for monitoring the configuration of the computing system or of the computing system component, e.g. monitoring the presence of processing resources, peripherals, I/O links, software programs

Abstract

The invention discloses a method, a terminal and a storage medium for automatically adding monitoring equipment, wherein the method comprises the following steps: acquiring service process information of equipment to be monitored, and acquiring a service process type of the equipment to be monitored based on the service process information; obtaining a target monitoring program according to the service process type of the equipment to be monitored, and sending deployment information of the target monitoring program to the equipment to be monitored; and acquiring a deployment finishing instruction generated based on the deployment information, obtaining a target configuration file according to the deployment finishing instruction, and adding the equipment to be monitored to a monitoring alarm system based on the target configuration file. Therefore, the problem that monitoring equipment cannot be automatically added in the monitoring alarm system in the prior art is solved.

Description

Method, terminal and storage medium for automatically adding monitoring equipment
Technical Field
The present invention relates to the field of communications, and in particular, to a method, a terminal, and a storage medium for automatically adding a monitoring device.
Background
With the continuous increase of automation and digitization degree of enterprises and organizations, various IT devices and IT systems are gradually increased, and the difficulty of operation and maintenance management is gradually increased. In response to this trend, many monitoring tools or platforms are presented in the industry, wherein the promemeus monitoring system is an open source monitoring operation and maintenance system which is developed rapidly in recent years. However, automatic deployment of monitoring program components and automatic modification of deployed Prometheus server-side configuration files cannot be achieved for a Prometheus monitoring system at present. Since the Prometheus monitoring system needs manual access from the deployment of the monitoring program to the modification of the configuration file, it is impossible to automatically add new monitoring equipment to the Prometheus monitoring system, which results in high manual intervention degree and low management efficiency of the Prometheus monitoring system.
Thus, there is still a need for improvement and development of the prior art.
Disclosure of Invention
The technical problem to be solved by the present invention is to provide a method, a terminal, and a storage medium for automatically adding a monitoring device, aiming at solving the problem that a new monitoring device cannot be automatically added to a Prometheus monitoring system in the prior art.
The technical scheme adopted by the invention for solving the problems is as follows:
in a first aspect, an embodiment of the present invention provides a method for automatically adding a monitoring device, where the method includes:
acquiring service process information of equipment to be monitored, and acquiring a service process type of the equipment to be monitored based on the service process information;
obtaining a target monitoring program according to the service process type of the equipment to be monitored, and sending deployment information of the target monitoring program to the equipment to be monitored;
and acquiring a deployment finishing instruction generated based on the deployment information, obtaining a target configuration file according to the deployment finishing instruction, and adding the equipment to be monitored to a monitoring alarm system based on the target configuration file.
In an implementation method, the obtaining service process information of a device to be monitored, and obtaining a service process type of the device to be monitored based on the service process information includes:
sending a scanning script to the equipment to be monitored, and scanning, recording and returning service process information of the equipment to be monitored through the scanning script;
acquiring service process information of the equipment to be monitored, and extracting keywords in the service process information;
and obtaining the service process type of the equipment to be monitored based on the keywords.
In an implementation method, the obtaining a target monitoring program according to a service process type of the device to be monitored and sending deployment information of the target monitoring program to the device to be monitored includes:
obtaining a role label of the equipment to be monitored according to the service process type of the equipment to be monitored;
and obtaining a target monitoring program according to the role label of the equipment to be monitored, and sending the deployment information of the target monitoring program to the equipment to be monitored.
In an implementation method, the obtaining a role label of the device to be monitored according to the service process type of the device to be monitored includes:
acquiring the names of all role labels;
and performing character comparison on the service process type of the equipment to be monitored and the names of all role labels to obtain the role labels of the equipment to be monitored.
In an implementation method, the obtaining a target monitoring program according to the role label of the device to be monitored and sending deployment information of the target monitoring program to the device to be monitored includes:
acquiring role labels of all monitoring programs;
comparing the character labels of the equipment to be monitored with the character labels of all monitoring programs to obtain a target monitoring program;
and generating deployment information of the target monitoring program and sending the deployment information to the equipment to be monitored.
In an implementation method, the obtaining a deployment completion instruction generated based on the deployment information, obtaining a target configuration file of a monitoring alarm system according to the deployment completion instruction, and adding a device to be monitored to the monitoring alarm system based on the target configuration file includes:
acquiring a deployment finishing instruction generated based on the deployment information;
acquiring the setting information of the equipment to be monitored and the target monitoring program according to the deployment completion instruction;
obtaining a modified text according to the equipment to be monitored and the setting information of the target monitoring program;
and acquiring an original configuration file of the monitoring alarm system, modifying the original configuration file of the monitoring alarm system according to the modification text to obtain a target configuration file, and adding the equipment to be monitored to the monitoring alarm system based on the target configuration file.
In an implementation method, the obtaining setting information of the device to be monitored and the target monitoring program according to the deployment completion instruction includes:
acquiring the IP address of the equipment to be monitored and the name of the target monitoring program contained in the deployment finishing instruction;
and acquiring the setting information of the equipment to be monitored and the target monitoring program according to the IP address of the equipment to be monitored and the name of the target monitoring program.
In an implementation method, the obtaining a modified text according to the setting information of the device to be monitored and the target monitoring program includes:
integrating and analyzing the equipment to be monitored and the setting information of the monitoring program to be executed to obtain an initial modification text;
and adjusting the initial modified text according to the grammar of the configuration file of the monitoring alarm system to obtain a modified text.
In a second aspect, an embodiment of the present invention further provides a storage medium, on which a plurality of instructions are stored, where the instructions are adapted to be loaded and executed by a processor to implement any of the steps of the method for automatically adding a monitoring device described above.
In a third aspect, an embodiment of the present invention further provides a mobile terminal, where the mobile terminal includes: a processor, a storage medium communicatively coupled to the processor, the storage medium adapted to store a plurality of instructions; the processor is adapted to call instructions in the storage medium to implement the steps of the method of automatically adding a monitoring device as described in any one of the above.
The invention has the beneficial effects that: the method comprises the steps of obtaining service process information of equipment to be monitored, and obtaining a service process type of the equipment to be monitored based on the service process information; obtaining a target monitoring program according to the service process type of the equipment to be monitored, and sending deployment information of the target monitoring program to the equipment to be monitored; and acquiring a deployment finishing instruction generated based on the deployment information, obtaining a target configuration file according to the deployment finishing instruction, and adding the equipment to be monitored to a monitoring alarm system based on the target configuration file. Therefore, the problem that monitoring equipment cannot be automatically added in the monitoring alarm system in the prior art is solved.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments described in the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
Fig. 1 is a schematic flowchart of a method for automatically adding a monitoring device according to an embodiment of the present invention.
Fig. 2 is a schematic flowchart of acquiring a service process type of a device to be monitored according to an embodiment of the present invention.
Fig. 3 is a schematic flowchart of automatically allocating and deploying a monitoring program according to an embodiment of the present invention.
Fig. 4 is a schematic flowchart of acquiring a role label of a device to be monitored according to an embodiment of the present invention.
Fig. 5 is a schematic flowchart of a matching monitoring program according to an embodiment of the present invention.
Fig. 6 is a schematic flowchart of automatically modifying a configuration file according to an embodiment of the present invention.
Fig. 7 is a schematic flowchart after a deployment completion instruction is acquired according to an embodiment of the present invention.
Fig. 8 is a schematic flowchart of acquiring a modified text according to an embodiment of the present invention.
Fig. 9 is an exemplary diagram of a first data table provided in an embodiment of the present invention.
Fig. 10 is an exemplary diagram of a second data table provided by the embodiment of the invention.
Fig. 11 is an exemplary diagram of a third data table provided in the embodiment of the present invention.
Fig. 12 is a schematic internal structural diagram of an apparatus for automatically adding a monitoring device according to an embodiment of the present invention.
Fig. 13 is a schematic block diagram of an intelligent terminal according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention clearer and clearer, the present invention is further described in detail below with reference to the accompanying drawings and examples. It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
It should be noted that, if directional indications (such as upper, lower, left, right, front, rear, 8230; \8230;) are involved in the embodiment of the present invention, the directional indications are only used to explain the relative positional relationship between the components in a specific posture (as shown in the figure), the motion situation, etc., and if the specific posture is changed, the directional indications are correspondingly changed.
With the continuous increase of automation and digitization degree of enterprises and organizations, various IT devices and IT systems are gradually increased, and the difficulty of operation and maintenance management is gradually increased. In response to this trend, many monitoring tools or platforms are presented in the industry, wherein the promemeus monitoring system is an open source monitoring operation and maintenance system which is developed rapidly in recent years.
Prometheus is an open source service monitoring system and time series database. The system has a high-latitude data model and a customizable query language, and simultaneously has an efficient storage strategy and is easy to operate and maintain. However, an effective automatic management and deployment method is lacking for an indispensable monitoring agent component (generally called an exporter or script) in the promemeus monitoring system, and the deployment of the monitoring agent in the industry also depends on manual debugging and manual deployment at present. Meanwhile, for the modification of the prometheus server side configuration file after deployment, the current common practice is still to manually collect information after the exporter deployment process, and manually modify and reload the information. In short, since the Prometheus monitoring system needs manual access from deployment of the monitoring agent to modification of the configuration file, it is impossible to automatically add a new monitoring device to the Prometheus monitoring system, which results in low efficiency of the Prometheus monitoring system in terms of management and high manual intervention degree.
In view of the above defects in the prior art, this embodiment provides a method for automatically adding monitoring devices, which may be applied to a Prometheus monitoring system or other monitoring alarm systems meeting conditions.
As shown in fig. 1, the method comprises the steps of:
step S100, obtaining service process information of the equipment to be monitored, and obtaining the service process type of the equipment to be monitored based on the service process information.
In order to implement batch management on devices to be monitored of the same service process type, in this embodiment, service process information of the devices to be monitored needs to be obtained first, so that the service process type of the devices to be monitored is determined according to the service process information.
As shown in fig. 2, the step S100 specifically includes the following steps:
step S110, sending a scanning script to the equipment to be monitored, and scanning, recording and returning service process information of the equipment to be monitored through the scanning script;
step S120, obtaining service process information of the equipment to be monitored, and extracting keywords in the service process information;
and S130, obtaining the service process type of the equipment to be monitored based on the keywords.
Specifically, the monitoring alarm system and the monitored device need to establish an SSH communication connection (Secure Shell communication) first, and the SSH communication mode can effectively prevent the problem of information leakage in the remote management process. Then, in order to obtain the service process information of the equipment to be monitored, the monitoring alarm system can send a scanning script to the equipment to be monitored in an SSH communication mode, after the monitored equipment receives the scanning script, the scanning script can scan the service processes of the equipment to be monitored one by one and record the service processes into service process information, then the service process information is transmitted back to the monitoring alarm system, and after the transmission is finished, the scanning script can be deleted by the equipment to be monitored. And after the monitoring alarm system receives the returned service process information, extracting keywords in the service process information, and obtaining the service process type of the equipment to be monitored based on the keywords. For example, characters such as http and the like can be set as sensitive characters in advance, and during extraction, characters in a preset field near the sensitive characters are extracted as keywords.
In one implementation manner, in order to establish an SSH communication connection between the system and the monitored device, the method further includes:
s1, sending an SSH communication request to equipment in a preset network segment;
and S2, acquiring response information generated based on the SSH communication request.
In this embodiment, the monitoring alarm system may actively discover the device to be monitored, and establish an SSH communication connection therewith. Specifically, basic information such as a network segment to be scanned, a login user name and a password is set in a monitoring alarm system in advance, then an access request is sent to a device to be monitored in a preset network segment, the login user name and the password are sent to the device according to response information fed back by the device to be monitored, the response information can be a password input instruction, and then access request authentication of the device to be monitored is completed. After the authentication is successful, the SSH communication connection is established with the equipment to be monitored. In one implementation, the system may also passively discover the device to be monitored and then establish an SSH communication connection therewith. Specifically, information of the monitoring alarm system, such as an IP address, may be manually configured on the device to be monitored, and then the device to be monitored is controlled to actively initiate an SSH communication request to the system, and the IP address of the device to be monitored is sent to the system through the SSH communication request, thereby achieving establishment of an SSH communication connection with the system.
In order to install a corresponding monitoring program on the device to be monitored, as shown in fig. 1, the method further includes the following steps:
step S200, according to the service process type of the equipment to be monitored, obtaining a target monitoring program and sending the deployment information of the target monitoring program to the equipment to be monitored.
In the face of a wide variety of monitoring programs, such as linux server monitoring programs, libvirt monitoring programs, and the like, the monitoring alarm system needs to install a corresponding monitoring program on the device to be monitored according to the service process type of the device to be monitored. And the monitoring program which is installed on the equipment to be monitored and executes the operations of collecting monitoring data and the like is the target monitoring program of the equipment to be monitored. After the target monitoring program of the equipment to be monitored is determined, the deployment information of the target monitoring program needs to be sent to the equipment to be monitored, wherein the deployment information comprises a deployment script and an application program or a code script of the target monitoring program. And after the monitoring equipment receives the deployment information, installing the target monitoring program on a local system according to the deployment script in the deployment information.
As shown in fig. 3, in an implementation manner, the step S200 specifically includes the following steps:
step S210, obtaining a role label of the equipment to be monitored according to the service process type of the equipment to be monitored;
step S220, according to the role label of the equipment to be monitored, obtaining a target monitoring program and sending the deployment information of the target monitoring program to the equipment to be monitored.
In this embodiment, the role labels are distributed to the device to be monitored and the monitoring program, and the corresponding relationship between the device to be monitored and the target monitoring program is established according to the role labels, that is, the target monitoring program of the device to be monitored can be matched quickly through the role labels. Specifically, after the service process type of the device to be monitored is obtained, the role label of the device to be monitored is obtained according to the service process type of the device to be monitored. For example, a server of an installed linux system is found in a preset network segment, and if the service process is identified as the service process of the linux system, the role label of the linux server is sent to the device to be monitored. After the role label of the equipment to be monitored is determined, searching a monitoring program with the same role label as the role label, wherein the monitoring program is a target monitoring program of the equipment to be monitored, and then sending the deployment information of the target monitoring program to the equipment to be monitored so as to finish the installation of the target monitoring program on the equipment to be monitored.
As shown in fig. 4, in an implementation manner, the step S210 specifically includes the following steps:
step S211, obtaining the names of all role labels;
step S212, comparing the service process type of the equipment to be monitored with the names of all role labels to obtain the role labels of the equipment to be monitored.
Specifically, a role table for storing various role labels is preset in the implementation, after the service process type of the device to be monitored is obtained, the service process type is subjected to character comparison with the names of all role labels in the role table, and the role label corresponding to the name with the highest character comparison matching degree with the service process type is the role label of the device to be monitored. Since the device to be monitored can have a plurality of service processes, a plurality of role labels can be assigned to the device to be monitored according to the types of the plurality of service processes. In addition, for a brand-new online device to be monitored, since the device may not bear any service yet and cannot acquire service process information thereof, the role labels can be assigned to the brand-new online device in a manually specified manner. In addition, in order to facilitate management of the device to be monitored, the setting information of the device to be monitored and the role tag may be stored as a first data table (as shown in fig. 9) in a corresponding manner. And the role label and the setting information of the appointed equipment to be monitored can be obtained through the first data table, wherein the setting information comprises the IP address, the access password and the like of the equipment to be monitored.
As shown in fig. 5, in an implementation manner, the step S220 specifically includes the following steps:
step S221, searching a monitoring program with the same role label as the equipment to be monitored according to the role label of the equipment to be monitored to obtain a target monitoring program;
step S222, generating deployment information of the target monitoring program and sending the deployment information to the device to be monitored.
Specifically, in this embodiment, a second data table in which a corresponding relationship between a monitoring program name and a role tag is stored is preset, and after the role tag of the device to be monitored is obtained, a monitoring program having the same role tag as that of the device to be monitored is searched in the second data table, and the searched monitoring program is a target monitoring program. And then generating deployment information of the target monitoring program, and sending the deployment information to the equipment to be monitored.
In order to obtain the second data table, in an implementation manner, after a new monitoring program is stored in the monitoring alarm system, the monitoring program is classified and managed according to the management content of the monitoring program, meanwhile, a role tag is automatically assigned to the monitoring program according to the classification result, and the monitoring program and the role tag are correspondingly stored in the second data table (as shown in fig. 10). In actual operation, the monitoring alarm system can inquire the role label corresponding to the equipment to be monitored through the first data table, and then can inquire the monitoring program corresponding to the role label according to the second data table.
In actual operation, besides performing batch management on the devices to be monitored according to the role labels, the devices to be monitored can be classified and managed in batches according to conditions such as network segments and item information of the devices to be monitored. For example, two devices with IP of 192.168.0.1 and 192.168.0.1 are both located in a network segment with mask of 255.255.255.0, the two devices can be managed together under the same category. For example, two devices each showing participation in the item a in the item information may be managed together in the same category.
