CN112416902A - One-key inspection method for host and database - Google Patents

One-key inspection method for host and database Download PDF

Info

Publication number
CN112416902A
CN112416902A CN202011310097.8A CN202011310097A CN112416902A CN 112416902 A CN112416902 A CN 112416902A CN 202011310097 A CN202011310097 A CN 202011310097A CN 112416902 A CN112416902 A CN 112416902A
Authority
CN
China
Prior art keywords
database
abnormal
rule
aiming
snc
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011310097.8A
Other languages
Chinese (zh)
Inventor
程永新
林小勇
陈庚
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai New Torch Network Information Technology Ltd By Share Ltd
Original Assignee
Shanghai New Torch Network Information Technology Ltd By Share Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai New Torch Network Information Technology Ltd By Share Ltd filed Critical Shanghai New Torch Network Information Technology Ltd By Share Ltd
Priority to CN202011310097.8A priority Critical patent/CN112416902A/en
Publication of CN112416902A publication Critical patent/CN112416902A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/21Design, administration or maintenance of databases
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/3003Monitoring arrangements specially adapted to the computing system or computing system component being monitored
    • G06F11/3006Monitoring arrangements specially adapted to the computing system or computing system component being monitored where the computing system is distributed, e.g. networked systems, clusters, multiprocessor systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/25Integrating or interfacing systems involving database management systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/06Management of faults, events, alarms or notifications
    • H04L41/0631Management of faults, events, alarms or notifications using root cause analysis; using analysis of correlation between notifications, alarms or events based on decision criteria, e.g. hierarchy, tree or time analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/14Network analysis or design
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
    • H04L67/025Protocols based on web technology, e.g. hypertext transfer protocol [HTTP] for remote control or remote monitoring of applications

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Mining & Analysis (AREA)
  • Computing Systems (AREA)
  • Mathematical Physics (AREA)
  • Quality & Reliability (AREA)
  • Debugging And Monitoring (AREA)

Abstract

The invention discloses a one-key inspection method for a host and a database, which comprises the following steps: the operation and maintenance request access service and the request route forwarding function are provided by the server Snc-server; adopting an operation and maintenance service providing node Snc-proxy to mount a plurality of local operation and maintenance service node agents; configuring a routing inspection item index at a Web end, and setting an abnormal rule for the routing inspection item index; the inspection item indexes comprise host indexes and database indexes; and configuring a task at a Web end, executing the index script at regular time, acquiring real-time index data, and identifying whether the indexes of the routing inspection item are abnormal or not. According to the method, the analysis script is automatically executed according to the period by the program, the analysis script result is analyzed, the result is matched with the configured threshold value, and the program automatically judges whether an abnormal state is triggered according to the abnormal rule, so that one-key inspection is realized; the maintenance work of the operation and maintenance personnel is greatly facilitated, the workload of the operation and maintenance personnel is reduced, and the operation and maintenance cost of a company is reduced.

Description

One-key inspection method for host and database
Technical Field
The invention relates to an automatic operation and maintenance detection method, in particular to a one-key inspection method for a host and a database.
Background
At present, a large number of enterprises and companies need to manage a host and a database for monitoring so as to ensure the continuity and stability of services in the system maintenance work in the future; however, the traditional operation and maintenance scheme does not provide a uniform monitoring inlet and does not realize the one-key inspection operation and maintenance function; often, operation and maintenance personnel are required to check log information and historical records, check whether each host and each database operate normally or not, increase the labor cost of operation and maintenance, and have low efficiency. Therefore, the current technical scheme has the following problems:
1. along with the development of enterprises, the quantity of databases and host equipment is increasing day by day, and the maintenance workload is large;
2. the investment on operation and maintenance cost cannot be accurately estimated, and the manpower is excessively dependent in the maintenance process;
3. the operation and maintenance technicians are difficult to culture, have high fluidity and uneven technical level, are not in time for service, and have problems which cannot be solved in time.
Therefore, the problems of reducing operation and maintenance cost and simplifying operation and maintenance scene solidification need to be solved. With the development trend of operation environment competition standardization, service quality and service personalization in the software industry, a new form of operation and maintenance thought is important for reducing operation and maintenance workload and freeing operation and maintenance to do more meaningful things, and especially for providing a one-key operation and maintenance implementation method.
Disclosure of Invention
The invention aims to provide a one-key inspection method for a host and a database, which can simplify the operation and maintenance of the host and the database and greatly reduce the operation and maintenance cost.
The technical scheme adopted by the invention for solving the technical problems is to provide a one-key inspection method for a host and a database, which comprises the following steps: the operation and maintenance request access service and the request route forwarding function are provided by the server Snc-server; adopting an operation and maintenance service providing node Snc-proxy to mount a plurality of local operation and maintenance service node agents; configuring a routing inspection item index at a Web end, and setting an abnormal rule for the routing inspection item index; the inspection item indexes comprise host indexes and database indexes; and configuring a task at a Web end, executing the index script at regular time, acquiring real-time index data, and identifying whether the indexes of the routing inspection item are abnormal or not.
Further, the host index includes a CPU usage rate, a memory usage rate, a network performance, a ping delay, and a file system usage rate of the host.
Further, the exception rule for the host index is set as follows: aiming at the CPU utilization rate, when the index value of the main CPU utilization rate is greater than 85% in 3 continuous cycles, triggering an abnormal rule; aiming at the memory utilization rate, when the memory utilization rate is continuously acquired for 3 times and the period is more than 85 percent, triggering an abnormal rule; aiming at network performance, when the average waiting time of IO operation exceeds 20ms, the SOCKET overflow increment percentage data is more than 85%, the average transmission delay value of 5 minutes aiming at private network inspection is more than 1ms or the ping loss rate is more than 85%, triggering an abnormal rule; and aiming at the utilization rate of the file system, when the utilization rate of the file system is more than 90%, an exception rule is triggered.
Further, the database indexes include database errors, database connection snooping, expired users, tablespaces, invalid objects, session waiting, exception sql, locks, number of connections, database response time, and long execution sql.
Further, the exception rule for the database index is set as follows: aiming at database errors, performing scanning analysis on an ORA error log, and triggering an abnormal rule if an error code of an ORA abnormal keyword is matched; aiming at database connection monitoring, acquiring a database instance state, and triggering an abnormal rule if a database connection failure condition occurs; meanwhile, a TNS monitoring program is used for continuously monitoring the database connection, and if the request service of the current unidentifiable connector appears, an abnormal rule is triggered; aiming at the overdue users, if the output result of the overdue users is matched with the abnormal rule; aiming at the table space, if the script output result of the table space utilization rate for 3 times continuously exceeds 90 percent, an abnormal rule is triggered; aiming at invalid objects, the method supports the collection of invalid object processes, and the number of the invalid objects is more than 10 to carry out abnormal rule matching; aiming at conversation waiting, the method supports the collection of abnormal waiting event indexes, and when data is returned, an abnormal matching rule is triggered; aiming at the abnormal sql, the collection of the abnormal execution sql is supported, and if data exist, an abnormal rule is triggered; for the lock, the acquisition of the database lock is supported, and an abnormal rule is triggered when data is returned; aiming at the connection quantity, if the total number of the connection sessions is greater than 85% of the total number of the processes, an exception rule is triggered; aiming at the response time of the database, if the acquisition value of the response time of the database is more than 80 percent, triggering an abnormal rule; and acquiring the execution elapsed time of the database sql aiming at the long execution sql, and triggering an exception rule if the elapsed time exceeds 10 minutes.
Further, the server Snc-server, the operation and maintenance service providing node Snc-proxy, the local operation and maintenance service node agent and the Web end transmit messages through kafka, and the specific process is as follows: s1) a scheduling task is newly established at the Web end, a routing inspection index and an abnormal state matching formula are configured, and an operation and maintenance script is specified; s2) searching the routing information of the corresponding instance through the Snc-server, and sending the relevant information of the operation and maintenance script to the agent kafka corresponding to the Snc-proxy; s3) the Snc-proxy consumes the kafka queue message to judge whether the agent is on-line, and the Snc-proxy distributes the task request message to the corresponding local operation and maintenance service node agent; s4) the local operation and maintenance service node agent receives and executes the message, and returns the result to the kafka queue corresponding to the Snc-proxy; s5) the Snc-server monitors the kafka message corresponding to the Snc-proxy, and returns the agent execution result message to forward to the Web end kafka; s6), the Web end monitors the kafka queue, analyzes data, calls a rule judgment program, performs matching analysis according to each index abnormal rule, and generates abnormal data; and presenting the data result on a Web end interface.
Compared with the prior art, the invention has the following beneficial effects: the one-key inspection method of the host and the database provided by the invention has the advantages that the analysis script is automatically executed according to the period by the program, the analysis script result is analyzed, the result is matched with the configured threshold value, the program automatically judges whether to trigger the abnormal state according to the abnormal rule, the information is stored in the database, and the inspected result state is displayed through a WEB system/mobile phone end; the maintenance work of the operation and maintenance personnel is greatly facilitated, the workload of the operation and maintenance personnel is reduced, the long-term dependence on the operation and maintenance special soldier is reduced, and the operation and maintenance cost of a company is reduced.
Drawings
FIG. 1 is a schematic diagram of a one-key inspection system of a host and a database according to the present invention;
FIG. 2 is a flow chart of one-key polling of the host and the database according to the present invention;
FIG. 3 is a schematic diagram of a one-key polling execution process of a host and a database according to the present invention;
FIG. 4 is a detailed flow chart of the host and database one-key polling according to the present invention.
Detailed Description
The invention is further described below with reference to the figures and examples.
FIG. 1 is a schematic diagram of a one-key inspection system of a host and a database according to the present invention; FIG. 2 is a flow chart of one-key polling between the host and the database according to the present invention.
Referring to fig. 1 and fig. 2, the host and database one-key inspection system provided by the present invention includes a Web end, an Snc-server, an Snc-proxy, an Snc-agent, and a kafka.
Snc-server: the operation and maintenance request is accessed into service and provides a request route forwarding function;
snc-proxy: an agentless operation and maintenance service providing node; mounting agent nodes and forwarding agent messages;
snc-agent: and the local operation and maintenance service node receives the task instruction sent by the Snc-proxy, and executes and returns the result to the proxy-kafka.
The Web end provides a key operation and maintenance configuration interface and a key operation and maintenance display interface.
Task configuration: setting related attributes such as task names, task types, task periods, associated indexes, applicable scenes, states and creation time;
index configuration: setting the attributes such as index name, index classification, index acquisition script/command, index Code and the like;
configuration of inspection items: selecting the attribute settings such as indexes, routing inspection item names, routing inspection item abnormal state regular expressions and the like.
The invention provides a one-key inspection method for a host and a database, which comprises the following steps:
the operation and maintenance request access service and the request route forwarding function are provided by the server Snc-server;
adopting an operation and maintenance service providing node Snc-proxy to mount a plurality of local operation and maintenance service node agents;
configuring a routing inspection item index at a Web end, and setting an abnormal rule for the routing inspection item index; the inspection item indexes comprise host indexes and database indexes;
and configuring a task at a Web end, executing the index script at regular time, acquiring real-time index data, identifying whether the indexes of the routing inspection item are abnormal or not, and presenting a result of collecting the index data on an interface.
According to the method, basic data are collected through indexes, and an abnormal rule is set according to an inspection item configured by the indexes; the patrol item and the abnormal rule setting process are as follows.
The host index of the invention provides analysis for the CPU condition, the memory condition, the network condition and the UDP condition of the host, the private network checking condition, the ping delay condition, the usage proportion condition of the file system checking condition, and the like, and meets the following requirements:
1) aiming at the CPU use condition, the method supports the analysis of the CPU use rate, and the index value of the main CPU use rate is greater than 85% in 3 continuous cycles; triggering an abnormal rule;
2) aiming at the memory use condition, the memory use rate is supported to trigger an abnormal rule for more than 85% of continuous 3 acquisition cycles;
3) aiming at the network condition, the method supports the analysis of the Output condition of the IOPS (Input/Output Per Second) throughput data packet; setting an exception rule, wherein the I/O throughput per second is IOPS and average I/O SIZE; as can be seen from this equation, the larger the I/O SIZE, the higher the IOPS, and the higher the I/O throughput per second. Thus, it is considered that the higher the value of IOPS and throughput, the better; the average IO operation waiting time exceeds 20ms or the average IO waiting time exceeds 30 percent, namely abnormal operation;
4) for the UDP condition, triggering an exception rule when the increment percentage data of the SOCKET overflow is more than 85%, and triggering an exception rule when the increment data of the fragment DROP is more than 0;
5) aiming at the private network inspection condition, triggering an abnormal rule when the average value of 5 minutes is more than 1ms is supported;
6) for the ping delay condition, the ping loss rate is more than 85 percent, namely abnormal;
7) and aiming at the file system checking condition, triggering an exception rule when the utilization rate of the file system is more than 90 percent.
The database index of the invention provides for checking the database; the index is database error, database connection failure, connection monitoring, expired user, tablespace, invalid object, session, abnormal sql, lock, connection quantity, database response time, slow sql.
1) Aiming at the error condition of the database, the method supports the scanning analysis of an ORA (Oracle abnormal code) error log, matches error codes of ORA abnormal keywords, and triggers an abnormal rule;
2) aiming at the condition of database connection failure, supporting the acquisition of database instance states to analyze failure reasons, namely triggering abnormal rules;
3) aiming at the condition of monitoring connection, supporting the service that a TNS (transparent Network subsystem) monitoring program cannot identify the request in the connector currently, namely triggering an abnormal rule;
4) aiming at the condition of the overdue user, the state output of the overdue user is supported, and the output result is matched with an abnormal rule;
5) aiming at the table space condition, triggering an abnormal rule when the script output result of the table space utilization rate for 3 times continuously exceeds 90 percent;
6) aiming at the condition of an invalid object, the process collection of the invalid object is supported, and the abnormal rule matching is carried out when the process collection is more than 10;
7) aiming at the conversation waiting condition, the collection of an abnormal waiting event index is supported, and when data is returned, an abnormal matching rule is triggered;
8) and aiming at the abnormal sql condition, the abnormal execution sql is collected, and the abnormal rule is triggered when data exists.
9) Aiming at the lock condition, the acquisition of a database lock is supported, and an abnormal rule is triggered when data is returned;
10) aiming at the situation of the number of connections, the judgment of the total number of the connection sessions is supported to be larger than 85 percent of the process, namely an abnormal rule is triggered;
11) aiming at the response time of the database, the acquisition of the response time of the database is supported, and if the acquisition value is more than 80%, an abnormal rule is triggered;
12) the sql is executed for a long time, and the elapsed time of execution on the database sql is supported; an elapsed time of more than 10 minutes triggers an exception rule.
The server Snc-server, the operation and maintenance service providing node Snc-proxy, the local operation and maintenance service node agent and the Web end of the invention transmit messages through kafka, please refer to fig. 3 and fig. 4 continuously, and the specific steps are as follows:
the method comprises the following steps: newly building a scheduling task at a Web end, configuring a required inspection index and an abnormal state matching formula, and specifying an operation and maintenance script;
step two: searching routing information of a corresponding example through the Snc-server, and sending script related information to a corresponding Snc-proxy kafka;
step three: the Snc-proxy consumes the kafka queue message to judge whether the agent is on-line or not, and the Snc-proxy distributes the task request message to the corresponding agent end;
step four: the agent end receives and executes the message, and returns the result to the kafka queue corresponding to the Snc-proxy;
step five: the Snc-server monitors that the kafka message corresponding to the Snc-proxy is transmitted back to agent execution result message and forwarded to the Web end kafka;
step six: and the Web end monitors the kafka queue, analyzes data and calls an analysis program.
Step seven: and the rule judging program performs matching analysis according to each index abnormal rule and generates abnormal data.
Step eight: and the Web end interface acquires and displays the analysis data result.
The invention analyzes, classifies and combs the operation and maintenance indexes, and selects proper routing inspection item indexes; by formulating analysis scenes, combining corresponding analysis rules and realizing automatic processing through scripts and kafka, the one-key inspection method for the host and the database under different scenes is met. Compared with the traditional IT operation and maintenance, the invention has the following advantages and characteristics:
1. and the host and the database are subjected to one-key inspection method, the inspection scene is solidified, and the inspection modes of operation and maintenance personnel are accumulated.
2. A one-key inspection method for a host and a database provides a standard IT operation and maintenance management method, solves the problem that in the face of increasingly complex IT environments, a management method is lacked, enables operation and maintenance to be more efficient, and enables potential of human resources to be fully exerted.
3. The dependence on operation and maintenance special soldiers is reduced, operation and maintenance scenes and operation and maintenance methods are accumulated, and the timeliness of service is improved.
Although the present invention has been described with respect to the preferred embodiments, it will be understood by those skilled in the art that various changes in form and details may be made therein without departing from the spirit and scope of the invention as defined by the appended claims.

Claims (6)

1. A one-key inspection method for a host and a database is characterized by comprising the following steps:
the operation and maintenance request access service and the request route forwarding function are provided by the server Snc-server;
adopting an operation and maintenance service providing node Snc-proxy to mount a plurality of local operation and maintenance service node agents;
configuring a routing inspection item index at a Web end, and setting an abnormal rule for the routing inspection item index; the inspection item indexes comprise host indexes and database indexes;
and configuring a task at a Web end, executing the index script at regular time, acquiring real-time index data, and identifying whether the indexes of the routing inspection item are abnormal or not.
2. The host and database one-key inspection method according to claim 1, wherein the host indexes include CPU usage, memory usage, network performance, ping delay, and file system usage of the host.
3. The host and database one-key inspection method according to claim 2, wherein the abnormal rule for the host index is set as follows:
aiming at the CPU utilization rate, when the index value of the main CPU utilization rate is greater than 85% in 3 continuous cycles, triggering an abnormal rule;
aiming at the memory utilization rate, when the memory utilization rate is continuously acquired for 3 times and the period is more than 85 percent, triggering an abnormal rule;
aiming at network performance, when the average waiting time of IO operation exceeds 20ms, the SOCKET overflow increment percentage data is more than 85%, the average transmission delay value of 5 minutes aiming at private network inspection is more than 1ms or the ping loss rate is more than 85%, triggering an abnormal rule;
and aiming at the utilization rate of the file system, when the utilization rate of the file system is more than 90%, an exception rule is triggered.
4. The host and database one-touch inspection method according to claim 1, wherein the database indexes include database errors, database connection snooping, expired users, tablespaces, invalid objects, session waiting, exception sql, locks, number of connections, database response time, and long execution sql.
5. The host and database one-key inspection method according to claim 4, wherein the abnormal rule setting for the database index is as follows:
aiming at database errors, performing scanning analysis on an ORA error log, and triggering an abnormal rule if an error code of an ORA abnormal keyword is matched;
aiming at database connection monitoring, acquiring a database instance state, and triggering an abnormal rule if a database connection failure condition occurs; meanwhile, a TNS monitoring program is used for continuously monitoring the database connection, and if the request service of the current unidentifiable connector appears, an abnormal rule is triggered;
aiming at the overdue users, if the output result of the overdue users is matched with the abnormal rule;
aiming at the table space, if the script output result of the table space utilization rate for 3 times continuously exceeds 90 percent, an abnormal rule is triggered;
aiming at invalid objects, the method supports the collection of invalid object processes, and the number of the invalid objects is more than 10 to carry out abnormal rule matching;
aiming at conversation waiting, the method supports the collection of abnormal waiting event indexes, and when data is returned, an abnormal matching rule is triggered;
aiming at the abnormal sql, the collection of the abnormal execution sql is supported, and if data exist, an abnormal rule is triggered;
for the lock, the acquisition of the database lock is supported, and an abnormal rule is triggered when data is returned;
aiming at the connection quantity, if the total number of the connection sessions is greater than 85% of the total number of the processes, an exception rule is triggered;
aiming at the response time of the database, if the acquisition value of the response time of the database is more than 80 percent, triggering an abnormal rule;
and acquiring the execution elapsed time of the database sql aiming at the long execution sql, and triggering an exception rule if the elapsed time exceeds 10 minutes.
6. The host and database one-key inspection method according to claim 1, wherein the server Snc-server, the operation and maintenance service providing node Snc-proxy, the local operation and maintenance service node agent and the Web side transmit messages through kafka, and the specific process is as follows:
s1) a scheduling task is newly established at the Web end, a routing inspection index and an abnormal state matching formula are configured, and an operation and maintenance script is specified;
s2) searching the routing information of the corresponding instance through the Snc-server, and sending the relevant information of the operation and maintenance script to the agent kafka corresponding to the Snc-proxy;
s3) the Snc-proxy consumes the kafka queue message to judge whether the agent is on-line, and the Snc-proxy distributes the task request message to the corresponding local operation and maintenance service node agent;
s4) the local operation and maintenance service node agent receives and executes the message, and returns the result to the kafka queue corresponding to the Snc-proxy;
s5) the Snc-server monitors the kafka message corresponding to the Snc-proxy, and returns the agent execution result message to forward to the Web end kafka;
s6), the Web end monitors the kafka queue, analyzes data, calls a rule judgment program, performs matching analysis according to each index abnormal rule, and generates abnormal data; and presenting the data result on a Web end interface.
CN202011310097.8A 2020-11-20 2020-11-20 One-key inspection method for host and database Pending CN112416902A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011310097.8A CN112416902A (en) 2020-11-20 2020-11-20 One-key inspection method for host and database

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011310097.8A CN112416902A (en) 2020-11-20 2020-11-20 One-key inspection method for host and database

Publications (1)

Publication Number Publication Date
CN112416902A true CN112416902A (en) 2021-02-26

Family

ID=74776863

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011310097.8A Pending CN112416902A (en) 2020-11-20 2020-11-20 One-key inspection method for host and database

Country Status (1)

Country Link
CN (1) CN112416902A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108959037A (en) * 2018-07-13 2018-12-07 山东汇贸电子口岸有限公司 A kind of data center's automatic detecting method and device
CN113656245A (en) * 2021-08-12 2021-11-16 北京中亦安图科技股份有限公司 Data inspection method and device, storage medium and processor
CN114356913A (en) * 2021-12-15 2022-04-15 联奕科技股份有限公司 Micro-service link operation and maintenance system and method
CN116455679A (en) * 2023-06-16 2023-07-18 杭州美创科技股份有限公司 Abnormal database operation and maintenance flow monitoring method and device and computer equipment

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104699759A (en) * 2015-02-10 2015-06-10 上海新炬网络信息技术有限公司 Method for maintaining automatic operation of database
CN107491375A (en) * 2017-08-18 2017-12-19 国网山东省电力公司信息通信公司 Equipment detection and fault early warning system and method under a kind of cloud computing environment
CN109857613A (en) * 2018-12-25 2019-06-07 南京南瑞信息通信科技有限公司 A kind of automation operational system based on acquisition cluster
CN110019203A (en) * 2017-10-19 2019-07-16 国网辽宁省电力有限公司沈阳供电公司 A kind of the server automatic tour inspection system and method in knowledge based library
CN111177617A (en) * 2019-12-06 2020-05-19 上海上讯信息技术股份有限公司 Web direct operation and maintenance method and device based on operation and maintenance management system and electronic equipment

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104699759A (en) * 2015-02-10 2015-06-10 上海新炬网络信息技术有限公司 Method for maintaining automatic operation of database
CN107491375A (en) * 2017-08-18 2017-12-19 国网山东省电力公司信息通信公司 Equipment detection and fault early warning system and method under a kind of cloud computing environment
CN110019203A (en) * 2017-10-19 2019-07-16 国网辽宁省电力有限公司沈阳供电公司 A kind of the server automatic tour inspection system and method in knowledge based library
CN109857613A (en) * 2018-12-25 2019-06-07 南京南瑞信息通信科技有限公司 A kind of automation operational system based on acquisition cluster
CN111177617A (en) * 2019-12-06 2020-05-19 上海上讯信息技术股份有限公司 Web direct operation and maintenance method and device based on operation and maintenance management system and electronic equipment

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108959037A (en) * 2018-07-13 2018-12-07 山东汇贸电子口岸有限公司 A kind of data center's automatic detecting method and device
CN113656245A (en) * 2021-08-12 2021-11-16 北京中亦安图科技股份有限公司 Data inspection method and device, storage medium and processor
CN114356913A (en) * 2021-12-15 2022-04-15 联奕科技股份有限公司 Micro-service link operation and maintenance system and method
CN116455679A (en) * 2023-06-16 2023-07-18 杭州美创科技股份有限公司 Abnormal database operation and maintenance flow monitoring method and device and computer equipment
CN116455679B (en) * 2023-06-16 2023-09-08 杭州美创科技股份有限公司 Abnormal database operation and maintenance flow monitoring method and device and computer equipment

Similar Documents

Publication Publication Date Title
CN112416902A (en) One-key inspection method for host and database
CN1763778A (en) System and method for problem determination using dependency graphs and run-time behavior models
CN108228322B (en) Distributed link tracking and analyzing method, server and global scheduler
CN116467189B (en) Method and system for interface call completion performance pressure measurement and full link data monitoring
CN102457578A (en) Distributed network monitoring method based on event mechanism
CN112286774A (en) Operation and maintenance monitoring data display method and device, storage medium and computing equipment
US9054969B2 (en) System and method for situation-aware IP-based communication interception and intelligence extraction
CN114356692A (en) Visual processing method and device for application monitoring link and storage medium
CN114157563A (en) Network equipment automation operation and maintenance system based on command
CN111858722A (en) Big data application system and method based on Internet of things
CN115034512A (en) Process optimization method, system, equipment and computer readable storage medium
KR102028342B1 (en) System and method for supporting real-time financial business provision and decision making using data process solution
US9645877B2 (en) Monitoring apparatus, monitoring method, and recording medium
CN111143304B (en) Micro-service system exception log analysis method based on request link
CN112825165A (en) Project quality management method and device
CN110633191A (en) Method and system for monitoring service health degree of software system in real time
CN111209314A (en) System for processing massive log data of power information system in real time
CN112579552A (en) Log storage and calling method, device and system
CN116016117A (en) Network equipment operation and maintenance data acquisition method and system, electronic equipment and storage medium
CN108959041B (en) Method for transmitting information, server and computer readable storage medium
CN110225113A (en) A kind of service monitoring method and system
CN212012920U (en) Video operation and maintenance diagnostic system framework
CN114244685A (en) Cloud service center access exception handling system
CN112965793B (en) Identification analysis data-oriented data warehouse task scheduling method and system
WO2022261249A1 (en) Distributed task assignment, distributed alerts and supression management, and artifact life tracking storage in a cluster computing system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination