CN113489609A - Monitoring method and device of system under limited network and electronic equipment - Google Patents

Monitoring method and device of system under limited network and electronic equipment Download PDF

Info

Publication number
CN113489609A
CN113489609A CN202110738623.9A CN202110738623A CN113489609A CN 113489609 A CN113489609 A CN 113489609A CN 202110738623 A CN202110738623 A CN 202110738623A CN 113489609 A CN113489609 A CN 113489609A
Authority
CN
China
Prior art keywords
monitoring
network
notification information
alarm notification
limited network
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202110738623.9A
Other languages
Chinese (zh)
Other versions
CN113489609B (en
Inventor
沙云
李勉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Senpu Information Service Co ltd
Original Assignee
Shanghai Senpu Information Service Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Senpu Information Service Co ltd filed Critical Shanghai Senpu Information Service Co ltd
Priority to CN202110738623.9A priority Critical patent/CN113489609B/en
Publication of CN113489609A publication Critical patent/CN113489609A/en
Application granted granted Critical
Publication of CN113489609B publication Critical patent/CN113489609B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/06Management of faults, events, alarms or notifications
    • H04L41/0631Management of faults, events, alarms or notifications using root cause analysis; using analysis of correlation between notifications, alarms or events based on decision criteria, e.g. hierarchy, tree or time analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0803Configuration setting

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention discloses a monitoring method and a monitoring device of a system under a limited network and electronic equipment, wherein the method comprises the following steps: defining a monitoring rule based on the service logic of a monitored object in the limited network, and pushing the monitoring rule to a monitoring tool of the limited network; acquiring bottom layer resources and configuration parameters of a monitored object by utilizing the CMDB; monitoring associated service scenes in upstream and downstream systems through an external network monitoring tool, and pushing first alarm notification information to a limited network monitoring tool; and acquiring the configuration parameters through the limited network monitoring tool, generating second alarm notification information, and pushing the first alarm notification information and the second alarm notification information to a limited network notification object. The invention automatically configures and maintains the monitoring rules, improves the accuracy and timeliness of the maintenance of the monitoring rules, and reduces the time and cost of manual maintenance; from the perspective of service, multiple sets of monitoring tools covering associated service scenes are arranged in multiple external network environments, and the coverage of monitoring is improved.

Description

Monitoring method and device of system under limited network and electronic equipment
Technical Field
The invention relates to the field of monitoring, in particular to a monitoring method and device for a system under a limited network and electronic equipment.
Background
The monitoring is an indispensable loop in the daily work of operation and maintenance, and a reliable and comprehensive monitoring system can effectively improve the availability of the operation and maintenance object.
When monitoring a system in a limited network environment, a set of monitoring tools is usually built in the limited network environment, and according to a predefined rule, various operating states of a monitored object are recorded, analyzed, judged and alarmed, and an influence range of the whole monitoring workflow is within the limited network environment, as shown in fig. 1. However, the monitoring method has the following defects:
1) all monitoring rules need to be configured in advance in a limited network environment, the monitoring rules need to be adjusted manually every time along with changes of bottom resources, system parameters and service logic, and once the complexity and agility of a system architecture and the service logic are improved to a certain degree, the accuracy and timeliness of configuration and updating of the monitoring rules are difficult to guarantee.
2) All monitoring tools and supporting resources need to be prepared in advance in a limited network environment and can only be used for monitoring the business of an object in the limited network environment, and if the monitoring object has upstream and downstream business contact outside the limited network environment, the business scene cannot be effectively monitored.
Disclosure of Invention
The invention mainly aims to provide a monitoring method and a monitoring device for a system in a limited network, so as to solve the problems of untimely adjustment of monitoring rules and low coverage of a monitoring range in limited network monitoring.
In order to achieve the above object, a first aspect of the present invention provides a method for monitoring a system under a restricted network, including:
defining a monitoring rule based on the service logic of a monitoring object in a limited network, and pushing the monitoring rule to a limited network monitoring tool;
utilizing CMDB to automatically obtain and store the bottom layer resources of the monitoring object and the configuration parameters of the monitoring rule;
monitoring an associated service scene existing in an upstream and downstream system of the monitored object through an external network monitoring tool, and pushing first alarm notification information to a limited network monitoring tool, wherein the upstream and downstream system of the monitored object is located in an external network outside the limited network, and the first alarm notification information is alarm notification information of the associated service scene;
and automatically acquiring configuration parameters through the limited network monitoring tool, generating second alarm notification information based on the monitoring rule and the configuration parameters, and pushing the first alarm notification information and the second alarm notification information to a limited network notification object, wherein the second alarm notification information is the alarm notification information of the limited network.
Optionally, the defining a monitoring rule based on a service logic of a monitoring object in the restricted network and pushing the monitoring rule to the restricted network monitoring tool includes:
embedding points in the monitored object, and defining a monitoring rule based on the service logic of the monitored object in the limited network;
and pushing the monitoring rule to a limited network monitoring tool through an API.
Optionally, the automatically acquiring and storing the underlying resource of the monitoring object and the configuration parameter of the monitoring rule by using the CMDB includes:
utilizing CMDB to automatically acquire bottom layer resources of the monitoring object and configuration parameters of the monitoring rule;
the configuration parameters of the monitoring rules comprise threshold values of all the monitoring rules, the number of buried points in the monitored object and the positions of the buried points.
Optionally, the monitoring, by an external network monitoring tool, an associated service scenario existing in an upstream and downstream system of the monitored object, and pushing the first alarm notification information to the limited network monitoring tool includes:
determining external networks to which upstream and downstream systems of the monitored object respectively belong;
respectively establishing respective external network monitoring tools in the external networks, and monitoring the associated service scenes existing in the upstream and downstream systems;
and when the associated service scene triggers an alarm, the external network monitoring tool generates first alarm notification information and pushes the first alarm notification information to the limited network monitoring tool through the gateway.
Optionally, the automatically obtaining configuration parameters by the restricted network monitoring tool, and generating second alarm notification information based on the monitoring rule and the configuration parameters includes:
the limited network monitoring tool automatically acquires configuration parameters through an API;
and generating second alarm notification information when the abnormal condition is monitored in the limited network according to the monitoring rule and the configuration parameter.
Optionally, the method further comprises:
defining an external network notification object corresponding to each monitoring rule by using the CMDB;
and automatically acquiring the corresponding relation between the monitoring rule defined in the CMDB and an external network notification object through the limited network monitoring tool, and pushing the second alarm notification information to the external network notification object corresponding to the monitoring rule.
Further, the automatically obtaining a corresponding relationship between a monitoring rule defined in the CMDB and an external network notification object by the restricted network monitoring tool, and pushing the second alarm notification information to the external network notification object corresponding to the monitoring rule includes:
the limited network monitoring tool automatically acquires the corresponding relation between the monitoring rule defined in the CMDB and the external network notification object through an API (application programming interface);
pushing the second alarm notification information to a corresponding external network monitoring tool through a gateway according to the corresponding relation;
and the external network monitoring tool pushes the second alarm notification information to an external network notification object.
A second aspect of the present invention provides a monitoring apparatus for a system under a restricted network, including:
the system comprises a definition unit, a monitoring unit and a monitoring unit, wherein the definition unit is used for defining a monitoring rule based on the service logic of a monitoring object in a limited network and pushing the monitoring rule to a monitoring tool of the limited network;
the automatic acquisition unit is used for automatically acquiring and storing the bottom layer resources of the monitored object and the configuration parameters of the monitoring rule by utilizing the CMDB;
the first pushing unit is used for monitoring the related service scenes existing in the upstream and downstream systems of the monitored object through an external network monitoring tool and pushing first alarm notification information to the limited network monitoring tool, wherein the upstream and downstream systems of the monitored object are located in the external network outside the limited network, and the first alarm notification information is the alarm notification information of the related service scenes;
and the second pushing unit is used for automatically acquiring configuration parameters through the limited network monitoring tool, generating second alarm notification information based on the monitoring rule and the configuration parameters, and pushing the first alarm notification information and the second alarm notification information to a limited network notification object, wherein the second alarm notification information is the alarm notification information of the limited network.
A third aspect of the present invention provides a computer-readable storage medium storing computer instructions for causing a computer to execute the monitoring method for a system under a restricted network provided in any one of the first aspects.
A fourth aspect of the present invention provides an electronic apparatus, comprising: at least one processor; and a memory communicatively coupled to the at least one processor; wherein the memory stores a computer program executable by the at least one processor, the computer program being executable by the at least one processor to cause the at least one processor to perform the method for monitoring a system under a restricted network according to any one of the first aspect.
In the monitoring method of the system under the limited network provided by the embodiment of the invention, a monitoring rule is defined based on the service logic of a monitored object under the limited network, the monitoring rule is pushed to a monitoring tool of the limited network, and the CMDB is utilized to automatically acquire and store the bottom layer resources of the monitored object and the configuration parameters of the monitoring rule; the monitoring rules are maintained in an automatic and semi-automatic mode, so that the accuracy and timeliness of maintenance of the monitoring rules are improved, and the time and cost of manual maintenance are reduced.
Monitoring the related service scenes existing in the upstream and downstream systems of the monitored object through an external network monitoring tool, and pushing first alarm notification information to a limited network monitoring tool; automatically acquiring configuration parameters through the limited network monitoring tool, generating second alarm notification information based on the monitoring rule and the configuration parameters, and pushing the first alarm notification information and the second alarm notification information to a limited network notification object; from the aspect of service, 1+ N sets of monitoring tools covering service scenes of upstream and downstream services are arranged in a plurality of network environments, service blind spots are cleared, and the integrity of monitoring coverage is improved; by butting the CMDB and the external network monitoring tools, a monitoring system is upgraded from the traditional ' 1 set of monitoring tools ' to ' 1 set of monitoring tools of the limited network environment ' + ' 1 set of CMDB ' + ' N sets of monitoring tools of the external network environment ' + ' 1+1+ N three-dimensional monitoring ecology, and the coverage of a monitoring range in a service scene is improved.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and other drawings can be obtained by those skilled in the art without creative efforts.
FIG. 1 is a schematic diagram of a conventional monitoring method under a limited network environment;
fig. 2 is a schematic flow chart of a monitoring method of a system in a restricted network according to an embodiment of the present invention;
fig. 3 is a schematic diagram of the automation of the monitoring rule of the configuration parameter class and the semi-automation maintenance of the monitoring rule of the business logic class according to the embodiment of the present invention;
fig. 4 is a schematic diagram of monitoring coverage of a related service scenario in an upstream system and a downstream system in an external network environment according to an embodiment of the present invention;
fig. 5 is a schematic diagram of delivering alarm notification information to an external network notification object according to an embodiment of the present invention;
fig. 6 is an overall schematic diagram of a monitoring method of a system under a restricted network according to an embodiment of the present invention;
fig. 7 is a block diagram of a monitoring apparatus of a system under a restricted network according to an embodiment of the present invention;
fig. 8 is a block diagram of an electronic device according to an embodiment of the present invention.
Detailed Description
In order to make the technical solutions of the present invention better understood, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
It should be noted that the terms "first," "second," and the like in the description and claims of the present invention and in the drawings described above are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used may be interchanged under appropriate circumstances in order to facilitate the description of the embodiments of the invention herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
In the present invention, the terms "upper", "lower", "left", "right", "front", "rear", "top", "bottom", "inner", "outer", "center", "vertical", "horizontal", "lateral", "longitudinal", and the like indicate an orientation or positional relationship based on the orientation or positional relationship shown in the drawings. These terms are used primarily to better describe the invention and its embodiments and are not intended to limit the indicated devices, elements or components to a particular orientation or to be constructed and operated in a particular orientation.
Moreover, some of the above terms may be used to indicate other meanings besides the orientation or positional relationship, for example, the term "on" may also be used to indicate some kind of attachment or connection relationship in some cases. The specific meanings of these terms in the present invention can be understood by those skilled in the art as appropriate.
Furthermore, the terms "mounted," "disposed," "provided," "connected," and "sleeved" are to be construed broadly. For example, it may be a fixed connection, a removable connection, or a unitary construction; can be a mechanical connection, or an electrical connection; may be directly connected, or indirectly connected through intervening media, or may be in internal communication between two devices, elements or components. The specific meanings of the above terms in the present invention can be understood by those of ordinary skill in the art according to specific situations.
It should be noted that the embodiments and features of the embodiments may be combined with each other without conflict. The present invention will be described in detail below with reference to the embodiments with reference to the attached drawings.
When monitoring a system in a limited network environment, the prior art generally constructs a set of monitoring tools in the limited network environment, and records, analyzes, judges and alarms various operating states of a monitored object according to a predefined rule, and the influence range of the whole monitoring work flow is within the limited network environment, as shown in fig. 1.
Aiming at the problems of untimely adjustment of monitoring rules and low coverage of monitoring range in the existing limited network monitoring, the embodiment of the invention provides a monitoring method of a system under a limited network, as shown in fig. 2, the method comprises the following steps of S101 to S104:
step S101: defining a monitoring rule based on the service logic of a monitoring object in a limited network, and pushing the monitoring rule to a limited network monitoring tool;
the system under the limited network is a monitored object under the limited network, the monitored object under the limited network is usually a set of information system for running specific service, and the service logic comprises the following fields: the method comprises the steps of a service scene (Business Scenario), a service Description (Business Description), a service state (Business Status), a service Level (Business Level), Monitoring period frequency (Monitoring Schedule) and an alarm Rule (Alerting Rule), wherein the service state comprises normal, early warning and abnormity; a monitoring rule is a set of rules used to define a specific monitoring job, including: monitoring objects, monitoring types, monitoring time, monitoring frequency, alarm triggering rules, alarm levels, alarm notification time, alarm notification modes, alarm notifiers, alarm upgrading triggering conditions, alarm upgrading notifiers, alarm upgrading notification modes and the like, defining which contents are monitored and which service systems are buried from a macroscopic level based on the monitoring rules defined by service logic, wherein the monitoring rules are usually stored in a database or a configuration file in a structured or unstructured data form;
when the monitoring rule is transmitted, the monitoring object is transmitted to the limited network monitoring tool in an active pushing mode, and the business under the monitoring object masters the leading right to avoid interference on the business; if the transmission mode is that the monitoring rule in the monitored object is pulled by the limited network monitoring tool, the monitored object bears the overweight load, so that the monitored object actively pushes the monitoring rule, the monitoring rule is actively pushed according to the change of the service under the monitored object, the dominant right is mastered by the service, and the load on the monitored object is avoided.
Specifically, the step S101 includes:
embedding points in the monitored object, and defining a monitoring rule based on the service logic of the monitored object in the limited network;
and pushing the monitoring rule to a limited network monitoring tool through an API. The API (Application Programming Interface) is a predefined Interface, and the monitoring tool is a tool for performing specific monitoring work, and is usually an independent information system or an executable program file, where the limited network monitoring tool is a monitoring tool installed in a limited network.
Step S102: utilizing CMDB to automatically obtain and store the bottom layer resources of the monitoring object and the configuration parameters of the monitoring rule; the CMDB (Configuration Management Database) usually records various types of Configuration information related to operation and maintenance, including infrastructure, equipment, operating environment, process monitoring information, and the like.
Specifically, the step S102 includes:
utilizing CMDB to automatically acquire bottom layer resources of the monitoring object and configuration parameters of the monitoring rule;
the configuration parameters of the monitoring rules comprise threshold values of all the monitoring rules, the number of buried points in the monitored object and the positions of the buried points. The configuration parameters of the monitoring rules configure the monitoring rules from a microscopic level, and perform general setting or configuration on a specific operation level, including adjusting a monitoring threshold, increasing or decreasing the number of embedded points of a monitored service system, changing the service system of the embedded points, and performing abnormal alarm on an alarm notification object according to the numerical values of a general CPU and a memory.
In the above steps S101 and S102, standardized service logic monitoring rule information is defined by embedding points in the monitored object, and a monitoring tool is docked through an API, so that semi-automatic configuration and maintenance of service logic monitoring rules pushed from the upstream of the monitored object are realized; and the CMDB is adopted to automatically acquire and store the bottom layer resources and the configuration parameters of the monitoring object, and the monitoring tool is butted through the API, so that the automatic configuration and maintenance of the monitoring rules of the bottom layer resources and the configuration parameters are realized. The schematic diagram of the automatic configuration parameter monitoring rule and the semi-automatic maintenance of the service logic monitoring rule provided by the embodiment of the invention is shown in fig. 3:
the CMDB acquires the bottom resource and configuration parameter information of a monitored object in a limited network in an automatic mode, and a monitoring tool A in the limited network environment automatically acquires the bottom resource and configuration parameter information through an API (application programming interface); the monitoring object defines a development standard, a baseline version service monitoring rule and output information are preset according to service logic before the system is on line, the service logic type monitoring rule and the output information are synchronously updated every time the system is upgraded, and the service logic type monitoring rule and the output information are pushed to a monitoring tool A under a limited network environment through an API.
The monitoring rules are maintained in an automatic and semi-automatic mode, so that the accuracy and timeliness of maintenance of the monitoring rules are improved, and the time and cost of manual maintenance are reduced.
Step S103: monitoring an associated service scene existing in an upstream and downstream system of the monitored object through an external network monitoring tool, and pushing first alarm notification information to a limited network monitoring tool, wherein the upstream and downstream system of the monitored object is located in an external network outside the limited network, and the first alarm notification information is alarm notification information of the associated service scene;
the external network is other network environment outside the limited network environment, the upstream and downstream system is an informatization system with upstream and downstream service interaction in the external network and the monitoring object of the limited network, and comprises an informatization system with upstream service interaction with the monitoring object and an informatization system with downstream service interaction with the monitoring object. The method comprises the steps of establishing monitoring rules and monitoring tools based on business logic at upstream and downstream links of a monitored object, improving the coverage of a monitoring range in a business scene, setting multiple sets of external network monitoring tools covering the business upstream and downstream business scenes in multiple external network environments from a business perspective, removing business blind spots and improving the integrity of monitoring coverage.
Specifically, the step S103 includes:
determining external networks to which upstream and downstream systems of the monitored object respectively belong;
respectively establishing respective external network monitoring tools in the external networks, and monitoring the associated service scenes existing in the upstream and downstream systems;
and when the associated service scene triggers an alarm, the external network monitoring tool generates first alarm notification information and pushes the first alarm notification information to the limited network monitoring tool through the gateway. The gateway is also called an internetwork connector, realizes network interconnection in a network layer, and can be used for interconnecting a limited network with other external networks.
Step S104: and automatically acquiring configuration parameters through the limited network monitoring tool, generating second alarm notification information based on the monitoring rule and the configuration parameters, and pushing the first alarm notification information and the second alarm notification information to a limited network notification object, wherein the second alarm notification information is the alarm notification information of the limited network.
When the configuration parameters are acquired, the configuration parameters in the CMDB are internal data of the operation and maintenance team, and the configuration parameters need to be automatically acquired by a limited network monitoring tool in an active pulling mode so as to reduce behavior operation of the CMDB; if the transmission direction of the data is CMDB to push configuration parameters to the limited network monitoring tool, great pressure is caused to the CMDB.
Specifically, the step S104 includes:
the limited network monitoring tool automatically acquires configuration parameters through an API;
and generating second alarm notification information when the abnormal condition is monitored in the limited network according to the monitoring rule and the configuration parameter.
According to the steps S103 and S104, a monitoring rule of a relevant service scene is defined in an upstream system and a downstream system of a monitored object, corresponding monitoring work is implemented in an external network environment, and an alarm notification range covers a notification crowd of the monitored object; and after the upstream and downstream systems monitor the abnormal information, transmitting associated service alarm notification information to the limited network through the corresponding gateway, and notifying alarm notification crowds or notification objects of the monitoring objects in the limited network, thereby improving the service monitoring coverage of the monitoring objects in the limited network. The monitoring coverage schematic diagram of the associated service scene in the upstream and downstream systems in the external network environment provided by the embodiment of the invention is shown in fig. 4:
the method comprises the steps that under the environment of an external network, corresponding associated service scenes in upstream and downstream systems are monitored through the external network through a set external monitoring tool based on a service monitoring rule, when abnormal affairs exist in the associated service scenes, an alarm is triggered, and first alarm notification information is pushed to a gateway of a limited network through an API (application programming interface); a gateway of the restricted network pushes first alarm information to a monitoring tool of the restricted network;
meanwhile, the monitoring object of the limited network pushes the collected monitoring information to a monitoring tool of the limited network; the monitoring tool under the limited network environment pushes the alarm notification information to a notification object; the alarm notification information includes abnormal conditions monitored in the restricted network, monitoring information collected by the monitored object, namely, second alarm notification information, and associated service alarm contents of an external upstream and downstream system, and alarm information corresponding to an associated service scene, namely, first alarm notification information.
From the aspect of service, 1+ N sets of monitoring tools covering monitored objects and associated service scenes in an upstream system and a downstream system are arranged in a limited network environment and a plurality of external network environments, the monitoring tools comprise 1 set of limited network monitoring tool and a plurality of sets of external network monitoring tools, service blind spots are cleared, and the integrity of monitoring coverage is improved; by butting the CMDB and the external network monitoring tools, the monitoring system is upgraded from 1 set of monitoring tools to 1 set of monitoring tools in the network environment, namely +1 set of CMDB and +1+ N set of monitoring tools in the external network environment.
Specifically, the method further comprises:
defining an external network notification object corresponding to each monitoring rule by using the CMDB;
and automatically acquiring the corresponding relation between the monitoring rule defined in the CMDB and an external network notification object through the limited network monitoring tool, and pushing the second alarm notification information to the external network notification object corresponding to the monitoring rule.
In order to solve the abnormal problem of dependence on external resources and further accurately expand the notification range of monitoring alarms, the embodiment of the invention can acquire more timely and more comprehensive alarm information by acquiring upstream and downstream alarms based on each monitoring rule preconfigured in the CMDB and corresponding information of an external network notification object, shorten the time for acquiring the limited network alarm information and process possible problems in advance; in an internal limited system, the time of the fault occurrence can be dealt with in advance by burying points in the monitored object and a universal monitoring CPU, the management fineness of the monitoring alarm rule is improved, the time efficiency of the alarm reaching the communicated object is improved on the basis, and the fault duration is reduced.
Wherein, the automatically obtaining the corresponding relationship between the monitoring rule defined in the CMDB and the external network notification object through the restricted network monitoring tool and pushing the second alarm notification information to the external network notification object corresponding to the monitoring rule includes:
the limited network monitoring tool automatically acquires the corresponding relation between the monitoring rule defined in the CMDB and the external network notification object through an API (application programming interface);
pushing the second alarm notification information to a corresponding external network monitoring tool through a gateway according to the corresponding relation;
and the external network monitoring tool pushes the second alarm notification information to an external network notification object.
The method comprises the steps of defining a notification crowd or a notification object corresponding to each monitoring rule in a CMDB of the limited network, butting a monitoring tool A of the limited network through an API, transmitting the alarm notification content conforming to the rules to the outside of the limited network through a gateway of the limited network and transmitting the alarm notification content conforming to the rules to an external network notification object, namely an external resource, through an external monitoring tool after the monitoring tool A generates alarm information based on the corresponding relation between the monitoring rule and the notification object predefined in the CMDB so as to accurately meet the reasonable alarm notification range. The schematic diagram of transmitting the alarm notification information to the external network notification object provided by the embodiment of the invention is shown in fig. 5:
monitoring information collected by a monitoring object in a limited network is pushed to a monitoring tool A of the limited network; the monitoring rules of the CMDB comprise specific alarm rules, the alarm rules define the corresponding relation whether a specific notification object comprises external resources, the monitoring tool judges the alarm notification rules based on the alarm rules in the CMDB and the corresponding information of the notification object, and pushes the corresponding alarm notification information to a gateway under the condition of meeting the requirement of notifying the external resources, the gateway pushes the corresponding alarm notification information to an external monitoring tool, and the external monitoring tool pushes the corresponding alarm notification information to an external network notification object, namely the external resources; meanwhile, the limited network monitoring tool A pushes the alarm notification information to the limited network notification object.
The embodiment of the present invention further provides an overall schematic diagram of a monitoring method of a system in a restricted network, as shown in fig. 6, which includes information in the schematic diagrams shown in fig. 3, 4, and 5, and includes a plurality of external networks in addition to a restricted network monitoring tool a: the system comprises an external network 1 and an external network 2 … …, wherein the external network environment respectively comprises a monitoring tool B and a monitoring tool C … … monitoring tool X;
triggering an alarm when the monitoring tool of each external network monitors that an associated service scene is abnormal, pushing first alarm notification information to a gateway, pushing the first alarm notification information to a monitoring tool A of a limited network by the gateway, and pushing the first alarm notification information to a limited network notification object by the limited network monitoring tool A; the first alarm notification information of the external gateway is pushed to the inside of the limited network, so that external associated service scenes can be monitored in the limited network environment, and the coverage of a monitoring range is improved;
the monitoring object in the limited network environment pushes the collected monitoring information and service monitoring rules to a limited network monitoring tool A, the limited network monitoring tool A automatically acquires the monitoring rules and alarm outgoing rules in the CMDB, the limited network monitoring tool A pushes second alarm notification information to the notification object and the gateway according to the corresponding relation of the notification object contained in the monitoring rules and the alarm outgoing rules in the CMDB, and the gateway pushes the second alarm notification information to each monitoring tool in each external network of the external upstream and downstream system; and the second alarm notification information in the limited network is notified to the external resource, and the alarm or the notification is transmitted to the external resource, so that the notification range of the monitoring alarm is expanded.
Compared with the traditional universal advanced monitoring system, the embodiment of the invention sets up the following steps before monitoring from the service perspective: business monitoring rules "," monitoring: after the upstream and downstream service scenes are covered and monitored: and the external service resources inform the three major guarantees, so that the full life cycle of monitoring work is completely covered, and the operation and maintenance guarantee capability of the service is improved.
From the above description, it can be seen that the present invention achieves the following technical effects:
1) configuring the monitoring rules in an automatic and semi-automatic mode, realizing automatic configuration and maintenance of the monitoring rules of bottom resources and configuration parameters, and realizing semi-automatic configuration and maintenance of the monitoring rules of business logic pushed from upstream; the monitoring rules are maintained in an automatic and semi-automatic mode, so that the accuracy and timeliness of maintenance of the monitoring rules are improved, and the time and cost of manual maintenance are reduced.
2) Establishing monitoring rules and monitoring tools based on business logic at upstream and downstream links of a monitored object, improving the coverage of a monitoring range in a business scene, setting 1+ N sets of monitoring tools covering the business scene upstream and downstream in a plurality of network environments from a business perspective, removing business blind spots and improving the integrity of monitoring coverage; by butting the CMDB and the external network monitoring tools, the monitoring system is upgraded from 1 set of monitoring tools to 1 set of monitoring tools in the network environment, namely +1 set of CMDB and +1+ N set of monitoring tools in the external network environment.
3) Aiming at the abnormal problem of dependence on external resources, the notification range of the monitoring alarm is further accurately expanded, the management fineness of the monitoring alarm rule is improved based on the information preconfigured in the CMDB, the time efficiency of the alarm reaching the notification object is improved on the basis, and the fault duration is reduced.
4) Compared with the traditional ' universal advanced ' monitoring system, the invention sets up ' before monitoring: business monitoring rules "," monitoring: after the upstream and downstream service scenes are covered and monitored: and the external service resources inform the three major guarantees, so that the full life cycle of monitoring work is completely covered, and the operation and maintenance guarantee capability of the service is improved.
It should be noted that the steps illustrated in the flowcharts of the figures may be performed in a computer system such as a set of computer-executable instructions and that, although a logical order is illustrated in the flowcharts, in some cases, the steps illustrated or described may be performed in an order different than presented herein.
An embodiment of the present invention further provides a monitoring apparatus for a system under a restricted network, which is used for implementing the monitoring method for a system under a restricted network, and as shown in fig. 7, the apparatus includes:
a defining unit 71, configured to define a monitoring rule based on a service logic of a monitored object in a restricted network, and push the monitoring rule to a restricted network monitoring tool;
an automatic obtaining unit 72, configured to automatically obtain and store the underlying resource of the monitored object and the configuration parameter of the monitoring rule by using the CMDB;
a first pushing unit 73, configured to monitor, by an external network monitoring tool, an associated service scene existing in an upstream and downstream system of the monitored object, and push first alarm notification information to a limited network monitoring tool, where the upstream and downstream systems of the monitored object are located in an external network outside a limited network, and the first alarm notification information is alarm notification information of the associated service scene;
a second pushing unit 74, configured to automatically obtain the configuration parameters through the restricted network monitoring tool, generate second alarm notification information based on the monitoring rule and the configuration parameters, and push the first alarm notification information and the second alarm notification information to a restricted network notification object, where the second alarm notification information is alarm notification information of the restricted network.
An embodiment of the present invention further provides an electronic device, as shown in fig. 8, the electronic device includes one or more processors 81 and a memory 82, where one processor 81 is taken as an example in fig. 8.
The controller may further include: an input device 83 and an output device 84.
The processor 81, the memory 82, the input device 83 and the output device 84 may be connected by a bus or other means, and fig. 8 illustrates the connection by a bus as an example.
The Processor 81 may be a Central Processing Unit (CPU), the Processor 81 may also be other general-purpose processors, Digital Signal Processors (DSP), Application Specific Integrated Circuits (ASIC), Field Programmable Gate Arrays (FPGA), other Programmable logic devices, discrete Gate or transistor logic devices, discrete hardware components, or any combination thereof, and the general-purpose Processor may be a microprocessor or any conventional Processor.
The memory 82, which is a non-transitory computer readable storage medium, may be used to store non-transitory software programs, non-transitory computer executable programs, and modules, such as program instructions/modules corresponding to the control methods in the embodiments of the present invention. The processor 81 executes various functional applications of the server and data processing by running non-transitory software programs, instructions and modules stored in the memory 82, namely, the monitoring method of the system under the restricted network of the above-mentioned method embodiment is implemented.
The memory 82 may include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required for at least one function; the storage data area may store data created according to use of a processing device operated by the server, and the like. Further, the memory 82 may include high speed random access memory, and may also include non-transitory memory, such as at least one magnetic disk storage device, flash memory device, or other non-transitory solid state storage device. In some embodiments, the memory 82 may optionally include memory located remotely from the processor 81, which may be connected to a network connection device via a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.
The input device 83 may receive input numeric or character information and generate key signal inputs related to user settings and function control of the processing device of the server. The output device 84 may include a display device such as a display screen.
One or more modules are stored in the memory 82, which when executed by the one or more processors 81 perform the method as shown in FIG. 2.
Those skilled in the art will appreciate that all or part of the processes of the methods of the embodiments described above can be implemented by a computer program, which can be stored in a computer-readable storage medium, and the processes of the embodiments of the motor control methods described above can be included when the computer program is executed. The storage medium may be a magnetic Disk, an optical Disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a Flash Memory (FM), a Hard Disk (Hard Disk Drive, HDD), or a Solid-State Drive (SSD); the storage medium may also comprise a combination of memories of the kind described above.
Although the embodiments of the present invention have been described in conjunction with the accompanying drawings, those skilled in the art may make various modifications and variations without departing from the spirit and scope of the invention, and such modifications and variations fall within the scope defined by the appended claims.

Claims (10)

1. A method for monitoring a system under a restricted network, comprising:
defining a monitoring rule based on the service logic of a monitoring object in a limited network, and pushing the monitoring rule to a limited network monitoring tool;
utilizing CMDB to automatically obtain and store the bottom layer resources of the monitoring object and the configuration parameters of the monitoring rule;
monitoring an associated service scene existing in an upstream and downstream system of the monitored object through an external network monitoring tool, and pushing first alarm notification information to a limited network monitoring tool, wherein the upstream and downstream system of the monitored object is located in an external network outside the limited network, and the first alarm notification information is alarm notification information of the associated service scene;
and automatically acquiring configuration parameters through the limited network monitoring tool, generating second alarm notification information based on the monitoring rule and the configuration parameters, and pushing the first alarm notification information and the second alarm notification information to a limited network notification object, wherein the second alarm notification information is the alarm notification information of the limited network.
2. The method of claim 1, wherein the defining and pushing the monitoring rule to a restricted network monitoring tool based on the business logic of the monitoring object in the restricted network comprises:
embedding points in the monitored object, and defining a monitoring rule based on the service logic of the monitored object in the limited network;
and pushing the monitoring rule to a limited network monitoring tool through an API.
3. The method of claim 1, wherein the utilizing the CMDB to automatically obtain and store the underlying resources of the monitoring object and the configuration parameters of the monitoring rule comprises:
utilizing CMDB to automatically acquire bottom layer resources of the monitoring object and configuration parameters of the monitoring rule;
the configuration parameters of the monitoring rules comprise threshold values of all the monitoring rules, the number of buried points in the monitored object and the positions of the buried points.
4. The method according to claim 1, wherein the monitoring, by an external network monitoring tool, the associated service scenario existing in the upstream and downstream systems of the monitored object, and pushing the first alarm notification information to the restricted network monitoring tool comprises:
determining external networks to which upstream and downstream systems of the monitored object respectively belong;
respectively establishing respective external network monitoring tools in the external networks, and monitoring the associated service scenes existing in the upstream and downstream systems;
and when the associated service scene triggers an alarm, the external network monitoring tool generates first alarm notification information and pushes the first alarm notification information to the limited network monitoring tool through the gateway.
5. The method of claim 1, wherein automatically obtaining configuration parameters by the restricted network monitoring tool and generating second alarm notification information based on the monitoring rules and configuration parameters comprises:
the limited network monitoring tool automatically acquires configuration parameters through an API;
and generating second alarm notification information when the abnormal condition is monitored in the limited network according to the monitoring rule and the configuration parameter.
6. The method of claim 1, further comprising:
defining an external network notification object corresponding to each monitoring rule by using the CMDB;
and automatically acquiring the corresponding relation between the monitoring rule defined in the CMDB and an external network notification object through the limited network monitoring tool, and pushing the second alarm notification information to the external network notification object corresponding to the monitoring rule.
7. The method according to claim 6, wherein the automatically obtaining, by the restricted network monitoring tool, the correspondence between the monitoring rule defined in the CMDB and the external network notification object, and pushing the second alarm notification information to the external network notification object corresponding to the monitoring rule comprises:
the limited network monitoring tool automatically acquires the corresponding relation between the monitoring rule defined in the CMDB and the external network notification object through an API (application programming interface);
pushing the second alarm notification information to a corresponding external network monitoring tool through a gateway according to the corresponding relation;
and the external network monitoring tool pushes the second alarm notification information to an external network notification object.
8. A monitoring device for a system under a restricted network, comprising:
the system comprises a definition unit, a monitoring unit and a monitoring unit, wherein the definition unit is used for defining a monitoring rule based on the service logic of a monitoring object in a limited network and pushing the monitoring rule to a monitoring tool of the limited network;
the automatic acquisition unit is used for automatically acquiring and storing the bottom layer resources of the monitored object and the configuration parameters of the monitoring rule by utilizing the CMDB;
the first pushing unit is used for monitoring the related service scenes existing in the upstream and downstream systems of the monitored object through an external network monitoring tool and pushing first alarm notification information to the limited network monitoring tool, wherein the upstream and downstream systems of the monitored object are located in the external network outside the limited network, and the first alarm notification information is the alarm notification information of the related service scenes;
and the second pushing unit is used for automatically acquiring configuration parameters through the limited network monitoring tool, generating second alarm notification information based on the monitoring rule and the configuration parameters, and pushing the first alarm notification information and the second alarm notification information to a limited network notification object, wherein the second alarm notification information is the alarm notification information of the limited network.
9. A computer-readable storage medium storing computer instructions for causing a computer to execute the method for monitoring a system under a restricted network according to any one of claims 1 to 7.
10. An electronic device, characterized in that the electronic device comprises: at least one processor; and a memory communicatively coupled to the at least one processor; wherein the memory stores a computer program executable by the at least one processor, the computer program being executable by the at least one processor to cause the at least one processor to perform the method of monitoring a system under a restricted network of any one of claims 1-7.
CN202110738623.9A 2021-06-30 2021-06-30 Monitoring method and device of system under limited network and electronic equipment Active CN113489609B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110738623.9A CN113489609B (en) 2021-06-30 2021-06-30 Monitoring method and device of system under limited network and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110738623.9A CN113489609B (en) 2021-06-30 2021-06-30 Monitoring method and device of system under limited network and electronic equipment

Publications (2)

Publication Number Publication Date
CN113489609A true CN113489609A (en) 2021-10-08
CN113489609B CN113489609B (en) 2022-12-02

Family

ID=77937115

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110738623.9A Active CN113489609B (en) 2021-06-30 2021-06-30 Monitoring method and device of system under limited network and electronic equipment

Country Status (1)

Country Link
CN (1) CN113489609B (en)

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2008244635A (en) * 2007-03-26 2008-10-09 Oki Electric Ind Co Ltd System, method, and program for monitoring network, and collecting device
CN101714930A (en) * 2009-12-30 2010-05-26 北京世纪互联宽带数据中心有限公司 Method and system for realizing network monitoring
JP2016100799A (en) * 2014-11-25 2016-05-30 株式会社日立製作所 Monitoring system and monitoring method
CN110635938A (en) * 2019-08-19 2019-12-31 腾讯科技(深圳)有限公司 Monitoring method, system, equipment and medium
CN111343033A (en) * 2020-05-22 2020-06-26 中国人民解放军国防科技大学 Network management system for multi-layer difference
CN111611137A (en) * 2020-06-30 2020-09-01 平安银行股份有限公司 Alarm monitoring method and device, computer equipment and storage medium
CN112350862A (en) * 2020-10-30 2021-02-09 广州市汇聚支付电子科技有限公司 Monitoring alarm and fault self-healing system
CN112532456A (en) * 2020-12-04 2021-03-19 浪潮云信息技术股份公司 Alarm monitoring method in cloud environment

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2008244635A (en) * 2007-03-26 2008-10-09 Oki Electric Ind Co Ltd System, method, and program for monitoring network, and collecting device
CN101714930A (en) * 2009-12-30 2010-05-26 北京世纪互联宽带数据中心有限公司 Method and system for realizing network monitoring
JP2016100799A (en) * 2014-11-25 2016-05-30 株式会社日立製作所 Monitoring system and monitoring method
CN110635938A (en) * 2019-08-19 2019-12-31 腾讯科技(深圳)有限公司 Monitoring method, system, equipment and medium
CN111343033A (en) * 2020-05-22 2020-06-26 中国人民解放军国防科技大学 Network management system for multi-layer difference
CN111611137A (en) * 2020-06-30 2020-09-01 平安银行股份有限公司 Alarm monitoring method and device, computer equipment and storage medium
CN112350862A (en) * 2020-10-30 2021-02-09 广州市汇聚支付电子科技有限公司 Monitoring alarm and fault self-healing system
CN112532456A (en) * 2020-12-04 2021-03-19 浪潮云信息技术股份公司 Alarm monitoring method in cloud environment

Also Published As

Publication number Publication date
CN113489609B (en) 2022-12-02

Similar Documents

Publication Publication Date Title
US11627051B2 (en) Determining asset associations for data center customers
US10965760B2 (en) Cloud-based operator interface for industrial automation
US10268961B2 (en) Generating predictive models to reconfigure electronic devices
CN105871605A (en) Operation and maintenance monitoring platform based on big power marketing data
US9921877B2 (en) Intelligent auto-scaling
US10536348B2 (en) Operational micro-services design, development, deployment
CN113055417A (en) Intelligent industrial Internet of things system
CN105471932A (en) Front-end application monitoring method, front-end application and front-end application monitoring system
CN103401698A (en) Monitoring system used for alarming server status in server cluster operation
CN110688277A (en) Data monitoring method and device for micro-service framework
CN114244676A (en) Intelligent IT integrated gateway system
CN112165528B (en) Vehicle event and management method, system and storage medium of event file data thereof
CN114567538A (en) Alarm information processing method and device
CN115460051A (en) Equipment linkage model configuration method based on industry Internet of things scene
CN113489609B (en) Monitoring method and device of system under limited network and electronic equipment
CN110855003A (en) Method and device for calling and comparing self-adaptive configuration of main station
CN111324504B (en) Method and device for monitoring running state of power communication network
WO2021102838A1 (en) Method and apparatus for determining collection frequency, computer device, and storage medium
US20170187575A1 (en) System and method for customizing standard device-orientated services within a high scale deployment
CN115766768A (en) Method and device for designing sensing center in computational power network operating system
CN114217867A (en) Automatic operation and maintenance agent device, equipment and storage medium
US20220283990A1 (en) Method for configuring priority level, cloud platform, system, computing device, and medium
DE102018114758A1 (en) LOOP INTERFACE
CN117234673A (en) Data processing method, system and electronic equipment
CN110837453B (en) Method and related device for monitoring document exchange platform

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant