CN112260858A - Alarm method capable of automatic detection and terminal - Google Patents

Alarm method capable of automatic detection and terminal Download PDF

Info

Publication number
CN112260858A
CN112260858A CN202011059023.1A CN202011059023A CN112260858A CN 112260858 A CN112260858 A CN 112260858A CN 202011059023 A CN202011059023 A CN 202011059023A CN 112260858 A CN112260858 A CN 112260858A
Authority
CN
China
Prior art keywords
alarm
data
request data
historical
threshold value
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011059023.1A
Other languages
Chinese (zh)
Inventor
刘德建
王张浩
郭玉湖
陈宏�
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Fujian Tianquan Educational Technology Ltd
Original Assignee
Fujian Tianquan Educational Technology Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Fujian Tianquan Educational Technology Ltd filed Critical Fujian Tianquan Educational Technology Ltd
Priority to CN202011059023.1A priority Critical patent/CN112260858A/en
Publication of CN112260858A publication Critical patent/CN112260858A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/06Management of faults, events, alarms or notifications
    • H04L41/0604Management of faults, events, alarms or notifications using filtering, e.g. reduction of information by using priority, element types, position or time
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/3003Monitoring arrangements specially adapted to the computing system or computing system component being monitored
    • G06F11/302Monitoring arrangements specially adapted to the computing system or computing system component being monitored where the computing system component is a software system
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/3065Monitoring arrangements determined by the means or processing involved in reporting the monitored data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/36Preventing errors by testing or debugging software
    • G06F11/3668Software testing
    • G06F11/3672Test management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/04Network management architectures or arrangements
    • H04L41/046Network management architectures or arrangements comprising network management agents or mobile agents therefor
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/06Management of faults, events, alarms or notifications
    • H04L41/069Management of faults, events, alarms or notifications using logs of notifications; Post-processing of notifications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0876Aspects of the degree of configuration automation

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Quality & Reliability (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • Computer Hardware Design (AREA)
  • Mathematical Physics (AREA)
  • Automation & Control Theory (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The invention discloses an alarm method and a terminal capable of automatic detection; the invention comprises the following steps: acquiring all historical request data in a first preset time period, and generating a daily alarm threshold according to the historical request data; monitoring and calculating request data in real time to obtain real-time alarm data, judging whether the real-time alarm data exceeds the alarm threshold value of the current day, and if so, generating and recording an alarm record; the historical request data in the preset period is calculated and counted, and a proper fluctuation upper limit is calculated according to a certain algorithm to serve as an alarm threshold value of the index. Therefore, the trouble of manually setting the threshold value is avoided, and the same index of different services can be ensured to have different alarm threshold values, so that differentiated service operation and maintenance are realized. In addition, the alarm threshold value can change along with the change of historical data, automatic updating every day is achieved, manual intervention and modification are not needed, and operation and maintenance cost is greatly saved.

Description

Alarm method capable of automatic detection and terminal
Technical Field
The invention relates to the technical field of network service operation and maintenance, in particular to an alarm method and a terminal capable of automatic detection.
Background
Currently, in the field of software service operation and maintenance, most of the existing alarm systems alarm around a fixed threshold or a manually set threshold. Namely, when the value of the operation and maintenance index of a certain software service exceeds a set alarm threshold value, the system triggers an alarm and pushes alarm information to software service developers.
The existing alarm system based on a fixed threshold or manually set the threshold has the following disadvantages:
1. the alarm system with fixed threshold value can not carry out differentiation operation and maintenance on different services. For example, regarding the operation and maintenance index of the average query response time of the MySQL, the background query of the A service is a table with small data volume, and the query is fast; the B service background needs to inquire the table with larger data quantity, and the inquiry is time-consuming. If the warning system sets the threshold value of the MySQL average query response time of all the services to be 1s, the warning sensitivity of the service A is very low, while the service B can trigger the warning all the time, and unnecessary harassment is caused to development personnel.
2. Setting the threshold manually is time consuming and labor intensive. Taking the company where the applicant is located as an example, the company currently has more than 2000 network services with different sizes, and dozens of different operation and maintenance indexes are arranged below each service, and a great amount of labor cost is consumed for manually establishing an alarm threshold value for each operation and maintenance index. Meanwhile, the work also requires that developers have abundant operation and maintenance experience.
3. The threshold cannot be updated automatically. No matter the alarm system is a fixed threshold or a manual threshold, once the threshold is set, the threshold cannot be changed, and when the external environment changes, developers need to change the appropriate threshold again, so that the operation and maintenance cost is increased.
Disclosure of Invention
The technical problem to be solved by the invention is as follows: the alarm method and the terminal capable of automatic detection are provided, the alarm threshold value can be automatically updated according to the service historical data, differentiated service operation and maintenance are achieved, and meanwhile operation and maintenance cost is reduced.
In order to solve the technical problems, the invention adopts the technical scheme that:
an alarm method capable of automatic detection, comprising the following steps:
s1, acquiring all historical request data in a first preset time period, and generating a daily alarm threshold according to the historical request data;
and S2, monitoring and calculating the request data in real time to obtain real-time alarm data, judging whether the real-time alarm data exceeds the alarm threshold value of the current day, and if so, generating and recording an alarm record.
The invention has the beneficial effects that: according to the scheme, the historical request data in the preset period are calculated and counted, and the proper fluctuation upper limit is calculated according to a certain algorithm to serve as the alarm threshold of the index. Therefore, the trouble of manually setting the threshold value is avoided, and the same index of different services can be ensured to have different alarm threshold values, so that differentiated service operation and maintenance are realized. In addition, the alarm threshold value can change along with the change of historical data, automatic updating every day is achieved, manual intervention and modification are not needed, and operation and maintenance cost is greatly saved.
Drawings
FIG. 1 is a schematic diagram of a main flow of an alarm method capable of automatic detection according to an embodiment of the present invention;
FIG. 2 is a schematic flow chart of an alarm method capable of automatic detection according to an embodiment of the present invention;
fig. 3 is a schematic structural diagram of an alarm terminal capable of automatic detection according to an embodiment of the present invention.
Description of reference numerals:
1. an alarm terminal capable of automatic detection; 2. a processor; 3. a memory.
Detailed Description
In order to explain technical contents, achieved objects, and effects of the present invention in detail, the following description is made with reference to the accompanying drawings in combination with the embodiments.
Referring to fig. 1 and 2, an alarm method capable of automatic detection includes:
s1, acquiring all historical request data in a first preset time period, and generating a daily alarm threshold according to the historical request data;
and S2, monitoring and calculating the request data in real time to obtain real-time alarm data, judging whether the real-time alarm data exceeds the alarm threshold value of the current day, and if so, generating and recording an alarm record.
From the above description, the beneficial effects of the present invention are: the historical request data in the preset period is calculated and counted, and a proper fluctuation upper limit is calculated according to a certain algorithm to serve as an alarm threshold value of the index. Therefore, the trouble of manually setting the threshold value is avoided, and the same index of different services can be ensured to have different alarm threshold values, so that differentiated service operation and maintenance are realized. In addition, the alarm threshold value can change along with the change of historical data, automatic updating every day is achieved, manual intervention and modification are not needed, and operation and maintenance cost is greatly saved.
Further, the step S1 of generating the alarm threshold value for the current day according to the historical request data specifically includes:
s11, calculating a discrete coefficient of the historical record in a first preset time period, if the discrete coefficient is smaller than 1, generating a daily alarm threshold according to historical request data in the first preset time period, and if the discrete coefficient is larger than 1, generating the daily alarm threshold according to historical request data in a second preset time period, wherein the first preset time period is larger than the second preset time period.
According to the description, when the alarm threshold value on the day is calculated, the data volatility is judged by calculating the discrete coefficient, so that the time period data for calculating the alarm threshold value is selected, and the condition that the alarm threshold value is lowered due to lower data in the early stage to cause frequent alarm is avoided.
Further, the step S1 of generating the alarm threshold value for the current day according to the history request data further includes:
s12, calculating an average value and a standard deviation by using historical HTTP request data in a preset time period according to a '3 Sigma rule' of normal distribution, and taking the average value +3 times of the standard deviation as a daily alarm threshold value of each operation and maintenance index.
As can be seen from the above description, the method only needs to calculate the mean value and the standard deviation of the data, and greatly saves the calculation overhead in a big data scene.
Further, the step S1 is preceded by the steps of:
and S01, analyzing the network request agent log through a big data calculation tool at a preset fixed time every day, calculating and counting the request data of the previous day and storing the request data into a data warehouse, wherein the preset fixed time is earlier than the calculation time of the alarm threshold value of the current day.
According to the description, the network request agent log is analyzed and stored in the data warehouse before the alarm threshold value is calculated every day, and a data basis is provided for the calculation of the alarm threshold value on the following day.
Further, the method also comprises the following steps:
and S3, starting a timing scanning program, scanning the alarm records in the database, and if a new alarm record is found, packaging the alarm information and submitting to remind corresponding service personnel.
According to the description, the alarm records in the database are scanned through the timing scanning program, and corresponding service personnel can be reminded in time.
Referring to fig. 1 and fig. 2, a first embodiment of the present invention is:
an alarm method capable of automatic detection, comprising the following steps:
s01, analyzing the network request agent log through a big data calculation tool at a preset fixed time every day, calculating and counting the request data of the previous day and storing the request data into a data warehouse, wherein the preset fixed time is earlier than the calculation time of the alarm threshold value of the current day; corresponding to the "analyze yesterday's network request proxy log every day to get data index" and "write result into data warehouse" in fig. 2;
in this embodiment, the data index includes: 4xx request error rate (4xx request is the request with response status code beginning with 4, mostly caused by client error), 5xx request error rate (5xx request is the request with response status code beginning with 5, mostly caused by server error), average time consumption of HTTP request, MySQL slow request number and average time consumption of MySQL slow request.
In the following, we take the data index of "average time consumed by HTTP request" as an example to describe the specific operation details of each module. The average time consumption of HTTP requests is a data index used to describe how fast the web service responds. The index here takes minutes as the statistical granularity, and the average consumed time calculation formula of the HTTP request in a certain minute is as follows:
the average HTTP request consumption is the total consumed time of all HTTP requests and/or the total number of HTTP requests;
therefore, by means of a Spark big data calculation tool, in a T +1 off-line calculation mode (data of the previous day is calculated at fixed time every day), a Nginx log is analyzed (Nginx is a network request agent, all HTTP requests forwarded by the agent are recorded in the log in a certain format, the log comprises information such as request time, response time consumption, request state codes and the like), historical data of average time consumption of all service HTTP requests are stored in a table of a Hive data warehouse, and the granularity of aggregation calculation is in a minute level. In other words, the average elapsed time for all HTTP requests within a certain past minute of a certain service can be looked up through this table.
S1, acquiring all historical request data in a first preset time period, and generating a daily alarm threshold according to the historical request data; corresponding to "reading index history data of past two weeks from data warehouse" to "writing threshold result to database" of fig. 2;
the step S1 of generating the alarm threshold value for the current day according to the history request data specifically includes:
s11, calculating a discrete coefficient of the historical record in a first preset time period, if the discrete coefficient is smaller than 1, generating a daily alarm threshold according to historical request data in the first preset time period, and if the discrete coefficient is larger than 1, generating the daily alarm threshold according to historical request data in a second preset time period, wherein the first preset time period is larger than the second preset time period.
The step S1 of generating the alarm threshold value for the current day according to the history request data further includes:
s12, calculating an average value and a standard deviation by using historical HTTP request data in a preset time period according to a '3 Sigma rule' of normal distribution, and taking the average value +3 times of the standard deviation as a daily alarm threshold value of each operation and maintenance index.
In this embodiment, with Spark, we read the data in the past two weeks from the table of the HIVE data warehouse storing index history data as the input data of the model.
With 5 minutes as a statistical interval, for data (e.g., 10: 00-10: 05) within a certain 5 minutes of each service, the model has HTTP request average consumed time data of 14 × 5-70 minutes, and we consider that the data within the same time period of the same service are not greatly different, and at the level of 70 sample capacity, the model can be considered to be subject to normal distribution in statistics as a whole. For a set of data that follows a normal distribution, the "3 Sigma rule" for normal distribution applies.
Where μ is the mean of a set of normal distribution data, which is used to describe the average level of the set of data. σ (i.e., Sigma) is the standard deviation of a set of normally distributed data, which describes the degree of dispersion of the set of data. "3 Sigma Law" considers that for a set of sample data that follows a normal distribution, there is a probability that 99.74% of the samples will fall within the interval (μ -3 σ, μ +3 σ), and that the sample falls outside this range by only about three thousandths, which is considered a small probability event. In an alarm system, an abnormal situation is often considered to be an event with a small probability.
Therefore, referring to the '3 Sigma rule' of normal distribution, in the model calculation of the system, the average consumed time can be calculated by using the existing average consumed time of HTTP requests of 70 minutes, the average consumed time and the standard deviation are calculated, the standard deviation of +3 times of the average consumed time is used as the fluctuation upper limit of the operation and maintenance index, and once the average consumed time appearing subsequently exceeds the fluctuation upper limit, it is considered that the service is possibly abnormal, and an alarm message needs to be sent to notify developers.
The above situation is only applicable to the situation that the index data is stably represented, if the data in the previous period is stable at a lower level in the past two weeks, the data is at a higher level and the data fluctuation is large due to the update of the service version and other reasons in the later period. Because the mean value of the data needs to be brought into calculation in the early stage, the mean value level in the current threshold value can be reduced, and because the current index has larger fluctuation, the mean value level can often exceed the lower alarm threshold value, thereby causing frequent alarm. If the situation is reversed, the early stage is high, and the late stage is low, the alarm threshold value is high, and the alarm sensitivity of the current stage is greatly reduced.
Therefore, the model is adjusted by combining with the actual situation, and a discrete coefficient is introduced to judge whether the past historical data has great volatility. The formula for the dispersion coefficient is shown below:
cv=σ/μ,
that is, the standard deviation is larger than the upper mean value, the dispersion coefficient is larger than 1, which indicates that the fluctuation of the data is larger, and the dispersion coefficient is smaller than 1, which indicates that the fluctuation of the data is smaller.
When the discrete coefficient of the data is found to be larger than 1 in modeling, the fact that the historical data has large fluctuation changes is shown, the data which is too long is not enough to be adopted, and mu + 3sigma is calculated by using the data which serves the last 3 days as the fluctuation upper limit, namely the alarm threshold.
S2, monitoring and calculating request data in real time to obtain real-time alarm data, judging whether the real-time alarm data exceeds the alarm threshold value of the current day, and if so, generating and recording an alarm record; corresponding to "analyze the current real-time network request agent log to obtain the current index actual value" to "record abnormal in the database alarm information table" in fig. 2;
the method comprises the steps that a spark streaming program is started (the program can run uninterruptedly), Nginx logs are analyzed and statistically calculated, the current actual value of the average consumed time of a real-time service HTTP request is obtained, the latest model result in MySQL is read into a spark streaming cache in advance, after the average consumed time per minute data in the current 5 minutes is calculated, the current consumed time per minute data is compared with a corresponding alarm threshold value in the cache, and if the current consumed time per minute data exceeds the threshold value, alarm information is recorded in an alarm recording table of MySQL.
S3, starting a timing scanning program, scanning the alarm records in the database, if a new alarm record is found, packaging alarm information, and submitting and reminding corresponding service personnel; corresponding to "read the latest data in the alarm information table" and "send alarm information to the developer" in fig. 2.
The system background can additionally start a Java program to scan an alarm record table in MySQL at regular time, and if newly appeared alarm records are found, the alarm information can be packaged and sent to corresponding service developers to remind the developers to pay attention.
Referring to fig. 3, the second embodiment of the present invention is:
an alarm terminal 1 capable of automatic detection comprises a memory 3, a processor 2 and a computer program stored on the memory 3 and capable of running on the processor 2, wherein the processor 2 implements a corresponding step of an embodiment when executing the computer program.
In summary, according to the alarm method and the terminal capable of automatic detection provided by the present invention, the historical request data in the preset period is calculated and counted, and a suitable fluctuation upper limit is calculated according to a certain algorithm to serve as the alarm threshold of the indicator. Therefore, the trouble of manually setting the threshold value is avoided, and the same index of different services can be ensured to have different alarm threshold values, so that differentiated service operation and maintenance are realized. In addition, the alarm threshold value can change along with the change of historical data, automatic updating every day is achieved, manual intervention and modification are not needed, and operation and maintenance cost is greatly saved. The volatility of historical data is determined by calculating the discrete coefficient, the time period data for calculating the alarm threshold is judged, the condition that the alarm threshold is lowered due to lower early-stage data and frequent alarms are caused is avoided, the alarm threshold is calculated by referring to the 3Sigma rule of normal distribution, and the calculated amount can be greatly reduced under the background of big data.
The above description is only an embodiment of the present invention, and not intended to limit the scope of the present invention, and all equivalent changes made by using the contents of the present specification and the drawings, or applied directly or indirectly to the related technical fields, are included in the scope of the present invention.

Claims (10)

1. An alarm method capable of automatic detection, which is characterized by comprising the following steps:
s1, acquiring all historical request data in a first preset time period, and generating a daily alarm threshold according to the historical request data;
and S2, monitoring and calculating the request data in real time to obtain real-time alarm data, judging whether the real-time alarm data exceeds the alarm threshold value of the current day, and if so, generating and recording an alarm record.
2. The alarm method capable of automatic detection according to claim 1, wherein the step S1 of generating the alarm threshold value for the current day according to the historical request data specifically includes:
s11, calculating a discrete coefficient of the historical record in a first preset time period, if the discrete coefficient is smaller than 1, generating a daily alarm threshold according to historical request data in the first preset time period, and if the discrete coefficient is larger than 1, generating the daily alarm threshold according to historical request data in a second preset time period, wherein the first preset time period is larger than the second preset time period.
3. The method according to claim 1, wherein the step S1 of generating the alarm threshold value for the current day according to the historical request data further comprises:
s12, calculating an average value and a standard deviation by using historical HTTP request data in a preset time period according to a '3 Sigma rule' of normal distribution, and taking the average value +3 times of the standard deviation as a daily alarm threshold value of each operation and maintenance index.
4. The warning method capable of automatic detection according to claim 1, wherein said step S1 is preceded by the steps of:
and S01, analyzing the network request agent log through a big data calculation tool at a preset fixed time every day, calculating and counting the request data of the previous day and storing the request data into a data warehouse, wherein the preset fixed time is earlier than the calculation time of the alarm threshold value of the current day.
5. The method of claim 1, further comprising the steps of:
and S3, starting a timing scanning program, scanning the alarm records in the database, and if a new alarm record is found, packaging the alarm information and submitting to remind corresponding service personnel.
6. An alarm terminal capable of automatic detection, comprising a memory, a processor and a computer program stored on the memory and capable of running on the processor, wherein the processor executes the computer program to realize the following steps:
s1, acquiring all historical request data in a preset time period, and generating a daily alarm threshold according to the historical request data;
and S2, monitoring and calculating the request data in real time to obtain real-time alarm data, judging whether the real-time alarm data exceeds the alarm threshold value of the current day, and if so, generating and recording an alarm record.
7. The alarm terminal capable of automatic detection according to claim 6, wherein the step S1 of generating the alarm threshold value for the current day according to the historical request data specifically includes:
s11, calculating a discrete coefficient of the historical record in a first preset time period, if the discrete coefficient is smaller than 1, generating a daily alarm threshold according to historical request data in the first preset time period, and if the discrete coefficient is larger than 1, generating the daily alarm threshold according to historical request data in a second preset time period, wherein the first preset time period is larger than the second preset time period.
8. The alarm terminal capable of automatic detection according to claim 6, wherein the step S1 of generating the alarm threshold value for the current day according to the historical request data further comprises:
s12, calculating an average value and a standard deviation by using historical HTTP request data in a preset time period according to a '3 Sigma rule' of normal distribution, and taking the average value +3 times of the standard deviation as a daily alarm threshold value of each operation and maintenance index.
9. The alarm terminal capable of automatic detection according to claim 6, wherein said step S1 is preceded by the steps of:
and S01, analyzing the network request agent log through a big data calculation tool at a preset fixed time every day, calculating and counting the request data of the previous day and storing the request data into a data warehouse, wherein the preset fixed time is earlier than the calculation time of the alarm threshold value of the current day.
10. The alarm terminal capable of automatic detection according to claim 6, further comprising the steps of:
and S3, starting a timing scanning program, scanning the alarm records in the database, and if a new alarm record is found, packaging the alarm information and submitting to remind corresponding service personnel.
CN202011059023.1A 2020-09-30 2020-09-30 Alarm method capable of automatic detection and terminal Pending CN112260858A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011059023.1A CN112260858A (en) 2020-09-30 2020-09-30 Alarm method capable of automatic detection and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011059023.1A CN112260858A (en) 2020-09-30 2020-09-30 Alarm method capable of automatic detection and terminal

Publications (1)

Publication Number Publication Date
CN112260858A true CN112260858A (en) 2021-01-22

Family

ID=74234416

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011059023.1A Pending CN112260858A (en) 2020-09-30 2020-09-30 Alarm method capable of automatic detection and terminal

Country Status (1)

Country Link
CN (1) CN112260858A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113342623A (en) * 2021-05-28 2021-09-03 福建福诺移动通信技术有限公司 Visual early warning system and method based on dynamic threshold method
CN113380008A (en) * 2021-05-12 2021-09-10 四川新网银行股份有限公司 Dynamic threshold value adjusting method based on number of hits and hit rate
CN113608960A (en) * 2021-07-09 2021-11-05 五八有限公司 Service monitoring method and device, electronic equipment and storage medium

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105406991A (en) * 2015-10-26 2016-03-16 上海华讯网络系统有限公司 Method and system for generating service threshold by historical data based on network monitoring indexes
US20170097632A1 (en) * 2015-10-05 2017-04-06 Hongtao You Method of cloud data services of industrial process automation systems
CN108377201A (en) * 2018-02-09 2018-08-07 腾讯科技(深圳)有限公司 Network Abnormal cognitive method, device, equipment and computer readable storage medium
CN108512691A (en) * 2018-02-07 2018-09-07 复旦大学 Cloud automatic early-warning O&M monitoring system based on Hadoop
CN108509634A (en) * 2018-04-10 2018-09-07 深信服科技股份有限公司 Jitterbug monitoring method, monitoring device and computer readable storage medium
CN110086649A (en) * 2019-03-19 2019-08-02 深圳壹账通智能科技有限公司 Detection method, device, computer equipment and the storage medium of abnormal flow
CN110175108A (en) * 2019-05-30 2019-08-27 深圳前海微众银行股份有限公司 Performance test methods, device, equipment and computer readable storage medium
CN111506625A (en) * 2020-04-20 2020-08-07 中国建设银行股份有限公司 Alarm threshold determination method and device

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170097632A1 (en) * 2015-10-05 2017-04-06 Hongtao You Method of cloud data services of industrial process automation systems
CN105406991A (en) * 2015-10-26 2016-03-16 上海华讯网络系统有限公司 Method and system for generating service threshold by historical data based on network monitoring indexes
CN108512691A (en) * 2018-02-07 2018-09-07 复旦大学 Cloud automatic early-warning O&M monitoring system based on Hadoop
CN108377201A (en) * 2018-02-09 2018-08-07 腾讯科技(深圳)有限公司 Network Abnormal cognitive method, device, equipment and computer readable storage medium
CN108509634A (en) * 2018-04-10 2018-09-07 深信服科技股份有限公司 Jitterbug monitoring method, monitoring device and computer readable storage medium
CN110086649A (en) * 2019-03-19 2019-08-02 深圳壹账通智能科技有限公司 Detection method, device, computer equipment and the storage medium of abnormal flow
CN110175108A (en) * 2019-05-30 2019-08-27 深圳前海微众银行股份有限公司 Performance test methods, device, equipment and computer readable storage medium
CN111506625A (en) * 2020-04-20 2020-08-07 中国建设银行股份有限公司 Alarm threshold determination method and device

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113380008A (en) * 2021-05-12 2021-09-10 四川新网银行股份有限公司 Dynamic threshold value adjusting method based on number of hits and hit rate
CN113380008B (en) * 2021-05-12 2022-07-08 四川新网银行股份有限公司 Dynamic threshold value adjusting method based on number of hits and hit rate
CN113342623A (en) * 2021-05-28 2021-09-03 福建福诺移动通信技术有限公司 Visual early warning system and method based on dynamic threshold method
CN113342623B (en) * 2021-05-28 2022-05-17 福建福诺移动通信技术有限公司 Visual early warning system and method based on dynamic threshold method
CN113608960A (en) * 2021-07-09 2021-11-05 五八有限公司 Service monitoring method and device, electronic equipment and storage medium

Similar Documents

Publication Publication Date Title
CN112260858A (en) Alarm method capable of automatic detection and terminal
CN112035404B (en) Medical data monitoring and early warning method, device, equipment and storage medium
CN110377569B (en) Log monitoring method, device, computer equipment and storage medium
US10771306B2 (en) Log monitoring system
CN111539633A (en) Service data quality auditing method, system, device and storage medium
CN110535713B (en) Monitoring management system and monitoring management method
CN106940677A (en) One kind application daily record data alarm method and device
CN101252462B (en) Alarming page furbishing method as well as server and client end
CN104618948B (en) The method and system of transmitting file in a kind of monitoring
CN114154035A (en) Data processing system for dynamic loop monitoring
CN111984495A (en) Big data monitoring method and device and storage medium
CN107688626A (en) Slow inquiry log processing method, device and electronic equipment
WO2023109806A1 (en) Method and apparatus for processing active data for internet of things device, and storage medium
CN114090529A (en) Log management method, device, system and storage medium
CN114417200B (en) Network data acquisition method and device and electronic equipment
CN109522349B (en) Cross-type data calculation and sharing method, system and equipment
CN115277355A (en) Method, device, equipment and medium for processing state code data of monitoring system
CN115185710A (en) Transaction interface time consumption counting and early warning method
US11782873B2 (en) System and method for managing timeseries data
CN114493720A (en) Method, device, storage medium and equipment for monitoring Kafka consumers
CN113760669A (en) Problem data warning method and device, electronic equipment and storage medium
CN113472881A (en) Statistical method and device for online terminal equipment
CN113222223A (en) Wind control linkage early warning method, system, equipment and storage medium for real-time warehouse
CN111061609A (en) Log monitoring method and system
CN116132395B (en) Message processing method, electronic device and computer readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20210122