And after the target monitoring program is installed on the equipment to be monitored, a new configuration file needs to be sent to the monitoring alarm system, and the monitoring alarm system carries out reloading according to the new configuration file, so that the addition monitoring is completed. Thus, as shown in fig. 1, the method further comprises the steps of:
step S300, a deployment finishing instruction generated based on the deployment information is obtained, a target configuration file of the monitoring alarm system is obtained according to the deployment finishing instruction, and the equipment to be monitored is added to the monitoring alarm system based on the target configuration file.
Specifically, after the target monitoring program is installed on the device to be monitored, the device to be monitored sends a deployment completion instruction to the monitoring alarm system, prompts the monitoring alarm system to update an old configuration file, obtains a new configuration file, namely a target configuration file, and triggers the monitoring alarm server to implement configuration overload, so that the target configuration file becomes effective, and the addition monitoring is completed.
In one implementation, as shown in fig. 6, the step S300 specifically includes the following steps;
step S310, acquiring a deployment completion instruction generated based on the deployment information;
step S320, acquiring the setting information of the equipment to be monitored and the target monitoring program according to the deployment completion instruction;
step S330, obtaining a modified text according to the equipment to be monitored and the setting information of the target monitoring program;
step S340, obtaining an original configuration file of the monitoring alarm system, modifying the original configuration file of the monitoring alarm system according to the modification text to obtain a target configuration file of the monitoring alarm system, and adding the equipment to be monitored to the monitoring alarm system based on the target configuration file.
Specifically, after the target monitoring program is installed on the device to be monitored, the device to be monitored sends a deployment completion instruction to the monitoring alarm system. And after receiving the deployment finishing instruction, the monitoring alarm system immediately acquires the setting information of the equipment to be monitored and the target monitoring program, thereby obtaining a modification text for indicating how to modify the original configuration file, and modifying the original configuration file according to the modification text to obtain the target configuration file. And then sending the target configuration file to a monitoring alarm server, controlling the monitoring alarm server to implement configuration reloading according to the target configuration file, and enabling the target configuration file to take effect, so that the equipment to be monitored is added to a monitoring list of a monitoring alarm system, and the equipment to be monitored becomes monitoring equipment after the addition is completed.
In an implementation manner, as shown in fig. 7, the step S320 specifically includes the following steps:
step S321, obtaining the IP address of the device to be monitored and the name of the target monitoring program contained in the deployment completion instruction;
step S322, obtaining the setting information of the device to be monitored and the target monitoring program according to the IP address of the device to be monitored and the name of the target monitoring program.
Specifically, the deployment completion instruction includes an IP address of the device to be monitored and a name of the target monitoring program. And after receiving the deployment finishing instruction, the monitoring alarm system immediately inquires and acquires the corresponding equipment to be monitored and the setting information of the target monitoring program in the first data table and the second data table according to the IP address and the name in the deployment finishing instruction.
As shown in fig. 8, in an implementation manner, the step S340 specifically includes the following steps:
step S341, integrating and analyzing the setting information of the device to be monitored and the target monitoring program to obtain an initial modification text;
and step S342, adjusting the initial modified text according to the grammar of the configuration file of the monitoring alarm system to obtain a modified text.
Because the configuration text of the monitoring alarm system is generated according to the fixed grammar, when the original configuration file of the monitoring alarm system is modified, the original configuration file of the monitoring alarm system also needs to be modified according to the corresponding grammar, so that the modified configuration file can be enabled to take effect. Specifically, the setting information of the device to be monitored and the target monitoring program is integrated and analyzed to obtain an initial modification text, and the initial modification text is adjusted according to the grammar of the configuration file of the monitoring alarm system to obtain the modification text.
In order to facilitate the administrator to check the past configuration files, in an implementation manner, the method further includes uploading the target configuration file to a specific path of the system, renaming file names of the target configuration file according to the uploading time, and sequentially storing the renamed target configuration file into a third data table (as shown in fig. 11) according to the uploading sequence, for example, when the uploading time of the target configuration file is 2020, 6, 23, and 14, 50 minutes and 27 seconds, the file name of the renamed target configuration file is 20200623145027. When the past configuration files need to be checked, the corresponding configuration files can be called out for inquiry through the storage time.
In order to ensure the normal operation of the monitoring alarm server, in an implementation manner, the state of the monitoring alarm server can be monitored in real time. In the embodiment, the state of the monitoring alarm server is monitored in real time by establishing a heartbeat mechanism between the monitoring alarm system and the monitoring alarm server. Specifically, the monitoring alarm system sends a scanning script and a request data packet to the monitoring alarm server periodically, and the service process of the monitoring alarm server is scanned and accessed through the scanning script and the request data packet. When the monitoring alarm server is detected to be inaccessible, for example, a response data packet generated based on a request data packet is not received within a preset time after the monitoring alarm system sends the request data packet to the monitoring alarm server, namely, the monitoring alarm server is indicated to be inaccessible, or the service process of the monitoring alarm server is found to be invalid when being scanned, the monitoring alarm system generates alarm information and sends the alarm information to an administrator to inform the administrator that the service process of the monitoring alarm server is inaccessible or invalid, and prompts the reasons of the inaccessibility or the reasons of the invalidity, so that the normal operation of the whole monitoring alarm system is ensured.
Based on the above embodiment, the present invention further provides an apparatus for automatically adding monitoring, as shown in fig. 12, the apparatus includes: the monitoring device management module, the monitoring program management module and the monitoring alarm management module; the monitoring equipment management module, the monitoring program management module and the monitoring alarm management module are all connected with the controller;
the monitoring equipment management module is used for discovering equipment to be monitored and distributing role labels to the equipment to be monitored;
the monitoring program management module is used for storing a monitoring program, distributing role labels to the monitoring program, and providing distribution and deployment services of the monitoring program;
the monitoring alarm management module is used for generating a target configuration file and monitoring the running state of the monitoring alarm server.
Based on the above embodiment, the present invention further provides an intelligent terminal, and a schematic block diagram thereof may be as shown in fig. 13. The intelligent terminal comprises a processor, a memory, a network interface and a display screen which are connected through a system bus. Wherein, the processor of the intelligent terminal is used for providing calculation and control capability. The memory of the intelligent terminal comprises a nonvolatile storage medium and an internal memory. The non-volatile storage medium stores an operating system and a computer program. The internal memory provides an environment for the operation of an operating system and computer programs in the non-volatile storage medium. The network interface of the intelligent terminal is used for being connected and communicated with an external terminal through a network. The computer program is executed by a processor to implement a method of automatically adding a monitoring device. The display screen of the intelligent terminal can be a liquid crystal display screen or an electronic ink display screen.
It will be understood by those skilled in the art that the block diagram of fig. 13 is only a block diagram of a part of the structure related to the solution of the present invention, and does not constitute a limitation to the intelligent terminal to which the solution of the present invention is applied, and a specific intelligent terminal may include more or less components than those shown in the figure, or combine some components, or have different arrangements of components.
In one implementation, one or more programs are stored in a memory of the smart terminal and configured to be executed by one or more processors include instructions for performing a method of automatically adding a monitoring device.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by hardware instructions of a computer program, which can be stored in a non-volatile computer-readable storage medium, and when executed, can include the processes of the embodiments of the methods described above. Any reference to memory, storage, databases, or other media used in embodiments provided herein may include non-volatile and/or volatile memory. Non-volatile memory can include read-only memory (ROM), programmable ROM (PROM), electrically Programmable ROM (EPROM), electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM) or external cache memory. By way of illustration and not limitation, RAM is available in a variety of forms such as Static RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), double Data Rate SDRAM (DDRSDRAM), enhanced SDRAM (ESDRAM), synchronous Link DRAM (SLDRAM), rambus (Rambus) direct RAM (RDRAM), direct memory bus dynamic RAM (DRDRAM), and memory bus dynamic RAM (RDRAM).
In summary, the present invention discloses an automatic monitoring adding method, which obtains service process information of a device to be monitored, and obtains a service process type of the device to be monitored based on the service process information; obtaining a target monitoring program according to the service process type of the equipment to be monitored, and sending deployment information of the target monitoring program to the equipment to be monitored; and acquiring a deployment finishing instruction generated based on the deployment information, obtaining a target configuration file according to the deployment finishing instruction, and adding the equipment to be monitored to a monitoring alarm system based on the target configuration file. Therefore, the problem that monitoring equipment cannot be automatically added in the monitoring alarm system in the prior art is solved.
It is to be understood that the invention is not limited to the examples described above, but that modifications and variations may be effected thereto by those of ordinary skill in the art in light of the foregoing description, and that all such modifications and variations are intended to be within the scope of the invention as defined by the appended claims.

Claims (10)

1. A method of automatically adding a monitoring device, the method comprising:
acquiring service process information of equipment to be monitored, and acquiring a service process type of the equipment to be monitored based on the service process information;
obtaining a target monitoring program according to the service process type of the equipment to be monitored and sending deployment information of the target monitoring program to the equipment to be monitored;
and acquiring a deployment finishing instruction generated based on the deployment information, obtaining a target configuration file according to the deployment finishing instruction, and adding the equipment to be monitored to a monitoring alarm system based on the target configuration file.
2. The method according to claim 1, wherein the obtaining service process information of the device to be monitored and obtaining the service process type of the device to be monitored based on the service process information comprises:
sending a scanning script to the equipment to be monitored, and scanning, recording and returning service process information of the equipment to be monitored through the scanning script;
acquiring service process information of the equipment to be monitored, and extracting keywords in the service process information;
and obtaining the service process type of the equipment to be monitored based on the keyword.
3. The method according to claim 1, wherein the obtaining a target monitoring program and sending deployment information of the target monitoring program to the device to be monitored according to the service process type of the device to be monitored comprises:
obtaining a role label of the equipment to be monitored according to the service process type of the equipment to be monitored;
and obtaining a target monitoring program according to the role label of the equipment to be monitored, and sending the deployment information of the target monitoring program to the equipment to be monitored.
4. The method according to claim 3, wherein the obtaining the role label of the device to be monitored according to the service process type of the device to be monitored comprises:
acquiring the names of all role labels;
and performing character comparison on the service process type of the equipment to be monitored and the names of all role labels to obtain the role labels of the equipment to be monitored.
5. The method according to claim 3, wherein the obtaining a target monitoring program and sending deployment information of the target monitoring program to the device to be monitored according to the role label of the device to be monitored comprises:
acquiring role labels of all monitoring programs;
comparing the character labels of the equipment to be monitored with the character labels of all monitoring programs to obtain a target monitoring program;
and generating deployment information of the target monitoring program and sending the deployment information to the equipment to be monitored.
6. The method according to claim 1, wherein the obtaining a deployment completion instruction generated based on the deployment information, obtaining a target configuration file according to the deployment completion instruction, and adding the device to be monitored to the monitoring alarm system based on the target configuration file comprises:
acquiring a deployment finishing instruction generated based on the deployment information;
acquiring the setting information of the equipment to be monitored and the target monitoring program according to the deployment finishing instruction;
obtaining a modified text according to the equipment to be monitored and the setting information of the target monitoring program;
and acquiring an original configuration file of the monitoring alarm system, modifying the original configuration file of the monitoring alarm system according to the modification text to obtain a target configuration file, and adding the equipment to be monitored to the monitoring alarm system based on the target configuration file.
7. The method according to claim 6, wherein the obtaining the setting information of the device to be monitored and the target monitoring program according to the deployment completion instruction comprises:
acquiring the IP address of the equipment to be monitored and the name of the target monitoring program contained in the deployment finishing instruction;
and acquiring the setting information of the equipment to be monitored and the target monitoring program according to the IP address of the equipment to be monitored and the name of the target monitoring program.
8. The method according to claim 6, wherein the obtaining of the modified text according to the setting information of the device to be monitored and the target monitoring program comprises:
integrating and analyzing the equipment to be monitored and the setting information of the target monitoring program to obtain an initial modification text;
and adjusting the initial modified text according to the grammar of the configuration file of the monitoring alarm system to obtain a modified text.
9. A storage medium having stored thereon a plurality of instructions adapted to be loaded and executed by a processor to perform the steps of the method of automatically adding a monitoring device of any of claims 1-8.
10. A terminal, comprising: a processor, a storage medium communicatively coupled to the processor, the storage medium adapted to store a plurality of instructions; the processor is adapted to invoke instructions in the storage medium to implement the steps of the method of automatically adding a monitoring device of any of the preceding claims 1-8.
CN202011131519.5A 2020-10-21 2020-10-21 Method, terminal and storage medium for automatically adding monitoring equipment Active CN112181785B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011131519.5A CN112181785B (en) 2020-10-21 2020-10-21 Method, terminal and storage medium for automatically adding monitoring equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011131519.5A CN112181785B (en) 2020-10-21 2020-10-21 Method, terminal and storage medium for automatically adding monitoring equipment

Publications (2)

Publication Number Publication Date
CN112181785A CN112181785A (en) 2021-01-05
CN112181785B true CN112181785B (en) 2023-02-24

Family

ID=73922343

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011131519.5A Active CN112181785B (en) 2020-10-21 2020-10-21 Method, terminal and storage medium for automatically adding monitoring equipment

Country Status (1)

Country Link
CN (1) CN112181785B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114816444A (en) * 2021-01-28 2022-07-29 网联清算有限公司 Method and device for deploying monitoring program, electronic equipment and storage medium

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108932184A (en) * 2018-06-21 2018-12-04 新华三云计算技术有限公司 monitoring device and method
CN109672580A (en) * 2018-09-21 2019-04-23 平安科技(深圳)有限公司 Full link monitoring method, apparatus, terminal device and storage medium

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7434235B2 (en) * 2005-05-16 2008-10-07 Microsoft Corporation Type server caching the proxy/stub generation
JP6375679B2 (en) * 2014-04-24 2018-08-22 富士通株式会社 Server information management apparatus, server information management program, and server information management method

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108932184A (en) * 2018-06-21 2018-12-04 新华三云计算技术有限公司 monitoring device and method
CN109672580A (en) * 2018-09-21 2019-04-23 平安科技(深圳)有限公司 Full link monitoring method, apparatus, terminal device and storage medium

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
一种基于文件保护的防泄密系统研究;刘思超等;《信息网络安全》;20131110(第11期);全文 *

Also Published As

Publication number Publication date
CN112181785A (en) 2021-01-05

Similar Documents

Publication Publication Date Title
US20020087668A1 (en) Automatic upgrade of live network devices
CN106027644B (en) Service verification method and system
CN108200132B (en) Resource acquisition method, device, equipment and computer readable storage medium
CN113448862B (en) Software version testing method and device and computer equipment
CN109120616A (en) A kind of identity identifying method, device, agency service end and storage medium
CN108255735B (en) Associated environment testing method, electronic device and computer readable storage medium
CN112181785B (en) Method, terminal and storage medium for automatically adding monitoring equipment
US20010020249A1 (en) System for automatically providing internet services
CN110727575B (en) Information processing method, system, device and storage medium
CN113535262A (en) Method, device, equipment and storage medium for controlling starting of proxy node
CN100464520C (en) Method and system for realizing distributed data loading
CN116225832A (en) Automatic detection method, storage medium and equipment for automatic deployment of database cluster
CN114422576B (en) Session cleaning method and device, computer equipment and readable storage medium
US20090083747A1 (en) Method for managing application programs by utilizing redundancy and load balance
CN115514667A (en) Access service processing method, system, device, electronic equipment and storage medium
CN114860539A (en) Method and device for determining program execution state, electronic equipment and storage medium
CN113487053A (en) Maintenance service method, device, equipment and computer readable storage medium
JP2016071398A (en) Test execution device, test execution method, and computer program
JP6436704B2 (en) Test execution device, test execution method, and computer program
CN113377385A (en) Client automatic deployment method and device
CN113326052A (en) Method and device for upgrading service component, computer equipment and storage medium
CN113010422A (en) Mirror image file testing method and device, electronic equipment and readable storage medium
CN112464090A (en) Electronic price tag information updating method, electronic price tag and computer readable storage medium
CN112765188A (en) Configuration information processing method, configuration management system, electronic device, and storage medium
CN112165695B (en) Internet of vehicles service management method, platform, equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant